-
@ b17fccdf:b7211155
2025-03-25 11:23:36Si vives en España, quizás hayas notado que no puedes acceder a ciertas páginas webs durante los fines de semana o en algunos días entre semana, entre ellas, la guía de MiniBolt.
Esto tiene una razón, por supuesto una solución, además de una conclusión. Sin entrar en demasiados detalles:
La razón
El bloqueo a Cloudflare, implementado desde hace casi dos meses por operadores de Internet (ISPs) en España (como Movistar, O2, DIGI, Pepephone, entre otros), se basa en una orden judicial emitida tras una demanda de LALIGA (Fútbol). Esta medida busca combatir la piratería en España, un problema que afecta directamente a dicha organización.
Aunque la intención original era restringir el acceso a dominios específicos que difundieran dicho contenido, Cloudflare emplea el protocolo ECH (Encrypted Client Hello), que oculta el nombre del dominio, el cual antes se transmitía en texto plano durante el proceso de establecimiento de una conexión TLS. Esta medida dificulta que las operadoras analicen el tráfico para aplicar bloqueos basados en dominios, lo que les obliga a recurrir a bloqueos más amplios por IP o rangos de IP para cumplir con la orden judicial.
Esta práctica tiene consecuencias graves, que han sido completamente ignoradas por quienes la ejecutan. Es bien sabido que una infraestructura de IP puede alojar numerosos dominios, tanto legítimos como no legítimos. La falta de un "ajuste fino" en los bloqueos provoca un perjuicio para terceros, restringiendo el acceso a muchos dominios legítimos que no tiene relación alguna con actividades ilícitas, pero que comparten las mismas IPs de Cloudflare con dominios cuestionables. Este es el caso de la web de MiniBolt y su dominio
minibolt.info
, los cuales utilizan Cloudflare como proxy para aprovechar las medidas de seguridad, privacidad, optimización y servicios adicionales que la plataforma ofrece de forma gratuita.Si bien este bloqueo parece ser temporal (al menos durante la temporada 24/25 de fútbol, hasta finales de mayo), es posible que se reactive con el inicio de la nueva temporada.
La solución
Obviamente, MiniBolt no dejará de usar Cloudflare como proxy por esta razón. Por lo que a continuación se exponen algunas medidas que como usuario puedes tomar para evitar esta restricción y poder acceder:
~> Utiliza una VPN:
Existen varias soluciones de proveedores de VPN, ordenadas según su reputación en privacidad: - IVPN - Mullvad VPN - Proton VPN (gratis) - Obscura VPN (solo para macOS) - Cloudfare WARP (gratis) + permite utilizar el modo proxy local para enrutar solo la navegación, debes utilizar la opción "WARP a través de proxy local" siguiendo estos pasos: 1. Inicia Cloudflare WARP y dentro de la pequeña interfaz haz click en la rueda dentada abajo a la derecha > "Preferencias" > "Avanzado" > "Configurar el modo proxy" 2. Marca la casilla "Habilite el modo proxy en este dispositivo" 3. Elige un "Puerto de escucha de proxy" entre 0-65535. ej: 1080, haz click en "Aceptar" y cierra la ventana de preferencias 4. Accede de nuevo a Cloudflare WARP y pulsa sobre el switch para habilitar el servicio. 3. Ahora debes apuntar el proxy del navegador a Cloudflare WARP, la configuración del navegador es similar a esta para el caso de navegadores basados en Firefox. Una vez hecho, deberías poder acceder a la guía de MiniBolt sin problemas. Si tienes dudas, déjalas en comentarios e intentaré resolverlas. Más info AQUÍ.
~> Proxifica tu navegador para usar la red de Tor, o utiliza el navegador oficial de Tor (recomendado).
La conclusión
Estos hechos ponen en tela de juicio los principios fundamentales de la neutralidad de la red, pilares esenciales de la Declaración de Independencia del Ciberespacio que defiende un internet libre, sin restricciones ni censura. Dichos principios se han visto quebrantados sin precedentes en este país, confirmando que ese futuro distópico que muchos negaban, ya es una realidad.
Es momento de actuar y estar preparados: debemos impulsar el desarrollo y la difusión de las herramientas anticensura que tenemos a nuestro alcance, protegiendo así la libertad digital y asegurando un acceso equitativo a la información para todos
Este compromiso es uno de los pilares fundamentales de MiniBolt, lo que convierte este desafío en una oportunidad para poner a prueba las soluciones anticensura ya disponibles, así como las que están en camino.
¡Censúrame si puedes, legislador! ¡La lucha por la privacidad y la libertad en Internet ya está en marcha!
Fuentes: * https://bandaancha.eu/articulos/movistar-o2-deja-clientes-sin-acceso-11239 * https://bandaancha.eu/articulos/esta-nueva-sentencia-autoriza-bloqueos-11257 * https://bandaancha.eu/articulos/como-saltarse-bloqueo-webs-warp-vpn-9958 * https://bandaancha.eu/articulos/como-activar-ech-chrome-acceder-webs-10689 * https://comunidad.movistar.es/t5/Soporte-Fibra-y-ADSL/Problema-con-web-que-usan-Cloudflare/td-p/5218007
-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Let’s dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computers—and it has nothing to do with what so-called “quantum coaches” teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoin’s security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computing’s Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. It’s a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoin’s Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoin’s blockchain.
- Lamport: Created in 1977, it’s considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoin’s Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the community’s constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoin’s future is not at risk—it is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodes—the computers that participate in the Bitcoin network—agree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effort—protecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"—accumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
What’s at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ f1989a96:bcaaf2c1
2025-04-10 14:25:09Good morning, readers!
Today, HRF takes part in the launch of the Bitcoin Humanitarian Alliance in London, where a dozen human rights and aid groups will convene with policymakers, media, finance professionals, and technologists at the Frontline Club to explain how they are using Bitcoin in their work in the field.
Elsewhere, we bring news from Turkey, where large, pro-democracy protests erupted over President Recep Tayyip Erdogan’s increasing political repression and economic fallout. The Turkish regime has detained more than 2,000 protesters (and counting) as youth appear in droves demanding democracy, accountability, and economic reform.
In Eastern Africa, Tanzania’s government extended immense restrictions on foreign currency, effectively barring its use in day-to-day payments outside a few circumstances. In a poverty-stricken country where fuel prices have moved forcibly upward for two consecutive months, access to and usage of alternative currencies can be a financial lifeline.
In Bitcoin news, we spotlight Misty Breez, a new open-source Bitcoin wallet built by Lightning Network infrastructure company Breez. The wallet is a Lightning and Liquid Network hybrid wallet. It gives users control over their funds and abstracts away any complexities of payment channel management, but users must trust the Liquid Federation. In terms of functionality, Misty Breez supports a wide variety of address types, offering users flexibility across the fees, privacy, and censorship resistance of their payments. It may prove a helpful tool for dissidents and activists standing against tyranny.
We end with the latest edition of the HRF x Pubkey Freedom Tech Series, where HRF’s Ayelen Osorio joins Zimbabwean pastor-turned-activist Evan Mawarire, who recounts his inspiring journey of a peaceful uprising against Robert Mugabe’s dictatorship and the hyperinflation and repression he unleashed on the population. We also feature the live streams of the 2025 MIT Bitcoin Expo in collaboration with HRF. These videos highlight the speakers, panels, and activities led by HRF to raise awareness about financial repression and the tools being built to resist it.
Now, let’s jump right in!
SUBSCRIBE HERE
GLOBAL NEWS
Turkey | Government Detains Thousands of Pro-Democracy Protesters
The largest protests in over a decade erupted in Istanbul, Turkey, after President Recep Tayyip Erdoğan detained political opposition figure and Istanbul Mayor Ekrem Imamoglu. Turks of all walks of life find themselves united by common outrage at the regime’s ongoing political repression and tumultuous economic conditions. With inflation soaring above 39% and widespread unemployment among the nation’s youth, it’s no surprise Turks are flooding the streets and demanding change. In response to these demonstrations, law enforcement has since detained more than 2,000 demonstrators, and police blockades have met student protesters with water cannon trucks to suppress their dissent. Many young Turks feel their future is slipping away in a country where saving is futile, the currency is collapsing, and speaking out comes at a high personal cost. “This feels like our last chance,” one young protester said, adding, “If we don’t succeed, many of us will have to leave Turkey.”
Tanzania | Regime Enacts Restrictions on Foreign Currency
Tanzania’s regime is banning the use of foreign currency outside of a few circumstances (such as duty-free retailers and government membership fees). This means quoting prices in, accepting, or facilitating payments with foreign currency is now illegal, alongside declining to accept the official Tanzanian shilling (TZS). Losing the ability to transact with more stable currencies removes individuals’ ability to shield themselves from inflation and subjects them to local currency volatility. The mandate comes in addition to the Energy and Water Utilities Regulatory Authority raising the cost of fuel for a second consecutive month. Locals worry this could further increase the cost of living as the fuel price hike ripples through the economy. These policies mirror the tactics of authoritarians using financial control to limit dissent and restrict individual financial freedom.
China | Incorporates e-CNY CBDC into Financial Sector Guidelines
China is incorporating the e-CNY central bank digital currency (CBDC) into financial sector guidelines for the first time, signaling a strengthening commitment to fully roll out its CBDC. The e-CNY’s usage is reportedly expanding among Chinese citizens, with the Chinese Communist Party (CCP) claiming 800 million wallets and over 10.2 trillion CNY in transaction volume — though these numbers are both dubiously high and difficult to independently verify. As usage grows, so do concerns over financial and individual liberties. The CCP already uses the financial system to monitor and suppress dissent. For Uyghurs, a Muslim minority in the Uyghur Region grappling with ongoing cultural genocide, mass surveillance, and forced labor from the CCP, the e-CNY would allow the regime to restrict their financial autonomy and freedom completely. As it begins to roll out, it’s important to become aware of the dangers of the e-CNY here.
Burkina Faso | Arrests Three Journalists in Press Crackdown
Burkina Faso’s military junta arrested three journalists for reporting on regime-imposed press restrictions. Since seizing power in 2022, the military junta, under the leadership of Ibrahim Traoré, has targeted independent media by detaining reporters, forcing critics into exile, abusing emergency laws to suppress dissent, and using financial repression to disrupt independent funding. Journalists disappear under the guise of forced conscription, international coverage of military abuses is blocked, and outlets that report on crimes against humanity are eradicated. With press freedom in ashes, Burkinabés face an information blackout where state propaganda proliferates. In these contexts, open and uncensorable protocols like nostr can serve as a digital town square where information, value, and assembly flow undisturbed by the reach of oppressive regimes.
Tunisia | Saied Sacks Prime Minister as Economy Crumbles
Tunisian President Kais Saied dismissed Prime Minister Kamel Maddouri less than a year into his term and replaced him with Sara Zaafarani, Tunisia’s third prime minister in under two years. As Saied reshuffles his cabinet to best suit his interests and goals, Tunisia’s economy has reached a standstill. Growth is running below 1.5%, the cost of living continues to climb, and shortages of staple goods like rice, sugar, and coffee burden the everyday lives of Tunisians. After staging a coup, dissolving the government, and ruling by decree, Saied’s consolidation of power has come inch by inch with the erosion of democracy and financial stability.
BITCOIN AND FREEDOM TECH NEWS
Breez | Releases New Open-Source Bitcoin Wallet
Breez, a company helping build out the Bitcoin Lightning economy, released a new open-source Bitcoin wallet called “Misty Breez.” It is a hybrid Lightning and Liquid Network wallet built using the Nodeless Breez SDK. The wallet offers fast and private transactions without the complexities of payment channel management. The tradeoff? Trusting the Liquid Federation with custody of your Bitcoin. Still, Misty Breez supports many Bitcoin and Lightning features, including on-chain payments, Lightning addresses, BOLT 12 invoices, and offline receiving. So, while the wallet is a trust-minimized solution rather than fully custodial, users gain a wide range of use cases and features unique to this wallet. This could make Misty Breez useful for people facing financial surveillance, internet outages, or authoritarian-imposed financial restrictions. Learn more about the wallet here.
OpenCash | Bounty for Open Source Cashu x BTCPay Server Plugin
The OpenCash Association is offering a two million satoshi bounty for an open-source plugin allowing merchants to accept Cashu payments through BTCPay Server. Cashu is a Bitcoin-based ecash protocol designed to offer fast, low-cost, and very private transactions. For activists and dissidents, ecash enables payments without compromising financial privacy, but they must trust the mints (entities managing the system) to custody their funds. OpenCash specified that the Cashu plugin must integrate cleanly with BTCPay Server and include an input field for ecash redemption or a scannable Cashu payment request. If claimed, this bounty and subsequent integration will help advance Bitcoin’s medium of exchange capabilities and make private payments more accessible by integrating with self-hosted, independent Bitcoin payment infrastructure. Learn more about the bounty here.
Machankura | Adds Support for Offline Bitcoin Transactions in Uganda
Machankura, a custodial Bitcoin Lightning wallet that helps Africans access Bitcoin without the Internet, announced they expanded service to Uganda, enabling Ugandans to use Bitcoin without an Internet connection. To do so, Machankura leverages the Unstructured Supplementary Service Data (USSD) protocol for sending text messages. To use the service, users simply dial a designated number on a feature phone (or a smartphone without data) and can access the Bitcoin network in countries like Nigeria, Malawi, Zambia, and now Uganda. Machankura helps democratize Bitcoin access, expands censorship-resistant money across Africa, and offers a practical solution to financial inclusion. If you’re in Uganda or another supported country, try it here.
Zeus Wallet | Plans to Introduce Cashu Support
Zeus, a leading self-custodial mobile Lightning wallet, shared plans for a future Cashu integration. Cashu is an ecash protocol for Bitcoin. It enables practical everyday payments on Bitcoin that are private by design (but users must trust mints to manage their funds). By adding ecash support, Zeus can expand the accessibility of private Bitcoin payments and provide its users with greater flexibility over their financial activity. As part of its upcoming release, the wallet also introduces two new types of addresses: Zaplocker addresses for Lightning self-custody on mobile and Nostr Wallet Connect (NWC) addresses for remote node runners. While a little more technical, these integrations will improve individuals' ability to transact without exposing their financial history, reducing surveillance risks, especially for those living under authoritarian regimes or in jurisdictions with strict financial controls.
Bitcoin Thailand Festival | Half-Marathon to Challenge Financial Repression
The Thai city of Chiang Mai will host the nation’s inaugural Bitcoin Half Marathon and Bitcoin Thailand Festival from Nov. 1-2, 2025, under the theme “Run For Freedom.” The marathon’s theme contrasts Thailand’s increasing financial repression and long history of erasing dissent. Even still, the festival’s mission to advance financial freedom and financial literacy with participation from the local Bitcoin community comes at a pressing time. The Thai government is increasingly restricting financial freedoms through digital cash handouts, which, for all intents and purposes, function as a central bank digital currency that imposes spending restrictions and expiration dates on money. In these environments, Bitcoin education and awareness are more urgent than ever.
Btrust Builders | Announces Builders Pathways
Btrust Builders introduced Btrust Builders Pathways, a new program designed to equip African developers with the skills and experience needed to contribute to Bitcoin open-source software. The initiative offers five learning tracks, from beginner-friendly Bitcoin fundamentals to advanced Rust programming and Bitcoin Core development. Participants will gain hands-on experience, mentorship, and access to potential funding via Btrust Developer Grants. With this launch, Btrust Builders continues its mission to grow Africa’s Bitcoin development talent and strengthen the software’s ecosystem in a region where many suffer under dozens of authoritarian governments.
RECOMMENDED CONTENT
How Bitcoin Fights Corruption & Injustice with Evan Mawarire
In the latest edition of the HRF x Pubkey Freedom Tech Series, HRF’s Content & Research lead Ayelen Osorio sits down with Zimbabwean pastor-turned-activist Evan Mawarire to explore how Bitcoin can serve as a tool for fighting inflation, corruption, and injustice. Together, they unpack Mawarire’s personal journey of leading a peaceful uprising against the tyranny of Robert Mugabe and the hyperinflation he unleashed on his undeserving population. Mawarire details how Zimbabwe’s economic collapse became an orchestrated strategy to control and silence Zimbabweans. He further explains how the peaceful movement galvanized a generation, why financial repression is a central pillar of authoritarianism, and how Bitcoin offers ordinary citizens a way to resist and rebuild. Catch the full conversation here.
MIT Bitcoin Expo Livestream
Last week, software developers, human rights activists, students, and researchers gathered at the Massachusetts Institute of Technology (MIT) for the 12th annual MIT Bitcoin Expo — this year in partnership with HRF — to explore how Bitcoin and freedom technologies can defend civil liberties and empower individuals, especially under authoritarian regimes. Born from MIT’s 2014 Bitcoin Project, the expo has grown into a major forum for individual liberation, with panels, workshops, and hackathons centered on privacy, financial autonomy, and decentralized protocols. Tune into the livestream recording to catch the speakers, presentations, and panels that defined the event.
If this article was forwarded to you and you enjoyed reading it, please consider subscribing to the Financial Freedom Report here.
Support the newsletter by donating bitcoin to HRF’s Financial Freedom program via BTCPay.\ Want to contribute to the newsletter? Submit tips, stories, news, and ideas by emailing us at ffreport @ hrf.org
The Bitcoin Development Fund (BDF) is accepting grant proposals on an ongoing basis. The Bitcoin Development Fund is looking to support Bitcoin developers, community builders, and educators. Submit proposals here.
-
@ fbf0e434:e1be6a39
2025-04-10 14:13:23Hackathon 概要
由 Flare 与 Google Cloud 合作举办的 Flare x Google Verifiable AI 线上黑客松&线下黑客松 于 2025 年 3 月同期举行,聚焦可验证自主 AI 应用开发,推动区块链与人工智能技术的深度融合。提交项目涵盖 Social AI Agent、RAG Knowledge、AI x DeFi(DeFAI)和 Consensus Learning 四大核心类别。依托 Google Cloud 机密计算与 Flare 预言机技术,为数据密集型 AI 应用提供安全可信的链上链下协同支持,同时通过线上辅导、技术研讨会及与伯克利大学、DoraHacks 等机构合作,助力开发者实现技术落地
所有获奖者由 Flare 联合创始人 Hugo Philion、Google Cloud 代表 Ross Nicoll 等行业专家组成的评审团评定。线上黑客松于 3 月 7 日至 14 日开展,总奖池 40,000 美元,吸引了 358 名开发者参与,最终提交审核通过了 46 个的创新项目。线下黑客松于 3 月 7 日至 9 日在加州伯克利大学举办,总奖池 60,000 美元,共有 105 位开发者现场参与,提交了 24 个项目。
此次黑客松通过技术整合验证了 AI 代理在去中心化场景中的可信运行机制,为 DeFAI、隐私计算等领域提供实践案例,同时构建产学研一体化平台,加速区块链与 AI 技术的跨领域应用,标志着两大技术在去中心化生态中的深度协同进入新阶段。
线上黑客松获奖者
Social AI Agent 奖项获得者
-
ScribeChain - 该项目利用AI将X Spaces中的实时音频转换为简明的文字摘要,帮助有效的信息处理。
-
Gosenica je lezla - Telegram 机器人,使用 RAG 数据库分离代码/文档,用于 Flare 文档查询和代码示例生成。
-
Flarebot - Flare 的 AI 驱动 Telegram 机器人,提供 DeFi 分析,通过 FTSOv2 和 Gemini 模型进行代币价格/TVL 跟踪。
RAG Knowledge 奖项获得者
-
Decentralized Trusted AI - 引入去中心化区块链系统以验证 AI 生成的响应,从而增强对 AI 输出的信任。
-
chaincontext - 可验证知识系统,将 FTSO 数据、区块链状态和 RAG 合并在 TEE 中,以进行透明的信任评估。
AI x DeFi (DeFAI) 奖项获得者
-
Quince Finance - 该项目结合了由 AI 驱动的聊天机器人和 Google Cloud 于 Flare 上的 DeFi 网页应用中,专注于提高用户安全和访问。
-
Flare DeFAI - 在 TEE 中提供安全的 AI 助手,使用自然语言进行 DeFi 操作并在 Flare 上进行智能合约风险评估。
-
Flare Sense - 使用实时监控、RAG 和 Telegram 警报检测风险并建议解决方案的 DeFi 安全代理。
Consensus Learning 奖项获得者
-
DemistiFI - 在自动钱包管理中利用 AI 代理,并采用共识学习来实现一致、可靠的交易。
-
Flava AI - 构想 Flare 网络与爬虫、分块器和嵌入器组件进行交互的智能 RAG 和共识机制。
-
Forecaster - 多模型共识平台,通过信心评分和技术分析提高市场预测,以便更好地进行投资决策。
有关这些项目的更多信息,请访问 DoraHacks。
线下黑客松获奖者
Social AI Agent 奖项获奖者
1st Place:
- Flare Fact Checker - 开发了一种基于 AI 的事实检查工具,利用可信执行环境中的验证节点验证社交媒体上的科学声明。
2nd Place:
- FlareBot - 一个 Discord 机器人,为 Flare 社区提供 24/7 支持,具有实时数据检索和可定制的安全过滤器。
3rd Place:
- Flara - 为开发者关系自动化社交媒体互动提供 AI 代理,结合 Gemini-2.0-Pro 模型和可信执行环境确保自主性验证。
RAG Knowledge 奖项获奖者
1st Place:
- Command Flare - 为 DeFi 提供自然语言 AI 界面,使用新颖的图形和向量方法在安全环境中增强交易和查询。
2nd Place:
- 2DeFi - 通过为传统金融用户提供个性化投资策略和 AI 分析,简化在 Flare 区块链上的 DeFi 访问。
3rd Place:
- ragstoriches - 提供抓取、解析和组织区块链数据的工具,以提高分析和响应准确性。
AI x DeFi (DeFAI) 奖项获奖者
1st Place:
- 2DeFi (同时获得 RAG Knowledge 类别的奖项)
2nd Place:
- Voice To Flare - 促进在 Flare 区块链上的安全、多语言区块链交易,借助 AI 增强。
3rd Place:
- Solar v1 - 一个 AI 驱动的 DeFi 助手,通过高级分析和自动化增强在 Flare Network 上的互动。
Consensus Learning 奖项获奖者
1st Place:
- NFT Deep Appraisal - 使用共识学习结合 AI 评估 NFT 价值,结合数据分析和一致性验证。
2nd Place:
- mikey-codebase - 实施了一种合奏 LLM 响应聚合器,包括评估模型影响的 Shapley 估计。
3rd Place:
- Command Flare (也在 RAG Knowledge 类别中获得名次)
欲了解完整的项目列表和更多信息,请访问 DoraHacks。
关于组织者
Flare
Flare 是一家专注于推动区块链解决方案和智能合约应用的技术组织。Flare 以将以太坊虚拟机集成到更广泛的区块链生态系统中而闻名,实现跨链互操作性。Flare Network 是该公司的一个著名开发项目,通过促进各种网络之间的无缝交易,增强数字资产的实用性。Flare 继续扩展去中心化技术能力,推动创新和更广泛的区块链采用。
-
-
@ fbf0e434:e1be6a39
2025-04-10 14:00:14Hackathon 概要
HackSecret 5 展示了在去中心化机密计算中的创新,共吸引了 142 位开发者参与并提交了 53 个项目。此 Hackathon 利用 Secret Network 的特性推进了在 Cosmos、EVM 和 Solana 等区块链平台上的机密 AI 应用。
参与者探索了四个主要方向:Secret AI 应用、Autonomys Network dApps、跨链 dApps 和原生 Secret Network dApps。值得注意的项目包括利用 Secret AI SDK 的 AI 驱动法律助理和私密健康咨询平台。
此次 Hackathon 亮点在于通过 Secret Network 增强安全通信和存储的应用。例如,一个去中心化的 AI 人才市场和机密 AI 写作助手,都关注于去中心化应用中的隐私和数据机密性。
总奖池为 15,000 美元,表彰了项目的技术复杂性、创新性和可能的实际应用。HackSecret 5 促进了跨领域合作并激发了对去中心化应用的兴趣。
Hackathon 获奖者
Secret AI dApps 奖项获奖者
此类别表彰了创新利用 Secret Network 的 Secret AI SDK 的 dApps。
- Sentinex: 一个通过 AI 驱动的合约审计和机密分析增强 DeFi 安全的多代理平台,利用 Secret SDK 和 Autonomys 代理进行安全的代币推出和智能合约审计。
- Secret AI Accountant System: 通过结合 Confidential Computing 和 Secret Network 的 AI 安全管理商业账簿,以实现透明的审计过程。
- JS SDK for Secret AI: 通过简单的 JavaScript API 轻松将 Secret Confidential AI 模型集成到 Web 应用中。
- Conflux-AI: 一个去中心化平台,通过联合学习和智能合约实现隐私感知的协同交易及全球模型聚合。
- DocAssist: 通过 AI 洞察安全管理患者数据,利用 Secret AI SDK 支持医生。
- codeforgeai: 促进 AI 与区块链的协作编码开发工具生态系统,提供像 CodeForge CLI 这样的工具。
- Secret AI Writer: 一个确保内容隐私的 AI 写作平台,通过 Secret Network 的智能合约和端到端加密实现。
- autonomous-copilot: 结合 AI 和去中心化存储的安全数据分析数据管理工具。
- SecureChat AI: 提供 AI 驱动的加密聊天,确保跨设备的安全通信。
Native Secret dApps 奖项获奖者
此类别强调了构建于 Secret Network 上的 dApps,注重默认隐私机制。
- Unchained Poker: 一个使用秘密合约解决信任问题的去中心化扑克平台,提供统计分析和语音聊天以增强安全性。
- HabiChain: 部署区块链用于安全的心理健康支持,利用功能行为分析提供个性化工具,同时保护隐私。
使用 Autonomys Agents Framework 的不可阻挡 AI 代理奖项获奖者
此类别表彰了使用 Autonomys Agents Framework 开发具有可验证链上记忆 AI 代理的项目。
- AgentMint.AI: 自动化跨区块链的 AI 驱动 meme 币创建和管理,集成社交媒体工具。
- Aetherlink: 实现 ai3:// 协议以标准化内容访问和发现于去中心化网络中。
- Pixel Lock: 使用 Auto Drive 提供安全图像存储解决方案,保护数据隐私,消除未经授权访问风险。
- Conflux-AI
Autonomys Track 2: 使用 Auto Drive 构建 - 永久去中心化存储奖项获奖者
此方向寻求利用 Auto Drive 的数据持久性和安全性解决方案,超越传统的固定方法。
- autonomous-copilot
- Decentralized Collaborative File Repository (DCFR): 基于 DAO 的文件管理,通过去中心化存储和治理协议提供民主控制和透明操作。
有关所有 hackathon 项目的更多信息,请访问 HackSecret 5 Projects。
关于组织者
Secret Network
Secret Network 是一个通过 Intel SGX 技术、加密和密钥管理实现隐私功能的区块链平台。它支持可扩展的、无需许可的智能合约,默认设计了隐私功能,支持独特的区块链应用。Secret Network 于 2020 年 9 月在其主网上推出了私密智能合约,确立了其在隐私导向区块链开发中的角色。该组织持续探索隐私在区块链技术中的创新应用。
-
@ 7e538978:a5987ab6
2025-04-10 13:14:04After five years and over 6,000 commits, LNbits has reached a momentous milestone: Version 1.0.0 is here. LNbits is officially out of beta!
This release represents the five years relentless development, dedication, bug-hunting, feature-building, and community involvement. What started as a lightweight Lightning wallet application for Lightning Network payments has evolved into one of the most versatile, modular, and widely-used Bitcoin tools in the space.
We want to offer a heartfelt thank you to every contributor, developer, tester, and user—from those running LNbits for personal use to the communities and businesses who rely on it every day. Your feedback, bug reports, feature requests, and support have made LNbits what it is today.
🚀 Key Highlights in v1.0.0
- LNbits now at v1.0.0 – the software is stable, hardened, and production-ready.
- Vue 3 migration – a complete frontend overhaul for performance and long-term maintainability.
- WebSocket payments – faster and more efficient, replacing older SSE and long-polling methods.
- New lnbits.sh install script – simplifies setup and local deployment.
- Access Control Lists (ACL) – token-based permissions for powerful role and scope control.
- Admin tools:
- Admin payments overview
- Toggle outgoing payments
- View payments from deleted wallets
- NWC (Nostr Wallet Connect) support
- Login with Nostr or OAuth – expanding integration and authentication options
💱 Fiat & Exchange Upgrades
- Custom exchange providers
- Improved fiat precision
- Wallet-level fiat tracking and labels
- Support for Bitpay and Yadio fiat rate providers
🧑🎨 UI / UX Improvements New Login/Register interface
- Default theme for new users
- Custom background images
- Visual refresh with new themes (including neon and light/dark modes)
- Revamped Pay Invoice dialog and invoice creation
- Custom wallet icons/colours
- CSV export and in-wallet payment filtering
🛠️ Developer Tools & Internal Enhancements Migration to pyjwt, updated to breez-sdk 0.6.6, pyln-client 24.5
- Support for Python 3.10–3.13
- New nodemanager for managing Lightning channels
- Backend refactors, improved database handling, type hinting, and extension logic
- More robust testing and CI support
🩹 Maintenance & Fixes Persistent fix for admin removal bug
- Improved extension handling
- Bug fixes across wallet logic, funding sources, and legacy compatibility
- Dozens of improvements to reliability, performance, and developer experience
🎉 A Huge Thank You
To every developer, translator, tester, UX contributor, node runner, and user: thank you.
LNbits wouldn’t be what it is without your involvement. Whether you've written code, opened issues, translated labels, or simply used it and given feedback—this release is yours too.
Here's to the next chapter!
-
@ 7d33ba57:1b82db35
2025-04-10 11:09:40Tucked into Italy’s far northeastern corner, Trieste feels like a place where cultures meet and stories linger. With Austro-Hungarian architecture, Adriatic views, literary cafés, and a unique Central European flair, it’s Italy—but not quite like the Italy you know. Bordering Slovenia and once the seaport of an empire, Trieste is full of quiet charm and timeless elegance.
🌟 Top Things to Do in Trieste
1️⃣ Piazza Unità d’Italia
- One of Europe’s largest sea-facing squares
- Surrounded by grand buildings and open to the Adriatic—sunsets here are magical
- Great spot to sit at a café and people-watch
2️⃣ Castello di Miramare
- A fairy-tale white castle perched over the sea, built for Archduke Ferdinand Maximilian
- Explore the ornate interiors and stroll the surrounding park with sea views
- A short bus or bike ride from the city
3️⃣ Canal Grande & Borgo Teresiano
- A small Venetian-style canal lined with cafés, bridges, and boats
- At its end, you’ll find the neoclassical Sant’Antonio Nuovo church
- The area is perfect for evening walks and aperitivo
4️⃣ Caffè Culture & James Joyce Trail ☕📖
- Trieste has a legendary café scene—literary, elegant, and historic
- Visit Caffè San Marco or Caffè degli Specchi
- Follow the trail of James Joyce, who lived here for over a decade
5️⃣ Barcola Promenade
- A local favorite for seafront walks, swimming, and sunbathing
- Bring a towel, grab a gelato, and relax like a true Triestino
- Especially lively in summer
🏛️ Also Worth a Visit
- Teatro Romano – A well-preserved Roman theater right in the city center
- Castello di San Giusto & Cathedral – Hilltop views and Roman ruins nearby
- Risiera di San Sabba – A sobering WWII concentration camp memorial site
🍝 What to Eat in Trieste
- Jota – A hearty stew of sauerkraut, beans, and potatoes (Slavic roots!)
- Seafood everything – Fresh Adriatic catch, especially scampi and sardoni
- Strudel, goulash, and schnitzel – Trieste’s menu mixes Italian and Mitteleuropean
- Pair with local wines like Vitovska or a crisp Malvasia
🎯 Tips for Travelers
✅ Trieste is walkable and elegant—bring comfy shoes for those marble pavements
✅ Great base for day trips to Miramare Castle, Grotta Gigante, or even Ljubljana and Piran
✅ Try the osmize in the surrounding hills—rustic, family-run wine farms that open to the public
✅ Slovenian and Croatian borders are right nearby—Trieste is a crossroads city -
@ 20986fb8:cdac21b3
2025-04-10 08:59:38社交应用正迎来全新阶段:从传统的中心化平台迈向去中心化生态,用户对轻量级、智能化和隐私保护的应用需求与日俱增。在这一趋势下,Mini Apps 凭借其快速开发、灵活部署和去中心化的特性,正在成为社交应用的主流选择。加密货币支付的兴起进一步推动了这一趋势,其低成本、无国界和金融自由的优势,不仅大幅降低了交易门槛,还为 Mini Apps 的规模化发展注入了强劲动力。作为比特币生态 Nostr 协议上最受欢迎的去中心化社交支付客户端之一,YakiHonne 凭借卓越的用户体验和便捷的社交支付功能,覆盖全球 170 多个国家。如今,YakiHonne 即将推出可编程 Smart Widgets——一款支持 Mini Apps 的开发者组件。这款产品将重新定义用户在社交平台上的互动与消费方式,为链上应用生态和社交支付带来全新活力。
YakiHonne Smart Widgets:社交与消费的创新引擎
YakiHonne Smart Widgets 是一款融入社交动态的可编程微型应用,让用户在浏览内容时就能轻松完成链上支付、互动和操作。它不仅是一款工具,更是一个开放的去中心化应用市场,为用户和开发者带来无限创造力与灵活性。
Smart Widgets 提供三种简单易用的创建方式,满足不同用户的需求:
- 基础组件(Basic Widgets):任何用户都能通过直观编辑器快速创建,只需选择模板、输入内容,就能生成打赏、Mint 或投票等互动功能。用户在浏览动态时,点击按钮即可完成链上操作,体验快速、无需跳转。
- 动作组件(ActionWidgets):用户可通过嵌入应用链接快速创建,无需开发经验。普通用户点击动态中的按钮,就能直接在当前界面访问外部去中心化应用(如交易所),享受顺畅不中断的体验。
- 工具组件(Tool Widgets-Mini App):适合有开发能力的用户或开发者,通过 Smart Widgets SDK 打造功能更丰富的应用,支持复杂链上操作。用户在社交动态中即可完成数据查询、链上任务、游戏互动或即时支付,体验高度集成且流畅。
主要特性:
- 快速构建:开发者仅需数小时即可将创意变为现实,支持常用 Web 技术,打造接近原生应用的体验,无需繁琐的应用商店审核。
- 社交登录:用户无需账号密码即可进入 Mini Apps,直接使用 Nostr/YakiHonne 身份在动态中互动,流程简单,社交体验更紧密。
- 易于发现与留存:通过动态 feeds 一键发现新应用,内置裂变机制助力快速传播,Mini App 商店提供更多选择,用户可保存喜爱应用并通过通知随时回归。
- 即时互动与消费:Mini Apps 通过 YakiHonne 的社交支付功能基础设施实现无缝集成,用户无需离开动态即可完成支付、投票或游戏等操作。社交互动与链上行为自然融合,消费体验轻松融入每一次互动场景。
改变日常体验:Smart Widgets 的多场景应用
YakiHonne Smart Widgets 将社交互动与链上消费深度结合,为用户带来多样化的应用场景:
- 链上互动:用户在浏览动态时,可通过 Smart Widgets 参与链上投票或轻量游戏。例如,一键完成社区提案投票,或与好友挑战链上小游戏,互动即刻完成,无需跳转。
- 智能 Agent:用户可使用 Agent Widgets 自动创作并发布内容,例如生成个性化帖子或短视频,打造 AI 驱动的新型媒体体验。
- DAO 治理:基于aMACI创建匿名投票,结合 Agent 实现自主治理。用户直接在社交动态中参与 DAO 决策,推动去中心化社区发展。
- 社交支付:用户可通过动态发送即时支付或链上红包,例如分享一笔小额打赏,激发好友互动与消费转化。
- 订阅服务:支持内容创作者或应用的连续订阅,用户一键订阅喜爱的服务,享受无缝续费体验。
这些场景不仅提升了用户的参与感和便利性,还为创作者、开发者及社区提供了新的增长机会。
引领新趋势:Smart Widgets 的生态价值
YakiHonne Smart Widgets 的推出将为链上消费应用生态和社交支付带来深远影响。它为开发者提供了一个开放的舞台,任何人都可以通过 Widgets 快速部署创新应用,丰富 YakiHonne 的生态多样性。YakiHonne 的社交支付功能基础设施进一步为 Mini Apps 赋能,提供高效的支付支持,降低了开发者的支付集成成本,同时为用户带来安全、便捷的交易体验。这种支持不仅加速了 Mini Apps 的商业化进程,还推动了链上消费的规模化增长。
对于用户而言,Smart Widgets 将社交互动与消费行为融为一体,创造更具沉浸感和实用性的数字体验。对于内容创作者和社区,它则提供了一个低门槛的链上入口,助力其触达全球用户。这一产品不仅是对技术边界的探索,更是对未来去中心化生活方式的预演。YakiHonne 致力于通过 Smart Widgets 构建一个开放、活跃的社交与消费生态,让每一次互动都成为链上价值流动的起点。
立即体验:Smart Widgets 等你探索
YakiHonne 诚邀全球用户和开发者共同参与这一激动人心的旅程。开发者可申请加入 Smart Widgets SDK 测试计划,开发属于自己的 Mini Apps,与 YakiHonne 的全球用户群共享成果。用户则可关注 YakiHonne 官方渠道(X或下载YakiHonne iOS/Android),体验链上互动与社交支付的全新可能。
-
@ 3b3a42d3:d192e325
2025-04-10 08:57:51Atomic Signature Swaps (ASS) over Nostr is a protocol for atomically exchanging Schnorr signatures using Nostr events for orchestration. This new primitive enables multiple interesting applications like:
- Getting paid to publish specific Nostr events
- Issuing automatic payment receipts
- Contract signing in exchange for payment
- P2P asset exchanges
- Trading and enforcement of asset option contracts
- Payment in exchange for Nostr-based credentials or access tokens
- Exchanging GMs 🌞
It only requires that (i) the involved signatures be Schnorr signatures using the secp256k1 curve and that (ii) at least one of those signatures be accessible to both parties. These requirements are naturally met by Nostr events (published to relays), Taproot transactions (published to the mempool and later to the blockchain), and Cashu payments (using mints that support NUT-07, allowing any pair of these signatures to be swapped atomically.
How the Cryptographic Magic Works 🪄
This is a Schnorr signature
(Zₓ, s)
:s = z + H(Zₓ || P || m)⋅k
If you haven't seen it before, don't worry, neither did I until three weeks ago.
The signature scalar s is the the value a signer with private key
k
(and public keyP = k⋅G
) must calculate to prove his commitment over the messagem
given a randomly generated noncez
(Zₓ
is just the x-coordinate of the public pointZ = z⋅G
).H
is a hash function (sha256 with the tag "BIP0340/challenge" when dealing with BIP340),||
just means to concatenate andG
is the generator point of the elliptic curve, used to derive public values from private ones.Now that you understand what this equation means, let's just rename
z = r + t
. We can do that,z
is just a randomly generated number that can be represented as the sum of two other numbers. It also follows thatz⋅G = r⋅G + t⋅G ⇔ Z = R + T
. Putting it all back into the definition of a Schnorr signature we get:s = (r + t) + H((R + T)ₓ || P || m)⋅k
Which is the same as:
s = sₐ + t
wheresₐ = r + H((R + T)ₓ || P || m)⋅k
sₐ
is what we call the adaptor signature scalar) and t is the secret.((R + T)ₓ, sₐ)
is an incomplete signature that just becomes valid by add the secret t to thesₐ
:s = sₐ + t
What is also important for our purposes is that by getting access to the valid signature s, one can also extract t from it by just subtracting
sₐ
:t = s - sₐ
The specific value of
t
depends on our choice of the public pointT
, sinceR
is just a public point derived from a randomly generated noncer
.So how do we choose
T
so that it requires the secret t to be the signature over a specific messagem'
by an specific public keyP'
? (without knowing the value oft
)Let's start with the definition of t as a valid Schnorr signature by P' over m':
t = r' + H(R'ₓ || P' || m')⋅k' ⇔ t⋅G = r'⋅G + H(R'ₓ || P' || m')⋅k'⋅G
That is the same as:
T = R' + H(R'ₓ || P' || m')⋅P'
Notice that in order to calculate the appropriate
T
that requirest
to be an specific signature scalar, we only need to know the public nonceR'
used to generate that signature.In summary: in order to atomically swap Schnorr signatures, one party
P'
must provide a public nonceR'
, while the other partyP
must provide an adaptor signature using that nonce:sₐ = r + H((R + T)ₓ || P || m)⋅k
whereT = R' + H(R'ₓ || P' || m')⋅P'
P'
(the nonce provider) can then add his own signature t to the adaptor signaturesₐ
in order to get a valid signature byP
, i.e.s = sₐ + t
. When he publishes this signature (as a Nostr event, Cashu transaction or Taproot transaction), it becomes accessible toP
that can now extract the signaturet
byP'
and also make use of it.Important considerations
A signature may not be useful at the end of the swap if it unlocks funds that have already been spent, or that are vulnerable to fee bidding wars.
When a swap involves a Taproot UTXO, it must always use a 2-of-2 multisig timelock to avoid those issues.
Cashu tokens do not require this measure when its signature is revealed first, because the mint won't reveal the other signature if they can't be successfully claimed, but they also require a 2-of-2 multisig timelock when its signature is only revealed last (what is unavoidable in cashu for cashu swaps).
For Nostr events, whoever receives the signature first needs to publish it to at least one relay that is accessible by the other party. This is a reasonable expectation in most cases, but may be an issue if the event kind involved is meant to be used privately.
How to Orchestrate the Swap over Nostr?
Before going into the specific event kinds, it is important to recognize what are the requirements they must meet and what are the concerns they must address. There are mainly three requirements:
- Both parties must agree on the messages they are going to sign
- One party must provide a public nonce
- The other party must provide an adaptor signature using that nonce
There is also a fundamental asymmetry in the roles of both parties, resulting in the following significant downsides for the party that generates the adaptor signature:
- NIP-07 and remote signers do not currently support the generation of adaptor signatures, so he must either insert his nsec in the client or use a fork of another signer
- There is an overhead of retrieving the completed signature containing the secret, either from the blockchain, mint endpoint or finding the appropriate relay
- There is risk he may not get his side of the deal if the other party only uses his signature privately, as I have already mentioned
- There is risk of losing funds by not extracting or using the signature before its timelock expires. The other party has no risk since his own signature won't be exposed by just not using the signature he received.
The protocol must meet all those requirements, allowing for some kind of role negotiation and while trying to reduce the necessary hops needed to complete the swap.
Swap Proposal Event (kind:455)
This event enables a proposer and his counterparty to agree on the specific messages whose signatures they intend to exchange. The
content
field is the following stringified JSON:{ "give": <signature spec (required)>, "take": <signature spec (required)>, "exp": <expiration timestamp (optional)>, "role": "<adaptor | nonce (optional)>", "description": "<Info about the proposal (optional)>", "nonce": "<Signature public nonce (optional)>", "enc_s": "<Encrypted signature scalar (optional)>" }
The field
role
indicates what the proposer will provide during the swap, either the nonce or the adaptor. When this optional field is not provided, the counterparty may decide whether he will send a nonce back in a Swap Nonce event or a Swap Adaptor event using thenonce
(optionally) provided by in the Swap Proposal in order to avoid one hop of interaction.The
enc_s
field may be used to store the encrypted scalar of the signature associated with thenonce
, since this information is necessary later when completing the adaptor signature received from the other party.A
signature spec
specifies thetype
and all necessary information for producing and verifying a given signature. In the case of signatures for Nostr events, it contain a template with all the fields, exceptpubkey
,id
andsig
:{ "type": "nostr", "template": { "kind": "<kind>" "content": "<content>" "tags": [ … ], "created_at": "<created_at>" } }
In the case of Cashu payments, a simplified
signature spec
just needs to specify the payment amount and an array of mints trusted by the proposer:{ "type": "cashu", "amount": "<amount>", "mint": ["<acceptable mint_url>", …] }
This works when the payer provides the adaptor signature, but it still needs to be extended to also work when the payer is the one receiving the adaptor signature. In the later case, the
signature spec
must also include atimelock
and the derived public keysY
of each Cashu Proof, but for now let's just ignore this situation. It should be mentioned that the mint must be trusted by both parties and also support Token state check (NUT-07) for revealing the completed adaptor signature and P2PK spending conditions (NUT-11) for the cryptographic scheme to work.The
tags
are:"p"
, the proposal counterparty's public key (required)"a"
, akind:30455
Swap Listing event or an application specific version of it (optional)
Forget about this Swap Listing event for now, I will get to it later...
Swap Nonce Event (kind:456) - Optional
This is an optional event for the Swap Proposal receiver to provide the public nonce of his signature when the proposal does not include a nonce or when he does not want to provide the adaptor signature due to the downsides previously mentioned. The
content
field is the following stringified JSON:{ "nonce": "<Signature public nonce>", "enc_s": "<Encrypted signature scalar (optional)>" }
And the
tags
must contain:"e"
, akind:455
Swap Proposal Event (required)"p"
, the counterparty's public key (required)
Swap Adaptor Event (kind:457)
The
content
field is the following stringified JSON:{ "adaptors": [ { "sa": "<Adaptor signature scalar>", "R": "<Signer's public nonce (including parity byte)>", "T": "<Adaptor point (including parity byte)>", "Y": "<Cashu proof derived public key (if applicable)>", }, …], "cashu": "<Cashu V4 token (if applicable)>" }
And the
tags
must contain:"e"
, akind:455
Swap Proposal Event (required)"p"
, the counterparty's public key (required)
Discoverability
The Swap Listing event previously mentioned as an optional tag in the Swap Proposal may be used to find an appropriate counterparty for a swap. It allows a user to announce what he wants to accomplish, what his requirements are and what is still open for negotiation.
Swap Listing Event (kind:30455)
The
content
field is the following stringified JSON:{ "description": "<Information about the listing (required)>", "give": <partial signature spec (optional)>, "take": <partial signature spec (optional)>, "examples: [<take signature spec>], // optional "exp": <expiration timestamp (optional)>, "role": "<adaptor | nonce (optional)>" }
The
description
field describes the restrictions on counterparties and signatures the user is willing to accept.A
partial signature spec
is an incompletesignature spec
used in Swap Proposal eventskind:455
where omitting fields signals that they are still open for negotiation.The
examples
field is an array ofsignature specs
the user would be willing totake
.The
tags
are:"d"
, a unique listing id (required)"s"
, the status of the listingdraft | open | closed
(required)"t"
, topics related to this listing (optional)"p"
, public keys to notify about the proposal (optional)
Application Specific Swap Listings
Since Swap Listings are still fairly generic, it is expected that specific use cases define new event kinds based on the generic listing. Those application specific swap listing would be easier to filter by clients and may impose restrictions and add new fields and/or tags. The following are some examples under development:
Sponsored Events
This listing is designed for users looking to promote content on the Nostr network, as well as for those who want to monetize their accounts by sharing curated sponsored content with their existing audiences.
It follows the same format as the generic Swap Listing event, but uses the
kind:30456
instead.The following new tags are included:
"k"
, event kind being sponsored (required)"title"
, campaign title (optional)
It is required that at least one
signature spec
(give
and/ortake
) must have"type": "nostr"
and also contain the following tag["sponsor", "<pubkey>", "<attestation>"]
with the sponsor's public key and his signature over the signature spec without the sponsor tag as his attestation. This last requirement enables clients to disclose and/or filter sponsored events.Asset Swaps
This listing is designed for users looking for counterparties to swap different assets that can be transferred using Schnorr signatures, like any unit of Cashu tokens, Bitcoin or other asset IOUs issued using Taproot.
It follows the same format as the generic Swap Listing event, but uses the
kind:30457
instead.It requires the following additional tags:
"t"
, asset pair to be swapped (e.g."btcusd"
)"t"
, asset being offered (e.g."btc"
)"t"
, accepted payment method (e.g."cashu"
,"taproot"
)
Swap Negotiation
From finding an appropriate Swap Listing to publishing a Swap Proposal, there may be some kind of negotiation between the involved parties, e.g. agreeing on the amount to be paid by one of the parties or the exact content of a Nostr event signed by the other party. There are many ways to accomplish that and clients may implement it as they see fit for their specific goals. Some suggestions are:
- Adding
kind:1111
Comments to the Swap Listing or an existing Swap Proposal - Exchanging tentative Swap Proposals back and forth until an agreement is reached
- Simple exchanges of DMs
- Out of band communication (e.g. Signal)
Work to be done
I've been refining this specification as I develop some proof-of-concept clients to experience its flaws and trade-offs in practice. I left the signature spec for Taproot signatures out of the current document as I still have to experiment with it. I will probably find some important orchestration issues related to dealing with
2-of-2 multisig timelocks
, which also affects Cashu transactions when spent last, that may require further adjustments to what was presented here.The main goal of this article is to find other people interested in this concept and willing to provide valuable feedback before a PR is opened in the NIPs repository for broader discussions.
References
- GM Swap- Nostr client for atomically exchanging GM notes. Live demo available here.
- Sig4Sats Script - A Typescript script demonstrating the swap of a Cashu payment for a signed Nostr event.
- Loudr- Nostr client under development for sponsoring the publication of Nostr events. Live demo available at loudr.me.
- Poelstra, A. (2017). Scriptless Scripts. Blockstream Research. https://github.com/BlockstreamResearch/scriptless-scripts
-
@ 20986fb8:cdac21b3
2025-04-10 08:52:37Social apps are entering a new era, evolving from traditional centralized platforms to decentralized ecosystems. Users increasingly demand lightweight, intelligent, and privacy-focused applications. In this shift, Mini Apps have emerged as a mainstream choice for social applications, thanks to their rapid development, flexible deployment, and decentralized nature. The rise of cryptocurrency payments has further fueled this trend, offering low-cost, borderless, and financially liberating solutions that significantly lower transaction barriers and drive the scalability of Mini Apps. As one of the most popular decentralized social payment clients on the Bitcoin ecosystem’s Nostr protocol, YakiHonne has earned a global reputation for its exceptional user experience and seamless social payment features, reaching over 170 countries. Now, YakiHonne is set to launch its programmable Smart Widgets—a developer toolkit for Mini Apps. This product will redefine how users interact and transact on social platforms, bringing fresh energy to the on-chain app ecosystem and social payments.
Smart Widgets: A Game-Changer for Social and On-Chain Consumption
YakiHonne Smart Widgets are programmable mini-apps embedded within social feeds, enabling users to effortlessly make on-chain payments, engage in interactions, and perform actions without leaving their content stream. More than just a tool, Smart Widgets serve as an open, decentralized app store, empowering both users and developers with unparalleled creativity and flexibility.
Smart Widgets come in three user-friendly formats to meet diverse needs:
- Basic Widgets: Anyone can create these using an intuitive editor—just pick a template, add content, and generate features like zap, minting, or voting. Users can interact with these actions directly in their feed with a single click, enjoying a fast, seamless experience.
- Action Widgets: Users can quickly create these by embedding app links, no coding required. With a single tap on a button in the feed, users can access external decentralized apps (like exchanges) right within the interface, ensuring a smooth, uninterrupted experience.
- Tool Widgets (Mini Apps): Designed for developers or users with coding skills, these are built using the Smart Widgets SDK to create more advanced apps with complex on-chain operations. Users can perform tasks like data queries, on-chain actions, gaming, or instant payments directly in their social feed, with a highly integrated and fluid experience.
Key Features:
- Rapid Development: Developers can turn ideas into reality in just hours, using familiar web technologies to create near-native app experiences—no lengthy app store reviews required.
- Social Login: Users can access Mini Apps without usernames or passwords, using their Nostr/YakiHonne identity to interact seamlessly within their social feed, making the experience more connected and effortless.
- Easy Discovery and Retention: With one-tap discovery through social feeds, built-in viral growth mechanics, and a Mini App store for more options, users can explore new apps effortlessly. They can save favorites and get notifications to return for more.
- Instant Interaction and Consumption: Mini Apps integrate seamlessly with YakiHonne’s social payment infrastructure, allowing users to pay, vote, or play games without leaving their feed. Social engagement and on-chain actions blend naturally, with consumption woven effortlessly into every interaction.
Transforming Daily Experiences: Smart Widgets in Action
YakiHonne Smart Widgets bridge social engagement and on-chain consumption, delivering a wide range of use cases: - On-Chain Interactions: While browsing their feed, users can join on-chain votes or play lightweight games through Smart Widgets—like casting a vote on a community proposal or challenging a friend to a quick game, all without leaving the app. - Smart Agents: Users can leverage Agent Widgets to auto-create and share content, such as personalized posts or short videos, powering an AI-driven media experience. - DAO Governance: Using aMACI for anonymous voting, combined with Agent Widgets for autonomous governance, users can participate in DAO decisions directly within their feed, fostering decentralized community growth. - Social Zap: Users can send small tips through their feed, like rewarding a friend’s post with an on-chain token, sparking more engagement and driving consumption. - Content Subscriptions: Support creators or apps with ongoing subscriptions—users can subscribe to their favorite services with one tap, enjoying a seamless renewal experience.
These scenarios not only boost user engagement and convenience but also open new growth opportunities for creators, developers, and communities.
Shaping the Future: The Ecosystem Impact of Smart Widgets
YakiHonne Smart Widgets are poised to transform the on-chain app ecosystem and social payments. They provide an open platform for developers, enabling anyone to deploy innovative apps quickly and enrich YakiHonne’s ecosystem. YakiHonne’s social payment infrastructure further empowers Mini Apps by offering efficient payment support, reducing integration costs for developers while ensuring a secure, seamless transaction experience for users. This support accelerates the commercialization of Mini Apps and fuels the growth of on-chain consumption.
For users, Smart Widgets seamlessly blend social interaction with consumption, creating an immersive and practical digital experience. For creators and communities, they offer a low-barrier entry to on-chain opportunities, helping them connect with a global audience. This product isn’t just a technological leap—it’s a glimpse into the future of decentralized lifestyles. YakiHonne is committed to building an open, vibrant social and consumption ecosystem through Smart Widgets, where every interaction sparks on-chain value.
Join the Future: Explore Smart Widgets Today
YakiHonne invites users and developers worldwide to join this exciting journey. Developers can apply to join the Smart Widgets SDK testing program, creating their own Mini Apps and tapping into YakiHonne’s global user base. Users can follow YakiHonne on official channels –X or download the YakiHonne iOS/Android app– to experience the next generation of on-chain interactions and social payments.
YakiHonne Programmable Smart Widgets are set to launch a new chapter for social and on-chain consumption. Let’s embrace this transformation together!
