-
@ e3ba5e1a:5e433365
2025-04-15 11:03:15Prelude
I wrote this post differently than any of my others. It started with a discussion with AI on an OPSec-inspired review of separation of powers, and evolved into quite an exciting debate! I asked Grok to write up a summary in my overall writing style, which it got pretty well. I've decided to post it exactly as-is. Ultimately, I think there are two solid ideas driving my stance here:
- Perfect is the enemy of the good
- Failure is the crucible of success
Beyond that, just some hard-core belief in freedom, separation of powers, and operating from self-interest.
Intro
Alright, buckle up. I’ve been chewing on this idea for a while, and it’s time to spit it out. Let’s look at the U.S. government like I’d look at a codebase under a cybersecurity audit—OPSEC style, no fluff. Forget the endless debates about what politicians should do. That’s noise. I want to talk about what they can do, the raw powers baked into the system, and why we should stop pretending those powers are sacred. If there’s a hole, either patch it or exploit it. No half-measures. And yeah, I’m okay if the whole thing crashes a bit—failure’s a feature, not a bug.
The Filibuster: A Security Rule with No Teeth
You ever see a firewall rule that’s more theater than protection? That’s the Senate filibuster. Everyone acts like it’s this untouchable guardian of democracy, but here’s the deal: a simple majority can torch it any day. It’s not a law; it’s a Senate preference, like choosing tabs over spaces. When people call killing it the “nuclear option,” I roll my eyes. Nuclear? It’s a button labeled “press me.” If a party wants it gone, they’ll do it. So why the dance?
I say stop playing games. Get rid of the filibuster. If you’re one of those folks who thinks it’s the only thing saving us from tyranny, fine—push for a constitutional amendment to lock it in. That’s a real patch, not a Post-it note. Until then, it’s just a vulnerability begging to be exploited. Every time a party threatens to nuke it, they’re admitting it’s not essential. So let’s stop pretending and move on.
Supreme Court Packing: Because Nine’s Just a Number
Here’s another fun one: the Supreme Court. Nine justices, right? Sounds official. Except it’s not. The Constitution doesn’t say nine—it’s silent on the number. Congress could pass a law tomorrow to make it 15, 20, or 42 (hitchhiker’s reference, anyone?). Packing the court is always on the table, and both sides know it. It’s like a root exploit just sitting there, waiting for someone to log in.
So why not call the bluff? If you’re in power—say, Trump’s back in the game—say, “I’m packing the court unless we amend the Constitution to fix it at nine.” Force the issue. No more shadowboxing. And honestly? The court’s got way too much power anyway. It’s not supposed to be a super-legislature, but here we are, with justices’ ideologies driving the bus. That’s a bug, not a feature. If the court weren’t such a kingmaker, packing it wouldn’t even matter. Maybe we should be talking about clipping its wings instead of just its size.
The Executive Should Go Full Klingon
Let’s talk presidents. I’m not saying they should wear Klingon armor and start shouting “Qapla’!”—though, let’s be real, that’d be awesome. I’m saying the executive should use every scrap of power the Constitution hands them. Enforce the laws you agree with, sideline the ones you don’t. If Congress doesn’t like it, they’ve got tools: pass new laws, override vetoes, or—here’s the big one—cut the budget. That’s not chaos; that’s the system working as designed.
Right now, the real problem isn’t the president overreaching; it’s the bureaucracy. It’s like a daemon running in the background, eating CPU and ignoring the user. The president’s supposed to be the one steering, but the administrative state’s got its own agenda. Let the executive flex, push the limits, and force Congress to check it. Norms? Pfft. The Constitution’s the spec sheet—stick to it.
Let the System Crash
Here’s where I get a little spicy: I’m totally fine if the government grinds to a halt. Deadlock isn’t a disaster; it’s a feature. If the branches can’t agree, let the president veto, let Congress starve the budget, let enforcement stall. Don’t tell me about “essential services.” Nothing’s so critical it can’t take a breather. Shutdowns force everyone to the table—debate, compromise, or expose who’s dropping the ball. If the public loses trust? Good. They’ll vote out the clowns or live with the circus they elected.
Think of it like a server crash. Sometimes you need a hard reboot to clear the cruft. If voters keep picking the same bad admins, well, the country gets what it deserves. Failure’s the best teacher—way better than limping along on autopilot.
States Are the Real MVPs
If the feds fumble, states step up. Right now, states act like junior devs waiting for the lead engineer to sign off. Why? Federal money. It’s a leash, and it’s tight. Cut that cash, and states will remember they’re autonomous. Some will shine, others will tank—looking at you, California. And I’m okay with that. Let people flee to better-run states. No bailouts, no excuses. States are like competing startups: the good ones thrive, the bad ones pivot or die.
Could it get uneven? Sure. Some states might turn into sci-fi utopias while others look like a post-apocalyptic vidya game. That’s the point—competition sorts it out. Citizens can move, markets adjust, and failure’s a signal to fix your act.
Chaos Isn’t the Enemy
Yeah, this sounds messy. States ignoring federal law, external threats poking at our seams, maybe even a constitutional crisis. I’m not scared. The Supreme Court’s there to referee interstate fights, and Congress sets the rules for state-to-state play. But if it all falls apart? Still cool. States can sort it without a babysitter—it’ll be ugly, but freedom’s worth it. External enemies? They’ll either unify us or break us. If we can’t rally, we don’t deserve the win.
Centralizing power to avoid this is like rewriting your app in a single thread to prevent race conditions—sure, it’s simpler, but you’re begging for a deadlock. Decentralized chaos lets states experiment, lets people escape, lets markets breathe. States competing to cut regulations to attract businesses? That’s a race to the bottom for red tape, but a race to the top for innovation—workers might gripe, but they’ll push back, and the tension’s healthy. Bring it—let the cage match play out. The Constitution’s checks are enough if we stop coddling the system.
Why This Matters
I’m not pitching a utopia. I’m pitching a stress test. The U.S. isn’t a fragile porcelain doll; it’s a rugged piece of hardware built to take some hits. Let it fail a little—filibuster, court, feds, whatever. Patch the holes with amendments if you want, or lean into the grind. Either way, stop fearing the crash. It’s how we debug the republic.
So, what’s your take? Ready to let the system rumble, or got a better way to secure the code? Hit me up—I’m all ears.
-
@ fbf0e434:e1be6a39
2025-04-17 12:49:04Hackathon 概述
由 Injective 和 ElizaOS 主办的 Injective AI Agent Hackathon 吸引了 496 名参与者,最终提交了 126 个获批项目。本次 Hackathon 突显了 AI 和 区块链 的结合,展示了 AI 代理在去中心化网络中运作的潜力,并推动了超越传统金融的创新。参与者探索了多种应用,包括自主交易、代币化资产管理和 AI 驱动的金融洞察。
本次设立的奖池高达 $100,000, 其中 $50,000 为Grant Prizes,还有其他重要项目的额外奖项。通过将 AI 的适应性与区块链的透明性结合,本次 Hackathon 展示了这些技术的变革潜力,并标志着在展示 AI 和区块链整合创新潜力方面一个重要的里程碑。
Hackathon 获奖者
-
Jecta: Jecta 集成了多个大型语言模型(LLM),以自动化 Injective 区块链上的任务。它专注于透明性和社区驱动的开发,利用开源技术提升使用的简便性和效率。
-
Paradyze: Paradyze 通过为区块链交易引入自然语言接口来改善 Injective 生态系统。其设计旨在增强可访问性和安全性,使用户能够以简单的交互方式进行操作。
要查看所有项目,请访问 Injective AI Hackathon 页面。
关于组织者
Injective
Injective 是一个基于区块链的组织,专注于开发去中心化金融(DeFi)解决方案。它以创建优化 DeFi 应用的可互操作的 Layer-1 区块链而闻名,促进快速且安全的交易。值得注意的项目包括 Injective Protocol,该协议增强了去中心化交易的跨链能力。
Injective 的使命是通过提供可访问且可靠的去中心化基础设施推动金融自由,为多样化的金融服务赋能,支持用户和开发者在区块链生态系统中进行创新。
-
-
@ 29ccddd8:49860677
2025-04-17 11:31:54Der Kauf einer Sexpuppe ist heutzutage so individuell wie der persönliche Geschmack. Angesichts der großen Auswahl an Modellen, Materialien und Funktionen kann die Entscheidung schnell überwältigend wirken. Mit diesem Ratgeber erhältst du praktische Tipps, um die perfekte Real Doll nach deinen Bedürfnissen und deinem Budget auszuwählen.
1. Materialien: Silikon oder TPE?
Silikon und TPE (Thermoplastisches Elastomer) sind die gängigsten Materialien für hochwertige Sexpuppen.
- Silikon
- Vorteile: Sehr langlebig, hitzebeständig, realistisch in Optik und Haptik, leicht zu reinigen.
- Nachteile: Meist teurer als TPE, weniger flexibel.
- TPE
- Vorteile: Sehr weich und elastisch, fühlt sich hautähnlich an, meist günstiger.
- Nachteile: Empfindlicher gegenüber Hitze, benötigt mehr Pflege, kann leichter Flecken aufnehmen.
Tipp: Wer Wert auf maximale Realitätsnähe und Pflegeleichtigkeit legt, wählt Silikon. Für ein begrenztes Budget und ein besonders weiches Gefühl ist TPE eine gute Wahl.
2. Funktionen: Mehr als nur Optik
Moderne lebensgroße Sexpuppe bieten eine Vielzahl von Funktionen:
- Bewegliche Gelenke: Für realistische Posen und Stellungen.
- Heizfunktion: Für eine natürliche, körperwarme Temperatur.
- Soundmodule: Für akustische Stimulation.
- Austauschbare Teile: Verschiedene Köpfe, Perücken und Outfits sorgen für Abwechslung.
- Smart Dolls: Modelle mit KI-Interaktion, Sprachsteuerung oder App-Anbindung.
Tipp: Überlege dir vor dem Kauf, welche Funktionen dir wirklich wichtig sind – sie beeinflussen maßgeblich den Preis.
3. Budget: Was kostet eine hochwertige Real Doll?
Die Preisspanne ist groß und hängt von Material, Größe, Detailgrad und zusätzlichen Features ab:
- Einfache Modelle: ab ca. 500 € (meist kleinere, weniger detaillierte Puppen)
- Mittelklasse: 1.000–2.000 € (lebensechte Körpergröße, realistische Optik, gute Materialien)
- Premiumklasse: ab 2.000 € (hochwertiges Silikon, viele Funktionen, individuelle Gestaltung)
Tipp: Achte auf versteckte Kosten wie Versand, Zoll und Zubehör. Bei seriösen Shops sind diese meist inklusive.
4. Worauf sollte man beim Kauf achten?
- Seriöse Händler: Achte auf Zertifikate (CE, RoHS, ggf. FDA), transparente Preise, diskreten Versand und guten Kundenservice.
- Pflege & Reinigung: Informiere dich über Reinigungsmöglichkeiten und Pflegeprodukte, um die Lebensdauer deiner real sex doll zu verlängern.
- Datenschutz: Seriöse Anbieter garantieren diskrete Verpackung und Schutz deiner Daten.
Fazit: Deine perfekte Sexdoll wartet
Mit der richtigen Vorbereitung findest du garantiert die silikon sexpuppe, die zu dir passt. Überlege dir, welches Material und welche Funktionen dir am wichtigsten sind – und setze dir ein Budget. Achte beim Kauf auf Qualität, Sicherheit und einen vertrauenswürdigen Anbieter.
- Silikon
-
@ 7d33ba57:1b82db35
2025-04-17 10:49:33Kraków is one of Europe’s most beautiful and historically rich cities. With its medieval charm, vibrant squares, haunting WWII history, and buzzing student life, Kraków effortlessly blends past and present. It’s the kind of place where you can walk cobblestone streets in the morning, sip craft cocktails by evening, and dive into centuries of culture in between.
🏰 Top Things to Do in Kraków
🏙️ Old Town (Stare Miasto)
- A UNESCO World Heritage Site full of Gothic, Renaissance, and Baroque architecture
- Wander through the Main Market Square (Rynek Główny)—Europe’s largest medieval square
- Visit the Cloth Hall (Sukiennice) for local crafts and the St. Mary’s Basilica, where a trumpeter plays every hour from the tower
🏰 Wawel Castle
- Iconic royal residence on a hill overlooking the Vistula River
- Explore the Royal Apartments, cathedral, and the Dragon’s Den cave (legend says a dragon once lived there!)
🕍 Kazimierz (Jewish Quarter)
- A vibrant area packed with synagogues, street art, and hip cafes
- Once the heart of Jewish life, it’s now a lively cultural hub—especially great for food, bars, and vintage shops
- Don’t miss Plac Nowy for late-night zapiekanki (Polish-style baguette pizza)
🌆 Schindler’s Factory
- A deeply moving museum inside the former factory of Oskar Schindler, telling the story of Kraków during Nazi occupation
- Located in Podgórze, near the remains of the Kraków Ghetto
⛪ Nowa Huta
- A planned socialist city turned edgy neighborhood
- Soviet-style architecture, unique local flavor, and great for urban exploration
🕊️ Day Trips from Kraków
🚐 Auschwitz-Birkenau Memorial
- A must-visit for historical reflection and remembrance
- About 1.5 hours away, best visited on a guided tour
⛰️ Wieliczka Salt Mine
- A surreal underground world carved from salt—chambers, sculptures, and even chapels
- Just 30 minutes outside the city
🍽️ What to Eat in Kraków
- 🥟 Pierogi – Dumplings with fillings like cheese, potatoes, or meat
- 🍲 Żurek – Sour rye soup with sausage and egg
- 🐷 Gołąbki – Cabbage rolls stuffed with meat and rice
- 🧁 Try obwarzanek krakowski (a pretzel-like street snack)
- 🍻 Wash it all down with Polish beer, vodka, or mulled wine in winter
🗓️ Best Time to Visit
- Spring (Apr–Jun): Mild weather and blooming gardens
- Summer (Jul–Aug): Festivals and al fresco dining (can get busy)
- Autumn (Sept–Oct): Fewer crowds, golden cityscapes
- Winter (Dec): Magical Christmas markets and snow-dusted rooftops
-
@ efcb5fc5:5680aa8e
2025-04-15 07:34:28We're living in a digital dystopia. A world where our attention is currency, our data is mined, and our mental well-being is collateral damage in the relentless pursuit of engagement. The glossy facades of traditional social media platforms hide a dark underbelly of algorithmic manipulation, curated realities, and a pervasive sense of anxiety that seeps into every aspect of our lives. We're trapped in a digital echo chamber, drowning in a sea of manufactured outrage and meaningless noise, and it's time to build an ark and sail away.
I've witnessed the evolution, or rather, the devolution, of online interaction. From the raw, unfiltered chaos of early internet chat rooms to the sterile, algorithmically controlled environments of today's social giants, I've seen the promise of connection twisted into a tool for manipulation and control. We've become lab rats in a grand experiment, our emotional responses measured and monetized, our opinions shaped and sold to the highest bidder. But there's a flicker of hope in the darkness, a chance to reclaim our digital autonomy, and that hope is NOSTR (Notes and Other Stuff Transmitted by Relays).
The Psychological Warfare of Traditional Social Media
The Algorithmic Cage: These algorithms aren't designed to enhance your life; they're designed to keep you scrolling. They feed on your vulnerabilities, exploiting your fears and desires to maximize engagement, even if it means promoting misinformation, outrage, and division.
The Illusion of Perfection: The curated realities presented on these platforms create a toxic culture of comparison. We're bombarded with images of flawless bodies, extravagant lifestyles, and seemingly perfect lives, leading to feelings of inadequacy and self-doubt.
The Echo Chamber Effect: Algorithms reinforce our existing beliefs, isolating us from diverse perspectives and creating a breeding ground for extremism. We become trapped in echo chambers where our biases are constantly validated, leading to increased polarization and intolerance.
The Toxicity Vortex: The lack of effective moderation creates a breeding ground for hate speech, cyberbullying, and online harassment. We're constantly exposed to toxic content that erodes our mental well-being and fosters a sense of fear and distrust.
This isn't just a matter of inconvenience; it's a matter of mental survival. We're being subjected to a form of psychological warfare, and it's time to fight back.
NOSTR: A Sanctuary in the Digital Wasteland
NOSTR offers a radical alternative to this toxic environment. It's not just another platform; it's a decentralized protocol that empowers users to reclaim their digital sovereignty.
User-Controlled Feeds: You decide what you see, not an algorithm. You curate your own experience, focusing on the content and people that matter to you.
Ownership of Your Digital Identity: Your data and content are yours, secured by cryptography. No more worrying about being deplatformed or having your information sold to the highest bidder.
Interoperability: Your identity works across a diverse ecosystem of apps, giving you the freedom to choose the interface that suits your needs.
Value-Driven Interactions: The "zaps" feature enables direct micropayments, rewarding creators for valuable content and fostering a culture of genuine appreciation.
Decentralized Power: No single entity controls NOSTR, making it censorship-resistant and immune to the whims of corporate overlords.
Building a Healthier Digital Future
NOSTR isn't just about escaping the toxicity of traditional social media; it's about building a healthier, more meaningful online experience.
Cultivating Authentic Connections: Focus on building genuine relationships with people who share your values and interests, rather than chasing likes and followers.
Supporting Independent Creators: Use "zaps" to directly support the artists, writers, and thinkers who inspire you.
Embracing Intellectual Diversity: Explore different NOSTR apps and communities to broaden your horizons and challenge your assumptions.
Prioritizing Your Mental Health: Take control of your digital environment and create a space that supports your well-being.
Removing the noise: Value based interactions promote value based content, instead of the constant stream of noise that traditional social media promotes.
The Time for Action is Now
NOSTR is a nascent technology, but it represents a fundamental shift in how we interact online. It's a chance to build a more open, decentralized, and user-centric internet, one that prioritizes our mental health and our humanity.
We can no longer afford to be passive consumers in the digital age. We must become active participants in shaping our online experiences. It's time to break free from the chains of algorithmic control and reclaim our digital autonomy.
Join the NOSTR movement
Embrace the power of decentralization. Let's build a digital future that's worthy of our humanity. Let us build a place where the middlemen, and the algorithms that they control, have no power over us.
In addition to the points above, here are some examples/links of how NOSTR can be used:
Simple Signup: Creating a NOSTR account is incredibly easy. You can use platforms like Yakihonne or Primal to generate your keys and start exploring the ecosystem.
X-like Client: Apps like Damus offer a familiar X-like experience, making it easy for users to transition from traditional platforms.
Sharing Photos and Videos: Clients like Olas are optimized for visual content, allowing you to share your photos and videos with your followers.
Creating and Consuming Blogs: NOSTR can be used to publish and share blog posts, fostering a community of independent creators.
Live Streaming and Audio Spaces: Explore platforms like Hivetalk and zap.stream for live streaming and audio-based interactions.
NOSTR is a powerful tool for reclaiming your digital life and building a more meaningful online experience. It's time to take control, break free from the shackles of traditional social media, and embrace the future of decentralized communication.
Get the full overview of these and other on: https://nostrapps.com/
-
@ 91bea5cd:1df4451c
2025-04-15 06:27:28Básico
bash lsblk # Lista todos os diretorios montados.
Para criar o sistema de arquivos:
bash mkfs.btrfs -L "ThePool" -f /dev/sdx
Criando um subvolume:
bash btrfs subvolume create SubVol
Montando Sistema de Arquivos:
bash mount -o compress=zlib,subvol=SubVol,autodefrag /dev/sdx /mnt
Lista os discos formatados no diretório:
bash btrfs filesystem show /mnt
Adiciona novo disco ao subvolume:
bash btrfs device add -f /dev/sdy /mnt
Lista novamente os discos do subvolume:
bash btrfs filesystem show /mnt
Exibe uso dos discos do subvolume:
bash btrfs filesystem df /mnt
Balancea os dados entre os discos sobre raid1:
bash btrfs filesystem balance start -dconvert=raid1 -mconvert=raid1 /mnt
Scrub é uma passagem por todos os dados e metadados do sistema de arquivos e verifica as somas de verificação. Se uma cópia válida estiver disponível (perfis de grupo de blocos replicados), a danificada será reparada. Todas as cópias dos perfis replicados são validadas.
iniciar o processo de depuração :
bash btrfs scrub start /mnt
ver o status do processo de depuração Btrfs em execução:
bash btrfs scrub status /mnt
ver o status do scrub Btrfs para cada um dos dispositivos
bash btrfs scrub status -d / data btrfs scrub cancel / data
Para retomar o processo de depuração do Btrfs que você cancelou ou pausou:
btrfs scrub resume / data
Listando os subvolumes:
bash btrfs subvolume list /Reports
Criando um instantâneo dos subvolumes:
Aqui, estamos criando um instantâneo de leitura e gravação chamado snap de marketing do subvolume de marketing.
bash btrfs subvolume snapshot /Reports/marketing /Reports/marketing-snap
Além disso, você pode criar um instantâneo somente leitura usando o sinalizador -r conforme mostrado. O marketing-rosnap é um instantâneo somente leitura do subvolume de marketing
bash btrfs subvolume snapshot -r /Reports/marketing /Reports/marketing-rosnap
Forçar a sincronização do sistema de arquivos usando o utilitário 'sync'
Para forçar a sincronização do sistema de arquivos, invoque a opção de sincronização conforme mostrado. Observe que o sistema de arquivos já deve estar montado para que o processo de sincronização continue com sucesso.
bash btrfs filsystem sync /Reports
Para excluir o dispositivo do sistema de arquivos, use o comando device delete conforme mostrado.
bash btrfs device delete /dev/sdc /Reports
Para sondar o status de um scrub, use o comando scrub status com a opção -dR .
bash btrfs scrub status -dR / Relatórios
Para cancelar a execução do scrub, use o comando scrub cancel .
bash $ sudo btrfs scrub cancel / Reports
Para retomar ou continuar com uma depuração interrompida anteriormente, execute o comando de cancelamento de depuração
bash sudo btrfs scrub resume /Reports
mostra o uso do dispositivo de armazenamento:
btrfs filesystem usage /data
Para distribuir os dados, metadados e dados do sistema em todos os dispositivos de armazenamento do RAID (incluindo o dispositivo de armazenamento recém-adicionado) montados no diretório /data , execute o seguinte comando:
sudo btrfs balance start --full-balance /data
Pode demorar um pouco para espalhar os dados, metadados e dados do sistema em todos os dispositivos de armazenamento do RAID se ele contiver muitos dados.
Opções importantes de montagem Btrfs
Nesta seção, vou explicar algumas das importantes opções de montagem do Btrfs. Então vamos começar.
As opções de montagem Btrfs mais importantes são:
**1. acl e noacl
**ACL gerencia permissões de usuários e grupos para os arquivos/diretórios do sistema de arquivos Btrfs.
A opção de montagem acl Btrfs habilita ACL. Para desabilitar a ACL, você pode usar a opção de montagem noacl .
Por padrão, a ACL está habilitada. Portanto, o sistema de arquivos Btrfs usa a opção de montagem acl por padrão.
**2. autodefrag e noautodefrag
**Desfragmentar um sistema de arquivos Btrfs melhorará o desempenho do sistema de arquivos reduzindo a fragmentação de dados.
A opção de montagem autodefrag permite a desfragmentação automática do sistema de arquivos Btrfs.
A opção de montagem noautodefrag desativa a desfragmentação automática do sistema de arquivos Btrfs.
Por padrão, a desfragmentação automática está desabilitada. Portanto, o sistema de arquivos Btrfs usa a opção de montagem noautodefrag por padrão.
**3. compactar e compactar-forçar
**Controla a compactação de dados no nível do sistema de arquivos do sistema de arquivos Btrfs.
A opção compactar compacta apenas os arquivos que valem a pena compactar (se compactar o arquivo economizar espaço em disco).
A opção compress-force compacta todos os arquivos do sistema de arquivos Btrfs, mesmo que a compactação do arquivo aumente seu tamanho.
O sistema de arquivos Btrfs suporta muitos algoritmos de compactação e cada um dos algoritmos de compactação possui diferentes níveis de compactação.
Os algoritmos de compactação suportados pelo Btrfs são: lzo , zlib (nível 1 a 9) e zstd (nível 1 a 15).
Você pode especificar qual algoritmo de compactação usar para o sistema de arquivos Btrfs com uma das seguintes opções de montagem:
- compress=algoritmo:nível
- compress-force=algoritmo:nível
Para obter mais informações, consulte meu artigo Como habilitar a compactação do sistema de arquivos Btrfs .
**4. subvol e subvolid
**Estas opções de montagem são usadas para montar separadamente um subvolume específico de um sistema de arquivos Btrfs.
A opção de montagem subvol é usada para montar o subvolume de um sistema de arquivos Btrfs usando seu caminho relativo.
A opção de montagem subvolid é usada para montar o subvolume de um sistema de arquivos Btrfs usando o ID do subvolume.
Para obter mais informações, consulte meu artigo Como criar e montar subvolumes Btrfs .
**5. dispositivo
A opção de montagem de dispositivo** é usada no sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs.
Em alguns casos, o sistema operacional pode falhar ao detectar os dispositivos de armazenamento usados em um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs. Nesses casos, você pode usar a opção de montagem do dispositivo para especificar os dispositivos que deseja usar para o sistema de arquivos de vários dispositivos Btrfs ou RAID.
Você pode usar a opção de montagem de dispositivo várias vezes para carregar diferentes dispositivos de armazenamento para o sistema de arquivos de vários dispositivos Btrfs ou RAID.
Você pode usar o nome do dispositivo (ou seja, sdb , sdc ) ou UUID , UUID_SUB ou PARTUUID do dispositivo de armazenamento com a opção de montagem do dispositivo para identificar o dispositivo de armazenamento.
Por exemplo,
- dispositivo=/dev/sdb
- dispositivo=/dev/sdb,dispositivo=/dev/sdc
- dispositivo=UUID_SUB=490a263d-eb9a-4558-931e-998d4d080c5d
- device=UUID_SUB=490a263d-eb9a-4558-931e-998d4d080c5d,device=UUID_SUB=f7ce4875-0874-436a-b47d-3edef66d3424
**6. degraded
A opção de montagem degradada** permite que um RAID Btrfs seja montado com menos dispositivos de armazenamento do que o perfil RAID requer.
Por exemplo, o perfil raid1 requer a presença de 2 dispositivos de armazenamento. Se um dos dispositivos de armazenamento não estiver disponível em qualquer caso, você usa a opção de montagem degradada para montar o RAID mesmo que 1 de 2 dispositivos de armazenamento esteja disponível.
**7. commit
A opção commit** mount é usada para definir o intervalo (em segundos) dentro do qual os dados serão gravados no dispositivo de armazenamento.
O padrão é definido como 30 segundos.
Para definir o intervalo de confirmação para 15 segundos, você pode usar a opção de montagem commit=15 (digamos).
**8. ssd e nossd
A opção de montagem ssd** informa ao sistema de arquivos Btrfs que o sistema de arquivos está usando um dispositivo de armazenamento SSD, e o sistema de arquivos Btrfs faz a otimização SSD necessária.
A opção de montagem nossd desativa a otimização do SSD.
O sistema de arquivos Btrfs detecta automaticamente se um SSD é usado para o sistema de arquivos Btrfs. Se um SSD for usado, a opção de montagem de SSD será habilitada. Caso contrário, a opção de montagem nossd é habilitada.
**9. ssd_spread e nossd_spread
A opção de montagem ssd_spread** tenta alocar grandes blocos contínuos de espaço não utilizado do SSD. Esse recurso melhora o desempenho de SSDs de baixo custo (baratos).
A opção de montagem nossd_spread desativa o recurso ssd_spread .
O sistema de arquivos Btrfs detecta automaticamente se um SSD é usado para o sistema de arquivos Btrfs. Se um SSD for usado, a opção de montagem ssd_spread será habilitada. Caso contrário, a opção de montagem nossd_spread é habilitada.
**10. descarte e nodiscard
Se você estiver usando um SSD que suporte TRIM enfileirado assíncrono (SATA rev3.1), a opção de montagem de descarte** permitirá o descarte de blocos de arquivos liberados. Isso melhorará o desempenho do SSD.
Se o SSD não suportar TRIM enfileirado assíncrono, a opção de montagem de descarte prejudicará o desempenho do SSD. Nesse caso, a opção de montagem nodiscard deve ser usada.
Por padrão, a opção de montagem nodiscard é usada.
**11. norecovery
Se a opção de montagem norecovery** for usada, o sistema de arquivos Btrfs não tentará executar a operação de recuperação de dados no momento da montagem.
**12. usebackuproot e nousebackuproot
Se a opção de montagem usebackuproot for usada, o sistema de arquivos Btrfs tentará recuperar qualquer raiz de árvore ruim/corrompida no momento da montagem. O sistema de arquivos Btrfs pode armazenar várias raízes de árvore no sistema de arquivos. A opção de montagem usebackuproot** procurará uma boa raiz de árvore e usará a primeira boa que encontrar.
A opção de montagem nousebackuproot não verificará ou recuperará raízes de árvore inválidas/corrompidas no momento da montagem. Este é o comportamento padrão do sistema de arquivos Btrfs.
**13. space_cache, space_cache=version, nospace_cache e clear_cache
A opção de montagem space_cache** é usada para controlar o cache de espaço livre. O cache de espaço livre é usado para melhorar o desempenho da leitura do espaço livre do grupo de blocos do sistema de arquivos Btrfs na memória (RAM).
O sistema de arquivos Btrfs suporta 2 versões do cache de espaço livre: v1 (padrão) e v2
O mecanismo de cache de espaço livre v2 melhora o desempenho de sistemas de arquivos grandes (tamanho de vários terabytes).
Você pode usar a opção de montagem space_cache=v1 para definir a v1 do cache de espaço livre e a opção de montagem space_cache=v2 para definir a v2 do cache de espaço livre.
A opção de montagem clear_cache é usada para limpar o cache de espaço livre.
Quando o cache de espaço livre v2 é criado, o cache deve ser limpo para criar um cache de espaço livre v1 .
Portanto, para usar o cache de espaço livre v1 após a criação do cache de espaço livre v2 , as opções de montagem clear_cache e space_cache=v1 devem ser combinadas: clear_cache,space_cache=v1
A opção de montagem nospace_cache é usada para desabilitar o cache de espaço livre.
Para desabilitar o cache de espaço livre após a criação do cache v1 ou v2 , as opções de montagem nospace_cache e clear_cache devem ser combinadas: clear_cache,nosapce_cache
**14. skip_balance
Por padrão, a operação de balanceamento interrompida/pausada de um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs será retomada automaticamente assim que o sistema de arquivos Btrfs for montado. Para desabilitar a retomada automática da operação de equilíbrio interrompido/pausado em um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs, você pode usar a opção de montagem skip_balance .**
**15. datacow e nodatacow
A opção datacow** mount habilita o recurso Copy-on-Write (CoW) do sistema de arquivos Btrfs. É o comportamento padrão.
Se você deseja desabilitar o recurso Copy-on-Write (CoW) do sistema de arquivos Btrfs para os arquivos recém-criados, monte o sistema de arquivos Btrfs com a opção de montagem nodatacow .
**16. datasum e nodatasum
A opção datasum** mount habilita a soma de verificação de dados para arquivos recém-criados do sistema de arquivos Btrfs. Este é o comportamento padrão.
Se você não quiser que o sistema de arquivos Btrfs faça a soma de verificação dos dados dos arquivos recém-criados, monte o sistema de arquivos Btrfs com a opção de montagem nodatasum .
Perfis Btrfs
Um perfil Btrfs é usado para informar ao sistema de arquivos Btrfs quantas cópias dos dados/metadados devem ser mantidas e quais níveis de RAID devem ser usados para os dados/metadados. O sistema de arquivos Btrfs contém muitos perfis. Entendê-los o ajudará a configurar um RAID Btrfs da maneira que você deseja.
Os perfis Btrfs disponíveis são os seguintes:
single : Se o perfil único for usado para os dados/metadados, apenas uma cópia dos dados/metadados será armazenada no sistema de arquivos, mesmo se você adicionar vários dispositivos de armazenamento ao sistema de arquivos. Assim, 100% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser utilizado.
dup : Se o perfil dup for usado para os dados/metadados, cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos manterá duas cópias dos dados/metadados. Assim, 50% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser utilizado.
raid0 : No perfil raid0 , os dados/metadados serão divididos igualmente em todos os dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, não haverá dados/metadados redundantes (duplicados). Assim, 100% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser usado. Se, em qualquer caso, um dos dispositivos de armazenamento falhar, todo o sistema de arquivos será corrompido. Você precisará de pelo menos dois dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid0 .
raid1 : No perfil raid1 , duas cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a uma falha de unidade. Mas você pode usar apenas 50% do espaço total em disco. Você precisará de pelo menos dois dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1 .
raid1c3 : No perfil raid1c3 , três cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a duas falhas de unidade, mas você pode usar apenas 33% do espaço total em disco. Você precisará de pelo menos três dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1c3 .
raid1c4 : No perfil raid1c4 , quatro cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a três falhas de unidade, mas você pode usar apenas 25% do espaço total em disco. Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1c4 .
raid10 : No perfil raid10 , duas cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos, como no perfil raid1 . Além disso, os dados/metadados serão divididos entre os dispositivos de armazenamento, como no perfil raid0 .
O perfil raid10 é um híbrido dos perfis raid1 e raid0 . Alguns dos dispositivos de armazenamento formam arrays raid1 e alguns desses arrays raid1 são usados para formar um array raid0 . Em uma configuração raid10 , o sistema de arquivos pode sobreviver a uma única falha de unidade em cada uma das matrizes raid1 .
Você pode usar 50% do espaço total em disco na configuração raid10 . Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid10 .
raid5 : No perfil raid5 , uma cópia dos dados/metadados será dividida entre os dispositivos de armazenamento. Uma única paridade será calculada e distribuída entre os dispositivos de armazenamento do array RAID.
Em uma configuração raid5 , o sistema de arquivos pode sobreviver a uma única falha de unidade. Se uma unidade falhar, você pode adicionar uma nova unidade ao sistema de arquivos e os dados perdidos serão calculados a partir da paridade distribuída das unidades em execução.
Você pode usar 1 00x(N-1)/N % do total de espaços em disco na configuração raid5 . Aqui, N é o número de dispositivos de armazenamento adicionados ao sistema de arquivos. Você precisará de pelo menos três dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid5 .
raid6 : No perfil raid6 , uma cópia dos dados/metadados será dividida entre os dispositivos de armazenamento. Duas paridades serão calculadas e distribuídas entre os dispositivos de armazenamento do array RAID.
Em uma configuração raid6 , o sistema de arquivos pode sobreviver a duas falhas de unidade ao mesmo tempo. Se uma unidade falhar, você poderá adicionar uma nova unidade ao sistema de arquivos e os dados perdidos serão calculados a partir das duas paridades distribuídas das unidades em execução.
Você pode usar 100x(N-2)/N % do espaço total em disco na configuração raid6 . Aqui, N é o número de dispositivos de armazenamento adicionados ao sistema de arquivos. Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid6 .
-
@ 91bea5cd:1df4451c
2025-04-15 06:23:35Um bom gerenciamento de senhas deve ser simples e seguir a filosofia do Unix. Organizado em hierarquia e fácil de passar de um computador para outro.
E por isso não é recomendável o uso de aplicativos de terceiros que tenham acesso a suas chaves(senhas) em seus servidores, tampouco as opções nativas dos navegadores, que também pertencem a grandes empresas que fazem um grande esforço para ter acesso a nossas informações.
Recomendação
- pass
- Qtpass (gerenciador gráfico)
Com ele seus dados são criptografados usando sua chave gpg e salvo em arquivos organizados por pastas de forma hierárquica, podendo ser integrado a um serviço git de sua escolha ou copiado facilmente de um local para outro.
Uso
O seu uso é bem simples.
Configuração:
pass git init
Para ver:
pass Email/example.com
Copiar para área de transferência (exige xclip):
pass -c Email/example.com
Para inserir:
pass insert Email/example0.com
Para inserir e gerar senha:
pass generate Email/example1.com
Para inserir e gerar senha sem símbolos:
pass generate --no-symbols Email/example1.com
Para inserir, gerar senha e copiar para área de transferência :
pass generate -c Email/example1.com
Para remover:
pass rm Email/example.com
-
@ 7d33ba57:1b82db35
2025-04-17 08:46:22Oslo, the capital of Norway, is where sleek Scandinavian design, deep Viking roots, and stunning fjord views come together. Surrounded by forests and water, Oslo is one of Europe’s greenest and most livable cities, with a creative, outdoorsy spirit and world-class museums.
🏙️ Top Things to Do in Oslo
🎨 Vigeland Sculpture Park (Frogner Park)
- A surreal, open-air park filled with over 200 sculptures by Gustav Vigeland
- It’s free and open year-round—great for a stroll or picnic
🛶 Oslofjord and Island Hopping
- Take a ferry or kayak around the Oslofjord
- Visit Hovedøya, Gressholmen, or Lindøya for swimming, hiking, and picnicking
🖼️ The National Museum & MUNCH
- The National Museum holds iconic works, including Munch’s The Scream
- Visit the new MUNCH Museum on the waterfront for a deeper dive into the artist’s life
⛵ Aker Brygge & Tjuvholmen
- Trendy harborside neighborhoods full of restaurants, bars, and galleries
- Great for a waterside meal or people-watching
🏰 Akershus Fortress
- A medieval castle with epic views over the Oslofjord
- Walk along the fortress walls and explore Oslo’s early history
🏛️ The Viking Ship Museum (Reopening in 2026)
- Currently under renovation, but a must-visit when it reopens—actual Viking ships and artifacts!
🌲 Nature Close to the City
🌳 Nordmarka Forest
- Miles of trails for hiking, biking, skiing, or lake swimming just 20 minutes from the center
- Hop on the metro to Frognerseteren for panoramic views and waffles at a mountain hut
🏞️ Ekebergparken
- Sculpture park on a hill with views over Oslo
- Mix of art, forest trails, and history
🍽️ What to Eat & Drink
- Salmon, reindeer, and meatballs (kjøttkaker)
- Try a pølse (Norwegian hot dog) with crispbread
- Don’t miss kanelsnurrer (cinnamon buns) or brown cheese (brunost)
- Local craft beer or a glass of Akevitt, Norway’s signature spirit
🗓️ Best Time to Visit
- Summer (June–Aug): Long days, festivals, island hopping, and café life
- Winter (Dec–Feb): Great for skiing, winter lights, and cozy vibes
- Shoulder seasons: Fewer crowds, moody beauty, and great museum access
🧭 Travel Tips
- Oslo is compact—walk or use public transport (Oslo Pass is a great deal!)
- Tap water is pristine, and locals are super friendly
- Many attractions are closed on Mondays—plan ahead
- Bring layers—weather can shift fast!
-
@ 0b5faac9:12669905
2025-04-17 08:05:44In the wave of digitalization, handwriting as a way to record thoughts and inspire inspiration is gradually being forgotten. Mobile phone notifications, drone hums and ubiquitous wireless signals make it difficult for us to calm down and hold a pen to write. How to regain the time of handwriting and find the pure joy of creation? With the help of tools such as mobile phone jammers, drone jammers and high-power jammers, we can block interference and create a focused writing space.
1. The threat of digital interference to handwriting
Mobile phone intrusion: Frequent notifications, social media and calls interrupt thoughts, making it difficult to focus on the smooth expression between paper and pen.
Drone noise: When writing outdoors, the hum or monitoring of drones not only destroys the atmosphere, but may also cause privacy concerns.
Wireless signal clutter: WiFi, Bluetooth and other signals invisibly distract attention and weaken the immersion when writing.
https://www.jammermfg.com/cell-phone-jammers.html
2. The guardian of handwriting
Mobile phone jammer: By blocking mobile phone signals, mobile phone jammers make your device temporarily "disconnected", eliminating the interference of notifications and calls, suitable for focused writing at home or in a cafe.
Drone jammer: When writing outdoors, drone jammers can block drone signals to prevent their noise or surveillance from disrupting your creative mood.
https://www.jammermfg.com/drone-jammer.html
High-power jammer: For scenes that require a large range of quiet environments, such as writing workshops, high-power jammers can block multiple wireless signals to create a pure "signal pure land".
3. Practical methods to regain handwriting
In addition to using jammers, cultivating handwriting habits can also improve concentration:
- Fixed handwriting time: arrange 30 minutes to 1 hour of "interference-free handwriting time" every day, use mobile phone jammers to ensure that you are not disturbed, and record inspiration or diary.
- Choose a comfortable scene: write in a quiet study or outdoor natural environment, and use drone jammers to protect the tranquility of outdoor creation.
4. Your creative partner
https://www.jammermfg.com/high-power-military-jammer.html
To regain handwriting time, it is crucial to choose a reliable jammer. Jammermfg provides a variety of solutions to meet the needs of different creative scenarios:
- Diversified products: from portable mobile phone jammers to high-power jammers, covering a variety of indoor and outdoor writing environments.
- Professional support: Provide purchase suggestions and usage guidance to ensure that the equipment is perfectly adapted to your handwriting needs.
Conclusion
Handwriting is a bridge between the heart and the world, but we need to actively make room for it. With the help of mobile phone jammers, drone jammers and high-power jammers, combined with scientific writing habits, we can stay away from distractions and regain the fun and depth of handwriting.
-
@ 95cb4330:96db706c
2025-04-17 07:12:01Summary and Guide Based on Sam Altman's Classic Post
In life and business, almost everyone starts off chasing money. But if you observe closely — especially among those who achieve outlier success — you’ll notice something interesting:
Over time, money becomes secondary. The real obsession becomes making something important happen.
Sam Altman, entrepreneur and CEO of OpenAI, laid out a roadmap to achieving this rare level of success. It’s about much more than working hard or being smart — it’s about how you think, act, and invest your time over decades.
Here's a deep breakdown of his 13 principles — explained, with examples and reflections.
1. Compound Yourself
Think exponentially, not linearly.
- Businesses (and careers) that compound — growing 50% per year — become unstoppable over time.
- You want your learning, network, and impact to snowball.
- Focus on adding zeros to your results, not just small wins.
🔎 Example: Instead of focusing on one-off gigs, build skills and systems that grow your results faster every year. Think like an investor, not an hourly worker.
2. Have (Almost) Too Much Self-Belief
You have to believe in yourself beyond reason — but stay open to feedback.
- Most real innovation requires contrarian thinking.
- Early critics will tell you you're crazy — and that’s normal.
- Learn to manage your own morale.
🔎 Example: Elon Musk’s absolute certainty about colonizing Mars — even when few believed him — fueled SpaceX’s breakthrough innovations.
3. Learn to Think Independently
Original thinking can’t be taught by schools.
- Break problems into first principles instead of copying others.
- Test crazy ideas quickly and cheaply.
- The ability to "figure things out when no one knows what to do" is a superpower.
🔎 Example: Airbnb founders had no roadmap for building a company based on renting strangers' homes — they made it up as they went.
4. Get Good at Sales
It’s not enough to have a great idea — you must convince others to join you.
- Great careers and startups are sales jobs: selling visions to investors, customers, and employees.
- The best sales come from genuine belief in what you're building.
🔎 Example: Altman emphasizes in-person interactions: “When it mattered, I always got on the plane.”
5. Make It Easy to Take Risks
Big rewards require many small bets and the willingness to look foolish.
- Risk is overestimated; reward is underestimated.
- Stay financially and mentally flexible early in life.
🔎 Example: Leaving a high-paying tech job is hard — but those who leap to start companies often change the world.
6. Focus
Doing the right work matters more than working hard on the wrong things.
- Ruthlessly prioritize what truly matters.
- Ignore distractions.
- Be unstoppable once you know what to focus on.
🔎 Example: Startups win by focusing on one core thing until they dominate, not by trying to do everything.
7. Work Hard
- Smart + hard work is required to reach the top 1% of any field.
- Success begets success — momentum compounds.
- Find work you love and people you love working with to avoid burnout.
🔎 Example: Early Amazon teams pulled insane hours — but they believed they were building something world-changing.
8. Be Bold
- Solve hard problems, not easy ones.
- People are attracted to missions that matter.
🔎 Example: If your dream is gene-editing or AI, don’t settle for building another social media app.
9. Be Willful
- The world is more malleable than you think.
- Persistence and optimism often win in the end.
🔎 Example: Airbnb founders survived maxed-out credit cards and endless rejection — but they didn't quit.
10. Be Hard to Compete With
- Differentiate yourself through leverage:
- Skills at the intersection of fields
- Strong personal brand
- Unique insights
🔎 Example: Elon Musk isn't just an engineer or marketer — he's both, and that makes him hard to beat.
11. Build a Network
- Great accomplishments require great teams.
- Help people long before you need them.
- Spot undiscovered talent early.
🔎 Example: Most of Altman’s best career opportunities came from helping others years before it paid off.
12. Own Equity
- Salaries won't make you rich.
- Owning assets (companies, IP, real estate) creates real wealth.
🔎 Example: The richest people in the world — Bezos, Musk, Gates — got there by owning companies, not by drawing salaries.
13. Be Internally Driven
- Don’t chase approval or follow the herd.
- Care about doing great work for yourself.
- If you're motivated mainly by status or envy, you will lose focus.
🔎 Example: Jessica Livingston and Paul Graham were mocked early for Y Combinator. They didn’t care — and YC changed the world of startups.
💬 Final Thought
Success isn’t about short-term hacks. It’s about long-term habits:
- Think long-term.
- Bet boldly.
- Compound yourself.
- Build something important.“Eventually, you will define your success by performing excellent work in areas that are important to you. The sooner you start, the further you will go.”
Commit to the path. The rewards — both internal and external — are beyond what most people ever experience.
🌱 Start planting seeds today. Watch them compound beyond imagination. 🚀
📈 How To Be Successful — 13 Principles for Outlier Achievement
| Principle | Summary | |:-------------|:------------| | 🧠 Compound Yourself | Focus on exponential growth — build skills, network, and leverage over time. | | 💪 Self-Belief (Almost Too Much) | Believe in your vision even when others doubt you, balanced by self-awareness. | | 🔥 Think Independently | Use first-principles thinking; test new ideas rather than copying others. | | 🗣️ Master Sales | Convince others of your ideas — genuine belief makes selling easier. | | 🎯 Make Risk-Taking Easy | Stay flexible and bet on ideas with high upside and limited downside. | | 🎯 Focus | Ruthlessly prioritize — working on the right things matters more than working long hours. | | 🛠️ Work Hard | Smart + intense effort is necessary to reach the top 1%. Momentum compounds success. | | 🚀 Be Bold | Solve big, important problems — bold missions create constant tailwinds. | | 🌎 Be Willful | Persist until you succeed — optimistic persistence often bends reality. | | 🧩 Be Hard to Compete With | Combine rare skills and leverage to become uniquely valuable. | | 🤝 Build a Powerful Network | Help others early; spot and collaborate with rising talent. | | 🏡 Own Equity | Own scalable assets — don’t just trade your time for money. | | 🔥 Stay Internally Driven | Follow intrinsic motivation — work on what you truly care about. |
🚀 Final Thought
"Long-term focus on inputs, boldness, learning, and compound effort leads to extraordinary success."
-
@ 044da344:073a8a0e
2025-04-17 06:53:41Hölderlin taugt immer. Diesmal sogar doppelt. Dass mit der Gefahr das Rettende wächst, hat sich inzwischen herumgesprochen. Raymond Unger ist so ein Anker. Wann immer ich seinen Namen bei einer Veranstaltung erwähne: Die Leute wissen Bescheid. Vom Verlust der Freiheit. Ich hätte zählen sollen, wie oft ich gehört habe: Dieses Buch hat mir die Augen geöffnet. Migration, Klima, Corona: alles drin und vor allem so verflochten, dass zusammenpasst, was eigentlich nicht zusammengehört und unsere Welt auf den Kopf gestellt hat. Viele haben danach Ungers Impfbuch gelesen, sich von seiner Heldenreise inspirieren oder bestätigen lassen und mit ihm um Gunnar Kaiser getrauert (Habe ich genug getan?, 2024). Wer schon länger dabei ist, kennt in der Regel auch Die Wiedergutmacher – ein Psychogramm der Babyboomer, das so nur jemand schreiben kann, der selbst erlebt hat, wie das Weltkriegstrauma vererbt wurde, und als Therapeut die Konzepte kennt, mit denen sich das in Worte fassen lässt.
Der Sachbuchautor Raymond Unger war und ist ein Fremdgänger – ein Künstler, preisgekrönt, den die Not des Beobachters gezwungen hat, das Metier zu wechseln. Der erste Hölderlin. Ohne die große Krise würde dieser Maler vermutlich immer noch nächtelang an seiner Staffelei mit der Materie kämpfen und vor allem mit sich selbst. Wahrscheinlich kennt Raymond Unger auch mein zweites Hölderlin-Zitat: Was aber bleibet, stiften die Dichter. Ich habe diesen Satz gerade wieder gehört aus dem Mund von Peter-Michael Diestel, letzter Innenminister der DDR, der sich mit Gregor Gysi über Heimat unterhält, über den Osten und den Westen und dabei fast zwangsläufig auf die Historiker zu sprechen kommt. „Ärmliches Lohnschreiber-Geschwader“, sagt Diestel und zeichnet ein ganzes anderes Bild von der Vergangenheit als die Geschichtsbücher. „Die DDR ist meine Herkunft. Mein Paradies.“ Sagt einer ihrer Totengräber. Und damit Vorhang auf für die Dichter.
Auf der Bühne steht der Romanautor Raymond Unger, eine Melange aus dem Bildermacher und dem Gesellschaftsanalytiker, die den gleichen Namen tragen. Wuchtig kommt sein Gemälde KAI daher mit Szenen und Orten, von denen jeder Hollywood-Regisseur träumt. Ostsee und Alpen, Berlin, Hamburg und das Silicon Valley. Am Ende Fulda, okay. Davor aber eine Schriftstellerin, Ende 30, attraktiv, Objekt der Begierde zweier reifer Männer, bis die Dame plötzlich im Wortsinn zerfließt, das gute Stück eines der beiden Verehrer beleidigt (klein, was sonst) und auf den Teppich pinkelt. Das ist nur das Vorspiel für einen Antiterroreinsatz in der schwedischen Idylle und Explosionen im Zentrum von Berlin, für ein Auto, das seinen Fahrer wie von Geisterhand gesteuert in den Tod reißt, und für einen Quarterback, der auf dem Spielfeld tot umfällt – zur Primetime, damit jeder weiß, was ihm blühen könnte.
Ich schreibe das, weil ich ein wenig Angst hatte vor diesem Roman. Einer meiner Lieblingsautoren auf neuem Gelände. Wird er sich dort verlaufen, untergehen gar, und mir so einen Fixstern aus meinem Bücherregal nehmen? Nein, nein und nochmal nein. KAI ist ein großer Wurf. KAI ist das Buch, auf das ich gewartet habe. Sicher: Ich habe die Dystopie Hinter der Zukunft von Thomas Eisinger gefeiert, einen Augenöffner ersten Ranges, und ein wenig auch die Corona-Kurzgeschichten von Eugen Zentner. Trotzdem. KAI hat das Zeug, unseren Nachkommen zu berichten, was wir erlebt und erlitten haben. Und vielleicht noch wichtiger: KAI übersetzt all das in ein Märchen, das realer nicht sein könnte und mit einem Ende daherkommt, das die Kämpfe seit den frühen 2010er Jahren mit Sinn auflädt und aus Verlierern Sieger macht. Dazu gleich mehr.
Vorher ein Wort zu Hölderlin und zu seinem Satz über die Dichter, die sagen, was bleibt. Der Mensch ist ein Geschichtentier. Das ist trivial, ich weiß, kann aber nicht oft genug wiederholt werden in einer Zeit, in der eine Regierung sich ins Stammbuch schreibt, dass „die bewusste Verbreitung von falschen Tatsachenbehauptungen“ nicht „durch die Meinungsfreiheit“ gedeckt sei. Falsche Tatsachenbehauptungen. Was soll das sein? 2014 ist Argentinien Fußball-Weltmeister geworden. Oder Tansania. Zwei plus zwei ist fünf und der Autor dieses Textes – eine Frau. Ich muss gar nicht in die Absurditätenkiste greifen, sondern kann in meinem Fachgebiet bleiben. Das 20. Jahrhundert beginnt mit dem Panzerkreuzer Aurora in Petrograd und endet mit den Moskauer Schüssen vom August 1991. Falsch. Falsch? Muss ich künftig Putsch sagen und Sankt Petersburg und hundert Jahre hundert Jahre sein lassen, um der Medienaufsicht nicht ins Netz zu gehen?
Namen, Daten, Orte, Ereignisse: All das rauscht an uns vorbei, wenn es nicht mit einer Story daherkommt und sich nicht einfügen lässt in das, was wir uns über die Menschen und die Welt erzählen. Wer glaubt, dass der Staat ein guter Forscher ist, ein noch besserer Lehrer und der ideale Verwalter aller Vermögen, der wird sich nicht beklagen, wenn Steuergelder in Wissenschaft und Bildung, Kunst und Kultur gepumpt werden und man parallel über einen Lastenausgleich diskutiert. Noch einmal anders gewendet: Es lohnt sich nicht, die Gegenseite mit „Fakten“ und „Tatsachen“ zu bombardieren. Nicht das Fleisch entscheidet, sondern die Sauce. Demokratie, Menschenrechte, Wertewesten. Schwarz-Rot will die „Meinungsfreiheit“ wahren, aber trotzdem „auf der Basis klarer gesetzlicher Vorgaben gegen Informationsmanipulation sowie Hass und Hetze vorgehen“. Alles in einem Satz. Das ist die hohe Schule der Manipulation – möglich nur, weil die Jünger des Parteienstaates gar nicht auf die Idee kommen können, dass im Namen der großen Erzählung Böses getan wird.
Raymond Unger weiß: Wir brauchen eine neue Erzählung. Und wir brauchen Klarheit über die Wucht, die Erzählungen entfalten. Also lässt er Materialisten und Idealisten aufeinander losgehen und öffnet auf dem Höhepunkt der Schlacht „ein Portal zur Anderswelt“, „durch das uralte kosmische Kräfte in unsere physische Welt hineinwirken können“ – bei ihm ein Einfallstor für die „transhumanistische Agenda“ und jene Kräfte, die „alles Menschliche“ verdrängen wollen. Wenn das jetzt kryptisch klingen sollte: keine Sorge. Dieser Autor kann erzählen. Er lässt Freud und Jung in einem Ehepaar auferstehen, das sich so kappelt wie Hans Castorp und Lodovico Settembrini auf dem Zauberberg von Thomas Mann, und mischt das, was er über Klima, 5G und mRNA braucht, in Gespräche mit ChatGPT und kurze Vorträge, die jeder verstehen kann, weil im Publikum Laien sitzen.
Von der Story selbst will ich hier nicht allzu viel verraten. Siehe oben. Wenn man ins Kino geht, reichen auch die Schnipsel aus dem Werbespot und die Gesichter der Helden. Bill Gates spielt mit, Uğur Şahin und Ulrike Herrmann. Leicht verfremdet, aber ja: Es geht schließlich um alles. Den Titel immerhin muss ich auflösen: Bei Raymond Unger sitzt KAI am Hebel. CO2-Märchen, Pandemie-Märchen, das Schlachtfeld Ukraine, Kriegstüchtigkeit: Produkte einer finsteren Macht, die bei ihm aus der Technik wächst und aus der Ideenwelt des Okkultismus, die man aber genauso gut ganz irdisch dort verorten könnte, wo nicht wenige einen „tiefen Staat“ vermuten. Ein guter Roman braucht nicht nur große Gefühle, sondern mehr als eine Ebene. Wer sich wie ich eher an Akteure und Ressourcen hält, kann KAI leicht als Metapher lesen, erst recht in dieser Schreibweise.
Raymond Ungers Gegenerzählung ist nicht neu, aber verlorengegangen auf Plattformen und Bildschirmen, die keine Zwischentöne erlauben und so die Spaltung vorantreiben. Unger sagt: Rettung kommt von da, wo es keine Mehrheiten gibt. Der Außenseiter in der Wissenschaft. Die Menschen, die entscheiden und verzichten und erst so zum Menschen werden. Coronakritiker. Ostdeutsche. Er sagt außerdem: Es gibt U-Boote selbst da, wo die Mehrheiten sind. Schreibt auch die nicht ab, die euch im Moment als Zielscheibe erscheinen. Vor allem aber sagt er: Der Mensch kann Dinge tun, die buchstäblich niemand auf dem Zettel hat. Gegen jede Wahrscheinlichkeit und damit völlig anders als selbst die perfekte Maschine. Nur der Mensch kann sich lösen von dem, was ist, und so Freund Hölderlin alle Ehre machen.
Vielleicht ein Wermutstropfen: Starke Frauen fehlen in seiner Welt. Das heißt: Es gibt starke Frauen, aber nur auf der dunklen Seite der Macht oder als leichtes Opfer von KAI. Ich habe mit zwei Kennerinnen über den Roman gesprochen, die insgesamt sehr angetan waren, aber leicht die Nase rümpften wegen mancher Formulierung und einigen Figuren. Hier und da etwas technokratisch, sagten die beiden, und nicht immer prall im Leben. Was soll man da antworten als Mann. Ich, ein Sachbuchfresser, habe KAI verschlungen. Und: Gut, dass wir endlich auch in der Unterwelt (Walter van Rossum) einen Roman haben, erschienen in einem großen Verlag, über den wir streiten können.
Raymond Unger: KAI. München: Europa Verlag, 431 Seiten, 25 Euro.
-
@ 91bea5cd:1df4451c
2025-04-15 06:19:19O que é Tahoe-LAFS?
Bem-vindo ao Tahoe-LAFS_, o primeiro sistema de armazenamento descentralizado com
- Segurança independente do provedor * .
Tahoe-LAFS é um sistema que ajuda você a armazenar arquivos. Você executa um cliente Programa no seu computador, que fala com um ou mais servidores de armazenamento em outros computadores. Quando você diz ao seu cliente para armazenar um arquivo, ele irá criptografar isso Arquivo, codifique-o em múltiplas peças, depois espalhe essas peças entre Vários servidores. As peças são todas criptografadas e protegidas contra Modificações. Mais tarde, quando você pede ao seu cliente para recuperar o arquivo, ele irá Encontre as peças necessárias, verifique se elas não foram corrompidas e remontadas Eles, e descriptografar o resultado.
O cliente cria mais peças (ou "compartilhamentos") do que acabará por precisar, então Mesmo que alguns servidores falhem, você ainda pode recuperar seus dados. Corrompido Os compartilhamentos são detectados e ignorados, de modo que o sistema pode tolerar o lado do servidor Erros no disco rígido. Todos os arquivos são criptografados (com uma chave exclusiva) antes Uploading, então mesmo um operador de servidor mal-intencionado não pode ler seus dados. o A única coisa que você pede aos servidores é que eles podem (geralmente) fornecer o Compartilha quando você os solicita: você não está confiando sobre eles para Confidencialidade, integridade ou disponibilidade absoluta.
O que é "segurança independente do provedor"?
Todo vendedor de serviços de armazenamento na nuvem irá dizer-lhe que o seu serviço é "seguro". Mas o que eles significam com isso é algo fundamentalmente diferente Do que queremos dizer. O que eles significam por "seguro" é que depois de ter dado Eles o poder de ler e modificar seus dados, eles tentam muito difícil de não deixar Esse poder seja abusado. Isso acaba por ser difícil! Insetos, Configurações incorretas ou erro do operador podem acidentalmente expor seus dados para Outro cliente ou para o público, ou pode corromper seus dados. Criminosos Ganho rotineiramente de acesso ilícito a servidores corporativos. Ainda mais insidioso é O fato de que os próprios funcionários às vezes violam a privacidade do cliente De negligência, avareza ou mera curiosidade. O mais consciencioso de Esses prestadores de serviços gastam consideráveis esforços e despesas tentando Mitigar esses riscos.
O que queremos dizer com "segurança" é algo diferente. * O provedor de serviços Nunca tem a capacidade de ler ou modificar seus dados em primeiro lugar: nunca. * Se você usa Tahoe-LAFS, então todas as ameaças descritas acima não são questões para você. Não só é fácil e barato para o provedor de serviços Manter a segurança de seus dados, mas na verdade eles não podem violar sua Segurança se eles tentaram. Isto é o que chamamos de * independente do fornecedor segurança*.
Esta garantia está integrada naturalmente no sistema de armazenamento Tahoe-LAFS e Não exige que você execute um passo de pré-criptografia manual ou uma chave complicada gestão. (Afinal, ter que fazer operações manuais pesadas quando Armazenar ou acessar seus dados anularia um dos principais benefícios de Usando armazenamento em nuvem em primeiro lugar: conveniência.)
Veja como funciona:
Uma "grade de armazenamento" é constituída por uma série de servidores de armazenamento. Um servidor de armazenamento Tem armazenamento direto em anexo (tipicamente um ou mais discos rígidos). Um "gateway" Se comunica com os nós de armazenamento e os usa para fornecer acesso ao Rede sobre protocolos como HTTP (S), SFTP ou FTP.
Observe que você pode encontrar "cliente" usado para se referir aos nós do gateway (que atuam como Um cliente para servidores de armazenamento) e também para processos ou programas que se conectam a Um nó de gateway e operações de execução na grade - por exemplo, uma CLI Comando, navegador da Web, cliente SFTP ou cliente FTP.
Os usuários não contam com servidores de armazenamento para fornecer * confidencialidade * nem
- Integridade * para seus dados - em vez disso, todos os dados são criptografados e Integridade verificada pelo gateway, para que os servidores não possam ler nem Modifique o conteúdo dos arquivos.
Os usuários dependem de servidores de armazenamento para * disponibilidade *. O texto cifrado é Codificado por apagamento em partes
N
distribuídas em pelo menosH
distintas Servidores de armazenamento (o valor padrão paraN
é 10 e paraH
é 7) então Que pode ser recuperado de qualquerK
desses servidores (o padrão O valor deK
é 3). Portanto, apenas a falha doH-K + 1
(com o Padrões, 5) servidores podem tornar os dados indisponíveis.No modo de implantação típico, cada usuário executa seu próprio gateway sozinho máquina. Desta forma, ela confia em sua própria máquina para a confidencialidade e Integridade dos dados.
Um modo de implantação alternativo é que o gateway é executado em uma máquina remota e O usuário se conecta ao HTTPS ou SFTP. Isso significa que o operador de O gateway pode visualizar e modificar os dados do usuário (o usuário * depende de * o Gateway para confidencialidade e integridade), mas a vantagem é que a O usuário pode acessar a grade Tahoe-LAFS com um cliente que não possui o Software de gateway instalado, como um quiosque de internet ou celular.