-
@ 57d1a264:69f1fee1
2025-04-10 05:54:45Some banners to promote ~Design territory in the Wild Web. Interested to kand feedback now your thought on it.
| Banner | Content | |---|---| |

| Stop scrolling, start stacking! Your #insights, your #stories, your #code – they have real #value. On #StackerNews #Design, we believe in rewarding #quality contents. Turn your #passion and #knowledge into #Bitcoin. Share your v#oice and get rewarded for it, join the conversation! Explore now: https://stacker.news/~Design/r/Design_r #Bitcoin #LightningNetwork #Community #ContentCreation #EarnBitcoin #Tech #SNdesign | |

| Stop scrolling, start flourishing! Your unique 3perspective, your groundbreaking #ideas, your niche #knowledge – it all has #value. On #StackerNews #Design we #reward you with #Bitcoin, instantly via the #LightningNetwork. Don't let your #insights fade into the #digital noise. Join a community that values #contribution, fuels #innovation, and puts the #power back in your #diamondhands (and #wallet!). Turn your thoughts into #zaps? Join the conversation: https://stacker.news/~Design/r/Design_r #Bitcoin #Lightning #Network #Community #EarnBitcoin #Tech #Design #Innovation #ContentCreation #Crypto | |

| Stop scrolling, #stack #sats for your #insights! #StackerNews #Design is where your #creative spark meets the #LightningNetwork. Discuss #ideas, share your #work, and #earn #Bitcoin for valuable contributions. Join a vibrant #community shaping the #future of #creativity and #tech, one #zap at a time. Explore the intersection of #innovation and #functionality https://stacker.news/~Design/r/Design_r #StackerNews #BitcoinDesign #DesignCommunity #Lightning #Network #UIDesign #UXDesign #Crypto #EarnBitcoin | |

| Stop scrolling, start stacking #sats! Talk #Design on #StackerNews – the platform where your #insights on #Tech, #Design, #Finance, #econ, #Food #DIY and more actually earn you real #Bitcoin via the #LightningNetwork. Join a vibrant #community, #discover diverse #perspectives, and #EarnBitcoin for sharing valuable content. Explore the #future of #contentCreation: https://stacker.news/~Design/r/Design_r #StackerNews #Lightning #Network #Crypto #Tech #Finance #Design #ContentCreator #GetPaidInBitcoin #SocialMedia #Community #BitconAccepted | |

| #StackerNews #Design is where your engagement actually #pays. #Earn #Bitcoin instantly via #zaps just for sharing great unique #content and joining #discussions on everything from #innovative #tech to #creative #ideas. Discover diverse #opinion, connect with a #community, start #earning. Join the #future of content: https://stacker.news/~Design/r/Design_r #LightningNetwork #EarnBitcoin #CryptoCommunity #ContentCreators #StackerNews #Decentralized #SocialMedia |
originally posted at https://stacker.news/items/939548
-
@ c1e9ab3a:9cb56b43
2025-04-10 02:55:11The United States is on the cusp of a historic technological renaissance, often referred to as the Fourth Industrial Revolution. Artificial intelligence, automation, advanced robotics, quantum computing, biotechnology, and clean manufacturing are converging into a seismic shift that will redefine how we live, work, and relate to one another. But there's a critical catch: this transformation depends entirely on the availability of stable, abundant, and inexpensive electricity.
Why Electricity is the Keystone of Innovation
Let’s start with something basic but often overlooked. Every industrial revolution has had an energy driver:
- The First rode the steam engine, powered by coal.
- The Second was electrified through centralized power plants.
- The Third harnessed computing and the internet.
- The Fourth will demand energy on a scale and reliability never seen before.
Imagine a city where thousands of small factories run 24/7 with robotics and AI doing precision manufacturing. Imagine a national network of autonomous vehicles, delivery drones, urban vertical farms, and high-bandwidth communication systems. All of this requires uninterrupted and inexpensive power.
Without it? Costs balloon. Innovation stalls. Investment leaves. And America risks becoming a second-tier economic power in a multipolar world.
So here’s the thesis: If we want to lead the Fourth Industrial Revolution, we must first lead in energy. And nuclear — specifically Gen IV Small Modular Reactors (SMRs) — must be part of that leadership.
The Nuclear Case: Clean, Scalable, Strategic
Let’s debunk the myth: nuclear is not the boogeyman of the 1970s. It’s one of the safest, cleanest, and most energy-dense sources we have.
But traditional nuclear has problems:
- Too expensive to build.
- Too long to license.
- Too bespoke and complex.
Enter Gen IV SMRs:
- Factory-built and transportable.
- Passively safe with walk-away safety designs.
- Scalable in 50–300 MWe increments.
- Ideal for remote areas, industrial parks, and military bases.
But even SMRs will struggle under the current regulatory, economic, and manufacturing ecosystem. To unlock their potential, we need a new national approach.
The Argument for National Strategy
Let’s paint a vision:
SMRs deployed at military bases across the country, secured by trained personnel, powering critical infrastructure, and feeding clean, carbon-free power back into surrounding communities.
SMRs operated by public chartered utilities—not for Wall Street profits, but for stability, security, and public good.
SMRs manufactured by a competitive ecosystem of certified vendors, just like aircraft or medical devices, with standard parts and rapid regulatory approval.
This isn't science fiction. It's a plausible, powerful model. Here’s how we do it.
Step 1: Treat SMRs as a National Security Asset
Why does the Department of Defense spend billions to secure oil convoys and build fuel depots across the world, but not invest in nuclear microgrids that would make forward bases self-sufficient for decades?
Nuclear power is inherently a strategic asset:
- Immune to price shocks.
- Hard to sabotage.
- Decades of stable power from a small footprint.
It’s time to reframe SMRs from an energy project to a national security platform. That changes everything.
Step 2: Create Public-Chartered Operating Companies
We don’t need another corporate monopoly or Wall Street scheme. Instead, let’s charter SMR utilities the way we chartered the TVA or the Postal Service:
- Low-margin, mission-oriented.
- Publicly accountable.
- Able to sign long-term contracts with DOD, DOE, or regional utilities.
These organizations won’t chase quarterly profits. They’ll chase uptime, grid stability, and national resilience.
Step 3: Build a Competitive SMR Industry Like Aerospace
Imagine multiple manufacturers building SMRs to common, certified standards. Components sourced from a wide supplier base. Designs evolving year over year, with upgrades like software and avionics do.
This is how we build:
- Safer reactors
- Cheaper units
- Modular designs
- A real export industry
Airplanes are safe, affordable, and efficient because of scale and standardization. We can do the same with reactors.
Step 4: Anchor SMRs to the Coming Fourth Industrial Revolution
AI, robotics, and distributed manufacturing don’t need fossil fuels. They need cheap, clean, continuous electricity.
- AI datacenters
- Robotic agriculture
- Carbon-free steel and cement
- Direct air capture
- Electric industrial transport
SMRs enable this future. And they decentralize power, both literally and economically. That means jobs in every region, not just coastal tech hubs.
Step 5: Pair Energy Sovereignty with Economic Reform
Here’s the big leap: what if this new energy architecture was tied to a transparent, auditable, and sovereign monetary system?
- Public utilities priced in a new digital dollar.
- Trade policy balanced by low-carbon energy exports.
- Public accounting verified with open ledgers.
This is not just national security. It’s monetary resilience.
The world is moving to multi-polar trade systems. Energy exports and energy reliability will define economic influence. If America leads with SMRs, we lead the conversation.
Conclusion: A Moral and Strategic Imperative
We can either:
- Let outdated fears and bureaucracy stall the future, or...
- Build the infrastructure for clean, secure, and sovereign prosperity.
We have the designs.
We have the talent.
We have the need.What we need now is will.
The Fourth Industrial Revolution will either be powered by us—or by someone else. Let’s make sure America leads. And let’s do it with SMRs, public charter, competitive industry, and national purpose.
It’s time.
This is a call to engineers, legislators, veterans, economists, and every American who believes in building again. SMRs are not just about power. They are about sovereignty, security, and shared prosperity.
Further reading:
nostr:naddr1qqgrjv33xenx2drpve3kxvrp8quxgqgcwaehxw309anxjmr5v4ezumn0wd68ytnhd9hx2tczyrq7n2e62632km9yh6l5f6nykt76gzkxxy0gs6agddr9y95uk445xqcyqqq823cdzc99s
-
@ 502ab02a:a2860397
2025-04-10 01:47:24เมื่อวานโพสเรื่องบรอกโคลีฝีมือมนุษย์แล้ว มีคนสงสัยว่าตกลงมันดีไหม เวลาพูดถึงอาหารสุขภาพ ภาพที่ลอยมาในหัวของหลายๆ คนคงหนีไม่พ้น "บรอกโคลีลวก" สีเขียวสดใส เสิร์ฟคู่ไข่ต้มขาวๆ หรืออกไก่นุ่มนิ่มในกล่อง meal prep แต่ก่อนจะตักเข้าปาก เราลองตั้งคำถามง่ายๆ ก่อนว่า… “บรอกโคลีเกิดขึ้นในธรรมชาติไหม?” คำตอบคือ ไม่ เลยครับ
บรอกโคลีไม่ได้เกิดจากการงอกงามของเมล็ดในป่า หรือเติบโตตามชายเขาเหมือนพืชสมุนไพรหรือผลไม้ดั้งเดิม แต่มันคือพืชที่มนุษย์ สร้างขึ้นมา ผ่านการคัดสายพันธุ์อย่างตั้งใจให้ได้รูปร่าง กลิ่น สี และรสชาติที่ต้องการ โดยมีจุดเริ่มต้นจากพืชตระกูลเดียวกันกับ “มัสตาร์ดป่า (wild mustard)” ซึ่งเป็นพืชที่แทบไม่มีใครกิน มนุษย์ใช้วิธีเลือกต้นที่มีลักษณะ “หัวดอกใหญ่” มาเพาะซ้ำๆ จนกลายเป็นบรอกโคลี ในขณะที่พืชอีกกิ่งสายพันธุ์จากต้นเดียวกัน กลายร่างไปเป็น กะหล่ำปลี กะหล่ำดอก คะน้า และใบมัสตาร์ด
ฟังไม่ผิด ทั้งหมดนี้คือ “ญาติกัน” จากพืชป่าต้นเดียวกัน และเป็น ผลผลิตของการทดลองจากมนุษย์ ไม่ใช่ธรรมชาติ มันคือ “ของใหม่” ที่เราเพิ่งรู้จักในช่วง 100–150 ปีหลังนี้เอง
แล้วอะไรที่ทำให้บรอกโคลีกลายเป็นอาหารสุขภาพ? หนึ่งในคำตอบคือ ภาพลักษณ์ (branding) บรอกโคลีถูกผลักดันในยุคหลังสงครามโลกโดยรัฐบาลสหรัฐฯ เพื่อโปรโมท “การกินผักเพื่อสุขภาพ” และเป็นพืชที่ปลูกง่าย อดทน ขนส่งสะดวก
อุตสาหกรรมอาหารก็โหนกระแส ผนวกกับงานวิจัยที่เลือกตีแผ่ “ประโยชน์เฉพาะด้าน” ของสารบางตัวอย่างเช่น ซัลโฟราเฟน (sulforaphane) ที่ได้จากกลูโคซิโนเลต (glucosinolate) ในบรอกโคลี ซึ่งมีฤทธิ์กระตุ้นเอ็นไซม์ล้างพิษในตับ
แต่นั่นเป็นแค่ด้านเดียวของเหรียญ…
บรอกโคลียังมีสารในกลุ่มเดียวกันนี้ที่ ต่อต้านการดูดซึมไอโอดีน ทำให้ไทรอยด์เฉื่อยได้ในบางคน ยังไม่รวมถึงความยากในการย่อย ก่อแก๊สในลำไส้ และอาจทำให้เกิดอาการแพ้ในกลุ่มคนที่ระบบภูมิคุ้มกันไวเกิน นอกจากนี้ที่บอกไปแล้วว่า มันไม่ใช่ธรรมชาติ เราเลยไม่สามารถพบบรอกโคลีได้ในป่า มันต้องเกิดจากการปลูกเท่านั้น นั่นแน่ ตาสีส้มเริ่มทำงาน
บรอกโคลี “ไม่มีเมล็ด” แบบธรรมชาติ เพราะมันไม่ได้เกิดจากธรรมชาติแท้ๆ แต่นั่นไม่ได้แปลว่าเราปลูกมันไม่ได้เพราะ “เมล็ดของบรอกโคลีมีนะ แต่เป็นเมล็ดที่ได้จากต้นพันธุ์ที่มนุษย์คัดแยกและควบคุมการผสมพันธุ์มาแล้ว”
บริษัทเมล็ดพันธุ์ระดับโลก อย่าง Monsanto, Syngenta, Bayer ฯลฯ จะพัฒนาเมล็ดที่ผ่านการผสมสายพันธุ์แบบ "F1 Hybrid" ซึ่งหมายความว่าเขาจะเอาพ่อแม่พันธุ์เฉพาะที่คัดเลือกไว้ มาผสมกันเพื่อให้ได้ลูกบรอกโคลีที่มีลักษณะตรงตามต้องการ เช่น ดอกแน่น สีเขียวเข้ม โตเร็ว ต้านทานโรค เมล็ดบรอกโคลีจึงเป็น เมล็ดลูกผสมรุ่นแรก (F1) ซึ่งเกษตรกร ไม่สามารถเก็บเมล็ดจากต้นบรอกโคลีที่ปลูกไว้เอง แล้วปลูกต่อได้ เพราะถ้าเอาไปปลูกใหม่รุ่นถัดไป (F2) ลักษณะจะเริ่มแปรปรวน แตกแถว ดอกเล็กลง หรือกลายพันธุ์ ดังนั้น ทุกปี เกษตรกรต้องซื้อเมล็ดใหม่จากบริษัทผู้ผลิต ซึ่งนี่แหละคือระบบ seed monopoly หรือ เศรษฐกิจผูกขาดพันธุ์พืช ที่ควบคุมโดยบริษัทยักษ์ใหญ่ เอาไว้จะมาขยายความมุมนี้ให้อีกทีครับ
ส่วนเรื่องสารอาหารความอาหารคลีนเค้าว่าดี ต้องมาเคลียร์ mind set กันอีกทีในนี้ คือในโลกของพืชนั้น การเอาตัวรอดไม่ใช่เรื่องเล่น ๆ เพราะพวกมันวิ่งหนีไม่ได้ ไม่มีกรงเล็บ ไม่มีเสียงคำราม มีแค่ “เคมี” เป็นอาวุธ และในกลุ่ม Brassica oleracea หรือพวกบล็อกโคลี กระหล่ำดอก กระหล่ำปี คะน้า ฯลฯ พวกมันเลือกใช้อาวุธลับที่ชื่อว่า glucosinolate และ goitrogen เป็นด่านหน้าในการรับมือสิ่งมีชีวิตที่มากินมัน ซึ่งแน่นอนว่ารวมถึงมนุษย์ด้วย
สารพวกนี้เมื่อถูกเคี้ยว ถูกตัด หรือโดนความร้อน จะเปลี่ยนเป็นสารชื่อ isothiocyanate ซึ่งหลายงานวิจัยมองว่าสามารถกระตุ้นเอนไซม์ต้านอนุมูลอิสระในร่างกาย และลดความเสี่ยงมะเร็งได้ แต่ในขณะเดียวกัน... มันก็สามารถ “ยับยั้งการดูดซึมแร่ธาตุสำคัญ” อย่างไอโอดีน สังกะสี เหล็ก และแคลเซียมได้ด้วย โดยเฉพาะหากกินดิบ หรือกินปริมาณมากเป็นประจำ
ลองนึกภาพตามแบบขำๆ ว่า เรากินผักเพราะคิดว่ามันมีธาตุเหล็ก แต่ตัวมันเองกลับมี “แม่กุญแจเคมี” ที่ล็อกไม่ให้เหล็กดูดซึมได้จริง เหมือนพาเด็กไปสวนสนุกแล้วล็อกไว้ไม่ให้เล่นเครื่องเล่นอะไรเลย
นี่ยังไม่รวมถึง oxalate และ lectin ที่แฝงอยู่ในผักบางกลุ่ม ซึ่งสามารถจับกับแร่ธาตุจำพวกแคลเซียมหรือแมกนีเซียม และพาออกจากร่างกายไปทางลำไส้แบบไม่แยแสว่าเรากำลังขาดมันอยู่
คำถามคือ... แล้วคนที่กินสาย animal-based ซึ่งได้แร่ธาตุจากตับ ไข่แดง เนื้อแดงอยู่แล้ว จำเป็นต้องเสี่ยงกับผักที่มี anti-nutrient สูงแบบนี้ไหม?
คำตอบอาจจะไม่ได้ตรงไปตรงมาเหมือนสูตรยำปลากระป๋อง แต่ถ้าจะตอบในแนวระมัดระวังและตั้งอยู่บนหลักการชีววิทยา คือ “หากจะกินผักกลุ่มนี้ ควรกินในปริมาณที่พอดี และต้องผ่านการปรุงที่เหมาะสม” เช่น ลวก ต้ม หรือนึ่ง เพื่อสลายฤทธิ์ของสารเหล่านั้นลงไปให้ได้มากที่สุด
และที่สำคัญที่สุดอย่าเชื่อว่าผักมีแต่คุณเสมอไป เพราะในขณะที่แร่ธาตุจากเนื้อสัตว์มาพร้อมเอนไซม์ช่วยดูดซึมและไม่มีตัวขัดขวาง แร่ธาตุจากพืชกลับต้องฝ่าด่านสารยับยั้งมากมายที่ซ่อนอยู่
การกินแบบ animal base ที่เน้นเนื้อ เครื่องใน ไข่ น้ำมันดี และหลีกเลี่ยงน้ำตาล เป็นทางเลือกที่ทำให้ร่างกายได้รับสารอาหารสำคัญในรูปแบบที่ดูดซึมได้เต็มที่ ไม่ต้องพึ่งพาการเล่นปาหี่ของเคมีพืชที่คอยยับยั้งการดูดซึม เพราะสุดท้าย ถ้าเรามองอาหารเป็นเหมือนบทสนทนา ผักบางชนิดอาจจะพูดว่า “ฉันดีนะ กินฉันสิ” แต่ลึกๆ แล้ว มันกำลังพูดภาษาสารพิษที่เราแปลไม่ออก
แต่ทำความเข้าใจกันก่อนนะครับว่า เวลาเราพูดเรื่องนี้ไม่ใช่ว่า plant = toxic คือมันมีความพอดี มีกระบวนการบางอย่างที่เราต้องสกัดมันออกมาใช้งาน เหมือนไทยโบราณเรารู้ดีว่า พืช สมุนไพร ยา มันคือเส้นทางการใช้พืชจากความรู้ของมนุษย์ ดังนั้น มองพืชเป็น option ของสารพฤกษะ สารสำคัญ ได้นะครับ ไม่ต้องหัวสี่เหลี่ยมขนาดว่า เห้ย พืช กูไม่เอาเว้ย อะไรขนาดนั้นนะทิด
สารพฤกษะไม่ใช่วิตามิน ไม่ใช่แร่ธาตุ แต่เป็นสารที่พืชสร้างขึ้นเองเพื่อใช้ป้องกันตัวเองจากศัตรูพืช รังสี UV หรือเชื้อจุลินทรีย์ เรารู้จักชื่อพวกนี้อยู่ไม่น้อย เช่น
กลูโคซิโนเลต (glucosinolate) จากตระกูลกะหล่ำ ไลโคปีน (lycopene) จากมะเขือเทศ เรสเวอราทรอล (resveratrol) จากองุ่น ซาโปนิน (saponin) และ เลคติน (lectin) จากธัญพืชและถั่ว
สารพฤกษะมีหลายหมื่นชนิด และในบางกรณีมี ฤทธิ์ต้านอนุมูลอิสระ (antioxidant) หรือ ปรับภูมิคุ้มกัน จึงถูกจัดเป็นสารส่งเสริมสุขภาพ (nutraceutical) ได้ในบางมุม แต่ต้องระวัง... เพราะสารพฤกษะบางชนิดก็คือ "สารต้านสารอาหาร" (anti-nutrient) บางครั้งสิ่งที่เป็น “เกราะป้องกัน” ของพืช ก็กลายเป็น “กับดัก” สำหรับร่างกายเรา เช่น ไฟเตต (phytate) จับแร่ธาตุจำพวกเหล็ก สังกะสี ทำให้ร่างกายดูดซึมไม่ได้ ออกซาเลต (oxalate) สะสมในไตและอาจก่อให้เกิดนิ่ว กลูโคซิโนเลต ไปยับยั้งการดูดไอโอดีน ส่งผลต่อการทำงานของไทรอยด์ เลคติน ทำลายผนังลำไส้และกระตุ้นระบบภูมิคุ้มกันเกินจำเป็น
สารพฤกษะ คือ "ลูกเล่น" ทางชีววิทยาของพืช ที่อาจจะมีประโยชน์บ้าง ถ้าได้รับในปริมาณน้อย และในบริบทที่ร่างกายจัดการได้ แต่ถ้ามากเกิน หรือรับสะสมจากอาหาร plant-based ตลอดเวลา โดยไม่มีอาหารจากสัตว์มาคานสมดุล ก็อาจสร้างปัญหาเงียบๆ ระยะยาว
จะดีก็ฟงหวิน จะเลวก็ฟงหวิน พอเห็นภาพแล้วเนอะครับ
พรุ่งนี้เราจะขุดลงไปลึกอีกหน่อย กับเบื้องหลังของพืชพันธุ์ ที่ "เขา" บอกว่าทำเพื่ออาหารที่ดีของโลกครับ
#pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก
-
@ 28635a6d:ee6f3a73
2025-04-10 00:21:52Over the past few years, The School of Bitcoin (TSOBTC) has built a reputation as a decentralised, open-source educational initiative dedicated to financial sovereignty and digital literacy. Our faculty, contributors, and global community have worked tirelessly to create resources that embody the Free and Open-Source Software (FOSS) ethos, ensuring that knowledge remains accessible to all.
As part of our commitment to maintaining an open and transparent model, we are excited to announce that The School of Bitcoin is officially migrating to Consensus21.School. This transition is not just a rebranding--it marks the consolidation of all our initiatives, projects, and educational resources under the Consensus21.School banner. The School of Bitcoin will no longer exist as a separate entity.
This move comes as a response to growing confusion between our initiative and another entity operating under the domain schoolofbitcoin (SOB), which has taken a direction that does not align with our open-source philosophy. To reaffirm our dedication to FOSS and community-driven education, we are bringing everything--our courses, programs, and collaborations--into a singular, more focused ecosystem at Consensus21.School.
What Does This Mean for Our Community?
Rest assured, all the valuable content, courses, and educational materials that have been developed under TSOBTC will remain available. We continue to embrace a value-for-value model, ensuring that learners can access resources while supporting the ecosystem in a way that aligns with their means and values.
By consolidating under Consensus21.School, we are doubling down on the principles of decentralisation, self-sovereignty, and permissionless learning. This transition includes all of our key initiatives, including V4V Open Lessons, the Decentralised Autonomous Education System (DAES), and our involvement with the Plan B Network.
Full Migration of DAES and Plan B Network Collaboration
As part of this transition, the Decentralised Autonomous Education System (DAES) is now officially part of Consensus21.School and is fully reflected in the Consensus21.School Whitepaper. DAES will continue to provide a platform for aspiring learners to submit their Bitcoin project ideas for potential funding and mentorship, with active engagement in our Stacker News /~Education territory and Signal chat for collaboration. We invite contributors to support our learner fund and help bring innovative ideas to fruition within this new ecosystem.
Additionally, our collaboration with the Plan B Network will now operate under Consensus21.School. Through this partnership, we will continue teaching using the Plan B Network's curriculum to provide high-quality Bitcoin education and strengthen local Bitcoin communities. This global initiative remains a core part of our mission, now fully integrated within Consensus21.School.
Looking Ahead
With Consensus21.School, we will continue innovating in peer-to-peer learning, integrating cutting-edge developments in Bitcoin, Nostr, and decentralised technologies. We encourage our community to stay engaged, contribute, and help us build an even stronger foundation for the future of open education.
This is more than just a domain change--it is the next evolution of our mission. The School of Bitcoin as an entity is now retired, and all our efforts, including DAES and the Plan B Network collaboration, will move forward exclusively under Consensus21.School. We invite educators, students, and enthusiasts to join us in shaping this next phase of open financial education.
The journey continues, and we are thrilled to embark on this new chapter together
-
@ 554ab6fe:c6cbc27e
2025-04-09 23:22:16We all live with our bodies every day, but do we truly experience them? Does this experience of the body have a broader consequence on our interpretation of life and our experience of well-being? The ability to experience the sensations of the body is known as interoception, and mindfulness meditation seems to be a powerful way of enhancing this ability. Enhanced interoception may not just result in a better understanding of the body, but may lead to a general increase in subjective well-being. Furthermore, it also may be indicative of a broader truth about how we can reach a more profound level of consciousness.
In a previous post, I began an exploration into possible reasons why those who meditate claim to achieve an altered form of consciousness. I mentioned that across enlightenment-related research, there is a common experience and interpretation of being one with everything during these altered or heightened states. I proposed that this interpretation of reality was achieved through an improved capability of the brain to process incoming information. The argument stems from the idea that the brain is constantly receiving signals from internal and external stimuli, trying to interpret those signals using previous experiences and predicted models (Seth, 2013). The interpretation created, in part, manifests itself as our conscious reality. I used an analogy of a calm pond to describe a possible consequence of this neuroscientific idea: imagine the brain as this pond, where incoming signals can be thought of as raindrops. When a single raindrop falls upon a pond, the ripples created are distinct. It is incredibly easy to determine how big the raindrop was, where it dropped, and came from, etc. However, if there is a massive rainstorm, then it is almost impossible to interpret all the intersecting ripples, and it is very hard to understand the “information” of each raindrop. This is analogous to how our brains work. The busier the incoming signals, the more difficult it is to interpret the reality of what is happening. This would also be true for the signals within the brain manifested by our thoughts and ruminations. Therefore, the calmer the pond/brain, the clearer and more accurate understanding of our world, and ourselves, is achieved. Meditation may be a method to achieve this heightened state of awareness. I find this idea profoundly interesting, and so my goal is to further explore this idea using scientific evidence as support.
To further explore and verify this idea, I felt it was important to research interoception. If this idea holds water, then it should be observed that meditation allows an individual to achieve a better understanding of incoming stimuli, both internal and external. In this post, I will explore the ability to interpret internal stimuli, which is known as interoception.
A quick note before I continue: As I began researching this topic, I found that the study of interoception was quite complex. The research is constantly evolving, and previous notions are quickly dismissed as the research progresses. Therefore, much of the research presented is speculative, and surely not indicative of definitive truth. Nothing you ever read is definitive of course, but I find that this is especially true here. Regardless, it will adequately depict the fascinating nature of our bodies and the processes involved in interpreting ourselves and reality, hopefully highlighting how important interoception is, and how poorly it is understood.
Understanding the Different Senses
To begin, an outline of our body’s senses is required. Classically speaking, the senses are defined as teloreception (vision and hearing), proprioception (limb position), exteroception (touch), chemoreception (smell and taste), and interoception (sensations from the internal organs)(A. D. Craig, 2002). In this classical definition, sensations of pain, temperature, and itches belonged to the family of touch/exteroception (A. D. Craig, 2002). Therefore, the line between the stimuli from the outside world is clearly defined and separated from the stimuli coming from inside the body. However, more recent findings suggest that temperature, pain, and itch are distinct from touch because they are associated with different neuronal pathways, and the experiences of these sensations seem to rely upon post-processing (A. D. Craig, 2002, 2003). In other words, the experience of these stimuli is more related to the mind than pure touch is. Additionally, interoception is also being redefined. The lamina I spinothalamocortical system is one of the major neuronal pathways that provide the brain with interoceptive signals (A. D. Craig, 2002, 2003). This nerve, across multiple studies, has been shown to not just send signals regarding the organs, but a sense of the condition of the entire body as well (A. D. Craig, 2002). Therefore, interoception encompasses the general feelings we have about the body’s state of being including, but not limited to, thirst, hunger, penile stimulation, exercise/exhaustion, and the condition of our organs such as bladder, stomach, etc. (A. D. B. Craig, 2009). To further complicate things, some researchers have attempted to distinguish between different aspects of interoception (Garfinkel et al., 2015):
• interoceptive accuracy – “Objective accuracy in detecting internal bodily sensations” • interoceptive sensibility – “Self-perceived dispositional tendency to be internally self-focused and interoceptively cognizant” • interoceptive awareness – “Metacognitive awareness of interoceptive accuracy”
Here, the ability to accurately detect signals and the subjective belief of one’s accuracy is differentiated. The interoceptive awareness evaluates if your subjective confidence in your ability to sense the signals coincides with the true ability. Therefore, the mind and our subjective evaluation of our signals are incredibly related to our perceived understanding. For this reason, the neuroscience of interoception should be explored, to gain a better understanding of how it works. The two brain areas that are involved in interoception and that will be discussed here are: the insula and the anterior cingulate cortex (ACC).
Insula
The insula is located deep within the cerebral cortex, and likely plays the most important role in interoception. The insula, especially the anterior portion of the insula, is thought to be involved in bodily and emotional awareness (Giuliani et al., 2011). It plays a major role in interoception and the sensations of internal physical states (Fox et al., 2014; Wolf E. Mehling et al., 2012). Not only is it integral to generating mental images of the internal state, but it is required for the motivation to make reactions based upon the interpretation, which subsequently affect the quality of life and survival (Craig, 2002). Consequentially, it plays a predictive role in awareness and decision-making (Craig, 2009). Therefore, falling in line with the idea that consciousness is the product of the predictive model generating nature of the brain to understanding and interpret incoming stimuli, the insula is thought to be a major seat of human consciousness and awareness of self-hood (Craig, 2009; Fox et al., 2014; Seth, 2013). Already, there is a clear connection between interoception, body awareness, and consciousness within the scientific literature.
Anterior Cingulate Cortex (ACC)
The other brain region heavily involved in interoception is the ACC. Where the insula largely is involved in the processing of the signal, the ACC is more involved with the response to the signal (Craig, 2002). In other words, the insula is related to the limbic sensory cortex, whereas the ACC is associated with the limbic motor cortex (Craig, 2002). Most recent studies have also shown that the ACC and insula are co-activated when a person experiences feelings (Craig, 2002, 2009). For example, both brain regions are involved in the sensation of the intensity and unpleasantness of pain (Grant et al., 2011). This provides further evidence that interoception is both a feeling and a motivation (Craig, 2009). Additionally, this enhances the argument that our interpretations and feelings from our internal environment are there for survival. It supports the idea that our brain is organized in a way that makes predictions, generates a conscious experience, that then elicits a reaction for the continuation of life.
Meditation and Interoception
Interoception involves more than just sensory information. It influences our feelings, and our understanding of our body, self, and the surrounding world. This understanding and experience of the self are seemingly influenced by the practice of meditation. Not only is this idea espoused in the east, but recent research has also indicated that increased mindfulness is correlated with increase interoceptive awareness (de Jong et al., 2016; Farb et al., 2010; Hanley et al., 2017). The exact mechanisms to how this occurs are still unclear. However, fMRI studies have shown that mindfulness meditation seems to increase activation in the insula (Farb et al., 2010). This may indicate that mindfulness promotes neurogenesis in areas that promote interoception. On that same note, the cognitive practices of mindfulness meditation may promote a mental framework that is helpful towards interoception. Mindfulness meditation involves orienting one’s attention to their immediate experience and becoming aware of all incoming stimuli with an open, curious, non-reactive, and non-judgmental interpretation (Bishop et al., 2004). This process helps generate a feeling of safety within the body, and the individual learns to interpret thoughts not as concrete objects of reality, but simply as thoughts that come and go within the mind. Researchers have found evidence to suggest that the non-reactivity obtained through meditation practice is closely linked to the ability to sustain attention towards bodily sensations (Hanley et al., 2017). This concept closely links to the idea that the calmer the mind is, the better the brain can process incoming information. This article brings forward evidence that the brain, with a calmer mind, can process interoceptive information better.
Consciousness
An interesting observation amongst interoceptive research is that an increase in interoceptive awareness is negatively correlated with emotional distress, hence an increase in subjective well-being is achieved (Hanley et al., 2017; W E Mehling et al., 2012). This is further supported by the observation that sadness is correlated with decreased activation of the insula and ACC, the brain regions involved in interoception (Farb et al., 2010). The relationship between the ability to be aware of the internal signals of the body and our mental well-being is very interesting. It suggests that not only does a calm mind generate a greater ability to understand the inner body, but it generates a more positive orientation to said experience. Additionally, it may be possible that this positive outlook spills over into other aspects of life beyond the interpretation of the self. Perhaps the calmer mind generates an accurate and positive outlook on all information received. This is perhaps why those who are expert meditators seem to be so peaceful, loving, and have a feeling of unity amongst everything.
The way we interpret information influences our experience of both ourselves and the world. Being aware of the body and its sensations in a non-judgmental way, creates a general sense of well-being. This may be indicative of a deeper philosophical idea: that the calmer the mind, the more capable the brain can interpret and understand information. This would not only provide a more accurate depiction of reality but provide a more profound understanding of it. Leading to a perspective of the world that is more positive, and potentially more oriented around the idea that we are all one. I cannot claim this is true. Nonetheless, it will be a concept that I will continue to explore. Regardless, it does seem to be the case that mindfulness meditation is capable of increasing interoception and therefore well-being. This being the case, I highly recommend that anyone interested in this topic incorporates mindfulness practice into their life. Reading and thinking about these ideas are all well and good, but to achieve full understanding, one must practice and experience it for themselves.
References
Bishop, S. R., Lau, M., Shapiro, S., Carlson, L., Anderson, N. D., Carmody, J., Segal, Z. v., Abbey, S., Speca, M., Velting, D., & Devins, G. (2004). Mindfulness: A Proposed Operational Definition. Clinical Psychology: Science and Practice, 11(3), 230–241. https://doi.org/10.1093/clipsy.bph077
Craig, A. D. (2002). How do you feel? Nature Review. https://doi.org/10.1177/1359105308095062
Craig, A. D. (2003). Interoception: The sense of the physiological condition of the body. Current Opinion in Neurobiology, 13(4), 500–505. https://doi.org/10.1016/S0959-4388(03)00090-4
Craig, A. D. (2009). How do you feel — now? The anterior insula and human awareness. 10(January).
de Jong, M., Lazar, S. W., Hug, K., Mehling, W. E., Hölzel, B. K., Sack, A. T., Peeters, F., Ashih, H., Mischoulon, D., & Gard, T. (2016). Effects of mindfulness-based cognitive therapy on body awareness in patients with chronic pain and comorbid depression. Frontiers in Psychology, 7(JUN). https://doi.org/10.3389/fpsyg.2016.00967
Farb, N. A. S., Anderson, A. K., Mayberg, H., Bean, J., McKeon, D., & Segal, Z. v. (2010). Minding One’s Emotions: Mindfulness Training Alters the Neural Expression of Sadness. Emotion, 10(1), 25–33. https://doi.org/10.1037/a0017151
Fox, K. C. R., Nijeboer, S., Dixon, M. L., Floman, J. L., Ellamil, M., Rumak, S. P., Sedlmeier, P., & Christoff, K. (2014). Is meditation associated with altered brain structure? A systematic review and meta-analysis of morphometric neuroimaging in meditation practitioners. Neuroscience and Biobehavioral Reviews, 43, 48–73. https://doi.org/10.1016/j.neubiorev.2014.03.016
Garfinkel, S. N., Seth, A. K., Barrett, A. B., Suzuki, K., & Critchley, H. D. (2015). Knowing your own heart: Distinguishing interoceptive accuracy from interoceptive awareness. Biological Psychology, 104, 65–74. https://doi.org/10.1016/j.biopsycho.2014.11.004
Giuliani, N. R., Drabant, E. M., Bhatnagar, R., & Gross, J. J. (2011). Emotion regulation and brain plasticity: Expressive suppression use predicts anterior insula volume. NeuroImage, 58(1), 10–15. https://doi.org/10.1016/J.NEUROIMAGE.2011.06.028
Grant, J. A., Courtemanche, J., & Rainville, P. (2011). A non-elaborative mental stance and decoupling of executive and pain-related cortices predicts low pain sensitivity in Zen meditators. Pain, 152(1), 150–156. https://doi.org/10.1016/j.pain.2010.10.006
Hanley, A. W., Mehling, W. E., & Garland, E. L. (2017). Holding the body in mind: Interoceptive awareness, dispositional mindfulness and psychological well-being. Journal of Psychosomatic Research, 99, 13–20. https://doi.org/10.1016/j.jpsychores.2017.05.014
Mehling, W E, Price, C., Daubenmier, J. J., Acree, M., & Bartmess, E. (2012). The Multidimensional Assessment of Interoceptive Awareness (MAIA). PLoS ONE, 7(11), 48230. https://doi.org/10.1371/journal.pone.0048230
Mehling, Wolf E., Price, C., Daubenmier, J. J., Acree, M., Bartmess, E., & Stewart, A. (2012). The Multidimensional Assessment of Interoceptive Awareness (MAIA). PLoS ONE, 7(11). https://doi.org/10.1371/journal.pone.0048230
Seth, A. K. (2013). Interoceptive inference, emotion, and the embodied self. Trends in Cognitive Sciences, 17(11), 565–573. https://doi.org/10.1016/j.tics.2013.09.007
-
@ c892835e:4d87bc55
2025-04-09 23:02:13Hello Brazil
-
@ 878dff7c:037d18bc
2025-04-09 21:38:34Coalition Proposes Sovereign Wealth Funds to Address National Debt
Summary:
Opposition Leader Peter Dutton has unveiled a plan to reduce Australia's $1.2 trillion debt by creating two sovereign wealth funds: the Future Generations Fund and the Regional Australia Future Fund. These funds aim to allocate 80% of commodity windfall revenues toward debt reduction and regional development, focusing on infrastructure and economic support outside metropolitan areas.
Sources: The Australian - April 10, 2025
Australian Dollar Falls Below 60 US Cents Amid Tariff Concerns
Summary:
The Australian dollar has dropped to a five-year low, trading below 60 US cents, as markets react to escalating tariff tensions initiated by the U.S. This depreciation reflects investor fears of a potential global economic downturn impacting Australia's economy.
Sources: ABC News - 9 April 2025, Reuters - 7 April 2025
AI Transformation Reshaping Australia's Software Development Landscape
Summary:
Artificial Intelligence (AI) is rapidly transforming Australia's software development industry. Recent research indicates widespread adoption of AI tools and methodologies, leading to increased efficiency and innovation. This trend positions Australian tech companies competitively in the global market and highlights the importance of AI literacy for professionals in the sector. Sources: Tech Business News - April 10, 2025
UK and Australia Collaborate on Next-Generation Weapons Development
Summary:
The United Kingdom and Australia have launched a partnership to develop next-generation sub-systems for low-cost weapons. This collaboration integrates the UK's Modular Weapons Testbed with Australia's SHARKTOOTH program, featuring innovative 'plug-and-launch' modular technology. The initiative aims to accelerate the deployment of advanced, affordable weapons technologies, enhancing both nations' defense capabilities. Sources: The Defense Post - April 7, 2025, ASD News - April 4, 2025
Smoke Advisory Issued for Greater Sydney Due to Hazard Reduction Burns
Summary:
The NSW Rural Fire Service has issued a smoke advisory for the Greater Sydney area, including the Blue Mountains and Southern Highlands, due to planned hazard reduction burns. Residents are advised to stay indoors, close windows and doors, and keep respiratory medications close by. rfs.nsw.gov.au+1rfs.nsw.gov.au+1 ABC
Sources: NSW Rural Fire Service - April 9, 2025
Leaders Clash in First Election Debate
Summary:
In the first leaders' debate of the 2025 federal election campaign, Prime Minister Anthony Albanese and Opposition Leader Peter Dutton clashed on several key issues during the Sky News/Daily Telegraph People's Forum. Albanese accused the Coalition of historically cutting health and education funding, which Dutton vehemently denied. The debate also saw pointed exchanges over spending levels, energy policy, and cost-of-living concerns. Dutton challenged Albanese’s tax cuts and left open the possibility of extending fuel excise relief. The leaders also addressed infrastructure funding, economic management, and health services. The debate occurred with only 25 days until the election and 14 days before early voting begins.
Sources: The Daily Telegraph - 10 April 2025, News.com.au - 10 April 2025
Australia and Philippines to Increase Joint Military Exercises
Summary:
Australia and the Philippines have agreed to double their joint military drills and security engagements in 2025. This decision underscores the strengthening defense ties between the two nations in response to regional security challenges. Sources: Manila Bulletin - April 7, 2025
Victoria's Working with Children Check System Criticized for Allowing Individuals Under Investigation to Retain Clearance
Summary:
Victoria's Working with Children Check system is under scrutiny for permitting individuals under investigation for abuse and assault to retain their clearance. Parents and advocates are calling for urgent reforms, highlighting cases where children were allegedly harmed by individuals who maintained their working with children credentials despite serious allegations. ABC
Sources: ABC News - April 10, 2025
Ecological Revival Following Inland Floods
Summary:
After unprecedented rainfall transformed over a million square kilometers of inland Australia into floodplains, the region is witnessing a remarkable ecological revival. Native wildlife such as fish, long-haired rats, frogs, and birds are thriving, and previously dried-out habitats are being replenished. Experts view the floods as a rare opportunity for broad ecological regeneration, including mega breeding events and species migrations. While challenges remain, the natural rebirth offers hope as long-dormant ecosystems awaken with vibrant life.
Sources: The Times - April 10, 2025, SciTechDaily - April 10, 2025
CyberCX Report Highlights Evolving Cyber Threat Landscape
Summary:
CyberCX's annual Threat Report for 2025 reveals that business email compromise remains the top incident type, with espionage-related incidents taking longer to detect compared to previous years. The report underscores the need for enhanced cybersecurity measures across Australian organizations. Sources: CyberCX - April 9, 2025
Greens-Backed Study Targets Environmental Impact of Pet Dogs
Summary:
A new study, receiving attention from progressive environmental circles including the Greens, has flagged pet dogs as a significant ecological threat. The research claims dogs contribute to pollution, wildlife disturbances, and even climate change due to their carbon footprint. Critics argue this is part of a broader ideological push to regulate personal lifestyle choices, sparking concerns that common household pets may soon be in the environmental policy crosshairs. With the Greens already pushing for sweeping environmental reforms, some Australians fear this could lead to overreach targeting ordinary families and their beloved pets.
Sources: The Guardian - 10 April 2025
High-Intensity Resistance and Impact Training Enhances Bone Density in Postmenopausal Women
Summary:
The LIFTMOR randomized controlled trial investigated the effects of high-intensity resistance and impact training (HiRIT) on bone health in postmenopausal women with low bone mass. Over eight months, participants engaged in twice-weekly, 30-minute HiRIT sessions, performing exercises such as deadlifts, overhead presses, and back squats at over 85% of their one-repetition maximum. The study found significant improvements in lumbar spine bone mineral density (BMD) by 2.9%, femoral neck BMD by 0.3%, cortical thickness, and functional performance measures, including enhanced leg and back strength. Notably, the HiRIT program was well-tolerated, with high compliance and minimal adverse events, suggesting that such training is both safe and effective for improving bone health and physical function in this demographic. Sources: PubMed - October 4, 2017
Anti-Aging Expert Peter Attia Discusses Longevity and Health Optimization
Summary:
In this episode of "The Diary Of A CEO," host Steven Bartlett engages with Dr. Peter Attia, a physician specializing in longevity and health optimization. Dr. Attia delves into the often-overlooked aspects of aging, emphasizing the importance of proactive health measures. He highlights the critical role of maintaining muscle mass and strength, noting that a decline in these areas significantly increases mortality risk. Dr. Attia also explores natural methods to enhance testosterone levels without resorting to testosterone replacement therapy (TRT), advocating for lifestyle interventions such as strength training, adequate sleep, and balanced nutrition. Throughout the conversation, he underscores the necessity of individualized health strategies and regular monitoring to effectively prevent age-related diseases. Sources: Spotify - April 2025
-
@ 0fa80bd3:ea7325de
2025-04-09 21:19:39DAOs promised decentralization. They offered a system where every member could influence a project's direction, where money and power were transparently distributed, and decisions were made through voting. All of it recorded immutably on the blockchain, free from middlemen.
But something didn’t work out. In practice, most DAOs haven’t evolved into living, self-organizing organisms. They became something else: clubs where participation is unevenly distributed. Leaders remained - only now without formal titles. They hold influence through control over communications, task framing, and community dynamics. Centralization still exists, just wrapped in a new package.
But there's a second, less obvious problem. Crowds can’t create strategy. In DAOs, people vote for what "feels right to the majority." But strategy isn’t about what feels good - it’s about what’s necessary. Difficult, unpopular, yet forward-looking decisions often fail when put to a vote. A founder’s vision is a risk. But in healthy teams, it’s that risk that drives progress. In DAOs, risk is almost always diluted until it becomes something safe and vague.
Instead of empowering leaders, DAOs often neutralize them. This is why many DAOs resemble consensus machines. Everyone talks, debates, and participates, but very little actually gets done. One person says, “Let’s jump,” and five others respond, “Let’s discuss that first.” This dynamic might work for open forums, but not for action.
Decentralization works when there’s trust and delegation, not just voting. Until DAOs develop effective systems for assigning roles, taking ownership, and acting with flexibility, they will keep losing ground to old-fashioned startups led by charismatic founders with a clear vision.
We’ve seen this in many real-world cases. Take MakerDAO, one of the most mature and technically sophisticated DAOs. Its governance token (MKR) holders vote on everything from interest rates to protocol upgrades. While this has allowed for transparency and community involvement, the process is often slow and bureaucratic. Complex proposals stall. Strategic pivots become hard to implement. And in 2023, a controversial proposal to allocate billions to real-world assets passed only narrowly, after months of infighting - highlighting how vision and execution can get stuck in the mud of distributed governance.
On the other hand, Uniswap DAO, responsible for the largest decentralized exchange, raised governance participation only after launching a delegation system where token holders could choose trusted representatives. Still, much of the activity is limited to a small group of active contributors. The vast majority of token holders remain passive. This raises the question: is it really community-led, or just a formalized power structure with lower transparency?
Then there’s ConstitutionDAO, an experiment that went viral. It raised over $40 million in days to try and buy a copy of the U.S. Constitution. But despite the hype, the DAO failed to win the auction. Afterwards, it struggled with refund logistics, communication breakdowns, and confusion over governance. It was a perfect example of collective enthusiasm without infrastructure or planning - proof that a DAO can raise capital fast but still lack cohesion.
Not all efforts have failed. Projects like Gitcoin DAO have made progress by incentivizing small, individual contributions. Their quadratic funding mechanism rewards projects based on the number of contributors, not just the size of donations, helping to elevate grassroots initiatives. But even here, long-term strategy often falls back on a core group of organizers rather than broad community consensus.
The pattern is clear: when the stakes are low or the tasks are modular, DAOs can coordinate well. But when bold moves are needed—when someone has to take responsibility and act under uncertainty DAOs often freeze. In the name of consensus, they lose momentum.
That’s why the organization of the future can’t rely purely on decentralization. It must encourage individual initiative and the ability to take calculated risks. People need to see their contribution not just as a vote, but as a role with clear actions and expected outcomes. When the situation demands, they should be empowered to act first and present the results to the community afterwards allowing for both autonomy and accountability. That’s not a flaw in the system. It’s how real progress happens.
-
@ 7d33ba57:1b82db35
2025-04-09 21:01:07Nestled along the Cassowary Coast in Far North Queensland, Mission Beach is a dreamy stretch of palm-fringed sand where the Great Barrier Reef meets the Wet Tropics rainforest. It's serene, scenic, and refreshingly uncrowded—a perfect escape if you’re chasing natural beauty, island vibes, and a bit of adventure.
🌟 Top Things to Do in Mission Beach
1️⃣ Walk the Endless Beach
- A stunning 14-kilometer stretch of golden sand
- Often you’ll feel like you have it all to yourself
- Lined with coconut palms and mountain backdrops—ideal for morning strolls or sunset walks
2️⃣ Dunk Island Adventures
- Just a 10-minute boat ride away, Dunk Island offers hiking trails, snorkeling, and tranquil beaches
- Go for a day trip or camp overnight for the real castaway feel
- You can kayak there if you're feeling adventurous 🚣♀️
3️⃣ Spot a Cassowary in the Wild
- Mission Beach is one of the best places to see the endangered cassowary, a striking and ancient-looking bird
- Keep your eyes peeled around Licuala Rainforest Walk or Bicentennial Trail
4️⃣ Skydiving with a Beach Landing 🪂
- One of the most iconic skydives in Australia
- Jump from 15,000 ft with views of the reef, rainforest, and islands—and land right on the sand!
5️⃣ Explore the Rainforest
- Walk in the Djiru National Park, home to lush jungle, creeks, and butterflies
- Or hike the Clump Mountain track for coastal views
🍉 Where to Eat & Chill
- The Garage Bar & Grill – Laid-back, good vibes, great burgers
- Baba Curry – Casual spot for Indian and tropical twists
- Mission Beach Tavern – Classic Aussie pub fare, cold beers, and often live music
- Spicy Thai Hut – Small, authentic, and big on flavor
🌺 Need-to-Know Tips
✅ Stinger season (Oct–May) means you should swim in designated netted areas or wear stinger suits
✅ Great base to explore the Atherton Tablelands, Tully Gorge, or Paronella Park
✅ Car rental is super handy—Mission Beach is spread out and public transport is limited
✅ It’s quiet here—perfect for relaxing, recharging, and going off-grid -
@ 7d33ba57:1b82db35
2025-04-09 19:30:29Havana (La Habana) is a city that grabs you with its vintage soul, vivid colors, and irresistible rhythm. Picture classic 1950s cars cruising past crumbling colonial mansions, locals dancing to live salsa in the streets, and the smell of strong Cuban coffee and cigars in the air. It’s not polished, but that’s part of the magic—Havana is alive.
🌟 Top Things to Do in Havana
1️⃣ Explore Old Havana (Habana Vieja)
- A UNESCO World Heritage Site with narrow streets, pastel facades, and grand plazas
- Must-see spots: Plaza Vieja, Plaza de la Catedral, Plaza de Armas, and El Capitolio
- Stop at a rooftop bar for mojitos and views over the city 🌆
2️⃣ Ride in a Classic American Car 🚗
- Take a guided tour in a vintage convertible—pink, red, or baby blue, your choice!
- Cruise along the Malecón, past the Hotel Nacional and through leafy neighborhoods like Vedado
3️⃣ Walk the Malecón
- Havana’s famous seaside promenade is the city’s open-air living room
- Best at sunset, when locals gather to fish, chat, play music, or just watch the waves crash
4️⃣ Visit the Museum of the Revolution
- Housed in Batista’s former palace, it tells the story of Cuba’s revolutionary history
- The building itself, with bullet holes and all, is part of the experience
5️⃣ Fábrica de Arte Cubano (FAC)
- A mix of gallery, nightclub, performance space, and bar
- Where Havana’s artsy and creative crowd hangs out—don’t miss it if you're into music or culture
🍹 What to Eat & Drink in Havana
- Ropa vieja – Shredded beef in tomato sauce, a Cuban classic
- Moros y Cristianos – Black beans and rice served with everything
- Tostones & yuca – Tasty fried plantains and cassava
- Mojitos & daiquiris – Best enjoyed where Hemingway drank them: La Bodeguita del Medio and El Floridita
- Cuban coffee – Small, strong, and sweet
🎵 Feel the Vibe
✅ Catch live music in every bar—from salsa and rumba to jazz and son cubano
✅ Watch a local dance show, or better yet, join a salsa class
✅ Visit Callejón de Hamel on Sundays for Afro-Cuban rhythms and street art🛺 Tips for Visiting Havana
🌞 Bring cash (euros or USD)—credit cards aren’t widely accepted
📶 Expect limited Wi-Fi—most people use Wi-Fi parks with pre-paid cards
💡 Embrace the slower pace—this is Cuba, not a rush
🚖 Use official taxis or pre-negotiate fares
💬 Learn a few Spanish basics—locals really appreciate it
💃 Talk to people—Cubans are warm, proud, and full of stories -
@ 3c7dc2c5:805642a8
2025-04-09 19:29:48🧠Quote(s) of the week:
My current state of mind:
It is always the same story Government debases the currency and then blames business for profiteering and "the rich" who the Government has actually enriched. The root cause is government, and its addiction to printing money.
The DEBT crisis cannot be sustained. EU, UK, USA, China, etc., cannot continue the Ponzi scheme of printing more money to pay off old money. The previous rate for debt was 0.1%. Countries have to pay their Treasury Bonds, which will be around 4-5%. Wars start so they can all default, and then what comes after is a global financial reset. This is the information the majority of you do not understand or even look at.
Secretary of the Treasury of the United States, Scott Bessent, before the Election: “In the next few years, we are going to have some kind of grand economic reordering. Something equivalent to a new Bretton Woods. There’s a very good chance that happens in the next 4 years and I’d like to be a part of it.”
Any change of the Bretton Woods order will play in the cards of the scarce, politically neutral, immutable money: Bitcoin.
The problem has, and always will be the abuse and misuse of money by those in power. No one should ever have to work for a currency that others can print at will. The foundations are corrupted. Our money is broken.
This is the real problem.
Until that changes, nothing changes.
Educate yourself. Study Bitcoin.
🧡Bitcoin news🧡
On the 1st of April:
➡️The value of Metaplanet’s Bitcoin treasury is now 24x larger than the market cap of the company in April 2024.
On the 2nd of April:
➡️'Foundry just mined the emptiest non-empty block in over two years, containing only 7 transactions and weighing just 5369 units. The last block weighing less than this was by Binance Pool at height 769895 in January 2023 when the mempool was similarly empty, containing only 4 transactions and weighing 4370 units.' - Mononaut
➡️Last week I mentioned that Gamestop now has $ 1.48 billion available to purchase Bitcoin. If they invest that amount, $1.5 billion, in Bitcoin, it will make them the fourth largest Bitcoin holder among public corporations.
https://i.ibb.co/k6x0YLnV/Gne0shqb-QAAnx4-Z.jpg"
➡️Fidelity announces a no-fee Bitcoin retirement account that allows their 49 million customers to buy in Bitcoin.
➡️Publicly traded Enish announces to buy ¥100 million worth of Bitcoin.
➡️94.5% of the 21 million Bitcoin supply has been mined, based on its predictable predetermined issuance schedule—programmed in the protocol code, enforced by consensus, and verified through hundreds of thousands of globally distributed network nodes. Only 5.5% left to be mined over the next 115 years! - Wicked
➡️'Today, Breez launches Misty Breez, their latest application built using the Breez SDK. The Breez SDK was initially developed to simplify the process of integrating Lightning Network support into different consumer applications. Dozens of existing projects and companies currently build on Lightning using the SDK.
Breez: 'Lightning Made Easy → No channels. No setup fees. Just permissionless P2P payments.
Receive Offline Payments → Receive payments offline using mobile notifications.
Lightning Address Support → Accept payments with a customizable Lightning address.'Documentation for the Breez SDK Nodeless configuration used by Misty Breez is available here. The Github for the Misty Breez implementation is available here. Lastly, for users who wish to play around with the application, an early access release is available here for Android, and here for iOS. A direct APK download is available here.' - Bitcoin Magazine
➡️'Managing over 1.62 trillion dollars, the Bank of America CEO just said they would launch a stablecoin once it's legal. That amount of capital will disrupt all of crypto -- but, only a few networks will capture most of that value.' - Austin King
➡️'Bitcoin processed $5.5 trillion worth of transactions in Q1' - Pierre Rochard https://i.ibb.co/nqwkcCvn/Gni-MSFWYAAg7xu-1.png
On the 3rd of April:
➡️New Record Bitcoin Network Hashrate: 840,000,000,000,000,000,000x per second Bitcoin mining hashrate is rapidly approaching 1 zettahash.
➡️Metaplanet Inc. raised ~$17.8 million (¥2.63 billion) in equity capital through the first two days of April to further our Bitcoin Treasury Operations.
➡️Of 2024’s Top Performing Stocks, Only Two Remain Positive in 2025 — Both Are Bitcoin Treasury Firms. - METAPLANET - STRATEGY
➡️Finally, Jack Dorsey's Block enables Bitcoin payments on merchant terminals. "We are working on it" - Jack
➡️The Bitcoin Fear and Greed Index is now back at "Extreme Fear". Hodl the line people, hodl the line!
➡️'Today, the United States stock market lost $1.65 trillion. To help understand that number, it’s more than all Bitcoin combined. Not one coin—every coin. The global supply of Bitcoin is currently worth $1.63 trillion.' - Documenting Bitcoin
Just to give you one more perspective, the stock market has had the single worst day since the Covid crash. Bitcoin went as low as $3,843 during the Covid crash, and now it's $82,000. That is ~21x increase in just 5 years.
➡️Now, no matter what will happen with Bitcoin's price. Not enough people ask how much purchasing power $? will still hold by in the future. The nominal price is only part of the story.
https://i.ibb.co/qY2Rsfn0/Gno-Qu-Ki-WEAEp-EAM.jpg
On the 4th of April:
➡️Fortnite added a Bitcoin mine to the new map.
➡️Mastercard plans to help users send Bitcoin and cryptocurrency. "We've made a sizable bet on this," said Mastercard’s head of digital assets yesterday. The company has 3 billion cards worldwide and over 100 million places that accept them. So you are telling me that Mastercard wants to use a p2p cash system, Bitcoin, wild. Suddenly is becoming more suddenly all of a sudden. Hello, game theory!
➡️Bitdeer releases test footage of their new Bitcoin mining computer. The SealMiner A2 Pro Hyd calculates 500,000,000,000,000 hashes per second. That's some serious computing power. Do you wonder what the energy bill looks like...
https://www.asicminervalue.com/miners/bitdeer/sealminer-a2-pro-hyd
➡️Treasury Secretary Scott Bessent admits "Bitcoin is a store of value". In an interview with Tucker Carlson.
'Bessent was asked, "Why is Gold moving around the world right now?" After giving a one-line answer, he immediately of his own accord started saying "Bitcoin is becoming a store of value" This is quite the signpost for those with eyes to see.',
Ray Dalio was right, there's a change in world order. But it ain't China, it's Bitcoin.
➡️"Bitcoin is showing signs of breaking free from the gravitational pull of technology stocks during the financial market turmoil of the last few days." - Bloomberg
“We think Trump’s aggressive move has sped up a re-thinking of BTC’s longer-term value in a portfolio.” - Augustine Fan
https://i.ibb.co/cX1FLwr5/Gntq-Le-EXEAAZg-QA.jpg
On the 5th of April:
➡️The mysterious inventor of Bitcoin, going only by the username Satoshi Nakamoto, set April 5th—today—as their birthday. No one knows why for sure, but the date may be symbolic: it’s the same day the U.S. ordered citizens to turn in their gold under Executive Order.
➡️'A new Bitcoin Improvement Proposal (BIP) from developer Agustin Cruz suggests destroying unspent transaction outputs (UTXOs) to protect Bitcoin from potential quantum computer attacks. The proposal, “Quantum-Resistant Address Migration Protocol” (QRAMP), would require users to move funds to quantum-resistant wallets before a deadline or face their coins being effectively burned.' -Bitcoin News
This would mean that Satoshi either becomes active again or his/her Bitcoin is forever gone. There should never be a requirement to force move your coins. Try some other quantum-resistant approach.
Any quantum-resistant upgrade to the Bitcoin network should be a soft fork and completely optional. It is unethical to delete anyone's funds if they don't upgrade within an allotted time limit.
On the 6th of April:
➡️'Bitcoin mining difficulty recently adjusted upwards by 6.81% to an all-time high. Expect more small/medium operators to shut down as margins evaporate. Only survivors- those with ultra-cheap power or hobbyists who don't mine for profit. 'Bitcoin miners are the ultimate Bitcoin psychopaths. If you think we'll turn our miners off, you don't understand Bitcoin.' -Tomas Greif
On the 7th of April:
➡️ETH/BTC has fully retraced 5 years, now down 11% over that timeframe. This is catastrophic for the thesis that new cryptos “with more utility” can sustainably outperform the OG Bitcoin.
Willy Woo: 'ETH "ultrasound money" traded at $1569 today. It traded at $1448 in Jan 2018, thus a compounded IRR of 1.2% for a 7-year investment. I just thought I'd post this to help ETH holders as comments like these are what it takes to help an asset put in a bottom.'
➡️ Luke Broyles: '5 years ago we had a stock market crisis in 2020. Bitcoin fell 40% in one day and 65% in total. The S&P 500 fell 9.5% on that same day. Bitcoin bottomed at $4,000 then went up by 17x in the rebound from the crisis as we printed money.
If Bitcoin now falls 45% from the top and then goes up 10x in a similar timeframe, that would be a $600,000 Bitcoin in late 2026. I don’t care if Bitcoin is $50,000 or $600,000 next year. It is lower risk and more humanitarian than corporate paper.
Stocks had a higher human cost, less upside, and higher downside risk in time frames over 2 years. No matter what prices do I expect the S&P 500 to fall 80% against BTC in the next 5 years. I also suspect in 5 years $60,000 will sound as cheap as $4,000 and most will forget the pain of April 2025 like how most forgot March 2020.'
➡️ There are ~58 million millionaires in the world. And eventually, money printing will turn everyone into a millionaire. But there will only be 21 million bitcoin. 0.362 bitcoin per millionaire alive today. https://i.ibb.co/SDxYXYBz/Gn8-T-xc-XIAAc-GJM.png
➡️ Strategy discloses $5.91 billion in unrealized losses on its Bitcoin holdings for Q1 2025, according to a new SEC filing.
➡️ Cango increased its Bitcoin monthly production to 530.1 bitcoin in March, a 12% rise, with holdings reaching 2,474.8 BTC by month-end, up from 1,944.7 BTC in February. Deployed hashrate remained at 32 EH/s, with the average operating hashrate at 30.3 EH/s.
➡️'Bitcoin's MVRV for supply in loss drops to 0.88. This downturn is milder than previous major corrections in 2018 and 2022; investors remain cautiously optimistic rather than capitulating.' -Bitcoin News
💸Traditional Finance / Macro:
On February 20, JP Morgan CEO Jamie Dimon sold $234 million worth of JPM stock.
On February 22, Warren Buffett disclosed a record $334 billion cash balance. 30 trading days later, the Nasdaq 100 crashed -24%.
How did they know?
And just to show you how F'ed up the traditional markets are and acting like a memecoin:
On the 7th of April, the following sequence happened.
At 10:10 AM ET, rumors emerged that the White House was considering a "90-day tariff pause."
At 10:15 AM ET, CNBC reported that Trump is considering a 90-day pause on tariffs for ALL countries except for China.
By 10:18 AM ET, the S&P 500 had added over +$3 TRILLION in market cap from its low.
At 10:25 AM ET, reports emerged that the White House was "unaware" of Trump considering a 90-day pause.
At 10:26 AM ET, CNBC reported that the 90-day tariff pause headlines were incorrect.
At 10:34 AM ET, the White House officially called the tariff pause headlines "fake news."
By 10:40 AM ET, the S&P 500 erased -$2.5 TRILLION of market cap from its high, 22 minutes prior.
Never in history have we seen something like this.
Wall Street now trades like meme coins.
So basically > a guy reported fake news > all of World Finance aped the news and added 2.5T to the market > The news is fake, so everyone dumped so basically, finance is just memecoins with suits.
What a world we live in...
On the 2nd of April
👉🏽'President Trump just announced tariffs on 185 countries AT ONCE, one of the largest tariffs in US history. S&P 500 futures erased -$2 TRILLION of market cap in under 15 minutes.' ...'After 3+ years of compounding inflation: 2025 is the year when President Trump, Fed Chair Powell, and Treasury Secretary Bessent all came to the same conclusion. A recession is the only remaining way for inflation AND rates to fall.' -TKL
On the 3rd of April:
👉🏽How bad was today's stock market decline? Of the 11,406 trading days since January 1980, only 29 had larger declines.
https://i.ibb.co/3mg85KLt/Gno34klb-QAAJs52.png
The Magnificent 7 Index is now down over -30% from its all-time high seen on December 18th. While the S&P 500 is down -7.5% year-to-date, most investors are down much more. Large-cap tech is beyond bear market territory.
The Nasdaq 100 is in a bear market following a -6% drop today, the largest drop since March 2020. US stocks have now erased a massive -$11 TRILLION since February 19th with recession odds ABOVE 60%. The S&P 500 has lost ALL OF ITS RETURNS since March 2024.
Just to give you perspective. $10T, that’s a lot, right?
For context, the FED balance sheet is $6.7T. US M2 money supply $21.7T.Meanwhile, Bitcoin is up ~30% in the same period.
March 2020:
The S&P 500 is down 13% Bitcoin down
24% April 2025:
The S&P 500 is down 13% Bitcoin is down 5%
Another perspective, the S&P 500 dropping 10% in two days happened in:
October 1987
November 2008
March 2020
April 2025
On the 4th of April:
👉🏽Retail investors bought $4.7 billion in stocks yesterday, the most in a decade.
On the 5th of April:
👉🏽You can say whatever you wanna say about good ol' Warren Buffett, but he is killing it. https://i.ibb.co/NgfqjF50/Gnudptr-XQAAHPSW.jpg"
🏦Banks:
👉🏽 no news
🌎Macro/Geopolitics:
On the 1st of April:
👉🏽The scandal surrounding Le Pen. She is accused of fraud for allegedly using European Parliament staff for her French party. While everyone in Brussels knows this is exactly how things have worked for years. The whole system is full of these kinds of grey areas and conflicts of interest. Of course, it's not right, but it's also nearly impossible to prove definitively without political motivation. It's a political prosecution, whichever way you look at it. Now, I am no fan of Le Pen, not at all, but isn't it interesting that the unelected ECB President, Christine Lagarde, was accused of fraud, but without a criminal record—so she could become president of the ECB?
What scandal is Christine Lagarde known for, and what was the outcome?
Christine Lagarde was involved in a scandal known as the "Tapie affair" in France. This took place when she served as Minister of Economic Affairs and Finance from 2007 to 2011 under President Nicolas Sarkozy. The scandal revolves around an arbitration ruling in 2008, in which French businessman Bernard Tapie was awarded €403 million in damages in a dispute with the state-owned bank Crédit Lyonnais over the sale of Adidas in the 1990s. Lagarde approved the arbitration, which later became controversial as critics claimed the process was unfair and that Tapie—a known friend of Sarkozy—had been favored.
The outcome of the case came in December 2016, when Lagarde was found guilty of "negligence" by the Court of Justice of the Republic (CJR), a special tribunal for French government officials. The judge cited her “personality” and “international reputation,” as well as the context of the economic crisis during which she had to make decisions. Following the verdict, she remained in her position as managing director of the International Monetary Fund (IMF), which she had held since 2011, and in 2019 she was even appointed president of the European Central Bank (ECB), showing that the scandal did not significantly harm her career. However, the case remains a topic of debate, especially due to the perception of class-based justice and the large amount of taxpayer money involved in the payout.
And that is just one example. Just look up all the scandals around Ursula von der Leyen, president of the European Commission. And remember, unelected. Or our own Dutch EU playboy, Frans Timmermans. Today, the EU Commission publicly admitted that NGOs were paid to lobby Members of the European Parliament in favor of the Green Deal. https://www.eppgroup.eu/newsroom/commission-admits-financing-undue-lobbying-activities
'The European Commission admits it has used EU funds that were supposed to "fight climate change" for financing left-wing NGOs and climate organizations to silence the voices of European conservatives in a secretive influence operation. The funds came from the LIFE Program, which is supposed to fund environmental initiatives and has had a total budget of EUR 9 billion since 2014.'
https://x.com/visegrad24/status/1908561357114352127
Nearly a quarter of the 705 Members of the European Parliament have at some point been involved in a scandal or legal violation, reports Follow the Money. It concerns a wide range of behaviors, says investigative journalist Peter Teffer from FTM — from parking fines to corruption. "Perhaps the most extreme case is a Greek MEP who is currently doing his job from prison."
As mentioned before, it's a political prosecution whichever way you look at it. More and more, judicial systems in the West are being weaponized to crush the political opposition of the globalist elites / the ones that are in power now. Supposedly to save 'the rule of law'. Is it all just a coincidence—or a pattern of lawfare? Ask yourself that question.
I will give you a hint...It’s a tale of two justices: Le Pen faces potential jail time for allegedly misusing €2.9M in EU funds, while Christine Lagarde, found guilty of mismanaging €403M, walks free and now runs the European Central Bank!
Giorgia Meloni strongly criticized the disqualification of Marine Le Pen from the elections: “No one who truly believes in democracy can welcome a decision that targets the leader of a major party and deprives millions of citizens of their right to representation.”
Meloni’s right, banning opposition leaders isn’t democracy, it’s soft authoritarianism. Le Pen’s party earned 42% in the last presidential runoff. Silencing millions through legal tricks is a dangerous game.
For the Dutch readers: https://i.ibb.co/9HHsR3z3/Gnbuq-Pi-Xc-AAB1ye.jpg
We need a DOGE in Europe!
👉🏽'Job postings on Indeed dropped -10% year-over-year last week to the lowest in 4 years. Over the last 3 years, job postings have declined -33%. As a result, available vacancies are just 8% above pre-pandemic levels. Additionally, NEW job postings have dropped -40% since February 2022 to near the lowest since December 2020. Data provided by Indeed has been a leading indicator for the BLS-provided job openings data, suggesting more weakness ahead. The labor market is deteriorating.' -TKL
👉🏽'Despite a drop in unemployment and a rise in the labor force participation rate, the growing burden of retirees and public spending recipients is weighing on our finances and blocking essential reforms.' https://www.lepoint.fr/argent/comment-la-dependance-des-electeurs-a-l-argent-public-bloque-les-reformes-en-france-01-04-2025-2586277_29.php?at_variante=Community%20Management
30 million French citizens are economically dependent on public funds. That’s 44% of the population. 60% of eligible voters consist of civil servants, retirees, the unemployed, and welfare recipients. This is why France must reform — but cannot reform. For the Dutch readers, please click here for more insight: https://x.com/hollandgold/status/1908182490130341985
👉🏽The Top 1% of U.S. earners now have more wealth than the entire middle class.
On the 2nd of April:
👉🏽President Trump just announced tariffs on 185 countries AT ONCE, one of the largest tariffs in US history. As Luke Gromen mentioned last week: "Low tariffs on the world’s factories were part and parcel of the post-1971 structure of USD reserve status. Now that US tariffs are no longer low, the next shoe to drop will be a change to the post-1971 structure of USD reserve status."
UBS says a permanent implementation of President Trump's reciprocal tariffs would result in inflation rising to 5%. This would be a result of prices rising to "adjust to the higher costs of imports." We are on the verge of 5% inflation and negative GDP growth
'The rumor is that Trump is crashing the market so that The Fed cut the rate since several trillion of the national debt needs to be refinanced this year. When he refinances the debt on low rates he removes tariffs and the market moons.' -Bitcoin for Freedom
If true, that’s some 4D chess. The script would be: Get the 10-year down to sub 3.5, refinance the debt, initiate QE, roll back the tariffs, RF rate at 3.5% tech rips stocks up.
But I do find a problem with that theory. Most likely, tariffs will increase inflation, so there will be no QE. Trump is causing stagflation, which will kill jobs and businesses. The only people who benefit are oligarchs/the rich with extra cash to buy the dip.
👉🏽Almost every year since 08', GDP growth has been negative if you take out increases in government spending. You don't believe me:
https://i.ibb.co/8gLcnBT5/Gnke94-LWw-AAXHe-X.jpg"
Debt-fueled growth. Loosen monetary policy, FREE Money, ZIRP. Massive government spending has led to over 36T public debt with over $1T/yr. We have not fixed anything since 08. Just kicked the can down the road.
On the 3rd of April:
👉🏽Orthonormalist on Twitter cracked the tariff formula. It’s simply the nation’s trade deficit with the US divided by the nation’s exports to the US. Yes. Really. Vietnam: Exports 136.6, Imports 13.1 Deficit = 123.5 123.5/136.6 = 90% EU: exports 531.6, imports 333.4, deficit 198.2. 198.2/531.6 is 37, close to 39.
https://i.ibb.co/PG03LQwT/Gnmy-Krq-WQAAOf1-N.jpg
The fact that the Trump tariff rates are a simple calculation of the trade balance with that country means that the intention is to close the trade deficit, NOT negotiate for lower export tariffs. Seems the only way to avoid high tariffs is to improve the trade balance with the USA. Crude method, but ingenious all the same. Whether this approach is wise depends entirely on your economic priorities. Do you value balanced trade above all else, or do you prefer more nuanced economic efficiency and diplomatic stability?
Bottom line: simplistic, yes. Insane, no. Worth debating? Absolutely. Just some examples, the US administration imposed a 10% tariff on exports from Heard and McDonald Islands populated only by penguins. What a time to be alive.
https://i.ibb.co/DHdHRgSd/Gnm5-Eh-OXEAAy-GVc.jpg
I really love the Netflix series Peaky (focking) Blinders. The tiny island of St Pierre et Miquelon, featured in Peaky Blinders, St Pierre was a big warehouse for alcohol headed to the US, now got a 50% tariff because somebody bought 3.4 million worth of goods in July 2024 (most likely crustaceans). The 5,8k inhabitants "only" bought 100k worth of US goods in 2024. In the case of St Pierre, it's funny, but tragic in many others.
The tiny island of St Pierre et Miquelon got a 99% tariff because somebody bought 3.4 million worth of goods in July 2024 (most likely crustaceans) The 5,8 k inhabitants "only" bought 100k worth of US goods in 2024
Students for Liberty:
"It’s bold. It’s nationalist. It’s flawed. Because you can’t tariff your way to prosperity. And you can’t revive American industry without fixing what’s broken. The enemy isn’t foreign competition. It’s a big government. That’s what classical liberals have always warned: When the state manipulates markets, prints money, and micromanages trade, it always ends up hurting the very economy it claims to protect. Tariffs won’t save America. But freedom, competition, and reform might."
Trump and Bessent are orchestrating a grand economic reordering on US terms.
👉🏽President Trump invites President Bukele to the White House to discuss "ways we can support each other."
👉🏽China urges the US to "immediately" cancel reciprocal tariffs or they will take "counter-measures." Reciprocal tariffs on reciprocal tariffs should begin within the next 24 hours.
'China has three options: 1. Concede defeat to whatever terms Trump demands 2. Devalue the yuan by 20-40% 3. Unleash the biggest fiscal stimulus in its history (talking $2-3 trillion), which will push its debt off the chart' - ZeroHedge
I am not sure about that though. China isn’t collapsing—but it’s facing real structural headwinds: an aging population, a deflating housing bubble, rising youth unemployment, declining productivity, and global pushback.
Meanwhile, the U.S. still has deep capital markets, global alliances (well, let's see how the tariffs war will play out haha), energy independence, and innovation leadership.
So no—this is not “China checkmate.” It’s the start of a very long game.
👉🏽China claims that they found 2k+ TONNES of new Gold in the past 6 months that could reshape global markets. You can mine more gold if you want, but you can't mine more Bitcoin. That's the difference.
👉🏽That was quick: Thailand to Negotiate With the US on 36% Imposed Tariffs: PM Next: everyone else
👉🏽The European Union is preparing further countermeasures against newly announced US tariffs of 20%, per CNBC.
Apparently, no one is asking why, if these import tariffs are so harmful, the EU itself imposed high tariffs on imports for years. Tariffs that were actually higher than what the U.S. imposed on EU goods — which is what triggered the conflict in the first place.
On the 4th of April:
👉🏽The "World War 3" of Trade Wars Has Begun: Americans are waking up to the first MAJOR tariff retaliation against President Trump. China has announced 34% tariffs on ALL US goods with the S&P 500's 2-day losses now at -$3.5 TRILLION.
👉🏽'The last time the market dropped 9.5% in two days, the Fed unleashed a multi-trillion bailout of the economy including $500BN in QE, $1 trillion daily repo, and tens of billions in junk bond ETF purchases.' - ZeroHedge
👉🏽Treasury Secretary Scott Bessent tells Tucker Carlson - The top 10% of Americans own 88% of equities, and 88% of the stock market. The next 40% owns 12% of the stock market - The bottom 50% has debt - In the summer of 2024: more Americans were using food banks than they ever have in history
On the 5th of April:
👉🏽EU financed targeted campaigns against political opponents and uncomfortable voices.
👉🏽Germany considers withdrawing 1200 tons worth of gold from a US Federal Reserve vault following new tariffs.
👉🏽'On Thursday ALONE, hedge funds sold $40 BILLION of stocks in their largest daily selling spree since 2010. Short sales exceeded longs by 3 TIMES, with North American stocks accounting for 75% of volume.' -TKL
👉🏽'US job cut announcements spiked 205% year-over-year to 275,240 in March, the 3rd-highest monthly reading on record. This is also up 60% from the previous month when 172,017 cuts were announced. Moreover, this is higher than in any month during the 2008 Financial Crisis and the 2001 recession. Year-to-date, US employers have announced 497,052 job cuts, the highest quarterly total since Q1 2009. The US government has led all sectors with 216,215 cuts in March and 279,445 cuts year-to-date, up 672% from Q1 2024' -TKL
On the 7th of April:
👉🏽Hong Kong's stock market closes down 13.2%, the biggest one-day drop since 1997, and China's stock market officially opens with a -10% drop. China's stock market suffers worst single-day crash since 2008. And this isn't a meme coin, it's the Japanese stock market
https://i.ibb.co/7dqwPSc4/Gn5-Hjqc-Xw-AAzn-Yv.jpg
👉🏽European Commission president Ursula von der Leyen says the EU stands ready to negotiate a zero-for-zero tariff deal with the United States. Meanwhile, the President of the European Central Bank: The European Union wants to abandon the American credit cards Visa and Mastercard, PayPal, and Alipay. Make up your goddamnn minds ladies.
👉🏽If China invades Taiwan, the stock market gets cut in half. Apple, Nvidia, all of it. Conflict/trade issues would cause a global recession on top of it. It would make tariffs and Ukraine look like nothing. Immediate global disaster. Still the ultimate risk. Please read Ray Dalio's book The Changing World Order. When, not if...The fourth turning is real.
https://i.ibb.co/yFw7CkLg/Gnd6yqy-Ww-AAb-GFz.jpg
I am convinced this will happen because they need an excuse for why the market crashed or will crash in the future. The entire system in the USA and China is broken. No money, all fake, constant inflation, and debt.
War solves it for both, as mentioned in my quote at the start of this week's Weekly Recap.
I will end this week's Weekly Recap with the following quote made by Bitcoin Archive:
'Bitcoin is a neutral, global commodity without counterparty risk. Zero tariffs. The only commodity with a verifiably limited supply. 21 million forever. Your 0.01 BTC is the same quality as BlacRock's $50b.'
🎁If you have made it this far I would like to give you a little gift:
Start by taking 30 minutes to watch this video. Spend under 40 minutes of your time watching and showing you simply and compellingly what the problem is and the potential solution. Bitcoin.
https://www.satsvsfiat.com/en/#watch
After watching that video, I have another great video: https://youtu.be/k3NN_NZOdhY?si=xwBkv2lRHvEdCA0y
$13 trillion on war over the past two decades: Funded by inflation, hidden taxes, and silent theft. This is how fiat money became a weapon. In this episode with Lyn Alden: 'This might have been my top interview last year. In person at a conference in Madeira. Published today. An evergreen discussion on the Broken Money thesis. The history of monetary technology and its impacts on current socioeconomic realities.'
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly.
Use the code SE3997
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple. ⠀ ⠀
⠀⠀ ⠀ ⠀⠀⠀
Do you think this post is helpful to you?
If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
@ 16f1a010:31b1074b
2025-04-09 19:23:44Arceus was born from nothing, not even chaos.
Arceus soon made Dialga, Palkia, and then Giratina. Dialga created time, Palkia created space, and Giratina created anti-matter. And thus, the Universe was born.Dialga, Palkia, and Giratina began battling and as a result were banished to their individual realms by Arceus.
Arceus then created Groudon, Kyogre, and Rayquaza. Groudon formed the huge celestial bodies known as planets, and the trio chose one to inhabit with life. Arceus created the sun, then shot off across the universe to create all the many stars.
But he had learnt from experience, so he tasked Rayquaza as the peace-keeper.
The trio set to work, with Groudon raising land violently, creating volcanoes and mountains; Kyogre, creating the seas, where the land was not, and Rayquaza making an atmosphere full of 'air'.
Sure enough, Kyogre's waters started to corrode Groudon's land, and this angered him. The two battled, but Rayquaza broke it up, and sent Groudon deep underground, while Kyogre was sent deep into the oceans, before returning out into the ozone layer.
Soon, Arceus returned, and it tried to make life, but failed miserably. So it created Regigigas. Regigigas moved the continents with its bare hands, piecing them together like a puzzle.
When the final chunk of land was put into place, the world sprung to life, with grass and trees sprouting everywhere. Finally, the world was ready for life.
Arceus sent Regigigas into a coma until it was needed once more. It then created thousands of Pokémon to inhabit the world. These Pokémon belonged to one of five races.
Celebi
Jirachi
Mew
Manaphy
or Victini
It also created Latios and Latias, its personal agents, whom it sent flying through the universe in search of a species with great intelligence to live in harmony with its creations, before leaving once more to regain energy.
After much searching, Latias found an intelligent alien species known as Deoxys. They were bacterial but advanced. They chose a few of them and brought them back to their world.
For a while, things were fine, and the Deoxys and natives lived together in harmony. Until the Deoxys discovered they could 'infect' the natives and use their bodies. Suddenly, they were all infecting a host, and then war broke out.The Mew, Jirachi, Manaphy, Celebi, and Victini battled their infected brethren to set them free, while the Deoxys sought total dominance.
The war raged on for many centuries, until there were but a handful left of each species. Arceus returned and destroyed the last of the Deoxys, but the damage was done. The population of the world was little more than 20.
The Celebi retreated to the forests, hiding amongst the trees and in time. The Manaphy retreated to the sea, the Jirachi fell asleep, only waking up every so often, and the Victini hid in far-off lands.
This left only the Mew.During the war, three Mew had hidden under lakes in search of enlightenment.
Leaving only a handful of Mew left to roam. They were alone.The war had left the land in ruins; some places were battle-scarred beyond repair. Instead of lush grass, there were harsh deserts. This angered Groudon, sending him into a rage. Volcanoes spurted and spewed lava everywhere.
One day, a Mew was floating along when a sudden flow of lava approached it. Thinking quickly, Mew unleashed energy inside it that even Arceus didn't know about. It morphed the lava into a form and gave it LIFE. The first Heatran was created.
Arceus sensed this and had an idea. Gathering all the able Mew, it channeled immense power through them, using their life-giving abilities to create more living creatures. These were crude and unfinished, prototypes of what was to come.
Aerodactyl filled the sky, while Lileep, Cranidos, and Shieldon roamed the land.
Anorith, Omanyte, and Kabuto populated the seas.
Arceus also bestowed upon most of these beings the power to 'evolve' into more powerful creatures if the correct environment was met.
Finally, Latias returned once more. They had been far more thorough in their searching than before. However, Arceus had told them to stop, but guilt kept them going. They were determined to complete their job.
They brought humans from another planet. Basic but intelligent beings who definitely lacked the ability to infect anything. The humans settled in quickly, initially living relatively separately from the animals.
But Arceus wasn't convinced; he felt the need to test them.
First, Arceus created Articuno, who he ordered to send the planet into an Ice Age.
Articuno froze the planet, killing many creatures, but giving birth to new ones like Mamoswine.
To Arceus' pleasure, the humans adapted, creating structures out of ice and snow. The severe drop in temperature awoke Regigigas, who rose high above the land and saw what was happening.
The humans instantly fell in love with Regigigas, worshipping the titan and creating statues of it from ice. Touched by this, Regigigas found one of the statues and breathed life into it before returning to sleep.
However, this scared the humans, and they locked it away in a cave.
Realizing that the Ice Age did not affect the humans, Arceus created another bird, Moltres, and ordered it to send the world into a drought. The ice melted, and the water evaporated as the temperature rose higher and higher.
While the humans continued to adapt, using the skills they had learned with the ice and applying them to rock, the creatures weren't as lucky. The Mamoswine and other creatures that adapted to the cold died off, but new ones such as huge insects like Yanmega became common.
Once again, the drought awoke Regigigas, who once again saw a statue of himself. Thinking the humans would have learned from last time, Regigigas gave it life. But rumors of the living statue had been passed down and exaggerated since last time, and once again, the scared humans locked away this second 'Regi'.
When the drought finally wore off, Arceus began the third and final test. He created one more legendary bird, Zapdos. Zapdos created powerful electrical storms all across the land.
The storms killed off the last of the prototype creatures, leaving only the humans and the few pets they brought from their home land. One extremely intelligent man managed to harness the power of electricity, creating the first electronic device.
Of course, Regigigas awoke one final time. He discovered that the humans were far more evolved than expected, able to harness metals and electricity, albeit at a somewhat primitive level. More out of tradition than anything else, Regigigas created the third Regi out of steel. The humans were no longer scared of this Regi, but they sealed it away with the other two nonetheless, knowing that one day someone powerful enough would tame them.
Arceus was baffled. The humans had passed all three tests of harsh weather. Zapdos calmed the storms, and the world became peaceful once again.
Arceus herded the Mew together for a second time. Having learned the strengths and weaknesses of his prototype beings, Arceus was ready to go farther.
Siphoning its huge power through the small pink beings, Arceus filled the world with hundreds of species of creatures that would become known as 'Pokémon'. They were more diverse than it had ever imagined, filling the skies, land, and sea.
The life energies even reacted with the sun rays and moonlight, creating Ho-oh and Lugia respectively.
Some radiated out of the planet's moon, creating a population of Clefairy, as well as Cresselia on the light side and Darkrai on the dark side of the moon.
Lugia befriended the three elemental birds, and they followed him like a leader. Meanwhile, humans started to get closer to these new creatures, using them as slaves, weapons, or pets. The term 'Pokémon' arose from strange travelers and stuck.
The first Pokéballs were created from Apricorns, and the bond between human and Pokémon was complete.
Ho-oh took residence at the top of the Bell Tower. It was jealous of Lugia's trio of birds and wanted one of its own. One day, three Kimono girls entered its tower with a Jolteon, Flareon, and Vaporeon.
Ho-oh burnt down the tower with its Sacred Fire. Most escaped, but the three Pokémon were trapped and perished in the flames. Ho-oh soon resurrected them as Entei, Raikou, and Suicune.
Humans continued to evolve and take over the land, and Pokémon continued to work alongside and for them for many, many years.
That is the story of the Pokémon World.
-
@ 67078065:928c2893
2025-04-09 18:04:26If you need to use a C/C++ library in your Android app, you will need to use the Java Native Interface (JNI). This was my experience integrating a C blockchain library called "libqaeda" ,into an Android application we are working on with lash. Many thanks to lash for advising on using this platform , and who wrote the C library.
Libqaeda and What it does
libqaeda is a cryptographic library designed to enable bi-lateral countersigning of chains of promises and statements. At its core, the library provides a robust framework for creating verifiable certificates that require dual signatures - one from the requester and one from the responder. The library excels at establishing cryptographic proof chains that can be used for:
- Verifying authenticity and proof-of-ownership of certificates
- Tracking credit or commitments between individuals
- Creating chains of trust where each link requires mutual agreement
What makes libqaeda particularly flexible is its modular design. It offers customizable components for cryptography implementations, data storage backends, and trust management - allowing developers to adapt it to various environments from servers to mobile devices. While currently in alpha development status and not safe in any way, libqaeda shows promise as a foundation for applications requiring strong cryptographic verification of bilateral agreements.
Java Native Interface
JNI makes it possible to interact with native code( code written in C , C++ , Assembly).
It is useful in the following cases:
- Reusing existing native libraries in your java app
- Accessing low-level system APIs.
- Implementing JVM into a native application.
- Performance critical tasks such as gaming.
How JNI Works 1. Java calls the native methods which are declared with the native keyword. 2. The native code is compiled into a shared library (.so on Linux/Android, .dll on WIndows) 3. JVM loads the library at runtime and executes native functions.
The Challenge
We wanted to use the C library in the Android app, but we faced a few challenges:
- The library was originally built for desktop systems, not Android
- Android needs code compiled for specific CPU architectures like arm64-v8a
- There were dependencies on specific C libraries not available in Android
Step 1: Define the Java Interface
First, I created a Java class that declares the native methods I wanted to use:
``` package org.defalsified.android.badged.services;
public class LibQaeda { static { System.loadLibrary("qaeda"); }
public native long createDummyStore(); public native String dummyContentGet(int payloadType, long storePtr, byte[] key);
} ``` The static block loads our native library, and the native methods t
ell Java these functions are implemented in C.
Step 2: Create the JNI Function Implementations
Next, I created a C file that implements the Java native methods: ```
include
include
include "libqaeda/src/lq/store.h"
include "libqaeda/src/lq/err.h"
include
// Functions from the library extern int lq_dummy_content_get(enum payload_e typ, LQStore store, const char key, size_t key_len, char value, size_t value_len); extern struct lq_store_t LQDummyContent;
// JNI implementation JNIEXPORT jlong JNICALL Java_org_defalsified_android_badged_services_LibQaeda_createDummyStore (JNIEnv env, jobject thiz) { LQStore store = (LQStore)malloc(sizeof(LQStore)); store = LQDummyContent; return (jlong)store; }
JNIEXPORT jstring JNICALL Java_org_defalsified_android_badged_services_LibQaeda_dummyContentGet (JNIEnv env, jobject thiz, jint payloadType, jlong storePtr, jbyteArray key) { LQStore store = (LQStore)storePtr; jbyte keyBytes = (env)->GetByteArrayElements(env, key, NULL); jsize keyLength = (env)->GetArrayLength(env, key);
char value[4096] = {0}; size_t valueLen = sizeof(value); int result = lq_dummy_content_get( (enum payload_e)payloadType, store, (const char*)keyBytes, (size_t)keyLength, value, &valueLen ); (*env)->ReleaseByteArrayElements(env, key, keyBytes, JNI_ABORT); if (result != 0) { return NULL; } return (*env)->NewStringUTF(env, value);
} ``` The function names must match the Java class and method names, prefixed with Java_ and using underscores for package separators.
Step 3: Set Up CMake to Build the Native Library
The key step was creating a CMakeLists.txt file to build our native library. Initially, I tried to use the pre-built library, but it was incompatible with Android. So I decided to directly compile the necessary source files:
``` cmake_minimum_required(VERSION 3.10) project(badged_app)
set(LIBQAEDA_DIR ${CMAKE_CURRENT_SOURCE_DIR}/libqaeda) set(LIBQAEDA_SRC_DIR ${LIBQAEDA_DIR}/src)
include_directories( ${CMAKE_CURRENT_SOURCE_DIR} ${LIBQAEDA_SRC_DIR} ${LIBQAEDA_SRC_DIR}/aux/include ${LIBQAEDA_SRC_DIR}/aux/liblash/src ${LIBQAEDA_SRC_DIR}/aux/liblash/src/hex ${LIBQAEDA_SRC_DIR}/aux/liblash/src/rerr )
Create qaeda library with all required source files
add_library(qaeda SHARED ${CMAKE_CURRENT_SOURCE_DIR}/org_defalsified_android_badged_services_LibQaeda.c ${LIBQAEDA_SRC_DIR}/store/dummy.c ${LIBQAEDA_SRC_DIR}/aux/liblash/src/hex/hex.c ${LIBQAEDA_SRC_DIR}/aux/liblash/src/rerr/rerr.c )
Link against Android libraries
target_link_libraries(qaeda android log atomic m )
Create main app library
add_library(badged SHARED native-lib.cpp )
Link app against our JNI wrapper
target_link_libraries(badged qaeda android log ) ``` Instead of trying to use a pre-built library, I included just the specific source files we needed for our minimal implementation.
Step 4: Configure the Android Project
In the app's build.gradle file, I added the CMake configuration:
``` android { // Other settings...
externalNativeBuild { cmake { path = file("src/main/cpp/CMakeLists.txt") version = "3.22.1" } } // Specify the NDK version to use ndkVersion = "25.1.8937393" // Configure for multiple architectures defaultConfig { ndk { abiFilters.addAll(listOf("armeabi-v7a", "arm64-v8a", "x86", "x86_64")) } }
} ```
Step 5: Use the Library in Your Android Activity
Finally, I used the library in my app:
``` public class MainActivity extends AppCompatActivity { private static final String TAG = "MainActivity";
@Override protected void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); TextView textView = new TextView(this); textView.setText("Welcome to Badges!"); try { LibQaeda libQaeda = new LibQaeda(); long storePtr = libQaeda.createDummyStore(); byte[] key = "test_key".getBytes(); String result = libQaeda.dummyContentGet(1, storePtr, key); textView.append("\n\nLibQaeda Test:\n" + result); } catch (Exception e) { textView.append("\n\nLibQaeda Test Error:\n" + e.getMessage()); } setContentView(textView); }
} ```
Key Lessons Learned
- Be careful with pre-built libraries for Android: Pre-built libraries need to be compiled specifically for Android's architectures (arm64-v8a, armeabi-v7a, x86, x86_64). If a library was built for desktop systems (like x86_64 Linux), it won't work on Android devices with different architectures.
- Consider direct compilation when needed: If you have access to the library's source code and encounter compatibility issues with pre-built versions, compiling the source files directly for Android can solve architecture incompatibility problems.
- Use Android NDK tools for cross-compilation: When you do need pre-built libraries, use the Android NDK's toolchain to properly cross-compile them for all target Android architectures.
- Be selective about which files to include: Only include the specific source files you need, which can reduce complexity and potential issues.
- Handle dependencies carefully: Make sure to include any header files and source code required by your library functions.
Conclusion
In this project, we successfully integrated a C library with an Android application using JNI. While this approach of directly compiling the necessary source files worked well for our immediate needs, there are other paths we could explore in the future. We may need to create an arm64 static library instead, but having the code running is an important first step. The JNI bridge provides a powerful way to leverage existing C/C++ code in Android applications. Whether you're working with algorithms, legacy systems, or performance-critical components, understanding how to connect Java and native code opens up many possibilities for Android development. By following the steps outlined in this blog post, you should now have the knowledge to integrate your own C libraries into Android applications, adapting the approach to your specific requirements. Adios!
-
@ ba36d0f7:cd802cba
2025-04-09 17:36:54¿Qué es un Jaque Mate?
Jaque mate es la jugada decisiva que termina la partida. Ocurre cuando el rey está bajo amenaza directa (en jaque) y no existe ningún movimiento legal que lo salve: ni capturar la pieza atacante, ni interponer una defensa, ni huir a una casilla segura.
A diferencia de otras piezas, el rey nunca puede ser capturado - su caída sería el fin del juego. Por eso, cuando no hay escape posible, la partida concluye inmediatamente. No es necesario "comerlo", pues su destino ya está sellado.
¿Cómo se llega al mate?
Requiere:- Amenaza inminente: Una o más piezas atacando al rey enemigo.
-
Bloqueo total: Todas las casillas de escape controladas por el rival.
-
Sin defensa posible: Ninguna pieza puede interceptar el ataque.
Ejemplo básico: El Mate del Pasillo (con torre o dama en la última fila, donde el rey no puede escapar por estar bloqueado por sus propias piezas).
1. El primer mandamiento ajedrecístico: Buscar el mate
En una partida, todo movimiento debería comenzar con una pregunta esencial: ¿Existe un jaque mate en esta posición? Tanto para uno mismo como para el rival. Si no lo hay, la partida se desarrolla en torno a la ventaja material o el control posicional. Pero este orden no es arbitrario: un descuido táctico puede arruinar una posición dominante, mientras que un mate pasado por alto significa la derrota inmediata.
Un ejemplo clásico es el Mate del Pastor (1.e4 e5 2.Ac4 Cc6 3.Dh5 Cf6?? 4.Dxf7#).
Las blancas ganan porque las negras, al enfocarse únicamente en el desarrollo, ignoraron la amenaza mortal.
➡ Reflexión: En la estrategia, como en la vida, lo urgente (sobrevivir) precede a lo importante (triunfar).
2. Filosofía del tablero: Cuando las ventajas no bastan
Un rey solitario puede escapar eternamente si el rival no sabe dar mate. De igual forma, en la existencia humana, las ventajas - ya sean talento, recursos o oportunidades - carecen de valor si no se materializan en acciones decisivas.
-
¿De qué sirve dominar el centro del tablero si no se sabe convertir esa ventaja en un ataque?
-
¿De qué sirven los privilegios si no se usan para construir algo significativo?
El ajedrez, al igual que la vida, no premia la acumulación, sino la ejecución.
3. El instinto de supervivencia: Entre el ataque y la resistencia
El miedo a la derrota desencadena reacciones viscerales: ataques desesperados, defensas obsesivas o incluso abandonos prematuros. Pero estas respuestas también revelan verdades profundas sobre la naturaleza humana:
-
Supervivencia no siempre significa violencia: Un rey acorralado puede refugiarse tras sus piezas, como un estratega que elige la paciencia sobre la confrontación. ¿Es cobardía o sabiduría?
-
El peligro del ego: La arrogancia ("debo ganar rápido") conduce a errores irreparables. La humildad ("resistiré hasta que el rival se equivoque") puede convertir una derrota anunciada en una salvación.
➡ Reflexión: El tablero no miente. Cada jugada expone los instintos más profundos del jugador: miedo, ambición o templanza.
Recursos en linea
-
Jaque mate - Chess.com https://www.chess.com/es/terms/jaque-mate-ajedrez
-
Los 10 mates más rápidos que existen - Chess.com https://www.chess.com/es/article/view/jaques-mates-rapidos-ajedrez
-
Aprendiendo a realizar jaque mates básicos - Lichess.org https://lichess.org/study/iQ5KuZ0y/g87kp3nS
-
Ejercicios Mate en 1 - Lichess.org https://lichess.org/study/buY7UIv2/wze0wPRL
-
Patrones de mates - Lichess.org https://lichess.org/study/HqgY3Z1I/Sv4QhDIb
-
Ejercicios Mate en 5 - Lichess.org https://lichess.org/study/VQEv9Cxr
article #chess #ajedrez #elsalvador #ajedrezelsalvador #somachess
- Amenaza inminente: Una o más piezas atacando al rey enemigo.
-
@ 378562cd:a6fc6773
2025-04-09 17:11:25So, this is the way I see things...
Bitcoin’s rise is not merely a technological revolution—it serves as a masterclass in game theory unfolding in real time. At its core, game theory examines how individuals make decisions when outcomes rely on the choices of others. Bitcoin adoption adheres to this model precisely.
Imagine a global network where each new participant increases the value and security of the system. Early adopters take a risk, hoping others will follow. The incentive to join grows stronger as more people opt in—whether out of curiosity, conviction, or FOMO. No one wants to be last to the party, especially if that party rewrites financial history.
Here’s how the game theory of adoption plays out:
-
🧠 First movers take risks but gain the most—they enter when the price is low and the potential is high.
-
👀 Everyone watches everyone else—people, companies, and countries are scanning the field for the next move.
-
The network effect kicks in—the more players are in the game, the more valuable and secure the system becomes.
-
⏳ Waiting can cost you—as adoption grows, the price of entry rises, making hesitation expensive.
-
No one wants to be left behind—especially in a global economy battling inflation and instability.
Game theory tells us that smart players make decisions that bring them the most goodies. As Bitcoin gets more popular, it’s like a party that’s really heating up, and you don’t want to be the one left outside! In this thrilling game, the early bird doesn’t just get the worm—it lands a juicy opportunity in a brand-new way to spend money. So don’t dawdle; now’s the time to jump in and grab your piece of this financial fiesta!
-
-
@ c253bd19:7911dadc
2025-04-09 16:52:54Welcome to my overly technical green nook and follow me as I explore the possibility of becoming partially self reliant in terms of produce in an urban setting with only limited resources and effort. 🌱🌱
I was going to write a cool lengthy article explaining my motivation. Explaining how I got here and why I want to do what I want to do. I had all the punchy lines ready and I spend a decent amount of time on the first draft. Some parts were even pretty good. But then I realized that the audience of this content probably already knows that something is off. That some parts of our world are just broken. That we need to do something. We can feel it in our bones. The great uneasiness. I realized I'd be preaching to the choir for most part and I therefore decided to park my lengthy article. At least for now.
I am just going to lay out 3 quick thoughts for you to ponder and then I am going to jump straight in. Alright, here it goes:
-
I do software engineering for living. I used to love it for the freedom and creativity. I still like it but I feel like most of my projects have no meaning and add no real world value. You might say this is just a typical case of burnout. But I think that we might be interpreting burnout wrong. Maybe it's just our inner voice telling us to put our skills and efforts towards something meaningful. Maybe we should not fight it. Maybe we should listen.
-
I think our world has become overly complex. I think technology and complicated systems bring a lot of convenience and comfort but I also think that sometimes we go too far and we give up control of our lives. The complexity often hides poor design and occasionally even ill intentions - seeking profit no matter the cost. I think some things should remain small-scale, simple, transparent, and pure.
-
I value personal freedom but I also think we need to take responsibility for our actions, or lack of action. We use nebulous labels to transfer guilt and abstract problems away. The corporations are exploiting the poor countries. The corporations are killing the planet. It helps us sleep better at night. But in fact, the corporations are just groups of people. It's us exploiting each other. It's us destroying the plant. I think it's up to us to do something about it on the individual level. We don't need any grand plans, we just need to do something. Baby steps.
Loosely following the 3 points above, I set out to come up with a personal project that would be:
- technical and involve coding but at the same time has a very tangible final product
- has potential to improve my day-to-day life, is reproducible, and may inspire other people
- revolves around self-reliance, sustainability, and decreasing my environmental footprint
...and voila, I landed with microgreens. I've always had a green thumb and I have a ton of plants in my apartment. I also like to cook and I pay attention to my nutrition. Especially to the quality of the ingredients I use. Produce is a frequent flyer in my meals so naturally I was curious if I could maybe just grow some on my own. I wanted to see if I can opt out from the grocery industry for at least this little part of my nutritional intake. Baby steps, remember? Well, there's one catch. I am not exactly a farmer. Quite the opposite. I live in a tiny apartment in a big city and I don't have a garden (at least for now). That's why microgreens came into play. Being able to grow fresh greens indoors and within just a few days. With only limited supplies and space. That'd be pretty neat.
In my typical fashion, I jumped straight into it. I got some trays and some soil. I ordered some seeds and in just a couple days I successfully...made a huge mess. I hit all kinds of snags. There was soil everywhere. Majority of my crop went down with mold, and the few greens I actually harvested had soil all over them. Mmmm earthy. They were basically unusable. A great success!/s
I quickly realized that this is not the way to go. Sure, I could learn and make this work, but it was clear to me that this is not what I was looking for. I didn't exactly want to start a farm in my living room. I wanted to come up with a clever yet simple process. I wanted something that might take some effort initially but something that is a smooth sailing once set up. With that I went back to the drawing board.
My pilot attempt was a failure but I did learn a few things:
- soil = mess
- more variables means more things to go wrong
- precise and consistent watering is the key to success
For my next iteration I decided to go small and simple. I am going use my 3d printer to print a reusable tray suitable for bottom watering. I will use a coconut fiber mat as the growing medium in order to avoid all the soil mess. I am also thinking about using a simple grid laid on top of the mat to make the greens grow evenly and to make it easier to cut them once they are ready for harvest.
After a few (read countless) hours with Blender, I've got my prototype and the 3d printer warming up so stay tuned...
-
-
@ 866e0139:6a9334e5
2025-04-09 16:36:35
Autor: Bewegung für Neutralität. Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier.**
Der neue Schweizer Verteidigungsminister, Bundesrat Martin Pfister, wurde gewählt, weil er eine weitere Annäherung an die Nato und die Verteidigiungsstrukturen der EU befürwortet. Die «Bewegung für Neutralität» will ihm mit einem offenen Brief zeigen, dass die Basis anders denkt und die Neutralität hochhalten will. Wenn die Medien die Neutralität schon nicht vertreten, müssen wir es den Verantwortlichen selber sagen, in angemessener Deutlichkeit. Die Bewegung für Neutralität freut sich, wenn möglichst viele den offenen Brief unterzeichnen. (Text: Christoph Pfluger, Mit-Initiator).
Unter dem Titel «Hoffnungen, Sorgen und ein wachsamer Blick auf Ihre Arbeit» haben wir dem angehenden Bundesrat Martin Pfister einen offenen Brief geschrieben.\ \ Wir machen uns Sorgen, dass Druck auf ihn ausgeübt wird, sich der Nato weiter anzunähern und die Rüstungskosten der EU mitzutragen.\ \ Im Brief erinnern wir ihn an seinen Verfassungsauftrag (Art. 185), die Neutralität zu wahren und teilen ihm mit, dass seine Arbeit unter Beobachtung steht.\ \ Das Original des Briefes ist hier zu finden.
Herrn\ Martin Pfister\ 6319 Allenwinden\ \ 31. März 2025\ \ Hoffnungen, Sorgen und ein wachsamer Blick auf Ihre Arbeit\ \ Sehr geehrter Herr Bundesrat\ \ Wir möchten Sie ganz herzlich zu Ihrer Wahl in den Bundesrat beglückwünschen, ein Amt, das Sie dieser Tage antreten. Wir haben grosse Hoffnungen, dass Sie sich als Historiker der Wurzeln unseres Landes bewusst sind und sie durch Ihre Entscheidungen stärken. Die tragenden Werte der Eidgenossenschaft – Freiheit, Unabhängigkeit und direkte Demokratie – sind auch heute die Basis für eine Zukunft, die wir gerne den nächsten Generationen übergeben möchten.\ \ Alle diese Werte bauen auf der Neutralität. Denn wenn wir uns fremden Mächten und Militärbündnissen anschliessen oder auch nur «annähern», unterordnen wir uns Entscheidungen, die anderswo getroffen werden und irgendwelchen Interessen dienen. Wir verlieren damit nicht nur unsere Freiheit und unsere Unabhängigkeit, sondern auch das Primat des Souveräns und seiner direkt-demokratischen Instrumente.\ \ Wir hegen nicht nur Hoffnungen in Sie, wir haben auch Sorgen. Sie wurden gemäss allgemeiner Wahrnehmung mit den Stimmen derjenigen gewählt, die eine Öffnung gegenüber Allianzen anstreben und zu diesem Zweck die Neutralität «flexibilisieren», «aktualisieren» und «modernisieren» wollen.\ \ Wir halten diese «Flexibilisierung» für eine hochproblematische Position, die unser Land zu einer Parteinahme zwingt – und dies in einer Zeit, in der sich das bereits bestehende Kriegsgeschehen unvorhersehbar entwickelt und durchaus existenziell werden könnte.\ \ Die sichere Position in Konflikten Dritter ist die neutrale – nicht in schweigender, sondern in vermittelnder Haltung. Praktisch alle Kriege hätten durch frühzeitige Vermittlung durch eine neutrale Partei verhindert werden können.\ \ Eine Schweiz der guten Dienste muss deshalb neutral bleiben – nicht um Geschäfte zu machen, sondern um den Frieden zu gewinnen. Wir gehen davon aus, dass auch Sie das wollen.\ \ Wir befürchten aber auch, dass Druck auf Sie ausgeübt wird, nicht nur aus dem Parlament, sondern auch von fremden Kräften, die sich eine Beteiligung der Schweiz an Rüstungskosten wünschen oder sonstwie von einer kriegerischen Entwicklung profitieren. In vielen Ländern zählen Rüstungslobbies zu den verschwiegensten und mächtigsten Einflussgruppen.\ \ Wir hoffen, dass Sie diesem Druck standhalten, Ihrem Gewissen folgen und die Neutralität wahren, wie es gemäss Art. 185 der Bundesverfassung Ihr Auftrag als Bundesrat ist.\ \ Wir erlauben uns, Ihre Arbeit in diesem Sinn zu beobachten und Ihnen in angemessener Deutlichkeit mitzuteilen, wenn wir Ihren Verfassungsauftrag in Gefahr sehen.\ \ Wir wünschen Ihnen viel Weisheit und Erfolg in Ihrer grossen Aufgabe, die Ihnen das Schicksal so unerwartet gegeben hat und sichern Ihnen unsere Unterstützung bei der Wahrung der Neutralität zu. Wir wünschen uns eine Schweiz der guten Dienste und nicht der teuren Waffen.\ \ Mir vorzüglicher Hochachtung\ Der Vorstand der Bewegung für Neutralität:\ John C. Ermel\ Daniel Funk\ Alec Gagneux\ Dr. phil. Ariet Güttinger\ Peter König\ Christoph Pfluger\ Pia Rycroft\ Dr. phil. René Roca
u.v.m.
Hier kann der Brief unterzeichnet werden.
*«Die «Bewegung für Neutralität» wurde am 9. März 2025 als Verein gegründet. Er versteht sich als Trägerverein zur Unterstützung von lokalen Gruppen und Aktivisten, die sich für die Neutralität als Basis von Frieden, direkter Demokratie und eine Schweiz der guten Dienste einsetzen wollen. *
Die Friedenstaube fliegt auch in Ihr Postfach!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt. (Vorerst an alle, da wir den Mailversand testen, später ca. drei Mails pro Woche.).
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: milosz@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ 8d34bd24:414be32b
2025-04-09 14:45:28I was listening to “Ultimately with R.C. Sproul.” He made the comment that “Sin is so common that we don’t think it is that concerning, but it is especially concerning because it is so common.” This is so true.
I used to really look down on Adam and Eve for eating the forbidden fruit. I thought, “How hard is it to obey a single command? We have so many to obey today from God, government, parents, etc.” One day I finally realized two truths. Adam and Eve were adults, but they had not been around very long (the Bible doesn’t say how long, but the implication is not very long, maybe even as short as days after being created.) They didn’t have life experience. They also had never been lied to before. They weren’t looking at the world with suspicion. They lived in a perfect environment with a perfect, loving God. It would’ve never crossed their mind that a person would lie, so they trusted the lie instead of God.