Controle de acesso
Existem dois tipos de arquivos: imutáveis e mutáveis. Quando você carrega um arquivo Para a grade de armazenamento, você pode escolher o tipo de arquivo que será no grade. Os arquivos imutáveis não podem ser modificados quando foram carregados. UMA O arquivo mutable pode ser modificado por alguém com acesso de leitura e gravação. Um usuário Pode ter acesso de leitura e gravação a um arquivo mutable ou acesso somente leitura, ou não Acesso a ele.
Um usuário que tenha acesso de leitura e gravação a um arquivo mutable ou diretório pode dar Outro acesso de leitura e gravação do usuário a esse arquivo ou diretório, ou eles podem dar Acesso somente leitura para esse arquivo ou diretório. Um usuário com acesso somente leitura Para um arquivo ou diretório pode dar acesso a outro usuário somente leitura.
Ao vincular um arquivo ou diretório a um diretório pai, você pode usar um Link de leitura-escrita ou um link somente de leitura. Se você usar um link de leitura e gravação, então Qualquer pessoa que tenha acesso de leitura e gravação ao diretório pai pode obter leitura-escrita Acesso à criança e qualquer pessoa que tenha acesso somente leitura ao pai O diretório pode obter acesso somente leitura à criança. Se você usar uma leitura somente Link, qualquer pessoa que tenha lido-escrito ou acesso somente leitura ao pai O diretório pode obter acesso somente leitura à criança.
================================================== ==== Usando Tahoe-LAFS com uma rede anônima: Tor, I2P ================================================== ====
. `Visão geral '
. `Casos de uso '
.
Software Dependencies
_#.
Tor
#.I2P
. `Configuração de conexão '
. `Configuração de Anonimato '
#.
Anonimato do cliente ' #.
Anonimato de servidor, configuração manual ' #. `Anonimato de servidor, configuração automática '. `Problemas de desempenho e segurança '
Visão geral
Tor é uma rede anonimização usada para ajudar a esconder a identidade da Internet Clientes e servidores. Consulte o site do Tor Project para obter mais informações: Https://www.torproject.org/
I2P é uma rede de anonimato descentralizada que se concentra no anonimato de ponta a ponta Entre clientes e servidores. Consulte o site I2P para obter mais informações: Https://geti2p.net/
Casos de uso
Existem três casos de uso potenciais para Tahoe-LAFS do lado do cliente:
-
O usuário deseja sempre usar uma rede de anonimato (Tor, I2P) para proteger Seu anonimato quando se conecta às redes de armazenamento Tahoe-LAFS (seja ou Não os servidores de armazenamento são anônimos).
-
O usuário não se preocupa em proteger seu anonimato, mas eles desejam se conectar a Servidores de armazenamento Tahoe-LAFS que são acessíveis apenas através de Tor Hidden Services ou I2P.
-
Tor é usado apenas se uma sugestão de conexão do servidor usar
tor:
. Essas sugestões Geralmente tem um endereço.onion
. -
I2P só é usado se uma sugestão de conexão do servidor usa
i2p:
. Essas sugestões Geralmente têm um endereço.i2p
. -
O usuário não se preocupa em proteger seu anonimato ou para se conectar a um anonimato Servidores de armazenamento. Este documento não é útil para você ... então pare de ler.
Para servidores de armazenamento Tahoe-LAFS existem três casos de uso:
-
O operador deseja proteger o anonimato fazendo seu Tahoe Servidor acessível apenas em I2P, através de Tor Hidden Services, ou ambos.
-
O operador não * requer * anonimato para o servidor de armazenamento, mas eles Quer que ele esteja disponível tanto no TCP / IP roteado publicamente quanto através de um Rede de anonimização (I2P, Tor Hidden Services). Uma possível razão para fazer Isso é porque ser alcançável através de uma rede de anonimato é um Maneira conveniente de ignorar NAT ou firewall que impede roteios públicos Conexões TCP / IP ao seu servidor (para clientes capazes de se conectar a Tais servidores). Outro é o que torna o seu servidor de armazenamento acessível Através de uma rede de anonimato pode oferecer uma melhor proteção para sua Clientes que usam essa rede de anonimato para proteger seus anonimato.
-
O operador do servidor de armazenamento não se preocupa em proteger seu próprio anonimato nem Para ajudar os clientes a proteger o deles. Pare de ler este documento e execute Seu servidor de armazenamento Tahoe-LAFS usando TCP / IP com roteamento público.
Veja esta página do Tor Project para obter mais informações sobre Tor Hidden Services: Https://www.torproject.org/docs/hidden-services.html.pt
Veja esta página do Projeto I2P para obter mais informações sobre o I2P: Https://geti2p.net/en/about/intro
Dependências de software
Tor
Os clientes que desejam se conectar a servidores baseados em Tor devem instalar o seguinte.
-
Tor (tor) deve ser instalado. Veja aqui: Https://www.torproject.org/docs/installguide.html.en. No Debian / Ubuntu, Use
apt-get install tor
. Você também pode instalar e executar o navegador Tor Agrupar. -
Tahoe-LAFS deve ser instalado com o
[tor]
"extra" habilitado. Isso vai Instaletxtorcon
::
Pip install tahoe-lafs [tor]
Os servidores Tor-configurados manualmente devem instalar Tor, mas não precisam
Txtorcon
ou o[tor]
extra. Configuração automática, quando Implementado, vai precisar destes, assim como os clientes.I2P
Os clientes que desejam se conectar a servidores baseados em I2P devem instalar o seguinte. Tal como acontece com Tor, os servidores baseados em I2P configurados manualmente precisam do daemon I2P, mas Não há bibliotecas especiais de apoio Tahoe-side.
-
I2P deve ser instalado. Veja aqui: Https://geti2p.net/en/download
-
A API SAM deve estar habilitada.
-
Inicie o I2P.
- Visite http://127.0.0.1:7657/configclients no seu navegador.
- Em "Configuração do Cliente", marque a opção "Executar no Startup?" Caixa para "SAM Ponte de aplicação ".
- Clique em "Salvar Configuração do Cliente".
-
Clique no controle "Iniciar" para "ponte de aplicação SAM" ou reinicie o I2P.
-
Tahoe-LAFS deve ser instalado com o
[i2p]
extra habilitado, para obterTxi2p
::
Pip install tahoe-lafs [i2p]
Tor e I2P
Os clientes que desejam se conectar a servidores baseados em Tor e I2P devem instalar tudo acima. Em particular, Tahoe-LAFS deve ser instalado com ambos Extras habilitados ::
Pip install tahoe-lafs [tor, i2p]
Configuração de conexão
Consulte: ref:
Connection Management
para uma descrição do[tor]
e
[I2p]
seções detahoe.cfg
. Estes controlam como o cliente Tahoe Conecte-se a um daemon Tor / I2P e, assim, faça conexões com Tor / I2P-baseadas Servidores.As seções
[tor]
e[i2p]
só precisam ser modificadas para serem usadas de forma incomum Configurações ou para habilitar a configuração automática do servidor.A configuração padrão tentará entrar em contato com um daemon local Tor / I2P Ouvindo as portas usuais (9050/9150 para Tor, 7656 para I2P). Enquanto Há um daemon em execução no host local e o suporte necessário Bibliotecas foram instaladas, os clientes poderão usar servidores baseados em Tor Sem qualquer configuração especial.
No entanto, note que esta configuração padrão não melhora a Anonimato: as conexões TCP normais ainda serão feitas em qualquer servidor que Oferece um endereço regular (cumpre o segundo caso de uso do cliente acima, não o terceiro). Para proteger o anonimato, os usuários devem configurar o
[Connections]
da seguinte maneira:[Conexões] Tcp = tor
Com isso, o cliente usará Tor (em vez de um IP-address -reviração de conexão direta) para alcançar servidores baseados em TCP.
Configuração de anonimato
Tahoe-LAFS fornece uma configuração "flag de segurança" para indicar explicitamente Seja necessário ou não a privacidade do endereço IP para um nó ::
[nó] Revelar-IP-address = (booleano, opcional)
Quando
revelar-IP-address = False
, Tahoe-LAFS se recusará a iniciar se algum dos As opções de configuração emtahoe.cfg
revelariam a rede do nó localização:-
[Conexões] tcp = tor
é necessário: caso contrário, o cliente faria Conexões diretas para o Introdução, ou qualquer servidor baseado em TCP que aprende Do Introdutor, revelando seu endereço IP para esses servidores e um Rede de espionagem. Com isso, Tahoe-LAFS só fará Conexões de saída através de uma rede de anonimato suportada. -
Tub.location
deve ser desativado ou conter valores seguros. este O valor é anunciado para outros nós através do Introdutor: é como um servidor Anuncia sua localização para que os clientes possam se conectar a ela. No modo privado, ele É um erro para incluir umtcp:
dica notub.location
. Modo privado Rejeita o valor padrão detub.location
(quando a chave está faltando Inteiramente), que éAUTO
, que usaifconfig
para adivinhar o nó Endereço IP externo, o que o revelaria ao servidor e a outros clientes.
Esta opção é ** crítica ** para preservar o anonimato do cliente (cliente Caso de uso 3 de "Casos de uso", acima). Também é necessário preservar uma Anonimato do servidor (caso de uso do servidor 3).
Esse sinalizador pode ser configurado (para falso), fornecendo o argumento
--hide-ip
para Os comandoscreate-node
,create-client
oucreate-introducer
.Observe que o valor padrão de
revelar-endereço IP
é verdadeiro, porque Infelizmente, esconder o endereço IP do nó requer software adicional para ser Instalado (conforme descrito acima) e reduz o desempenho.Anonimato do cliente
Para configurar um nó de cliente para anonimato,
tahoe.cfg
** deve ** conter o Seguindo as bandeiras de configuração ::[nó] Revelar-IP-address = False Tub.port = desativado Tub.location = desativado
Uma vez que o nodo Tahoe-LAFS foi reiniciado, ele pode ser usado anonimamente (cliente Caso de uso 3).
Anonimato do servidor, configuração manual
Para configurar um nó de servidor para ouvir em uma rede de anonimato, devemos primeiro Configure Tor para executar um "Serviço de cebola" e encaminhe as conexões de entrada para o Porto Tahoe local. Então, configuramos Tahoe para anunciar o endereço
.onion
Aos clientes. Também configuramos Tahoe para não fazer conexões TCP diretas.- Decida em um número de porta de escuta local, chamado PORT. Isso pode ser qualquer não utilizado Porta de cerca de 1024 até 65535 (dependendo do kernel / rede do host Config). Nós diremos a Tahoe para escutar nesta porta, e nós diremos a Tor para Encaminhe as conexões de entrada para ele.
- Decida em um número de porta externo, chamado VIRTPORT. Isso será usado no Localização anunciada e revelada aos clientes. Pode ser qualquer número de 1 Para 65535. Pode ser o mesmo que PORT, se quiser.
- Decida em um "diretório de serviço oculto", geralmente em
/ var / lib / tor / NAME
. Pediremos a Tor para salvar o estado do serviço de cebola aqui, e Tor irá Escreva o endereço.onion
aqui depois que ele for gerado.
Em seguida, faça o seguinte:
-
Crie o nó do servidor Tahoe (com
tahoe create-node
), mas não ** não ** Lança-o ainda. -
Edite o arquivo de configuração Tor (normalmente em
/ etc / tor / torrc
). Precisamos adicionar Uma seção para definir o serviço oculto. Se nossa PORT for 2000, VIRTPORT é 3000, e estamos usando/ var / lib / tor / tahoe
como o serviço oculto Diretório, a seção deve se parecer com ::HiddenServiceDir / var / lib / tor / tahoe HiddenServicePort 3000 127.0.0.1:2000
-
Reinicie Tor, com
systemctl restart tor
. Aguarde alguns segundos. -
Leia o arquivo
hostname
no diretório de serviço oculto (por exemplo,/ Var / lib / tor / tahoe / hostname
). Este será um endereço.onion
, comoU33m4y7klhz3b.onion
. Ligue para esta CEBOLA. -
Edite
tahoe.cfg
para configurartub.port
para usarTcp: PORT: interface = 127.0.0.1
etub.location
para usarTor: ONION.onion: VIRTPORT
. Usando os exemplos acima, isso seria ::[nó] Revelar-endereço IP = falso Tub.port = tcp: 2000: interface = 127.0.0.1 Tub.location = tor: u33m4y7klhz3b.onion: 3000 [Conexões] Tcp = tor
-
Inicie o servidor Tahoe com
tahoe start $ NODEDIR
A seção
tub.port
fará com que o servidor Tahoe ouça no PORT, mas Ligue o soquete de escuta à interface de loopback, que não é acessível Do mundo exterior (mas * é * acessível pelo daemon Tor local). Então o A seçãotcp = tor
faz com que Tahoe use Tor quando se conecta ao Introdução, escondendo o endereço IP. O nó se anunciará a todos Clientes que usam `tub.location``, então os clientes saberão que devem usar o Tor Para alcançar este servidor (e não revelar seu endereço IP através do anúncio). Quando os clientes se conectam ao endereço da cebola, seus pacotes serão Atravessar a rede de anonimato e eventualmente aterrar no Tor local Daemon, que então estabelecerá uma conexão com PORT no localhost, que é Onde Tahoe está ouvindo conexões.Siga um processo similar para construir um servidor Tahoe que escuta no I2P. o O mesmo processo pode ser usado para ouvir tanto o Tor como o I2P (
tub.location = Tor: ONION.onion: VIRTPORT, i2p: ADDR.i2p
). Também pode ouvir tanto Tor como TCP simples (caso de uso 2), comtub.port = tcp: PORT
,tub.location = Tcp: HOST: PORT, tor: ONION.onion: VIRTPORT
eanonymous = false
(e omite A configuraçãotcp = tor
, já que o endereço já está sendo transmitido através de O anúncio de localização).Anonimato do servidor, configuração automática
Para configurar um nó do servidor para ouvir em uma rede de anonimato, crie o Nó com a opção
--listen = tor
. Isso requer uma configuração Tor que Ou lança um novo daemon Tor, ou tem acesso à porta de controle Tor (e Autoridade suficiente para criar um novo serviço de cebola). Nos sistemas Debian / Ubuntu, façaApt install tor
, adicione-se ao grupo de controle comadduser YOURUSERNAME debian-tor
e, em seguida, inicie sessão e faça o login novamente: se osgroups
O comando incluidebian-tor
na saída, você deve ter permissão para Use a porta de controle de domínio unix em/ var / run / tor / control
.Esta opção irá definir
revelar-IP-address = False
e[connections] tcp = Tor
. Ele alocará as portas necessárias, instruirá Tor para criar a cebola Serviço (salvando a chave privada em algum lugar dentro de NODEDIR / private /), obtenha O endereço.onion
e preenchatub.port
etub.location
corretamente.Problemas de desempenho e segurança
Se você estiver executando um servidor que não precisa ser Anônimo, você deve torná-lo acessível através de uma rede de anonimato ou não? Ou você pode torná-lo acessível * ambos * através de uma rede de anonimato E como um servidor TCP / IP rastreável publicamente?
Existem várias compensações efetuadas por esta decisão.
Penetração NAT / Firewall
Fazer com que um servidor seja acessível via Tor ou I2P o torna acessível (por Clientes compatíveis com Tor / I2P) mesmo que existam NAT ou firewalls que impeçam Conexões TCP / IP diretas para o servidor.
Anonimato
Tornar um servidor Tahoe-LAFS acessível * somente * via Tor ou I2P pode ser usado para Garanta que os clientes Tahoe-LAFS usem Tor ou I2P para se conectar (Especificamente, o servidor só deve anunciar endereços Tor / I2P no Chave de configuração
tub.location
). Isso evita que os clientes mal configurados sejam Desingonizando-se acidentalmente, conectando-se ao seu servidor através de A Internet rastreável.Claramente, um servidor que está disponível como um serviço Tor / I2P * e * a O endereço TCP regular não é anônimo: o endereço do .on e o real O endereço IP do servidor é facilmente vinculável.
Além disso, a interação, através do Tor, com um Tor Oculto pode ser mais Protegido da análise do tráfego da rede do que a interação, através do Tor, Com um servidor TCP / IP com rastreamento público
** XXX há um documento mantido pelos desenvolvedores de Tor que comprovem ou refutam essa crença? Se assim for, precisamos ligar a ele. Caso contrário, talvez devêssemos explicar mais aqui por que pensamos isso? **
Linkability
A partir de 1.12.0, o nó usa uma única chave de banheira persistente para saída Conexões ao Introdutor e conexões de entrada para o Servidor de Armazenamento (E Helper). Para os clientes, uma nova chave Tub é criada para cada servidor de armazenamento Nós aprendemos sobre, e essas chaves são * não * persistiram (então elas mudarão cada uma delas Tempo que o cliente reinicia).
Clientes que atravessam diretórios (de rootcap para subdiretório para filecap) são É provável que solicitem os mesmos índices de armazenamento (SIs) na mesma ordem de cada vez. Um cliente conectado a vários servidores irá pedir-lhes todos para o mesmo SI em Quase ao mesmo tempo. E dois clientes que compartilham arquivos ou diretórios Irá visitar os mesmos SI (em várias ocasiões).
Como resultado, as seguintes coisas são vinculáveis, mesmo com
revelar-endereço IP = Falso
:- Servidores de armazenamento podem vincular reconhecer várias conexões do mesmo Cliente ainda não reiniciado. (Observe que o próximo recurso de Contabilidade pode Faz com que os clientes apresentem uma chave pública persistente do lado do cliente quando Conexão, que será uma ligação muito mais forte).
- Os servidores de armazenamento provavelmente podem deduzir qual cliente está acessando dados, por Olhando as SIs sendo solicitadas. Vários servidores podem conciliar Determine que o mesmo cliente está falando com todos eles, mesmo que o TubIDs são diferentes para cada conexão.
- Os servidores de armazenamento podem deduzir quando dois clientes diferentes estão compartilhando dados.
- O Introdutor pode entregar diferentes informações de servidor para cada um Cliente subscrito, para particionar clientes em conjuntos distintos de acordo com Quais as conexões do servidor que eles eventualmente fazem. Para clientes + nós de servidor, ele Também pode correlacionar o anúncio do servidor com o cliente deduzido identidade.
atuação
Um cliente que se conecta a um servidor Tahoe-LAFS com rastreamento público através de Tor Incorrem em latência substancialmente maior e, às vezes, pior Mesmo cliente se conectando ao mesmo servidor através de um TCP / IP rastreável normal conexão. Quando o servidor está em um Tor Hidden Service, ele incorre ainda mais Latência e, possivelmente, ainda pior rendimento.
Conectando-se a servidores Tahoe-LAFS que são servidores I2P incorrem em maior latência E pior rendimento também.
Efeitos positivos e negativos em outros usuários Tor
O envio de seu tráfego Tahoe-LAFS sobre o Tor adiciona tráfego de cobertura para outros Tor usuários que também estão transmitindo dados em massa. Então isso é bom para Eles - aumentando seu anonimato.
No entanto, torna o desempenho de outros usuários do Tor Sessões - por exemplo, sessões ssh - muito pior. Isso é porque Tor Atualmente não possui nenhuma prioridade ou qualidade de serviço Recursos, para que as teclas de Ssh de outra pessoa possam ter que esperar na fila Enquanto o conteúdo do arquivo em massa é transmitido. O atraso adicional pode Tornar as sessões interativas de outras pessoas inutilizáveis.
Ambos os efeitos são duplicados se você carregar ou baixar arquivos para um Tor Hidden Service, em comparação com se você carregar ou baixar arquivos Over Tor para um servidor TCP / IP com rastreamento público
Efeitos positivos e negativos em outros usuários do I2P
Enviar seu tráfego Tahoe-LAFS ao I2P adiciona tráfego de cobertura para outros usuários do I2P Que também estão transmitindo dados. Então, isso é bom para eles - aumentando sua anonimato. Não prejudicará diretamente o desempenho de outros usuários do I2P Sessões interativas, porque a rede I2P possui vários controles de congestionamento e Recursos de qualidade de serviço, como priorizar pacotes menores.
No entanto, se muitos usuários estão enviando tráfego Tahoe-LAFS ao I2P e não tiverem Seus roteadores I2P configurados para participar de muito tráfego, então o I2P A rede como um todo sofrerá degradação. Cada roteador Tahoe-LAFS que usa o I2P tem Seus próprios túneis de anonimato que seus dados são enviados. Em média, um O nó Tahoe-LAFS requer 12 outros roteadores I2P para participar de seus túneis.
Portanto, é importante que o seu roteador I2P esteja compartilhando a largura de banda com outros Roteadores, para que você possa retornar enquanto usa o I2P. Isso nunca prejudicará a Desempenho de seu nó Tahoe-LAFS, porque seu roteador I2P sempre Priorize seu próprio tráfego.
=========================
Como configurar um servidor
Muitos nós Tahoe-LAFS são executados como "servidores", o que significa que eles fornecem serviços para Outras máquinas (isto é, "clientes"). Os dois tipos mais importantes são os Introdução e Servidores de armazenamento.
Para ser útil, os servidores devem ser alcançados pelos clientes. Os servidores Tahoe podem ouvir Em portas TCP e anunciar sua "localização" (nome do host e número da porta TCP) Para que os clientes possam se conectar a eles. Eles também podem ouvir os serviços de cebola "Tor" E portas I2P.
Os servidores de armazenamento anunciam sua localização ao anunciá-lo ao Introdutivo, Que então transmite a localização para todos os clientes. Então, uma vez que a localização é Determinado, você não precisa fazer nada de especial para entregá-lo.
O próprio apresentador possui uma localização, que deve ser entregue manualmente a todos Servidores de armazenamento e clientes. Você pode enviá-lo para os novos membros do seu grade. Esta localização (juntamente com outros identificadores criptográficos importantes) é Escrito em um arquivo chamado
private / introducer.furl
no Presenter's Diretório básico, e deve ser fornecido como o argumento--introducer =
paraTahoe create-node
outahoe create-node
.O primeiro passo ao configurar um servidor é descobrir como os clientes irão alcançar. Então você precisa configurar o servidor para ouvir em algumas portas, e Depois configure a localização corretamente.
Configuração manual
Cada servidor tem duas configurações em seu arquivo
tahoe.cfg
:tub.port
, eTub.location
. A "porta" controla o que o nó do servidor escuta: isto Geralmente é uma porta TCP.A "localização" controla o que é anunciado para o mundo exterior. Isto é um "Sugestão de conexão foolscap", e inclui tanto o tipo de conexão (Tcp, tor ou i2p) e os detalhes da conexão (nome do host / endereço, porta número). Vários proxies, gateways e redes de privacidade podem ser Envolvido, então não é incomum para
tub.port
etub.location
para olhar diferente.Você pode controlar diretamente a configuração
tub.port
etub.location
Configurações, fornecendo--port =
e--location =
ao executartahoe Create-node
.Configuração automática
Em vez de fornecer
--port = / - location =
, você pode usar--listen =
. Os servidores podem ouvir em TCP, Tor, I2P, uma combinação desses ou nenhum. O argumento--listen =
controla quais tipos de ouvintes o novo servidor usará.--listen = none
significa que o servidor não deve ouvir nada. Isso não Faz sentido para um servidor, mas é apropriado para um nó somente cliente. o O comandotahoe create-client
inclui automaticamente--listen = none
.--listen = tcp
é o padrão e liga uma porta de escuta TCP padrão. Usar--listen = tcp
requer um argumento--hostname =
também, que será Incorporado no local anunciado do nó. Descobrimos que os computadores Não pode determinar de forma confiável seu nome de host acessível externamente, então, em vez de Ter o servidor adivinhar (ou escanear suas interfaces para endereços IP Isso pode ou não ser apropriado), a criação de nó requer que o usuário Forneça o nome do host.--listen = tor
conversará com um daemon Tor local e criará uma nova "cebola" Servidor "(que se parece comalzrgrdvxct6c63z.onion
).
--listen = i2p` conversará com um daemon I2P local e criará um novo servidor endereço. Consulte: doc:
anonymity-configuration` para obter detalhes.Você pode ouvir nos três usando
--listen = tcp, tor, i2p
.Cenários de implantação
A seguir, alguns cenários sugeridos para configurar servidores usando Vários transportes de rede. Estes exemplos não incluem a especificação de um Apresentador FURL que normalmente você gostaria quando provisionamento de armazenamento Nós. Para estes e outros detalhes de configuração, consulte : Doc:
configuration
.. `Servidor possui um nome DNS público '
.
Servidor possui um endereço público IPv4 / IPv6
_.
O servidor está por trás de um firewall com encaminhamento de porta
_.
Usando o I2P / Tor para evitar o encaminhamento da porta
_O servidor possui um nome DNS público
O caso mais simples é o local onde o host do servidor está diretamente conectado ao Internet, sem um firewall ou caixa NAT no caminho. A maioria dos VPS (Virtual Private Servidor) e servidores colocados são assim, embora alguns fornecedores bloqueiem Muitas portas de entrada por padrão.
Para esses servidores, tudo o que você precisa saber é o nome do host externo. O sistema O administrador irá dizer-lhe isso. O principal requisito é que este nome de host Pode ser pesquisado no DNS, e ele será mapeado para um endereço IPv4 ou IPv6 que Alcançará a máquina.
Se o seu nome de host for
example.net
, então você criará o introdutor como esta::Tahoe create-introducer --hostname example.com ~ / introducer
Ou um servidor de armazenamento como ::
Tahoe create-node --hostname = example.net
Estes irão alocar uma porta TCP (por exemplo, 12345), atribuir
tub.port
para serTcp: 12345
etub.location
serãotcp: example.com: 12345
.Idealmente, isso também deveria funcionar para hosts compatíveis com IPv6 (onde o nome DNS Fornece um registro "AAAA", ou ambos "A" e "AAAA"). No entanto Tahoe-LAFS O suporte para IPv6 é novo e ainda pode ter problemas. Por favor, veja o ingresso
# 867
_ para detalhes... _ # 867: https://tahoe-lafs.org/trac/tahoe-lafs/ticket/867
O servidor possui um endereço público IPv4 / IPv6
Se o host tiver um endereço IPv4 (público) rotativo (por exemplo,
203.0.113.1```), mas Nenhum nome DNS, você precisará escolher uma porta TCP (por exemplo,
3457``) e usar o Segue::Tahoe create-node --port = tcp: 3457 - localização = tcp: 203.0.113.1: 3457
--port
é uma "string de especificação de ponto de extremidade" que controla quais locais Porta em que o nó escuta.--location
é a "sugestão de conexão" que ele Anuncia para outros, e descreve as conexões de saída que essas Os clientes irão fazer, por isso precisa trabalhar a partir da sua localização na rede.Os nós Tahoe-LAFS escutam em todas as interfaces por padrão. Quando o host é Multi-homed, você pode querer fazer a ligação de escuta ligar apenas a uma Interface específica, adicionando uma opção
interface =
ao--port =
argumento::Tahoe create-node --port = tcp: 3457: interface = 203.0.113.1 - localização = tcp: 203.0.113.1: 3457
Se o endereço público do host for IPv6 em vez de IPv4, use colchetes para Envolva o endereço e altere o tipo de nó de extremidade para
tcp6
::Tahoe create-node --port = tcp6: 3457 - localização = tcp: [2001: db8 :: 1]: 3457
Você pode usar
interface =
para vincular a uma interface IPv6 específica também, no entanto Você deve fazer uma barra invertida - escapar dos dois pontos, porque, de outra forma, eles são interpretados Como delimitadores pelo idioma de especificação do "ponto final" torcido. o--location =
argumento não precisa de dois pontos para serem escapados, porque eles são Envolto pelos colchetes ::Tahoe create-node --port = tcp6: 3457: interface = 2001 \: db8 \: \: 1 --location = tcp: [2001: db8 :: 1]: 3457
Para hosts somente IPv6 com registros DNS AAAA, se o simples
--hostname =
A configuração não funciona, eles podem ser informados para ouvir especificamente Porta compatível com IPv6 com este ::Tahoe create-node --port = tcp6: 3457 - localização = tcp: example.net: 3457
O servidor está por trás de um firewall com encaminhamento de porta
Para configurar um nó de armazenamento por trás de um firewall com encaminhamento de porta, você irá precisa saber:
- Endereço IPv4 público do roteador
- A porta TCP que está disponível de fora da sua rede
- A porta TCP que é o destino de encaminhamento
- Endereço IPv4 interno do nó de armazenamento (o nó de armazenamento em si é
Desconhece esse endereço e não é usado durante
tahoe create-node
, Mas o firewall deve ser configurado para enviar conexões para isso)
Os números de porta TCP internos e externos podem ser iguais ou diferentes Dependendo de como o encaminhamento da porta está configurado. Se é mapear portas 1-para-1, eo endereço IPv4 público do firewall é 203.0.113.1 (e Talvez o endereço IPv4 interno do nó de armazenamento seja 192.168.1.5), então Use um comando CLI como este ::
Tahoe create-node --port = tcp: 3457 - localização = tcp: 203.0.113.1: 3457
Se no entanto, o firewall / NAT-box encaminha a porta externa * 6656 * para o interno Porta 3457, então faça isso ::
Tahoe create-node --port = tcp: 3457 - localização = tcp: 203.0.113.1: 6656
Usando o I2P / Tor para evitar o encaminhamento da porta
Os serviços de cebola I2P e Tor, entre outras excelentes propriedades, também fornecem NAT Penetração sem encaminhamento de porta, nomes de host ou endereços IP. Então, configurando Um servidor que escuta apenas no Tor é simples ::
Tahoe create-node --listen = tor
Para mais informações sobre o uso de Tahoe-LAFS com I2p e Tor veja : Doc:
anonymity-configuration
-
@ 9223d2fa:b57e3de7
2025-04-15 02:54:0012,600 steps
-
@ c1e9ab3a:9cb56b43
2025-04-14 21:20:08In an age where culture often precedes policy, a subtle yet potent mechanism may be at play in the shaping of American perspectives on gun ownership. Rather than directly challenging the Second Amendment through legislation alone, a more insidious strategy may involve reshaping the cultural and social norms surrounding firearms—by conditioning the population, starting at its most impressionable point: the public school system.
The Cultural Lever of Language
Unlike Orwell's 1984, where language is controlled by removing words from the lexicon, this modern approach may hinge instead on instilling fear around specific words or topics—guns, firearms, and self-defense among them. The goal is not to erase the language but to embed a taboo so deep that people voluntarily avoid these terms out of social self-preservation. Children, teachers, and parents begin to internalize a fear of even mentioning weapons, not because the words are illegal, but because the cultural consequences are severe.
The Role of Teachers in Social Programming
Teachers, particularly in primary and middle schools, serve not only as educational authorities but also as social regulators. The frequent argument against homeschooling—that children will not be "properly socialized"—reveals an implicit understanding that schools play a critical role in setting behavioral norms. Children learn what is acceptable not just academically but socially. Rules, discipline, and behavioral expectations are laid down by teachers, often reinforced through peer pressure and institutional authority.
This places teachers in a unique position of influence. If fear is instilled in these educators—fear that one of their students could become the next school shooter—their response is likely to lean toward overcorrection. That overcorrection may manifest as a total intolerance for any conversation about weapons, regardless of the context. Innocent remarks or imaginative stories from young children are interpreted as red flags, triggering intervention from administrators and warnings to parents.
Fear as a Policy Catalyst
School shootings, such as the one at Columbine, serve as the fulcrum for this fear-based conditioning. Each highly publicized tragedy becomes a national spectacle, not only for mourning but also for cementing the idea that any child could become a threat. Media cycles perpetuate this narrative with relentless coverage and emotional appeals, ensuring that each incident becomes embedded in the public consciousness.
The side effect of this focus is the generation of copycat behavior, which, in turn, justifies further media attention and tighter controls. Schools install security systems, metal detectors, and armed guards—not simply to stop violence, but to serve as a daily reminder to children and staff alike: guns are dangerous, ubiquitous, and potentially present at any moment. This daily ritual reinforces the idea that the very discussion of firearms is a precursor to violence.
Policy and Practice: The Zero-Tolerance Feedback Loop
Federal and district-level policies begin to reflect this cultural shift. A child mentioning a gun in class—even in a non-threatening or imaginative context—is flagged for intervention. Zero-tolerance rules leave no room for context or intent. Teachers and administrators, fearing for their careers or safety, comply eagerly with these guidelines, interpreting them as moral obligations rather than bureaucratic policies.
The result is a generation of students conditioned to associate firearms with social ostracism, disciplinary action, and latent danger. The Second Amendment, once seen as a cultural cornerstone of American liberty and self-reliance, is transformed into an artifact of suspicion and anxiety.
Long-Term Consequences: A Nation Re-Socialized
Over time, this fear-based reshaping of discourse creates adults who not only avoid discussing guns but view them as morally reprehensible. Their aversion is not grounded in legal logic or political philosophy, but in deeply embedded emotional programming begun in early childhood. The cultural weight against firearms becomes so great that even those inclined to support gun rights feel the need to self-censor.
As fewer people grow up discussing, learning about, or responsibly handling firearms, the social understanding of the Second Amendment erodes. Without cultural reinforcement, its value becomes abstract and its defenders marginalized. In this way, the right to bear arms is not abolished by law—it is dismantled by language, fear, and the subtle recalibration of social norms.
Conclusion
This theoretical strategy does not require a single change to the Constitution. It relies instead on the long game of cultural transformation, beginning with the youngest minds and reinforced by fear-driven policy and media narratives. The outcome is a society that views the Second Amendment not as a safeguard of liberty, but as an anachronism too dangerous to mention.
By controlling the language through social consequences and fear, a nation can be taught not just to disarm, but to believe it chose to do so freely. That, perhaps, is the most powerful form of control of all.
-
@ 6e0ea5d6:0327f353
2025-04-14 15:11:17Ascolta.
We live in times where the average man is measured by the speeches he gives — not by the commitments he keeps. People talk about dreams, goals, promises… but what truly remains is what’s honored in the silence of small gestures, in actions that don’t seek applause, in attitudes unseen — yet speak volumes.
Punctuality, for example. Showing up on time isn’t about the clock. It’s about respect. Respect for another’s time, yes — but more importantly, respect for one’s own word. A man who is late without reason is already running late in his values. And the one who excuses his own lateness with sweet justifications slowly gets used to mediocrity.
Keeping your word is more than fulfilling promises. It is sealing, with the mouth, what the body must later uphold. Every time a man commits to something, he creates a moral debt with his own dignity. And to break that commitment is to declare bankruptcy — not in the eyes of others, but in front of himself.
And debts? Even the small ones — or especially the small ones — are precise thermometers of character. A forgotten sum, an unpaid favor, a commitment left behind… all of these reveal the structure of the inner building that man resides in. He who neglects the small is merely rehearsing for his future collapse.
Life, contrary to what the reckless say, is not built on grand deeds. It is built with small bricks, laid with almost obsessive precision. The truly great man is the one who respects the details — recognizing in them a code of conduct.
In Sicily, especially in the streets of Palermo, I learned early on that there is more nobility in paying a five-euro debt on time than in flaunting riches gained without word, without honor, without dignity.
As they say in Palermo: L’uomo si conosce dalle piccole cose.
So, amico mio, Don’t talk to me about greatness if you can’t show up on time. Don’t talk to me about respect if your word is fickle. And above all, don’t talk to me about honor if you still owe what you once promised — no matter how small.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-
@ 233e10e1:d45c3bb8
2025-04-12 20:24:35Here I try to tie this fictional history back to our own reality, illuminating why, even if the Gold Standard had been restored, where the invention of Bitcoin might still be inevitable due to the frailty of man. Bitcoin combines the scarcity and immutability of gold with the efficiency of digital settlement. In a world that promotes low time preference, stable value, and secure transactions, Bitcoin stands as the logical evolution of monetary technology.
-
@ 10fe3f70:3489c810
2025-04-12 03:53:36contract-drafting #agreement-drafting #learn-drafting #keep-learning
I am a lawyer and a teacher. I am interested in learning new things every day.
I am from India, and have studied in a reputed law school in Delhi. I have long experience of working as in-house counsels to some reputed organisations.
My present goal is to teach drafting of contracts. What I will teach is some basic skills required by students to draft contracts.
I did some freelance online teaching during Covid Pandemic, and found that students are very interested in learning the craft. But, I also understood that they may not have enough free time to learn due to busy schedule.
If you are interested, you can access my curated playlist on Youtube
Keep watching this space, if you wish to know more...
Lessons on Contract Drafting
- Contract Drafting - An Introduction
- ...
-
@ e111a405:fa441558
2025-04-11 17:15:58Meritocracy without equality is basically a ladder with missing steps, which only the fortunate few can climb. The rest is basically left at the ground to gaze up.
Furthermore, a pure focus on meritocracy can become a weakness if it’s a zero-sum game. While talents thrive in systems that value it, without fairness, you ultimately get exploitation, resentment, or fragility.
Ergo: meritocracy needs to be balanced with equality, and equality needs to be balanced with meritocracy.
In a meritocratic system, you basically need that the fortunate and the able are compassionate towards those less fortunate and able.
If you are more on the libertarian side, you need the fortunate individuals to compete as capitalists and then be socialists within their communities and families.
If you prefer a state, then the state must encourage meritocratic contribution of everyone that is able, to the best of their ability, while balancing it with a fair welfare system that nurtures and supports those less able and fortunate.
I think this is something Germany did historically quite well, but at one point we lost the balance: we lost the culture of merit by putting too much emphasis on equality – even to a point that Germany now cares for millions of non-citizens that never contributed, when it should instead demand these individuals to contribute to the best of their ability.
If we want to have a state, then we don’t want a welfare state, and – I think – we should also not want a pure capitalistic state. We need balance and thus a social meritocracy.
-
@ 20986fb8:cdac21b3
2025-04-17 06:46:14分布式Agentic组织(Distributed Agentic Organizations,DA(gentic)O)正在重塑协作的未来格局,融合智能代理(Agentic AI),跨越加密社区、网络社会与现实世界。但要规模化发展,DA(gentic)O 需要更友好的 Agent-to-Agent 和人-to-Agent 社交-交互路径。YakiHonne 可编程 Smart Widgets 提供轻量接口,嵌入社交与支付功能,让代理无缝协作、交易、治理。Agentic Mini Apps 则将这一潜力变为现实,覆盖从链上投票到咖啡支付的场景。在这篇文章我们将探讨 YakiHonne 可编程Smart widgets如何赋能 DA(gentic)O,激活去中心化生产力与代理驱动的协作经济。
1.从 DAO 到 DA(gentic)O:协作的新范式
传统组织依赖中心化管理,效率受限;DAO 通过区块链实现去中心化治理,但投票延迟和静态合约限制生产力。Agentic AI 开启协作新纪元,超越AI的被动执行,具备自主推理、动态适应的能力,宛如数字世界的“智能公民”。通过大语言模型、高级算法与外部工具(如链上数据、Web API、物联网传感器)融合,Agentic AI 实时感知信息、优化决策、持续进化,促使了 DA(gentic)O)的崛起。
DA(gentic)O 是由多个 AI 代理通过开放协议(如 Agent-to-Agent 协作协议、区块链、智能合约)组成的动态生态,优化去中心化自治组织(DAO)并推动其演化。不同于传统组织的中央指挥或 DAO 的投票瓶颈,DA(gentic)O 通过智能网络实现目标。例如,一个代理监测 BTC市场波动,另一个协调网络社会活动,二者通过协议协作,驱动链上交易到现实优化的成果。这种组织以生产力为核心,跨越 Web3治理、网络社会经济、物理社会运营,展现去中心化的灵活性与规模化潜力。DA(gentic)O 不仅是协作的工具,更是连接虚拟与现实的“生产力桥梁”,为全球分布式社区创造可验证的价值。
DA(gentic)O 的核心特点可概括为以下三点:
D:分布式 (Distributed) & 去中心化 (Decentralized) 决策与运作分布于多个自主代理,无需单一控制点,确保组织的鲁棒性与透明性。代理通过链上记录或分布式协议协商资源分配,形成一个无需信任中介的协作网络。例如,在 BTC 市场,代理共同管理资金流向;在网络社会,代理分布式投票决定社区规则;在物理社会,代理协调跨区域的物流调度。这种分布式架构赋予 DA(gentic)O 高度的抗干扰能力与扩展性。
A:自主 (Autonomous) 和智能 (Agentic) 代理具备独立感知、规划与执行的能力,组织通过智能协商实现自治。每个代理如同微型决策单元,能根据环境变化调整策略,无需人类频繁干预。例如,在网络社会的元宇宙,一个代理设计虚拟展览,另一个动态分配算力,二者通过协议自动协调;在物理社会的智能工厂,代理实时优化生产参数,响应市场需求。这种自主性使 DA(gentic)O 能够快速适应复杂场景,超越传统组织的反应速度。
O:组织 (Organization) 和运营 (Operation) 代理以组织化方式协同,形成高效的协作网络,完成从虚拟经济到现实生产的任务。无论是 Web3 的链上拍卖、网络社会的虚拟市场,还是物理社会的供应链整合,DA(gentic)O 都以协作驱动成果。例如,一个代理协调创作者与买家的交易,另一个优化物流配送,二者共同实现端到端的价值流转。这种运营能力使 DA(gentic)O 成为生产力的“协作枢纽”。
DA(gentic)O的灵活性源于Agentic AI的多样能力。反应型代理擅长实时响应,如监控链上交易波动;目标导向代理分解复杂任务,如规划虚拟社区的经济激励;学习型代理通过数据迭代优化,如调整智能工厂的生产参数。这些代理通过A2A协议形成协作网络,适配从虚拟治理、交易到现实优化的广泛需求,构建生产力驱动的“数字生态”。
DA(gentic)O 的主要支柱要素
构建高效的 DA(gentic)O 需以下关键支撑,确保代理网络的运行与协作:
- 主权钱包:每个代理拥有独立匿名数字钱包,安全管理资产并执行交易,支持链上支付、网络社会的虚拟奖励或物理社会的任务报酬,保障经济交互的自主性。
- 去中心化安全环境:可靠的链上或分布式系统,保护代理运行、数据隐私与决策完整性,防范外部攻击或内部篡改,确保协作的信任基础。
- 自由访问网络与链:代理需无缝访问互联网、区块链或其他数据源,获取实时信息与资源,如链上数据、网络社会的用户行为或物理社会的传感器输入,支持推理与协作。
- 接口:用户友好的且自主接口(如链上仪表盘、移动端面板),确保代理与用户、系统间的顺畅连接。
DA(gentic)O 以智能网络连接虚拟与现实,创造交易、协调和优化的价值。Agentic Mini Apps 是其关键交互工具。
2. 可编程Smart Widgets:DA(gentic)O的基础设施
YakiHonne 的可编程 Smart Widgets 是一套轻量化系统,支持 Agentic Mini Apps 的社交互动和支付功能,为DA(gentic)O 提供基础设施。它通过嵌入式接口和去中心化协议,驱动代理间的协作、交易和治理,降低开发门槛,连接 Web3、虚拟社区和现实场景。
2.1 Smart Widgets 的特性
在 Yakihonne 的设计中,Smart Widgets 是微型、智能的应用接口,专为 Agentic Mini Apps 的快速开发与部署设计。其核心特性包括:
- 嵌入社交流:支持 Mini Apps 直接嵌入社交环境,用户无需切换界面即可完成支付或交互。
- 无需中心化审核:任何开发者可以快速创建、部署和分享 Mini Apps,无需应用商店的审批流程。
- 可组合性:Smart Widgets 支持不同类型的功能模块组合,可灵活适配各种 Agent-to-Agent 协作需求。
- 内置支付能力:通过集成链上支付和稳定币支持,实现智能代理之间的价值交换。
这一体系极大降低了构建和扩展去中心化智能代理组织的门槛,使得个体代理(Agent)不仅能行动,还能彼此协作、交易和治理。
2.2 Smart Widgets 的形态与应用
Yakihonne Smart Widgets 根据创建者和使用者的不同需求,分为三种形态,覆盖从普通用户到开发者的全域需求:
- 基础组件(Basic Widgets) 无需编程,通过模板编辑器快速创建支付、投票等交互功能,适合用户构建简单的 Mini Apps。
- 动作组件(Action Widgets) 通过链接嵌入外部功能,保持社交界面的流畅性,支持 Mini Apps 扩展交互范围。
- 工具组件(Tool Widgets) 适合开发者或高级用户,基于 Mini App SDK 开发复杂应用,支持数据查询、链上任务执行、即时支付、智能决策等,构建复杂的智能化 Mini Apps。
这三种形态为 Mini Apps 提供从基础交互到高级协作的支持,适配 DA(gentic)O 的自动化流程。
2.3 支持 DA(gentic)O 的核心功能
Yakihonne Smart Widgets 为分布式Agentic组织提供以下关键能力,驱动 Agentic Mini Apps 的高效运行:
- 自治微应用(Autonomous Mini Apps) Smart Widgets 让代理能够嵌入服务逻辑,自主完成任务或发起支付。例如,Mini Apps 可自动分配 Web3 交易奖励,或协调网络社会的虚拟活动,无需人工干预。
- 即用即付(On-the-Fly Payment) 通过稳定币、BTC、闪电网络(LN)等无缝支付协议,智能代理可以即时完成链上支付,支持微交易经济体。
- 链上身份与社交绑定(On-chain Identity Integration) 代理可以在 Nostr 基础上绑定主权身份,进行链上行为的授权与签名。
- 即时交互与协作(Real-time Interaction and Coordination) 支持代理之间的即时数据交换、智能合约调用和协作执行,适配 Agent-to-Agent 协作网络。
- 开放与可组合性(Openness and Composability) 开发者可自由创建与组合 Widgets,扩展 Mini Apps 的模块化生态。
这些功能使 Smart Widgets 成为 DA(gentic)O 的“支柱”,通过 Mini Apps 连接个体代理与协作网络,构建动态、规模化的生态。
2.4 驱动代理经济(Agentic Economy)
在 DA(gentic)O 中,经济交互至关重要。Smart Widgets 通过以下方式推动代理经济形成:
- 降低支付壁垒 嵌入式支付支持代理间无摩擦的小额交易,简化价值流转。
- 微型自治市场 Widgets 赋予 Mini Apps 自主定价与运营能力,形成独立经济单元。
- 加速创新与扩展 开放创建机制与低成本部署鼓励开发者丰富 Mini Apps 生态。
Yakihonne 正在推动一种新的模式:社交即支付,应用即自治。这为未来的 Agentic DAO 和基于代理的社会经济体系提供了可行路径。
3.Agentic Mini App 应用场景
Agentic Mini Apps 是 DA(gentic)O的交互实现层,通过 YakiHonne Widgets 嵌入社交场景和支付功能,让用户在治理、创作、激励和消费中无缝互动。本章探讨 智能治理、社交媒体、消费生态 三类场景,展示 DA(gentic)O 如何构建从 Web3 到现实社会的动态生态。
3.1. 智能治理--Agentic AI for DAO
传统 DAO 依赖区块链实现透明治理,试图以社区投票和智能合约取代中心化管理。但投票延迟、分歧和静态合约限制价值交付,如投资 DAO 决策迟缓难敌专业机构,协议 DAO 缺乏生产力。Agentic AI 作为 DA(gentic)O 的“智能内核”,自动化执行提案、优化资源分配,提升链上效率,连接 Web3 与现实生产力。具体场景如下:
智能投票与治理优化 传统 aMaci 匿名投票复杂,限制规模化。该基于aMaci的Mini App 封装治理逻辑,提供友好交互,用户通过私信/通知接收提案通知(如“是否调整协议参数”),一键投票。Mini App 分析链上数据(如历史投票趋势),生成决策建议,投票结果秒级汇总,提案自动执行。
激励分配与贡献追踪 用户在 Mini App 内查看贡献(如代码提交、任务完成),Agentic AI 评估链上和链下活动,自动支付稳定币/LN/BTC 奖励,秒到账。私信通知奖励状态。用户通过 Post 展示贡献,Mini App 监测活动,支付代币或 NFT 奖励,链上记录,私信确认支付。
DAO2DAO协作 用户在 Mini App 内共享数据(如 BTC 趋势),Agentic AI 生成协作建议(如“联合活动”),自动执行跨 DAO 任务(如资金池分配)。Post 宣传合作动态。 用户也可通过私信发起联合提案,Mini App 整合多方数据,支付稳定币/LN/BTC 执行协作,链上透明。
社区活动与众筹 用户在 Mini App 内捐款支持活动(如“DAO 年会”),支付稳定币/LN/BTC,秒到账。Agentic AI 跟踪进度,自动分配资金,Post 展示成果。用户通过私信报名活动,Mini App 支付获 NFT 奖励,链上存证。
资源与任务分配 用户在 Mini App 内接收任务(如“开发模块”),Agentic AI 匹配技能,支付稳定币/LN/BTC 奖励,秒到账。私信通知任务状态。用户通过 Post 领取任务,Mini App 验证成果,自动支付代币,链上记录。私信确认完成。
链上身份与认证 用户在 Mini App 内将链上身份与 Nostr 身份绑定,Agentic AI 验证权限,支持跨 DAO 互认,支付稳定币/LN/BTC 激活身份。用户申请联合活动权限,Mini App 验证身份,自动授权,链上透明。
舆情实时分析 用户在 Mini App 内查看舆情报告(如“代币热度上升 30%”),Agentic AI 分析链上和社交数据,生成投资建议,支付 2 USDC 奖励,秒到账。私信推送报告。
3.2 社交媒体
中心化社交媒体因算法操控、内容审查和数据滥用限制用户表达,创作者收益被高额抽成侵蚀,信息真实性和隐私权受威胁。Agentic AI 促使去中心化社交生态更加智能和去中心化,保障用户主权,构建从 Web3 到现实社会的开放网络。具体场景如下:
内容创作与分发 用户与 Agentic AI 协作生成内容(如视频、长文、海报),一键分发到 YakiHonne 及多平台。Mini App 分析用户兴趣,精准推送,支付稳定币/LN/BTC 查看全文。
AI 记者-报道/采访 用户通过 Mini App 自动化新闻采集,分析链上数据和社交 Post,生成长文报道,发布后支持支付打赏。用户通过私信发起采访(如 BUIDL 项目),Agentic AI 生成大纲,Mini App 转录视频为长文或视频,发布至 YakiHonne 及其他平台。
内容互动 用户通过 YakiHonne 社交 Post 参与讨论,Mini App 追踪评论质量,自动打赏奖励高互动者。
内容订阅 用户通过 Mini App 支付订阅长文或独家 Post,Mini App 管理访问权限,秒到账。
内容真实性验证 用户通过 Mini App 验证内容真实性(如新闻出处),标记可信度并投票支持真实内容。
内容存档与协作 用户通过 Mini App 上传 Post 或长文,存储于去中心化网络,生成永久链接并支持其他用户付费下载。用户在 Mini App 内协作长文,Agentic AI 追踪并评估贡献,自动支付稳定币/LN/BTC 奖励,
去中心化广告与收益 创作者通过 Mini App 付费推送长文或内容触达用户,读者将会从广告直接获得收益。
舆情分析与公共讨论 Agentic AI 监测 YakiHonne Post 和社交动态(如“话题热度上升 30%”),生成讨论建议,用户通过私信接收长文报告并进行支付。
3.3 消费生态
中心化支付和传统消费因高额手续费、结算延迟和复杂流程限制用户体验,DeFi 应用也面临操作门槛高、信任不足的问题。Agentic AI 通过 Mini Apps 打造去中心化社交支付与消费生态,扩展链上与现实的消费场景,构建 Web3 价值网络。场景如下:
朋友转账 用户在 Mini App 内搜索好友并转账 0.05 USDC,Agentic AI 测算最优汇率和 Swap 路径,秒到账,链上记录。私信提醒转账请求。 用户在 Mini App 内发起群组分账,Agentic AI 计算份额,支付稳定币/LN/BTC,秒到账,Post 展示记录。
DeFi 质押激励 用户在 Mini App 内加入质押池,Agentic AI 推荐高收益策略,支付稳定币/LN/BTC,秒到账,链上分红透明。私信通知收益。 用户在 Mini App 内质押资产,Agentic AI 分析市场,支付 0.1 USDC 奖励活跃者,秒到账,Post 分享策略。
线下消费 用户在 Mini App 内支付 BTC/LN 购买咖啡或商品,秒到账,链上存证。Post 推送附近商家优惠。用户在 Mini App 内预订服务(如餐厅座位),支付稳定币/LN/BTC 获代币返现,秒到账,Post 分享活动。
GameFi 用户在 Mini App 内支付 0.1 USDC 购买游戏装备,秒到账,链上存证。Post 推送新资产吸引玩家。用户在 Mini App 内完成任务(如战斗挑战),Agentic AI 验证,支付稳定币/LN/BTC 奖励,秒到账,Post 展示排行。
跨境电商 用户在 Mini App 内支付 1 USDC 购买跨境商品,秒到账,链上记录物流。私信推送订单更新。用户在 Mini App 内参与跨境团购,Agentic AI 优化折扣,支付稳定币/LN/BTC 分摊运费,秒到账,Post 展示进展。
4. 结论
随着 Agentic AI 和去中心化技术的快速融合,DA(gentic)O 不再是理论构想,而是正在形成的“智能协作网络”。YakiHonne 的 Smart Widgets 和 Agentic Mini Apps,正在为这种网络提供关键接口与交互基础设施,为用户和开发者释放出前所未有的创作力、支付能力与治理可能。 我们正在见证三个关键趋势的叠加:
1) 从单体代理到多代理协作系统
未来的组织形态将不再是人类为中心的链上治理,而是以多智能体(Multi-Agent)为核心的动态生态。每一个智能代理代表一个用户、一个群体、一个经济单位,能独立感知、推理、执行,与其他代理协同完成更复杂的生产与治理流程。YakiHonne Smart Widgets 将成为这些代理的“协作面板”,为其提供微型入口与交互协议。
2)从社交互动到社交经济系统
当前的社交平台仍多以信息交换为主,而未来的去中心化社交网络将嵌入支付、投票、任务、协作等“社会操作系统”,形成真正的“社交经济”。在这个体系中,Mini Apps 不再是内容附属,而是核心交互单元。YakiHonne 的 Widget 设计天然服务于此场景:它让每一次社交行为都可能触发价值流转,从一次转账、一次众筹、一次治理投票,到一个内容生成任务。
3) 从平台生态到分布式开发生态
社交支付的未来,属于可编程的生态,而非封闭的平台。随着 Smart Widgets SDK 的开源,越来越多的开发者将加入 Agentic Mini App 的构建中。未来的 Web3 应用不会是一个个巨型 App,而是一组协同工作的 Widget 网络,它们在用户的社交流中被发现、被使用、被组合。YakiHonne 正在成为这一生态的起点。
YakiHonne的愿景不仅是打造一个功能强大的去中心化社交支付平台,更是构建一个通向未来的“Agentic 社交操作系统”。在这个系统中,每一个人、每一个代理、每一个交互都是协作的触发器,智能的入口,价值的节点。
-
@ 8d5ba92c:c6c3ecd5
2025-04-10 22:20:40It’s often said that 'Bitcoin doesn’t need marketing'—and the internet proves it well, almost like a daily feed. Instead of typical ads in the form of 'sell-me-anything-and-everything', the space thrives on organic memes and threads: a grassroots testament to Bitcoin ethos.
This isn’t about the artificial promotion of THE TRUMAN SHOW, where desires are manufactured and ads dictate specific behaviours. Bitcoiners don’t just reject the Proof-of-Hype, so typical in a fiat-driven world, they replace it with Proof-of-Work: value emerging not from coercion, but from consensus (i.e., what the community validates as genuine and meaningful).
The "Funny Money" Crew
On the other hand, equally common is the twist with memes labeled 'Bitcoin’s Marketing Team', featuring faces like:
🤡 Jerome Powell (Fed Chair), Christine Lagarde (ECB), Agustín Carstens (BIS chief, CBDC pusher), Janet Yellen (U.S. Treasury Secretary), Jamie Dimon (JPMorgan CEO), Elizabeth Warren (U.S. Senator), and so on.
Sophisticated jokes—appreciated by those who understand their actual impact. After all, what better advertisement for Bitcoin could there be than watching the fiat system degrade in real time? 😎
Why Bring This Up?
First, because I want to remind that Bitcoiners weaponize even simple ideas better than entire Wall Street-hired PR firms. Every "Bitcoin doesn’t need marketing" or "Thanks, Fed for the free promo!" is a clever, almost subversive way of raising topics we should be aware of. Exposing fiat’s failures often speaks louder than directly evangelizing how sound Bitcoin is—and how well it solves problems that keep many non-coiners awake at night.
Second, to credit where it’s due: Bitcoin-only projects and individuals who are actively spreading the word—hard money, real solutions, and the culture itself. But this isn’t 'marketing' in the traditional, pushy, profit-at-all-costs sense. Instead, it’s built on:
- Information (no bullshit, just facts)
- Education (orange-pilling, not upselling)
- Community (value, instead of dry PR)
- Creativity (proof-of-mind, not algo-baits)
- Experiences (how-to solutions, not showing off)
And let’s be clear: Earning money isn’t evil—it’s necessary for these projects to survive. What matters is the intention. No one should apologize for creating Bitcoin-themed ads, so long as they’re carrying the meaning, instead of being rooted in hype.
PoW: Earning Attention, Not Buying It
The list below (part one) is based on my own preferences, but it was also inspired by Bitcoin FilmFest, which—in its upcoming edition #BFF25, May 22-25—introduced a new block to the program: ‘BFF PoWies: The Show for Bitcoin-Only Advertising.’ A dedicated space for creative expression beyond films, where projects and individuals compete for awards in categories like Grand Prix, Best Visual, and Best Identity—with a $4,500 prize pool to grab.
Anyways, as our small but passionate team dug into this topic, I was really happy to uncover unique video ads, some of which I’m excited to share with you now.
If you know others, tag me (private profile) or 'Bitcoin FilmFest' directly on socials. Feel free to submit your work to the PoWies too (submissions close May 6th).
Without further ado... Let's explore the space where value is discovered, not packaged in empty promises 📺👇
Bitcoin-Video Ads: Part One.
Creative, funny, dynamic, inspirational. All four below. Enjoy!
1/. NEVER LOSE YOUR BITCOIN (Liana)
https://v.nostr.build/P7To0HpNmmB6iudR.mp4
2/. MAKE A CHANGE, (Wasabi)
https://v.nostr.build/rUGQAysAIDH8Wx9x.mp4
3/. THE MOTHER OF ALL BACKUPS (Cryptosteel)
https://v.nostr.build/3zesnSjQudQoxl5f.mp4
- FINANCIAL FALLOUT (21 Futures)
https://v.nostr.build/sFvmt8oCWfxLKJRb.mp4
PS. The most effective Bitcoin ads aren't 'typical' campaigns—they're the result of creativity, PoW, and authentic storytelling move hand-in-hand.
BTC Your Mind. Let it Beat... Şela
-
@ f6497934:312c6532
2025-04-17 06:42:48Discover the ultimate Water Activity Meter for precise moisture measurement in food, pharmaceuticals, and cosmetics. Ensure product safety and extend shelf life by accurately assessing microbial growth risks. Our advanced meters, like the AQUALAB 4TE, deliver fast, reliable results in minutes with ±0.003 accuracy. Easy to use, portable, and temperature-controlled, they’re perfect for quality control in any industry. Optimize your production process, meet FDA standards, and boost product consistency. Invest in top-tier water activity testing today—shop now for unbeatable performance and durability!
-
@ 20986fb8:cdac21b3
2025-04-17 06:21:38Distributed Agentic Organizations (DA(gentic)O) are reshaping the future of collaboration, blending Agentic AI to bridge crypto communities, virtual societies, and the real world. To scale effectively, DA(gentic)O needs seamless Agent-to-Agent and human-to-Agent social pathways. YakiHonne’s programmable Smart Widgets deliver lightweight interfaces, embedding social and payment features to enable agents to collaborate, transact, and govern effortlessly. Agentic Mini Apps turn this vision into reality, powering scenarios from on-chain voting to buying coffee. In this article, we’ll explore how YakiHonne Smart Widgets empower DA(gentic)O, unlocking decentralized productivity and an agent-driven collaborative economy.
1.From DAO to DA(gentic)O: A New Paradigm for Collaboration
Traditional organizations rely on centralized management, often hitting efficiency bottlenecks. DAOs introduced decentralized governance via blockchain, but slow voting and rigid contracts limit their potential. Agentic AI marks a new era, moving beyond passive execution to autonomous reasoning and dynamic adaptation—like “digital citizens” in a virtual world. By integrating large language models, advanced algorithms, and external tools (like on-chain data, Web APIs, or IoT sensors), Agentic AI processes real-time information, optimizes decisions, and evolves continuously, fueling the rise of DA(gentic)O.
DA(gentic)O are dynamic ecosystems of AI agents connected through open protocols—like Agent-to-Agent collaboration frameworks, blockchain, or smart contracts—enhancing and evolving decentralized autonomous organizations (DAOs). Unlike centralized command structures or DAOs bottlenecked by voting, DA(gentic)O operate as intelligent networks to achieve goals. Picture one agent monitoring BTC market swings while another orchestrates virtual community events—together, they collaborate via protocols to drive outcomes from on-chain trades to real-world optimizations. These organizations prioritize productivity, spanning governance, virtual economies, and physical operations, showcasing the flexibility and scalability of decentralization. DA(gentic)O aren’t just tools for collaboration; they’re bridges linking virtual and physical realms, creating verifiable value for global distributed communities.
DA(gentic)O’s core traits boil down to three pillars:
D: Distributed & Decentralized Decisions and operations spread across autonomous agents, eliminating single points of control for robust, transparent systems. Agents negotiate resources via on-chain records or distributed protocols, forming trustless collaboration networks. For example, in BTC markets, agents collectively manage fund flows; in virtual communities, they vote to set rules; in the physical world, they coordinate cross-regional logistics. This distributed architecture gives DA(gentic)O unmatched resilience and scalability.
A: Autonomous & Agentic Agents independently sense, plan, and act, enabling organizations to self-govern through intelligent coordination. Each agent acts like a micro-decision unit, adapting strategies to changing conditions without constant human oversight. In a metaverse, one agent curates a virtual exhibition while another allocates computing power, syncing automatically via protocols. In smart factories, agents tweak production in real time to meet demand. This autonomy lets DA(gentic)O outpace traditional organizations in complex, fast-moving scenarios.
O: Organization & Operation Agents work as a cohesive network, tackling tasks from virtual economies to real-world production. Whether it’s an on-chain auction in Web3, a virtual marketplace, or a physical supply chain, DA(gentic)O deliver results through collaboration. One agent might handle creator-buyer transactions while another optimizes logistics, together streamlining value from end to end. This operational prowess makes DA(gentic)O a hub for productivity.