Today, we live in a sinful, fallen world. Everyone lies. Everyone steals. Everyone is unkind. Everyone has selfish motives. Yes, there is a difference in how often and how “bad” the lie, the theft, the motive, or the unkindness, but sin is everywhere. We get used to it and it seems normal. When we act the same way, it doesn’t seem that bad. We just took a pen home from work, nobody will miss it. We just told the person what they wanted to hear, so we won’t hurt their feelings. It is only a little white lie. Yes, I was unkind, but that person really deserved it because they were worse. We think this way and excuse our sins because we aren’t as bad as someone else.
I’ve noticed as I’ve grown older that the age when you become old keeps getting older and older. Old is always a little bit older than I am. When I was 10, a teenager was really old. When I was 16, an 18 year old was an adult and old. When I was 20, a 40 year old was old. When I was 50, a 65 year old was old. Old keeps getting older because my reference is myself. The truth is that I am getting older. I am on the downhill slide. I am closer to death than I am to birth. My arbitrary, moving reference doesn’t change this fact.
In the same way, when we look at sin, we have the same problem. We are always looking for someone who sins worse to make us look better and to excuse our sins. We compare ourselves to sinful men instead of our perfect, holy, sinless Savior.
In an earlier post, I made the comparison of the lights in the sky. If you go outside on a dark, moonless night, you will see the stars in the sky shining. They seem bright, but some are brighter than others. You can compare the brightness of the stars and call some brighter and others darker, but when the sun rises, you can’t see any light from the stars. Their light is drowned out by the light of the sun. The sun is so much brighter that it is as if the stars don’t produce any light at all.
In the same way, we may do some good things. When we compare our good deeds to others, we may look better, but when the true reference, the Son of God is our reference, our good works look like they don’t exist at all. The differences between the best person and the worst person are insignificant, just like the brightness of the brightest star and the dimmest star seems insignificant when compared with the brightness of the Sun.
The cool thing is that there is another light in the sky, the moon. The moon doesn’t have any light of its own, but it is the second brightest light in the sky. Why? Because it reflects the light of the sun. We should be the same way. We will never measure up if we seek to be good and sinless. We will never meet the standard that Jesus set for us with His perfect, sinless, sacrificial life, but we can reflect the glory of Jesus in our lives.
Yes, when we sin, we can hurt others, but who are we really sinning against? David knows.
Be gracious to me, O God, according to Your lovingkindness;\ According to the greatness of Your compassion blot out my transgressions.\ Wash me thoroughly from my iniquity\ And cleanse me from my sin.\ For I know my transgressions,\ And my sin is ever before me.\ **Against You, You only, I have sinned\ And done what is evil in Your sight,\ So that You are justified when You speak\ And blameless when You judge.\ Behold, I was brought forth in iniquity,\ And in sin my mother conceived me.\ Behold, You desire truth in the innermost being,\ And in the hidden part You will make me know wisdom. (Psalm 51:1-6) {emphasis mine}
Yes, our sins can hurt other people and do, but the true damage is to the glory of our generous Creator God. We must confess our sins to God first and then to anyone we have hurt. We must accept that we deserve any judgement God gives us because He created us and everyone and everything with which we interact. Our allegiance, submission, and worship is due to our Creator God.
Because we can never fully understand how abhorrent sin is to God, I thought I’d share how a godly man, the priest and prophet, Ezra, reacted to sin among his brethren.
When I heard about this matter, I tore my garment and my robe, and pulled some of the hair from my head and my beard, and sat down appalled. Then everyone who trembled at the words of the God of Israel on account of the unfaithfulness of the exiles gathered to me, and I sat appalled until the evening offering.
But at the evening offering I arose from my humiliation, even with my garment and my robe torn, and I fell on my knees and stretched out my hands to the Lord my God; and I said, “O my God, I am ashamed and embarrassed to lift up my face to You, my God, for our iniquities have risen above our heads and our guilt has grown even to the heavens. Since the days of our fathers to this day we have been in great guilt, and on account of our iniquities we, our kings and our priests have been given into the hand of the kings of the lands, to the sword, to captivity and to plunder and to open shame, as it is this day. But now for a brief moment grace has been shown from the Lord our God, to leave us an escaped remnant and to give us a peg in His holy place, that our God may enlighten our eyes and grant us a little reviving in our bondage. (Ezra 9:3-8) {emphasis mine}
Ezra sees sin, shreds his clothes, pulls out his hair, and sits appalled. Do we feel even a fraction of the horror at guilt that Ezra showed? When faced with some Israelites marrying non-Israelite (many from the banned people groups), Ezra admits that “our iniquities have risen above our heads and our guilt has grown even to the heavens.” How many of us would think that was only a little sin or that since it was only a few people, it wasn’t that important? Ezra, instead of saying, “Why did you send us into exile for 70 years and why are you not blessing us now?” said, “But now for a brief moment grace has been shown from the Lord our God.” Instead of accusing God of not being good enough or kind enough, thanks God for His grace which was completely undeserved. If only we could look at sin in this way.
After all that has come upon us for our evil deeds and our great guilt, since You our God have requited us less than our iniquities deserve, and have given us an escaped remnant as this, (Ezra 9:13) {emphasis mine}
Ezra understood that we all deserve only judgment. Every good thing we receive is only due to God’s grace. Instead of asking why God would allow a bad thing to happen to us, we should be asking why God is so gracious to give us good things in our lives and not give us nothing but punishment.
Jesus also talked about our sins. Although it is good, when we are tempted to sin, to choose to not sin, even evil thoughts are sins. They mean our minds and hearts are not fully submitted to God.
“You have heard that the ancients were told, ‘You shall not commit murder’ and ‘Whoever commits murder shall be liable to the court.’ But I say to you that everyone who is angry with his brother shall be guilty before the court; and whoever says to his brother, ‘You good-for-nothing,’ shall be guilty before the supreme court; and whoever says, ‘You fool,’ shall be guilty enough to go into the fiery hell. Therefore if you are presenting your offering at the altar, and there remember that your brother has something against you, leave your offering there before the altar and go; first be reconciled to your brother, and then come and present your offering. Make friends quickly with your opponent at law while you are with him on the way, so that your opponent may not hand you over to the judge, and the judge to the officer, and you be thrown into prison. Truly I say to you, you will not come out of there until you have paid up the last cent.
“You have heard that it was said, ‘You shall not commit adultery’; but I say to you that everyone who looks at a woman with lust for her has already committed adultery with her in his heart. If your right eye makes you stumble, tear it out and throw it from you; for it is better for you to lose one of the parts of your body, than for your whole body to be thrown into hell. If your right hand makes you stumble, cut it off and throw it from you; for it is better for you to lose one of the parts of your body, than for your whole body to go into hell.
“It was said, ‘Whoever sends his wife away, let him give her a certificate of divorce’; but I say to you that everyone who divorces his wife, except for the reason of unchastity, makes her commit adultery; and whoever marries a divorced woman commits adultery.
“Again, you have heard that the ancients were told, ‘You shall not make false vows, but shall fulfill your vows to the Lord.’ But I say to you, make no oath at all, either by heaven, for it is the throne of God, or by the earth, for it is the footstool of His feet, or by Jerusalem, for it is the city of the great King. Nor shall you make an oath by your head, for you cannot make one hair white or black. But let your statement be, ‘Yes, yes’ or ‘No, no’; anything beyond these is of evil.
“You have heard that it was said, ‘An eye for an eye, and a tooth for a tooth.’ But I say to you, do not resist an evil person; but whoever slaps you on your right cheek, turn the other to him also. If anyone wants to sue you and take your shirt, let him have your coat also. Whoever forces you to go one mile, go with him two. Give to him who asks of you, and do not turn away from him who wants to borrow from you.
“You have heard that it was said, ‘You shall love your neighbor and hate your enemy.’ But I say to you, love your enemies and pray for those who persecute you, so that you may be sons of your Father who is in heaven; for He causes His sun to rise on the evil and the good, and sends rain on the righteous and the unrighteous. For if you love those who love you, what reward do you have? Do not even the tax collectors do the same? If you greet only your brothers, what more are you doing than others? Do not even the Gentiles do the same? Therefore you are to be perfect, as your heavenly Father is perfect. (Matthew 5:21-48) {emphasis mine}
Many people say that as New Testament believers, we are not under the Old Covenant and the Old Testament laws do not apply to us. While that may be true of the ceremonial laws, the truth is that Jesus made the laws stricter. It is still true that we are not to commit murder, but we are also not to hate another. It is still true that we are not to commit adultery, but we are also not to lust after another. We are also not to fight against those who mistreat us and we are to love those who hate us. Jesus expects more, not less, maybe because we now have the guidance and power of the Holy Spirit within us.
If we have the mind of Christ, we should despise the things God hates. If we have the heart of Christ, we should love even those who hate us and we should seek their eternal good. We should see with the eyes of Christ and see the hurt behind the hate and dishonesty. How do we do this? We need to fill our minds with the word of God. We need to obey Paul’s command to those in Philippi:
Finally, brethren, whatever is true, whatever is honorable, whatever is right, whatever is pure, whatever is lovely, whatever is of good repute, if there is any excellence and if anything worthy of praise, dwell on these things. (Philippians 4:8)
We need to so fill our mind with God’s word that God’s goodness overflows into our lives.
God of heaven, please change our hearts and minds and make them fully aligned with your heart and mind. Help us to see sin as you see sin and to see people as you see people. Help us to see the hurt instead of the lashing out, so we can have a merciful heart towards those who are unkind to us. Help us to fill our minds with your goodness and your word, so there is no room for evil in us. Make us more like you.
Trust Jesus
FYI, there are many people who can’t see their own sin and who discount the severity of sin. I am writing for these people. There are also people who have no trouble seeing their own sin. Their problem is not accepting the forgiveness of God. Never doubt that God has forgiven you if you have confessed your sins and trusted Jesus as Savior. Jesus has covered your sins and the Father sees only the holiness of Jesus. Your relationship with the Godhead is fully reconciled. You should do right out of thankfulness and love of God, but there is nothing else you need to do to be saved and have a right relationship with God.
-
@ 0f9da413:01bd07d7
2025-04-09 14:23:54หลังจากที่เดินทางเกือบ 18 ชั่วโมงเราก็มาถึงหาดใหญ่กันแล้ว ช่วงระยะเวลาที่อยู่บนรถไฟเป็นอะไรที่เรี่ยเปี่ยมากๆ นั่งมองข้างทางส่วนมีเหตุการณ์อะไรนั่น ติดตามบทความพิเศษได้เร็วๆ นี้ ผมก็ได้พบเจอเพื่อนบน nostr ท่านหนึ่งที่อยู่หาดใหญ่อาสาพาทัวร์ในหาดใหญ่แห่งนี้ กัปตันนั่นเอง ขนาดชื่อเล่นจริงๆ ยังไม่เคยถามหลังจากที่ดูใน btcmap แล้วพบว่าร้านเปิดตอนกลางคืน ซึ่งเรามีเวลาคืนเดียวในการอยู่ที่หาดใหญ่ ดังนั้นหลังจากช่วงกลางวันพาทัวร์แถวสงขลากันแล้ว ก็ได้พากลับมาตามล่าหาร้านรับ bitcoin lighting ในหาดใหญ่ มีอยู่สามสถานที่ แต่มีเพียงสองร้าน คือ
Soymilk Toyou ฉือฉาง และ น้ำเต้าหู้ SOYMILK TOYOU
น้ำเต้าหูหลากหลายรสชาติ มีอยู่สองสาขาอยู่บริเวณ ตลาดโต้รุ่งฉื่อฉาง และ ถนนปุณณกัณฑ์ สาขาแรกอยู่ในตลาดโต้รุ่ง ร้านเล็กๆ เหมาะกับการชื้อกลับ และอีกร้านหนึ่งอยู่บริเวณเป็นร้านที่เหมาะกับนั่งทานที่ร้าน ซึ่งมีเต้าหู้หลากหลายรสชาติ ให้เลือกจนตาลายกันเลยทีเดียว สำหรับสาขา ถนนปุณณภัณฑ์นั้นมีเมนูเพิ่มเติมอย่าง เฉาก๋วยนมสด พุดติ้ง เต้าถึง และเฉาก๊วยโบราณ สาขานี้ลักษณะร้านออกแนวเกาหลีหน่อยๆ ซึ่งก็ค่อนข้างเหมาะกับชื่อร้านเหมือนกัน ค่อนข้างได้ฟิลพอสมควร ซึ่งผมเองกับกัปตันเองก็ได้แวะทั้งสองร้าน 4 แก้ว น่าจะเป็นเบาหวานเร็วๆ นี้ แต่ยังมีอีกหลากหลายอย่างที่ผมยังไม่ได้ลองชิม คราวหน้าอาจจะต้องได้ไปแวะใช้บริการอีกครั้ง ทั้งสองสาขานี้มีป้ายรับ bitcoin lighting ด้วยซึ่งอาจจะต้องสังเกตกันนิดหนึ่ง หากต้องการใช้งาน ซึ่งทั้งสองร้านนี้ก็สปีนประมาณ 5,820 sats
Soymilk Toyou ฉือฉาง (ตลาดโต้รุ่งฉื่อฉาง)
Google-map: https://maps.app.goo.gl/1PUVX3wkuzLBrQjw7
BTC-map: https://btcmap.org/merchant/node:12351330907
น้ำเต้าหู้ SOYMILK TOYOU (ถนนปุณณกัณฑ์)
Google-map: https://maps.app.goo.gl/FFaZSXKEvGwKvrwZ7
BTC-map: https://btcmap.org/merchant/node:12346018233
และเมื่อผมและกัปตันต้อง spin sats ทั้งสองร้านก็กลายเป็นว่าได้น้ำตาลมาหน่อยๆ แต่ไหนๆก็มาแล้วจะไม่ใช้ก็อย่างไรอยู่ ซึ่งรสชาติก็แตกต่างกันไปตามที่เราได้สั่ง ส่วนตัวเองสาขาตลาดโต้รุ่งฉื่อฉาง ผมสั่งน้ำเต้าหู้ธรรมดา และสาขา ถนนปุณณกัณฑ์ ก็น้ำลำใยบวกกับพุดติ้งเมนูของร้าน น้ำตาลน่าจะสไปรท์กันสุดๆแล้วละ 555+
ดูด(Dude) หลังจากเมากับความหวานทั้งสองสาขากันไปแล้ว เอ้ยนี่เราจะลุยกันต่อเรอะ เออว่ะ ก็กูนอนที่หาดใหญ่แค่คืนเดียวแล้วดันก็เปิดแค่กลางคืนด้วย ก็คงต้องอัดหน้าท้องแล้วละ กับอีกร้านหนึ่งที่รับ sats กับร้าน ดูด(Dude)
หากดูในแผนที่อยู่ระหว่างกลางร้านก่อนหน้าทั้งสองสาขา กึ่งกลางพอดิบพอดี ร้านนี้เป็นร้านขายเครื่องดื่มและกับแกล้มและมีกับข้าวช่วงเย็น เป็นบาร์กลางคืน ไม่มีเบียร์เหล้าขายนะ (ในใจนึกว่าจะมีเสียอีก) แต่หากอยากจ่าย lighting อาจจะต้องแจ้งกับเจ้าของร้านหน่อยเพราะไม่เจอป้ายรับ lighting เราก็อัดน้ำถังไปอีกคนละแก้ว (แก้วถังที่ใส่น้ำแข็งเยอะๆ) นั่งคุยกันเพลินๆ ซึ่งทั้งสามร้านเราก็เมากับน้ำหวาน มีกับแกล้มซึ่งกินไม่ค่อยไหวแล้วเพราะไปเปย์สาวๆตอนเย็นไปแล้ว เอ้ย และร้านท้ายนี้หมดไปทั้งหมด 6,809 sats
Google-map: https://maps.app.goo.gl/41Tsj4GLWvm7M6TC6
BTC-map: https://btcmap.org/merchant/node:12478715046
จบกันแล้วสำหรับสองร้านในหาดใหญ่ ตามบน BTC-map ถือว่าเราได้ไปครบแล้วในหาดใหญ่ ซึ่งโซนบริเวณภาคใต้นี่เป็นสถานที่ที่ผมซึ่งเป็นคนเหนือเองอยากจะได้เยี่ยมชมแวะไปหาและอยากไปเรียนรู้เกี่ยวกับวัฒนธรรมที่นี้ มันมีอะไรที่ผมอยากจะค้นหาและตามลิ้มลองรสชาติของอาหารปักใต้ แน่นอนยังมีอีกหลายสถานที่ที่กำลังจะมีให้ใช้งานในอนาคต ร้านค้าที่เกี่ยวข้องที่รับ lighting ซึ่งพอมีเยอะๆแล้วก็คงตามไล่ไปแวะชิมก็น่าจะไม่หมดแน่นอน อย่างน้อยๆ ผมเองก็ได้แวะไปเที่ยวหาเพื่อนที่อยู่บน nostr ที่นั่นที่นี้ แม้จะระยะเวลาสั้นๆ แต่ก็ถือว่าเป็นครั้งแรกที่ได้แวะเที่ยวหาดใหญ่ เที่ยวสงขลา ถ่ายรูปกับรูปนางเงือกหาดสมิลา (กัปตันบอกลูบนมเลย ไม่เอากลัวได้แฟนที่นี้ เอ้าไปที่ไหนก็กลัวหมด บวชพระป่ะ 555+)
แต่เพลงนี้มันเพราะจริงๆ นะถึงแม้จะเศร้านิดหน่อย ไปตรงนั่นได้ยังไง และจุดสุดท้ายนั่นคือเชียงใหม่ ซึ่งช่วงระหว่างกำลังจะขึ้นเครื่องไปเชียงใหม่ อ้าวเกิดแผ่นดินไหวชะงั้น ซึ่งเชียงใหม่นั้น มีร้านใน btcmap เยอะพอสมควรและมีแวะไปร้านหนึ่งกลายเป็นว่าไม่รับชะแล้ว จะมีกี่ร้านที่ผมไปแวะเยี่ยมชิม ติดตามใน ตอนสุดท้ายในบทความกับ ep4
ท้ายนี้ผมเปิดเพจบนเมนสตรีมละเน้อ ตามได้ในเพจ ไปกับจิ๊บ (บนเฟสบุ๊ค) ผมคงเอาไว้แอบติดตามเพื่อนบน nostr บนเฟสบุ๊คที่พอที่จะติดตามได้บ้าง น่าจะได้อ่านอะไรต่างๆที่ใหลมา คงเอาไว้เขียนรีวิวประสบการณ์การท่องเที่ยวส่วนตัว เพื่อนสมัยเรียนผมเคยบอกว่ามึงไปเที่ยวบ่อยมึงไม่เขียนลงบ้างวะ ไม่เอาขี้เกียจวะ ไม่รู้จะดึงพลังงานตอนทำเพจสมัยมอปลายได้หรือไม่ ก็ไม่รู้เหมือนกัน เอาไว้ส่องๆโปรไฟล์ใครบน nostr ที่อยู่บนเฟสแหละ ฮ่าๆ เป็นเพจอยากเล่าอะไรก็อยากเล่า และแว๊บไปคอมเมนต์เพื่อนๆ บน nostr บ้าง ขอบคุณครับ
-
@ 7bc05901:8c26d22b
2025-04-09 14:15:31My wife (girlfriend at the time) and I were heading back from Nashville after celebrating the opening of Bitcoin Park in Nashville. My boy Ryan had, once again, drug me to a Bitcoin event in the waning days of my stubborn shitcoinery. This event was the nail in the coffin for those days, and I'm happy to say the "stay humble stack sats" message finally permeated.
My wife is a dedicated reseller, her family has been flipping garage sale finds and auction grabs for years, so we rarely see a flea market or antique mall that we pass up. Somewhere between Missouri and Nashville we pulled off the highway to check out a spot in a dying but (if you squint your eyes and imagine it is 50 years in the past) a picturesque little town.
We were in my little Scion FRS, a two door sports car, so when I came across an old newspaper vending machine, I had to do a lot of geometry to figure out if I could shove this thing in the Scion. I concluded that my girlfriend would have to ride in the backseat for the remaining three hour drive if I really wanted to scoop up this vending machine, because it was too wide to slide into the trunk. Even though she knew I had an infatuation for retro newspaper things and was encouraging me to buy it, I declined. Probably the right call, but I still think about that thing -- the price was right.
I don't know what I would have done with it, but I have for years produced various hobbyist newspaper zines focusing on local political issues that I distributed from the coffeeshop that I worked at in my small town. The idea was hitting so hard when the social media censorship conversation was at a fever pitch after 2016 -- You can't censor a copy machine, I kept thinking. Analog zines, I was convinced, were the future.
I hadn't thought through decentralized social media protocols, but I did get really tired of distributing zines that nobody was excited to pay me for. Copying, organizing, stapling. I should have known I didn't have the patience to maintain that, or the finances.
Even established local news corporations, especially in my town, are struggling to justify a print version. This wasn't the case a quarter of a century ago.
My dad would stop at the Casey's convenience story every morning on the way into town, as he took us to school. If you brought your own travel mug, it was only fifty cents to fill up your cup of coffee. Nearly everyday, he would also come out with a copy of the local newspaper: The Daily Journal. The price was right around a dollar for the paper. It might have even been cheaper, like fifty or seventy-five cents.
The idea I am inching towards in this post, is that if every person valued the distribution of local (and global) news to the tune of a buck or a buck fifty, we could see the re-emergence sustaining news ecosystems. A buck fifty is almost two thousand sats today -- imagine if each appreciator of local news set aside just a thousand sats a day to zap news distributors. If there was a bias for following and amplifying local news events in each user's town, which tend to get a lot of attention on the centralized social media platforms, I think an entirely new value-4-value journalism enterprise model could emerge.
It may be important to start tinkering on a client that is built specifically for newspapers. I am not sure which features would be critical, but as the normies trickle over to the uncensorable social media protocol -- let's be ready.
-
@ fbf0e434:e1be6a39
2025-04-09 14:09:08Hackathon 概要
近日, Sonic DeFAI 黑客松圆满落幕,在 Sonic 区块链生态系统中掀起参与热潮与创新风暴。此次活动共吸引 822 名开发者注册,最终 47 个项目通过审核。在四周赛程里,参赛者们开发新型 AI 代理,角逐总计 29.5 万美元的奖池。这些代理旨在参与社交及链上活动,助力提升 DeFAI(人工智能驱动的去中心化金融)。
赛事核心创新聚焦自主代理整合,部分亮点项目运用 Zerebro 及其开源框架 ZerePy,展现了 Sonic 每秒 10000 笔交易(TPS)的高处理性能与次秒级最终性,同时凸显其与以太坊的无缝流动性集成优势。
本次黑客松评审标准注重技术实施、设计、潜在影响力及创意,提交项目由行业专家团队评估,其中包括 Sonic Labs 首席执行官 Michael Kong。活动充分突显 Sonic 通过创新 AI 应用与强大区块链基础设施,推动去中心化金融未来发展的实力。
Hackathon 获胜者
最佳代理综合奖获奖者
- Shogun: DeFAi super vault's - 一个由 AI 驱动的 DeFi 协议,通过动态资本分配和再平衡来优化去中心化金融金库的收益。
- Nuvolari.Ai - 利用 AI 代理提高链上财务决策的个人理财助手。
- Hyper Sonic - 一个支持表情包币创新的去中心化枢纽,整合了博彩市场、启动平台和 AI 驱动的功能。
- Paintswap Game Engine - 一个 Web3 dApp,通过 AI 驱动的提示实现游戏创作,民主化游戏开发过程。
- SUPERSONIC - 一个由 AI 驱动的平台,自动识别 Web3 生态系统中的套利机会。
最佳社交代理奖获奖者
- Memegents - 结合 AI 和区块链创建个性化 AI 代理和加密货币代币。
- deChat: AI-Powered DeFi Interface for Sonic - 一个 AI 聊天界面,通过自然语言命令简化 DeFi 交互。
- CurtAIs - 通过一个集成 Telegram 的知识库促进 Sonic Labs 的引导。
最佳 DeFAI 代理奖获奖者
- SonicChat - 一个整合钱包管理、交易分析和 AI 驱动见解的平台。
- NoRugz - 促进 meme 币的创建和推广,并与社交媒体集成。
- Shiami - DeFAI for Everyone on Sonic - 一个简化 Sonic 上 DeFi 操作的便捷聊天机器人。
最佳工具代理奖获奖者
- Sonic's Risk Watch - 提供 Sonic 生态系统中的风险评估和投资组合优化。
- Knowscroll - 将社交媒体转化为 AI 生成内容的微学习体验。
最佳 deBridge 集成奖获奖者
- Crème'ai - 一个由 AI 驱动的投资组合顾问,通过实时数据优化加密管理。
- deChat: AI-Powered DeFi Interface for Sonic
- DogBone - 一个简化 DeFi 交互的平台,利用自动化和自然语言处理。
最佳 Allora 集成奖获奖者
- Sonic TradeZo - 一个去中心化、匿名的 AI 驱动博彩游戏,配有 AI 交易代理。
- Shogun: DeFAi super vault's
- AIm — Artificial Intelligence Manager - 自动化创建 AI 驱动的 DeFi 代理以优化 Sonic 上的财务交互。
DWF Labs 赞助的赛道奖获奖者
- Shogun: DeFAi super vault's
- Crème'ai
- EdgerAI - 利用基于社交信号和智能合约的链上交易策略。
有关项目的完整列表,请访问 Sonic DeFAI Hackathon 页面。
关于组织者
Sonic Labs
Sonic Labs 专注于区块链解决方案,利用在去中心化技术方面的广泛专业知识。该组织开发了提升数据安全性和交易效率的项目,并因创建可扩展的区块链基础设施和实施智能合约而闻名。目前,Sonic Labs 通过主导各种计划来实现无缝区块链技术集成,专注于扩大其在各个领域的影响。
-
@ fbf0e434:e1be6a39
2025-04-09 14:07:49Hackathon 概要
EurekaHACKS 是加拿大奥克维尔市 Abbey Park 高中主办的年度 12 小时黑客马拉松,主要面向高中生群体。今年共有 92 名参与者,最终 51 个项目通过审核。作为哈顿地区规模最大的高中生黑客马拉松之一,活动开设技术研讨会,提供超 7000 美元奖金,营造出充满竞争的氛围。
赛事分设多个奖项:“最佳整体 Hack” 获奖者可获 Bambu Lab A1 Minis,亚军能得到 Red Dragon 机械键盘;其他奖项用于表彰在本地影响力、创造力及技术专长方面表现突出的项目。其中,运用 Internet Computer Protocol(ICP)的项目最高可获 500 美元奖励,涉及 Vectara 的项目可获 300 美元积分。技术研讨会环节还设有 Jane Street 卡片、泡泡茶及各类代金券等奖励。
这场黑客马拉松将年轻创新者汇聚一堂,激发创造力,促进技术技能提升,同时彰显了当地社区的高度参与。
Hackathon 获奖者
标准赛道奖项得主
2025 年 EurekaHacks 标准赛道的参赛者需让项目贴合特定主题,由此催生出多样的技术创新成果。
最佳整体Hack
- FaunaDex: 这款应用通过使用AI识别真实动物并提供详细信息来促进自然探索,鼓励户外活动和学习。
亚军Hack
- ArcaneStep: 将网页游戏与现实中的身体活动结合,ArcaneStep激励孩子们通过行走收集法力以施放法术,旨在减少屏幕时间。
终极编码者第三名
- LocalLink: LocalLink利用地理空间技术连接户外空间中的个人,以促进社区参与,提供即时、有意义的互动。
最佳本地影响
- Gems: Gems是一个基于地图的界面,促进城市探索,使用户能够发现和分享独特的地点,增强探索体验。
最具触感
- Greenlight: 这个游戏化应用鼓励户外活动,用户可通过体育锻炼和自然互动获得积分。
最佳展示
- The Moss Garden: The Moss Garden旨在提高用户的生产力,通过自然主题的网站来增强与自然的联系,提高专注力和心理健康。
终极编码者最佳年轻黑客
- socialize.ai: 利用AI代理,socialize.ai为在线互动提供对话提示和反向图像搜索功能,以增强社交互动。
如需获取完整项目列表,请访问 EurekaHacks 2025 Buidl Page。
关于主办方
EurekaHACKS
EurekaHACKS以促进技术创新着称,特别是在区块链和技术开发领域。通过组织各种hackathons,它连接了技术爱好者并支持协作项目开发。这些活动推动了去中心化应用程序的显著进展,为区块链社区做出了重要贡献。EurekaHACKS目前专注于培养新的人才,并通过教育项目和专项活动推广可持续技术解决方案。
-
@ c892835e:4d87bc55
2025-04-09 12:51:31Marketing digital para bancar a base prestação de serviço tambem
estudar ingles e as parada toda bitcoin programação russo
-
@ c892835e:4d87bc55
2025-04-09 12:49:20primeira 3
-
@ 8ba93868:44bdde52
2025-04-09 12:42:31ola
-
@ 8ba93868:44bdde52
2025-04-09 12:22:12primeira segunda
-
@ 6152ca12:e3742e80
2025-04-09 11:53:16Uau estou aprendendo isso parece complicado mas vamos la; aos pouco pego o jeito hehe
-
@ 04c195f1:3329a1da
2025-04-09 10:54:43The old world order is crumbling. What was once considered stable and unshakable—the American-led global framework established after World War II—is now rapidly disintegrating. From the fraying fabric of NATO to the self-serving protectionism of Trump’s renewed presidency, the signals are clear: the empire that once held the Western world together is retreating. And in the vacuum it leaves behind, a new power must emerge.
The question is: will Europe finally seize this moment?
For decades, Europe has relied on the illusion of safety under an American umbrella. This dependency allowed us to indulge in what can only be described as “luxury politics.” Instead of strengthening our core institutions—defense, infrastructure, energy independence—we poured our energy into ideological experiments: value-based governance, multiculturalism, aggressive climate goals, and endless layers of bureaucracy.
We let ourselves believe history had ended. That war, scarcity, and geopolitical struggle were things of the past. That our greatest challenges would be inclusivity, carbon credits, and data protection regulations.
But history, as always, had other plans.
Trump, Nationalist Hope and Hard Reality
Across Europe, many nationalists and conservatives initially welcomed Donald Trump. He rejected the tenets of liberal globalism, called out the absurdities of woke ideology, and promised a return to realism. In a world saturated by progressive conformity, he seemed like a disruptive breath of fresh air.
And to a certain extent, he was.
But history will likely remember his presidency not for culture wars or conservative rhetoric—but for something far more consequential: the dismantling of the American empire.
What we are witnessing under Trump is the accelerated withdrawal of the United States from its role as global enforcer. Whether by design or incompetence, the result is the same. American institutions are retracting, its alliances are fraying, and its strategic grip on Europe is loosening.
For Americans, this may seem like decline. For Europe, it is an opportunity—an uncomfortable, painful, but necessary opportunity.
This is our chance to break free from the American yoke and step into the world as a sovereign power in our own right.
The End of Illusions
Europe is not a weak continent. We have a population larger than the United States, an economy that outpaces Russia’s many times over, and centuries of civilizational strength behind us. But we have been kept fragmented, distracted, and dependent—by design.
Both Washington and Moscow have an interest in a divided, impotent Europe. American strategists see us as junior partners at best, liabilities at worst. Russian elites, like Sergey Karaganov, openly admit their goal is to push Europe off the global stage. China, for its part, eyes our markets while quietly maneuvering to undermine our autonomy.
But something is changing.
In Brussels, even the ideologically captured technocrats are beginning to see the writing on the wall. Overbearing regulations like GDPR are being reconsidered. The long-pushed Equal Treatment Directive—a pan-European anti-discrimination law—may finally be scrapped. These are small signs, but signs nonetheless. Europe is waking up.
From Fracture to Foundation
To build something new, the old must first fall. That collapse is now well underway.
The collapse of American hegemony does not mean the rise of chaos—it means the opening of a path. Europe has a choice: continue to drift, clinging to broken institutions and obsolete alliances, or embrace the challenge of becoming a serious actor in a multipolar world.
This does not mean copying the imperial ambitions of others. Europe’s strength will not come from domination, but from independence, coherence, and confidence. A strong Europe is not one ruled from Brussels, but one composed of strong, rooted nations acting together in strategic alignment. Not a federation, not an empire in the classical sense—but a civilization asserting its right to survive and thrive on its own terms.
At the same time, we must not fall into the trap of romantic isolationism. Some nationalists still cling to the idea that their nation alone can stand firm on the global stage, detached from continental collaboration. That vision no longer matches the geopolitical reality. The world has changed, and so must our strategy. In key areas—such as defense, border security, trade policy, and technological sovereignty—Europe must act with unity and purpose. This does not require dissolving national identities; it requires mature cooperation among free nations. To retreat into purely national silos would be to condemn Europe to irrelevance. Strengthening the right kind of European cooperation—while returning power in other areas to the national level—is not a betrayal of nationalism, but its necessary evolution.
A Third Position: Beyond East and West
As the American empire stumbles and Russia attempts to fill the void, Europe must not become a pawn in someone else’s game. Our task is not to shift allegiance from one master to another—but to step into sovereignty. This is not about trading Washington for Moscow, or Beijing. It is about rejecting all external domination and asserting our own geopolitical will.
A truly pro-European nationalism must recognize that our civilizational future lies not in nostalgia or subservience, but in strategic clarity. We must build a third position—a pole of stability and power that stands apart from the decaying empires of the past.
That requires sacrifice, but it also promises freedom.
Hope Through Action
There is a romantic notion among some European nationalists that decline is inevitable—that we are simply passengers on a sinking ship. But fatalism is not tradition. It is surrender.
Our ancestors did not build cathedrals, repel invaders, or chart the globe by giving in to despair. They acted—often against impossible odds—because they believed in a Europe worth fighting for.
We must now rediscover that spirit.
This is not a call for uniformity, but for unity. Not for empire, but for sovereignty. Not for nostalgia, but for renewal. Across the continent, a new consciousness is stirring. From the Alps to the Baltic, from Lisbon to Helsinki, there are voices calling for something more than submission to global markets and American whims.
They are calling for Europe.
The Hour Has Come
There may not be a second chance. The tide of history is turning, and the next ten years will determine whether Europe reclaims its role in the world—or becomes a museum piece, mourned by tourists and remembered by none.
This is not the end.
It is our beginning—if we are brave enough to seize it.
■
-
@ 7d33ba57:1b82db35
2025-04-09 08:25:02Sagres, perched on the dramatic cliffs of Portugal’s Algarve, feels like the end of the world—and in the best way. It's a small, laid-back town with a surfer vibe, windswept beaches, and rugged coastal views that are simply breathtaking. If you’re into nature, chill vibes, and jaw-dropping sunsets, Sagres is your spot.
🌟 Top Things to See & Do in Sagres
1️⃣ Cabo de São Vicente (Cape St. Vincent)
- The southwesternmost point of mainland Europe
- Home to a dramatic cliffside lighthouse and epic sunsets
- Once thought to be the "end of the world" in ancient times
2️⃣ Fortaleza de Sagres
- A 15th-century fortress with a giant stone compass, sea views, and a coastal walking path
- Linked to Henry the Navigator and Portugal’s Age of Discoveries
- Simple, scenic, and full of history
3️⃣ Surf the Waves 🌊
- Some of the best surfing beaches in Europe
- Try Praia do Tonel or Praia do Beliche—great for both beginners and pros
- Tons of surf schools and rental shops around town
4️⃣ Chill on the Beaches
- Praia da Mareta – calm and central, perfect for swimming
- Praia do Beliche – surrounded by cliffs, more secluded
- Praia do Martinhal – family-friendly with shallow water
5️⃣ Coastal Hiking & Cliffs
- Walk along the Rota Vicentina trails for raw Atlantic views, wildflowers, and sea breeze
- Bring water and a camera—it's a nature-lover’s dream
🍽️ What to Eat in Sagres
- Fresh seafood – grilled sardines, octopus salad, and cataplana
- Percebes (goose barnacles) – a local delicacy from the rocks
- Pastéis de nata – always a good idea ☕
- Pair it all with a cold Super Bock or a glass of vinho verde
Try beachside spots or cozy taverns in town—nothing too fancy, just simple, tasty, and fresh.
🏄 Vibe & Tips
✅ Sagres is quiet, remote, and windswept—perfect if you're looking to unwind
✅ Great for vanlifers, surfers, hikers, and sunset chasers
✅ Bring layers—it can be windy, even in summer
✅ Sunsets at Cabo de São Vicente are legendary—get there early for a good spot
✅ A car helps to explore the nearby coastlines and hidden beaches -
@ 39cc53c9:27168656
2025-04-09 07:59:35The new website is finally live! I put in a lot of hard work over the past months on it. I'm proud to say that it's out now and it looks pretty cool, at least to me!
Why rewrite it all?
The old kycnot.me site was built using Python with Flask about two years ago. Since then, I've gained a lot more experience with Golang and coding in general. Trying to update that old codebase, which had a lot of design flaws, would have been a bad idea. It would have been like building on an unstable foundation.
That's why I made the decision to rewrite the entire application. Initially, I chose to use SvelteKit with JavaScript. I did manage to create a stable site that looked similar to the new one, but it required Jav aScript to work. As I kept coding, I started feeling like I was repeating "the Python mistake". I was writing the app in a language I wasn't very familiar with (just like when I was learning Python at that mom ent), and I wasn't happy with the code. It felt like spaghetti code all the time.
So, I made a complete U-turn and started over, this time using Golang. While I'm not as proficient in Golang as I am in Python now, I find it to be a very enjoyable language to code with. Most aof my recent pr ojects have been written in Golang, and I'm getting the hang of it. I tried to make the best decisions I could and structure the code as well as possible. Of course, there's still room for improvement, which I'll address in future updates.
Now I have a more maintainable website that can scale much better. It uses a real database instead of a JSON file like the old site, and I can add many more features. Since I chose to go with Golang, I mad e the "tradeoff" of not using JavaScript at all, so all the rendering load falls on the server. But I believe it's a tradeoff that's worth it.
What's new
- UI/UX - I've designed a new logo and color palette for kycnot.me. I think it looks pretty cool and cypherpunk. I am not a graphic designer, but I think I did a decent work and I put a lot of thinking on it to make it pleasant!
- Point system - The new point system provides more detailed information about the listings, and can be expanded to cover additional features across all services. Anyone can request a new point!
- ToS Scrapper: I've implemented a powerful automated terms-of-service scrapper that collects all the ToS pages from the listings. It saves you from the hassle of reading the ToS by listing the lines that are suspiciously related to KYC/AML practices. This is still in development and it will improve for sure, but it works pretty fine right now!
- Search bar - The new search bar allows you to easily filter services. It performs a full-text search on the Title, Description, Category, and Tags of all the services. Looking for VPN services? Just search for "vpn"!
- Transparency - To be more transparent, all discussions about services now take place publicly on GitLab. I won't be answering any e-mails (an auto-reply will prompt to write to the corresponding Gitlab issue). This ensures that all service-related matters are publicly accessible and recorded. Additionally, there's a real-time audits page that displays database changes.
- Listing Requests - I have upgraded the request system. The new form allows you to directly request services or points without any extra steps. In the future, I plan to enable requests for specific changes to parts of the website.
- Lightweight and fast - The new site is lighter and faster than its predecessor!
- Tor and I2P - At last! kycnot.me is now officially on Tor and I2P!
How?
This rewrite has been a labor of love, in the end, I've been working on this for more than 3 months now. I don't have a team, so I work by myself on my free time, but I find great joy in helping people on their private journey with cryptocurrencies. Making it easier for individuals to use cryptocurrencies without KYC is a goal I am proud of!
If you appreciate my work, you can support me through the methods listed here. Alternatively, feel free to send me an email with a kind message!
Technical details
All the code is written in Golang, the website makes use of the chi router for the routing part. I also make use of BigCache for caching database requests. There is 0 JavaScript, so all the rendering load falls on the server, this means it needed to be efficient enough to not drawn with a few users since the old site was reporting about 2M requests per month on average (note that this are not unique users).
The database is running with mariadb, using gorm as the ORM. This is more than enough for this project. I started working with an
sqlite
database, but I ended up migrating to mariadb since it works better with JSON.The scraper is using chromedp combined with a series of keywords, regex and other logic. It runs every 24h and scraps all the services. You can find the scraper code here.
The frontend is written using Golang Templates for the HTML, and TailwindCSS plus DaisyUI for the CSS classes framework. I also use some plain CSS, but it's minimal.
The requests forms is the only part of the project that requires JavaScript to be enabled. It is needed for parsing some from fields that are a bit complex and for the "captcha", which is a simple Proof of Work that runs on your browser, destinated to avoid spam. For this, I use mCaptcha.
-
@ 39cc53c9:27168656
2025-04-09 07:59:33Know Your Customer is a regulation that requires companies of all sizes to verify the identity, suitability, and risks involved with maintaining a business relationship with a customer. Such procedures fit within the broader scope of anti-money laundering (AML) and counterterrorism financing (CTF) regulations.
Banks, exchanges, online business, mail providers, domain registrars... Everyone wants to know who you are before you can even opt for their service. Your personal information is flowing around the internet in the hands of "god-knows-who" and secured by "trust-me-bro military-grade encryption". Once your account is linked to your personal (and verified) identity, tracking you is just as easy as keeping logs on all these platforms.
Rights for Illusions
KYC processes aim to combat terrorist financing, money laundering, and other illicit activities. On the surface, KYC seems like a commendable initiative. I mean, who wouldn't want to halt terrorists and criminals in their tracks?
The logic behind KYC is: "If we mandate every financial service provider to identify their users, it becomes easier to pinpoint and apprehend the malicious actors."
However, terrorists and criminals are not precisely lining up to be identified. They're crafty. They may adopt false identities or find alternative strategies to continue their operations. Far from being outwitted, many times they're several steps ahead of regulations. Realistically, KYC might deter a small fraction – let's say about 1% ^1 – of these malefactors. Yet, the cost? All of us are saddled with the inconvenient process of identification just to use a service.
Under the rhetoric of "ensuring our safety", governments and institutions enact regulations that seem more out of a dystopian novel, gradually taking away our right to privacy.
To illustrate, consider a city where the mayor has rolled out facial recognition cameras in every nook and cranny. A band of criminals, intent on robbing a local store, rolls in with a stolen car, their faces obscured by masks and their bodies cloaked in all-black clothes. Once they've committed the crime and exited the city's boundaries, they switch vehicles and clothes out of the cameras' watchful eyes. The high-tech surveillance? It didn’t manage to identify or trace them. Yet, for every law-abiding citizen who merely wants to drive through the city or do some shopping, their movements and identities are constantly logged. The irony? This invasive tracking impacts all of us, just to catch the 1% ^1 of less-than-careful criminals.
KYC? Not you.
KYC creates barriers to participation in normal economic activity, to supposedly stop criminals. ^2
KYC puts barriers between many users and businesses. One of these comes from the fact that the process often requires multiple forms of identification, proof of address, and sometimes even financial records. For individuals in areas with poor record-keeping, non-recognized legal documents, or those who are unbanked, homeless or transient, obtaining these documents can be challenging, if not impossible.
For people who are not skilled with technology or just don't have access to it, there's also a barrier since KYC procedures are mostly online, leaving them inadvertently excluded.
Another barrier goes for the casual or one-time user, where they might not see the value in undergoing a rigorous KYC process, and these requirements can deter them from using the service altogether.
It also wipes some businesses out of the equation, since for smaller businesses, the costs associated with complying with KYC norms—from the actual process of gathering and submitting documents to potential delays in operations—can be prohibitive in economical and/or technical terms.
You're not welcome
Imagine a swanky new club in town with a strict "members only" sign. You hear the music, you see the lights, and you want in. You step up, ready to join, but suddenly there's a long list of criteria you must meet. After some time, you are finally checking all the boxes. But then the club rejects your membership with no clear reason why. You just weren't accepted. Frustrating, right?
This club scenario isn't too different from the fact that KYC is being used by many businesses as a convenient gatekeeping tool. A perfect excuse based on a "legal" procedure they are obliged to.
Even some exchanges may randomly use this to freeze and block funds from users, claiming these were "flagged" by a cryptic system that inspects the transactions. You are left hostage to their arbitrary decision to let you successfully pass the KYC procedure. If you choose to sidestep their invasive process, they might just hold onto your funds indefinitely.
Your identity has been stolen
KYC data has been found to be for sale on many dark net markets^3. Exchanges may have leaks or hacks, and such leaks contain very sensitive data. We're talking about the full monty: passport or ID scans, proof of address, and even those awkward selfies where you're holding up your ID next to your face. All this data is being left to the mercy of the (mostly) "trust-me-bro" security systems of such companies. Quite scary, isn't it?
As cheap as $10 for 100 documents, with discounts applying for those who buy in bulk, the personal identities of innocent users who passed KYC procedures are for sale. ^3
In short, if you have ever passed the KYC/AML process of a crypto exchange, your privacy is at risk of being compromised, or it might even have already been compromised.
(they) Know Your Coins
You may already know that Bitcoin and most cryptocurrencies have a transparent public blockchain, meaning that all data is shown unencrypted for everyone to see and recorded forever. If you link an address you own to your identity through KYC, for example, by sending an amount from a KYC exchange to it, your Bitcoin is no longer pseudonymous and can then be traced.
If, for instance, you send Bitcoin from such an identified address to another KYC'ed address (say, from a friend), everyone having access to that address-identity link information (exchanges, governments, hackers, etc.) will be able to associate that transaction and know who you are transacting with.
Conclusions
To sum up, KYC does not protect individuals; rather, it's a threat to our privacy, freedom, security and integrity. Sensible information flowing through the internet is thrown into chaos by dubious security measures. It puts borders between many potential customers and businesses, and it helps governments and companies track innocent users. That's the chaos KYC has stirred.
The criminals are using stolen identities from companies that gathered them thanks to these very same regulations that were supposed to combat them. Criminals always know how to circumvent such regulations. In the end, normal people are the most affected by these policies.
The threat that KYC poses to individuals in terms of privacy, security and freedom is not to be neglected. And if we don’t start challenging these systems and questioning their efficacy, we are just one step closer to the dystopian future that is now foreseeable.
Edited 20/03/2024 * Add reference to the 1% statement on Rights for Illusions section to an article where Chainalysis found that only 0.34% of the transaction volume with cryptocurrencies in 2023 was attributable to criminal activity ^1
-
@ 39cc53c9:27168656
2025-04-09 07:59:32Over the past few months, I've dedicated my time to a complete rewrite of the kycnot.me website. The technology stack remains unchanged; Golang paired with TailwindCSS. However, I've made some design choices in this iteration that I believe significantly enhance the site. Particularly to backend code.
UI Improvements
You'll notice a refreshed UI that retains the original concept but has some notable enhancements. The service list view is now more visually engaging, it displays additional information in a more aesthetically pleasing manner. Both filtering and searching functionalities have been optimized for speed and user experience.
Service pages have been also redesigned to highlight key information at the top, with the KYC Level box always accessible. The display of service attributes is now more visually intuitive.
The request form, especially the Captcha, has undergone substantial improvements. The new self-made Captcha is robust, addressing the reliability issues encountered with the previous version.
Terms of Service Summarizer
A significant upgrade is the Terms of Service summarizer/reviewer, now powered by AI (GPT-4-turbo). It efficiently condenses each service's ToS, extracting and presenting critical points, including any warnings. Summaries are updated monthly, processing over 40 ToS pages via the OpenAI API using a self-crafted and thoroughly tested prompt.
Nostr Comments
I've integrated a comment section for each service using Nostr. For guidance on using this feature, visit the dedicated how-to page.
Database
The backend database has transitioned to pocketbase, an open-source Golang backend that has been a pleasure to work with. I maintain an updated fork of the Golang SDK for pocketbase at pluja/pocketbase.
Scoring
The scoring algorithm has also been refined to be more fair. Despite I had considered its removal due to the complexity it adds (it is very difficult to design a fair scoring system), some users highlighted its value, so I kept it. The updated algorithm is available open source.
Listings
Each listing has been re-evaluated, and the ones that were no longer operational were removed. New additions are included, and the backlog of pending services will be addressed progressively, since I still have access to the old database.
API
The API now offers more comprehensive data. For more details, check here.
About Page
The About page has been restructured for brevity and clarity.
Other Changes
Extensive changes have been implemented in the server-side logic, since the whole code base was re-written from the ground up. I may discuss these in a future post, but for now, I consider the current version to be just a bit beyond beta, and additional updates are planned in the coming weeks.
-
@ 39cc53c9:27168656
2025-04-09 07:59:28Bitcoin enthusiasts frequently and correctly remark how much value it adds to Bitcoin not to have a face, a leader, or a central authority behind it. This particularity means there isn't a single person to exert control over, or a single human point of failure who could become corrupt or harmful to the project.
Because of this, it is said that no other coin can be equally valuable as Bitcoin in terms of decentralization and trustworthiness. Bitcoin is unique not just for being first, but also because of how the events behind its inception developed. This implies that, from Bitcoin onwards, any coin created would have been created by someone, consequently having an authority behind it. For this and some other reasons, some people refer to Bitcoin as "The Immaculate Conception".
While other coins may have their own unique features and advantages, they may not be able to replicate Bitcoin's community-driven nature. However, one other cryptocurrency shares a similar story of mystery behind its creation: Monero.
History of Monero
Bytecoin and CryptoNote
In March 2014, a Bitcointalk thread titled "Bytecoin. Secure, private, untraceable since 2012" was initiated by a user under the nickname "DStrange"^1^. DStrange presented Bytecoin (BCN) as a unique cryptocurrency, in operation since July 2012. Unlike Bitcoin, it employed a new algorithm known as CryptoNote.
DStrange apparently stumbled upon the Bytecoin website by chance while mining a dying bitcoin fork, and decided to create a thread on Bitcointalk^1^. This sparked curiosity among some users, who wondered how could Bytecoin remain unnoticed since its alleged launch in 2012 until then^2^.
Some time after, a user brought up the "CryptoNote v2.0" whitepaper for the first time, underlining its innovative features^4^. Authored by the pseudonymous Nicolas van Saberhagen in October 2013, the CryptoNote v2 whitepaper^5^ highlighted the traceability and privacy problems in Bitcoin. Saberhagen argued that these flaws could not be quickly fixed, suggesting it would be more efficient to start a new project rather than trying to patch the original^5^, an statement simmilar to the one from Satoshi Nakamoto^6^.
Checking with Saberhagen's digital signature, the release date of the whitepaper seemed correct, which would mean that Cryptonote (v1) was created in 2012^7^, although there's an important detail: "Signing time is from the clock on the signer's computer" ^9^.
Moreover, the whitepaper v1 contains a footnote link to a Bitcointalk post dated May 5, 2013^10^, making it impossible for the whitepaper to have been signed and released on December 12, 2012.
As the narrative developed, users discovered that a significant 80% portion of Bytecoin had been pre-mined^11^ and blockchain dates seemed to be faked to make it look like it had been operating since 2012, leading to controversy surrounding the project.
The origins of CryptoNote and Bytecoin remain mysterious, leaving suspicions of a possible scam attempt, although the whitepaper had a good amount of work and thought on it.
The fork
In April 2014, the Bitcointalk user
thankful_for_today
, who had also participated in the Bytecoin thread^12^, announced plans to launch a Bytecoin fork named Bitmonero^13^.The primary motivation behind this fork was "Because there is a number of technical and marketing issues I wanted to do differently. And also because I like ideas and technology and I want it to succeed"^14^. This time Bitmonero did things different from Bytecoin: there was no premine or instamine, and no portion of the block reward went to development.
However, thankful_for_today proposed controversial changes that the community disagreed with. Johnny Mnemonic relates the events surrounding Bitmonero and thankful_for_today in a Bitcointalk comment^15^:
When thankful_for_today launched BitMonero [...] he ignored everything that was discussed and just did what he wanted. The block reward was considerably steeper than what everyone was expecting. He also moved forward with 1-minute block times despite everyone's concerns about the increase of orphan blocks. He also didn't address the tail emission concern that should've (in my opinion) been in the code at launch time. Basically, he messed everything up. Then, he disappeared.
After disappearing for a while, thankful_for_today returned to find that the community had taken over the project. Johnny Mnemonic continues:
I, and others, started working on new forks that were closer to what everyone else was hoping for. [...] it was decided that the BitMonero project should just be taken over. There were like 9 or 10 interested parties at the time if my memory is correct. We voted on IRC to drop the "bit" from BitMonero and move forward with the project. Thankful_for_today suddenly resurfaced, and wasn't happy to learn the community had assumed control of the coin. He attempted to maintain his own fork (still calling it "BitMonero") for a while, but that quickly fell into obscurity.
The unfolding of these events show us the roots of Monero. Much like Satoshi Nakamoto, the creators behind CryptoNote/Bytecoin and thankful_for_today remain a mystery^17^, having disappeared without a trace. This enigma only adds to Monero's value.
Since community took over development, believing in the project's potential and its ability to be guided in a better direction, Monero was given one of Bitcoin's most important qualities: a leaderless nature. With no single face or entity directing its path, Monero is safe from potential corruption or harm from a "central authority".
The community continued developing Monero until today. Since then, Monero has undergone a lot of technological improvements, migrations and achievements such as RingCT and RandomX. It also has developed its own Community Crowdfundinc System, conferences such as MoneroKon and Monerotopia are taking place every year, and has a very active community around it.
Monero continues to develop with goals of privacy and security first, ease of use and efficiency second. ^16^
This stands as a testament to the power of a dedicated community operating without a central figure of authority. This decentralized approach aligns with the original ethos of cryptocurrency, making Monero a prime example of community-driven innovation. For this, I thank all the people involved in Monero, that lead it to where it is today.
If you find any information that seems incorrect, unclear or any missing important events, please contact me and I will make the necessary changes.
Sources of interest
- https://forum.getmonero.org/20/general-discussion/211/history-of-monero
- https://monero.stackexchange.com/questions/852/what-is-the-origin-of-monero-and-its-relationship-to-bytecoin
- https://en.wikipedia.org/wiki/Monero
- https://bitcointalk.org/index.php?topic=583449.0
- https://bitcointalk.org/index.php?topic=563821.0
- https://bitcointalk.org/index.php?action=profile;u=233561
- https://bitcointalk.org/index.php?topic=512747.0
- https://bitcointalk.org/index.php?topic=740112.0
- https://monero.stackexchange.com/a/1024
- https://inspec2t-project.eu/cryptocurrency-with-a-focus-on-anonymity-these-facts-are-known-about-monero/
- https://medium.com/coin-story/coin-perspective-13-riccardo-spagni-69ef82907bd1
- https://www.getmonero.org/resources/about/
- https://www.wired.com/2017/01/monero-drug-dealers-cryptocurrency-choice-fire/
- https://www.monero.how/why-monero-vs-bitcoin
- https://old.reddit.com/r/Monero/comments/u8e5yr/satoshi_nakamoto_talked_about_privacy_features/
-
@ 39cc53c9:27168656
2025-04-09 07:59:22“The future is there... staring back at us. Trying to make sense of the fiction we will have become.” — William Gibson.