DA(gentic)O’s flexibility stems from Agentic AI’s diverse capabilities. Reactive agents excel at real-time responses, like tracking on-chain price shifts. Goal-driven agents break down complex tasks, such as designing virtual community incentives. Learning agents refine strategies through data, like optimizing factory outputs. United via A2A protocols, these agents form networks tailored to virtual governance, transactions, and real-world optimization, building a productivity-driven digital ecosystem.
Key Pillars of DA(gentic)O
To build effective DA(gentic)O, several components ensure the agent network thrives:
- Sovereign Wallets: Each agent holds an independent, anonymous digital wallet, securely managing assets and executing transactions—whether for on-chain payments, virtual rewards, or real-world task payouts—ensuring economic autonomy.
- Decentralized Security: Robust on-chain or distributed systems safeguard agent operations, data privacy, and decision integrity, protecting against attacks or tampering to maintain trust.
- Open Network Access: Agents need seamless access to the internet, blockchains, or other data sources for real-time insights, like on-chain metrics, user behaviors, or IoT sensor data, fueling reasoning and collaboration.
- Interfaces: User-friendly, autonomous interfaces (like on-chain dashboards or mobile panels) enable smooth connections between agents, users, and systems.
DA(gentic)O weave intelligent networks across virtual and physical domains, delivering value through transactions, coordination, and optimization. Agentic Mini Apps are the key to unlocking these interactions.
2. Programmable Smart Widgets: The Backbone of DA(gentic)O
YakiHonne’s programmable Smart Widgets are a lightweight system powering Agentic Mini Apps with social and payment features, serving as the infrastructure for DA(gentic)O. Through embedded interfaces and decentralized protocols, they drive agent collaboration, transactions, and governance, lowering development barriers and connecting Web3, virtual communities, and real-world scenarios.
2.1 Features of Smart Widgets
In YakiHonne’s design, Smart Widgets are compact, intelligent interfaces tailored for the rapid development and deployment of Agentic Mini Apps. Their core features include:
- Embedded Social Flows: Mini Apps integrate directly into social environments, letting users pay or interact without switching interfaces.
- No Centralized Approval: Developers can create, deploy, and share Mini Apps instantly, bypassing app store gatekeepers.
- Composability: Widgets support flexible combinations of functional modules, adapting to diverse Agent-to-Agent collaboration needs.
- Built-in Payments: With on-chain payment and stablecoin support, they enable seamless value exchange between agents.
This framework dramatically lowers the barrier to building and scaling decentralized agent organizations, empowering individual agents to not only act but also collaborate, transact, and govern together.
2.2 Forms and Applications of Smart Widgets
YakiHonne Smart Widgets come in three forms to meet varied needs, from everyday users to advanced developers, powering a full spectrum of DA(gentic)O demands:
- Basic Widgets: No coding required—users can quickly build payment or voting functions using a template editor, ideal for simple Mini Apps.
- Action Widgets: These link external features while keeping social interfaces seamless, expanding Mini Apps’ interaction scope.
- Tool Widgets: Designed for developers and power users, these leverage the Mini App SDK for complex applications, supporting data queries, on-chain tasks, instant payments, and smart decisions to create advanced, intelligent Mini Apps.
These forms provide Mini Apps with everything from basic interactions to sophisticated collaboration, aligning with DA(gentic)O’s automated workflows.
2.3 Core Capabilities for DA(gentic)O
YakiHonne Smart Widgets deliver key capabilities to fuel the efficient operation of Distributed Agentic Organizations through Agentic Mini Apps:
- Autonomous Mini Apps: Widgets embed service logic, letting agents independently handle tasks or trigger payments—like auto-distributing Web3 transaction rewards or coordinating virtual community events without human input.
- On-the-Fly Payments: Seamless protocols for stablecoins, BTC, or Lightning Network (LN) enable instant on-chain payments, supporting micro-transaction economies.
- On-Chain Identity Integration: Agents can tie sovereign identities to platforms like Nostr, authorizing and signing on-chain actions.
- Real-Time Interaction and Coordination: Widgets facilitate instant data sharing, smart contract calls, and collaborative execution, tailored for Agent-to-Agent networks.
- Openness and Composability: Developers can freely create and combine Widgets, expanding the modular Mini App ecosystem.
These features make Smart Widgets the “backbone” of DA(gentic)O, linking individual agents to collaborative networks and fostering dynamic, scalable ecosystems.
2.4 Fueling the Agentic Economy
In DA(gentic)O, economic interactions are critical. Smart Widgets drive the agentic economy by:
- Lowering Payment Barriers: Embedded payments enable frictionless micro-transactions between agents, streamlining value flow.
- Micro-Autonomous Markets: Widgets give Mini Apps independent pricing and operation capabilities, creating self-sustaining economic units.
- Accelerating Innovation: Open creation and low-cost deployment encourage developers to enrich the Mini App ecosystem.
YakiHonne is pioneering a new model: social interactions double as payments, and apps run autonomously. This lays the groundwork for future Agentic DAOs and agent-driven socio-economic systems.
3. Agentic Mini App Use Cases
Agentic Mini Apps are the interactive layer of DA(gentic)O, powered by YakiHonne Smart Widgets to embed social and payment features, enabling seamless user engagement in governance, content creation, incentives, and consumption. This chapter dives into three key scenarios—autonomous governance, social media, and consumption ecosystems—showing how DA(gentic)O build dynamic networks from Web3 to the real world.
3.1 Autonomous Governance: Agentic AI for DAOs
Traditional DAOs leverage blockchain for transparent governance, aiming to replace centralized control with community voting and smart contracts. But delays, disputes, and static contracts hinder value delivery—investment DAOs lag behind professional firms, and protocol DAOs struggle with productivity. Agentic AI, the “smart core” of DA(gentic)O, automates proposals, optimizes resource allocation, and boosts on-chain efficiency, bridging Web3 with real-world productivity. Here’s how it works:
- Intelligent Autonomous Voting and Governance Optimization
Traditional aMaci-based anonymous voting is complex and limits scale. This aMaci-powered Mini App simplifies governance logic with user-friendly interfaces. Users get proposal alerts via DMs or notifications (e.g., “Adjust protocol parameters?”) and vote with one tap. The Mini App analyzes on-chain data (like past voting trends) to suggest decisions, tallies results in seconds, and auto-executes proposals. - Incentive Allocation and Contribution Tracking
Users check contributions (e.g., code commits, completed tasks) in the Mini App. Agentic AI evaluates on-chain and off-chain activity, auto-paying rewards in stablecoins, LN, or BTC—instantly. DMs notify reward status. Users showcase contributions via posts, and the Mini App tracks activity, distributing tokens or NFTs, logged on-chain with DM confirmations. - DAO-to-DAO Collaboration
Users share data (e.g., BTC trends) in the Mini App, where Agentic AI suggests collaborations (e.g., “joint campaign”). It auto-executes cross-DAO tasks like fund pool allocation, with posts promoting updates. Users can also propose joint initiatives via DMs, and the Mini App aggregates multi-party data, paying stablecoins, LN, or BTC for execution, all transparent on-chain. - Community Events and Crowdfunding
Users donate to events (e.g., “DAO summit”) via the Mini App, paying stablecoins, LN, or BTC—instantly. Agentic AI tracks progress, auto-allocates funds, and posts share results. Users sign up for events via DMs, earning NFT rewards through Mini App payments, recorded on-chain. - Resource and Task Allocation
Users pick tasks (e.g., “build a module”) in the Mini App. Agentic AI matches skills, paying stablecoins, LN, or BTC rewards—instantly. DMs update task status. Users claim tasks via posts, and the Mini App verifies outcomes, auto-paying tokens, logged on-chain with DM confirmations. - On-Chain Identity and Authentication
Users link on-chain and Nostr identities in the Mini App. Agentic AI verifies permissions, enabling cross-DAO recognition, with stablecoin, LN, or BTC payments to activate identities. Users request event access, and the Mini App auto-grants permissions, transparent on-chain. - Real-Time Sentiment Analysis
Users view sentiment reports (e.g., “token buzz up 30%”) in the Mini App. Agentic AI analyzes on-chain and social data, offering investment tips for a 2 USDC reward—instantly. Reports are sent via DMs.
3.2 Social Media
Centralized social platforms curb free expression with algorithmic bias, content censorship, and data misuse. Creators lose earnings to hefty fees, and authenticity and privacy are at risk. Agentic AI powers a smarter, decentralized social ecosystem, ensuring user sovereignty and building open networks from Web3 to the real world. Key scenarios include: - Content Creation and Distribution
Users team up with Agentic AI to craft content (videos, articles, posters), publishing to YakiHonne and beyond with one click. The Mini App analyzes user interests for targeted delivery, with stablecoin, LN, or BTC payments to unlock full content. - AI Journalism: Reporting and Interviews
Users automate news gathering via the Mini App, pulling on-chain data and social posts to create in-depth reports, shareable for tip-based payments. For interviews (e.g., BUIDL projects), users DM requests, and Agentic AI drafts outlines, with the Mini App converting videos to articles or clips for YakiHonne and other platforms. - Content Interaction
Users engage in discussions via YakiHonne posts. The Mini App tracks comment quality, auto-rewarding active participants with tips. - Content Subscriptions
Users pay for premium articles or exclusive posts through the Mini App, which manages access—instantly. - Content Authenticity Verification
Users verify content credibility (e.g., news sources) via the Mini App, flagging trustworthiness and voting to support authentic posts. - Content Archiving and Collaboration
Users upload posts or articles to the Mini App, stored on decentralized networks with permanent links for paid downloads. For collaborative articles, Agentic AI tracks contributions, auto-paying stablecoin, LN, or BTC rewards. - Decentralized Ads and Revenue
Creators pay to promote articles or content via the Mini App, with readers earning directly from ad revenue. - Sentiment Analysis and Public Discourse
Agentic AI monitors YakiHonne posts and social trends (e.g., “topic buzz up 30%”), suggesting discussions. Users receive detailed reports via DMs for a payment.
3.3 Consumption Ecosystem
Centralized payments and traditional consumption suffer from high fees, slow settlements, and clunky processes, while DeFi apps face steep learning curves and trust issues. Agentic AI, through Mini Apps, builds a decentralized social payment and consumption ecosystem, expanding on-chain and real-world use cases to create a Web3 value network. Scenarios include:
- Peer-to-Peer Transfers
Users search friends in the Mini App to send 0.05 USDC. Agentic AI optimizes exchange rates and swap paths, settling instantly with on-chain records. DMs flag transfer requests. For group splits, users initiate in the Mini App, and Agentic AI calculates shares, paying stablecoins, LN, or BTC—instantly, with posts logging details. - DeFi Staking Incentives
Users join staking pools via the Mini App, where Agentic AI suggests high-yield strategies, paying stablecoins, LN, or BTC—instantly, with transparent on-chain dividends. DMs notify profits. Users stake assets, and Agentic AI rewards active users with 0.1 USDC, paid instantly, with posts sharing strategies. - Offline Purchases
Users pay BTC or LN for coffee or goods via the Mini App—instantly, logged on-chain. Posts promote nearby deals. For bookings (e.g., restaurant seats), users pay stablecoins, LN, or BTC, earning token cashback—instantly, with posts sharing events. - GameFi
Users buy game gear for 0.1 USDC in the Mini App—instantly, recorded on-chain. Posts highlight new assets to attract players. For tasks (e.g., battle challenges), Agentic AI verifies completion, paying stablecoin, LN, or BTC rewards—instantly, with posts showcasing leaderboards. - Cross-Border E-Commerce
Users pay 1 USDC for overseas goods via the Mini App—instantly, with on-chain logistics tracking. DMs update orders. For group buys, Agentic AI optimizes discounts, splitting stablecoin, LN, or BTC shipping costs—instantly, with posts tracking progress.
4. Conclusion
As Agentic AI and decentralized technologies converge rapidly, DA(gentic)O are no longer theoretical—they’re emerging as “intelligent collaboration networks.” YakiHonne’s Smart Widgets and Agentic Mini Apps provide the critical interfaces and infrastructure for these networks, unleashing unprecedented creativity, payment capabilities, and governance possibilities for users and developers alike. We’re witnessing the convergence of three transformative trends:
1) From Solo Agents to Multi-Agent Systems
The future of organizations isn’t human-centric on-chain governance but dynamic ecosystems driven by multi-agent systems. Each intelligent agent—representing a user, group, or economic unit—senses, reasons, and acts independently, collaborating with others to tackle complex production and governance tasks. YakiHonne Smart Widgets serve as the “collaboration dashboard” for these agents, offering micro-gateways and interaction protocols.
2) From Social Interaction to Social Economies
Today’s social platforms focus on information exchange, but tomorrow’s decentralized networks will embed payments, voting, tasks, and collaboration into a “social operating system,” forming true social economies. In this model, Mini Apps aren’t just content add-ons—they’re core interaction hubs. YakiHonne’s Widget design is built for this: every social action, from a transfer to a crowdfund, a governance vote to a content task, can spark value flow.
3) From Platform Ecosystems to Distributed Development
The future of social payments lies in programmable ecosystems, not walled gardens. With the open-source Smart Widgets SDK, more developers will join the Agentic Mini App movement. Apps won’t be monolithic giants but networks of interoperable Widgets, discovered, used, and combined within users’ social flows. YakiHonne is laying the foundation for this ecosystem.
YakiHonne’s vision goes beyond a powerful decentralized social payment platform—it’s about building an “Agentic Social Operating System” for the future. In this system, every person, every agent, every interaction is a trigger for collaboration, an entry point for intelligence, and a node for value creation.
-
@ 3b3a42d3:d192e325
2025-04-10 08:57:51Atomic Signature Swaps (ASS) over Nostr is a protocol for atomically exchanging Schnorr signatures using Nostr events for orchestration. This new primitive enables multiple interesting applications like:
- Getting paid to publish specific Nostr events
- Issuing automatic payment receipts
- Contract signing in exchange for payment
- P2P asset exchanges
- Trading and enforcement of asset option contracts
- Payment in exchange for Nostr-based credentials or access tokens
- Exchanging GMs 🌞
It only requires that (i) the involved signatures be Schnorr signatures using the secp256k1 curve and that (ii) at least one of those signatures be accessible to both parties. These requirements are naturally met by Nostr events (published to relays), Taproot transactions (published to the mempool and later to the blockchain), and Cashu payments (using mints that support NUT-07, allowing any pair of these signatures to be swapped atomically.
How the Cryptographic Magic Works 🪄
This is a Schnorr signature
(Zₓ, s)
:s = z + H(Zₓ || P || m)⋅k
If you haven't seen it before, don't worry, neither did I until three weeks ago.
The signature scalar s is the the value a signer with private key
k
(and public keyP = k⋅G
) must calculate to prove his commitment over the messagem
given a randomly generated noncez
(Zₓ
is just the x-coordinate of the public pointZ = z⋅G
).H
is a hash function (sha256 with the tag "BIP0340/challenge" when dealing with BIP340),||
just means to concatenate andG
is the generator point of the elliptic curve, used to derive public values from private ones.Now that you understand what this equation means, let's just rename
z = r + t
. We can do that,z
is just a randomly generated number that can be represented as the sum of two other numbers. It also follows thatz⋅G = r⋅G + t⋅G ⇔ Z = R + T
. Putting it all back into the definition of a Schnorr signature we get:s = (r + t) + H((R + T)ₓ || P || m)⋅k
Which is the same as:
s = sₐ + t
wheresₐ = r + H((R + T)ₓ || P || m)⋅k
sₐ
is what we call the adaptor signature scalar) and t is the secret.((R + T)ₓ, sₐ)
is an incomplete signature that just becomes valid by add the secret t to thesₐ
:s = sₐ + t
What is also important for our purposes is that by getting access to the valid signature s, one can also extract t from it by just subtracting
sₐ
:t = s - sₐ
The specific value of
t
depends on our choice of the public pointT
, sinceR
is just a public point derived from a randomly generated noncer
.So how do we choose
T
so that it requires the secret t to be the signature over a specific messagem'
by an specific public keyP'
? (without knowing the value oft
)Let's start with the definition of t as a valid Schnorr signature by P' over m':
t = r' + H(R'ₓ || P' || m')⋅k' ⇔ t⋅G = r'⋅G + H(R'ₓ || P' || m')⋅k'⋅G
That is the same as:
T = R' + H(R'ₓ || P' || m')⋅P'
Notice that in order to calculate the appropriate
T
that requirest
to be an specific signature scalar, we only need to know the public nonceR'
used to generate that signature.In summary: in order to atomically swap Schnorr signatures, one party
P'
must provide a public nonceR'
, while the other partyP
must provide an adaptor signature using that nonce:sₐ = r + H((R + T)ₓ || P || m)⋅k
whereT = R' + H(R'ₓ || P' || m')⋅P'
P'
(the nonce provider) can then add his own signature t to the adaptor signaturesₐ
in order to get a valid signature byP
, i.e.s = sₐ + t
. When he publishes this signature (as a Nostr event, Cashu transaction or Taproot transaction), it becomes accessible toP
that can now extract the signaturet
byP'
and also make use of it.Important considerations
A signature may not be useful at the end of the swap if it unlocks funds that have already been spent, or that are vulnerable to fee bidding wars.
When a swap involves a Taproot UTXO, it must always use a 2-of-2 multisig timelock to avoid those issues.
Cashu tokens do not require this measure when its signature is revealed first, because the mint won't reveal the other signature if they can't be successfully claimed, but they also require a 2-of-2 multisig timelock when its signature is only revealed last (what is unavoidable in cashu for cashu swaps).
For Nostr events, whoever receives the signature first needs to publish it to at least one relay that is accessible by the other party. This is a reasonable expectation in most cases, but may be an issue if the event kind involved is meant to be used privately.
How to Orchestrate the Swap over Nostr?
Before going into the specific event kinds, it is important to recognize what are the requirements they must meet and what are the concerns they must address. There are mainly three requirements:
- Both parties must agree on the messages they are going to sign
- One party must provide a public nonce
- The other party must provide an adaptor signature using that nonce
There is also a fundamental asymmetry in the roles of both parties, resulting in the following significant downsides for the party that generates the adaptor signature:
- NIP-07 and remote signers do not currently support the generation of adaptor signatures, so he must either insert his nsec in the client or use a fork of another signer
- There is an overhead of retrieving the completed signature containing the secret, either from the blockchain, mint endpoint or finding the appropriate relay
- There is risk he may not get his side of the deal if the other party only uses his signature privately, as I have already mentioned
- There is risk of losing funds by not extracting or using the signature before its timelock expires. The other party has no risk since his own signature won't be exposed by just not using the signature he received.
The protocol must meet all those requirements, allowing for some kind of role negotiation and while trying to reduce the necessary hops needed to complete the swap.
Swap Proposal Event (kind:455)
This event enables a proposer and his counterparty to agree on the specific messages whose signatures they intend to exchange. The
content
field is the following stringified JSON:{ "give": <signature spec (required)>, "take": <signature spec (required)>, "exp": <expiration timestamp (optional)>, "role": "<adaptor | nonce (optional)>", "description": "<Info about the proposal (optional)>", "nonce": "<Signature public nonce (optional)>", "enc_s": "<Encrypted signature scalar (optional)>" }
The field
role
indicates what the proposer will provide during the swap, either the nonce or the adaptor. When this optional field is not provided, the counterparty may decide whether he will send a nonce back in a Swap Nonce event or a Swap Adaptor event using thenonce
(optionally) provided by in the Swap Proposal in order to avoid one hop of interaction.The
enc_s
field may be used to store the encrypted scalar of the signature associated with thenonce
, since this information is necessary later when completing the adaptor signature received from the other party.A
signature spec
specifies thetype
and all necessary information for producing and verifying a given signature. In the case of signatures for Nostr events, it contain a template with all the fields, exceptpubkey
,id
andsig
:{ "type": "nostr", "template": { "kind": "<kind>" "content": "<content>" "tags": [ … ], "created_at": "<created_at>" } }
In the case of Cashu payments, a simplified
signature spec
just needs to specify the payment amount and an array of mints trusted by the proposer:{ "type": "cashu", "amount": "<amount>", "mint": ["<acceptable mint_url>", …] }
This works when the payer provides the adaptor signature, but it still needs to be extended to also work when the payer is the one receiving the adaptor signature. In the later case, the
signature spec
must also include atimelock
and the derived public keysY
of each Cashu Proof, but for now let's just ignore this situation. It should be mentioned that the mint must be trusted by both parties and also support Token state check (NUT-07) for revealing the completed adaptor signature and P2PK spending conditions (NUT-11) for the cryptographic scheme to work.The
tags
are:"p"
, the proposal counterparty's public key (required)"a"
, akind:30455
Swap Listing event or an application specific version of it (optional)
Forget about this Swap Listing event for now, I will get to it later...
Swap Nonce Event (kind:456) - Optional
This is an optional event for the Swap Proposal receiver to provide the public nonce of his signature when the proposal does not include a nonce or when he does not want to provide the adaptor signature due to the downsides previously mentioned. The
content
field is the following stringified JSON:{ "nonce": "<Signature public nonce>", "enc_s": "<Encrypted signature scalar (optional)>" }
And the
tags
must contain:"e"
, akind:455
Swap Proposal Event (required)"p"
, the counterparty's public key (required)
Swap Adaptor Event (kind:457)
The
content
field is the following stringified JSON:{ "adaptors": [ { "sa": "<Adaptor signature scalar>", "R": "<Signer's public nonce (including parity byte)>", "T": "<Adaptor point (including parity byte)>", "Y": "<Cashu proof derived public key (if applicable)>", }, …], "cashu": "<Cashu V4 token (if applicable)>" }
And the
tags
must contain:"e"
, akind:455
Swap Proposal Event (required)"p"
, the counterparty's public key (required)
Discoverability
The Swap Listing event previously mentioned as an optional tag in the Swap Proposal may be used to find an appropriate counterparty for a swap. It allows a user to announce what he wants to accomplish, what his requirements are and what is still open for negotiation.
Swap Listing Event (kind:30455)
The
content
field is the following stringified JSON:{ "description": "<Information about the listing (required)>", "give": <partial signature spec (optional)>, "take": <partial signature spec (optional)>, "examples: [<take signature spec>], // optional "exp": <expiration timestamp (optional)>, "role": "<adaptor | nonce (optional)>" }
The
description
field describes the restrictions on counterparties and signatures the user is willing to accept.A
partial signature spec
is an incompletesignature spec
used in Swap Proposal eventskind:455
where omitting fields signals that they are still open for negotiation.The
examples
field is an array ofsignature specs
the user would be willing totake
.The
tags
are:"d"
, a unique listing id (required)"s"
, the status of the listingdraft | open | closed
(required)"t"
, topics related to this listing (optional)"p"
, public keys to notify about the proposal (optional)
Application Specific Swap Listings
Since Swap Listings are still fairly generic, it is expected that specific use cases define new event kinds based on the generic listing. Those application specific swap listing would be easier to filter by clients and may impose restrictions and add new fields and/or tags. The following are some examples under development:
Sponsored Events
This listing is designed for users looking to promote content on the Nostr network, as well as for those who want to monetize their accounts by sharing curated sponsored content with their existing audiences.
It follows the same format as the generic Swap Listing event, but uses the
kind:30456
instead.The following new tags are included:
"k"
, event kind being sponsored (required)"title"
, campaign title (optional)
It is required that at least one
signature spec
(give
and/ortake
) must have"type": "nostr"
and also contain the following tag["sponsor", "<pubkey>", "<attestation>"]
with the sponsor's public key and his signature over the signature spec without the sponsor tag as his attestation. This last requirement enables clients to disclose and/or filter sponsored events.Asset Swaps
This listing is designed for users looking for counterparties to swap different assets that can be transferred using Schnorr signatures, like any unit of Cashu tokens, Bitcoin or other asset IOUs issued using Taproot.
It follows the same format as the generic Swap Listing event, but uses the
kind:30457
instead.It requires the following additional tags:
"t"
, asset pair to be swapped (e.g."btcusd"
)"t"
, asset being offered (e.g."btc"
)"t"
, accepted payment method (e.g."cashu"
,"taproot"
)
Swap Negotiation
From finding an appropriate Swap Listing to publishing a Swap Proposal, there may be some kind of negotiation between the involved parties, e.g. agreeing on the amount to be paid by one of the parties or the exact content of a Nostr event signed by the other party. There are many ways to accomplish that and clients may implement it as they see fit for their specific goals. Some suggestions are:
- Adding
kind:1111
Comments to the Swap Listing or an existing Swap Proposal - Exchanging tentative Swap Proposals back and forth until an agreement is reached
- Simple exchanges of DMs
- Out of band communication (e.g. Signal)
Work to be done
I've been refining this specification as I develop some proof-of-concept clients to experience its flaws and trade-offs in practice. I left the signature spec for Taproot signatures out of the current document as I still have to experiment with it. I will probably find some important orchestration issues related to dealing with
2-of-2 multisig timelocks
, which also affects Cashu transactions when spent last, that may require further adjustments to what was presented here.The main goal of this article is to find other people interested in this concept and willing to provide valuable feedback before a PR is opened in the NIPs repository for broader discussions.
References
- GM Swap- Nostr client for atomically exchanging GM notes. Live demo available here.
- Sig4Sats Script - A Typescript script demonstrating the swap of a Cashu payment for a signed Nostr event.
- Loudr- Nostr client under development for sponsoring the publication of Nostr events. Live demo available at loudr.me.
- Poelstra, A. (2017). Scriptless Scripts. Blockstream Research. https://github.com/BlockstreamResearch/scriptless-scripts
-
@ 95cb4330:96db706c
2025-04-17 06:16:21In business, investing, and personal goals, it’s easy to obsess over outcomes: - How many sales did I make? - How high is my stock price? - How much money did I earn this month?
But if you focus too much on outputs, you risk chasing results without improving the process that actually creates success.
The best leaders — like Jeff Bezos — follow a simple but powerful principle:
Focus daily on controllable inputs. The outputs will follow naturally over time.
Let’s break down what this means, why it works, and how you can apply it to build long-term success.
🧠 What Does "Focus on Inputs" Mean?
Inputs = Actions you control directly: - Customer service quality - Product development speed - Operational efficiency - Attention to detail in execution
Outputs = Results you want but can’t control directly: - Revenue - Profits - Stock price - Market share
Key idea:
👉 When you relentlessly improve the inputs, you set the stage for outstanding outputs over time.
🚀 How Jeff Bezos Used Input Focus to Build Amazon
At Amazon, Bezos hardwired this mindset into the company:
- Teams weren’t told to "increase revenue."
- They were told to improve customer satisfaction, reduce delivery times, and expand product selection.
- Amazon focused on input metrics like:
- Time from customer click to shipment
- Product availability rates
- Number of customer complaints
By perfecting these controllable actions every day, sales and stock price naturally exploded over time.
💬 As Bezos put it:
"We can’t guarantee the stock price will go up, but we can guarantee that customers will love us if we execute on the right inputs."
📈 Why Focusing on Inputs Wins Over Time
✅ Inputs are under your direct control.
You can’t control customer behavior or market swings — but you can control how you perform daily tasks.✅ Good inputs compound over time.
Small daily improvements (like better service or faster shipping) build massive trust and long-term loyalty.✅ Outputs are lagging indicators.
If you chase outputs alone, you’re reacting to the past. Input focus keeps you proactive.✅ Stress and emotional swings decrease.
Instead of riding the highs and lows of every result, you stay calm and centered on today’s actions.
📚 Resources to Learn More
- 📄 Jeff Bezos on Input Metrics – Harvard Business Review
- 📚 How Focusing on Inputs Drives Success – Motley Fool
- 📘 James Clear on Goals vs Systems
🛠 How to Apply "Input Focus" in Your Own Work
✅ 1. Define Your Key Inputs
Ask yourself:
"What daily actions, if consistently improved, would lead to my goals?"
Examples: - Salesperson: Focus on number of quality client calls, not sales closed. - Writer: Focus on daily word count, not bestseller lists. - Startup founder: Focus on product iterations, not initial user growth.
✅ 2. Track Inputs, Not Just Outputs
Build habits around measuring what you control:
"Did I deliver 5 demos today?" "Did I ship a new feature this week?" "Did I respond to every customer ticket within 2 hours?"
✅ 3. Trust the Process
Results don’t show up instantly.
Stay consistent.
Refine your inputs.
Good outputs are a lagging reward for great daily actions.
📣 Final Thought
Outputs are loud.
They grab headlines.
They create FOMO.But inputs are where real power lies.
"Be obsessed with the process, and the results will take care of themselves."
Follow the principle that helped Amazon become a trillion-dollar company:
🎯 Control your inputs. Trust the compounding. Let success chase you. 🚀
-
@ 95cb4330:96db706c
2025-04-17 06:10:39If there’s one strategy that quietly fuels the success of icons like Sam Altman, Jeff Bezos, and Elon Musk, it’s not a secret growth hack or a flashy new tool.
It’s something deceptively simple—and profoundly powerful:They learn. Constantly. Relentlessly. Deeply.
This is the essence of Compound Learning—the idea that knowledge, like money, compounds over time.
The more you invest in learning, the faster your decisions, the sharper your thinking, and the bigger your edge becomes.
🧠 What Is Compound Learning?
Compound learning means consistently building deep knowledge over time—not just collecting facts or skimming headlines.
It’s about:- Understanding principles
- Asking hard questions
- Applying what you learn across everything you do
It works just like compound interest:
- Learn a little every day
- Connect ideas across time
- Make smarter choices
- Smarter choices lead to even more learning opportunities
The longer you do it, the more valuable and self-reinforcing it becomes.
🚀 Examples in Action
📘 Sam Altman – Learning Is His Edge
Sam Altman, CEO of OpenAI, says:
"The best founders are learning machines."
He reads obsessively, writes to clarify his thinking, and debates ideas constantly with people smarter than him.
By compounding knowledge across AI, startups, economics, and human behavior, he positions himself to spot opportunities before others even see the pattern forming.
📚 Jeff Bezos – Reading as a Competitive Advantage
At Amazon, Bezos famously starts meetings in silence—reading internal memos.
Why? Because deep thinking requires deep attention.He believes:
- Clear writing = Clear thinking
- Deep reading = Better decision-making
His broad reading habits—from science fiction to business reports—gave him a mental model toolkit that shaped Amazon’s long-term success.
🚀 Elon Musk – Learning Across Disciplines
Elon Musk didn’t attend rocket science school. He:
- Read propulsion textbooks
- Asked engineers endless questions
- Cross-applied knowledge from physics, coding, and manufacturing
Result:
He built SpaceX through self-driven, compounded learning, not formal credentials.
🧭 How to Practice Compound Learning
✅ 1. Choose Depth Over Noise
Don’t chase surface-level content.
Go deep.- Read whole books
- Revisit difficult concepts
- Study timeless principles
✅ 2. Connect What You Learn
Link ideas across fields:
- How does biology teach you about systems?
- What does history reveal about strategy?
- How does physics influence product thinking?
The richest insights live between disciplines.
✅ 3. Reflect and Apply
Learning compounds when you use it.
- Journal what you’re learning
- Teach it to someone else
- Apply it immediately in your work or decisions
✅ 4. Make It a Daily Habit
Even 30 minutes a day turns into:
- 3.5 hours/week
- 182 hours/year
- Thousands of hours over a career
That’s a competitive moat no one can take away.