This month is the 4th anniversary of kycnot.me. Thank you for being here.
Fifteen years ago, Satoshi Nakamoto introduced Bitcoin, a peer-to-peer electronic cash system: a decentralized currency free from government and institutional control. Nakamoto's whitepaper showed a vision for a financial system based on trustless transactions, secured by cryptography. Some time forward and KYC (Know Your Customer), AML (Anti-Money Laundering), and CTF (Counter-Terrorism Financing) regulations started to come into play.
What a paradox: to engage with a system designed for decentralization, privacy, and independence, we are forced to give away our personal details. Using Bitcoin in the economy requires revealing your identity, not just to the party you interact with, but also to third parties who must track and report the interaction. You are forced to give sensitive data to entities you don't, can't, and shouldn't trust. Information can never be kept 100% safe; there's always a risk. Information is power, who knows about you has control over you.
Information asymmetry creates imbalances of power. When entities have detailed knowledge about individuals, they can manipulate, influence, or exploit this information to their advantage. The accumulation of personal data by corporations and governments enables extensive surveillances.
Such practices, moreover, exclude individuals from traditional economic systems if their documentation doesn't meet arbitrary standards, reinforcing a dystopian divide. Small businesses are similarly burdened by the costs of implementing these regulations, hindering free market competition^1:
How will they keep this information safe? Why do they need my identity? Why do they force businesses to enforce such regulations? It's always for your safety, to protect you from the "bad". Your life is perpetually in danger: terrorists, money launderers, villains... so the government steps in to save us.
‟Hush now, baby, baby, don't you cry Mamma's gonna make all of your nightmares come true Mamma's gonna put all of her fears into you Mamma's gonna keep you right here, under her wing She won't let you fly, but she might let you sing Mamma's gonna keep baby cosy and warm” — Mother, Pink Floyd
We must resist any attack on our privacy and freedom. To do this, we must collaborate.
If you have a service, refuse to ask for KYC; find a way. Accept cryptocurrencies like Bitcoin and Monero. Commit to circular economies. Remove the need to go through the FIAT system. People need fiat money to use most services, but we can change that.
If you're a user, donate to and prefer using services that accept such currencies. Encourage your friends to accept cryptocurrencies as well. Boycott FIAT system to the greatest extent you possibly can.
This may sound utopian, but it can be achieved. This movement can't be stopped. Go kick the hornet's nest.
“We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.” — Eric Hughes, A Cypherpunk's Manifesto
The anniversary
Four years ago, I began exploring ways to use crypto without KYC. I bookmarked a few favorite services and thought sharing them to the world might be useful. That was the first version of kycnot.me — a simple list of about 15 services. Since then, I've added services, rewritten it three times, and improved it to what it is now.
kycnot.me has remained 100% independent and 100% open source^2 all these years. I've received offers to buy the site, all of which I have declined and will continue to decline. It has been DDoS attacked many times, but we made it through. I have also rewritten the whole site almost once per year (three times in four years).
The code and scoring algorithm are open source (contributions are welcome) and I can't arbitrarly change a service's score without adding or removing attributes, making any arbitrary alterations obvious if they were fake. You can even see the score summary for any service's score.
I'm a one-person team, dedicating my free time to this project. I hope to keep doing so for many more years. Again, thank you for being part of this.
-
@ a367f9eb:0633efea
2025-04-09 07:28:49WIEN – Diese Woche enthüllte Innenminister Gerhard Karner von der ÖVP, dass er einen Gesetzesentwurf "schnell" durchsetzen möchte, der der Regierung die Befugnis geben würde, verschlüsselte Kommunikation in Nachrichten-Apps zu überwachen.
Obwohl Karner betont hat, dass die neuen Befugnisse nur sehr gezielt eingesetzt würden, ist unklar, ob die Entwickler und Anbieter von Nachrichten-Apps gezwungen werden sollen, die Verschlüsselung zu brechen, um die Anordnungen durchzuführen.
Wie der stellvertretende Direktor des Consumer Choice Center, Yaël Ossowski, erklärte, würde diese Befugnis bedeuten, die Verschlüsselung für Millionen von österreichischen Verbrauchern zu untergraben und zu brechen.
„Jeder Versuch, die Verschlüsselung für einige ausgewählte Personen zu brechen, gefährdet gleichzeitig die Privatsphäre von Millionen von Österreichern. Dies ist weniger eine Frage der angemessenen Polizeibefugnisse als vielmehr eine Frage der technischen und sicherheitsrelevanten Aspekte. Schwächere Verschlüsselung macht österreichische Nutzer weniger sicher“ sagte Ossowski.
„Verschlüsselungsstandards von Apps wie Signal, WhatsApp und sogar iMessage aufzuheben, würde der österreichischen Regierung außergewöhnliche Befugnisse einräumen, die das Risiko bergen, jede und alle Kommunikation zu kompromittieren, nicht nur die von Verdächtigen oder Terroristen.
„Um gegen kriminelle Akteure vorzugehen, sollte die Koalition das bestehende Justizsystem nutzen, um Haftbefehle auf Grundlage eines begründeten Verdachts durchzusetzen, anstatt Messaging-Dienste und Apps dazu zu zwingen, diese Aufgabe für sie zu übernehmen“ erklärte Ossowski.
Das Consumer Choice Center weist darauf hin, dass ähnliche Versuche, die Verschlüsselung mit polizeilicher Gewalt zu brechen, bereits im Vereinigten Königreich und in Frankreich unternommen wurden, wo sie von Bürgerrechtsgruppen abgelehnt wurden.
###
Das Consumer Choice Center ist eine unabhängige, parteiunabhängige Verbraucherorganisation, die die Vorteile von Wahlfreiheit, Innovation und Wachstum im Alltagsleben für Verbraucher in über 100 Ländern fördert. Wir interessieren uns insbesondere für regulatorische Trends in Washington, Brüssel, Wien, Berlin, Ottawa, Brasília, London und Genf genau.
Erfahren Sie mehr auf consumerchoicecenter.org
-
@ d2554ae1:1e3208b1
2025-04-09 05:51:45Austrian Economics, the Fourth Turning, and the End of the Fiat Era
By DownWithBigBrother
The world is lurching through a period of unprecedented financial, political, and cultural upheaval. Inflation stubbornly persists, government debt has surged to unsustainable highs, bond markets are flashing red, and the institutional legitimacy of the West is crumbling under the weight of contradictions. Many wonder: is this the end of something—or the beginning?
From the vantage point of Austrian economics, this moment isn’t an anomaly. It’s the inevitable result of decades of interventionism, fiat monetary expansion, and distorted incentives. And when this lens is aligned with Ray Dalio’s long-term debt cycle, Strauss-Howe’s Fourth Turning theory, and historical precedent, a clear and troubling pattern emerges: we are in the final stages of a system that can no longer sustain itself.
⸻
The Austrian View: Malinvestment, Fiat Decay, and the Crack-Up Boom
Austrian economists warned us.
When central banks suppress interest rates below the natural rate, they distort the price of capital and create malinvestment across the economy. Asset bubbles form. Risk becomes mispriced. Government grows beyond its means. Eventually, the real structure of the economy collapses under its own weight.
Ludwig von Mises called it the crack-up boom: a moment when the public loses faith in the currency itself, accelerating toward hyperinflation or systemic reset.
Today, we see symptoms everywhere: • Short-term UK gilts faltering, despite higher yields—suggesting credit risk concerns in sovereign debt. • Central banks trapped, unable to raise rates without imploding debt servicing costs. • Pension funds relying on central bank liquidity, not investment returns. • People flocking to Bitcoin, gold, and hard assets, no longer trusting fiat promises.
This isn’t just a crisis of inflation. It’s a crisis of trust—of money, institutions, and narratives.
⸻
Ray Dalio’s Changing World Order: End of Empire, Debt, and Dominance
Ray Dalio, in Principles for Dealing with the Changing World Order, offers a complementary framework. He outlines the typical rise and fall of empires based on long-term debt cycles, reserve currency status, and geopolitical hegemony.
Dalio identifies several signs of a declining empire: • Unsustainable debt loads • Political polarization and populism • Declining education, productivity, and innovation • Rising external challengers (e.g. China, BRICS) • Devaluation of the currency to solve internal problems
Sound familiar?
The UK and U.S. fit this bill perfectly. Both are experiencing late-stage fiat dysfunction. Both are overstretched geopolitically. And both are losing internal coherence at the exact moment their adversaries gain strength.
In Dalio’s cycle, these forces typically lead to a changing global reserve currency, a new monetary system, and often—a major war.
⸻
The Fourth Turning: Crisis, Collapse, and Rebirth
Strauss and Howe’s generational theory offers a sociocultural overlay. They argued that every 80–100 years, Anglo-American civilizations undergo a “Fourth Turning”—a period of total institutional breakdown and civic realignment.
The last three Fourth Turnings: • The American Revolution (1776) • The Civil War (1861) • The Great Depression / World War II (1929–1945)
And now: 2008–2030.
The pattern is unmistakable: • Institutions lose credibility. • Society fractures along generational and ideological lines. • The old order resists collapse—but cannot reform. • Crisis breaks the system, and a new order emerges.
This isn’t prophecy. It’s a recurring cycle of institutional entropy followed by rebirth.
In this Fourth Turning, the fault lines are economic (debt, inequality), cultural (wokeism vs. tradition), technological (AI, surveillance), and monetary (fiat vs. Bitcoin).
⸻
Historical Echoes: Lessons from the Past
While our moment is unique, it echoes others: • Weimar Germany (1920s): Massive reparations debt, central bank money printing, social fragmentation—followed by authoritarianism. • Late Roman Empire: Currency debasement (clipping silver coins), overextension, loss of civic trust, internal decay. • French Revolution: State insolvency, rampant inflation, corrupt elite, and public uprising. • 1971–2025 (Modern West): Fiat detachment from gold, credit expansion, asset bubbles, pension fragility, war drums.
Each era collapsed under unsustainable monetary and political structures. Each ended with a reset, usually after pain, upheaval, and systemic failure.
⸻
What Comes Next: Bitcoin, Decentralization, and a Parallel Future
From an Austrian lens, the only sustainable future is built on sound money, decentralized decision-making, and organic community structures—not technocratic control.
Bitcoin represents more than a hedge. It is the lifeboat—the opt-out from a system that cannot be saved.
It aligns with all these frameworks: • Austrian: It restores monetary discipline, mimics gold with perfect scarcity, and resists state manipulation. • Dalio: It offers a neutral settlement layer amid collapsing fiat trust. • Fourth Turning: It is the generational technology of rebirth—decentralized, transparent, trustless.
Whether Bitcoin becomes the new monetary base or simply a parallel escape valve, it is central to the post-collapse architecture.
⸻
Conclusion: Clarity in the Collapse
The old world is dying. The fiat system is entering its terminal stage, unable to sustain the lies and leverage of the past 50 years. Austrian economics saw this coming. Dalio mapped its trajectory. Strauss and Howe timed the sociopolitical rupture. History confirms the pattern.
The only question now is how we prepare. • Do we cling to crumbling institutions, hoping for reforms that never come? • Or do we embrace the clarity of collapse, build resilient systems, and guide the next era?
Austrian thinkers remind us: the crash isn’t the failure—it’s the cure. A painful, necessary purge of decades of distortion.
The question is: will we have the courage to build what comes after?
⸻
-
@ 502ab02a:a2860397
2025-04-09 02:08:12ทอดมันปลาฉลาด ของอร่อยและโภชนาการดี ที่หายากเพราะคนไม่ค่อยทำ เวลาพูดถึงทอดมันปลา ภาพที่ลอยมาในหัวของหลายคนคงเป็นเนื้อปลาเด้ง ๆ รสเผ็ดนิด หอมใบมะกรูดหน่อย ทอดให้ขอบกรอบนิด ๆ กินร้อน ๆ กับน้ำจิ้มหวานเปรี้ยว ถ้าไปถามว่าทำจากปลาอะไร ส่วนใหญ่ก็คงตอบว่า "ปลากราย" ซึ่งก็ไม่แปลก เพราะปลากรายถือเป็นวัตถุดิบยอดนิยมสำหรับทอดมันมายาวนาน
แต่วันนี้ เราอยากชวนมาทำความรู้จักกับอีกหนึ่งตัวเลือกที่น่าสนใจ…ปลาที่ชื่อออกจะขี้เล่นหน่อย ๆ ว่า “ปลาฉลาด”
ปลาฉลาดเป็นปลาน้ำจืดที่คนพื้นที่รู้ดีว่าเนื้อแน่น รสหวานธรรมชาติ และมีกลิ่นคาวน้อยจนบางคนเปรียบว่า "ขูดแล้วแทบไม่ต้องปรุงอะไรเยอะก็หอม" แถมยังมีเนื้อที่เหนียวในแบบธรรมชาติ โดยไม่ต้องใส่แป้งเพิ่มให้เสีย texture เลยแม้แต่น้อย
ความน่าสนใจของทอดมันปลาฉลาดคือมันให้สัมผัสที่ดีมาก Real food แท้ๆเพราะเนื้อปลาฉลาดเหนียวด้วยตัวเอง ไม่ต้องพึ่งแป้งหรือสารช่วยคงตัวใดๆ และยังมีกลิ่นหอมแบบปลาแม่น้ำที่ไม่ฉุน ไม่คาวดิน ไม่รบกวนสมาธิการกิน
เวลาขูดเนื้อปลาฉลาด จะรู้สึกได้เลยว่าเนื้อมัน "มีชีวิตชีวา" คือไม่ใช่เนื้อนิ่มเปื่อย ยุ่ย หรือแห้งจนฝืดมือ แต่จะมีความแน่น นุ่ม และติดยางนิด ๆ พอเอาไปคลุกกับพริกแกงกระชายสดสักนิด ใบมะกรูดฝอยบาง ๆ สิ่งที่เราทำแตกต่างเล็กน้อยคือ ใช้ถั่วพลูแทนถั่วฝักยาว ตีไปเรื่อย ๆ จนเหนียวได้ที่ แล้วทอดบนไฟกลาง ๆ...เสียงฉ่าแรกที่ลงกระทะ จะมาพร้อมกลิ่นหอมที่เรียกคนทั้งบ้านให้เดินมาด้อม ๆ มอง ๆ ได้แบบไม่ต้องใช้คำโฆษณา
ในแง่โภชนาการ ปลาฉลาดให้โปรตีนสูง ไขมันต่ำ และที่สำคัญคือ ย่อยง่าย ไม่หนักท้อง เหมาะสำหรับคนที่อยากกินของทอดแต่ไม่อยากให้ร่างกายต้องทำงานหนักเกินไป แถมยังนำมาประยุกต์เป็นทอดมันสายโลว์คาร์บได้สบาย ๆ เพราะเนื้อปลายึดเกาะตัวได้เองโดยธรรมชาติความดีงามของเนื้อปลา โดยไม่ต้องเติมแป้งหรือแปรรูปอะไรเพิ่มเติมอีก
แม้ปลาฉลาดอาจไม่ได้หาซื้อสะดวกเท่าปลาที่เลี้ยงในระบบฟาร์มทั่วไป แต่นั่นแหละคือเสน่ห์ของมัน…มันคือวัตถุดิบที่พาเรา “กลับไปหาของจริง” ที่ธรรมชาติให้มา ไม่ต้องปรุงแต่งมากก็อร่อย
ไม่ต้องบอกว่าปลากรายดีหรือไม่ดี เพราะมันก็ดีในแบบของมัน แต่ถ้าวันใดคุณอยากลองเปิดใจให้กับของหายากอีกหนึ่งชนิด…ลองทอดมันปลาฉลาดดูสักครั้ง แล้วคุณจะเข้าใจว่า บางครั้ง ของที่ไม่ค่อยมีคนพูดถึง อาจเป็นของที่ “พูดแทนตัวเอง” ได้ดีที่สุด #siripun #ตำรับเอ๋
-
@ c230edd3:8ad4a712
2025-04-09 00:33:31Chef's notes
I found this recipe a couple years ago and have been addicted to it since. Its incredibly easy, and cheap to prep. Freeze the sausage in flat, single serving portions. That way it can be cooked from frozen for a fast, flavorful, and healthy lunch or dinner. I took inspiration from the video that contained this recipe, and almost always pan fry the frozen sausage with some baby broccoli. The steam cooks the broccoli and the fats from the sausage help it to sear, while infusing the vibrant flavors. Serve with some rice, if desired. I often use serrano peppers, due to limited produce availability. They work well for a little heat and nice flavor that is not overpowering.
Details
- ⏲️ Prep time: 25 min
- 🍳 Cook time: 15 min (only needed if cooking at time of prep)
- 🍽️ Servings: 10
Ingredients
- 4 lbs ground pork
- 12-15 cloves garlic, minced
- 6 Thai or Serrano peppers, rough chopped
- 1/4 c. lime juice
- 4 Tbsp fish sauce
- 1 Tbsp brown sugar
- 1/2 c. chopped cilantro
Directions
- Mix all ingredients in a large bowl.
- Portion and freeze, as desired.
- Sautè frozen portions in hot frying pan, with broccoli or other fresh veggies.
- Serve with rice or alone.
-
@ b099870e:f3ba8f5d
2025-04-08 23:22:24A donkey that is tied to a post by a rope will keep walking around the post is an attempt to free it self,only to become more immobilize and attached to the post.
ikigai
-
@ 878dff7c:037d18bc
2025-04-08 21:27:19Australian Median Home Value Increases by $230,000 Over Five Years
Summary:
Recent data from CoreLogic reveals that Australia's median home value has risen by approximately $230,000 over the past five years, marking a 39.1% increase. This significant dollar increase surpasses previous five-year periods, highlighting escalating affordability challenges. Factors contributing to this surge include a persistent imbalance between housing supply and demand, low stock levels, and lower long-term interest rates. Major cities like Sydney and Adelaide, as well as parts of regional New South Wales, exhibit some of the highest housing value-to-income ratios.
Sources: The Guardian - April 9, 2025
Reserve Bank of Australia Adjusts Money Market Operations
Summary:
The Reserve Bank of Australia announced an increase in the rate at which it lends to financial institutions in regular money market operations. This technical change is aimed at adjusting the pricing of its open market operations and is stated to have no implications for broader monetary policy. Sources: Reuters - April 9, 2025
BPCL and Sembcorp Form Joint Venture for Green Hydrogen Projects
Summary:
Bharat Petroleum Corporation Ltd (BPCL) and Sembcorp have entered into a joint venture to explore renewable energy and green hydrogen production projects across India. This collaboration aims to decarbonize hard-to-abate sectors and support India's ambitious climate goals by leveraging both companies' expertise in renewable energy solutions.
Sources: PV Magazine India - April 9, 2025
Moderate Earthquake Reported Near Yonakuni, Japan
Summary:
A magnitude 5.6 earthquake occurred after midnight on Wednesday, April 9, 2025, near Yonakuni, Yaeyama-gun, Okinawa, Japan. The earthquake struck at a depth of approximately 33 kilometers. There have been no immediate reports of damage or casualties.
Sources: Volcano Discovery - April 9, 2025
Peter Dutton Unveils Gas Reservation Policy to Reduce Energy Prices
Summary:
Opposition Leader Peter Dutton has introduced a gas reservation policy aimed at lowering energy prices in Australia. The plan requires gas companies to prioritize domestic supply over exports, projecting a 15% reduction in gas prices for industrial consumers and a 7% decrease in residential gas bills. The policy also includes a 25% cut in fuel excise for one year and expedited approvals for new gas projects. While modeling suggests potential benefits, analysts caution that consumer advantages may be delayed due to existing contracts and retail bill components.
Sources: News.com.au - April 9, 2025, The Australian - April 9, 2025
Greens Propose Abolition of Negative Gearing and Capital Gains Tax Discounts
Summary:
Greens leader Adam Bandt has proposed significant reforms to Australia's housing policies, including the abolition of capital gains tax discounts and negative gearing tax breaks for investment properties. The plan also includes a nationwide rent freeze. Bandt argues these measures are necessary to address housing affordability and support renters and first-home buyers. The Greens suggest limiting tax concessions to a single pre-existing investment property and banning them for future purchases or inheritances. Additionally, they propose a two-year rent freeze with subsequent increases capped at 2% every two years. Analysis indicates these reforms could raise home ownership rates and save renters billions. Bandt criticized Labor's $33 billion housing plan as insufficient and is also advocating for dental care to be included in Medicare, funded by higher corporate taxes.
Sources: The Australian - April 9, 2025, News.com.au - April 9, 2025
Australian Stock Market Rebounds Despite Tariff Threats
Summary:
The Australian stock market experienced a strong rebound, with the S&P/ASX 200 rising over 2.3% to close at 7,510 points. This recovery follows a sharp decline prompted by escalating global trade tensions. The rally suggests investor optimism despite the looming tariff conflict between the U.S. and China. The Australian dollar also saw a slight rebound, benefiting exporters.
Sources: The Guardian - April 8, 2025
Divers Left Stranded Off Perth Coast During Charter Expedition
Summary:
Two brothers were left stranded in the ocean during a diving expedition off the Perth coast after their charter boat allegedly departed without them. The incident occurred four kilometers offshore, and the pair was rescued by a passing Rottnest ferry after being spotted in distress. The divers have criticized the Perth Diving Academy for failing in their duty of care and have engaged legal representation.
Source: ABC News - April 9, 2025
Australian Beef Industry Resilient Amid Global Tariff Changes
Summary:
Despite recent U.S. tariffs, Australia's beef industry remains robust, with exports to the United States averaging $275 million a month in the six months to February. Industry insiders express confidence that the 10% tariff will not significantly impact exports, highlighting the sector's resilience and strong international demand.
Sources: Hindustan Times - April 9, 2025
US Imposes 104% Tariffs on Chinese Imports, Sparking Global Economic Concerns
Summary:
US President Donald Trump has announced a 104% tariff on Chinese imports, escalating trade tensions and raising fears of a global economic slowdown. China has threatened retaliation, prompting concerns about a full-scale trade war that could impact international markets, including Australia.
Sources: The Guardian - April 9, 2025
Massive Decline in Bogong Moth Population Raises Ecological Concerns
Summary:
The bogong moth, once abundant in Australia, has experienced a drastic population decline of up to 99.5% by 2019. Despite its ecological and cultural significance, the Australian government recently declined to list it as threatened, citing limited data. The moth plays a crucial role in alpine ecosystems and Indigenous cultures, serving as a key food source for species like the mountain pygmy possum. Experts are calling for nationwide research and conservation efforts to protect this iconic species.
Sources: The Guardian - April 9, 2025
Treasury Secretary Scott Bessent Discusses Trump's Tariff Plan and Its Impact on the Middle Class
Summary:
In this episode of The Tucker Carlson Show, Treasury Secretary Scott Bessent provides an in-depth analysis of President Trump's proposed tariff plan, focusing on its potential effects on the American middle class. Bessent outlines the administration's objectives behind implementing the tariffs and addresses concerns about possible economic repercussions. He emphasizes that the tariffs are designed to protect domestic industries and create jobs, asserting that any short-term price increases will be offset by long-term economic growth. The discussion also covers strategies to mitigate adverse impacts on consumers and the importance of fair trade practices in strengthening the U.S. economy.
Key Insights: - Protection of Domestic Industries: Bessent explains that the tariffs aim to shield American manufacturers from unfair foreign competition, thereby preserving and creating jobs within the country. - Short-Term vs. Long-Term Effects: While acknowledging potential immediate price hikes on certain goods, Bessent argues that the long-term benefits, including a more robust economy and job market, will outweigh these initial challenges. - Fair Trade Practices: The conversation highlights the administration's commitment to establishing equitable trade agreements that prevent exploitation of U.S. markets and ensure reciprocal benefits.
Sources: Treasury Secretary Scott Bessent Discusses Trump's Tariff Plan and Its Impact on the Middle Class
-
@ 4d41a7cb:7d3633cc
2025-04-08 20:45:34The most interesting relation that a lawyer holds to the community, outside of his technical occupation, is that of a legislator. Lawyers were the chief authors of the Constitution of the United States and of all the state constitutions.
It seems natural that lawyers should predominate in the government. They framed the former instrument. They both make and interpret the law.
Every time the text is in italics, it is a direct quote from the book.
Lawyers control every branch of the republican form of government: legislative, executive, and judicial. The influence of the lawyers is enormous, for good or for evil.
The lawyer has the supreme power of direction in the general exercise, commencement, and conduct of litigated or other legal matters. It lies with him to suggest and to direct. There is no arbiter over him but his conscience.
The duty of a lawyer is threefold: to the state, as an officer and citizen; to the court, as an officer and adviser; and to his client, as a fiduciary.
The crude sentiments of the people must be filtered through the lawyers, first as politicians, then as legislators, and afterwards as lawyers and judges.
Since lawyers are in charge of every government branch as ‘elected officials’ in representation of the people, education about morality and their duties and responsibilities is fundamental since in their hands lies the monopoly of violence held by the government.
Without contingent arrangements with lawyers, their power would become oppressive and tyrannical.
THE PROBLEM
“Permit me to issue and control the currency of a nation, and I care not who makes its laws.” Mayer Amschel Rothschild (1744-1812)
- Money was placed above rightness, truth, and justice. The incentive structure is inverted, and it's detrimental. Society is morally bankrupt above and below. Institutions are no better than the individuals who compose them.
- Common law was replaced by commercial code (encryption). Adding complexity, inefficiencies, costs, and capacity to trick and twist the law. The incentive structure is broken. Cheating pays more than playing clean; we have more lawyers but less justice.
- The lawyer is not educated about the spirit of the profession, his duty, and the form of government he’s supposed to protect. The interest of the client is put above the interest of the court and the nation. Jurisprudence is taught instead of elementary law.
INSTITUTIONS CANNOT BE BETTER THAN THE MEMBERS OF WHICH THEY ARE COMPOSED. THE GOVERNMENT IS NO DIFFERENT.
The combined acts of a body of lawyers, oft repeated, like an army of worms, silently and secretly gnawing at the foundation of a great and magnificent structure, will gradually but surely cause it to give way and tumble into ruins. It is perhaps not going too far to assert that the lawyers, as a class, are largely answerable for the minimum of respect and obedience that the public has for the law.
1. Money was placed above rightness, truth, and justice.
Commercialism and materialism have placed money above everything else, including the human. This has completely demoralized society in every aspect, from government and justice to education, architecture, medicine, nutrition, and so on.
This has a common denominator: the quality of the currency. As the quality of the currency evaporates, so does the values of the people. But money and currency are inanimate and dead objects; the real actors are the humans trading and using that money.
The ‘fiat money’ we use these days is a result of codified law, a legal fiction for money, a commercial contract paper to exchange goods and services, and a creature of the codified public and private law.
This fiat currency has enabled its possessors to buy, or secure, political and social positions, which should be attained only by real merit, refinement, and learning.
Today judicial systems do not provide justice, newspapers and mainstream media do not provide the truth, today banks do not protect your money, today medical treatment does not cure you, etc. Profit is placed above everything else.
It was evident that materialism completely controlled the economic structure, the ultimate goal of which was for the individual to become part of a system that provided him with economic security at the expense of his soul, mind, and body.
Manly P. Hall, 1988
Society was morally bankrupted by materialistic ideologies and human institutions that are no better than the individuals who compose them.
No judicial action can be put in motion without the sanction of some lawyer.
The lawyer appears everywhere and in all stages of business transactions but also in family and other private and delicate matters as the trusted advisor and friend of his client.
There is a moral corruption, equally as bad in its results upon the judges, the bar, and the community.
2. The incentive structure is inverted, and it's detrimental.
Moral relativism justifies every wrongdoing since ‘there’s no objective difference between right and wrong.’ How can you have justice if you can justify every wrongdoing and there’s no moral compass?
But if being a member of a club or friends with the judge gives you an edge, how can you have excellence, meritocracy, and justice? The incentive is to short-cup your way, to cheat, to manipulate the game and law to your advantage to get economic stability.
If you want to have justice and great institutions, you need to educate their members in a high level of morality, ethics, and purpose…
The commercial code replaced common law. The difference between a common-law lawyer and the practitioner under the Code is the difference between a surgeon and a butcher.
Codification has produced more material to aid dishonest clients than the common law supplied. The lawyers as a body are morally worse than their professional ancestors. The lawyers of the past believed the constitution was adaptable; those of the present regard it as elastic.
Laws have accumulated really fast, creating inextricable confusion and doubt. Making justice was turned into a thing of doubt and change.
Instead of seeking the truth, the courts and the bar are engaged in the pursuit of technicality and form.
A precedent can be found on any side of any subject that anyone chooses to espouse.
The ratio of lawyers has multiplied four times since the law was codified and its complexity increased. The code was adopted in New York in 1848. Argentina's Commercial Code was first adopted by the Province of Buenos Aires in 1859 and later as the national code in 1862. In 1850 there was 1 lawyer per 1000 citizens in the United States. Now there is 1 in 256.
The excessive number of lawyers is detrimental, both to the community and the morale of the profession.
It creates, encourages, and continues illegal, unfounded, and fraudulent practices, demands, and litigations, because necessarily many of the lawyers depend not upon professional knowledge and accomplishments but upon sharpness and cunning. In the effort to sustain themselves, much unnecessary and unfounded litigation is inaugurated, and many disgraceful practices are engendered.
Let anyone consider the effect of the forty or fifty thousand legal agents spending their lives distorting and prostituting the forms of justice, misapplying and perverting its principles, and undermining the constitution and laws, and they can make a fairly accurate calculation as to the longevity of the system of government under which they exist and thrive.
Cunning and trickery have replaced real knowledge and ethics.
The modern code lawyer knows little of elementary law, but he carries, as a soldier would a knapsack, a memory filled with sections of codes and adjudicated cases.
Sheltered in the grip of his office, the lawyer can always, insidiously and secretly, deflect the course of justice and defraud the law. It is difficult to detect him; he is representing another’s interest and is not responsible for his client’s morals or frauds.
To say nothing of the extra cost and expenses, the manifold delays and intricacies of legal procedure, the attempt to simplify has been to muddle, confound, and destroy—to produce a race of pygmy lawyers, chattering and quarreling over the meaning of words in the Code.
The ones who benefit from codification are the same ones who benefit from fiat currencies and central banks. They have used the same strategy in both cases: create a problem, manipulate public opinion and make them demand the ‘solution’ they have already prepared—codification of law, central banks, etc. Time has shown that the public was manipulated and that the solutions that was sold to them only increased the size of the problem they were ‘trying’ to fix.
Picture the lawyers training themselves in a school of dishonesty, trickery, and chicanery, diverting and stopping the machinery of the law, prostituting the forms of justice for gain, selling their knowledge, ability, experience, and such talent as they may possess to the client who pays most for the service, and resorting to every device of cunning and deceit to gain their end! Do such lawyers exist? Do such practices prevail? Unfortunately, yes. In the first rank of the profession can be found many lawyers whose services are sought only to enable guilty men to escape punishment; only to open a door for others to avoid the consequences of the civil law and of their contracts; only to defeat and evade the legislative will and public policy; only to show their clients how to cheat, defraud, vilify, and defame without penalty or damage.
His profession consists of thwarting the law instead of enforcing it. The modern idea of a great lawyer is one who can most successfully manipulate the law and the facts. The public no longer calls them “great” but “successful” lawyers. Not a great jurist or profound student, but a successful practitioner.
The more desperate the case he wins, the greater his reputation.
It is the common belief, inside and outside of the profession, that the most brilliant and learned of the lawyers are employed to defeat or strangle justice.
In this view, every lawyer might be regarded as an intellectual prostitute whose mind, time, experience, knowledge, and influence can be hired and occupied by any stranger who desires to comply with his terms as to fees.
There is nothing secret or underhand about this part of the lawyer’s business. It has the approval of the people everywhere.
In fact, the community looks with perfect complacency and composure upon a transaction in which the leading lawyer sells his talent, his knowledge, his time, and his influence to the most corrupt or infamous individual in the land.
The lawyer is deliberately made an instrument to thwart the law and justice—and he knows it.
He uses the machinery of the law to accomplish results contrary to justice, truth, and right.
When the laws can be easily thwarted, the moral sense of the whole community is deadened. The incentive for justice was inverted and destroyed.
3. The lawyer is not educated about the spirit of the profession.
The lawyer’s power arises from the necessity of political organization; he is the official and authorized agent that puts in motion the machinery of the law.
In the commencement of suits, the lawyer has need, therefore, of honesty, learning, prudence, and patriotism. It rests with him to preserve the purity of the legal system; to separate the chaff of fraud, exaggeration, and doubt from the wheat of fact and truth.
The government exists for the people, not the people for the government.
American governments were organized by the people to provide the people a peaceful way of resolving conflicts and trading peacefully, providing justice and the protection of private property and equality under the law. The public is taxed for the general expenses of the courts, among other things.
Here’s the secret, -the cornerstone- of all legislation.
The goal is to have an easy and understandable set of rules that everyone can understand: to make as few laws as possible; for, in all normal and sound conditions of society, that country is best governed which is least governed. But codification has done the opposite: add complexity and create thousands of codified laws.
Here’s the secret, -the cornerstone- of all legislation.
The legislator should, therefore, be a man who understands the origin and nature of society- familiar with past and existing laws and history- with such practical and discriminating judgment as enables him to comprehend the wants and necessities of his fellow men.
Still, none of the formal oaths defines the duties of the lawyer.
Everything is now left to the moral perception of the lawyer.
THE LOYALTY TO ITS CLIENT (THE HAND THAT FEEDS HIS MOUTH) IS PLACED ABOVE THE ALLIANCE TO THE STATE (THE HAND THAT FEEDS THE JUDICIAL SYSTEM).
It is not the exception, but the rule, for the lawyer to surrender his whole mental, intellectual, and physical power to his client’s cause.
REMEDY
To produce lawyers who can perform their duties, they should be taught to cultivate a moral sense; the nature and object of law; the nature and duties of citizenship; the nature and duties of a legislator; but above and beyond everything else, they should be taught the real mission of the lawyer - which includes professional ethics. These fundamental requisites to the making of a full lawyer are almost entirely overlooked in all of the courses of education followed in law offices, law schools, and academies or colleges. Lawyers are made up to be mere instruments for their clients, without any attention being paid to their duties to the State. The fact is extraordinary, nay, incredible. But it is true. The curriculum of legal study is based upon codification. O means the sentiment of codification., pervades and influences all legal education.
If the moral sense of the community, which is another name for public opinion, should be maintained to the highest possible degree, an educated Bar, and a free, pure and intelligent Press, are the factors which can do much to accomplish all these results.
But this conscience, which should guide the lawyer, comes from training and education.
Trained in the knowledge of human nature, when he enters the field of jurisprudence and politics, his acts and opinions should be of the greatest value to the people. I would build up a race of pure lawyers, as far removed from commercialism as possible.
The country needs such a class more than ever.
-
@ 6be5cc06:5259daf0
2025-04-08 19:45:10O que são os juros?
Os juros são um reflexo da preferência temporal dos indivíduos: o valor que damos ao consumo no presente em comparação ao consumo no futuro. Em termos práticos, se alguém te pede dinheiro emprestado hoje e promete devolver só daqui a um ano, faz sentido você querer algo em troca por ter que esperar e postergar o consumo — esse “algo a mais” é o juro.
Nas palavras da Escola Austríaca, os juros não são um fenômeno artificial ou técnico, mas sim um fato da realidade humana: tempo tem valor. E como o tempo passa para todos, a preferência temporal é um traço universal. Logo, juros sempre existirão — e isso independe de moeda, bancos ou qualquer arranjo institucional.
Juros e poupança
Num mercado genuinamente livre, os juros emergem da relação entre dois grupos:
-
Poupadores, que abrem mão do consumo presente para acumular bens que serão utilizados no futuro.
-
Investidores, que tomam emprestados esses recursos para realizar projetos que renderão frutos adiante.
Quando há muita poupança, a taxa de juros tende a cair, pois há mais capital disponível para investimentos. Quando há pouca poupança, os juros sobem, pois o capital é escasso. Simples assim. É uma dinâmica voluntária, descentralizada e natural — e, portanto, intolerável para os engenheiros sociais e planejadores centrais.
Como sabotar tudo
O problema começa quando uma entidade com poder coercitivo — como um banco central, como o Federal Reserve (FED) — resolve interferir nesse processo natural. Em vez de permitir que os juros sejam determinados pelas preferências temporais das pessoas, o FED manipula a taxa básica de juros da economia, criando a ilusão de que há mais poupança do que realmente existe.
Como ele faz isso?
Simples: imprimindo dinheiro do nada e injetando esse capital nos mercados financeiros por meio da compra de títulos, operações com bancos e linhas de crédito. Essa expansão monetária distorce os sinais econômicos: os juros caem artificialmente, mesmo sem um aumento real na poupança. O crédito se torna barato — mas ilusoriamente.
O efeito prático dessa mentira monetária
Empresas e investidores, enganados por esses juros baixos, começam a empreender projetos de longo prazo como se houvesse capital real disponível para sustentá-los. Shoppings, fábricas, startups, construções, tudo parece viável. A sensação é de prosperidade: mais empregos, salários, consumo e lucros.
Mas há um detalhe crucial: a preferência temporal da população não mudou. As pessoas continuam consumindo no presente — e não há bens de capital suficientes para suprir os dois desejos ao mesmo tempo: o consumo presente e os investimentos de longo prazo.
Com o tempo, a realidade bate à porta: os preços dos bens de capital sobem, os custos dos projetos disparam, os empréstimos se tornam mais caros e muitos empreendimentos tornam-se inviáveis. Então vem a quebradeira: demissões, falências e recessão. Todo o “crescimento” anterior se revela uma miragem inflacionária.
Ciclos econômicos: uma criação do Estado
Esse processo de boom artificial seguido de colapso inevitável é o que Mises e Hayek explicaram como o Ciclo Econômico Austríaco. Não é um “erro do mercado”. É o resultado direto da distorção dos sinais econômicos provocada pela manipulação dos juros. E o culpado tem nome: o banco central — neste caso, o FED.
O FED não é um árbitro neutro. Ele é um planejador central disfarçado de autoridade monetária. Seu objetivo real é manter o sistema financeiro vivo à base de impressora. Ele socializa prejuízos, distorce o cálculo econômico e destrói o processo de alocação racional de capital. Tudo isso enquanto afirma estar “estabilizando a economia”.
A consequência disso? Inflação, endividamento, má alocação de recursos e, acima de tudo, roubo institucionalizado da poupança das pessoas comuns. O juro baixo artificial é um imposto oculto. É uma forma disfarçada de pilhagem, uma transferência silenciosa de riqueza dos poupadores — que trabalharam e se abstiveram do consumo — para os primeiros recebedores do novo dinheiro, como bancos e governos. Essa manipulação é um confisco disfarçado, que destrói capital real e sabota o esforço honesto de quem poupa.
O caminho da correção
Para que os juros cumpram sua função genuína — sinalizar a escassez ou abundância de capital — é preciso eliminar a interferência coercitiva dos bancos centrais. Em um mercado verdadeiramente livre, sem manipulação monetária, os juros seriam determinados pela poupança real, e não por burocratas em Washington.
Isso exige o fim do monopólio estatal sobre a moeda. Exige a destruição da base legal que sustenta o cartel bancário. E exige uma transição para formas de dinheiro que não podem ser inflacionadas por decreto, como o ouro ou — melhor ainda — o Bitcoin.
Para finalizar
Os juros não são uma variável a ser “ajustada” por tecnocratas com PhDs. Eles são a expressão natural das escolhas humanas diante do tempo. Qualquer tentativa de manipular essa realidade só pode gerar desequilíbrios, crises e sofrimento econômico.
Enquanto o FED existir, ciclos econômicos serão inevitáveis. Não por causa do mercado — mas porque um punhado de burocratas acredita que sabe mais do que milhões de pessoas agindo voluntariamente.
Liberdade monetária é a única solução. E a destruição do banco central é apenas o começo.
-
-
@ fbf0e434:e1be6a39
2025-04-08 15:08:21Hackathon 概览
ETHiopia x BAM Hackathon 于 2 月 10 日至 14 日在线上进行,吸引了 108 名注册开发者和创新者深入探索以太坊技术。活动包括 Solidity 开发的技术研讨会和鼓励创造性技能培养的环节,最终审核通过了 38 个的项目。这些项目展示了参赛者的技术创造力以及他们对区块链技术的投入。
Hackathon 促进了以太坊生态系统内解决方案的创建,重点关注社区贡献和在现实场景中创新应用。参赛者在获得技能和探索了区块链创新的同时,也建立了开发者网络。活动提供了 2,000 美元 USDC 现金奖金,用于激励在代码质量、社区参与和展示技能方面表现出色的项目。
包括 ETHiopia, BAM 和 THE MU 在内的实体促进了非洲 Web3 BUIDLer的环境,推动了有影响力的解决方案。此次合作强调了区块链在应对现实世界挑战中的角色,并赋能了非洲开发者和BUIDLer。
Hackathon 获奖者
ETHiopia X Circles 奖项获奖者
第一名: Ethera
Ethera支持非洲内容创作者通过区块链实现货币化,利用Circles Protocol和CRC代币进行交易,以确保在Gnosis Chain上的透明度和去中心化。它通过Circles Protocol Avatar验证用户身份。
第二名: ETHqub
ETHiopia x BAM 一般Hackathon 获奖者
第一名: Imara
Imara是一个去中心化平台,帮助区块链开发者组建团队。它利用基于里程碑的质押和治理工具来增强协作,防止项目被遗弃,旨在区块链生态系统内实现广泛的集成。
第二名: Hakiba
Hakiba是一个去中心化的借贷协议,促进区块链上的社区信贷。它实施质押、担保和链上保险,以促进负责任的贷款和借款人支持,使用Solidity智能合约和FastAPI。
第三名: ETHqub
有关所有项目的更多信息,请访问 https://dorahacks.io/hackathon/ethiopiabamhackathon/buidl
关于组织者
BAM
BAM,即Bold African Movement,是一个为非洲的新兴建设者和创始人提供平台的机构,专注于区块链、AI和其他新兴技术。该组织致力于在非洲大陆培养创新人才,开发关键技术解决方案。通过积极参与重要的技术领域,BAM促进了这些行业的成长和协作。他们的使命是赋予非洲新一代的技术领导者,从而推动从愿景想法到实际实施的过渡。更多信息请访问他们的网站 joinbam.xyz。
-
@ fbf0e434:e1be6a39
2025-04-08 14:55:41Hackathon 概览
ETH Oxford 2025 Hackathon 于2月7日至9日在牛津数学学院举办,吸引了大量的开发者的兴趣和参与。活动共有318名开发者注册,最终通过审核有142个项目。活动强调创新和合作,主要集中在以太坊区块链上,参与者通过demo视频和GitHub仓库展示了他们的作品。
Hackathon 于2月9日结束,开发者们通过 Demo 他们的项目来角逐最后的奖项。他们在创新同时,也解决了区块链领域的各个技术挑战。这次 Hackathon 还促进了社区互动和知识分享,带来了区块链开发社区的实质贡献。
Hackathon 获奖者
主赛道奖项获胜者
- 可编程密码学
- CallOrNothing:利用区块链的去中心化扑克游戏,确保无中心化的信任游戏。
- AI
- DeFi
- Quantum Enhanced Cross-chain Arbitrage:结合量子优化与DeFi协议在生态系统间进行盈利套利交易的机器人。
- 消费者领域
- FlareGate:一个去中心化的P2P平台,用于法币-加密货币交易,整合Flare网络的安全数据。
- GuessTheHuman:基于区块链的AI社交推理游戏,用于识别真人玩家。
- The Golden Key:针对老年用户的区块链基础防欺诈移动应用。
Flare 奖项获胜者
- 刻入式数据协议
- FlareGate:用于法币-加密货币传输的去中心化P2P平台。
- Kingdom of LagaFlare:一个NFT卡牌游戏,通过区块链提供公平游戏和独特卡牌收集。
- ProteinMango:使用ZKP的自动理赔的参数性地震保险。
- 外部数据源/跨链
- portent
- bump.artist:为艺术家代币和收入分享的DeFi平台。
- ProteinMango
- FlareInsure:使用现实世界数据为智能合约服务的区块链小额保险。
- Decentralised Zero:利用Flare的FDC进行信任、透明的赌注操作的平台。
Torus 奖项获胜者
- 去中心化记忆机构
- ZK memory Organ:利用零知识证明实现高安全性和高效性的数据存储解决方案。
- Torus Decentralised Memory:安全、容错数据存储的分布式数据库。
- Porous Torus:为Torus AI代理提供安全、高吞吐量的数据存储。
- TorBit:通过OrbitDB为Torus AI代理提供零信任记忆系统。
- Discord 社区洞察生成器
- Hivemind:一个使用LLM从Discord聊天生成反馈和协作洞察的工具。
- stbb:分析服务器消息生成主题/趋势报告的Discord机器人。
- discord community bot:用于每周服务器报告的AI驱动Discord分析。
- 加密推特辩论分析器
- DebateFi:分析和总结有关加密货币的推特辩论,以获得可行的见解。
- Oxford Kaggle Debaters:一个用于加密推特分析、影响力评分和内容优化的AI工具。
- DebateChain:通过情绪和声誉评分分析加密推特辩论的AI。
- Wildcard 挑战
- NewsCrypt:去中心化论坛,通过辩论分析提升客观新闻报道。
基于Mina平台构建应用的获胜者
- MinAES:整合AES加密到Mina的zk-native区块链中,实现使用零知识技术的安全应用。
- MINA Verify:在电路中实现BLS12-381签名的一个平台。
- Guantanabet:基于Mina的隐私预测市场,使用基于ZKP的匿名投注。
Avalanche 奖项获胜者
- 一等奖 ($2000)
- Swiish.cash:一个通过手机号码全球稳定币转账的移动解决方案,使用Avalanche。
- Smart Memorandum:为智能合约提供司法管辖区特定法律文件的工具。
- blindbird.ai:去中心化AI推理平台,用于安全的小额付款。
- AADC- AI Agent for DeFi & Cross-Chain Operations
- 二等奖 ($1500)
- AI-Powered DeFi Position Management Platform:为GMX DEX头寸管理提供自然语言界面。
- NovaTools:包括多链NLP机器人和数据分析在内的加密AI工具。
- 三等奖 ($800)
- Oxwell AI agent:通过自然语言资产管理进行跨链DeFi助手。
- Wired:通过NLP为BNB/AVAX资产管理提供跨链AI助手。
- DEFAI:为链上操作提供自然语言的AI驱动DeFi代理。
- NLWallet:配备NLP和账户抽象的机构加密钱包。
- helpi:Avalanche平台的社会项目捐赠,配有AI风险评估。
AirDAO 奖项获胜者
- GameFi DApp
DeSci World: NERDo 奖项
- DebateChain
- CrypTweep by RugPullCoin#42
- Project Lydia:通过AI分析检测不当行为的Discord机器人。
- bump.artist
- Flare-FL:用于安全AI模型训练的去中心化联邦学习。
Ripple 奖项获胜者
- 使用RLUSD构建的顶级消费者应用
- CoverMax:一个使用oracle触发条件自动赔付的去中心化保险协议。
- BlockInvest:现代投资互助系统,利用XRPL通过智能合约进行集体储蓄。
- PayCoin IC:支持XRPL的QR码支付的移动RLUSD钱包。
- 使用XRPL的DID、凭证和RLUSD功能的最佳去中心化身份解决方案
- XRPL Diploma Verify:一个使用DIDs在XRPL区块链上安全存储和验证文凭的网页平台。
- 最具创新性的XRPL集成
BNB 奖项获胜者
- 主奖
- NovaTools
- insr.finance:一个通过Venus Protocol提供稳定币保护同时进行收益的保险协议。
- 荣誉提名
- BNB Shield:利用TEEs和ZKPs进行PEP检测的去中心化AML系统。
- CloutDrop:用于KOL空投优化的数据驱动平台。
- AADC- AI Agent for DeFi & Cross-Chain Operations
- Greenfield奖
- ReviewChain:一个去中心化的同行评审系统,提升学术出版透明度和质量。
- 荣誉提名
Vyper 奖项获胜者
- 最佳使用Vyper Lang
- SecureStake:一个使用Vyper进行质押和多签名验证的安全交易令牌管理平台。
- Quantum Enhanced Cross-chain Arbitrage
- The Golden Key by Avalock
若要探索 ETH Oxford 2025 的所有项目,请访问 DoraHacks。
关于组织者
ETH Oxford
ETH Oxford 是一个以推动区块链技术和创新而闻名的组织。以其技术专长而著称,ETH Oxford 对去中心化系统和安全交易协议的发展做出了重大贡献。其参与的众多项目提升了区块链的效率和可及性。目前,ETH Oxford 强调合作研究和区块链的实际应用,解决复杂的现实世界挑战,展现了其对技术进步和行业领导力的承诺。
- 可编程密码学
-
@ 7d33ba57:1b82db35
2025-04-08 14:34:59Barcelona is a city that sizzles with creativity, blends beach life with bold architecture, and radiates Mediterranean energy. From Gaudí’s surreal masterpieces to the lively buzz of La Rambla and the golden sands of Barceloneta Beach, it's a place where every street feels like a gallery—and every evening invites a fiesta.
🌟 Top Things to Do in Barcelona
1️⃣ Sagrada Família
- Gaudí’s unfinished masterpiece and Barcelona’s iconic landmark
- A kaleidoscope of colorful stained glass, soaring columns, and symbolism
- Book tickets in advance—it gets busy for a reason
2️⃣ Park Güell
- A whimsical hilltop park filled with mosaics, dragons, and curves
- Explore the Monumental Zone and enjoy views over the city
- Like stepping into a dream—or a fairytale!
3️⃣ Stroll La Rambla & Explore the Gothic Quarter
- A lively pedestrian street with flower stalls, performers, and markets
- Wander into the Gothic Quarter (Barri Gòtic) for narrow alleys, Roman ruins, and hidden plazas
- Visit Plaça Reial for tapas and a good vibe
4️⃣ Casa Batlló & Casa Milà (La Pedrera)
- Two of Gaudí’s iconic modernist buildings on Passeig de Gràcia
- Casa Batlló looks like it’s made of bones and sea waves 🌊
- La Pedrera is all flowing stone and rooftop sculptures
5️⃣ Magic Fountain of Montjuïc
- Evening light & music shows (check schedule!)
- Combine it with a walk up Montjuïc for museums, parks, and castle views
6️⃣ Barceloneta Beach & Port Vell
- Chill on the beach or bike along the palm-lined promenade
- Great area for seafood, sangria, or sunset cocktails
- Stroll the harbor and check out the yachts at Port Vell
🍴 What to Eat in Barcelona
- Tapas – Patatas bravas, croquetas, pan con tomate
- Paella – Best enjoyed seaside, with seafood or mixed options
- Calçots (in season) – Grilled green onions with romesco sauce
- Crema catalana – Like crème brûlée, but with a Catalan twist
- Vermouth – A pre-lunch drink that's become trendy again 🍸
Try local markets like La Boqueria or cozy taverns in El Born for the full flavor.
🚇 Getting Around
- Metro & buses are fast and efficient – get a T-Casual card or Hola BCN pass
- Walk or rent a bike—many areas are super pedestrian-friendly
- Taxis & ride apps like Free Now are widely available
🎉 Extra Tips & Local Vibes
✅ Time your meals late – locals eat lunch at 2–3pm and dinner after 9pm
✅ Watch a Flamenco show, but choose authentic venues, not tourist traps
✅ Visit Bunkers del Carmel for one of the best panoramic sunset spots in the city
✅ Be aware of pickpockets in crowded areas (especially on La Rambla)
✅ If you love art: check out Museu Picasso and MACBA (modern art)
-
@ 4bc0bea1:29b9f2aa
2025-04-08 12:27:36How I’m Training Around An Elbow Injury
My right elbow is a mess.
I hurt it wrestling with a friend on a wooden deck.
It's easy to avoid injuries in wrestling...if you only wrestle on the mat. I guess I don't like it easy.
To take it a step further, I made it much worse by doing straight arm ring exercises.
C'mon Jordan!
Straight arm ring exercises while your elbow already hurts...pure buffoonery.
Alas, here I am.
I could sit out from jiujitsu, but instead, I’m adjusting how I train so I don’t lose progress.
Injuries are part of the game, but how you adapt defines your progress.
Most people see injuries as setbacks. But they're actually opportunities to refine your game.
These opportunities force you to find ways to keep improving even when things aren’t perfect.
Things don't need to be perfect if you have some G.R.I.T.
Let's break this approach down.
G – Grapple (Smart)
Don't stop training. Modify it. Drill with a dummy, watch tape, or do technique you can handle. Buy a brace if need be. Stay in the game.
There's nothing worse than forgetting everything you worked hard to learn. So don't let it happen.
Keep rolling. Do what you can without pain. Buy a brace if you think it will help. I wear Anaconda's Elbow Brace when I roll to make sure my elbow stays safe and pain-free.
I stop if I experience pain and don't allow myself to go 100%. Ignore your ego and give your body the pain-free work that it needs.
On days when it's fatigued, I drill with my dummy and watch instructionals so I can improve my technique.
Don't sit around. Grapple. But do it smart.
R – Restore Movement
Move the injured part pain-free to get blood flowing. Restore function over time.
If you sit around and don't move your injured body part, it will heal slower.
Healing requires the nutrients that blood brings. And blood won't bring as much of the goods if it's not recruited.
Rehab your injury to give it the blood boost it needs.
I diagnosed myself with Olecranon (Elbow) Bursitis. I've been doing exercises recommended here to help it heal faster.
I only do the exercises that are pain-free for me right now. And I'm moving on to more difficult ones as my elbow condition improves.
Waiting for an injury to heal is a slow, frustrating process.
Be patient and stay consistent with your rehab.
I – Integrate Strength
Once pain-free, begin light strengthening. Train around the injury, not through it.
Instagram recently sniped me with an ad for something called The Torque Bar.
The benefits from using it are endless:
- It's a single tool that targets forearms, wrists, elbows, biceps, triceps, and shoulders.
- It has a thick knurled handle that enhances grip strength and forearm activation.
- It improves rotational strength (supination/pronation) for sports.
- It helps with tennis elbow, golfer’s elbow, wrist tendinitis, and rotator cuff issues.
- It strengthens stabilizing muscles to reduce joint hyperextension and strain risks.
So of course I had to buy it.
A couple weeks of these torque bar exercises and I'm hooked. It's strengthening my neglected arm muscles and my elbow without any pain.
It's a key piece of my routine going forward and I highly recommend it for others.
The best part is that it doesn't agitate my injury and it's helping me get stronger.
That's the goal here.
T – Thrive with Nutrition & Sleep
Eat clean to recover faster. Sleep well. Don’t waste healing energy on processed junk.
This is the number one lever to pull in your healing journey. And also a great way to live.
Eat Clean
I eat healthy foods like ground beef, wild caught salmon, fruit, and more whole foods 80% of the time.
The days I eat clean are the days my elbow feels it best.
The other 20% of the time – when I eat some processed, junk food – my elbow aches. It makes me feel like I'm back at square one. The consequences of junk food are astounding.
I've put the 80/20 rule on hold and changed it to 95/5 to help this injury heal faster.
Sleep Well
My sleep has been horrible.
My daughter was born 3 weeks ago and she's been fussy. I'm getting 3-6hrs of sleep a night. It's definitely not helping my elbow.
Sleep is the most important piece of the human equation.
Bad sleep can result in
- Low energy levels
- Increased risk of injury
- Poor eating habits
- Lack of productivity
It sets the tone for each day.
If you take anything away from this, let it be that you need to optimize for sleep.
If you're in a situation like me, control what you can control.
I have more control over my food than my sleep so that's why I'm being more disciplined with it.
Once my sleep improves, I expect everything to be firing on all cylinders.
The Bottom Line
Injuries are opportunities to refine your game.
But you need to have some G.R.I.T. to do it.
- G – Grapple (Smart): Don’t stop training. Change it. Drill with a dummy, watch tape, or do technique you can handle. Stay in the game.
- R – Restore Movement: Move the injured part pain-free to get blood flowing. Restore function over time.
- I – Integrate Strength: Once pain-free, begin light strengthening. Train around the injury, not through it.
- T – Thrive with Nutrition & Sleep: Eat clean to recover faster. Sleep well. Don’t waste healing energy on processed junk.
Do the above and you'll be back better than before.
Injured and not sure what you can still train? Send me a message – happy to help however I can.
Original post is here
-
@ e31e84c4:77bbabc0
2025-04-08 11:53:57The third annual edition of Bitcoin FilmFest returns to Warsaw this May. From its niche beginnings in 2023 to today’s global stage, BFF has become a catalyst for authentic storytelling—merging independent cinema, permissionless art, and Bitcoin’s ethos.
“Where centralized scripts end, new narratives begin — explore the uncharted stories beyond the frame.”
May 22-25, 2025, Poland: This year’s theme, “Beyond the Frame,” BFF25 expands the focus on creative expression—featuring narrative films, fiction, Bitcoin ads, and even a touch of AI, while keeping its genuine, community-driven vibe.
Key Highlights of Bitcoin FilmFest 2025
-
Pizza Day: The biggest European gathering to celebrate the first real-world Bitcoin transaction.
-
Exclusive Screenings: Feature films, documentaries, animations and shorts—including, for example: UNBANKABLE, SATOSHI THE MOVIE, REVOLUCIÓN BITCOIN, THE MAN WHO WOULDN’T CRY, HOTEL BITCOIN —all followed by face-to-face discussions with creators.
-
Golden Rabbits: Cinematic awards in categories like Best Movie, Best Story, Audience Choice.
-
Movie Pitch Contest: A platform for creators to turn Bitcoin-themed ideas into cinematic reality.
-
Generative Cinema: A special segment exploring AI’s role in filmmaking, including screenings and dynamic debates.
-
BFF PoWies: A dedicated show with Bitcoin-themed advertising, concluding with its own award ceremony (categories: GRAND PRIX / freestyle, VISUAL / video ad + out of home, IDENTITY / brand creative + campaigns).
-
Workshops & Networking: Thematic sessions on filmmaking, art, philosophy, spirituality, and beyond.
-
Memorable Experiences: Inspiring conversations in intimate circles, live music (concerts and DJ sets), stand-up comedy, and dozens of site activities—from bitcoin-only marketplaces, though yoga to self-defense.
\ Details, Tickets, Discounts.
For more visit the official event site: bitcoinfilmfest.com/bff25/
Follow the project's official feed on social media to stay up-to-date:
X: @bitcoinfilmfest | Nostr: Bitcoin FilmFest | LinkedIn: Bitcoin FilmFest
Use the discount code BITESIZE to get 10% off on tickets.
-
-
@ edeb837b:ac664163
2025-04-08 11:24:58In today’s fast-paced, hyper-connected world, investing is no longer a solo sport.
The rise of social investing has transformed the way people trade, learn, and grow their wealth. Whether you're a seasoned trader or just getting started, chances are you've already encountered social investors—on Twitter, Discord, Reddit, or even in group chats. But who exactly are they? And why is NVSTly the go-to platform for this new wave of investors?
Let’s break it down.
What is a Social Investor?
A social investor is someone who engages in trading or investing with a strong focus on community, transparency, and collaboration.
They're not just buying and selling behind closed doors. They're:
- Sharing trades and strategies in real time
- Following top traders to learn from their wins (and losses)
- Collaborating with others in Discord servers, Telegram groups, and social media threads
- Using data-driven insights from the crowd to sharpen their own edge
Social investors believe that trading is better together—and they’re not wrong.
What Do Social Investors Do?
Social investors operate at the intersection of finance and social media. Here's what their day-to-day might look like:
✅ Share Trades Publicly
They log and post their trades for the community to see—building trust, accountability, and transparency.
✅ Follow Traders They Trust
They find top-performing traders or those with a style that resonates, then follow their moves to learn, mirror, or improve their own game.
✅ Collaborate & Discuss
Social investors thrive on conversation—sharing opinions, chart analysis, market sentiment, and more.
✅ Track Performance Over Time
Many use dashboards to measure their win rates, gain/loss ratios, and trade history to keep improving.
So… How Does Social Investing Actually Work?
At its core, social investing works like this:
-
Connect with the Community
Whether it’s a Discord server, app, or forum—start engaging. -
Log & Share Trades
Share your trade ideas, entries/exits, or even link your brokerage to auto-share your trades in real-time. -
Follow & Learn from Others
Use leaderboards, performance stats, and trade insights to follow top traders or promising new ones. -
Analyze and Improve
Get real-time feedback, stats, and charts to refine your strategy and grow your edge.
That’s where NVSTly comes in.
Why NVSTly is the Best Platform for Social Investors
NVSTly wasn’t just built for social investors—it was built by them.
Whether you're day trading crypto, swinging options, or investing long-term in stocks, NVSTly gives you everything you need to track, share, analyze, and grow—together.
Here’s what makes NVSTly stand out:
-
🚀 Real-Time Trade Sharing
Trades post instantly—on the app, and even in Discord—so your followers are always in the loop. -
📈 POV Charts
Our unique Point-of-View Chart shows the exact candlestick where a trader made a move. No more guessing—you see the strategy play out visually. -
🧠 Advanced Trade Insights
Dive into trade performance with key stats like win rate, average gain/loss, long vs short ratio, and even drawdowns. -
🌎 Global Leaderboards
See who’s crushing it across the platform, by day, week, month, or all-time. Filter by asset class, strategy, and more. -
🔗 Broker & Exchange Integration
Automatically track your trades from brokerages like Webull (with more on the way). No more manual input—just connect and go. -
📲 Multi-Platform Access
Use NVSTly on Web, iOS, Android—and even directly inside Discord via the NVSTly Bot. (Telegram support coming soon!) -
📣 Instant Social Sharing
Auto-post your trades to Discord, X (Twitter), and other platforms the moment they happen. Build your brand while you trade.
Social Investing is the Future. NVSTly is the Hub.
Whether you’re looking to grow your audience, follow expert traders, or just become more disciplined in your own trading, NVSTly is where social investors thrive.
Join 50,000+ traders who believe that sharing trades isn’t just about clout—it’s about accountability, growth, and community.
Ready to Social Trade?
Create your free account today and become part of the fastest-growing social trading platform in the game.
👉 Start Trading with NVSTly on the web, iOS, Android, or through the Discord app/bot.
-
@ f683e870:557f5ef2
2025-04-08 11:13:27When it comes to the Nostr Web of Trust, several NIPs have been proposed, but the one that seemed to gather the most traction was Trusted Assertion by Vitor Pamplona.
The idea is to have
kind:30382
represent assertions made about an entity, which could be a pubkey, for example. The NIP also specifies a tag calledrank
, which can be used to build some basic WoT primitives.Example event:
{ "kind": 30382, "tags": [ ["d", "e88a6...50411"], ["rank", "89"], ["zap_amt_sent", "1000000"], ], "content": "", //... }
However, we quickly realized that this NIP was too limiting for what we wanted to accomplish: real-time, personalized ranking.
To illustrate our different approaches, we will show how to replicate our Verify Reputation with trusted assertions.
Verify Reputation
Verify Reputation returns:
- the rank, follow count and followers count of the given
target
- its top followers by rank.
All ranks are personalized to the given
source
.This “batteries included” solution helps users avoid impersonation and fraud with a single request, no matter what application they are using, be it a kind:1 client, chat app, wallet, marketplace, or more.

To get the same result with trusted assertions, you would have to
- Get all contact lists that contain the
target
(as ap
tag) - Build the target’s
follower
list from those event authors - Get the trusted assertions for the target and each of the followers
- Sort them by the rank provided by the trusted assertions
This operation is computationally expensive, especially on mobile devices. It is clear that if the user is willing to verify and process a large number of events (potentially +100k), he can compute some (rudimentary) ranking directly on the device, without the need to trust a third party.
More generally, trusted assertions are very hard to use when one doesn’t know the pubkeys of the people he’s looking for. This goes fundamentally against our approach of Web of Trust, as a powerful mechanism for discovery.
Are you looking to add Web of Trust capabilities to your app or project?
- the rank, follow count and followers count of the given
-
@ 2b24a1fa:17750f64
2025-04-08 11:01:09Was haben wir damals gelacht, als jede „Miss“ ihren Wunsch nach Weltfrieden artikulierte, um ihre Chancen, zur Welt Schönsten gekürt zu werden, zu erhöhen. Was wird heute gewünscht? Solidarität? Zusammenhalt gegen den Feind? Stärke? Ich weiß es nicht.
https://soundcloud.com/radiomuenchen/alle-waffen-still-gestanden/s-pmO0oieSdzK?
Ich weiß nur, dass sich Intellektuelle, Künstler, Bürger durch alle Schichten wegen zunehmender Kriegsrhetorik, Aufrüstungspläne und Rekrutierungsideen große Sorgen um unser friedliches Zusammenleben machen. So lebt auch unsere lose Reihe „friedensnoten“ wieder auf. Hören Sie heute „Alle Waffen stillgestanden!“ des Liederpoeten Yann Song King. Der inspirierte den Philosphen- und Radialfeldforscher Uli Fischer zu einem Text den Ulrich Allroggen für uns eingelesen hat.
-
@ 2b24a1fa:17750f64
2025-04-08 10:57:20Mux, die Hauptfigur im Film „Muxmäuschenstill“ von 2004, leidet an Rechthaberitis. Das geht so weit, dass er quasi als Verschmelzung von Denunziant, Kläger, Richter und Henker in Eigenregie Leute bestraft, die Gesetze oder Regeln verletzen - egal ob jemand zu schnell fährt, in der U-Bahn ohne Fahrschein fährt, Graffiti sprüht oder Ladendiebstahl begeht. Mux geht mit seiner Sichtweise zwar gesetzeskonform, aber er hat kein Mandat für seine Übergriffe, sagte kürzlich sinngemäß der Drehbuchautor Jan Henrik Stahlberg in einem Interview. Diese Blockwart-Mentalität verbindet man automatisch mit dem Dritten Reich, doch ihre Wurzeln liegen tiefer. In ihr steckt zugleich eine Sehnsucht nach Einigkeit wie sie Stahlberg auch in der bürgerlichen Bewegung der Romantik erkennt.
https://soundcloud.com/radiomuenchen/corona-schicksale-ein-buch-von-eugen-zentner?
Die Kehrseite dieses Harmoniestrebens ist eine Aversion gegen Differenzen, gegen abweichendes Verhalten und der Drang, dagegen vorzugehen. Nicht umsonst attestiert man den Deutschen eine starke Neigung zur Prozesshanselei. Im Alltag der meisten Leute hielten sich deren Auswüchse noch in Grenzen. Dann kam Corona. Während der sogenannten Pandemie wurde Mux zum Standard-Typus, zur Monika Mustermann des Mainstream. Die Folgen durften viele von uns am eigenen Leib erfahren. Eugen Zentner erinnert daran anhand von 15 exemplarischen Kurzgeschichten in seinem Buch „Corona-Schicksale“, das im März erschienen ist:\ www.masselverlag.de/Programm/Corona-Schicksale/
Unser Autor Jonny Rieder hat das Buch gelesen.
Sprecher: Karsten Troyke.
Redaktion: Jonny Rieder
Bild: Ania Hardukiewicz / Massel Verlag
Radio München\ www.radiomuenchen.net/\ @radiomuenchen\ www.facebook.com/radiomuenchen\ www.instagram.com/radio_muenchen/\ twitter.com/RadioMuenchen\ odysee.com/@RadioMuenchen.net:9\ rumble.com/user/RadioMunchen
Radio München ist eine gemeinnützige Unternehmung.\ Wir freuen uns, wenn Sie unsere Arbeit unterstützen.
GLS-Bank\ IBAN: DE65 4306 0967 8217 9867 00\ BIC: GENODEM1GLS\ Bitcoin (BTC): bc1qqkrzed5vuvl82dggsyjgcjteylq5l58sz4s927\ Ethereum (ETH): 0xB9a49A0bda5FAc3F084D5257424E3e6fdD303482
-
@ 2b24a1fa:17750f64
2025-04-08 10:52:10Eine Kolumne von Michael Sailer, jeden ersten Freitag bei Radio München, nachzulesen auf sailersblog.de.
https://soundcloud.com/radiomuenchen/belastigungen-34-die-zeit-der-toten-stadte?
-
@ 2b24a1fa:17750f64
2025-04-08 10:49:21Wie praktisch, das Smartphone, das ohnehin in der Hand liegt, etwas gegen den Scanner neigen: Bezahlung erfolgt! Die Bewusstheit aber, was mit dem Zurückdrängen des Bargeldes an Freiheitsverlusten einhergehen, steckt wahrlich in den Kinderschuhen. Muss zuerst ein Stromausfall die Bezahlungen verunmöglichen? Müssen wir erst auf ein Creditsystem warten, das uns den Kauf von unliebsamen Produkten verweigert um zu verstehen, dass Bargeld ein großes Stück Freiheit bedeutet?
Es sind nicht nur die alten Menschen, die am Bargeld hängen, weil ihnen das Digitale fremd ist. Immer noch etwa die Hälfte aller Geschäfte werden bar abgewickelt. Und jetzt erhalten die Verteidiger des Bargeldes unverhofft Unterstützung: die Verbraucherzentrale, denn Euro Banknoten und Münzen sind gemäß § 14 1 Satz 2 des Gesetzes über die Deutsche Bundesbank gesetzliches Zahlungsmittel. Das bedeutet, dass die Banknoten und Scheine prinzipiell von jedermann zur Begleichung von Geldforderungen akzeptiert werden müssen. Häufig aber wird in Restaurants und Cafés beispielsweise kein Bargeld mehr annehmen. Deshalb ruft die Verbraucherzentrale seit kurzem dazu auf, Bargeldablehnungen mit einem eigens dafür eingerichteten Formular zu melden.
Hören Sie hierzu Norbert Härings Text „Verbraucherzentrale dokumentiert Bargeldablehnung“, der zunächst auf seinem Blog erschienen war. norberthaering.de/bargeld-widersta…entrale-bargeld/
Sprecher: Karsten Troyke
Bild: Radio München
www.radiomuenchen.net/\ @radiomuenchen\ www.facebook.com/radiomuenchen\ www.instagram.com/radio_muenchen/\ twitter.com/RadioMuenchen
Radio München ist eine gemeinnützige Unternehmung.\ Wir freuen uns, wenn Sie unsere Arbeit unterstützen.
GLS-Bank\ IBAN: DE65 4306 0967 8217 9867 00\ BIC: GENODEM1GLS\ Bitcoin (BTC): bc1qqkrzed5vuvl82dggsyjgcjteylq5l58sz4s927\ Ethereum (ETH): 0xB9a49A0bda5FAc3F084D5257424E3e6fdD303482
-
@ f1577c25:de26ba14
2025-04-08 09:26:26النهاردة هنتكلم عن طريقة استثمار مختلفة: إزاي تستثمر في الدهب جوه مصر. فيه طريقتين: يا إما تشتري الدهب من محلات الصاغة يا إما تستثمر أونلاين (زي صندوق AZG). أنا بفضل الطريقة الأونلاين عشان سهلة والحد الأدنى للاستثمار أقل بكتير، بس فيه عمولة سنوية. هشرح مميزات وعيوب كل طريقة بالتفصيل.
الدهب الحقيقي
المميزات
- استثمار في أصل حقيقي تقدر تلمسه
- مش محتاج أوراق ولا كارت بنك عشان تشتري
العيوب
- محتاج مكان آمن تخزنه فيه (بيتك أو خزنة في البنك)
- الحد الأدنى للاستثمار عالي (جرام أو ربع جرام)
- ممكن تشتري دهب مغشوش لو مشتريتش من مكان موثوق فيه
الدهب الإلكتروني
المميزات
- سهل وسريع في الشرا والبيع
- الورق المطلوب بسيط (صورة البطاقة بس)
- تقدر تستثمر بفلوس قليلة
العيوب
- العمولات السنوية عالية شوية
المنصات
للشرا أونلاين، أنا عارف بس منصة AZG سواء عن طريق AZinvest أو من خلال برامج التداول زي ثاندر. بنصح باستخدام AZinvest عشان أسهل وكل الإجراءات بتتم أونلاين، أما منصة ثاندر فمحتاجة توقع ورق وبتاخد وقت أطول.
منصة AZinvest
ده تطبيق تابع لشركة أزموت (اللي مالكة صندوق الدهب وصناديق استثمارية تانية). الخطوات سهلة: 1. تنزل التطبيق 2. تسجل باستخدام صورة البطاقة 3. توقع العقد أونلاين 4. تحط فلوس عن طريق التحويل البنكي (إنستاباي) أو كارت البنك
المشكلة الوحيدة هي عمولة السحب (2 جنيه لبنك مصر، وأكتر للبنوك التانية). ممكن تتجنب العمولة دي لو سجلت من خلال منصة تانية زي ثاندر.
ويمكن شئ تاني و هو مواعيد الشراء و البيع و هي من كل اثنين لخميس لو عملت امر البيع قبل 12 الظهر هيبقي بنفس اليوم ولكن لو بعد يبقي تاني يوم (+ يوم او يومين عمل لو سحب لحسابك البنكي) بس دا كله يعتبر متوقع و طبيعي بس هي لو حاطط في بالك هتبقي بسرعة
و ملحوظة مهمة لما تيجي تبيع حصص في كل مرة هيخصموا عمولة الصندوق 4.9% فا حاول لو هتخرج خالص بيع كلة مرة واحدة و العمولة بتقل كل سنة لحد التالتة او الرابعة بتبقي من غير عمولة
ادعمني (اختياري)
- USDT (TRC20):
TKQ3Uwkq21ntiua2Zh9Hu376fdMdnRGWN6
شوف الكومنتات لو فيه أي تعديل أو بوستات جديدة.
-
@ 866e0139:6a9334e5
2025-04-08 08:52:09
Autor: Lionne Douce. (Bild: Florian Simon Eiler). Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier.**
LASSEN SIE DER FRIEDENSTAUBE FLÜGEL WACHSEN!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt. (Vorerst an alle, da wir den Mailversand testen, später ca. drei Mails pro Woche.).
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: milosz@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ 57d1a264:69f1fee1
2025-04-08 06:39:52originally posted at https://stacker.news/items/937791
-
@ 502ab02a:a2860397
2025-04-08 02:01:29เรื่องมันเริ่มจากมีคนถามว่า ขนมของผมเป็นขนม healthy ใช่ไหมคะ มีคนชื่นชมเยอะเลยจะมาสั่งบ้าง
ผมได้แต่ตอบไปว่า ขนมของผมไม่ใช่ขนม healthy มันเป็นแค่ขนมทางเลือก เป็นอีกทางเลือกนึงของคนที่อยากเลือก
โดยผมจะให้รายละเอียดวัตถุดิบว่ามีอะไร แล้วสารอาหารเป็นประมาณเท่าไร ให้เขาเลือกเอาเอง ผมเลยไม่เคยตอบเลยว่า คนท้องกินได้ไหม คนป่วยเบาหวานกินได้ไหม และผมมักตอบว่า เจ้าตัวควรจะรู้ได้เองเมื่อทราบวัตถุดิบ ว่าตัวเองกินได้ไหม
ผมว่า ผมแม่งโคตรแฟร์ในเรื่องการให้ข้อมูลก่อนซื้อแล้วนะ
มันก็เลยเกิดข้อสงสัยว่า เมื่อเราตั้งคำถามกับคำว่า “Healthy” ว่านิยามของมันคือ ดีต่อสุขภาพ หรือ แค่ไม่ทำร้ายสุขภาพ?
ในยุคที่โลกเต็มไปด้วยคำศัพท์ใหม่ ๆ เกี่ยวกับสุขภาพ ที่เอามาช่วยในการขายของนั้น บางครั้งคำว่า “healthy” ที่เราได้ยินกันบ่อย ๆ ก็ไม่ค่อยชัดเจนเท่าไรนัก คนส่วนใหญ่เข้าใจว่าคำนี้น่าจะหมายถึง “ดีต่อสุขภาพ”
ความหมายของมันอาจจะไม่เป็นเช่นนั้นเสมอไป และการเข้าใจคำว่า “healthy” นั้นสำคัญยิ่งกว่าที่คิด ถ้าจะให้ถามกันตรง ๆ คือ คำว่า “healthy” จริง ๆ ควรจะหมายถึงอะไร?
“Healthy” หรือ “Not Harmful”? หลายครั้งที่เราพบคำว่า “healthy” ใช้กับผลิตภัณฑ์ที่ดูเหมือนจะดีต่อสุขภาพ เช่น ขนมสุขภาพ น้ำผลไม้คั้นสด หรืออาหารมังสวิรัติ ซึ่งทุกอย่างนี้อาจจะทำให้เราคิดว่าเป็นอาหารที่ “ดีต่อสุขภาพ” แต่ถ้าลองมองให้ลึกขึ้น คุณอาจจะพบว่า คำว่า “healthy” ที่เราคุ้นเคย อาจหมายถึงเพียงแค่ “ไม่ทำร้ายสุขภาพ” มากกว่าที่จะเป็นสิ่งที่มีประโยชน์จริง ๆ ต่อร่างกายหรือเปล่า?
ความแตกต่างระหว่าง “ดีต่อสุขภาพ” กับ “แค่ไม่ทำร้ายสุขภาพ”
อาหารที่เรียกว่า “healthy” ในปัจจุบันบางครั้งอาจจะไม่ได้ดีต่อร่างกายมากเท่าที่คิด เพราะอาจมีส่วนผสมที่ปรุงแต่งมากเกินไป เช่น น้ำตาลที่ซ่อนอยู่ในน้ำผลไม้คั้นสดหรือขนมที่ผลิตจากแป้งปริมาณมากเกินไป หรือแม้แต่ผ่านกระบวนการแบบ ultra processed ที่พวกนี้บางครั้งมันอาจจะไม่ทำร้ายร่างกายในระยะสั้นทันทีแต่ในระยะยาวอาจจะสะสมผลเสียต่อสุขภาพได้อยู่ดี แต่ถูก bold บางตัวมาชูความ healthy เสียอย่างนั้น
เมื่อเปรียบเทียบกับอาหารที่ “ดีต่อสุขภาพ” อาหารประเภทนี้ควรจะเป็น อาหารจากธรรมชาติที่ไม่ผ่านกระบวนการปรุงแต่งหรือแปรรูปมาก หรือเปล่า? เพราะอาหารเหล่านี้จะให้คุณค่าทางโภชนาการที่ร่างกายต้องการ เช่น โปรตีนคุณภาพสูงจากสัตว์ หรือ ผักผลไม้ที่ปลูกในระบบเกษตรอินทรีย์ ซึ่งมีสารอาหารที่ไม่เพียงแค่ไม่ทำร้ายร่างกาย แต่ยังช่วยเสริมสร้างระบบต่าง ๆ ในร่างกายให้ทำงานได้อย่างมีประสิทธิภาพ
“Not Harmful” ยังไม่พอ แต่อาหารที่แค่ “ไม่ทำร้ายสุขภาพ” ยังไม่เพียงพอที่จะเรียกว่า “healthy” เพราะอาหารเหล่านี้บางตัวอาจจะมีมุมกลับที่ไม่ได้สร้างผลเสียทันที แต่ก็อาจไม่ได้ให้ประโยชน์อะไรกับร่างกายเท่าที่ควรเป็นเช่นกัน การรับประทานอาหารที่แค่ “ไม่ทำร้ายสุขภาพ“ นั้นในระยะยาวอาจไม่ส่งผลต่อการมีสุขภาพที่แข็งแรงจริง ๆ เพราะแค่ ”ไม่ทำร้าย“
“not harmful” ยังไม่ใช่ “healthy” เพราะมันไม่ได้ดีต่อสุขภาพ แต่มันแค่ “ไม่ร้ายแรงทันที” หรือพูดให้ชัดคือ แค่ไม่ทำร้ายสุขภาพเร็วเกินไปนัก เช่น
ขนมที่บอกว่า “ไม่มีน้ำตาล” แต่ยังใช้สารให้ความหวานสังเคราะห์
เครื่องดื่มที่โฆษณาว่า “ลดแคลอรี่” แต่แฝงไปด้วยสารเคมีหรือสารปรุงแต่งที่ร่างกายไม่สามารถย่อยได้ดี
ผลิตภัณฑ์ที่บอกว่า “ใช้ได้สำหรับมังสวิรัติ” แต่เต็มไปด้วยแป้งขัดขาวหรือสารกันบูด หรือแม้แต่อาหารสารพัด ins
หรือแม้แต่อาหารที่หลอกล่อให้กินเกินความต้องการ ชูตัวนึงแต่เนียนไม่บอกอีกตัวนึง เช่นชูโปรตีน แต่เงียบเรื่องคาร์บสูงมาก
แถมบางครั้งมาในความ over claim ดึงสารตัวเล็กๆมาชูภายใต้คำว่า “มี xxxx ดีเพราะช่วยด้าน xxxx” ทั้งที่จะสัมฤทธิ์ผลต้องดื่มเป็นสิบๆแก้ว ซึ่งใช้ไม่ได้จริง
“Healthy” ที่แท้จริง อาหารที่ดีต่อสุขภาพ จึงควรเป็นอาหารที่เมื่อกินเข้าไปแล้ว ร่างกายได้รับ สารอาหารที่มีประโยชน์จริง ๆ ที่ช่วยเสริมสร้างและซ่อมแซมระบบต่าง ๆ ในร่างกาย อย่างเต็มที่เช่น • โปรตีนจากแหล่งธรรมชาติ อย่างเนื้อสัตว์ที่เลี้ยงแบบอิสระ หรือไข่ที่มาจากฟาร์มที่เลี้ยงตามธรรมชาติ • ไขมันที่ดีต่อสุขภาพ เช่น ไขมันจากสัตว์ที่เลี้ยงแบบธรรมชาติ ไขมันโอเมก้า 3 ที่มาจากปลา หรือไขมันพืชที่มีสัดส่วนโอเมก้า 6 ไม่มากจนไม่สามารถสมดุล โอเมก้า 3 ได้ทัน • ผักผลไม้สดที่ไม่ผ่านการแปรรูป เพราะยังพอมีไฟเบอร์ วิตามิน และแร่ธาตุที่ร่างกายเอาไปใช้งานได้บ้าง แต่ต้องผ่านการลดระดับของ anti-nutrient
หลายครั้งเราเห็นขนม healthy ไม่ว่าจะคลีน วีแกน หรือขนมเคลมความ healthy ต่างๆ คือพอเป็นขนม มันก็จะมีการใช้ “ปริมาณ” บางอย่างให้เรากินมากเกินไป เช่นบางขนมยังเป็นแป้งปริมาณมาก ต่อให้แป้งเทพแป้งสะอาดยังไง ก็กลายเป็นคาร์บย่อยเป็นกลูโคส ต่อให้ย่อยช้าย่อยเร็วก็ย่อยได้หมดอยู่ดี, บางขนมมีปริมาณน้ำตาลมาก ต่อให้ giต่ำแบบมะพร้าว โตนด แต่ปริมาณ ถ้าเกินที่ สธ. มีคำแนะนำ คือ 16กรัมต่อวัน ก็เกมส์อยู่ดี, หรือจะขนมจืดๆแต่ใช้น้ำมันคาโนลา ที่อุดมด้วยโอเมก้า6 หรือ น้ำมันรำข้าวที่มี oryzanol เข้มข้น
หรืออย่างสายคีโต ก็ไม่รอด โอเค โดยรวมมันช่วยเรื่องการไม่กระชากอินซุลิน แต่บางอย่างก็ใช่ว่าจะสามารถเรียก healthy ตามความหมาย เช่น ขนมแป้งอัลมอนด์ มันคือ อัลมอนด์ processed ที่ทำให้เรากินอัลมอนด์มากกว่าเม็ดๆไปได้มาก เพราะมันบดย่อยมาละเอียด ทำให้เรากินมากเกินไป, หลายขนมก็ใช้สารให้ความหวาน ต่อให้อินซุลินไม่พุ่ง แต่มันก็มีผลกับจุลินทรีย์ในลำไส้, แม้แต่พวกครีมชีส ตัวมันเองคือดี แต่การเอาปริมาณมากมาทำขนม มันก็กลายเป็น over consume ได้, อย่างที่ชัดมากคือ ขนมปังวีทกลูเตน ที่แป้งปกติกลูเตนราว 10-14% ถ้าวัดแบบโลฟละ 500กรัมเหมือนๆกัน แป้งธรรมดามีกลูเตนราวๆ 30กรัม ส่วนขนมปังวีทกลูเตนมีกลูเตนราวๆ 190กรัม หรือมากกว่าปกติ 633% แต่นั่นละครับ มัน not harmful (yet)
ดังนั้นในความคิดเห็นของผม ตามเหตุผลที่เรียบเรียงมา เมื่อขึ้นชื่อว่าขนม มันคืออาหารชนิดนึงที่ผ่านกระบวนการมาก จนกลายเป็น processed food ชนิดนึง มันทำให้เรากินเนยมาก กินน้ำมันมาก กินครีมมาก กินน้ำตาล(ทั้งแท้และสังเคราะห์)มาก กินแป้งและ/หรือถั่วบดมาก กินผลไม้มาก กินโยเกิรตมาก กินช็อคโกแลตมาก(ถึงจะ dark100% ก็เหอะ) เพื่อความอร่อย
ขนม เลยไม่ healthy และผมไม่ขอเคลมความ healthy ในสินค้าผม และผมไม่มองว่าขนม healthy ผมมองว่าขนมอร่อย กินเอาอร่อย แล้วไปบาลานซ์ความ healthy องค์รวมเอาในชีวิต ดังนั้น อย่าฝืนกินขนมไม่อร่อยเพียงเพราะเราดันเชื่อว่ามัน healthy หรือ เราอย่าไปซัดโฮกขนมมากๆเพราะเราดันเชื่อว่ามัน healthy
เรามองอาหารยังไง ก็มองขนมอย่างนั้น มองวัตถุดิบที่แปรรูปแล้วกินลงไป ขนม ก็จะเป็นอาหารประเภทนึง
คุณก็เช่นกัน ควรมองของที่กินเข้าไปทั้งหมดเป็นอาหาร แล้วมองอาหารเป็นวัตถุดิบ แล้วพิจารณาวัตถุดิบ+วิธีทำ ว่ามัน healthy กับตัวคุณแค่ไหน มากกว่า healthy ที่แปะบนห่อหรือในโพสขาย
คำว่า “healthy” จริง ๆ แล้วควรจะหมายถึง อาหารที่ไม่ใช่แค่ปลอดภัยจากการทำร้ายสุขภาพ แต่ยังต้องช่วยเสริมสร้างสุขภาพ อย่างแท้จริง อาหารที่ดีต่อสุขภาพควรเป็นอาหารธรรมชาติให้โปรตีนคุณภาพ ไขมันที่มีประโยชน์ ให้คาร์บที่พอเหมาะและมีสารอาหารที่ร่างกายต้องการในการทำงานที่ดีที่สุด ทั้งซ่อมและสร้าง
“Healthy = ดีต่อสุขภาพในทางบวก ไม่ใช่แค่ไม่ร้าย” “Not harmful = ไม่ร้าย ยังไม่เห็นผลเสีย แต่ไม่ให้คุณในทางบวกขนาดนั้น”
เพราะฉะนั้น มันเลยมีความเกือบจะทับซ่อนกัน ถ้าจะสื่อคำว่า “Healthy” แนะนำให้แปลว่า “อาหารที่ส่งเสริมสุขภาพ ไม่ใช่แค่ไม่ทำร้ายสุขภาพ“
กับดักที่ใหญ่ที่สุด ที่แม้แต่ชาวคีโตเองก็อาจตกหลุมนั้นแบบไม่รู้ตัว นั่นคือ
ปริมาณ สำคัญกว่า ประเภท
คุณตกหลุมคำว่า อาหาร/ขนม healthy หรือเปล่าหล่ะ คุณเท่านั้นที่ตอบตัวเองได้
จงมองทะลุ food matrix
เจริญพวง neo
pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก
ฉลาก3รู้
-
@ 000002de:c05780a7
2025-04-08 01:24:25Trump is trying to sell a victim narrative and I don't buy it.
Trump repeats a troupe that I find hard to swallow. The US is getting ripped off. When he says this, as far as I can tell he's not referring to the people. He's referring the US government getting ripped off by other nations. This is so absurd I'm surprised I don't hear more people push back on it.
The US is the most powerful government in the history of the planet. No nation has the firepower or wealth of the US. The US has manipulated the governments and policies of much of the world since WW2. The idea that the US government is getting ripped off is absurd.
Trump and I agree that NATO is obsolete. It was created to counter a government that dissolved in the 90s. This should be an example to everyone that governments do not behave like businesses. They do not respond to market forces. They will always seek to increase their power and influence and always resist any efforts to reduce their size and scope. But back to Trump. He says that the US is getting ripped off by the other NATO countries. I would say the US people are in indeed being ripped off by their own government. But the US government is NOT getting ripped off.
The US military power in Europe is a massive influence on geopolitics in the region. US military companies benefit massively as well. The US military has bases all over the globe and if you don't think that is a factor in "diplomatic" negotiations you are being naive. The US uses this "defensive" shield to keep the "leaders" of Europe in line. The US isn't being ripped off. This is just a marketing tactic Trump is using to sell downsizing the US military deployments.
Trump also loves to point out how other countries are imposing tariffs on the US. We are being ripped off! I mean, he has a point there. But if tariffs aren't a tax as many in his admin like to claim, how exactly are "we" being ripped off? We are being told that Trump's tariff policy isn't a tax and that expecting prices to increase is oversimplifying things. The talk about tariffs is frankly frustrating.
On the one hand the left is saying tariffs are a tax and is going to drive up prices. Yet these same people pretend to not understand that corporate tax increases don't have the same effect. The right claims to understand tax policy and often oppose corporate taxes. They will tell you that those taxes just get passed down to consumers in the form of price increases. Now they are pretending to not get this in relation to tariffs.
I've read and listened to the pro tariff people and they aren't all dumb. They may be right about tariffs not effecting all products and nations equally. I guess we will find out. But, can we be honest? The US is not getting ripped off.
Someone is getting ripped off, but it isn't the US federal government. Its the people of the world. First, the people of the world live under the thumb of the US fiat dollar standard. We in the US complain about 3+% inflation but most people in the world would kill for that level of inflation. Most of the world gets none of supposed benefits from government spending. They only get the debasement of their own currencies.
Moving away from economics, the entire globe is affected by the elections in the US. The US is the top dog government and its decisions effect people everywhere. The US deep state has manipulated many elections across the globe and continues to do so. Meanwhile we are told that Russia is manipulating our elections. So who exactly is getting ripped off here? I think the nation (the people) are being subjected to massive mismanagement at best. I can support that argument.
Don't get me wrong... I know we in the US are getting ripped off. We are being ruled by people that do not represent us and do not answer to us. The politicians that claim to represent us are being paid and influenced by foreign groups ranging from Israeli political groups, to any number of other groups domestic and foreign. We are getting ripped off, but I firmly believe the people in the US have it better than most of the world. Trump is trying to sell a victim narrative and I don't buy it.
originally posted at https://stacker.news/items/937482
-
@ 4d41a7cb:7d3633cc
2025-04-08 01:17:39Satoshi Nakamoto, the pseudonymous creator of Bitcoin, registered his birthday as April 5, 1975, on his P2P Foundation profile. Many think that he chose this date because on that same day in 1933, the United States government confiscated the gold of the American people. Whether this was on purpose or not, what happened in this day is very important to understand how do we ended up here.
In 1933, as expressed in Roosevelt’s Executive Orders 6073, 6102, and 6260, the United States first declared bankruptcy. The bankrupt U.S. went into receivership in 1933. America was turned over via receivership and reorganization in favor of its creditors. These creditors, the International Bankers, from the beginning stated their intent, which was to plunder, bankrupt, conquer and enslave America and return it to its colonial status.1
As one of his first acts as President, Franklin Delano Roosevelt declared a “Banking Emergency” to bail out the Federal Reserve Bank, which had embezzled this country’s gold supply. The Congress gave the President dictatorial powers under the “War Powers Act of 1917” (amended 1933), written, by the way, by the Board of Governors of the Federal Reserve Bank of New York.2
This day marked the official abandonment of the American Constitution, law and real money. Today, 92 years after this event, most of the people living today have never had any real money or paid for anything using real money; unless they used Bitcoin...
There could be no bankruptcy if there was not a private central bank lending paper currency to the government at interest, so we must start from 1913, when the Federal Reserve was created: a non-federal private bank with no reserves and the monopoly of issuing debt based paper currency in unlimited amounts and lending it to the government at interest by buying treasury bills. The fact that this currency is lent into existence at interest makes the debt mathematically impossible to be repaid; it can only be refinanced or defaulted.
Between 1929 and 1933, the Federal Reserve Bank reduced the currency supply by 33%, thereby creating the Great Depression, bankrupting the US government, stealing the Americans’ gold supply, and officially ending the gold standard. Since then the US dollar (money) was replaced with Federal Reserve Notes (debt). This was also the end of the Republican form of government and the beginning of a socialist mob rule democracy (Fascism).
“Fascism should more properly be called corporatism because it is the merger of state and corporate power.” — Benito Mussolini
The United States government has been bankrupt since 1933, since it defaulted on its gold bonds. This type of bond existed until 1933, when the U.S. monetary system abandoned the gold standard. 3 From this year the government has been totally controlled by the International bankers and used as a tool to spread and maintain their power worldwide.
Many people think that the gold standard was abandoned in 1971, but this is not true; in fact, this happened in 1933 when the US dollar was replaced by Federal Reserve Notes that are 100% debt-based fiat paper currency.
The year 1933 in the United States marked:
- The end of the Republican form of government and the beginning of American Fascism
- The end of the United States dollar and its replacement by Federal Reserve Notes
- The abandonment of common law and replacement with military admiralty law
- The takeover of the United States government by International bankers
- A massive gold theft and the end of the US gold standard
- The exchange of rights with privileges and licenses
- The United States government bankruptcy
The next shameful event in our history which still plagues us to this day was the “War Powers Act of 1933.” This Act permitted President Roosevelt to make law in the form of Executive Order, bypass Congress and create his socialist state. We (citizens of this country) were ever after to be considered enemies of the United States who must be licensed to engage in any commercial activity. With the aid of the Federal Reserve (the same people who created the Depression), the President confiscated our gold and silver coin and replaced it with worthless pieces of paper and a debt system that will eventually destroy this great country. Our land and our labor were pledged to the Federal Reserve Bank, Inc., as collateral for a debt system that could never be paid.4
“Emergency Powers” means any form of military style government, martial law, or martial rule. Martial law and martial rule are not the same.
United States Congressional Record March 17, 1993 Vol. #33, page H- 1303, Congressman James Traficant, Jr. (Ohio) addressing the House:
“Mr. Speaker, we are here now in chapter 11. Members of Congress are official trustees presiding over the greatest reorganization of any Bankrupt entity in world history, the U.S. Government. We are setting forth, hopefully, a blueprint for our future”
“There are some who say it is a coroner’s report that will lead to our demise. It is an established fact that the United States Federal Government has been dissolved by the Emergency Banking Act, March 9, 1933, 48 Stat. 1, Public Law 89-719; dered by President Roosevelt, being bankrupt and insolvent. H.J.R. 192, 73rd Congress in session June 5, 1933 – Joint Resolution To Suspend The Gold Standard and Abrogate the Gold Clause dissolved the Sovereign Authority of the United States and the official capacities of all United States Governmental Offices, Officers, and Departments and is further evidence that the United States Federal Government exists today in name only” **“The receivers of the United States Bankruptcy are the International Bankers, via the United Nations, the World Bank and the International Monetary Fund”
“All United States Offices, Officials, and Departments are now operating within a de facto status in name only under Emergency War Powers. With the Constitutional Republican form of Government now dissolved, the receivers of the Bankruptcy have adopted a new form of government for the United States. This new form of government is known as a Democracy, being an established Socialist/Communist order under a new governor for America. This act was instituted and established by transferring and/or placing the Office of the Secretary of Treasury to that of the Governor of the International Monetary Fund. Public Law 94-564, page 8, Section H.R. 13955 read in part:”
“The U.S. Secretary of Treasury receives no compensation for representing the United States.”
The American Spirit
The intention of the founding fathers of the United States was to create a constitutional republic to protect natural human rights and escape from the tyrannical English monarchy and its usurious Bank of England's monetary system. They created an honest monetary system based on gold and silver (United State Dollar) and got rid of nobility titles, creating equality under the law.
Section 10 of the American Constitution says:
No State shall enter into any Treaty, Alliance, or Confederation; grant Letters of Marque and Reprisal; coin Money; emit Bills of Credit; make anything but gold and silver Coin a tender in payment of debts; pass any bill of attainder, ex post facto law, or law impairing the obligation of contracts; or grant any title of nobility.
The United States Dollar (1792-1933)
A dollar is a measure of weight defined by the Coinage Act of 1792 and 1900, which specifies a certain quantity—24.8 grains of gold or 371.25 grains of silver (from 1792 to 1900) when the American dollar was based on a bimetallic standard.
The Gold Standard Act of 1900 formally placed the United States on the gold standard, setting the value of one dollar at 25.8 grams of 90% pure gold, which fixed the price of gold at $20.67 per troy ounce. This standard was totally abandoned in 1933.
Gold and silver were such powerful money during the founding of the United States of America that the founding fathers declared that only gold or silver coins could be “money” in America.
But since the greedy bankers cannot profit from honest money they cannot print, they replaced the money with paper debt instruments. And by doing this, they have effectively enslaved the American people until today. My definition of modern slavery is working for a currency that someone else can create at no cost or effort. What's worse is that they even demand to be paid back and with interest!
Federal Reserve Notes (1913-present)
Federal Reserve Notes are not real money. Money that has metallic or other intrinsic value, as distinguished from paper currency, checks, and drafts.
Federal Reserve Notes (FRNs) are a legal fiction. An assumption that something is true even though it may be untrue. 5 The assumption that they are money, when in fact they are the opposite of money: debt or paper currency.
Paper money. Paper documents that circulate as currency; bills drawn by a government against its own credit. 6 Like Goldsmiths' notes. Hist. Bankers' cash notes: promissory notes given by bankers to customers as acknowledgments of the receipt of money. • This term derives from the London banking business, which originally was transacted by goldsmiths.7
These notes were scientifically designed to bankrupt the government and slave the American people, as Alfred Owen Crozier warned one year before the bill for the creation of the FED was passed through Congress (1912):
If Congress yields and authorizes a private central bank as proposed by the pending bill, the end when the bubble bursts will be universal ruin and national bankruptcy.
Unfortunately, the bill was passed in 1913, and this private bank started printing a new currency different from the US dollar creating the great depression and effectible bankrupting the government like Alfred warned 20 years before.
Alfred also warned:
Thus the way is opened for an unlimited inflation of corporate paper currency issued by a mere private corporation with relatively small net assets and no government guarantee, every dollar supposed to be redeemable in gold, but with not a single dollar of gold necessarily held in the reserves of such corporation to accomplish such redemption.
Differently from what's commonly believed Federal Reserve Notes (FRNs) were never really “backed” by gold; they were never supposed to be hard currency. Currency backed by reserves, esp. gold and silver reserves.
The United States government defaulted on its gold clauses, calling for payment in gold. This marked the end of the gold standard. A monetary system in which currency is convertible into its legal equivalent in gold or gold coin.
Since then we have been under a paper standard, where we use fake money as tender for payments. Paper standard. A monetary system based entirely on paper; a system of currency that is not convertible into gold or other precious metal.
People traded their coupons as money or “currency.” Currency is not money but a money substitute. Redeemable currency must promise to pay a dollar equivalent in gold or silver money. Federal Reserve Notes (FRNs) make no such promises and are not “money.” A Federal Reserve Note is a debt obligation of the federal United States government, not “money.” The federal United States government and the U.S. Congress were not and have never been authorized by the Constitution of the United States of America to issue currency of any kind, but only lawful money—gold and silver coin.8
A bona fide note can be used in a financial transaction to discharge the debt only because it is an unconditional promise to pay by the issuer to the bearer. Is a Federal Reserve Note a contract note, an unconditional promise to pay? At one time the Federal Reserve issued bona fide contractual notes and certificates, redeemable in gold and silver coin. Most people never saw or comprehended the contract. It went largely unread because the Federal Reserve very cunningly hid the contract on the face of the note by breaking it up into five separate lines of text with a significantly different typeface for each line and placing the president’s picture right in the middle of it. They even used the old attorney’s ruse of obscuring the most important text in fine print! Over time, the terms and conditions of the contract were diluted until eventually they literally became an I.O.U. for nothing.
FEDERAL RESERVE NOTE
-
THIS NOTE IS LEGAL TENDER FOR ALL DEBT, PUBLIC AND PRIVATE, AND IT IS REDEEMABLE IN LAWFUL MONEY AT THE UNITED STATES TREASURY OR ANY FEDERAL RESERVE BANK.
-
DATE: SERIES OF 1934
-
WILL PAY TO THE BEARER ON DEMAND: ONE HUNDRED DOLLARS
-
TREASURER OF THE UNITED STATES SIGNATURE
-
SECRETARY OF THE TREASURY SIGNATURE
Nowadays FRNs say "This note is legal tender for all debts public and private" it tender debt but it does not pay the bearer on demand. It value was stolen by a counterfeiting technique commonly know as inflation.
One hundred dollars (SERIES OF 1934) will be 2480 grains of gold, or 159.4 grams, or 5.1249 troy ounces. Today one troy ounce is priced around $3,000 federal reserve notes. 5.1249 X 3,000 = $15,375 actual FRNs.
A $100 FRN bill today will buy 0.65% of a real gold $100 dollar certificate. That’s a -99.35% loss of purchasing power in the last 91 years.
FRNs savers have been rugged pulled!
Gold bugs where the winners...
But Bitcoin is even better...
Happy birthday Satoshi! April 5 will be forever remembered.
Satoshi... The man, the myth, the Legend...
-
@ d9a329af:bef580d7
2025-04-08 01:08:42Everyone who sees it knows at this point that the matrix of control comes from the overdependence of proprietary software to do our everyday tasks. You can think of this like us being the cling wrap that will just not let go of these pieces of garbage software that don't allow you to see what is in their source code, and how they work. This will tend to lead to the unlawful collection of data (violating the most basic of privacy laws, despite unenforceable contracts that are enforced regardless), bad OPSEC that sees you being stalked and harassed over nothing significant. In the worst of cases, if you speak your mind where you aren't necessarily supposed to be able to do that, and you get doxxed, the worst cases could be far worse than one could imagine.
The solution to this, on the other hand, is using almost exclusively free/libre open-source software and GNU/Linux operation systems. If you're using certain proprietary software, hardening it to give as little data as possible to the entity responsible for it will also work, as long as you know which ones to use. This is a hard pass for a lot of people, but if you want to escape the control matrix of proprietary software, Winblows, HackOS, iHackOS, iBloatOS and stock Google AI Fever Dream, then researching which Free Software (notice the spelling) to use is your first bet. I had already done this for the past four and a half years, and will continue to do it as long as I live, seeing what new Free Software compliant applications and libraries come into the spotlight once things get locked down into walled gardens like what HackOS, iHackOS and BlindnessOS do on a regular basis.
Each of these pieces of software will be in a categorized list with a brief description of what the software is used for. There is a lot to take in, so research this yourself and see if these are right for you. These are the applications I personally use on a regular day-to-day basis, and they work for my needs.
- Operating Systems (the core to your device)
- GNU/Linux operating systems (for PCs) or GrapheneOS (for de-googled Android phones) To be fair on this one, GNU/Linux is the combination of the Linux kernel with the GNU toolchain, which in turn allows any developer to make an operating system that is FOSS, not necessarily Free Software, especially with the Linux Kernel's proprietary bits of code. The Linux kernel is also used in the Android Open-Source Project (AOSP), and is used as the base of operating systems for Android phones such as GrapheneOS, the only AOSP custom ROM I would recommend based upon the research I had done on this (even if very little).
My recommendations on the Linux side of things are almost any Arch-based distribution (with the exception of Manjaro), Debian-based distributions like Linux Mint Debian edition, regular Debian, AntiX or Devuan, or a Fedora/RedHat-based distribution like Nobara Project (if you're a gamer), OpenSUSE (if set up properly) or even Bluefin if you want an atomic desktop (I wouldn't recommend Bluefin if you want to monkey with your operating system and DIY on many aspects of it). Once you learn how to set these up securely, privately and properly, you're on your way to starting your journey into digital liberation, but there's far more to go on this front.
- Web Browsers (How you surf the internet)
-
Firefox Forks This one is self-explanatory. I harden all the Firefox forks I use (LibreWolf, Waterfox, Cachy Browser, Floorp and Zen as some examples) to the nines, despite being unable to do anything about my fingerprint. This is why I use multiple browsers for specific purposes to counteract the fingerprint spying due to weaponized JavaScript. There are ways to circumvent the fingerprint-based espionage, and make sure the site fingerprint.com doesn't know that one's lying about what their user agent is, though it's not very easy to fool that site, as it's used by 6,000 companies.
-
Brave Browser This is the only Chromium-based browser I would recommend, as it's better when hardened against all the other Chromium-based browsers, including Ungoogled Chromium, which is almost impossible to harden due to security vulnerabilities. Despite that, Brave has some of the best features for a Chromium-based browser one can feel comfortable using, even though you'll have similar issues with Firefox-based browsers that aren't actually Firefox (and Firefox has its own issues regarding espionage from Mozilla)
-
Office Suites (If you need to do professional office documents)
-
LibreOffice A fork of Apache's OpenOffice, made better with many features missing from even OnlyOffice and OpenOffice, this suite of applications is the go-to Free Software office suite for many people looking to switch from the proprietary software nether to the diamonds of free/libre open-source software. Though one may need to perform some extra steps to set up compatibility with G-Suite and Microsoft Office past 2015 potentially, it's still a good thing that people trust LibreOffice as their one-stop shop for office documents, despite being completely different from your standard office suite fare.
-
OnlyOffice The competitor to LibreOffice with the ease of Microsoft Office and G-Suite compatibility, OnlyOffice is another office suite that can be good for those who need it, especially since anybody who had used Microsoft Office in particular will be familiar with its layout, if not for a slight learning curve. As someone who's used G-Suite more (due to schooling that stunk worse than a decomposing rat in New York City), that's part of the reason why I switched to LibreOffice, though I tried some others, including OnlyOffice and Abiword (since I use a word processor a lot). This one is another solid option for those who need it.
-
Wordgrinder For those who like to use a terminal emulator like I do, Wordgrinder is a word processor with a terminal user interface (TUI) designed with just focusing on typing without distractions in mind. .wg is the file extension for documents made using Wordgrinder, especially since nowadays most word processors are cloud based. For those who live in a terminal, this is a good option to your terminal UI-based toolbox
-
Text editors
-
Vi, Vim, Neovim and other Vim-like editors The classic VI Improved (Vim), a fork of the TUI modal editor, vi, with keybinds that will be confusing at first, but with practice and patience, bring about muscle memory to stay on the keyboard, and not necessarily touch the mouse, keypad on the right hand side, or even the arrow keys. These keybind skills will stay with one for the rest of their life once they learn how the modes in vi, Vim or vi-based editors work. It's a classic for those working in the terminal, and a staple in FLOSS text editing and coding tools once customized potentially to the nines to your particular style.
-
VSCodium The Free Software fork of Code OSS by Microsoft, but made to be similar in function to VSCode without Microsoft's espionage baked into it. It has almost exactly the same features as VSCode that one would need, and even any VSIX files from VSCode will work in VSCodium. This one is an easy switch from VSCode for those who use it, but don't want the forced telemetry.
-
Emacs The competitor to Vim, Emacs is an editor that is FLOSS in every way imaginable. It is one of the most customizable editors anybody could have ever conceived, though the programming language used in Emacs is a dialect of Lisp the developers had made themselves. There are more keybinds to memorize compared to Vim, though Vim keybinds can be added using the Evil Mode package in any Emacs package manager to get the best of both worlds in Emacs. Once one gets a handle of the steep learning curve for Emacs, it's customizable in every imaginable way almost.
These four categories will get you started on your privacy journey, though I covered things a developer might want. I have plans on more lists to compile once I get my ducks in a row on what I want to cover here on Nostr in a longform format. Feel free to let me know if you have recommendations for me to write about, and I can do some digging on that if it isn't a rabbit hole.
-
@ 878dff7c:037d18bc
2025-04-07 23:54:09Potential Reacquisition of Port of Darwin by Australian Government
Summary:
Deputy Prime Minister Richard Marles has indicated that the Australian government may use legal powers to reclaim the Port of Darwin from Chinese control. While the government prefers a commercial solution, it is prepared to take legislative action if necessary. This move reflects growing concerns over foreign ownership of critical infrastructure amid escalating global trade tensions.
Sources: The Guardian - April 8, 2025
Australian Economy Faces Slowdown Amid Global Trade Tensions
Summary:
The Australian economy is projected to experience a slowdown due to escalating global trade tensions, particularly stemming from the United States' recent tariff implementations. Treasurer Jim Chalmers indicated that while Australia is not the primary target—only 4% of its exports go to the U.S.—the broader global impact is expected to affect the local economy. The Reserve Bank may consider interest rate cuts to mitigate these effects. Treasury forecasts suggest a deceleration in GDP growth from 4.25% in 2024–25 to 3.25% in 2025–26, influenced by declining terms of trade and global inflation pressures. Chalmers criticized the U.S. tariff measures as "ill-considered," warning of heightened economic risks and uncertainty.