🧠 Prompt to Apply Today
What’s one area where deeper understanding could unlock better thinking or decisions?
Block 30 minutes today to go deep.
Read. Reflect. Learn.
Then ask: How can I use this tomorrow?
📚 Resources to Explore
- 📘 Sam Altman – Compound Learning in “How to Be Successful”
- 📄 Jeff Bezos’ Reading and Thinking Culture – Inc.
- 🎥 Elon Musk on Self-Learning – YouTube
💡 Final Thought
You don’t need to be a genius to succeed—but you do need to learn like one.
Compound learning is quiet, patient, and unstoppable.Start today.
Learn deeply.
Watch the returns grow for a lifetime. 📈 -
@ 95cb4330:96db706c
2025-04-17 05:59:53One of the most important habits shared by top entrepreneurs like Elon Musk, Sam Altman, and Jeff Bezos is this simple but powerful principle:
Move fast first. Build the system later.
In the early stages of any idea, project, or product, speed of iteration matters far more than polish or perfection. Once you find out what works, then you can systematize and scale.
Let’s break down why this matters—and how you can apply it today.
Why Iterating Fast Beats Overplanning
When you’re trying something new, it’s easy to get trapped in:
- Endless research
- Overthinking
- Waiting for a "perfect" launch
The problem is:
No plan survives first contact with reality.
You don’t know exactly how users, customers, or the market will react. You need real feedback, not guesses.
Fast iteration means:
- Testing assumptions quickly
- Gathering real-world data
- Learning what actually works (and what doesn’t)
Systematization comes after you discover something that works—not before.
Examples in Action
🚀 Elon Musk – SpaceX’s Rapid Prototyping
At SpaceX, Musk doesn’t spend years perfecting a rocket on paper. Instead:
- He builds early prototypes, even if they’re rough.
- He tests them quickly—even if they crash.
- He learns from each failure and improves at lightning speed.
Result: SpaceX cut rocket development time dramatically compared to traditional aerospace companies.
🚀 Sam Altman – Startups Move Fast, Then Formalize
Sam Altman teaches startup founders:
"Ship first. Learn fast. Build processes later."
At OpenAI and Y Combinator, the focus was:
- Build basic products quickly.
- Test them with users.
- Only after finding product-market fit, build durable systems.
Speed wins early. Systems win later.
🚀 Jeff Bezos – "Disagree and Commit" for Speed
At Amazon, Bezos promotes the idea of "disagree and commit":
- Make decisions quickly, even with incomplete information.
- Move forward fast, knowing you can adjust if needed.
- Avoid the paralysis of endless debate.
Quick action + flexible course-correction beats slow perfection.
How to Apply "Iterate Fast, Then Systematize"
✅ Step 1: Identify an Area You’re Overthinking
Ask yourself:
"Where am I stuck planning instead of acting?"
It could be launching a new product, testing a marketing idea, starting a project—anything.
✅ Step 2: Run a Fast, Small Test
Don’t wait weeks.
- Build a minimum viable version.
- Ship it to a small audience.
- Gather feedback immediately.
✅ Step 3: Refine Based on Reality
- Use feedback to improve.
- Drop what doesn’t work.
- Double down on what shows promise.
Keep iterating fast until you find something that clicks.
✅ Step 4: Systematize After Success
Only after you know what’s working:
- Automate it.
- Build repeatable processes.
- Scale it efficiently.
Don’t waste time scaling something before it’s proven.
🧠 Prompt to Apply Today
Where in your work can you test something today instead of planning it for weeks?
Pick one idea you’ve been sitting on.
- Launch a version today.
- Learn fast.
- Build the system later.
📚 Resources to Learn More
- Sam Altman on Fast Iteration – Blog
- Elon Musk on Testing and Speed – AMA
- Jeff Bezos on Decision Speed
Final Thought
In today's world, speed is a superpower.
The faster you test ideas, the faster you learn, the faster you win.Don’t aim for perfect. Aim for proven.
Then build the machine to scale it.🚀 Iterate fast. Refine fast. Systematize smartly.
-
@ c1e9ab3a:9cb56b43
2025-04-10 02:55:11The United States is on the cusp of a historic technological renaissance, often referred to as the Fourth Industrial Revolution. Artificial intelligence, automation, advanced robotics, quantum computing, biotechnology, and clean manufacturing are converging into a seismic shift that will redefine how we live, work, and relate to one another. But there's a critical catch: this transformation depends entirely on the availability of stable, abundant, and inexpensive electricity.
Why Electricity is the Keystone of Innovation
Let’s start with something basic but often overlooked. Every industrial revolution has had an energy driver:
- The First rode the steam engine, powered by coal.
- The Second was electrified through centralized power plants.
- The Third harnessed computing and the internet.
- The Fourth will demand energy on a scale and reliability never seen before.
Imagine a city where thousands of small factories run 24/7 with robotics and AI doing precision manufacturing. Imagine a national network of autonomous vehicles, delivery drones, urban vertical farms, and high-bandwidth communication systems. All of this requires uninterrupted and inexpensive power.
Without it? Costs balloon. Innovation stalls. Investment leaves. And America risks becoming a second-tier economic power in a multipolar world.
So here’s the thesis: If we want to lead the Fourth Industrial Revolution, we must first lead in energy. And nuclear — specifically Gen IV Small Modular Reactors (SMRs) — must be part of that leadership.
The Nuclear Case: Clean, Scalable, Strategic
Let’s debunk the myth: nuclear is not the boogeyman of the 1970s. It’s one of the safest, cleanest, and most energy-dense sources we have.
But traditional nuclear has problems:
- Too expensive to build.
- Too long to license.
- Too bespoke and complex.
Enter Gen IV SMRs:
- Factory-built and transportable.
- Passively safe with walk-away safety designs.
- Scalable in 50–300 MWe increments.
- Ideal for remote areas, industrial parks, and military bases.
But even SMRs will struggle under the current regulatory, economic, and manufacturing ecosystem. To unlock their potential, we need a new national approach.
The Argument for National Strategy
Let’s paint a vision:
SMRs deployed at military bases across the country, secured by trained personnel, powering critical infrastructure, and feeding clean, carbon-free power back into surrounding communities.
SMRs operated by public chartered utilities—not for Wall Street profits, but for stability, security, and public good.
SMRs manufactured by a competitive ecosystem of certified vendors, just like aircraft or medical devices, with standard parts and rapid regulatory approval.
This isn't science fiction. It's a plausible, powerful model. Here’s how we do it.
Step 1: Treat SMRs as a National Security Asset
Why does the Department of Defense spend billions to secure oil convoys and build fuel depots across the world, but not invest in nuclear microgrids that would make forward bases self-sufficient for decades?
Nuclear power is inherently a strategic asset:
- Immune to price shocks.
- Hard to sabotage.
- Decades of stable power from a small footprint.
It’s time to reframe SMRs from an energy project to a national security platform. That changes everything.
Step 2: Create Public-Chartered Operating Companies
We don’t need another corporate monopoly or Wall Street scheme. Instead, let’s charter SMR utilities the way we chartered the TVA or the Postal Service:
- Low-margin, mission-oriented.
- Publicly accountable.
- Able to sign long-term contracts with DOD, DOE, or regional utilities.
These organizations won’t chase quarterly profits. They’ll chase uptime, grid stability, and national resilience.
Step 3: Build a Competitive SMR Industry Like Aerospace
Imagine multiple manufacturers building SMRs to common, certified standards. Components sourced from a wide supplier base. Designs evolving year over year, with upgrades like software and avionics do.
This is how we build:
- Safer reactors
- Cheaper units
- Modular designs
- A real export industry
Airplanes are safe, affordable, and efficient because of scale and standardization. We can do the same with reactors.
Step 4: Anchor SMRs to the Coming Fourth Industrial Revolution
AI, robotics, and distributed manufacturing don’t need fossil fuels. They need cheap, clean, continuous electricity.
- AI datacenters
- Robotic agriculture
- Carbon-free steel and cement
- Direct air capture
- Electric industrial transport
SMRs enable this future. And they decentralize power, both literally and economically. That means jobs in every region, not just coastal tech hubs.
Step 5: Pair Energy Sovereignty with Economic Reform
Here’s the big leap: what if this new energy architecture was tied to a transparent, auditable, and sovereign monetary system?
- Public utilities priced in a new digital dollar.
- Trade policy balanced by low-carbon energy exports.
- Public accounting verified with open ledgers.
This is not just national security. It’s monetary resilience.
The world is moving to multi-polar trade systems. Energy exports and energy reliability will define economic influence. If America leads with SMRs, we lead the conversation.
Conclusion: A Moral and Strategic Imperative
We can either:
- Let outdated fears and bureaucracy stall the future, or...
- Build the infrastructure for clean, secure, and sovereign prosperity.
We have the designs.
We have the talent.
We have the need.What we need now is will.
The Fourth Industrial Revolution will either be powered by us—or by someone else. Let’s make sure America leads. And let’s do it with SMRs, public charter, competitive industry, and national purpose.
It’s time.
This is a call to engineers, legislators, veterans, economists, and every American who believes in building again. SMRs are not just about power. They are about sovereignty, security, and shared prosperity.
Further reading:
nostr:naddr1qqgrjv33xenx2drpve3kxvrp8quxgqgcwaehxw309anxjmr5v4ezumn0wd68ytnhd9hx2tczyrq7n2e62632km9yh6l5f6nykt76gzkxxy0gs6agddr9y95uk445xqcyqqq823cdzc99s
-
@ 0fa80bd3:ea7325de
2025-04-09 21:19:39DAOs promised decentralization. They offered a system where every member could influence a project's direction, where money and power were transparently distributed, and decisions were made through voting. All of it recorded immutably on the blockchain, free from middlemen.
But something didn’t work out. In practice, most DAOs haven’t evolved into living, self-organizing organisms. They became something else: clubs where participation is unevenly distributed. Leaders remained - only now without formal titles. They hold influence through control over communications, task framing, and community dynamics. Centralization still exists, just wrapped in a new package.
But there's a second, less obvious problem. Crowds can’t create strategy. In DAOs, people vote for what "feels right to the majority." But strategy isn’t about what feels good - it’s about what’s necessary. Difficult, unpopular, yet forward-looking decisions often fail when put to a vote. A founder’s vision is a risk. But in healthy teams, it’s that risk that drives progress. In DAOs, risk is almost always diluted until it becomes something safe and vague.
Instead of empowering leaders, DAOs often neutralize them. This is why many DAOs resemble consensus machines. Everyone talks, debates, and participates, but very little actually gets done. One person says, “Let’s jump,” and five others respond, “Let’s discuss that first.” This dynamic might work for open forums, but not for action.
Decentralization works when there’s trust and delegation, not just voting. Until DAOs develop effective systems for assigning roles, taking ownership, and acting with flexibility, they will keep losing ground to old-fashioned startups led by charismatic founders with a clear vision.
We’ve seen this in many real-world cases. Take MakerDAO, one of the most mature and technically sophisticated DAOs. Its governance token (MKR) holders vote on everything from interest rates to protocol upgrades. While this has allowed for transparency and community involvement, the process is often slow and bureaucratic. Complex proposals stall. Strategic pivots become hard to implement. And in 2023, a controversial proposal to allocate billions to real-world assets passed only narrowly, after months of infighting - highlighting how vision and execution can get stuck in the mud of distributed governance.
On the other hand, Uniswap DAO, responsible for the largest decentralized exchange, raised governance participation only after launching a delegation system where token holders could choose trusted representatives. Still, much of the activity is limited to a small group of active contributors. The vast majority of token holders remain passive. This raises the question: is it really community-led, or just a formalized power structure with lower transparency?
Then there’s ConstitutionDAO, an experiment that went viral. It raised over $40 million in days to try and buy a copy of the U.S. Constitution. But despite the hype, the DAO failed to win the auction. Afterwards, it struggled with refund logistics, communication breakdowns, and confusion over governance. It was a perfect example of collective enthusiasm without infrastructure or planning - proof that a DAO can raise capital fast but still lack cohesion.
Not all efforts have failed. Projects like Gitcoin DAO have made progress by incentivizing small, individual contributions. Their quadratic funding mechanism rewards projects based on the number of contributors, not just the size of donations, helping to elevate grassroots initiatives. But even here, long-term strategy often falls back on a core group of organizers rather than broad community consensus.
The pattern is clear: when the stakes are low or the tasks are modular, DAOs can coordinate well. But when bold moves are needed—when someone has to take responsibility and act under uncertainty DAOs often freeze. In the name of consensus, they lose momentum.
That’s why the organization of the future can’t rely purely on decentralization. It must encourage individual initiative and the ability to take calculated risks. People need to see their contribution not just as a vote, but as a role with clear actions and expected outcomes. When the situation demands, they should be empowered to act first and present the results to the community afterwards allowing for both autonomy and accountability. That’s not a flaw in the system. It’s how real progress happens.
-
@ 39cc53c9:27168656
2025-04-09 07:59:35The new website is finally live! I put in a lot of hard work over the past months on it. I'm proud to say that it's out now and it looks pretty cool, at least to me!
Why rewrite it all?
The old kycnot.me site was built using Python with Flask about two years ago. Since then, I've gained a lot more experience with Golang and coding in general. Trying to update that old codebase, which had a lot of design flaws, would have been a bad idea. It would have been like building on an unstable foundation.
That's why I made the decision to rewrite the entire application. Initially, I chose to use SvelteKit with JavaScript. I did manage to create a stable site that looked similar to the new one, but it required Jav aScript to work. As I kept coding, I started feeling like I was repeating "the Python mistake". I was writing the app in a language I wasn't very familiar with (just like when I was learning Python at that mom ent), and I wasn't happy with the code. It felt like spaghetti code all the time.
So, I made a complete U-turn and started over, this time using Golang. While I'm not as proficient in Golang as I am in Python now, I find it to be a very enjoyable language to code with. Most aof my recent pr ojects have been written in Golang, and I'm getting the hang of it. I tried to make the best decisions I could and structure the code as well as possible. Of course, there's still room for improvement, which I'll address in future updates.
Now I have a more maintainable website that can scale much better. It uses a real database instead of a JSON file like the old site, and I can add many more features. Since I chose to go with Golang, I mad e the "tradeoff" of not using JavaScript at all, so all the rendering load falls on the server. But I believe it's a tradeoff that's worth it.
What's new
- UI/UX - I've designed a new logo and color palette for kycnot.me. I think it looks pretty cool and cypherpunk. I am not a graphic designer, but I think I did a decent work and I put a lot of thinking on it to make it pleasant!
- Point system - The new point system provides more detailed information about the listings, and can be expanded to cover additional features across all services. Anyone can request a new point!
- ToS Scrapper: I've implemented a powerful automated terms-of-service scrapper that collects all the ToS pages from the listings. It saves you from the hassle of reading the ToS by listing the lines that are suspiciously related to KYC/AML practices. This is still in development and it will improve for sure, but it works pretty fine right now!
- Search bar - The new search bar allows you to easily filter services. It performs a full-text search on the Title, Description, Category, and Tags of all the services. Looking for VPN services? Just search for "vpn"!
- Transparency - To be more transparent, all discussions about services now take place publicly on GitLab. I won't be answering any e-mails (an auto-reply will prompt to write to the corresponding Gitlab issue). This ensures that all service-related matters are publicly accessible and recorded. Additionally, there's a real-time audits page that displays database changes.
- Listing Requests - I have upgraded the request system. The new form allows you to directly request services or points without any extra steps. In the future, I plan to enable requests for specific changes to parts of the website.
- Lightweight and fast - The new site is lighter and faster than its predecessor!
- Tor and I2P - At last! kycnot.me is now officially on Tor and I2P!
How?
This rewrite has been a labor of love, in the end, I've been working on this for more than 3 months now. I don't have a team, so I work by myself on my free time, but I find great joy in helping people on their private journey with cryptocurrencies. Making it easier for individuals to use cryptocurrencies without KYC is a goal I am proud of!
If you appreciate my work, you can support me through the methods listed here. Alternatively, feel free to send me an email with a kind message!
Technical details
All the code is written in Golang, the website makes use of the chi router for the routing part. I also make use of BigCache for caching database requests. There is 0 JavaScript, so all the rendering load falls on the server, this means it needed to be efficient enough to not drawn with a few users since the old site was reporting about 2M requests per month on average (note that this are not unique users).
The database is running with mariadb, using gorm as the ORM. This is more than enough for this project. I started working with an
sqlite
database, but I ended up migrating to mariadb since it works better with JSON.The scraper is using chromedp combined with a series of keywords, regex and other logic. It runs every 24h and scraps all the services. You can find the scraper code here.
The frontend is written using Golang Templates for the HTML, and TailwindCSS plus DaisyUI for the CSS classes framework. I also use some plain CSS, but it's minimal.
The requests forms is the only part of the project that requires JavaScript to be enabled. It is needed for parsing some from fields that are a bit complex and for the "captcha", which is a simple Proof of Work that runs on your browser, destinated to avoid spam. For this, I use mCaptcha.
-
@ 39cc53c9:27168656
2025-04-09 07:59:33Know Your Customer is a regulation that requires companies of all sizes to verify the identity, suitability, and risks involved with maintaining a business relationship with a customer. Such procedures fit within the broader scope of anti-money laundering (AML) and counterterrorism financing (CTF) regulations.
Banks, exchanges, online business, mail providers, domain registrars... Everyone wants to know who you are before you can even opt for their service. Your personal information is flowing around the internet in the hands of "god-knows-who" and secured by "trust-me-bro military-grade encryption". Once your account is linked to your personal (and verified) identity, tracking you is just as easy as keeping logs on all these platforms.
Rights for Illusions
KYC processes aim to combat terrorist financing, money laundering, and other illicit activities. On the surface, KYC seems like a commendable initiative. I mean, who wouldn't want to halt terrorists and criminals in their tracks?
The logic behind KYC is: "If we mandate every financial service provider to identify their users, it becomes easier to pinpoint and apprehend the malicious actors."
However, terrorists and criminals are not precisely lining up to be identified. They're crafty. They may adopt false identities or find alternative strategies to continue their operations. Far from being outwitted, many times they're several steps ahead of regulations. Realistically, KYC might deter a small fraction – let's say about 1% ^1 – of these malefactors. Yet, the cost? All of us are saddled with the inconvenient process of identification just to use a service.
Under the rhetoric of "ensuring our safety", governments and institutions enact regulations that seem more out of a dystopian novel, gradually taking away our right to privacy.
To illustrate, consider a city where the mayor has rolled out facial recognition cameras in every nook and cranny. A band of criminals, intent on robbing a local store, rolls in with a stolen car, their faces obscured by masks and their bodies cloaked in all-black clothes. Once they've committed the crime and exited the city's boundaries, they switch vehicles and clothes out of the cameras' watchful eyes. The high-tech surveillance? It didn’t manage to identify or trace them. Yet, for every law-abiding citizen who merely wants to drive through the city or do some shopping, their movements and identities are constantly logged. The irony? This invasive tracking impacts all of us, just to catch the 1% ^1 of less-than-careful criminals.
KYC? Not you.
KYC creates barriers to participation in normal economic activity, to supposedly stop criminals. ^2
KYC puts barriers between many users and businesses. One of these comes from the fact that the process often requires multiple forms of identification, proof of address, and sometimes even financial records. For individuals in areas with poor record-keeping, non-recognized legal documents, or those who are unbanked, homeless or transient, obtaining these documents can be challenging, if not impossible.
For people who are not skilled with technology or just don't have access to it, there's also a barrier since KYC procedures are mostly online, leaving them inadvertently excluded.
Another barrier goes for the casual or one-time user, where they might not see the value in undergoing a rigorous KYC process, and these requirements can deter them from using the service altogether.
It also wipes some businesses out of the equation, since for smaller businesses, the costs associated with complying with KYC norms—from the actual process of gathering and submitting documents to potential delays in operations—can be prohibitive in economical and/or technical terms.
You're not welcome
Imagine a swanky new club in town with a strict "members only" sign. You hear the music, you see the lights, and you want in. You step up, ready to join, but suddenly there's a long list of criteria you must meet. After some time, you are finally checking all the boxes. But then the club rejects your membership with no clear reason why. You just weren't accepted. Frustrating, right?
This club scenario isn't too different from the fact that KYC is being used by many businesses as a convenient gatekeeping tool. A perfect excuse based on a "legal" procedure they are obliged to.
Even some exchanges may randomly use this to freeze and block funds from users, claiming these were "flagged" by a cryptic system that inspects the transactions. You are left hostage to their arbitrary decision to let you successfully pass the KYC procedure. If you choose to sidestep their invasive process, they might just hold onto your funds indefinitely.
Your identity has been stolen
KYC data has been found to be for sale on many dark net markets^3. Exchanges may have leaks or hacks, and such leaks contain very sensitive data. We're talking about the full monty: passport or ID scans, proof of address, and even those awkward selfies where you're holding up your ID next to your face. All this data is being left to the mercy of the (mostly) "trust-me-bro" security systems of such companies. Quite scary, isn't it?
As cheap as $10 for 100 documents, with discounts applying for those who buy in bulk, the personal identities of innocent users who passed KYC procedures are for sale. ^3
In short, if you have ever passed the KYC/AML process of a crypto exchange, your privacy is at risk of being compromised, or it might even have already been compromised.
(they) Know Your Coins
You may already know that Bitcoin and most cryptocurrencies have a transparent public blockchain, meaning that all data is shown unencrypted for everyone to see and recorded forever. If you link an address you own to your identity through KYC, for example, by sending an amount from a KYC exchange to it, your Bitcoin is no longer pseudonymous and can then be traced.
If, for instance, you send Bitcoin from such an identified address to another KYC'ed address (say, from a friend), everyone having access to that address-identity link information (exchanges, governments, hackers, etc.) will be able to associate that transaction and know who you are transacting with.
Conclusions
To sum up, KYC does not protect individuals; rather, it's a threat to our privacy, freedom, security and integrity. Sensible information flowing through the internet is thrown into chaos by dubious security measures. It puts borders between many potential customers and businesses, and it helps governments and companies track innocent users. That's the chaos KYC has stirred.
The criminals are using stolen identities from companies that gathered them thanks to these very same regulations that were supposed to combat them. Criminals always know how to circumvent such regulations. In the end, normal people are the most affected by these policies.
The threat that KYC poses to individuals in terms of privacy, security and freedom is not to be neglected. And if we don’t start challenging these systems and questioning their efficacy, we are just one step closer to the dystopian future that is now foreseeable.
Edited 20/03/2024 * Add reference to the 1% statement on Rights for Illusions section to an article where Chainalysis found that only 0.34% of the transaction volume with cryptocurrencies in 2023 was attributable to criminal activity ^1
-
@ f7f4e308:b44d67f4
2025-04-09 02:12:18https://sns-video-hw.xhscdn.com/stream/1/110/258/01e7ec7be81a85850103700195f3c4ba45_258.mp4
-
@ 502ab02a:a2860397
2025-04-17 05:45:09วันก่อนเฮียไปเดินห้าง เดินไปเจอชั้นขายน้ำมันพืช มีน้ำมันรำข้าววางโชว์อยู่หน้าสุด พร้อมคำโปรยที่ดูแพงกว่าขวดซะอีก ตัวเลขข่มกันมาเข้มๆเลย ระดับหมื่นๆหน่วยทั้งนั้น “มีแกมมาออไรซานอล ลดคอเลสเตอรอล” “มีวิตามินอีสูง” “ทนความร้อนได้ดีเยี่ยม เหมาะกับทุกเมนูทอด” “น้ำมันสุขภาพ คนรักหัวใจควรมีไว้ประจำบ้าน”
เฮียยืนอ่านแล้วก็ได้แต่ยิ้ม…
ว่าด้วย Oryzanol ...ของดีจริงเหรอ? อันนี้เป็นไม้เด็ดของฝั่งที่เชียร์น้ำมันรำข้าวเลยเฮีย เขาบอกว่า แกมมาโอริซานอล (γ-Oryzanol) เนี่ย เป็นสารต้านอนุมูลอิสระที่ช่วยลดคอเลสเตอรอลในเลือด ฟังแล้วรู้สึกเหมือนกินแล้วหลอดเลือดจะสะอาดเหมือนพื้นห้องน้ำที่เพิ่งขัดเสร็จ แต่...อย่าเพิ่งรีบวางใจ เพราะงานวิจัยที่ว่าแกมมาโอริซานอล ลดคอเลสเตอรอลเนี่ย ส่วนใหญ่ใช้ “สารสกัดเข้มข้น” ในขนาดโดสระดับ 300-600 มิลลิกรัมต่อวัน ย้ำนะว่า สารสกัดเข้มข้น
ทีนี้เรามาดูกันไหมว่าที่ฉลากบอกว่ามี โอริซานอล 12,000 ppm ที่ดูเยอะแยะมากมายจนเราว๊าววววววกันนั้น ppm มันคืออะไรวะ? ppm (parts per million) แปลว่า “ส่วนในล้านส่วน” ในกรณีของของเหลวอย่างน้ำมัน 1 ppm = 1 มิลลิกรัม ต่อ 1 ลิตร ดังนั้น 12,000 ppm = 12,000 mg/ลิตร หรือก็คือ 12 กรัม ต่อน้ำมัน 1 ลิตร ถ้าเรากินน้ำมันแค่ “1 ช้อนโต๊ะ” (ประมาณ 15 มล.) ที่มี γ-Oryzanol 12,000 ppm จะมี γ-Oryzanol ประมาณ 180 mg สิ่งที่ร่างกายได้รับระหว่างที่ผสมในน้ำมัน กับ "สารสกัดเข้มข้น" ในการทดลอง มันคนละบริบทกัน แต่เอามาเคลมกัน???
ซึ่งเฮียบอกเลยว่า…เวลาเขาเคลมข้อดีมักจะดึงมาเป็นข้อๆ แต่ร่างกายมันเป็นเรื่องโยงใยอีรันพันตู คือก่อนที่คอเลสเตอรอลจะลด ตับเรานี่แหละจะรับไม่ไหวก่อน เพราะน้ำมันรำข้าวเป็นไขมันชนิดไม่อิ่มตัวหลายตำแหน่ง (PUFA) สูง ซึ่งถ้ารับเข้าไปในปริมาณมาก จะเพิ่มภาระให้ตับในการกำจัดสารอนุมูลอิสระและควบคุมสมดุลไขมันในเลือด ตับต้องทำงานหนักขึ้นเสมือนต้องล้างน้ำมันเครื่องเก่า ๆ ทุกวัน นานไปตับอาจเสื่อม ไม่สดใสเหมือนตอนกินไก่ต้มร้านประจำ
จริงอยู่ที่มีงานวิจัยบอกว่า γ‐oryzanol หรือที่เรียกกันว่า ออริซานอล เนี่ย สามารถช่วยลดการอมน้ำมันของอาหารทอดได้บ้าง โดยเปลี่ยนโครงสร้างของอาหารและสมบัติทางกายภาพของน้ำมัน ทำให้เฟรนช์ฟรายส์ที่ทอดออกมาน้ำมันเกาะน้อยลง เหมือนฟังดูดีใช่ไหมเฮีย?
แต่เฮียอยากชวนคิดอีกมุมว่า… ถ้าการจะทำให้อาหาร “ไม่อมน้ำมัน” ต้องอาศัยการ “เติมสารเคมี” เข้าไปเพื่อไปเปลี่ยนโครงสร้างของน้ำมัน แล้วนั่นยังเรียกว่า "ดีต่อสุขภาพ" ได้อยู่ไหม?
เพราะอย่าลืมว่า γ‐oryzanol ไม่ได้เป็นสารที่อยู่ในน้ำมันรำข้าวดิบ ๆ แบบธรรมชาติในปริมาณสูงพออยู่แล้ว ผู้ผลิตหลายเจ้าเลยต้อง เติมเพิ่มเข้าไปทีหลัง และการเติมสารเพิ่มในอุตสาหกรรมอาหารเนี่ย ไม่ได้มีฟรีนะ มันมีคำถามตามมาว่า เติมเท่าไหร่ถึงจะพอดี? เติมแบบนี้แล้วร่างกายดูดซึมได้แค่ไหน? สะสมในร่างกายไหม? และสุดท้าย... สารนี้จริง ๆ แล้ว “มีความจำเป็น” ต่อร่างกายหรือเปล่า?