Sources: News.com.au - April 8, 2025, Reuters - April 8, 2025, The Wall Street Journal - April 8, 2025
Spiking to Announce TradeGPT's Enterprise AI Future at IBM Z Day
Summary:
Spiking will participate in IBM Z Day: Special Edition 2025, unveiling TradeGPT's enterprise AI capabilities. This collaboration with IBM aims to revolutionize AI applications in capital markets by leveraging advanced computing technologies.
Sources: Newsfile - April 7, 2025, Yahoo Finance - April 7, 2025
Earthquake in Upper Hunter Region, NSW
Summary:
A magnitude 3.4 earthquake struck the Upper Hunter region of New South Wales early this morning, with the tremor recorded at 5:18 am local time. The earthquake occurred at a shallow depth of approximately 2.4 miles below the surface. Residents in the vicinity reported feeling the tremor, but there have been no reports of damage or injuries.
Sources: Volcano Discovery - April 8, 2025, Newcastle Weekly - April 8, 2025
Opposition Leader Peter Dutton Predicts Global Recession Amid Market Volatility
Summary:
Opposition Leader Peter Dutton has warned that Australia could face a global recession, citing recent stock market declines and potential delays in retirement for baby boomers. This comes as both Dutton and Prime Minister Anthony Albanese prepare for the first leaders' debate, with economic management and cost-of-living issues at the forefront of their campaigns.
Sources: News.com.au - April 8, 2025
Family Law Regulations Updated
Summary:
Effective April 1, 2025, new Family Law Regulations have commenced, replacing previous regulations from 1984, 2001, and 2008. These updates aim to modernize family law procedures and forms, impacting various aspects of family dispute resolution and arbitration processes.
Source: Federal Circuit and Family Court of Australia - April 1, 2025
U.S. Tariffs Spark Global Economic Concerns
Summary:
U.S. President Donald Trump has announced a 50% increase in tariffs on Chinese imports, escalating trade tensions and causing significant volatility in global stock markets. Australian Treasurer Jim Chalmers stated that while Australia can manage the immediate effects, the country's economic growth is expected to slow due to global repercussions, particularly from the resulting trade war between the U.S. and China. Treasury analysis indicated Australia's GDP would be 0.1% lower this year than previously forecasted, and inflation would rise by 0.2 percentage points. Despite these pressures, Chalmers emphasized that a recession is not expected, with the economy poised for continued growth, supported by increased consumer spending driven by easing inflation and tax cuts.
Sources: The Guardian - April 8, 2025, Reuters - April 7, 2025
NSW Public Hospital Doctors Begin Three-Day Strike Over Pay and Conditions
Summary:
Thousands of doctors in New South Wales public hospitals have commenced a three-day strike starting today, protesting against unsustainable workloads, chronic understaffing, and inadequate pay. The Australian Salaried Medical Officers' Federation (ASMOF) is demanding a 30% pay increase over time, citing excessive workloads and unsafe shift patterns as critical issues. The industrial action is expected to impact elective surgeries and specialist outpatient appointments, primarily at major Sydney hospitals, while emergency services will remain operational but with reduced staffing levels. The strike proceeds despite an Industrial Relations Commission order against such action, making it potentially illegal. The government has urged patients with urgent medical needs to seek emergency care, while those with non-urgent needs are advised to consider alternative healthcare options. Sources: The Guardian - April 7, 2025, ABC News - April 7, 2025, News.com.au - April 2, 2025
World War II Veteran Celebrates 100th Birthday Summary:
Mr. Roy Porter, a World War II veteran, celebrates his 100th birthday. Porter served as a tail-gunner with the Royal Australian Air Force’s 18 Squadron during the war. After returning, he married Norma in 1949, and they have spent over seven decades together in Ocean Grove, Australia. Despite health challenges, both remain mentally sharp and reflect on a century marked by service and love.
Sources: Herald Sun - April 8, 2025
Australian Government Officials Surprised by U.S. Beef Export Comments
Summary:
Australian government officials were taken aback by U.S. President Donald Trump's remarks regarding Australian beef exports. The U.S. administration's concerns appear to be based on inflated figures, with Australian officials clarifying that beef exports to the U.S. are valued closer to $2 billion, not $29 billion as suggested.
Sources: Sky News - April 8, 2025
Donald Trump Threatens 104% Tariff on Chinese Imports
Summary:
U.S. President Donald Trump has threatened to impose a 104% tariff on Chinese goods if China does not withdraw its 34% tariff on American products by April 8, 2025. This escalation has contributed to significant volatility in global stock markets, with concerns about a potential trade war intensifying. The Chinese government has yet to respond to this ultimatum.
Sources: ABC News - April 8, 2025, Sky News - April 8, 2025
Plastic Pollution on Australian Coastlines Drops by 39%
Summary:
Research by CSIRO indicates a 39% reduction in plastic pollution along Australia's metropolitan coastlines over the past decade. The study attributes this decline to effective waste management strategies and increased public awareness, highlighting significant progress in addressing coastal environmental challenges.
Sources: CSIRO - April 8, 2025
Trump’s FDA Chief Dr. Marty Makary Slams Medical Dogma in Healthcare
Summary:
In this episode of the "Dad Saves America" podcast, Dr. Marty Makary, former FDA Chief under President Trump, critiques entrenched medical dogmas that hinder innovation and patient care. He emphasizes the necessity for healthcare professionals to challenge outdated practices and adopt evidence-based approaches.
Key Discussions:
-
Medical Dogma vs. Innovation: Dr. Makary discusses how rigid adherence to traditional medical practices can obstruct the adoption of innovative treatments and technologies.
-
Patient-Centered Care: He advocates for a shift towards more personalized healthcare, emphasizing the importance of tailoring treatments to individual patient needs rather than relying solely on standardized protocols.
-
Transparency in Healthcare: The conversation highlights the need for greater transparency in medical practices and pricing to empower patients and foster trust in the healthcare system.
Insights:
-
Challenging established medical norms is crucial for progress and improving patient outcomes.
-
Embracing innovation requires a balance between evidence-based practices and openness to new methodologies.
-
Enhancing transparency can lead to more informed decisions by patients and promote accountability within the healthcare industry.
For a more in-depth exploration of these topics, listen to the full episode on Spotify: Dad Saves America Podcast - Episode with Dr. Marty Makary
-
-
@ a396e36e:ec991f1c
2025-04-07 23:46:01Introduction
In recent years, the term "the new normal" has been used to describe a world reshaped by pandemic policies, inflationary economic measures, rising surveillance, and growing cultural compliance. For many, this phrase signals safety and adaptation. But for others, it marks an era of overreach and loss of personal autonomy. At the heart of the digital resistance to this new order stands an unlikely champion: Bitcoin.
More than a volatile investment or tech novelty, Bitcoin has become a tool of protest, a lifeline for dissidents, and a vehicle for economic sovereignty. As governments expand control over currencies, transactions, and narratives, Bitcoin's decentralized, censorship-resistant architecture offers a parallel path. This post explores how Bitcoin is used to challenge the core pillars of the new normal.
- Pandemic-Era Restrictions and Bitcoin as a Lifeline
During the COVID-19 pandemic, governments worldwide implemented measures ranging from lockdowns to vaccine passports and mass surveillance. For many protestors, these policies were seen not as safety measures, but as infringements on civil liberties.
In Nigeria, during the #EndSARS protests against police brutality, bank accounts of organizers were frozen. Bitcoin became the fallback. Donations poured in through decentralized wallets, bypassing government censors. Similarly, in Canada’s 2022 Freedom Convoy, traditional fundraising platforms were blocked. Activists turned to Bitcoin, distributing funds peer-to-peer using QR codes, out of reach from centralized authority.
These examples underscore Bitcoin’s core strength: permissionless value transfer. No bank account, no ID, no government approval required. It provided activists with the means to continue their work even under financial siege.
- Economic Collapse and the Return to Sound Money
The economic fallout from pandemic stimulus measures has been immense. In the U.S. alone, over $5 trillion in stimulus spending contributed to record-breaking inflation, eroding the purchasing power of fiat currencies. Central banks worldwide flooded markets with newly created money, leading to a global crisis of confidence in fiat.
Bitcoin offered an escape route. With its capped supply of 21 million coins and transparent monetary policy, it attracted investors, corporations, and citizens looking to hedge against inflation and financial mismanagement. In countries like Turkey, Argentina, and Venezuela, where national currencies collapsed, Bitcoin emerged as a digital safe haven.
More than a hedge, Bitcoin became a symbol of protest. Where governments printed wealth out of thin air, Bitcoiners opted out. For them, stacking sats (satoshis) wasn't just financial planning—it was civil disobedience against fiat excess.
- CBDCs, Programmable Money, and the Case for Financial Autonomy
Central Bank Digital Currencies (CBDCs) are on the rise. Promoted as modern, efficient alternatives to cash, they also raise alarms for privacy advocates. Programmable money, expiration dates on stimulus funds, restrictions on purchases—these aren’t speculative fears. They’re openly discussed features.
Bitcoin offers the inverse: a financial system without surveillance, control, or gatekeeping. Unlike CBDCs, it is neutral, global, and governed by code, not political whim. Where CBDCs threaten to tether money to state approval, Bitcoin affirms the right to transact freely.
In this context, adopting Bitcoin is more than a tech choice. It’s a rejection of programmable compliance in favor of financial autonomy.
- Censorship, Compliance Culture, and the Sovereign Individual
Beyond economics and health, the new normal is marked by growing censorship and behavioral control. From deplatforming to frozen bank accounts, those who dissent often find their financial access cut off.
Bitcoin resists this. It doesn’t care who you are, what you believe, or where you live. As long as you control your private keys, your funds are yours.
This neutrality makes Bitcoin a sanctuary for the politically persecuted, the economically excluded, and the privacy-conscious. It’s not about hiding—it’s about freedom by design. In a time when expressing the wrong opinion can cost you your livelihood, Bitcoin offers a parallel economy where your rights don’t expire when you disagree.
Conclusion
Bitcoin is not a panacea. It doesn’t guarantee utopia, and it's not immune to misuse. But in the context of expanding state power, algorithmic governance, and compliant culture, it stands out as one of the few tools that empowers individuals to say "no."
To use Bitcoin today is to engage in a subtle form of protest. It is to opt out of a system many see as rigged, to reclaim privacy, and to assert control over one’s economic life. For those resisting the new normal—not with slogans, but with actions—Bitcoin is not just code. It’s civil disobedience made digital.
-
@ 2e8970de:63345c7a
2025-04-07 20:44:00the total number of U.S. forces in the Middle East has now reached 300,000 personnel, including both combat and administrative units.
The US normally has a total of 156,000 military personnel stationed overseas. Trump has suddenly doubled that number in just the Middle East. The Carl Vincent carrier group is relocating to the Red Sea, and half our active B2 bombers are in Diego Garcia. He’s going to bomb Iran.
https://x.com/davegreenidge57/status/1908826028467696075
originally posted at https://stacker.news/items/937451
-
@ 2e8970de:63345c7a
2025-04-07 19:49:08https://www.cnbc.com/amp/2025/04/07/peter-navarro-says-vietnams-0percent-tariff-offer-is-not-enough-its-the-non-tariff-cheating-that-matters.html
Vietnam is the US fastest growing trading partner and is helping to diversify away from China. Their offer to make imports from the US import tax free was rejected from the Trump administration.
This is a strong indicator that Trumps overall strategy isn't to use tariffs as a bargaining chip. It seems like the tariffs are the goal, not the means to an end.
originally posted at https://stacker.news/items/937410
-
@ f1577c25:de26ba14
2025-04-07 19:39:37احنا المرة اللي فاتت اتكلمنا عن الاساسيات تعالي بقي نتكلم بشكل عام علي الطرق اللي في وجهه نظري احسن طرق و هقولك ليه و تبدا بمين الاول و كمان كل طريقه هسيب لك ليها لينك تشرح التطبيق عنه بشكل مفصل اكتر بحيث تعرف الحلو و الوحش و الحد الادني و كل دا
البورصة الأمريكية
- العملة: دولار
- العائد المتوقع: ~10% سنوياً
- الحد الأدنى: ~100 جنيه
- الورق المطلوب: باسبور
- المميزات:
- استثمار دولاري
- سهولة الإيداع بالعملات الرقمية
- إمكانية السحب في أي وقت
- العيوب:
- تحتاج جواز سفر
- تتطلب معرفة بالشركات
- تقلبات السوق علي المدي القصير
- ملاحظات: لو لسة جديد بس معاك حساب دولاري يبقي انصحك بـ IBKR علشان سهل ولكن لو معكش حساب دولاري يبقي Tastytrade علشان سهل الايداع بالكريبتو
العملات الرقمية
- العملة: دولار
- العائد المتوقع: ~10% سنوياً (متغير)
- الحد الأدنى: ~100 جنيه
- الورق المطلوب: بطاقة
- المميزات:
- عائد يومي
- استثمار دولاري
- سهولة السحب
- العيوب:
- العائد متغير
- مخاطر الأمان
- ملاحظات: هنا قصدي منتجات Earn زي في بينانس
ذهب (عالمي)
- العملة: دولار
- العائد المتوقع: متغير حسب سعر الذهب
- الحد الأدنى: ~100 جنيه
- الورق المطلوب: بطاقة
- المميزات:
- الذهب بسعر السوق العالمي
- تحوط ضد التضخم
- العيوب:
- تقلبات السوق علي المدي القصير
- استثمار طويل الأجل
- مخاطر الامان
- ملاحظات: الذهب العالمي قصدي انه تحول عملات ل PAXG في بينانس او Kraken
عقارات (عالمي)
- العملة: دولار
- العائد المتوقع: ~9-10% سنوياً
- الحد الأدنى: ~50 دولار في موقع Realt و ~135 لو موقع Stake
- الورق المطلوب: باسبور
- المميزات:
- استثمار دولاري
- عائد شهري
- العيوب:
- استثمار طويل الأجل
- لو Stake فا تقدر تسحب فلوسك مرتين بالسنة بس
- تحتاج باسبور
- تقلبات السوق
- ملاحظات: في تطبيقين RealT للسوق الامريكي و Stake للسوق الامراتي او السعودي
فوري يومي
- العملة: جنيه مصري
- العائد المتوقع: ~24%
- الحد الأدنى: ~3 جنيه
- الورق المطلوب: بطاقة
- المميزات:
- سهولة الاستخدام
- عائد يومي
- بدون حد أدنى عالي
- العيوب:
- بالجنيه المصري
- عائد أقل من شهادات البنك (الي الان)
- تقلبات العائد
- ملاحظات: قصدي تطبيق فوري يومي
عقارات (محلي)
- العملة: جنيه مصري
- العائد المتوقع: الفعلي 9% ولكن متوقع 28-48% (متوسط 32%)
- الحد الأدنى: 50,000 جنيه
- الورق المطلوب: بطاقة
- المميزات:
- عائد سنوي مرتفع
- العائد مربوط بالدولار بمعني لو حصل تعويم العائد بتاعك هيزيد فا مقاوم للتضخم.
- سهولة الاستخدام
- العيوب:
- حجز الأموال 6 شهور
- 50 ألف حد أدنى
- ضرائب عقارية
- ملاحظات: قصدي تطبيق Safe
شهادات البنك
- العملة: جنيه مصري
- العائد المتوقع: 27% او 30% بعائد تناقصي
- الحد الأدنى: 1000 جنيه
- الورق المطلوب: بطاقة
- المميزات:
- عائد مرتفع
- العيوب:
- بالجنيه المصري
- متقدرش تسحب فلوسك غير بعد مدة الشهادة.
- ملاحظات: دخولك هنا او لا و العائد شهري او سنوي يبقي علي حسب هدفك
ذهب (محلي)
- العملة: جنيه مصري
- العائد المتوقع: متغير حسب سعر الذهب
- الحد الأدنى: ~18 جنيه
- الورق المطلوب: بطاقة
- المميزات:
- قيمة ثابتة ومستقرة
- سهولة الشراء
- الحد الادني صغير لو سهم في صندوق زي AZG
- العيوب:
- يحتاج مبلغ عالي للدخول لو حقيقي
- تقلبات السوق علي المدي القصير
- ملاحظات: يعتبر خيار حلو بس انا شايف لو هتدخل بدهب يبقي عالمي + قصدي ذهب بجد او عن طريق صناديق الذهب زي AZG
كمل قراية بالتفصيل:
nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xvurzvfsxuerzvphcvddg0
nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xvunzvesx5erywpsepywcn
nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xvunzdpcxq6nxwp3xqxgmx
nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xscrqdesxycnvv34l5ye0c
nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xvungvfsx5cnvv3ndwszwl
nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xscrqdpnxc6rvvee3fqr5t
nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xscrqdesxucrjdehs24uge
ادعمني (اختياري)
- USDT (TRC20):
TKQ3Uwkq21ntiua2Zh9Hu376fdMdnRGWN6
آخر تحديث: 4 أبريل 2025
-
@ da0b9bc3:4e30a4a9
2025-04-07 18:59:28Hello Stackers!
It's Monday so we're back doing "Meta Music Mondays" 😉.
From before the territory existed there was just one post a week in a ~meta take over. Now each month we have a different theme and bring music from that theme.
This month is April and we're doing what it...?. So give me those what if tracks.
Here's and example;
What if, Another Brick in the Wall was EDM?
Let's have fun.
https://youtu.be/uLMobfyKB9o?si=vD9OMd6irvFG2vP
Talk Music. Share Tracks. Zap Sats.
originally posted at https://stacker.news/items/937359
-
@ 39f70015:9d4e378a
2025-04-07 17:28:03This is a copy of chapter four of Mastering Bitcoin Cash. I'm using it to test out creating long-form content on highlighter.com.
This is an edit after the original post. I want to test how editing long-form content works on Nostr.
4. Transactions
Introduction
Transactions are the most important part of the Bitcoin Cash system. Everything else in Bitcoin Cash is designed to ensure that transactions can be created, propagated on the network, validated, and finally added to the global ledger of transactions (the blockchain). Transactions are data structures that encode the transfer of value between participants in the Bitcoin Cash system. Each transaction is a public entry in Bitcoin Cash’s blockchain, the global double-entry bookkeeping ledger.
In this chapter we will examine all the various forms of transactions, what they contain, how to create them, how they are verified, and how they become part of the permanent record of all transactions.
Transaction Lifecycle
A transaction’s lifecycle starts with the transaction’s creation, also known as origination. The transaction is then signed with one or more signatures indicating the authorization to spend the funds referenced by the transaction. The transaction is then broadcast on the Bitcoin Cash network, where each network node (participant) validates and propagates the transaction until it reaches (almost) every node in the network. Finally, the transaction is verified by a mining node and included in a block of transactions that is recorded on the blockchain.
Once recorded on the blockchain and confirmed by sufficient subsequent blocks (confirmations), the transaction is a permanent part of the Bitcoin Cash ledger and is accepted as valid by all participants. The funds allocated to a new owner by the transaction can then be spent in a new transaction, extending the chain of ownership and beginning the lifecycle of a transaction again.
Creating Transactions
In some ways it helps to think of a transaction in the same way as a paper check. Like a check, a transaction is an instrument that expresses the intent to transfer money and is not visible to the financial system until it is submitted for execution. Like a check, the originator of the transaction does not have to be the one signing the transaction.
Transactions can be created online or offline by anyone, even if the person creating the transaction is not an authorized signer on the account. For example, an accounts payable clerk might process payable checks for signature by the CEO. Similarly, an accounts payable clerk can create Bitcoin Cash transactions and then have the CEO apply digital signatures to make them valid. Whereas a check references a specific account as the source of the funds, a Bitcoin Cash transaction references a specific previous transaction as its source, rather than an account.
Once a transaction has been created, it is signed by the owner (or owners) of the source funds. If it is properly formed and signed, the signed transaction is now valid and contains all the information needed to execute the transfer of funds. Finally, the valid transaction has to reach the Bitcoin Cash network so that it can be propagated until it reaches a miner for inclusion in the pubic ledger (the blockchain).
Broadcasting Transactions to the Bitcoin Cash Network
First, a transaction needs to be delivered to the Bitcoin Cash network so that it can be propagated and included in the blockchain. In essence, a Bitcoin Cash transaction is just 300 to 400 bytes of data and has to reach any one of tens of thousands of Bitcoin Cash nodes. The senders do not need to trust the nodes they use to broadcast the transaction, as long as they use more than one to ensure that it propagates. The nodes don’t need to trust the sender or establish the sender’s "identity." Because the transaction is signed and contains no confidential information, private keys, or credentials, it can be publicly broadcast using any underlying network transport that is convenient. Unlike credit card transactions, for example, which contain sensitive information and can only be transmitted on encrypted networks, a Bitcoin Cash transaction can be sent over any network. As long as the transaction can reach a Bitcoin Cash node that will propagate it into the Bitcoin Cash network, it doesn’t matter how it is transported to the first node.
Bitcoin Cash transactions can therefore be transmitted to the Bitcoin Cash network over insecure networks such as WiFi, Bluetooth, NFC, Chirp, barcodes, or by copying and pasting into a web form. In extreme cases, a Bitcoin Cash transaction could be transmitted over packet radio, satellite relay, or shortwave using burst transmission, spread spectrum, or frequency hopping to evade detection and jamming. A Bitcoin Cash transaction could even be encoded as smileys (emoticons) and posted in a public forum or sent as a text message or Skype chat message. Bitcoin Cash has turned money into a data structure, making it virtually impossible to stop anyone from creating and executing a Bitcoin Cash transaction.
Propagating Transactions on the Bitcoin Cash Network
Once a Bitcoin Cash transaction is sent to any node connected to the Bitcoin Cash network, the transaction will be validated by that node. If valid, that node will propagate it to the other nodes to which it is connected, and a success message will be returned synchronously to the originator. If the transaction is invalid, the node will reject it and synchronously return a rejection message to the originator.
The Bitcoin Cash network is a peer-to-peer network, meaning that each Bitcoin Cash node is connected to a few other Bitcoin Cash nodes that it discovers during startup through the peer-to-peer protocol. The entire network forms a loosely connected mesh without a fixed topology or any structure, making all nodes equal peers. Messages, including transactions and blocks, are propagated from each node to all the peers to which it is connected, a process called "flooding." A new validated transaction injected into any node on the network will be sent to all of the nodes connected to it (neighbors), each of which will send the transaction to all its neighbors, and so on. In this way, within a few seconds a valid transaction will propagate in an exponentially expanding ripple across the network until all nodes in the network have received it.
The Bitcoin Cash network is designed to propagate transactions and blocks to all nodes in an efficient and resilient manner that is resistant to attacks. To prevent spamming, denial-of-service attacks, or other nuisance attacks against the Bitcoin Cash system, every node independently validates every transaction before propagating it further. A malformed transaction will not get beyond one node.
Transaction Structure
A transaction is a data structure that encodes a transfer of value from a source of funds, called an input, to a destination, called an output. Transaction inputs and outputs are not related to accounts or identities. Instead, you should think of them as Bitcoin Cash amounts—chunks of Bitcoin Cash—being locked with a specific secret that only the owner, or person who knows the secret, can unlock. A transaction contains a number of fields, as shown in The structure of a transaction.
| Size | Field | Description | | --- | --- | --- | | 4 bytes | Version | Specifies which rules this transaction follows | | 1–9 bytes (VarInt) | Input Counter | How many inputs are included | | Variable | Inputs | One or more transaction inputs | | 1–9 bytes (VarInt) | Output Counter | How many outputs are included | | variable | Outputs | One or more transaction outputs | | 4 bytes | Locktime | A Unix timestamp or block number |
Table 1. The structure of a transaction
Transaction Locktime
Locktime, also known as nLockTime from the variable name used in the reference client, defines the earliest time that a transaction is valid and can be relayed on the network or added to the blockchain. It is set to zero in most transactions to indicate immediate propagation and execution. If locktime is nonzero and below 500 million, it is interpreted as a block height, meaning the transaction is not valid and is not relayed or included in the blockchain prior to the specified block height. If it is above 500 million, it is interpreted as a Unix Epoch timestamp (seconds since Jan-1-1970) and the transaction is not valid prior to the specified time. Transactions with locktime specifying a future block or time must be held by the originating system and transmitted to the Bitcoin Cash network only after they become valid. The use of locktime is equivalent to postdating a paper check.
Transaction Outputs and Inputs
The fundamental building block of a Bitcoin Cash transaction is an unspent transaction output, or UTXO. UTXO are indivisible chunks of Bitcoin Cash currency locked to a specific owner, recorded on the blockchain, and recognized as currency units by the entire network. The Bitcoin Cash network tracks all available (unspent) UTXO currently numbering in the millions. Whenever a user receives Bitcoin Cash, that amount is recorded within the blockchain as a UTXO. Thus, a user’s Bitcoin Cash might be scattered as UTXO amongst hundreds of transactions and hundreds of blocks. In effect, there is no such thing as a stored balance of a Bitcoin Cash address or account; there are only scattered UTXO, locked to specific owners. The concept of a user’s Bitcoin Cash balance is a derived construct created by the wallet application. The wallet calculates the user’s balance by scanning the blockchain and aggregating all UTXO belonging to that user.
There are no accounts or balances in Bitcoin Cash; there are only _unspent transaction outputs_ (UTXO) scattered in the blockchain.
A UTXO can have an arbitrary value denominated as a multiple of satoshis. Just like dollars can be divided down to two decimal places as cents, bitcoins can be divided down to eight decimal places as satoshis. Although UTXO can be any arbitrary value, once created it is indivisible just like a coin that cannot be cut in half. If a UTXO is larger than the desired value of a transaction, it must still be consumed in its entirety and change must be generated in the transaction. In other words, if you have a 20 Bitcoin Cash UTXO and want to pay 1 Bitcoin Cash, your transaction must consume the entire 20 Bitcoin Cash UTXO and produce two outputs: one paying 1 Bitcoin Cash to your desired recipient and another paying 19 Bitcoin Cash in change back to your wallet. As a result, most Bitcoin Cash transactions will generate change.
Imagine a shopper buying a $1.50 beverage, reaching into her wallet and trying to find a combination of coins and bank notes to cover the $1.50 cost. The shopper will choose exact change if available (a dollar bill and two quarters), or a combination of smaller denominations (six quarters), or if necessary, a larger unit such as a five dollar bank note. If she hands too much money, say $5, to the shop owner, she will expect $3.50 change, which she will return to her wallet and have available for future transactions.
Similarly, a Bitcoin Cash transaction must be created from a user’s UTXO in whatever denominations that user has available. Users cannot cut a UTXO in half any more than they can cut a dollar bill in half and use it as currency. The user’s wallet application will typically select from the user’s available UTXO various units to compose an amount greater than or equal to the desired transaction amount.
As with real life, the Bitcoin Cash application can use several strategies to satisfy the purchase amount: combining several smaller units, finding exact change, or using a single unit larger than the transaction value and making change. All of this complex assembly of spendable UTXO is done by the user’s wallet automatically and is invisible to users. It is only relevant if you are programmatically constructing raw transactions from UTXO.
The UTXO consumed by a transaction are called transaction inputs, and the UTXO created by a transaction are called transaction outputs. This way, chunks of Bitcoin Cash value move forward from owner to owner in a chain of transactions consuming and creating UTXO. Transactions consume UTXO by unlocking it with the signature of the current owner and create UTXO by locking it to the Bitcoin Cash address of the new owner.
The exception to the output and input chain is a special type of transaction called the coinbase transaction, which is the first transaction in each block. This transaction is placed there by the "winning" miner and creates brand-new Bitcoin Cash payable to that miner as a reward for mining. This is how Bitcoin Cash’s money supply is created during the mining process, as we will see in Mining and Consensus.
What comes first? Inputs or outputs, the chicken or the egg? Strictly speaking, outputs come first because coinbase transactions, which generate new Bitcoin Cash, have no inputs and create outputs from nothing.
Transaction Outputs
Every Bitcoin Cash transaction creates outputs, which are recorded on the Bitcoin Cash ledger. Almost all of these outputs, with one exception (see Data Output (OP_RETURN)) create spendable chunks of Bitcoin Cash called unspent transaction outputs or UTXO, which are then recognized by the whole network and available for the owner to spend in a future transaction. Sending someone Bitcoin Cash is creating an unspent transaction output (UTXO) registered to their address and available for them to spend.
UTXO are tracked by every full-node Bitcoin Cash client as a data set called the UTXO set or UTXO pool, held in a database. New transactions consume (spend) one or more of these outputs from the UTXO set.
Transaction outputs consist of two parts:
- An amount of Bitcoin Cash, denominated in satoshis, the smallest Bitcoin Cash unit
- A locking script, also known as an "encumbrance" that "locks" this amount by specifying the conditions that must be met to spend the output
The transaction scripting language, used in the locking script mentioned previously, is discussed in detail in Transaction Scripts and Script Language. The structure of a transaction output shows the structure of a transaction output.
| Size | Field | Description | | --- | --- | --- | | 8 bytes | Amount | Bitcoin Cash value in satoshis (108 Bitcoin Cash) | | 1–9 bytes (VarInt) | Locking-Script Size | Locking-Script length in bytes, to follow | | Variable | Locking-Script | A script defining the conditions needed to spend the output | | 1–9 bytes (VarInt) | Output Counter | How many outputs are included | | variable | Outputs | One or more transaction outputs | | 4 bytes | Locktime | A Unix timestamp or block number |
Table 2. The structure of a transaction output
In A script that calls
bitbox.Address.utxo
to find the UTXO related to an address, we use thebitbox.Address
class to find the unspent outputs (UTXO) of a specific address.Example 1. A script that calls
bitbox.Address.utxo
to find the UTXO related to an address```javascript bitbox.Address.utxo('bitcoincash:qpcxf2sv9hjw08nvpgffpamfus9nmksm3chv5zqtnz').then((result) => { console.log(result); }, (err) => { console.log(err); });
Returns the following: [{ txid: 'cc27be8846276612dfce5924b7be96556212f0f0e62bd17641732175edb9911e', vout: 0, scriptPubKey: '76a9147064aa0c2de4e79e6c0a1290f769e40b3dda1b8e88ac', amount: 0.00007021, satoshis: 7021, height: 527155, confirmations: 11879, legacyAddress: '1BFHGm4HzqgXXyNX8n7DsQno5DAC4iLMRA', cashAddress: 'bitcoincash:qpcxf2sv9hjw08nvpgffpamfus9nmksm3chv5zqtnz' } ] ```
Running the script, we see an array of objects representing unspent transaction outputs which are available to this address.
Spending conditions (encumbrances)
Transaction outputs associate a specific amount (in satoshis) to a specific encumbrance or locking script that defines the condition that must be met to spend that amount. In most cases, the locking script will lock the output to a specific Bitcoin Cash address, thereby transferring ownership of that amount to the new owner. When Alice paid Bob’s Cafe for a cup of coffee, her transaction created a 0.00208507 Bitcoin Cash output encumbered or locked to the cafe’s Bitcoin Cash address. That 0.00208507 Bitcoin Cash output was recorded on the blockchain and became part of the Unspent Transaction Output set, meaning it showed in Bob’s wallet as part of the available balance. When Bob chooses to spend that amount, his transaction will release the encumbrance, unlocking the output by providing an unlocking script containing a signature from Bob’s private key.
Transaction Inputs
In simple terms, transaction inputs are pointers to UTXO. They point to a specific UTXO by reference to the transaction hash and sequence number where the UTXO is recorded in the blockchain. To spend UTXO, a transaction input also includes unlocking scripts that satisfy the spending conditions set by the UTXO. The unlocking script is usually a signature proving ownership of the Bitcoin Cash address that is in the locking script.
When users make a payment, their wallet constructs a transaction by selecting from the available UTXO. For example, to make a 0.00208507 Bitcoin Cash payment, the wallet app may select a 0.002 UTXO and a 0.00008507 UTXO, using them both to add up to the desired payment amount.
Once the UTXO is selected, the wallet then produces unlocking scripts containing signatures for each of the UTXO, thereby making them spendable by satisfying their locking script conditions. The wallet adds these UTXO references and unlocking scripts as inputs to the transaction. The structure of a transaction input shows the structure of a transaction input.
| Size | Field | Description | | --- | --- | --- | | 32 bytes | Transaction Hash | Pointer to the transaction containing the UTXO to be spent | | 4 bytes | Output Index | The index number of the UTXO to be spent; first one is 0 | | 1-9 bytes (VarInt) | Unlocking-Script Size | Unlocking-Script length in bytes, to follow | | Variable | Unlocking-Script | A script that fulfills the conditions of the UTXO locking script | | 4 bytes | Sequence Number | Currently disabled Tx-replacement feature, set to 0xFFFFFFFF |
Table 3. The structure of a transaction input
Transaction Fees
Most transactions include transaction fees, which compensate the Bitcoin Cash miners for securing the network. Mining and the fees and rewards collected by miners are discussed in more detail in Mining and Consensus. This section examines how transaction fees are included in a typical transaction. Most wallets calculate and include transaction fees automatically. However, if you are constructing transactions programmatically, or using a command-line interface, you must manually account for and include these fees.
Transaction fees serve as an incentive to include (mine) a transaction into the next block and also as a disincentive against "spam" transactions or any kind of abuse of the system, by imposing a small cost on every transaction. Transaction fees are collected by the miner who mines the block that records the transaction on the blockchain.
Transaction fees are calculated based on the size of the transaction in kilobytes, not the value of the transaction in Bitcoin Cash. Overall, transaction fees are set based on market forces within the Bitcoin Cash network. Miners prioritize transactions based on many different criteria, including fees, and might even process transactions for free under certain circumstances. Transaction fees affect the processing priority, meaning that a transaction with sufficient fees is likely to be included in the next-most–mined block, whereas a transaction with insufficient or no fees might be delayed, processed on a best-effort basis after a few blocks, or not processed at all. Transaction fees are not mandatory, and transactions without fees might be processed eventually; however, including transaction fees encourages priority processing.
The current algorithm used by miners to prioritize transactions for inclusion in a block based on their fees is examined in detail in Mining and Consensus.
Adding Fees to Transactions
The data structure of transactions does not have a field for fees. Instead, fees are implied as the difference between the sum of inputs and the sum of outputs. Any excess amount that remains after all outputs have been deducted from all inputs is the fee that is collected by the miners.
Transaction fees are implied, as the excess of inputs minus outputs:
Fees = Sum(Inputs) – Sum(Outputs)
This is a somewhat confusing element of transactions and an important point to understand, because if you are constructing your own transactions you must ensure you do not inadvertently include a very large fee by underspending the inputs. That means that you must account for all inputs, if necessary by creating change, or you will end up giving the miners a very big tip!
For example, if you consume a 20-Bitcoin Cash UTXO to make a 1-Bitcoin Cash payment, you must include a 19-Bitcoin Cash change output back to your wallet. Otherwise, the 19-Bitcoin Cash "leftover" will be counted as a transaction fee and will be collected by the miner who mines your transaction in a block. Although you will receive priority processing and make a miner very happy, this is probably not what you intended.
If you forget to add a change output in a manually constructed transaction, you will be paying the change as a transaction fee. "Keep the change!" might not be what you intended.
Let’s see how this works in practice, by looking at Alice’s coffee purchase again. Alice wants to spend 0.00208507 Bitcoin Cash to pay for coffee. To ensure this transaction is processed promptly, she will want to include a transaction fee of 1 satoshi per byte. That will mean that the total cost of the transaction will be 0.00208750. Her wallet must therefore source a set of UTXO that adds up to 0.00208750 Bitcoin Cash or more and, if necessary, create change. Let’s say her wallet has a 0.00277257-Bitcoin Cash UTXO available. It will therefore need to consume this UTXO, create one output to Bob’s Cafe for 0.00208507, and a second output with 0.00068507 Bitcoin Cash in change back to her own wallet, leaving 0.00000243 Bitcoin Cash unallocated, as an implicit fee for the transaction.
Transaction Chaining and Orphan Transactions
As we have seen, transactions form a chain, whereby one transaction spends the outputs of the previous transaction (known as the parent) and creates outputs for a subsequent transaction (known as the child). Sometimes an entire chain of transactions depending on each other—say a parent, child, and grandchild transaction—are created at the same time, to fulfill a complex transactional workflow that requires valid children to be signed before the parent is signed.
When a chain of transactions is transmitted across the network, they don’t always arrive in the same order. Sometimes, the child might arrive before the parent. In that case, the nodes that see a child first can see that it references a parent transaction that is not yet known. Rather than reject the child, they put it in a temporary pool to await the arrival of its parent and propagate it to every other node. The pool of transactions without parents is known as the orphan transaction pool. Once the parent arrives, any orphans that reference the UTXO created by the parent are released from the pool, revalidated recursively, and then the entire chain of transactions can be included in the transaction pool, ready to be mined in a block. Transaction chains can be arbitrarily long, with any number of generations transmitted simultaneously. The mechanism of holding orphans in the orphan pool ensures that otherwise valid transactions will not be rejected just because their parent has been delayed and that eventually the chain they belong to is reconstructed in the correct order, regardless of the order of arrival.
There is a limit to the number of orphan transactions stored in memory, to prevent a denial-of-service attack against Bitcoin Cash nodes. The limit is defined as MAX_ORPHAN_TRANSACTIONS in the source code of the Bitcoin Cash reference client. If the number of orphan transactions in the pool exceeds MAX_ORPHAN_TRANSACTIONS, one or more randomly selected orphan transactions are evicted from the pool, until the pool size is back within limits.
Transaction Scripts and Script Language
Bitcoin Cash clients validate transactions by executing a script, written in a Forth-like scripting language. Both the locking script (encumbrance) placed on a UTXO and the unlocking script that usually contains a signature are written in this scripting language. When a transaction is validated, the unlocking script in each input is executed alongside the corresponding locking script to see if it satisfies the spending condition.
Today, most transactions processed through the Bitcoin Cash network have the form "Alice pays Bob" and are based on the same script called a Pay-to-Public-Key-Hash script. However, the use of scripts to lock outputs and unlock inputs means that through use of the programming language, transactions can contain an infinite number of conditions. Bitcoin Cash transactions are not limited to the "Alice pays Bob" form and pattern.
This is only the tip of the iceberg of possibilities that can be expressed with this scripting language. In this section, we will demonstrate the components of the Bitcoin Cash transaction scripting language and show how it can be used to express complex conditions for spending and how those conditions can be satisfied by unlocking scripts.
Bitcoin Cash transaction validation is not based on a static pattern, but instead is achieved through the execution of a scripting language. This language allows for a nearly infinite variety of conditions to be expressed. This is how Bitcoin Cash gets the power of "programmable money."
Script Construction (Lock + Unlock)
Bitcoin Cash’s transaction validation engine relies on two types of scripts to validate transactions: a locking script and an unlocking script.
A locking script is an encumbrance placed on an output, and it specifies the conditions that must be met to spend the output in the future. Historically, the locking script was called a scriptPubKey, because it usually contained a public key or Bitcoin Cash address. In this book we refer to it as a "locking script" to acknowledge the much broader range of possibilities of this scripting technology. In most Bitcoin Cash applications, what we refer to as a locking script will appear in the source code as scriptPubKey.
An unlocking script is a script that "solves," or satisfies, the conditions placed on an output by a locking script and allows the output to be spent. Unlocking scripts are part of every transaction input, and most of the time they contain a digital signature produced by the user’s wallet from his or her private key. Historically, the unlocking script is called scriptSig, because it usually contained a digital signature. In most Bitcoin Cash applications, the source code refers to the unlocking script as scriptSig. In this book, we refer to it as an "unlocking script" to acknowledge the much broader range of locking script requirements, because not all unlocking scripts must contain signatures.
Every Bitcoin Cash client will validate transactions by executing the locking and unlocking scripts together. For each input in the transaction, the validation software will first retrieve the UTXO referenced by the input. That UTXO contains a locking script defining the conditions required to spend it. The validation software will then take the unlocking script contained in the input that is attempting to spend this UTXO and execute the two scripts.
In the original Bitcoin Cash client, the unlocking and locking scripts were concatenated and executed in sequence. For security reasons, this was changed in 2010, because of a vulnerability that allowed a malformed unlocking script to push data onto the stack and corrupt the locking script. In the current implementation, the scripts are executed separately with the stack transferred between the two executions, as described next.
First, the unlocking script is executed, using the stack execution engine. If the unlocking script executed without errors (e.g., it has no "dangling" operators left over), the main stack (not the alternate stack) is copied and the locking script is executed. If the result of executing the locking script with the stack data copied from the unlocking script is "TRUE," the unlocking script has succeeded in resolving the conditions imposed by the locking script and, therefore, the input is a valid authorization to spend the UTXO. If any result other than "TRUE" remains after execution of the combined script, the input is invalid because it has failed to satisfy the spending conditions placed on the UTXO. Note that the UTXO is permanently recorded in the blockchain, and therefore is invariable and is unaffected by failed attempts to spend it by reference in a new transaction. Only a valid transaction that correctly satisfies the conditions of the UTXO results in the UTXO being marked as "spent" and removed from the set of available (unspent) UTXO.
Combining scriptSig and scriptPubKey to evaluate a transaction script is an example of the unlocking and locking scripts for the most common type of Bitcoin Cash transaction (a payment to a public key hash), showing the combined script resulting from the concatenation of the unlocking and locking scripts prior to script validation.
Figure 1. Combining scriptSig and scriptPubKey to evaluate a transaction script
Scripting Language
The Bitcoin Cash transaction script language, called Script, is a Forth-like reverse-polish notation stack-based execution language. If that sounds like gibberish, you probably haven’t studied 1960’s programming languages. Script is a very simple language that was designed to be limited in scope and executable on a range of hardware, perhaps as simple as an embedded device, such as a handheld calculator. It requires minimal processing and cannot do many of the fancy things modern programming languages can do. In the case of programmable money, that is a deliberate security feature.
Bitcoin Cash’s scripting language is called a stack-based language because it uses a data structure called a stack. A stack is a very simple data structure, which can be visualized as a stack of cards. A stack allows two operations: push and pop. Push adds an item on top of the stack. Pop removes the top item from the stack.
The scripting language executes the script by processing each item from left to right. Numbers (data constants) are pushed onto the stack. Operators push or pop one or more parameters from the stack, act on them, and might push a result onto the stack. For example, OP_ADD will pop two items from the stack, add them, and push the resulting sum onto the stack.
Conditional operators evaluate a condition, producing a boolean result of TRUE or FALSE. For example, OP_EQUAL pops two items from the stack and pushes TRUE (TRUE is represented by the number 1) if they are equal or FALSE (represented by zero) if they are not equal. Bitcoin Cash transaction scripts usually contain a conditional operator, so that they can produce the TRUE result that signifies a valid transaction.
In Bitcoin Cash’s script validation doing simple math, the script 2 3 OP_ADD 5 OP_EQUAL demonstrates the arithmetic addition operator OP_ADD, adding two numbers and putting the result on the stack, followed by the conditional operator OP_EQUAL, which checks that the resulting sum is equal to 5. For brevity, the OP_ prefix is omitted in the step-by-step example.
The following is a slightly more complex script, which calculates 2 + 7 – 3 + 1. Notice that when the script contains several operators in a row, the stack allows the results of one operator to be acted upon by the next operator:
2 7 OP_ADD 3 OP_SUB 1 OP_ADD 7 OP_EQUAL
Try validating the preceding script yourself using pencil and paper. When the script execution ends, you should be left with the value TRUE on the stack.
Although most locking scripts refer to a Bitcoin Cash address or public key, thereby requiring proof of ownership to spend the funds, the script does not have to be that complex. Any combination of locking and unlocking scripts that results in a TRUE value is valid. The simple arithmetic we used as an example of the scripting language is also a valid locking script that can be used to lock a transaction output.
Use part of the arithmetic example script as the locking script:
3 OP_ADD 5 OP_EQUAL
which can be satisfied by a transaction containing an input with the unlocking script:
2
The validation software combines the locking and unlocking scripts and the resulting script is:
2 3 OP_ADD 5 OP_EQUAL
As we saw in the step-by-step example in Bitcoin Cash’s script validation doing simple math, when this script is executed, the result is OP_TRUE, making the transaction valid. Not only is this a valid transaction output locking script, but the resulting UTXO could be spent by anyone with the arithmetic skills to know that the number 2 satisfies the script.
Figure 2. Bitcoin Cash’s script validation doing simple math
Transactions are valid if the top result on the stack is TRUE (noted as {0x01}), any other non-zero value or if the stack is empty after script execution. Transactions are invalid if the top value on the stack is FALSE (a zero-length empty value, noted as {}) or if script execution is halted explicitly by an operator, such as OP_VERIFY, OP_RETURN, or a conditional terminator such as OP_ENDIF.
Turing Incompleteness
The Bitcoin Cash transaction script language contains many operators, but is deliberately limited in one important way—there are no loops or complex flow control capabilities other than conditional flow control. This ensures that the language is not Turing Complete, meaning that scripts have limited complexity and predictable execution times. Script is not a general-purpose language. These limitations ensure that the language cannot be used to create an infinite loop or other form of "logic bomb" that could be embedded in a transaction in a way that causes a denial-of-service attack against the Bitcoin Cash network. Remember, every transaction is validated by every full node on the Bitcoin Cash network. A limited language prevents the transaction validation mechanism from being used as a vulnerability.
Stateless Verification
The Bitcoin Cash transaction script language is stateless, in that there is no state prior to execution of the script, or state saved after execution of the script. Therefore, all the information needed to execute a script is contained within the script. A script will predictably execute the same way on any system. If your system verifies a script, you can be sure that every other system in the Bitcoin Cash network will also verify the script, meaning that a valid transaction is valid for everyone and everyone knows this. This predictability of outcomes is an essential benefit of the Bitcoin Cash system.
Standard Transactions
In the first few years of Bitcoin Cash’s development, the developers introduced some limitations in the types of scripts that could be processed by the reference client. These limitations are encoded in a function called isStandard(), which defines five types of "standard" transactions. These limitations are temporary and might be lifted by the time you read this. Until then, the five standard types of transaction scripts are the only ones that will be accepted by the reference client and most miners who run the reference client. Although it is possible to create a nonstandard transaction containing a script that is not one of the standard types, you must find a miner who does not follow these limitations to mine that transaction into a block.
Check the source code of the Bitcoin Core client (the reference implementation) to see what is currently allowed as a valid transaction script.
The five standard types of transaction scripts are pay-to-public-key-hash (P2PKH), public-key, multi-signature (limited to 15 keys), pay-to-script-hash (P2SH), and data output (OP_RETURN), which are described in more detail in the following sections.
Pay-to-Public-Key-Hash (P2PKH)
The vast majority of transactions processed on the Bitcoin Cash network are P2PKH transactions. These contain a locking script that encumbers the output with a public key hash, more commonly known as a Bitcoin Cash address. Transactions that pay a Bitcoin Cash address contain P2PKH scripts. An output locked by a P2PKH script can be unlocked (spent) by presenting a public key and a digital signature created by the corresponding private key.
For example, let’s look at Alice’s payment to Bob’s Cafe again. Alice made a payment of 0.00208507 Bitcoin Cash to the cafe’s Bitcoin Cash address. That transaction output would have a locking script of the form:
OP_DUP OP_HASH160 <Cafe Public Key Hash> OP_EQUAL OP_CHECKSIG
The Cafe Public Key Hash is equivalent to the Bitcoin Cash address of the cafe, without the Base58Check encoding. Most applications would show the public key hash in hexadecimal encoding and not the familiar Bitcoin Cash address Base58Check format that begins with a "1".
The preceding locking script can be satisfied with an unlocking script of the form:
<Cafe Signature> <Cafe Public Key>
The two scripts together would form the following combined validation script:
<Cafe Signature> <Cafe Public Key> OP_DUP OP_HASH160 <Cafe Public Key Hash> OP_EQUAL OP_CHECKSIG
When executed, this combined script will evaluate to TRUE if, and only if, the unlocking script matches the conditions set by the locking script. In other words, the result will be TRUE if the unlocking script has a valid signature from the cafe’s private key that corresponds to the public key hash set as an encumbrance.
Figures and show (in two parts) a step-by-step execution of the combined script, which will prove this is a valid transaction.
Figure 3. Evaluating a script for a P2PKH transaction (Part 1 of 2)
Pay-to-Public-Key
Pay-to-public-key is a simpler form of a Bitcoin Cash payment than pay-to-public-key-hash. With this script form, the public key itself is stored in the locking script, rather than a public-key-hash as with P2PKH earlier, which is much shorter. Pay-to-public-key-hash was invented by Satoshi to make Bitcoin Cash addresses shorter, for ease of use. Pay-to-public-key is now most often seen in coinbase transactions, generated by older mining software that has not been updated to use P2PKH.
A pay-to-public-key locking script looks like this:
<Public Key A> OP_CHECKSIG
The corresponding unlocking script that must be presented to unlock this type of output is a simple signature, like this:
<Signature from Private Key A>
The combined script, which is validated by the transaction validation software, is:
<Signature from Private Key A> <Public Key A> OP_CHECKSIG
This script is a simple invocation of the CHECKSIG operator, which validates the signature as belonging to the correct key and returns TRUE on the stack.
Figure 4. Evaluating a script for a P2PKH transaction (Part 2 of 2)
Multi-Signature
Multi-signature scripts set a condition where N public keys are recorded in the script and at least M of those must provide signatures to release the encumbrance. This is also known as an M-of-N scheme, where N is the total number of keys and M is the threshold of signatures required for validation. For example, a 2-of-3 multi-signature is one where three public keys are listed as potential signers and at least two of those must be used to create signatures for a valid transaction to spend the funds. At this time, standard multi-signature scripts are limited to at most 15 listed public keys, meaning you can do anything from a 1-of-1 to a 15-of-15 multi-signature or any combination within that range. The limitation to 15 listed keys might be lifted by the time this book is published, so check the isStandard() function to see what is currently accepted by the network.
The general form of a locking script setting an M-of-N multi-signature condition is:
M <Public Key 1> <Public Key 2> ... <Public Key N> N OP_CHECKMULTISIG
where N is the total number of listed public keys and M is the threshold of required signatures to spend the output.
A locking script setting a 2-of-3 multi-signature condition looks like this:
2 <Public Key A> <Public Key B> <Public Key C> 3 OP_CHECKMULTISIG
The preceding locking script can be satisfied with an unlocking script containing pairs of signatures and public keys:
OP_0 <Signature B> <Signature C>
or any combination of two signatures from the private keys corresponding to the three listed public keys.
The prefix OP_0 is required because of a bug in the original implementation of CHECKMULTISIG where one item too many is popped off the stack. It is ignored by CHECKMULTISIG and is simply a placeholder.
The two scripts together would form the combined validation script:
OP_0 <Signature B> <Signature C> 2 <Public Key A> <Public Key B> <Public Key C> 3 OP_CHECKMULTISIG
When executed, this combined script will evaluate to TRUE if, and only if, the unlocking script matches the conditions set by the locking script. In this case, the condition is whether the unlocking script has a valid signature from the two private keys that correspond to two of the three public keys set as an encumbrance.
Data Output (OP_RETURN)
Bitcoin Cash’s distributed and timestamped ledger, the blockchain, has potential uses far beyond payments. Many developers have tried to use the transaction scripting language to take advantage of the security and resilience of the system for applications such as digital notary services, stock certificates, and smart contracts. Early attempts to use Bitcoin Cash’s script language for these purposes involved creating transaction outputs that recorded data on the blockchain; for example, to record a digital fingerprint of a file in such a way that anyone could establish proof-of-existence of that file on a specific date by reference to that transaction.
The use of Bitcoin Cash’s blockchain to store data unrelated to Bitcoin Cash payments is a controversial subject. Many developers consider such use abusive and want to discourage it. Others view it as a demonstration of the powerful capabilities of blockchain technology and want to encourage such experimentation. Those who object to the inclusion of non-payment data argue that it causes "blockchain bloat," burdening those running full Bitcoin Cash nodes with carrying the cost of disk storage for data that the blockchain was not intended to carry. Moreover, such transactions create UTXO that cannot be spent, using the destination Bitcoin Cash address as a free-form 20-byte field. Because the address is used for data, it doesn’t correspond to a private key and the resulting UTXO can never be spent; it’s a fake payment. These transactions that can never be spent are therefore never removed from the UTXO set and cause the size of the UTXO database to forever increase, or "bloat."
A compromise was reached with the introduction of the OPRETURN operator. OP_RETURN allows developers to add 220 bytes of nonpayment data to a transaction output. However, unlike the use of "fake" UTXO, the OP_RETURN operator creates an explicitly _provably unspendable output, which does not need to be stored in the UTXO set. OP_RETURN outputs are recorded on the blockchain, so they consume disk space and contribute to the increase in the blockchain’s size, but they are not stored in the UTXO set and therefore do not bloat the UTXO memory pool and burden full nodes with the cost of more expensive RAM.
``` OP_RETURN scripts look like this:
OP_RETURN ```
The data portion is limited to 220 bytes and most often represents a hash, such as the output from the SHA256 algorithm (32 bytes). Many applications put a prefix in front of the data to help identify the application per the Terab 4-byte prefix guideline for OP_RETURN on Bitcoin Cash.
Keep in mind that there is no "unlocking script" that corresponds to OPRETURN that could possibly be used to "spend" an OP_RETURN output. The whole point of OP_RETURN is that you can’t spend the money locked in that output, and therefore it does not need to be held in the UTXO set as potentially spendable—OP_RETURN is _provably un-spendable. OP_RETURN is usually an output with a zero Bitcoin Cash amount, because any Bitcoin Cash assigned to such an output is effectively lost forever. If an OP_RETURN is encountered by the script validation software, it results immediately in halting the execution of the validation script and marking the transaction as invalid. Thus, if you accidentally reference an OP_RETURN output as an input in a transaction, that transaction is invalid.
A standard transaction (one that conforms to the isStandard() checks) can have only one OP_RETURN output. However, a single OP_RETURN output can be combined in a transaction with outputs of any other type.
OP_RETURN was initially proposed with a limit of 80 bytes, but the limit was raised to 220 bytes of data on the May 15th 2018 BCH network upgrade.
Pay-to-Script-Hash (P2SH)
Pay-to-script-hash (P2SH) was introduced in 2012 as a powerful new type of transaction that greatly simplifies the use of complex transaction scripts. To explain the need for P2SH, let’s look at a practical example.
In What is Bitcoin Cash we introduced Mohammed, an electronics importer based in Dubai. Mohammed’s company uses Bitcoin Cash’s multi-signature feature extensively for its corporate accounts. Multi-signature scripts are one of the most common uses of Bitcoin Cash’s advanced scripting capabilities and are a very powerful feature. Mohammed’s company uses a multi-signature script for all customer payments, known in accounting terms as "accounts receivable," or AR. With the multi-signature scheme, any payments made by customers are locked in such a way that they require at least two signatures to release, from Mohammed and one of his partners or from his attorney who has a backup key. A multi-signature scheme like that offers corporate governance controls and protects against theft, embezzlement, or loss.
The resulting script is quite long and looks like this:
2 <Mohammed's Public Key> 5 OP_CHECKMULTISIG
Although multi-signature scripts are a powerful feature, they are cumbersome to use. Given the preceding script, Mohammed would have to communicate this script to every customer prior to payment. Each customer would have to use special Bitcoin Cash wallet software with the ability to create custom transaction scripts, and each customer would have to understand how to create a transaction using custom scripts. Furthermore, the resulting transaction would be about five times larger than a simple payment transaction, because this script contains very long public keys. The burden of that extra-large transaction would be borne by the customer in the form of fees. Finally, a large transaction script like this would be carried in the UTXO set in RAM in every full node, until it was spent. All of these issues make using complex output scripts difficult in practice.
Pay-to-script-hash (P2SH) was developed to resolve these practical difficulties and to make the use of complex scripts as easy as a payment to a Bitcoin Cash address. With P2SH payments, the complex locking script is replaced with its digital fingerprint, a cryptographic hash. When a transaction attempting to spend the UTXO is presented later, it must contain the script that matches the hash, in addition to the unlocking script. In simple terms, P2SH means "pay to a script matching this hash, a script that will be presented later when this output is spent."
In P2SH transactions, the locking script that is replaced by a hash is referred to as the redeem script because it is presented to the system at redemption time rather than as a locking script. Complex script without P2SH shows the script without P2SH and Complex script as P2SH shows the same script encoded with P2SH.
Locking Script: 2 PubKey1 PubKey2 PubKey3 PubKey4 PubKey5 5 OP_CHECKMULTISIG Unlocking Script: Sig1 Sig2
Table 4. Complex script without P2SH
Redeem Script: 2 PubKey1 PubKey2 PubKey3 PubKey4 PubKey5 5 OP_CHECKMULTISIG Locking Script: OP_HASH160 <20-byte hash of redeem script> OP_EQUAL Unlocking Script: Sig1 Sig2 redeem script
Table 5. Complex script as P2SH
As you can see from the tables, with P2SH the complex script that details the conditions for spending the output (redeem script) is not presented in the locking script. Instead, only a hash of it is in the locking script and the redeem script itself is presented later, as part of the unlocking script when the output is spent. This shifts the burden in fees and complexity from the sender to the recipient (spender) of the transaction.
Let’s look at Mohammed’s company, the complex multi-signature script, and the resulting P2SH scripts.
First, the multi-signature script that Mohammed’s company uses for all incoming payments from customers:
2 <Mohammed's Public Key> <Partner1 Public Key> <Partner2 Public Key> <Partner3 Public Key> <Attorney Public Key> 5 OP_CHECKMULTISIG
If the placeholders are replaced by actual public keys (shown here as 520-bit numbers starting with 04) you can see that this script becomes very long:
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
This entire script can instead be represented by a 20-byte cryptographic hash, by first applying the SHA256 hashing algorithm and then applying the RIPEMD160 algorithm on the result. The 20-byte hash of the preceding script is:
54c557e07dde5bb6cb791c7a540e0a4796f5e97e
A P2SH transaction locks the output to this hash instead of the longer script, using the locking script:
OP_HASH160 54c557e07dde5bb6cb791c7a540e0a4796f5e97e OP_EQUAL
which, as you can see, is much shorter. Instead of "pay to this 5-key multi-signature script," the P2SH equivalent transaction is "pay to a script with this hash." A customer making a payment to Mohammed’s company need only include this much shorter locking script in his payment. When Mohammed wants to spend this UTXO, they must present the original redeem script (the one whose hash locked the UTXO) and the signatures necessary to unlock it, like this:
<Sig1> <Sig2> <2 PK1 PK2 PK3 PK4 PK5 5 OP_CHECKMULTISIG>
The two scripts are combined in two stages. First, the redeem script is checked against the locking script to make sure the hash matches:
<2 PK1 PK2 PK3 PK4 PK5 5 OP_CHECKMULTISIG> OP_HASH160 <redeem scriptHash> OP_EQUAL
If the redeem script hash matches, the unlocking script is executed on its own, to unlock the redeem script:
<Sig1> <Sig2> 2 PK1 PK2 PK3 PK4 PK5 5 OP_CHECKMULTISIG
Pay-to-script-hash addresses
Another important part of the P2SH feature is the ability to encode a script hash as an address, as defined in BIP0013. P2SH addresses are Base58Check encodings of the 20-byte hash of a script, just like Bitcoin Cash addresses are Base58Check encodings of the 20-byte hash of a public key. P2SH addresses use the version prefix "5", which results in Base58Check-encoded addresses that start with a "3". For example, Mohammed’s complex script, hashed and Base58Check-encoded as a P2SH address becomes 39RF6JqABiHdYHkfChV6USGMe6Nsr66Gzw. Now, Mohammed can give this "address" to his customers and they can use almost any Bitcoin Cash wallet to make a simple payment, as if it were a Bitcoin Cash address. The 3 prefix gives them a hint that this is a special type of address, one corresponding to a script instead of a public key, but otherwise it works in exactly the same way as a payment to a Bitcoin Cash address.
P2SH addresses hide all of the complexity, so that the person making a payment does not see the script.
Benefits of pay-to-script-hash
The pay-to-script-hash feature offers the following benefits compared to the direct use of complex scripts in locking outputs:
- Complex scripts are replaced by shorter fingerprints in the transaction output, making the transaction smaller.
- Scripts can be coded as an address, so the sender and the sender’s wallet don’t need complex engineering to implement P2SH.
- P2SH shifts the burden of constructing the script to the recipient, not the sender.
- P2SH shifts the burden in data storage for the long script from the output (which is in the UTXO set) to the input (stored on the blockchain).
- P2SH shifts the burden in data storage for the long script from the present time (payment) to a future time (when it is spent).
- P2SH shifts the transaction fee cost of a long script from the sender to the recipient, who has to include the long redeem script to spend it.
Redeem script and isStandard validation
Prior to version 0.9.2, pay-to-script-hash was limited to the standard types of Bitcoin Cash transaction scripts, by the isStandard() function. That means that the redeem script presented in the spending transaction could only be one of the standard types: P2PK, P2PKH, or multi-sig nature, excluding OP_RETURN and P2SH itself.
As of version 0.9.2, P2SH transactions can contain any valid script, making the P2SH standard much more flexible and allowing for experimentation with many novel and complex types of transactions.
Note that you are not able to put a P2SH inside a P2SH redeem script, because the P2SH specification is not recursive. You are also still not able to use OP_RETURN in a redeem script because OP_RETURN cannot be redeemed by definition.
Note that because the redeem script is not presented to the network until you attempt to spend a P2SH output, if you lock an output with the hash of an invalid transaction it will be processed regardless. However, you will not be able to spend it because the spending transaction, which includes the redeem script, will not be accepted because it is an invalid script. This creates a risk, because you can lock Bitcoin Cash in a P2SH that cannot be spent later. The network will accept the P2SH encumbrance even if it corresponds to an invalid redeem script, because the script hash gives no indication of the script it represents.
P2SH locking scripts contain the hash of a redeem script, which gives no clues as to the content of the redeem script itself. The P2SH transaction will be considered valid and accepted even if the redeem script is invalid. You might accidentally lock Bitcoin Cash in such a way that it cannot later be spent.
-
@ 3165b802:a9f51d37
2025-04-07 17:01:23Humanrights #Human #Rights
-
@ 8f69ac99:4f92f5fd
2025-04-07 15:35:08No dia 2 de Abril de 2025, o Presidente dos Estados Unidos, Donald Trump, anunciou um novo pacote abrangente de tarifas com o objectivo de combater os desequilíbrios comerciais e revitalizar as indústrias nacionais. Foi imposta uma tarifa geral de 10% sobre todas as importações, com taxas mais elevadas—34% para a China e 20% para a União Europeia—em preparação para entrar em vigor. O anúncio reacendeu debates antigos sobre proteccionismo, globalização e o futuro do dólar norte-americano.
Embora estas medidas possam parecer extremas, as tarifas são um instrumento tradicional da política comercial internacional. Países de todo o mundo, incluindo a União Europeia, utilizam-nas rotineiramente para proteger indústrias estratégicas, regular o comércio e gerar receitas. A UE, por exemplo, impõe há muito tempo taxas sobre produtos norte-americanos como bens agrícolas, maquinaria e têxteis. Em contrapartida, os EUA já taxaram importações da UE, como o aço, alumínio e aeronaves, em disputas comerciais.
O que distingue a proposta de Trump é a sua escala, ambição e o objectivo mais amplo: reestruturar a economia dos EUA. Por detrás desta estratégia está uma realidade económica mais profunda—moldada por décadas de défices comerciais, endividamento crescente e o papel do dólar como moeda de reserva mundial. Este artigo explora como estes factores se cruzam, por que razão os EUA se encontram numa posição precária, e se políticas como tarifas elevadas, taxas de juro baixas ou até o Bitcoin podem apontar o caminho a seguir.
As Raízes da Crise: Sobreconsumo e Desindustrialização nos EUA
Durante décadas, os Estados Unidos "viveram acima das suas possibilidades", acumulando um défice comercial que actualmente ultrapassa os 800 mil milhões de dólares por ano. Este desequilíbrio—em que o país compra mais do que vende ao exterior—é sintoma de um problema mais profundo. No pós-Segunda Guerra Mundial, os EUA eram uma potência industrial. Mas, a partir dos anos 70, e com maior intensidade nos anos 90, a globalização transferiu a produção para o estrangeiro. As empresas procuraram custos de mão de obra mais baixos e os mercados norte-americanos encheram-se de produtos fabricados fora.
Para sustentar este consumo, os EUA apoiaram-se na sua posição privilegiada: a emissão da moeda de reserva mundial. Isso gerou um ciclo de endividamento, com o país a pedir emprestado ao exterior para manter o nível de vida. O resultado? Desindustrialização. Fábricas fecharam e milhões de empregos na indústria desapareceram em estados como Ohio, Michigan e Pensilvânia.
Hoje, os EUA produzem muito menos—em proporção ao seu tamanho—do que há algumas décadas, mesmo mantendo um apetite crescente por importações. O défice comercial expõe uma fragilidade estrutural: um país cada vez mais incapaz de sustentar-se através da sua própria produção. Os dólares gastos fora regressam muitas vezes sob a forma de compras de dívida pública, perpetuando o ciclo.
À medida que os défices crescem e a economia depende cada vez mais de mecanismos financeiros do que da produção real, surge uma questão inevitável: até quando poderá a América continuar a comprar a crédito antes que o cartão seja recusado?
O Dilema de Triffin: Moeda Global vs. Potência Industrial
Imagine ser a única pessoa numa cidade com uma impressora de dinheiro que todos usam. Para satisfazer a procura, continua a imprimir e a enviar notas para o exterior—até que o seu próprio negócio local entra em decadência e se torna dependente dos outros. Esta é a essência do Dilema de Triffin, e a corda bamba que os EUA têm vindo a atravessar há gerações.
O dilema surge quando a moeda de um país é usada como padrão global. O dólar—utilizado mundialmente para transacções de petróleo, comércio e reservas—precisa de estar amplamente disponível. Essa abundância provém de défices comerciais persistentes por parte dos EUA.
Mas os défices têm um custo. Os dólares enviados para fora voltam como procura por bens estrangeiros, enfraquecendo a produção interna. Porque fabricar um produto em Detroit por 10 dólares, quando se pode importar por $2? Com o tempo, isto destrói a base industrial do país.
Esta não é uma preocupação teórica—é uma realidade histórica. O economista Robert Triffin advertiu nos anos 60 que um país não pode simultaneamente manter a sua moeda como padrão mundial e conservar uma base industrial sólida. Os EUA confirmaram essa previsão. Após a guerra, os dólares ajudaram a reconstruir a Europa e o Japão, mas esses mesmos países tornaram-se concorrentes industriais dos EUA em sectores como o aço e a indústria automóvel.
As fábricas abandonadas no Midwest e os teares silenciosos no sul são marcas visíveis desta troca. O domínio do dólar concedeu influência global à América, mas às custas da sua produção.
Espiral da Dívida: Obrigações Financeiras Crescentes dos EUA
Em 2025, a dívida federal dos EUA ultrapassa os 36 biliões de dólares ($36 000 000 000 000 000 000)—cerca de 108 mil dólares por cada americano, adultos, jovens, idosos. Durante anos, o acesso fácil ao crédito e a procura global por dívida americana mascararam os riscos. Agora, as fissuras estão à vista.
O problema não é apenas o montante—é o prazo e o custo de manter esta dívida. Grande parte dela é de curto prazo, exigindo refinanciamentos frequentes. Com o aumento das taxas de juro, os custos associados disparam. Só em 2024, os pagamentos de juros ultrapassaram 1 bilião de dólares—mais do que os orçamentos combinados de educação, transportes e habitação.
A “Lei de Ferguson”, proposta pelo historiador Niall Ferguson, afirma que quando os juros da dívida superam os gastos militares, o império está em declínio. Em 2025, os EUA gastam cerca de 900 mil milhões em defesa, e os encargos com juros já os ultrapassaram.
Este ponto de viragem trouxe problemas a impérios do passado—do Reino Unido após a Primeira Guerra Mundial até Roma no seu declínio. Hoje, cresce o cepticismo quanto à saúde fiscal dos EUA. Países como a China e a Rússia estão a reduzir as suas reservas em dívida americana, preferindo ouro, yuan ou outros activos.
Se mais nações seguirem o mesmo caminho, os EUA terão de escolher: continuar a endividar-se para sustentar o sistema ou aceitar um papel reduzido para o dólar na economia mundial.
Desdolarização: A Mudança Global Longe do Dólar
A desdolarização refere-se à tendência crescente de reduzir a dependência do dólar nas transacções comerciais, reservas e sistemas financeiros. Embora o dólar ainda domine, a sua supremacia está sob crescente pressão de novas potências económicas e tensões geopolíticas.
Porque Está o Mundo a Afastar-se do Dólar?
- Risco Económico: A volatilidade do dólar, agravada pela dívida e instabilidade política nos EUA, torna-o menos fiável como reserva de valor.
- Instrumento Geopolítico: O uso do dólar pelos EUA para impor sanções leva rivais a procurar alternativas.
Alternativas Emergentes
- Ouro: Bancos centrais estão a reforçar as reservas em ouro como protecção.
- Commodities: Petróleo e cereais começam a ser transaccionados em moedas alternativas—como vendas de petróleo em yuan pela Arábia Saudita.
- Criptomoedas: Bitcoin e outros activos digitais ganham terreno como reservas neutras e descentralizadas.
- Moedas Regionais: Os países dos BRICS desenvolvem sistemas de pagamento e discutem uma moeda comum para reduzir a dependência do dólar.
Um Declínio Lento, Mas Visível
A percentagem do dólar nas reservas cambiais mundiais caiu de 70% no ano 2000 para menos de 60% actualmente. O comércio em moedas não-dólar cresceu 25% desde 2020. O domínio do dólar persiste, mas o movimento de mudança é claro.
A Estratégia Económica de Trump em 3 Etapas
Em 2025, Trump apresentou uma estratégia económica audaciosa em três frentes:
1. Tarifas Elevadas para Revitalizar a Indústria
Uma tarifa de 10% sobre todas as importações, com taxas superiores para países com superavit comercial, visa incentivar a produção interna. Críticos alertam para o aumento de preços e inflação, mas apoiantes defendem que é necessário para reindustrializar.
2. Redução das Taxas de Juro para Gerir a Dívida
A administração pressiona a Reserva Federal para baixar as taxas, reduzindo os encargos da dívida pública. Isto levanta preocupações sobre a independência do banco central e a estabilidade monetária a longo prazo.
3. Bitcoin como Activo Estratégico de Reserva
Num passo histórico, Trump assinou uma ordem executiva para criar a Reserva Estratégica de Bitcoin e o Stock Nacional de Activos Digitais. O objectivo é diversificar as reservas e proteger contra a inflação.
Riscos e Compensações
A estratégia económica de Trump não está isenta de riscos:
- Inflação: Tarifas mais altas poderão aumentar o custo de vida.
- Polarização Política: Medidas controversas poderão acentuar divisões internas.
- Incerteza Económica: O proteccionismo pode afastar investimento e travar a inovação.
- Instabilidade Monetária: Um erro na gestão da dívida ou dos activos digitais poderá enfraquecer o dólar.
Estes riscos exigem gestão cuidadosa para evitar agravar os problemas existentes.
O Papel de Bitcoin: Protecção ou Último Recurso?
Integrar Bitcoin nas reservas nacionais é ousado—mas pode ser revolucionário, e a meu ver, inevitável!
Vantagens
- Escassez: Com oferta limitada a 21 milhões de unidades, Bitcoin é deflacionário.
- Descentralização: Resistente à censura e manipulação, reforça a soberania financeira.
- Alcance Global: Sem fronteiras, permite trocas neutras num mundo multipolar.
Desafios
- Volatilidade: As flutuações no curto prazo são ainda significativas, mas a adopção institucional pode estabilizar o preço.
- Regulação: O enquadramento legal está em evolução, mas tende para maior clareza.
- Adopção Técnica: Persistem desafios de escalabilidade, embora soluções como a Lightning Network estejam a amadurecer.
A Reserva Estratégica de Bitcoin pode revelar-se visionária—ou precipitada. Tudo dependerá da execução e da aceitação global.
Futuros Possíveis: Crise ou Reinvenção?
Os EUA estão perante uma encruzilhada histórica. Um caminho aponta para a renovação: revitalizar a indústria e adoptar activos digitais, como por exemplo as stablecoins para perpetuar a hegemonia do dólar, lastreado em Bitcoin. O outro conduz à crise—com inflação, instabilidade e perda de influência global.
Num cenário optimista, os EUA emergem como líderes industriais e digitais, com reservas diversificadas que incluem Bitcoin. A recente ordem executiva para adquirir Bitcoin de forma neutra ao orçamento é um sinal positivo.
Num cenário pessimista, menos provável com as medidas em curso, o país mergulha em dívidas, vê o dólar enfraquecer e perde coesão interna. Mas com visão estratégica e inovação económica, há margem para navegar os desafios com sucesso.
Conclusão
A América enfrenta uma oportunidade única de redefinir o seu destino económico. A estratégia de Trump—baseada em tarifas, taxas de juro baixas e Bitcoin—pode marcar o início de uma nova era de resiliência e recuperação industrial.
A inclusão de Bitcoin nas reservas nacionais mostra que os instrumentos tradicionais já não bastam. Ao abraçar os activos digitais e restaurar a produção nacional, os EUA podem recuperar a liderança económica mundial.
O caminho será difícil. Mas com ousadia e execução eficaz, os Estados Unidos não só podem recuperar—podem reinventar-se.
-
@ 866e0139:6a9334e5
2025-04-07 12:40:23
Autor: Eva Schmidt. Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier. Dieser Beitrag ist zuvor auf* Radio München erschienen. Das Gesamtangebot von Radio München finden Sie* hier.**
„Denke daran, daß das, was dich wie an unsichtbaren Fäden hin- und herzieht, in deinem Innern verborgen ist", soll der römische Kaiser Marc Aurel gesagt haben, der letzte bedeutende Philosoph der jüngeren Stoa. Brot und Spiele hieß es damals, machten die Gesellschaften gefügig: Bier, Wein, Whiskey, Ablenkung, Informationssteuerung.
Das gesamte Gespräch gibt es unter folgendem Link (Vorschau wird in e-mails nicht angezeigt):
Wie sich die kognitive Einflussnahme zur Kriegsführung entwickelte, wie sie sich mit den heutigen medialen und technischen Mitteln darstellt und wie wir unsere Kinder und uns selbst davor schützen können, damit beschäftigt sich der Propagandaforscher und Amerikanist Dr. Jonas Tögel. Er promovierte zum Thema Soft Power und Motivation und forscht am Institut für Psychologie der Universität Regensburg. Meine Kollegin Eva Schmidt hat ihn interviewt und wollte zunächst von ihm wissen, wie er zur Propagandaforschung kam und auf welchen Grundlagen seine Tätigkeit aufbaut.
Dr. Jonas Tögel ist Amerikanist, Propagandaforscher und Bestsellerautor. Er hat zum Thema Soft Power und Motivation promoviert und arbeitet als wissenschaftlicher Mitarbeiter am Institut für Psychologie der Universität Regensburg. Seine Forschungsschwerpunkte sind unter anderem Motivation, der Einsatz von Soft-Power-Techniken, Nudging, Propaganda sowie epochale Herausforderungen des 20. und 21. Jahrhunderts. Bei Westend erschien zuletzt sein Bestseller Kognitive Kriegsführung (2023).
Sein aktuelles Buch "Kriegsspiele - Wie NATO und Pentagon die Zerstörung Europas simulieren" ist im Westend-Verlag erschienen, hat 111 Seiten und kostet 15 Euro.
LASSEN SIE DER FRIEDENSTAUBE FLÜGEL WACHSEN!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt. (Vorerst an alle, da wir den Mailversand testen, später ca. drei Mails pro Woche.).
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: milosz@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ f1577c25:de26ba14
2025-04-07 09:44:30تنبيه مهم
أهلاً! قبل ما نبدأ، أنا مش مستشار مالي ولا خبير حاجة. أنا بس واحد قعد يتابع قنوات ويقرا عن الاستثمار الفترة اللي فاتت. مش مسؤول عن أي خسارة فلوس، بس كل اللي هاقوله هنا أنا بطبقه على نفسي الأول، فطبعاً مش هاضر نفسي (عن قصد على الأقل).
إيه اللي هنتكلم عنه
هاعمل سلسلة بوستات عن: - الأساسيات اللي لازم تعرفها عن الاستثمار والتداول - أفكار تساعدك تعمل محفظة استثمارية كويسة - تجربتي مع تطبيقات الاستثمار المختلفة - إجابة على الأسئلة اللي بتتسأل كتير
هاحدّث البوستات لو في معلومات جديدة وهاكتب تاريخ آخر تحديث. عايز تتواصل معايا؟ اكتب كومنت علي بوست ريديت اللي لاقيت فيه لينك المقالة دي.
الأساسيات
الغلطة الأولى: لازم يكون معاك فلوس كتير علشان تستثمر
دي فكرة غلط خالص. في الحقيقة، إنت بتستثمر علشان تجمع فلوس مش العكس. معظم الطرق اللي هاقولك عليها ممكن تبدأ بمبلغ صغير (حوالي 100 جنيه) وتزود عليه كل شهر. والحلو إن معظم الحاجات دي بتخليك تقدر تسحب فلوسك بسهولة لو احتجت.
أهمية التحويش
علشان تستثمر بجد، لازم تحوّش جزء من مرتبك كل شهر. المفروض تحوّش 25% من مرتبك، بس مع الغلا اللي احنا فيه دلوقتي، ابدأ بأي مبلغ تقدر عليه حتى لو 100 جنيه بس في الشهر. احسب مصاريفك لكام شهر وحط جنب مبلغ يكفيك 3-6 شهور للطوارئ.
طريقة تفكير المستثمر
الناس الناجحة مش بتصرف على المظاهر. قبل ما تشتري أي حاجة، اسأل نفسك: "هاستخدم الحاجة دي بعد 3 شهور؟" حدد احتياجاتك الحقيقية وبعدين دوّر على أحسن حاجة تناسبك. الاستثمار طريقة تفكير قبل ما يكون مجرد حتة تحط فيها فلوسك وخلاص.
بلاش تخلي مشاعرك تتحكم فيك
متخليش قلبك يتحكم في قرارات استثمارك. أكيد السوق ممكن ينزل شوية، بس على المدى البعيد بيطلع تاني. بص مثلاً على مؤشر S&P 500. في مقولة حلوة بتقول: "If in doubt, zoom out".
أهمية توزيع الفلوس
متحطش فلوسك كلها في مكان واحد. لو حطيت كل فلوسك في البورصة وحصل هبوط، هتخسر جامد. لكن لو حاطط جزء في البورصة وجزء في الدهب مثلاً، لما واحدة تنزل التانية ممكن تطلع. اختار استثماراتك على حسب هدفك: عايز تسيب فلوسك لمدة طويلة (دهب وبورصة)؟ ولا عايز دخل شهري (صناديق استثمار أو شهادات بنك)؟
صعب ما هتبقي غني علي المدي القصير
في ناس كتير لما بتسمع كلمة "استثمار" بتتخيل على طول عربيات فيراري وقصور. ولما تقولهم اشتروا دهب بيقولولك "لأ هستنى لما ينزل" (وهو أصلاً بيطلع).
الفكرة إنك متحاولش تحدد "الوقت المثالي للسوق" (Time the market) عشان تدخل، لأنه ببساطة صعب جداً تعرف إمتى الوقت ده. ناس كتير بتحاول تحقق عائد أعلى من المتوسط (اللي هو 10% سنوياً) وبينتهي بيهم الأمر خسرانين.
فمتحاولش تعمل ذكي أوي وتفضل مستني وتأجل. ابدأ على طول، والتزم بالاستثمار بانتظام.
مفيش حاجة كاملة
انا عارف شعور انك عايز كل حاجة وصدقني مش انت لوحدك، بس زي ما بيقولوا بالإنجليزي "you can't have your cake and eat it too"!
يعني مثلاً لو عايز ربح كتير هتلاقي مقابله مخاطرة عالية، أو لو عايز أمان لفلوسك هتلاقي العائد قليل. دايماً هتلاقي حاجة على حساب حاجة وانت بس اللي تقرر هتستحمل إيه.
أنا بالنسبة لي، بفضل حاجة بعائد صغير سنوي بس فيها أمان علشان مع الوقت يحصل تراكم للفوايد (compound interest) ويزيد المبلغ، بدل ما أخش في حاجة وأخسر كل حاجة.
بس زي ما قلت، دي بترجع من شخص لشخص. ممكن مثلاً لو حاسس إن قدامك فرصة حلوة، تجرب بنسبة صغيرة (زي 20% من فلوسك) كتجربة. بس دايماً دايماً دايماً متخليش الطمع يسوقك.
الوقت والعائد
معظم طرق الاستثمار الآمنة بتاخد وقت علشان تظهر نتايجها. زي ما قلت قبل كده: العائد السريع غالباً بيقابله مخاطرة عالية. أنا بقدملك هنا خيارات أكثر أماناً، لكن مقابل ده هتلاقي العائد مش هيبقى مبهر على المدى القصير. عشان كده لازم تفكر في الاستثمار على مدة متوسطة لطويلة (من 3 لـ 5 سنين) علشان تحصد ثمار استثمارك بشكل كويس وتشوف النتايج اللي بتتمناها.
مصادر للتعلم
قنوات يوتيوب
- بالمصري:
- عميد يستثمر
-
محمد محي الدين
-
بالإنجليزي:
- Two Cents
- The Money Guy Show
- Clear Value Tax
- The Plain Bagel
مواقع تفيدك
- بالإنجليزي:
- Investopedia
كمل قراية من هنا: nostr:naddr1qvzqqqr4gupzpu2h0sja0vmqdqjzq6e820jjjnuytzw2ksmemfnadhe0hm0zdws5qqxnzde5xvurqdp4xuunqd3sau2w7y
ادعمني (لو حابب)
- USDT (TRC20):
TKQ3Uwkq21ntiua2Zh9Hu376fdMdnRGWN6
آخر تحديث: 4 أبريل 2025
-
@ e97aaffa:2ebd765d
2025-04-07 09:38:20A electricidade ou os computadores ou a Internet foram revoluções que mudaram o mundo, mas a adoção e a evolução da tecnologia foi lenta, permitindo que as populações e as económicas se adaptassem.
Ao contrário, na AI, a evolução está a ser tão rápida, que as sociedades não vão conseguir acompanhar e adaptar a uma nova realidade.
A AI tem um potencial inacreditável, talvez seja a revolução tecnológica mais rápida de sempre, além disso é muito abrangente, quase todos os sectores económicos podem beneficiar, pode provocar um forte aumento na produtividade.
O potencial é tão elevado, como pode ser perigoso, sobretudo quando utilizado como uma arma contra a humanidade. Os governos ou empresas vão construir ferramentas com AI para monitorizar, manipular e controlar os cidadãos.
Muitas profissões vão desaparecer ou reduzir drasticamente o número de trabalhadores. Tal como aconteceu nas revoluções anteriores, muitas profissões acabaram, mas surgir outras novas profissões.
Ou seja, o problema não é a tecnologia, mas sim a maneira como se usa essa tecnologia. Os desafios para o futuro são tremendos.
E o cidadão comum, o que está a fazer e a pensar… a fazer desenhos, a fazer idiotices. https://image.nostr.build/326d506f0015c99d09e061094bf3552764c6f6334be2899c6f5359f0a809d8bc.jpg
Algo similar acontece com o Bitcoin, uma tecnologia revolucionária, em alguns casos particulares, as stablecoins poderão ser interessantes. Mas o povo prefere especulador em tokens absurdos e jogar no casino das memecoins.
Também acontece com a internet, é uma fonte acessível e inesgotável de conhecimento, mas as pessoas preferem passar horas sem fim, nas redes sociais a fazer swipe up, a consumir conteúdo degradante.
O mundo ocidental está a transformar os cidadãos em zumbis, facilmente manipuláveis, obedientes, viciados. Nós necessitamos é de pessoas curiosas, com espírito crítico, criativas. Essencialmente, que pensem pela sua própria cabeça.
-
@ 7d33ba57:1b82db35
2025-04-07 09:17:04Prague, the capital of the Czech Republic, is like stepping into a real-life fairy tale. With its Gothic towers, baroque churches, medieval streets, and a majestic castle watching over the city, it’s no surprise that it’s one of Europe’s most beloved destinations. Add in great beer, cozy cafés, and stunning river views, and you’ve got the perfect city break.
🌟 Top Things to Do in Prague
1️⃣ Prague Castle & St. Vitus Cathedral
- One of the largest castle complexes in the world
- Don’t miss St. Vitus Cathedral, the Old Royal Palace, and Golden Lane
- Climb the cathedral tower for epic city views
2️⃣ Charles Bridge (Karlův most)
- Iconic 14th-century bridge lined with 30 baroque statues
- Walk it at sunrise or late at night to avoid the crowds
- Great for photos, street musicians, and romantic vibes
3️⃣ Old Town Square & Astronomical Clock
- The heart of the city, with colorful buildings and Gothic spires
- Watch the Astronomical Clock chime on the hour (since 1410!)
- Check out Týn Church and the Old Town Hall Tower
4️⃣ Explore the Jewish Quarter (Josefov)
- Visit the Old Jewish Cemetery, synagogues, and the Jewish Museum
- Learn about centuries of Jewish heritage and resilience in Prague
5️⃣ Climb Up to Petřín Hill
- Take the funicular or walk to the top for gardens, a mirror maze, and a mini Eiffel Tower
- Fantastic place for picnics, sunsets, and panoramic views
🍽️ What to Eat & Drink in Prague
- Goulash with dumplings (guláš s knedlíky) – Hearty and satisfying
- Svíčková – Beef with creamy vegetable sauce and cranberry
- Trdelník – Tourist favorite sweet pastry (not traditionally Czech, but tasty!)
- Czech beer – World-famous for a reason (Pilsner Urquell, Kozel, Staropramen) 🍻
- Try a traditional pub or lokál for authentic Czech cuisine and great prices
🛶 Other Cool Experiences
✅ Take a Vltava River cruise – see Prague from the water
✅ Visit Letná Park for sweeping views and a beer garden
✅ Check out Kafka Museum for surreal vibes and literary history
✅ Explore Vyšehrad – lesser-known castle ruins with gorgeous views and peaceful paths
✅ Snap pics at the Lennon Wall, especially for street art fans 🎨🚇 Getting Around
- Very walkable, especially in the historic center
- Excellent public transport: trams, metro, and buses (get a 24 or 72-hour pass)
- Uber and Bolt are reliable if you need a ride
- Be cautious with exchange rates and ATMs—use official places or bank ATMs only
💡 Tips for Visiting Prague
🕰️ Wake up early to enjoy the city without crowds
🎟️ Book castle or tower tickets in advance during peak seasons
🌧️ Pack layers—it can be breezy even in spring
📷 Keep your camera ready—every corner is postcard-worthy -
@ e5de992e:4a95ef85
2025-04-07 08:23:48Historical Rapid Declines in the S&P 500: Lessons from Major Market Crashes
The S&P 500 has experienced rapid declines of over 10% within short periods on several notable occasions, each linked to significant economic or geopolitical events. These instances underscore the market's vulnerability during times of crisis.
October 19-20, 1987 (Black Monday Crash)
-
Drop:
On October 19, 1987, the S&P 500 plummeted approximately 20.47%, marking the largest single-day percentage decline in its history. The following day saw further losses, culminating in a two-day drop exceeding 25%. -
Context:
Factors such as program trading, portfolio insurance strategies, and widespread panic selling contributed to this unprecedented crash.
November 19-20, 2008 (Global Financial Crisis)
-
Drop:
Amid the 2008 financial crisis, the S&P 500 declined roughly 10.8% over two days, reflecting the turmoil following the collapse of major financial institutions. -
Context:
The bankruptcy of Lehman Brothers and escalating fears of a global recession led to this significant market downturn.
March 11-12, 2020 (COVID-19 Pandemic Crash)
-
Drop:
The rapid spread of COVID-19 and ensuing economic shutdowns triggered a two-day decline of approximately 12.2% in the S&P 500. By March 16, the total decline over four days exceeded 20%. -
Context:
The pandemic's uncertainty and global impact led to one of the fastest descents into bear market territory.
April 3-4, 2025 (Trade War-Induced Crash)
-
Drop:
Recently, the S&P 500 experienced a sharp decline of 10.5% over two days, erasing approximately $5 trillion in market value. -
Context:
This downturn followed sweeping tariffs announced by President Donald Trump—a 10% baseline tariff on all imports, with higher rates on specific countries (e.g., China, the European Union). China's retaliatory tariffs intensified fears of a global trade war and a potential recession.
Observations
-
Frequency:
Such rapid declines are rare, occurring approximately once every 10-20 years, typically during periods of extreme market stress. -
Catalysts:
Each event was precipitated by unique factors: - Technological trading mechanisms in 1987
- Financial sector instability in 2008
- A global health crisis in 2020
-
Geopolitical trade tensions in 2025
-
Market Resilience:
Despite these significant setbacks, markets have historically demonstrated resilience, often rebounding and reaching new highs in subsequent years.
Conclusion
Understanding these historical instances provides valuable insights into market dynamics and the potential impact of external shocks on financial systems. Recognizing the catalysts and observing market resilience over time can help investors navigate future downturns with a more informed perspective.
-
-
@ f1577c25:de26ba14
2025-04-07 07:32:22احنا المرة اللي فاتت اتكلمنا عن طرق الاستثمار بشكل عام فا تعالي بقي ناخدهم واحدة واحدة بالمميزات و العيوب و اول حاجة هنبدا بيها هي البورصة الامريكية.
المنصات التداول:
المنصتين اللي انصح بيهم عن تجربة شخصية هما:
IBKR
- حلوة لو لسه جديد علشان شكل الموقع خفيف
- العمولات صغيرة
- عيبها إن طرق الايداع صعبة
Tastytrade
- حلوة علشان فية طرق ايداع عن طريق الكريبتو فا اسهل
- عيبها إن الشكل مش احسن حاجة كا تصميم للموقع
مميزات البورصة الأمريكية
- بالدولار الامريكي (هيساعد بالتضخم)
- الحد الادني 5 دولار لشراء جزء من السهم (علي حسب منصة التداول بس اغلبهم يعني)
- تقدر تخرج بأي وقت لو محتاج الفلوس
- مضمون و علي المدي الطويل العائد كان مضمون
عيوب البورصة الأمريكية
- لازم باسبور او بطاقة مترجمة من مكان معتمد
- طرق الايداع صعبة لو هتستخدم موقع زي IBKR مثلا
- علي المدي القصير ممكن تخسر فلوسك
- العمولات بتختلف من منصة للتاني بس في حدود ال11 سنت لو هتشتري جزء من السهم
ادعمني (اختياري)
- لو حابب تسجل عن طريق Tastytrade ممكن تستخدم رابط الاحاله بتاعي: https://open.tastytrade.com/signup?referralCode=FE3YFNRFJZ
- USDT (TRC20):
TKQ3Uwkq21ntiua2Zh9Hu376fdMdnRGWN6
شوف الكومنتات لو فيه أي تعديل أو بوستات جديدة.
-
@ f1577c25:de26ba14
2025-04-07 07:32:02المرة اللي فاتت اتكلمنا عن مميزات وعيوب العملات الرقمية والذهب العالمي. النهاردة هنتكلم عن طريقة استثمار مختلفة: ازاي تستثمر في العقارات برا مصر وانت قاعد في مكانك أونلاين!
مميزات وعيوب بشكل عام
المميزات
- استثمار في أصل حقيقي (عقار) فبتضمن فلوسك في حاجة ملموسة
- العقارات على المدى الطويل بتكسب كويس
- العائد بالدولار (9-10% سنوياً)
- الدخل بيتوزع أسبوعي أو شهري على حسب المنصة
- الحد الأدنى للاستثمار منخفض مقارنة بالاستثمار العقاري في مصر
العيوب
- المنصات أونلاين، فممكن في أي وقت يحصل مشكلة والموقع يقفل
- ممكن سعر العقار ينهار في المنطقة اللي اشتريت فيها
- ممكن يحصل مشاكل غير متوقعة للعقار (حريق، زلزال، إلخ)
- الاستثمار بيحتاج مدة طويلة (3-5 سنين) علشان يكون مجزي
المنصات
المنصات دي بتعمل شركة بتشتري العقار، وبعدين بتوزع أسهم الشركة على المستثمرين. يعني انت مش بتشتري العقار مباشرةً، لكن بتشتري حصة في شركة مالكة للعقار. ده بيخليك متدفعش ضرائب على العقار نفسه (على حد علمي، بس أسأل حد خبير للتأكيد).
منصة Realt
دي منصة بتتيح لك الاستثمار في عقارات بأمريكا وبنما. بتشتغل بنظام البلوكتشين والعملات الرقمية. كل توكن (token) بيمثل حصة في العقار (أو في الشركة المالكة للعقار).
مثلاً: لو التوكن الواحد بـ 50 دولار والربح المتوقع 5 دولار في السنة، يبقى العائد 10% سنوياً. العائد بيتوزع أسبوعياً من خلال عملة USDC، سواء على شبكة ETH (هتدفع رسوم gas fees) أو شبكة Gnosis (بدون رسوم).
فيها خدمة حلوة اسمها YAM (You and Me) وهي سوق P2P للعقارات. يعني تقدر تبيع عقارك لأفراد مش للموقع نفسه، وتحدد السعر اللي يناسبك، أو تشتري عقارات قديمة من مستثمرين تانيين.
مميزات Realt
- سهلة الاستخدام نسبياً
- الحد الأدنى صغير (حوالي 50 دولار)
- في محفظة داخل الموقع لو معندكش محفظة عملات رقمية
- تقدر تشتري بالفيزا أو بالعملات الرقمية
- العائد أسبوعي
- تقدر تبيع في أي وقت
عيوب Realt
- ممكن المنصة تقفل فجأة
- ممكن تحصل مشكلة بالشبكة
- لازم يكون معاك باسبور
منصة Stake
دي منصة بتتيح لك الاستثمار في أسواق السعودية والإمارات. مرخصة من البلدين، وتعتبر أسهل من Realt لأنها مفيهاش حوار العملات الرقمية.
هتدخل تسجل بالباسبور، وتختار العقار وتشتري أسهم فيه. الحد الأدنى 500 درهم (حوالي 135 دولار) للعقار. العائد شهري (مش متأكد 100%، لسه منتظر أول توزيع) وبيتحول على حسابك البنكي سواء برا أو جوا الإمارات وبأي عملة انت تختارها.
عشان تسحب فلوسك، في فترات محددة اسمها "exit window" بتكون مرتين في السنة. أو بعد 3 سنين، بيحصل تصويت بين أصحاب العقار لو عايزين يبيعوا قبل مدة الـ 5 سنين.
مميزات Stake
- سهلة الاستخدام
- واجهة ممتازة وبسيطة
- منصة مرخصة من السعودية والإمارات
عيوب Stake
- الخروج مش مرن (مرتين في السنة)
- ممكن المنصة تتعرض لمشاكل
- مخاطر العقارات العامة
ادعمني (اختياري)
- لو حابب تسجل عن طريق Realt ممكن تستخدم رابط الإحالة بتاعي: https://realt.co/ref/esmailelbob/
- لو حابب تسجل عن طريق Stake ممكن تستخدم رابط الإحالة بتاعي: https://app.getstake.com/rewards?c=ISMAEL182
- USDT (TRC20):
TKQ3Uwkq21ntiua2Zh9Hu376fdMdnRGWN6
شوف الكومنتات لو فيه أي تعديل أو بوستات جديدة.
-
@ f1577c25:de26ba14
2025-04-07 07:31:44النهاردة هنتكلم عن طريقة استثمار مختلفة: ازاي تستثمر في العقارات جوا مصر وانت قاعد في مكانك أونلاين!
مميزات وعيوب بشكل عام
المميزات
- استثمار في أصل حقيقي (عقار) فبتضمن فلوسك في حاجة ملموسة
- العقارات على المدى الطويل بتكسب كويس
- العائد بالجنية بس مربوط بالدولار (9-10% سنوياً) يعني لو الجنية اتعوم تاني العائد اللي بيجي ليك بالجنية هيزيد 500 بدل 300 مثلا.
- الدخل بيتوزع شهري
العيوب
- ممكن سعر العقار ينهار في مصر
- ممكن يحصل مشاكل غير متوقعة للعقار (حريق، زلزال، إلخ)
- الاستثمار بيحتاج مدة طويلة (3-5 سنين) علشان يكون مجزي
- الحد الادني كبير نسبيا يعني 50 الف جنية
- تدفع ضرائب عقارية
المنصات
هي منصة واحده (علي الاقل اللي جربتة) اسمها Safe هي تبع مدينه مصر و علي عكس الاستثمار العالمي هو انت فعلا بتشتري جزء من الشقة فا حلو لانه مشترك مباشر بس بالمقابل هتدفع ضرائب العقارية كل سنة لانه انت كدا مالك لعقار جوا مصر
منصة Safe
دي المنصة الوحيدة اللي اعرفها علي الاقل في مصر و هي الي حد ما حلوة يعني الستجيل بالبطاقة و بعدها بتختار العقار و تحط الفيزا سواء تدفع مره واحده او بالتقسيط (بفوائد) لحد سنة و بعد كدا باسبوع هيجي شخص تمضي معاه العقد و بعد شهر هيجي ليك اول عائد في حسابك البنكي اللي كاتبة في التطبيق
المميزات: - سهل - ينفع بالبطاقة العيوب: - الفلوس محجوزة لمده 6 شهور قبل ما تقدر تبيع وتسحب فلوسك - فيه شويه اخطاء تقنيه زي مثلا انا وصلي العائد في البنك بس لسه مسمعش في التطبيق لحد دلوقتي و في شويه عقارات بتظهر و تختفي (لما تكون اتملت) فا اللي هو حاسس في حاجات لسه يدوي و متوقع لان التطبيق جديد بس قصدي كان عندي امل يستنوا شويه اكتر الاول قبل ما يبدوا التطبيق
ادعمني (اختياري)
- USDT (TRC20):
TKQ3Uwkq21ntiua2Zh9Hu376fdMdnRGWN6
شوف الكومنتات لو فيه أي تعديل أو بوستات جديدة.
-
@ f1577c25:de26ba14
2025-04-07 07:31:27النهاردة هنتكلم عن شهادات البنك. وقبل ما أكمل، أنا مش شيخ ومش دوري أقولك الحلال والحرام. إنت تقدر تسأل أهل العلم أكتر على حسب دينك طبعاً.
أنا برشح شهادات البنك في حالتين: لو كانت بالدولار (مع إني في الحالة دي هقولك اعملهم عملات رقمية أحسن لأنه هيبقى سهل تحركهم برا البنك وقرفه)، أو شهادات بالجنيه علشان تصرف منهم (بس هنا برضه هقولك شوفلك فوري يومي أحسن شوية).
غير بقى لو إنت عايز الشهادات اللي العائد فيها أعلى، بمعنى حاجة زي 27% سنوي أو ال3 سنين تناقصي (أول سنة 30%، تاني سنة 28%، وتالت سنة 25% تقريباً) وساعتها العائد مش هيبقى شهري. بس لو دي خطتك، فساعتها بس هرشح ليك شهادات البنك. غير كدا مش شايف ليها لازمة، لأنه بكل بساطة عقبال ما الفلوس تتفك هيكون قيمتها قلت والعائد نفسه ملهوش قيمة أوي.
طبعاً هنا مش هقدر أتكلم كتير لأن كل بنك ليه سياسته، بس كل اللي أقدر أرشحه أي حاجة تكون أقرب من بيتك وشهاداتها عالية زي البنك الأهلي المصري أو بنك مصر. والحلو إنك تقدر تعمل شهادة أونلاين عن طريق التطبيق.
وإنت بتفتح حساب، أرشحلك تفتح وقت الشمول المالي لأنه بيبقى سهل، وتفعّل تطبيق البنك وتعمل شهادات براحتك. بس العيوب إنها بتختلف من بنك لبنك، والحساب بيبقى فيه حد أقصى للرصيد لو شمول مالي حوالي 100 ألف أو 200 ألف (مشاكل أغنياء برضه بس حبيت أوضحها). ده غير كل 3 شهور مصاريف الحساب برضه، وطبعاً إنك مش هتقدر تاخد الفلوس غير بعد المدة أو أول 6 شهور بس هتخسر جامد فيهم، فخلي بالك.
مع باقي حاجات البنك المعقدة دي بقى، اسأل البنك. وبرضه حابب أوضح: خلي بالك وإنت بتمضي، لأنه بسمع حالات كتير موظف البنك خلى الناس تمضي على كريدت كارد وتأمين للحياة وغيره كتير. فاقرأ إنه نت بنكي وفتح حساب وخلاص. وللأسف هنا الفرع بيفرق، فاختار الأقرب أو أنضف أقرب حاجة ليك (لو فيه فرع معروف إنه وحش يعني). ولو في أي مشاكل أنصحك تعمل بلاغ في البنك المركزي https://www.cbe.org.eg/ar/consumer-protection علشان تاخد حقك.
المميزات: - سهل نسبياً ومضمون - بطاقة بس لو حساب شمول مالي
العيوب: - مش هتاخد الفلوس غير بعد المدة سواء سنة أو 3 سنين - ممكن البنك يرخم عليك - مصاريف الحساب الدورية (غير لو كان بنك زي QNB مثلاً، بس في الوقت ده الشهادات العائد فيها قليل مقارنة بالباقي ومفيش شهادات بالعملات الأجنبية)
ادعمني (اختياري)
- USDT (TRC20):
TKQ3Uwkq21ntiua2Zh9Hu376fdMdnRGWN6
شوف الكومنتات لو فيه أي تعديل أو بوستات جديدة.
- USDT (TRC20):
-
@ f1577c25:de26ba14
2025-04-07 07:31:09النهاردة هنتكلم عن فوري يومي، تقريباً أكتر صندوق مقرب لقلبي وبرشحه لأي شخص بيدور على حاجة تطلع بيها عائد يصرف منه. العائد بتاعه حوالي 24% وبينزل يومي، فمقارنة بالعائد الشهري بتاع البنوك اللي هو 23% أو 23.5%، فيعتبر حلو جداً لأن العائد يومي زي ما قلت وبتقدر تسحب فلوسك فوري (عن طريق الكارت الأصفر) أو خلال يومين عمل لو تحويل بنكي. قصدي إنه مش بيتجمد زي البنك، بس فيه عيوب برضه زي إنك لازم تروح تمضي الورق من فرع فوري بلس، أو إن الحد الأقصى 100 ألف جنيه (مشاكل أغنياء عارف، بس لازم أقول كل العيوب)، غير لو هتقدم مصدر دخل وهكذا. هقولك بالتفصيل تحت عن مشكلة حصلت معايا عشان تاخد بالك منها وإنت بتقدم.
تطبيق ماي فوري
علشان تبدأ في الصندوق، لازم تروح الفرع ويبقى معاك تطبيق ماي فوري. وللصراحة، الموضوع سهل وبسيط: هو بطاقتك وتروح أي فرع، هتمضي على ورق وتتصور هناك (هما هيصوروك) وكام يوم وبس كدا هتتفعل.
أعتقد مش محتاج كارت فوري الأصفر، بس هو هيساعدك كتير وببلاش، فأنصحك تعمله مع الصندوق. بس خلي بالك ومهم جداً جداً: لأني تاني مرة لما كنت بعمل الكارت (كانت بعد حادثة تهكير فوري)، الراجل هناك قعد يحوّر ويقولي لازم تعمل محفظة على رقم التليفون وإلزامي وبتاع، وفي الآخر طلع بيكدب علشان ياخد بونص. وأنا مش بهاجمه، بس قصدي خلي بالك لأنه ممكن يستغلوك بالفرع ويمضيك على حاجات زيادة. فإنت اقرأ العقد بتاعك قبل ما تمضي، أو روح فرع نضيف. هو مش لازم أقرب فرع ليك، فخلي بالك من النقطة دي.
المميزات:
- سهل
- بطاقتك بس
- تقدر تسحب في أي وقت وسهولة الإيداع كمان
عيوب:
- كبداية في حد أقصى 100 ألف جنيه، بس ممكن تزودهم بعدين
- الإيداع بيقعد كام يوم عمل لحد ما يسمع
- العائد بينزل يومي ماعدا الجمعة والسبت والأحد تقريباً كمان
ادعمني (اختياري)
- USDT (TRC20):
TKQ3Uwkq21ntiua2Zh9Hu376fdMdnRGWN6
شوف الكومنتات لو فيه أي تعديل أو بوستات جديدة.
-
@ f1577c25:de26ba14
2025-04-07 07:27:17أهلاً! أفترض إنك قرأت أول كام بوست، ولو لأ فده لينك أول بوست علشان تتابع بالترتيب: <لينك أول بوست>
المرة اللي فاتت اتكلمنا عن مميزات وعيوب البورصة الأمريكية، زي إنك تقدر تستخدم الكريبتو كطريقة إيداع سهلة. النهاردة هنتكلم عن حاجتين مهمين: العملات الرقمية المستقرة والذهب العالمي.
العملات الرقمية المستقرة (Stablecoins):
لما بتكلم عن العملات الرقمية، مش قصدي تشتري بيتكوين وخلاص. أنا قصدي العملات المستقرة زي USDT وUSDC، لأن كل عملة منهم ليها ما يعادلها بالدولار أو أصول حقيقية. يعني لو بصيت على سعر البيتكوين هتلاقيه ممكن 80 ألف دولار للوحدة، لكن USDT أو USDC دايماً سعرها قريب من 1 دولار. دي حلوة جداً للتعامل الإلكتروني لأنها زي الدولار المشفر.
إحنا هنستخدمها في خدمة اسمها "Earn" وهي شبه شهادات البنك. بتروح على بينانس، تشتري عن طريق P2P، وبعدين تروح على صفحة الـ Earn: https://www.binance.me/en/earn/simple-earn
هناك هتلاقي خيار تعمل "stake" للعملات دي، يعني بتحجز فلوسك لمدة معينة على الموقع، والموقع بيستخدمها (يسلفها لحد تاني أو يستخدمها كسيولة). الحلو إن في Earn، مش لازم تقفل فلوسك لسنة أو 3 سنين زي البنك. في اختيار اسمه "Flexible" بتقدر تحط فلوسك وتسحبها في نفس اليوم، والعائد بينزل يومياً. العيب إن العائد بيتغير يومياً. ممكن تختار Flexible لو عايز تسحب في أي وقت، أو تختار مدة أسبوع أو 90 يوم بعائد ثابت (بس بيكون أقل من الـ Flexible شوية).
ممكن كمان تفعل "Auto-Subscribe" لأن العائد بينزل بنفس نوع العملة، فبدل ما العائد يفضل مركون، أو لما يبقى معاك عملات زيادة في المحفظة، هو بيشترك تلقائي في Earn، فبيبقى زي العائد المركب.
المميزات
- عائد دولاري ومش متأثر بالجنيه
- بينزل عائد يومي
- تقدر تسحب فلوسك في أي وقت
- الحد الأدنى صغير (حوالي 100 جنيه)
العيوب
- الأمان مش 100% لأنها منصة وممكن (لا قدر الله) تقفل حسابك
- العملات الرقمية غير قانونية في بعض البلدان فخلي بالك
- خلي بالك من محاولات النصب: زي لما حد يقولك نكمل المعاملة برا المنصة، أو يبعت رسالة من رقمه كأنها من إنستاباي أو فودافون كاش
- العائد متغير وممكن يقل (بس حالياً حوالين 10%)
- قيمة الدولار نفسها ممكن تتغير
ملحوظة: لو قلقان من بينانس، فيه منصات تانية زي Kraken (بس العائد أسبوعي ومش عالي) أو OKX اللي بتدي أول 180 يوم عائد 10% مضمون، وبعدين ممكن تحول لـ Binance أو Bybit.
الذهب العالمي (PAXG)
بالنسبة للذهب، نفس الخطوات السابقة بالظبط. الحلو إنه في خدمة Earn لـ PAXG - صحيح العائد أقل من 1% سنوياً، بس أحسن من مفيش!
هتشتري USDT من خلال P2P، بعدين تروح بينانس وتعمل تحويل من USDT إلى PAXG. كده بقى معاك ذهب بالسعر العالمي. أحب أطمنك إن PAXG من شركة موثوقة، وتقدر تقرا عنها هنا: https://www.paxos.com/pax-gold
فيه عملات تانية شبهها، بس دي من أفضلهم، خصوصاً إنهم بيعملوا تقييم للأصول بشكل دوري للتأكد من مصداقية الشركة.
المميزات
- ذهب سهل الوصول إليه
- الحد الأدنى قليل
- أمان نسبي ضد التضخم
- سهولة الشراء والبيع
العيوب
- نفس عيوب المنصات الرقمية
- قيمة الذهب نفسها ممكن تتغير
- العائد على الـ PAXG منخفض (أقل من 1%)
العملة موجودة كمان على Kraken، بس مش متأكد لو فيها خدمة Earn زي بينانس.
ادعمني (اختياري)
- لو حابب تسجل عن طريق Binance ممكن تستخدم رابط الإحالة بتاعي: https://www.binance.com/referral/earn-together/refertoearn2000usdc/claim?hl=en&ref=GRO_14352_5LGSE
- USDT (TRC20):
TKQ3Uwkq21ntiua2Zh9Hu376fdMdnRGWN6
شوف التعليقات لو في اي تعديل او بوستات جديدة.
-
@ da0b9bc3:4e30a4a9
2025-04-07 06:15:43Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/936802
-
@ 57d1a264:69f1fee1
2025-04-07 06:04:14It's so cool how AI is blending design and engineering together, making it easier for us all to be efforts creative in new ways!
Steve Jobs once said:
“The doers are the major thinkers. The people who really create the things that change this industry are both the thinker-doer in one person.”
— Steve Jobs
Would its words become truth? Or they already are?
originally posted at https://stacker.news/items/936796