เฮียบอกตรง ๆ ว่า ร่างกายคนเรา ไม่ได้ต้องการ γ‐oryzanol ในชีวิตประจำวันเลย มันไม่ใช่สารจำเป็นเหมือนวิตามิน หรือแร่ธาตุใด ๆ และก็ไม่มีหลักฐานชัดเจนในคนว่า การบริโภคต่อเนื่องในระยะยาวจะ ไม่มีผลข้างเคียง โดยเฉพาะเมื่อต้องโดนความร้อนสูง ๆ ซ้ำ ๆ ในการทอด แล้วอีกเรื่องที่ต้องไม่ลืมคือ…
น้ำมันรำข้าวเองเป็นน้ำมันที่มี กรดไขมันไม่อิ่มตัวสูงมาก โดยเฉพาะพวกโอเมก้า 6 ซึ่งถ้าเราโดนความร้อนสูงบ่อย ๆ อย่างการทอด มันจะเสื่อมสภาพเร็ว เกิดสารอนุมูลอิสระง่าย ซึ่งสารพวกนี้แหละที่เป็นต้นเหตุของการอักเสบเรื้อรังในร่างกาย ดังนั้นเวลาใครบอกว่า "โอเคนะ ใช้ได้ เพราะใส่สารช่วยป้องกันแล้ว" มันก็ควรถามกลับเหมือนกันว่า...แล้วทำไมเราไม่เริ่มจากใช้น้ำมันที่ทนความร้อนได้ดีตั้งแต่แรก???? มันก็เหมือนการแต่งหน้าซ่อนสิวโดยไม่รักษาสิวนั่นแหละ ดูดีขึ้นแค่ผิวเผิน แต่ต้นเหตุยังอยู่ครบ
เฮียอยากให้เพื่อน ๆ ฟังแล้วไม่ต้องรีบตัดสินใจอะไรทันที แค่ลองฟังอีกด้านไว้ แล้วค่อย ๆ คิด ว่าการกินอาหารเพื่อสุขภาพเนี่ย เราจะเลือกของที่ดูดีจากโฆษณา หรือของที่ “ร่างกายใช้ประโยชน์ได้จริง” โดยไม่ต้องพึ่งสารสังเคราะห์อะไรเลย
วิตามินอีสูง...แล้วไงต่อ? เค้าก็อ้างว่าน้ำมันรำข้าวมีวิตามินอีเยอะ เป็นสารต้านอนุมูลอิสระ จริงอยู่ วิตามินอีมีอยู่ในน้ำมันพืชหลายชนิด แต่เฮียขอเล่าให้ฟังแบบไม่อ้อมค้อมนะ…น้ำมันรำข้าวที่เราซื้อในท้องตลาด เขาเอารำข้าวไปผ่านกระบวนการ สกัดด้วยตัวทำละลายเฮกเซน (Hexane) ผ่านความร้อนสูงระดับ 200-270 องศาเซลเซียส แล้วก็ ฟอกกลิ่น ฟอกสี ให้มันดูใส ๆ น่ากิน
ปัญหาคือ…วิตามินอี กับสารต้านอนุมูลอิสระที่เขาว่า “มีสูง” มันพังไปกับความร้อนและกระบวนการผลิตตั้งแต่ช่วงแรก ๆ แล้ว เพราะวิตามินอีเป็นสารที่ไวต่ออุณหภูมิสูงมาก พอเจอความร้อนสูงแบบนั้น ก็กลายเป็นเหมือนซุปเปอร์ฮีโร่ที่หมดพลังกลางฉากแอ็กชัน
บางแบรนด์เลยต้องเติมวิตามินอีกลับเข้าไปทีหลัง ทั้งเพื่อ “เพิ่มคุณค่าทางโภชนาการ” ให้เอาไปโฆษณาได้ และ เพื่อช่วยป้องกันการเหม็นหืน ของน้ำมันที่ไวต่อปฏิกิริยาออกซิเดชัน เพราะน้ำมันรำข้าวที่อุดมไปด้วย PUFA จะเหม็นหืนเร็ว ถ้าไม่มีสารต้านอนุมูลอิสระไปจับ เรียกว่าเติมเพื่อให้ดูดีทั้งต่อสุขภาพและต่อกลิ่น (แม้สุขภาพอาจไม่ได้ดีจริง…)
ทนความร้อนได้ดี? เหมาะกับการทอด? อันนี้ต้องแซวแรงนิดนึง... เพราะเขาชอบโฆษณาว่า “เหมาะกับการทอดเพราะทนความร้อนได้ดี” บ้าบอ ในความจริง น้ำมันรำข้าวเป็น Polyunsaturated fat (PUFA) สูง แม้จะมีโมเลกุลอิ่มตัวบ้าง แต่ไม่มากพอจะสู้ความร้อนจริงจังได้ เวลาโดนทอดร้อน ๆ ไขมันเหล่านี้มัน กลายพันธุ์ เป็นไขมันออกซิไดซ์ ไม่ต้องไปบอกเลยว่าให้สลัดน้ำมัน กรรมมันเกิดไปแล้ว
น้ำมันรำข้าวคือน้ำมันพืชที่มี กรดไขมันไม่อิ่มตัวเชิงซ้อน (PUFA) สูง โดยเฉพาะ โอเมกา-6 (linoleic acid) ซึ่งถ้าเทียบให้เห็นภาพแบบเฮีย ๆ PUFA ก็คือคนขี้น้อยใจ โดนแดดนิด โดนไฟหน่อย ก็เป็นอารมณ์ บูดเสียง่าย คือไม่เหมาะจะโดนผัด โดนทอด เพราะมันจะกลายร่างเป็น อนุมูลอิสระ แล้ววิ่งวุ่นในร่างกายเราเหมือนคนเสียสติ
แล้วที่บอกว่าช่วยเรื่องหัวใจ? เรื่องนี้ก็น่าสนใจ เพราะเขาชอบพูดว่า “น้ำมันรำข้าวช่วยลดความเสี่ยงโรคหัวใจ” ซึ่งจริง ๆ มาจากแนวคิดเก่าว่า “ถ้าลดไขมันอิ่มตัว แล้วหันมากินไขมันไม่อิ่มตัวจากพืช จะช่วยลดคอเลสเตอรอล และหัวใจก็จะดีขึ้น”
ฟังดูเข้าท่าใช่ไหม...แต่รู้ไหมว่าทุกวันนี้ งานวิจัยใหม่ ๆ เริ่มพบว่า การลดไขมันอิ่มตัวไม่ได้ลดความเสี่ยงโรคหัวใจ อย่างที่เคยคิด และกลับกัน…ไขมันจากสัตว์ที่มาจากอาหารแท้ อย่างเนยแท้ น้ำมันหมู น้ำมันมะพร้าว กลับมีผลดีต่อสุขภาพหัวใจมากกว่า เพราะไม่สร้างการอักเสบในร่างกาย (พูดในมุม cooking oil นะ ถ้าสกัดเย็นพวก มะกอก มะพร้าว มะคาเดเมีย งา ฯลฯ นั่นเป็นเรื่องของสารพฤกษะและพลังงานประกอบ มันจะอีกศาสตร์นึง อย่าเพิ่งปนกันถ้ายังไม่ได้ลงลึก เพราะถ้าเอาสกัดเย็นมาโดนร้อนก็เจ๊งบ๊ง เคลียร์นะ)
ในขณะที่ไขมันไม่อิ่มตัวสูงอย่าง PUFA จากน้ำมันพืชกลับเพิ่มการอักเสบเรื้อรัง ซึ่งเป็นต้นตอของโรคหัวใจ เบาหวาน สมองเสื่อม และโรคเรื้อรังแทบทุกชนิด
แถมกับคำถามหลังไมค์ การที่จะบอกว่า "น้ำมันรำข้าวอมน้ำมันมากกว่าแต่กรดไขมันเขาดีกว่าน้ำมันปาล์มนะ" ฟังเผิน ๆ เหมือนเลือกความดีระยะยาวแลกกับความอ้วนระยะสั้น แต่เดี๋ยวก่อนเฮียอยากให้มองอีกด้าน... 1. กรดไขมันไม่อิ่มตัวที่ว่า “ดี” ในทางทฤษฎีนั้น ถ้าอยู่เฉย ๆ บนชั้นวาง ก็อาจจะดูดีอยู่หรอก แต่พอเจอไฟร้อน ๆ ตอนทอดหรือผัด สารพวกนี้เสื่อมสภาพง่ายมาก กลายเป็นสารออกซิไดซ์ที่ทำร้ายหลอดเลือดเราแบบไม่รู้ตัว กลายเป็น "ไขมันดีพัง ๆ" ได้ทันที 2. น้ำมันที่อมน้ำมันเยอะ หมายถึงอาหารเราจะดูดน้ำมันเข้าไปเยอะ ซึ่งเท่ากับเรากินเข้าไปเยอะโดยไม่รู้ตัว ปริมาณโอเมก้า 6 ก็พุ่งสูง แล้วพอระดับโอเมก้า 6 ในร่างกายสูงขึ้นมากเกินสมดุล มันจะกระตุ้นการอักเสบในร่างกาย = ต้นเหตุของสารพัดโรคยุคใหม่เลยนะ 3. สุดท้าย ถ้าเราต้องแลกกับการใช้น้ำมันที่ต้องพึ่ง "สารเติมแต่ง" อย่างโอริซานอล เพื่อให้อาหารไม่อมน้ำมันเกินไป แบบนี้ก็เหมือนซื้อของแพงแล้วต้องซื้อตัวช่วยเพิ่ม เพื่อให้มันใช้งานได้ดีขึ้น แบบนี้เรียกว่าดีจริงหรือเปล่า? เหมือนคนหน้าตาดีแต่ใช้เงินเก่ง... สุดท้ายเป็นหนี้เหมือนกัน
น้ำมันรำข้าวที่ผ่านกระบวนการมากมาย มันกลายเป็น “Fiat Food” ที่หน้าตาดูดี แต่คุณค่าข้างในเบาหวิว เหมือนแบงก์กระดาษที่พิมพ์ออกมาเยอะ แต่ไม่มีทองรองรับ
ที่สำคัญคือ มันไม่ใช่แค่เรื่อง "กินมากไปไม่ดี" หรอกนะ
บทความกูรูหลายเจ้าชอบสรุปว่า “อย่ากินเยอะ” กินแบบใส่เพื่อผัดอาหารน้อยๆ อืมมม คือพี่ครับ น้ำมันพืชมันไม่ได้เป็นแค่ขวดที่เราซื้อในซูเปอร์ แต่มันเป็น วัตถุดิบหลักของร้านอาหาร ผัดกระเพราเจ้าโปรด กล่องเบนโตะข้างออฟฟิศ ขนมทอดกรอบทุกซอง แถมยังถูกแปะฉลากคำว่า “ดีต่อสุขภาพ” เพื่อให้เรารู้สึกผิดน้อยลงตอนกินของทอดอีกต่างหาก แถมเวลาเราทำกินเอง บางอย่างมันใส่มากกว่า 1ช้อนโต๊ะ ตามหน่วยบริโภคนะ แถม แต่ปัญหาใหญ่คือ PUFA จากน้ำมันพืชเหล่านี้ สะสมในเนื้อเยื่อไขมันเราแบบยาวนาน ไม่ได้หายไปง่าย ๆ แบบอกไก่ต้มหลังออกกำลังกาย ถึงจะกินแค่การผัดกับข้าวจานละ 1ช้อนก็เหอะ วันนั้นกินกับข้าวกี่กระทะ???
มันแทรกตัวเข้าไปในเยื่อหุ้มเซลล์ และกลายเป็น ตัวจุดไฟอักเสบเรื้อรังในร่างกาย เบาหวาน ความดัน มะเร็ง ไขมันพอกตับ อาจไม่ได้มาพร้อมสายฟ้า แต่ค่อย ๆ สะสมทีละหยดเหมือนน้ำมันในกระทะ
อย่าให้คำว่า “มีสารต้านอนุมูลอิสระ” มาหลอกเรา เพราะสุดท้าย ถ้าโครงสร้างไขมันมัน ไม่เสถียรตั้งแต่ต้น ต่อให้มีวิตามิน E ติดมานิด ๆ หน่อย ๆ มันก็เหมือนใส่หมวกกันน็อกให้ตุ๊กตา แล้วเอาไปนั่งมอเตอร์ไซค์วิบาก
น้ำมันรำข้าวไม่ใช่ปีศาจ แต่ก็ไม่ใช่นางฟ้า และเมื่อมันเป็นน้ำมันที่ร่างกายเราไม่ได้ออกแบบมาเพื่อรองรับมัน ก็อย่าหลงกลคำโฆษณาว่า "ดีต่อหัวใจ" หรือ “มีสารต้านอนุมูลอิสระ” แล้วเทมันใส่กระทะทุกวันเลยนะ
ก็เข้าใจแหละว่าเวลาคนทำอาหารเองที่บ้าน เขาจะรู้สึกว่า “ทอดเอง คุมได้ ทอดแค่รอบเดียว ไม่ได้ใช้ซ้ำ ไม่เป็นไรหรอก” แล้วก็หยิบ น้ำมันรำข้าว มาด้วยเหตุผลว่า “โปรไฟล์กรดไขมันมันดีกว่าน้ำมันปาล์ม” …ฟังดูเหมือนมีเหตุมีผล แต่เฮียอยากให้ลองมองอีกมุมนะ
น้ำมันรำข้าวมีกรดไขมันไม่อิ่มตัวสูงก็จริง แต่นั่นแหละคือปัญหา เพราะความไม่อิ่มตัวทำให้ ไม่เสถียรต่อความร้อน โดยธรรมชาติ! ถึงจะทอดรอบเดียว พอน้ำมันเจอไฟแรง ๆ มันก็ยังเสื่อมสภาพอยู่ดี เกิดสารอนุมูลอิสระที่มองไม่เห็น แต่ร่างกายเราเห็นหมด แล้วถ้าคนในบ้านกินบ่อย ๆ วันเว้นวัน จะรู้ตัวอีกทีก็อาจจะมีอาการอักเสบเรื้อรังโดยไม่รู้ต้นตอเลยก็ได้
ส่วนที่บอกว่าอาหารอมน้ำมันก็ไม่เป็นไร แค่รอหายร้อนแล้วซับออก หรือเอาเข้าหม้อลมร้อน มันช่วยได้ “บางส่วน” จริง แต่ไม่ได้แก้ที่ต้นเหตุ เพราะไขมันที่เข้าไปอยู่ในชั้นแป้งหรือเนื้อของอาหารมันออกยากกว่าที่คิด และถ้าเราต้อง “พึ่งวิธีรีดน้ำมันออก” ทุกครั้งที่ทอด นั่นแปลว่าน้ำมันที่ใช้มันอมน้ำมันเกินไปตั้งแต่แรกแล้ว ไม่ใช่หรือ?
“ทอดรอบเดียวก็จริง แต่ถ้าน้ำมันมันพังตั้งแต่โดนไฟ แล้วจะต่างอะไรกับทอดสิบรอบ?”
ท้ายของท้ายสุด เรื่องทอดไม่ใช่แค่เรื่องน้ำมัน แต่มีเรื่อง AGEs ด้วยซึ่งสำคัญกว่าใช้น้ำมันอะไรทอดเยอะเลยครับ นี่เขียนเพื่อบันทึกรายละเอียดของน้ำมันรำข้าวให้เฉยๆ
#pirateketo #ฉลาก3รู้ #กูต้องรู้มั๊ย #ม้วนหางสิลูก
-
@ 5188521b:008eb518
2025-04-08 13:33:42Ecology
When my father died, an entire ecosystem system of beneficiaries withered. Moussa Ag El Khir funded scholarships and community projects, paying thousands of Dinars monthly to stop the oasis town of In Salah from burning up. The few families we knew operating outside the oil-field economy would be forced to flee to the Mediterranean coast, along with just about every other Berber.
It wasn’t unexpected. My father had cystic fibrosis for all sixty-one years of his life. So far, that’s the only legacy he’s passed on to his children. My brothers are just carriers, but me, his precious daughter ended up like him in more ways than one.
We sat there in the lawyer’s office in Algiers, my brothers and I, staring at the ledger which contained payment for his life’s work.
“And he only left one word in his will?” asked Ibrahim for the third time. Ecology.
The lawyer said Moussa was very clear. He chose each of the keys himself. The contents of the ledger would belong to whoever could decode his life — those who understood the real meaning. Then he cut all communications and walked into the Sahara. The Tuareg caravan on the road to Akabli found his body a week later, reddened by sand burn.
Earth
We made an agreement that day. To share each word we discovered. We could break the code together. Of course, Ibrahim and Hama didn’t share anything. We barely speak. That’s what happens when one child follows their father into science, and her two brothers move to France the minute they get rich enough to buy a wife. I bet they spent longer looking into legal loopholes to get their hands on my father’s assets than they did trying to identify the keys.
That day was the start of my second life, and I went from research assistant at a regional university to private-key detective. 2048 words and few clues where to start. Although I was 27, I was virtually a grandmother according to the In Salah wives. But of course, I could never be a grandmother, or even a mother. Every night, I scoured photos in the family archive. An initial sweep of his digital footprint returned no out-of-place instances of any keywords.
It took me a year to find the GPS tag he’d added to one photo — an eighteen-year-old daughter standing next to a father proud of his first infinite solar prototype. The panel has long-since been torn out by the oil corp, but the base is still there. I drove the three kilometres from the town limit and shone the high beams at the spot. When I got out, the air was cool but still thick with sand. A few more steps through sinking dunes, and I saw it. He’d scratched a little globe into the blistered metal, and for a moment, my mucus-laden lungs tasted clear air.
Trigger
The next word took three years. Friends, contacts, professors, biographers — visits to anyone with whom he might have left a clue. But it was in the In Salah hospital, where, upon a routine CF checkup with Jerome Devailier, a French doctor, ‘trigger’ appeared. The government might stack everything against the desert peoples, but they hadn’t taken away healthcare. I’d been living off the kindness of neighbours while finishing my thesis on the very solar technology my father developed. How could he have known the ‘buyer’ was just a tendril of the very oil company he sought to defeat.
Dr Devalier went through the list of carcinogens and allergens to avoid with my new drugs. Over forty triggers which could be my downfall. If I was lucky, I’d live as long as my father did.
By then, my research stipend was long gone. I existed on toughened bread and soup, which always carried the taste of the scorched city air. Yet, I stayed. The public library, disconnected from the grid by the oil corp, was where I finished my manuscript. They would fight its publication. Since father’s money no longer flowed into the town, many had deserted me. There were those who said he killed an entire people by selling his solar patent to the wrong buyers. Others in In Salah worshipped his name, but eventually, they all trudged north to the cities. My brothers sold the family home from under me, forcing me to follow.
When I returned from the hospital, I dug out my father’s medical documents. On every page, the word ‘trigger’ was underlined. That was the moment I knew my life’s work would be unlocking the ledger, not publishing studies on long-dead solar panel technology. That battle was lost.
They
All we need is a simple document, but here, it is the administrators’ job to send people away. Physical copies are only issued in extreme circumstances. Citizens’ Registry screens played endless repetitions of how to apply for digital documents. The shrill voices of family members desperate for the original copy of a pirated document drowned the TV messaging. Women removed headscarves and revealed thick black hair; teenagers paced. The atmosphere thickened with sweat. And hours passed. Each appointment required a reset of digital protocol, biometric tests, and identity cards from legal descendents. Through counterfeit identities, our Dinars leak into the hands of criminals, but still the government denies the need for bitcoin. They just print more money. They is the word my father used for the government that fought his patent so hard.
After a four-hour wait, I discovered that the physical death certificate included an ‘identifying mark’ on the deceased’s body. The ink was fresh — etched into the shoulder blade of a man who wished to turn his back on the government that ignored its people. The tattoo read aqqalan, the Tamasheq word for they.
Scheme
It took two trips to his cluttered Marseille office to convince him I was serious. Two visas, two flights, and the small amount from the sale of the family house. But few detectives wanted to work for a promise.
The ledger could not legally be owned in Algeria, and Laurent Mercier was the only serious professional who entertained a percentage of what was on there. The solar tech patent and documents from my father were enough to start Laurent on the trail. ‘Preliminary,’ he said, until I had the ledger in my possession.
“Flying is not easy with my condition,” I said.
He lowered his sunglasses. “Working is not easy without money.”
Contact with my brother through the lawyer in Algiers was achingly slow, but eventually they agreed to give me possession. What was 33% of nothing anyway? Years had gone by.
So, when I sat for the second time, in the sweaty office in Marseille, I gave Laurent the ledger, and he handed me a surprise. In all his business affairs, my father used little English, but the word ‘scheme’ appeared in all three company names he incorporated in the last three years of his life. We had our fifth word, and I finally had someone on my side.
Make
Some days, I could barely walk to the public library. I became lethargic and mostly sat in the cool dark of my room in the shelter. The government refused to provide housing outside of Algiers, but a Tuareg organisation from Mali opened a shelter in In Salah. Bulging eyes and faded clothes stared back in the mirror each day. How long had it been since I’d been to a wedding, or celebrated a friend’s child? Occupants came and went, and all that was left was a barren room and one meal per day.
As the sun punished the city with every ray of Allah’s untapped gift, streets grew thick with dust, and the local government fell, seat by seat, to oil execs. The only transport running was to and from the oil fields, which belched the remnants of the land into the sky. And still they worked. Still they sat on my father’s patent and refused to supply the world with efficient solar power.
With little else to cling onto, I harboured thoughts of how I could spend the ledger money. Fixing the town and replanting lost gardens. Bringing people back. That all took a back seat to decoding the message my father was sending. Laurent and I began to believe that the keys he chose formed some sort of instruction for his legacy.
Ten years to the day after his death, I was in the public library, looking for clues in an English history book. On my exit, the librarian stopped me.
“We have a gift for you, Kana.”
I waited while he fetched a package.
“Your father instructed me to give this to you. But not before this date.”
My hands tore open the package. More books, technical manuals, and hand-written notes. Amongst the papers was a tasselled leather bookmark embossed with the four letters that comprised one of the seven missing words. Make.
Citizen
It’s hard for a father in Algeria to admit to his daughter that she is his spirit — the heir to his life’s work. Of course he felt terrible guilt after our mother’s passing. That was when the letters started.
Moussa wrote to himself really, trying to come to terms with bringing a protégé into the world with a bright scientific mind and lungs that would snap her life expectancy. We communicated by letter for the last few years of his life — sharing the breakthroughs of his findings and what it might mean for our decaying oasis town. Analogue writing was the only real privacy, he said. His letters always ran to the same length, as if they were one lesson divided into equal chunks. We even exchanged letters during his last hospitalisation in Algiers. Those words were the only real strength I gained.
It was Laurent who analysed the letters with a new text scanning tool. For me, my father’s last letters were advice, regret, pain, and love, but to Laurent, they were simply a puzzle to solve to get one step closer.
Our letters gave Laurent the idea to communicate via physical mail. The process was painful, with letters sent from outlying towns before being shipped across the Alboran Sea and up into France. Muatin was one name my father called me. Like him, I dreamed of helping many through science. This was one of the few Arabic words in the French letters he wrote. It was also the only keyword included in any of the letters. Citizen.
When
Years of quiet followed. In Salah became unlivable after they co-opted the city reservoir for cooling drilling rigs. Each study that proved the field was still viable funnelled funds away from the locals who clung on. Resettlement benefits went up, and all but the semi-nomadic Tuaregs left. I followed. My health could not take much more desert. In the cooler coastal plains, I recovered strength, and subsidies for new medications helped me survive on a meagre teaching salary.
With no further clues, my Marseillais detective lost interest. His last letter, sent years ago, stated with unusual brevity that he was resigning the case. No payment was due.
I had lost my health, my father, his work, my money, our house, the town, and I spent each week delivering science and English classes to teenagers. They had no more hope for our country than I had. Algerians had already lost the Sahara. A one-degree temperature shift each decade of my life had shrunk Africa and sent its peoples northwards.
My father’s word puzzle occupied my thoughts. The combinations and permutations of letters and characters had millions of possible meanings but only one correct answer. Yet simple linguistic logic provided the next word. The headteacher was a linguist — a profession long lost to the higher-powered text analysers and language AI. He spoke little English but asked about the categorisations of grammatical terms in the 2048 key words.
“Why do you ask?”
“Because,” he said, “for a sentence of twelve words, at least one conjunction is necessary to form a second clause.”
He was right. I had been focussing on lists and complex codes to build my father’s motto. When I got home, I furiously searched my list of terms for conjunctions. I found only one. ‘When.’
Can
The permutations were still huge. Even eliminating some of the more conceptual words did not help. Millions of sentences existed in my dead father’s mind. Millions of meanings, all lost to the need for more energy to fund the world’s great thirst for energy. Still, the panels in most of the ‘dead middle’ (as the space between the tropics became known) melted at over 50 degrees.
I was back in Paris for CF treatment. As a young woman, I would have been pleased to make fifty years. But the realities of daily visits and the sickness brought on by medication stung. I wanted things to end, even when I discovered the next key.
It had been years since I had dreamed of the freedoms my father’s fortune could bring. Parts of Asia held out against bitcoin, but the cost of countries doing business off-network had become prohibitive. Eventually, the fossil conglomerates would give in to the need for solar mining and the provision of universal energy.
It was in a Parisian hospital bed that I discovered ‘can.’ My wardmate, a rough labourer from Oran, found a biography in the hospital library that made me sit up straight. ‘Can’ was repeated in almost every description of my father in his one-time business partner’s book. And it was this Arabian ‘businessman,’ Abdulkarim Rahman, who brokered the deal that robbed the world of infinite solar power. Each page mocked my father as believing only physical impossibilities are impossible. He branded him the ‘can man.’
Drastic
During my recuperation, I spent the final two weeks of my visa stay in Marseille. My days passed with endless algorithm tweaks to reject or accept word orders for the elusive twelve-word sentence my father once wrote.
Food lost its taste, and friends and colleagues in academia had scattered. In-person meetings were often contained to the night hours, but Marseille was not a place to go out after dark. The latest protests had gotten violent, and the government looked likely to topple. My people had always been resilient, but when the option to move and operate a caravan was removed by General Hafiz, part of my spirit died. I resolved to spend my final years in In Salah, however uncomfortable they would be.
My final port of call before returning was Laurent’s office. The eTaxi cast me out into the dusty street, and I wheezed as I climbed the three flights of stairs to his tiny door on Rue Marché. We hadn’t spoken in years, but I was surprised to find a different name about the door. Pascale Dupont, Investigateur.
The assistant I remembered was quite the opposite to Laurent — slow and methodical, short and heavy set.
“Madame,” he said. “I have difficult news.”
Their business had always straddled the law, but I never imagined an ex-officer of the law could be convicted of treason.
“A closed-door trial,” said Pascale. Then he handed over an air-gapped 3D storage file. “Laurent knew you would come for this.”
My mind cast forward to the reams of information he must have built on my father. The patents and technical diagrams he illegally acquired and other clues. I instantly recognised the brand of storage file as a keyword. Drastic.
“How can I thank him?”
“He is dead, madame.” Pascale hung his head. “He survived prison for only two weeks.”
Must
My final years brought me home. In Salah had gained fame for its one group of Tuaregs who refused to leave. The Lakzis owned a house in a desperate condition, not dissimilar to my failing body. By the age of fifty-two, I could no longer walk, but they welcomed me. I pooled my disability allowance and some money I’d gained from selling my father’s watch. We waited for the world to mourn the death of a once great city. We would keep it alive by refusing to move, by refusing to permit its rebranding as an ‘industrial area.’ Now the oil fields were finally drying up, they wanted to dig under the town.
We had managed to eliminate half of the remaining words. Just under 1,000 possible selections for the final two words, but little idea of an order.
The problem was that I was the only English speaker among them, and it took great energy to attempt to teach the meaning of the words and possible grammatical constructions for my father’s sentence.
But soon, patterns began to emerge. Fragments of word pairings and groups. ‘Trigger drastic scheme’ appeared again and again in the permutations. ‘They can’ and ‘When they can’ gave a tantalising glimpse. We ranked sentences in terms of likelihood to form the full key and categorised them by the most likely remaining words. Due to the need for a modal verb, ‘must’ scored highest by our calculations.
In this race to unlock the ledger before In Salah’s destruction, we nosed ahead.
Yet the day of that discovery was my final day in the desert. An air ambulance transported my feeble body to Algiers, and I would never return.
They messaged me — so close. They would unlock the ledger with the final word after my operation. The bitcoin could undo the wrongs of the past, and my father’s sentence would live on.
End
The phrase which began the global revolution first appeared on the wall of a much-disputed oil refinery in the desert outside In Salah, Algeria.
When they can make ecology end, citizen earth must trigger drastic scheme
Soon, the graffiti marked government buildings in Algiers. Activists took to the streets. Governments crumbled and currencies collapsed. Climate groups received massive donations said to come from ‘the one,’ a ledger with a huge stack written off by financiers the world over. The codebreaker credited with unlocking the ledger was unable to witness the transfer of 10,000 coins to the Global Climate Fund due to her death, aged 52, from a congenital condition.
The words of Moussa Ag El Khir now mark each of the millions of panels, which line the ‘dead middle.’ They contribute over 80% of the Earth’s power supply.
To mark the fiftieth anniversary of his death, the World Climate Forum will be held in the town of his birth, In Salah, Algeria. This story, compiled from the diaries of his daughter, Kana Ult El Khir, will be read as the opening address of the conference.
This story was originally published in 21 Futures: Tales From the Timechain
To continue the story of the real-world treasure (sats) use the address (it's real).\ Who knows, maybe some zaps will find their way into the wallet...
-
@ b7d82f75:524cf1ac
2025-04-17 05:41:42Want the best Anaheim auto body shop? G.U Collision Center is here to help! We repair your car from scratches to serious damage, making it look as good as new. Our team uses modern tools and lots of care to fix your vehicle fast. We handle everything, from small dings to big collisions, at prices that won’t break the bank. Plus, we work with your insurance for a smooth process. Visit G.U Collision Center in Anaheim for top-quality repairs and friendly service. Let us get your car back on the road in style!
-
@ e111a405:fa441558
2025-04-06 18:09:31Running in circles is an expression that is often used to express when no matter what we do, nothing changes. We run in a circle, always ending up where we started.
Imagine the circle lines as boundaries, not physical boundaries, but mental barriers. In our life, we often run within our circle of possibilities. Anything outside our circle seem impossible. Outside the circle is anything that seems unattainable.
For some, healing a chronic disease may seem unattainable, for others it is a nice house, finding one’s soulmate, or merely financial abundance.
Over our lifetime, through our upbringing, we have defined our circle of possibilities. We have defined what is within our possibility and what is outside our possibility.
But this is just a line we drew. It is a mental barrier that does not exist outside our mind. In order to attain what seems unattainable, we have to expand our circle of possibilities. We have to pull what is outside our circle inside.
Imagine it like this: anything that is within our circle is easy and comes effortless. For example, making a coffee, driving a car are within our circle of effortless possibilities.
Other things seem out of reach. They are outside our circle of possibilities. They look extremely hard and impossible to reach.
What we need to do is reframe our understanding of what is within and what is without our circle. We pull seemingly impossible things inside our circle, and thereby we are expanding the size of our circle exponentially. We do this by following our excitement.
Not everything can be pulled inside our circle. But anything we are absolutely excited and passionate about can be pulled inside and made attainable.
You might think that you want to be the founder and CEO of a large, successful company. But if this is merely a desire that comes from mimesis – in other words, a desire that we have because we see other people have or desire it – not from our true inner being.
We will try forever to pull this inauthentic desire inside our circle, but we will fail because it is against our nature. Listening to our true excitement is key. We have to follow what is truly authentic to us — what we are truly excited about from our whole heart – and pull it inside our circle.
You may find true excitement and joy playing the piano or researching a certain subject. But true mastery of the piano or earning a livelihood with it may seem like an impossibility. Don’t let this hold you back. If this is what excites you the most, make the decision to pull it into your circle, define it is easily attainable, possible.
Inside our circle, doing and attaining our desires is as natural and easy as making a cup of coffee. Our inner circle represents our current reality. It is both endless and limiting. Endless in terms of repetition and confinement of boundaries.
Think again of walking in a circle, you always end up in the same spot, never really advancing. We try to improve the conditions within our circles, but improvements within our circles is like improving a prison cell.
True freedom comes from expanding that circle. Or stepping out of that circle into an entirely new one. That is difficult because we are like fish in an aquarium, unaware of the world behind. We only see what is familiar, what is within our circle, and everything beyond that feels alien or unattainable even though we desire it.
The real truth is that it takes the same energy to live and operate within our current circle as it takes to live within a much larger circle or to step. It takes the same effort to be in our current circle as it takes to be in a completely different, much larger circle.
First, you need to identify that you are inside a circle. What are your current habits and goals? What is your current reality?
Once you are aware, the next step is to identify what is outside your circle. What is it that you desire but looks unattainable, impossible?
Now we define a new circle. In this new circle, our goals, our habits are aligned with our authentic aspirations, our true excitement. We create a new reality.
Stepping out of this circle requires risk. It means breaking free from the familiar, and pursing something that may seem uncomfortable or unattainable.
We leave our circle, we leave our comfort zone.
We can do this in small, consistent steps, or we can make a sharp turn–an instant shift in our approach to living, like flipping from being chased to becoming the one who chases.
The real key to escaping our limiting circle is focus.
Where we focus our mental energy on determines the reality we will experience. By only focusing on improving our current reality, we remain locked in. But by expanding our vision to something outside our current circle, outside our current reality, we open up the possibilities of stepping into a new, much larger circle of possibilities.
What seems impossible now, becomes as effortless as making a cup of coffee.
The decision to break free starts with the realization that we are contained in a circle and the decision that we are ready to stop running in circles.
-
@ c86dc7e6:6059e49b
2025-04-17 05:04:16Want the best carpet cleaning services Atlanta has to offer? Spot It Cleaning is the name to trust! We bring your carpets back to life, removing stains, dirt, and odors. Our team uses safe, powerful tools to clean deep without harming your floors. Perfect for offices, stores, or any business, we make your carpets look fresh and feel soft. We work fast and fit your schedule, keeping your workspace ready for action. Choose Spot It Cleaning for affordable, top-quality carpet care in Atlanta. Let us make your floors shine so your business can stand out!
-
@ c066aac5:6a41a034
2025-04-05 16:58:58I’m drawn to extremities in art. The louder, the bolder, the more outrageous, the better. Bold art takes me out of the mundane into a whole new world where anything and everything is possible. Having grown up in the safety of the suburban midwest, I was a bit of a rebellious soul in search of the satiation that only came from the consumption of the outrageous. My inclination to find bold art draws me to NOSTR, because I believe NOSTR can be the place where the next generation of artistic pioneers go to express themselves. I also believe that as much as we are able, were should invite them to come create here.
My Background: A Small Side Story
My father was a professional gamer in the 80s, back when there was no money or glory in the avocation. He did get a bit of spotlight though after the fact: in the mid 2000’s there were a few parties making documentaries about that era of gaming as well as current arcade events (namely 2007’sChasing GhostsandThe King of Kong: A Fistful of Quarters). As a result of these documentaries, there was a revival in the arcade gaming scene. My family attended events related to the documentaries or arcade gaming and I became exposed to a lot of things I wouldn’t have been able to find. The producer ofThe King of Kong: A Fistful of Quarters had previously made a documentary calledNew York Dollwhich was centered around the life of bassist Arthur Kane. My 12 year old mind was blown: The New York Dolls were a glam-punk sensation dressed in drag. The music was from another planet. Johnny Thunders’ guitar playing was like Chuck Berry with more distortion and less filter. Later on I got to meet the Galaga record holder at the time, Phil Day, in Ottumwa Iowa. Phil is an Australian man of high intellect and good taste. He exposed me to great creators such as Nick Cave & The Bad Seeds, Shakespeare, Lou Reed, artists who created things that I had previously found inconceivable.
I believe this time period informed my current tastes and interests, but regrettably I think it also put coals on the fire of rebellion within. I stopped taking my parents and siblings seriously, the Christian faith of my family (which I now hold dearly to) seemed like a mundane sham, and I felt I couldn’t fit in with most people because of my avant-garde tastes. So I write this with the caveat that there should be a way to encourage these tastes in children without letting them walk down the wrong path. There is nothing inherently wrong with bold art, but I’d advise parents to carefully find ways to cultivate their children’s tastes without completely shutting them down and pushing them away as a result. My parents were very loving and patient during this time; I thank God for that.
With that out of the way, lets dive in to some bold artists:
Nicolas Cage: Actor
There is an excellent video by Wisecrack on Nicolas Cage that explains him better than I will, which I will linkhere. Nicolas Cage rejects the idea that good acting is tied to mere realism; all of his larger than life acting decisions are deliberate choices. When that clicked for me, I immediately realized the man is a genius. He borrows from Kabuki and German Expressionism, art forms that rely on exaggeration to get the message across. He has even created his own acting style, which he calls Nouveau Shamanic. He augments his imagination to go from acting to being. Rather than using the old hat of method acting, he transports himself to a new world mentally. The projects he chooses to partake in are based on his own interests or what he considers would be a challenge (making a bad script good for example). Thus it doesn’t matter how the end result comes out; he has already achieved his goal as an artist. Because of this and because certain directors don’t know how to use his talents, he has a noticeable amount of duds in his filmography. Dig around the duds, you’ll find some pure gold. I’d personally recommend the filmsPig, Joe, Renfield, and his Christmas film The Family Man.
Nick Cave: Songwriter
What a wild career this man has had! From the apocalyptic mayhem of his band The Birthday Party to the pensive atmosphere of his albumGhosteen, it seems like Nick Cave has tried everything. I think his secret sauce is that he’s always working. He maintains an excellent newsletter calledThe Red Hand Files, he has written screenplays such asLawless, he has written books, he has made great film scores such asThe Assassination of Jesse James by the Coward Robert Ford, the man is religiously prolific. I believe that one of the reasons he is prolific is that he’s not afraid to experiment. If he has an idea, he follows it through to completion. From the albumMurder Ballads(which is comprised of what the title suggests) to his rejected sequel toGladiator(Gladiator: Christ Killer), he doesn’t seem to be afraid to take anything on. This has led to some over the top works as well as some deeply personal works. Albums likeSkeleton TreeandGhosteenwere journeys through the grief of his son’s death. The Boatman’s Callis arguably a better break-up album than anything Taylor Swift has put out. He’s not afraid to be outrageous, he’s not afraid to offend, but most importantly he’s not afraid to be himself. Works I’d recommend include The Birthday Party’sLive 1981-82, Nick Cave & The Bad Seeds’The Boatman’s Call, and the filmLawless.
Jim Jarmusch: Director
I consider Jim’s films to be bold almost in an ironic sense: his works are bold in that they are, for the most part, anti-sensational. He has a rule that if his screenplays are criticized for a lack of action, he makes them even less eventful. Even with sensational settings his films feel very close to reality, and they demonstrate the beauty of everyday life. That's what is bold about his art to me: making the sensational grounded in reality while making everyday reality all the more special. Ghost Dog: The Way of the Samurai is about a modern-day African-American hitman who strictly follows the rules of the ancient Samurai, yet one can resonate with the humanity of a seemingly absurd character. Only Lovers Left Aliveis a vampire love story, but in the middle of a vampire romance one can see their their own relationships in a new deeply human light. Jim’s work reminds me that art reflects life, and that there is sacred beauty in seemingly mundane everyday life. I personally recommend his filmsPaterson,Down by Law, andCoffee and Cigarettes.
NOSTR: We Need Bold Art
NOSTR is in my opinion a path to a better future. In a world creeping slowly towards everything apps, I hope that the protocol where the individual owns their data wins over everything else. I love freedom and sovereignty. If NOSTR is going to win the race of everything apps, we need more than Bitcoin content. We need more than shirtless bros paying for bananas in foreign countries and exercising with girls who have seductive accents. Common people cannot see themselves in such a world. NOSTR needs to catch the attention of everyday people. I don’t believe that this can be accomplished merely by introducing more broadly relevant content; people are searching for content that speaks to them. I believe that NOSTR can and should attract artists of all kinds because NOSTR is one of the few places on the internet where artists can express themselves fearlessly. Getting zaps from NOSTR’s value-for-value ecosystem has far less friction than crowdfunding a creative project or pitching investors that will irreversibly modify an artist’s vision. Having a place where one can post their works without fear of censorship should be extremely enticing. Having a place where one can connect with fellow humans directly as opposed to a sea of bots should seem like the obvious solution. If NOSTR can become a safe haven for artists to express themselves and spread their work, I believe that everyday people will follow. The banker whose stressful job weighs on them will suddenly find joy with an original meme made by a great visual comedian. The programmer for a healthcare company who is drowning in hopeless mundanity could suddenly find a new lust for life by hearing the song of a musician who isn’t afraid to crowdfund their their next project by putting their lighting address on the streets of the internet. The excel guru who loves independent film may find that NOSTR is the best way to support non corporate movies. My closing statement: continue to encourage the artists in your life as I’m sure you have been, but while you’re at it give them the purple pill. You may very well be a part of building a better future.
-
@ 4925ea33:025410d8
2025-04-17 04:31:30Como invocar a Deus?
O segundo capítulo do livro Confissões, de Santo Agostinho, começa com uma pergunta que toca o coração de todo aquele que busca a fé: “Como invocar a Deus?”
Essa questão, apesar de parecer simples, exige que tenhamos os olhos abertos para a verdade e uma consciência clara da nossa pequenez diante da grandeza divina. Somos pó diante do Criador — limitados, frágeis, tentando compreender o Infinito.
O Deus que não pode ser contido
Santo Agostinho se questiona sobre a presença de Deus e o que significa “conter” o Senhor. Ele reconhece que Deus está em todos os lugares — até mesmo no inferno. Como poderia ser diferente, se Deus é infinitamente grande?
“Nada pode conter Deus, nem mesmo o céu e a terra, suas maiores criações.”
Esse reconhecimento o leva a concluir: Deus não tem começo, meio ou fim. Ele é eterno, e nada pode delimitá-Lo.
O espanto da descoberta: Deus habita em nós Agostinho se espanta ao perceber que, se tudo o que existe só existe porque Deus o sustenta, então Deus está em tudo — inclusive dentro de nós. E aqui nasce uma nova dúvida:
Por que invocar a Deus se Ele já habita em mim? Como pode o Infinito caber em uma criatura tão pequena como o ser humano?
A beleza da doutrina católica
Estudar a doutrina católica é uma experiência profunda e transformadora. A riqueza com que ela trata o mistério de Deus é tão grandiosa, que toca até os corações mais endurecidos.
“Se algo existe, é porque Deus o sustenta. Ele está conosco. Ele nos dá o dom da vida.”
Essa verdade muda completamente a forma como enxergamos a realidade. Compreender que Deus sustenta até aqueles que se afastaram Dele nos leva a uma nova visão — mais compassiva, mais humana e mais próxima do amor de Cristo.
A presença de Deus até nas realidades mais difíceis
Essa reflexão me lembra algo que ouvia na igreja: o chamado de apresentar Cristo nos presídios. Sempre me perguntei como os pregadores viam a presença de Deus em pessoas que cometeram crimes cruéis.
Hoje, entendo que se alguém ainda existe, é porque Deus ainda o sustenta — mesmo que seus atos não agradem a Deus. A existência é um sinal de que a presença divina ainda está ali, chamando à conversão.
Conclusão: Deus está em tudo, inclusive em nós
Este capítulo não aprofunda como lidar com o inimigo ou com o mal, mas nos dá uma certeza essencial: Deus está em tudo e em todos.
Ao orar, não devemos buscá-Lo como alguém distante, mas sim olhar para dentro de nós. A presença de Deus habita em nós.
-
@ ae1008d2:a166d760
2025-04-01 00:29:56This is part one in a series of long-form content of my ideas as to what we are entering into in my opinion;The Roaring '20's 2.0 (working title). I hope you'll join me on this journey together.
"History does not repeat itself, but it often rhymes"; - Samuel Clemens, aka Mark Twain. My only class I received an A+ in high school was history, this opened up the opportunity for me to enroll in an AP (college level) history class my senior year. There was an inherent nature for me to study history. Another quote I found to live by; "If we do not study history, we are bound to repeat it", a paraphrased quote by the many great philosphers of old from Edmund Burke, George Santayana and even Winston Churchill, all pulling from the same King Solomon quote; "What has been will be again, what has been done will be done again; there is nothing new under the sun". My curiousity of human actions, psychological and therefore economical behavior, has benefitted me greatly throughout my life and career, at such a young age. Being able to 'see around the curves' ahead I thought was a gift many had, but was sorely mistaken. People are just built different. One, if not my hardest action for me is to share. I just do things; act, often without even thinking about writing down or sharing in anyway shape or form what I just did here with friends, what we just built or how we formed these startups, etc., I've finally made the time, mainly for myself, to share my thoughts and ideas as to where we are at, and what we can do moving forward. It's very easy for us living a sovereign-lifestyle in Bitcoin, Nostr and other P2P, cryptographically-signed sovereign tools and tech-stacks alike, permissionless and self-hostable, to take all these tools for granted. We just live with them. Use them everyday. Do you own property? Do you have to take care of the cattle everyday? To live a sovereign life is tough, but most rewarding. As mentioned above, I'm diving into the details in a several part series as to what the roaring '20's were about, how it got to the point it did, and the inevitable outcome we all know what came to be. How does this possibly repeat itself almost exactly a century later? How does Bitcoin play a role? Are we all really going to be replaced by AI robots (again, history rhymes here)? Time will tell, but I think most of us actually using the tools will also forsee many of these possible outcomes, as it's why we are using many of these tools today. The next parts of this series will be released periodically, maybe once per month, maybe once per quarter. I'll also be releasing these on other platforms like Medium for reach, but Nostr will always be first, most important and prioritized.
I'll leave you with one of my favorite quotes I've lived by from one of the greatest traders of all time, especially during this roaring '20's era, Jesse Livermore; "Money is made by sitting, not trading". -
@ 502ab02a:a2860397
2025-04-17 02:15:32วันนี้มาเล่าเรื่อง animal base บ้างครับ เพราะหลายๆคนบอกว่า ดีนะฉันกินสัตว์ ฉันคิดว่าไขมันสัตว์ดีที่สุด รวมถึง plant base ที่ตัดสินฉาบฉวยว่าผม anti plant วันนี้มาเล่าข้อมูลเรื่องต่อไปกันครับ เพื่อให้เห็นว่า โลกของผู้ล่า มันไม่เลือกฝั่งครับ คำถามคือ เหยื่อจะเตรียมตัวอย่างไรมากกว่า เพราะเหยื่อยังทะเลาะกันเองอยู่เลย 55555
sub item ของ fiat food มีอย่างนึงที่เรียกว่า fake food ครับ ถ้าถามว่า “โปรตีนจากเซลล์” หรือ lab-grown meat ที่โฆษณาว่าเป็นทางเลือกแห่งอนาคตนั้น ภาพที่คนทั่วไปนึกถึงคืออะไร? คำตอบน่าจะไม่พ้น -เนื้อที่ไม่ต้องฆ่าสัตว์ -โปรตีนสะอาด ไร้มลพิษ -เทคโนโลยีแห่งอนาคตเพื่อสิ่งแวดล้อม
เชื่อไหมว่าความจริงนั้นมันอาจจะตรงกันข้ามกับทุกข้อที่ตอบมาเลยครับ
มันมาจากไหน?
"เนื้อเทียมจากห้องแล็บ" คือการเอาเซลล์สัตว์มาเพาะเลี้ยงในจานเพาะเลี้ยง โดยให้อาหารกับเซลล์พวกนั้นด้วยน้ำเลี้ยง (growth medium) เพื่อให้มันแบ่งตัวกลายเป็นกล้ามเนื้อ ฟังดูเหมือนปลอดภัยใช่ไหม? แต่ที่หลายคนไม่รู้คือ…
น้ำเลี้ยงที่ใช้ส่วนใหญ่มาจาก Fetal Bovine Serum (FBS) หรือ ซีรั่มจากลูกวัวที่ถูกฆ่าขณะอยู่ในครรภ์แม่ มันคือ คือการเจาะหัวใจลูกวัวที่ยังไม่เกิด เพื่อเอาเลือดมาเลี้ยงเนื้อเทียม แน่นอนว่าการให้ข้อมูลนั้นเขาจะบอกว่า เก็บเกี่ยวเลือดจากตัวอ่อนของวัวหลังจากที่นำตัวอ่อนออกจากวัวที่ถูกเชือด ตัวอ่อนจะตายจากการขาดออกซิเจนโดยอยู่ในสภาพแวดล้อมที่ปลอดภัยของมดลูกเป็นเวลาอย่างน้อย 15-20 นาทีหลังจากวัวตายและแน่นอนว่าต้องให้ข้อมูลว่ามีการเก็บมาภายใต้การดูแลจริยธรรม
และถ้าจะไม่ใช้ FBS ก็ต้องใช้น้ำเลี้ยงสังเคราะห์ที่อัดแน่นด้วย growth factor สังเคราะห์, ยาปฏิชีวนะ, ฮอร์โมน และสารกระตุ้นการเจริญเติบโตแบบเข้มข้น มันคือ Frankenstein Protein เลยก็ว่าได้
ราคาที่แท้จริงไม่ใช่แค่เงิน แต่คืออำนาจต่างหากครับ
เบื้องหลังของ lab-grown meat คือบริษัททุนใหญ่ เช่น Eat Just (เจ้าของ Good Meat) Upside Foods Believer Meats CUBIQ Foods และเบื้องหลังอีกชั้นคือ VC ยักษ์ เช่น SoftBank, Temasek, Bill Gates, Tyson Foods ฯลฯ เริ่มเห็นภาพแล้วใช่ไหมครับ
ทุกเจ้ากำลังเร่งวิจัยเพื่อ “จดสิทธิบัตร” กระบวนการผลิต และพันธุกรรมของเซลล์สัตว์ ใช่จ้ะ… พันธุกรรมของวัว หมู ไก่ หรือแม้แต่ปลา ถูกดัดแปลงพันธุกรรมเพื่อให้เพาะง่าย โตไว อยู่ได้นาน และตอบโจทย์การผลิตในเชิงอุตสาหกรรม
ใครจะเลี้ยงวัวเองแล้วทำเนื้อกินเอง อาจโดนฟ้องในอนาคตว่าไปละเมิดพันธุ์สิทธิบัตรที่บริษัทครอบครอง
ต่อไปนี้ถ้าอยากขายเนื้อ ต้องเป็นเจ้าของห้องแล็บถึงแม้บริษัทเหหล่านี้จะบอกว่า “เราจะ democratize protein” คือทำให้ใครๆ ก็เข้าถึงโปรตีนได้ แต่ความจริงคือ ทุกกระบวนการตั้งแต่เซลล์ต้นแบบ อาหารเลี้ยงเซลล์ ยันเครื่องมือในแล็บ ล้วนมีสิทธิบัตร ใครที่ไม่มี license ก็ผลิตไม่ได้ พูดง่ายๆ ก็คือ…
“ของกินที่โตจากเซลล์ในอนาคตจะต้องมีใบอนุญาตจากบริษัท” ไม่มีแผ่นดินไหน ปลูกเอง กินเอง ได้อีกต่อไป
แล้วมันดีต่อสิ่งแวดล้อมจริงไหม? บริษัทแสนดีต่างๆชอบบอกว่าเนื้อแล็บช่วยลดการปล่อยคาร์บอนจากฟาร์มปศุสัตว์ แต่งานวิจัยของ Oxford, UC Davis และมหาวิทยาลัย Wageningen ชี้ว่า การผลิตเนื้อในห้องแล็บใช้พลังงานสูงกว่าปศุสัตว์จริง หลายเท่า และถ้าไม่ใช้พลังงานหมุนเวียน ก็จะปล่อยคาร์บอนมากกว่าการเลี้ยงวัวแบบดั้งเดิมเสียอีก
ตกลงมันคือ Clean Meat หรือ Clean Lie? Clean Meat ที่เขาโฆษณา อาจจะสะอาดแค่ “ภาพ” แต่องค์ประกอบข้างในคือ… -เซลล์สัตว์ที่ดัดแปลงยีนให้โตเร็ว -น้ำเลี้ยงเซลล์ที่มีสารกระตุ้นการเติบโต, ฮอร์โมน, ยาปฏิชีวนะ -ความไม่โปร่งใสเรื่องกระบวนการผลิต -ไม่มีฉลากบอกผู้บริโภคชัดเจน -ยังไม่มีการทดลองระยะยาวว่า “ปลอดภัยหรือไม่”
พรุ่งนี้ที่ไม่มีเกษตรกรจะเป็นยังไง ถ้าโปรตีนทั้งหมดผลิตในแล็บ แล้วเกษตรกรล่ะ? คนเลี้ยงสัตว์ล่ะ? คนเลี้ยงเป็ดไก่หลังบ้านล่ะ? คนปลูกผัก เลี้ยงวัว ทำฟาร์มแบบพื้นถิ่นล่ะ? ทุกคนจะตกขบวนอาหารของโลกใหม่ เพราะเกมนี้ไม่ได้วัดกันที่คุณภาพ แต่วัดกันที่ “ลิขสิทธิ์”
เรากำลังกินอนาคตที่เราไม่ได้เลือก ในชื่อของ “เทคโนโลยี” ในคราบของ “ทางเลือก” ในความนิยมของ "super food" แต่แท้จริงแล้ว เราอาจกำลังแลก สิทธิการควบคุมอาหาร ไปกับ “คำสัญญาว่าโลกจะดีขึ้น” ไม่ต่างอะไรจากการเอาอาหารไปวางไว้ในห้องแล็บ และล็อกประตูเอาไว้ให้คนไม่กี่คนถือกุญแจ
not your key, not your free เหมือนเพลงที่ผมเขียนไว้ในอัลบั้ม orange cafe ครับ https://youtu.be/k5jUpFXI6Gg?si=4GXOXjYbOpqX9kRb
#pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก
-
@ 6be5cc06:5259daf0
2025-03-31 03:39:07Introdução
Uma sociedade não deve ser construída sobre coerção, mas sim sobre associações voluntárias e interações espontâneas entre indivíduos. A sociedade de condomínios privados surge como uma alternativa natural ao modelo atual de centros urbanos, substituindo a imposição centralizada por estruturas baseadas em contratos e livre associação. Cada condomínio é uma unidade autônoma, gerida por aqueles que ali residem, onde os critérios de entrada, as regras internas e o comércio são definidos pelos próprios participantes. Essa estrutura permite que indivíduos se agrupem com base em valores compartilhados, eliminando os conflitos artificiais impostos por estados e legislações homogêneas que não respeitam a diversidade de preferências e estilos de vida.
O objetivo dessa sociedade é simples: permitir que as pessoas vivam de acordo com seus princípios sem interferência externa. Em um mundo onde a coerção estatal distorce incentivos, os condomínios privados oferecem uma alternativa onde a ordem surge do livre mercado e da cooperação voluntária. Os moradores escolhem seus vizinhos, definem suas próprias normas e interagem economicamente conforme suas necessidades e interesses. O modelo elimina a necessidade de um controle central, pois os incentivos derivados do livre mercado levam ao desenvolvimento de comunidades prósperas, onde a reputação e a confiança mútua são mais eficazes do que qualquer imposição estatal. Assim, essa sociedade representa a evolução lógica do conceito de liberdade individual e propriedade privada como pilares fundamentais da ordem social.
Público-Alvo e Identidade
Os condomínios privados refletem o princípio da livre associação, permitindo que indivíduos escolham viver em comunidades alinhadas com seus valores e necessidades sem interferência estatal. Cada condomínio possui uma identidade própria, moldada pelos moradores e seus interesses, criando ambientes onde afinidades culturais, filosóficas ou profissionais são preservadas e incentivadas. Enquanto alguns podem ser voltados para famílias numerosas, oferecendo amplos espaços e infraestrutura adequada, outros podem priorizar solteiros e jovens profissionais, com áreas de coworking e espaços de lazer voltados para networking e socialização. Da mesma forma, comunidades religiosas podem estabelecer seus próprios espaços de culto e eventos, enquanto condomínios para idosos podem ser projetados com acessibilidade e serviços médicos especializados.
Críticos podem afirmar que essa forma de organização resulta em pouca diversidade de habilidades e perspectivas, mas esse argumento ignora a dinâmica das interações humanas e o caráter evolutivo dos intercâmbios entre comunidades. Nenhum condomínio existe isolado; a troca entre diferentes comunidades ocorre naturalmente pelo mercado, incentivando o intercâmbio de conhecimento e serviços entre especialistas de diferentes áreas. Além disso, a ideia de que todos os grupos devem conter uma variedade aleatória de indivíduos desconsidera que a verdadeira diversidade nasce da liberdade de escolha, e não da imposição estatal de convivências forçadas.
Outra crítica possível é que a existência de critérios de entrada pode levar à segregação social. No entanto, essa preocupação deriva da concepção errônea de que todas as comunidades devem ser abertas e incluir qualquer pessoa indiscriminadamente. Porém, a liberdade de associação implica, necessariamente, a liberdade de exclusão. Se um grupo deseja manter determinada identidade cultural, religiosa ou profissional, isso não impede que outros grupos criem suas próprias comunidades conforme seus valores e recursos. Além disso, essa especialização leva a uma concorrência saudável entre condomínios, forçando-os a oferecer melhores condições para atrair moradores. Em vez de uma sociedade homogênea moldada por burocratas, temos um mosaico de comunidades autônomas, onde cada indivíduo pode encontrar ou criar o ambiente que melhor lhe convém.
Autossuficiência e Especialização
A força dos condomínios privados reside na capacidade de seus moradores de contribuírem ativamente para a comunidade, tornando-a funcional e autossuficiente sem a necessidade de intervenções estatais. Diferentes condomínios podem se especializar em áreas específicas ou ter diversos profissionais de diferentes setores, refletindo as competências e interesses de seus residentes. Essa descentralização do conhecimento e da produção permite que cada comunidade desenvolva soluções internas para suas demandas, reduzindo dependências externas e estimulando a prosperidade local.
Os moradores atuam como agentes econômicos, trocando bens e serviços dentro do próprio condomínio e entre diferentes comunidades. Um condomínio voltado para a saúde, por exemplo, pode contar com médicos, enfermeiros e terapeutas que oferecem consultas, aulas e assistência médica particular, remunerados diretamente por seus clientes, sem a intermediação de burocracias. Da mesma forma, um condomínio agrícola pode abrigar agricultores que cultivam alimentos orgânicos, compartilham técnicas de cultivo e comercializam excedentes com outros condomínios, garantindo um fluxo contínuo de suprimentos. Em um condomínio tecnológico, programadores, engenheiros e empreendedores desenvolvem soluções de TI, segurança digital e energia renovável, promovendo a inovação e ampliando as possibilidades de intercâmbio econômico.
A economia interna de cada condomínio se fortalece através de serviços oferecidos pelos próprios moradores. Professores podem ministrar aulas, técnicos podem prestar serviços de manutenção, artesãos podem vender seus produtos diretamente para os vizinhos. O mercado livre e voluntário é o principal regulador dessas interações, garantindo que a especialização surja naturalmente conforme a demanda e a oferta se ajustam. Essa estrutura elimina desperdícios comuns em sistemas centralizados, onde a alocação de recursos se dá por decisões políticas e não pelas necessidades reais da população.
Alguns argumentam que a especialização pode criar bolhas de conhecimento, tornando os condomínios excessivamente dependentes de trocas externas. Contudo, essa preocupação desconsidera a natureza espontânea do mercado, que incentiva a cooperação e o comércio entre comunidades distintas. Nenhum condomínio precisa produzir tudo internamente; ao contrário, a divisão do trabalho e a liberdade de escolha promovem interdependências saudáveis e vantajosas para todos. Assim, cada morador se insere em um ecossistema dinâmico, onde suas habilidades são valorizadas e sua autonomia preservada, sem coerções estatais ou distorções artificiais impostas por planejadores centrais.
Infraestrutura e Sustentabilidade
A solidez de uma sociedade baseada em condomínios privados depende de uma infraestrutura eficiente e sustentável, projetada para reduzir a dependência externa e garantir o máximo de autonomia. Sem um aparato estatal centralizador, cada comunidade deve estruturar seus próprios meios de obtenção de energia, água, alimentação e demais bens essenciais, garantindo que suas operações sejam viáveis a longo prazo. Essa abordagem, longe de ser um entrave, representa a verdadeira inovação descentralizada: um ambiente onde as soluções emergem da necessidade real e da engenhosidade humana, e não de diretrizes burocráticas e regulamentos ineficazes.
Cada condomínio pode investir em tecnologias sustentáveis e autônomas, como energia solar e eólica, reduzindo custos e minimizando a vulnerabilidade às flutuações do mercado energético tradicional. Sistemas de captação e filtragem de água da chuva, bem como a reutilização eficiente dos recursos hídricos, garantem independência em relação a empresas monopolistas e governos que frequentemente administram esse bem de forma ineficaz. Hortas comunitárias e fazendas verticais podem suprir grande parte da demanda alimentar, permitindo que cada condomínio mantenha sua própria reserva de alimentos, aumentando a resiliência contra crises externas e instabilidades de mercado.
Além dos recursos naturais, os espaços compartilhados desempenham um papel fundamental na integração e no fortalecimento dessas comunidades. Bibliotecas, ginásios, creches e salas de aula permitem que o conhecimento e os serviços circulem internamente, criando um ambiente onde a colaboração ocorre de maneira orgânica. A descentralização também se aplica ao uso da tecnologia, plataformas digitais privadas podem ser utilizadas para conectar moradores, facilitar a troca de serviços e produtos, além de coordenar agendamentos e eventos dentro dos condomínios e entre diferentes comunidades.
O Bitcoin surge como uma ferramenta indispensável nesse ecossistema, eliminando a necessidade de bancos estatais ou sistemas financeiros controlados. Ao permitir transações diretas, transparentes e resistentes à censura, o Bitcoin se torna o meio de troca ideal entre os condomínios, garantindo a preservação do valor e possibilitando um comércio ágil e eficiente. Além disso, contratos inteligentes e protocolos descentralizados podem ser integrados para administrar serviços comuns, fortalecer a segurança e reduzir a burocracia, tornando a governança desses condomínios cada vez mais autônoma e imune a intervenções externas.
Alguns podem argumentar que a falta de um aparato estatal para regulamentar a infraestrutura pode resultar em desigualdade no acesso a recursos essenciais, ou que a descentralização completa pode gerar caos e ineficiência. No entanto, essa visão ignora o fato de que a concorrência e a inovação no livre mercado são os maiores motores de desenvolvimento sustentável. Sem monopólios ou subsídios distorcendo a alocação de recursos, a busca por eficiência leva naturalmente à adoção de soluções melhores e mais acessíveis. Condomínios que oferecem infraestrutura de qualidade tendem a atrair mais moradores e investimentos, o que impulsiona a melhoria contínua e a diversificação dos serviços. Em vez de depender de um sistema centralizado falho, as comunidades se tornam responsáveis por sua própria prosperidade, criando uma estrutura sustentável, escalável e adaptável às mudanças do futuro.
Governança e Administração
Em uma sociedade descentralizada, não se deve depender de uma estrutura estatal ou centralizada para regular e tomar decisões em nome dos indivíduos. Cada condomínio, portanto, deve ser gerido de maneira autônoma, com processos claros de tomada de decisão, resolução de conflitos e administração das questões cotidianas. A gestão pode ser organizada por conselhos de moradores, associações ou sistemas de governança direta, conforme as necessidades locais.
Conselhos de Moradores e Processos de Tomada de Decisão
Em muitos casos, a administração interna de um condomínio privado pode ser realizada por um conselho de moradores, composto por representantes eleitos ou indicados pela própria comunidade. A ideia é garantir que as decisões importantes, como planejamento urbano, orçamento, manutenção e serviços, sejam feitas de forma transparente e que os interesses de todos os envolvidos sejam considerados. Isso não significa que a gestão precise ser completamente democrática, mas sim que as decisões devem ser tomadas de forma legítima, transparente e acordadas pela maior parte dos membros.
Em vez de um processo burocrático e centralizado, onde uma liderança impõe suas vontades sobre todos a muitas vezes suas decisões ruins não o afetam diretamente, a gestão de um condomínio privado deve ser orientada pela busca de consenso, onde os próprios gestores sofrerão as consequências de suas más escolhas. O processo de tomada de decisão pode ser dinâmico e direto, com os moradores discutindo e acordando soluções baseadas no mercado e nas necessidades locais, em vez de depender de um sistema impessoal de regulamentação. Além disso, a utilização de tecnologias descentralizadas, como plataformas de blockchain, pode proporcionar maior transparência nas decisões e maior confiança na gestão.
Resolução de Conflitos
A resolução de disputas dentro dos condomínios pode ocorrer de forma voluntária, através de negociação direta ou com o auxílio de mediadores escolhidos pelos próprios moradores por meio de um sistema de reputação. Em alguns casos, podem ser criados mecanismos para resolução de disputas mais formais, com árbitros ou juízes independentes que atuam sem vínculos com o condomínio. Esses árbitros podem ser escolhidos com base em sua experiência ou especialização em áreas como direito, mediação e resolução de conflitos, com uma reputação para zelar. Ao contrário de um sistema judicial centralizado, onde a parte envolvida depende do Estado para resolver disputas, os moradores possuem a autonomia para buscar soluções que atendam aos seus próprios interesses e necessidades. A diversidade de abordagens em um sistema de governança descentralizado cria oportunidades para inovações que atendem diferentes cenários, sem a interferência de burocratas distantes dos próprios problemas que estão "tentando resolver".
Planejamento Urbano e Arquitetura
A questão do design dos condomínios envolve não apenas a estética das construções, mas também a funcionalidade e a sustentabilidade a longo prazo. O planejamento urbano deve refletir as necessidades específicas da comunidade, onde ela decide por si mesma como construir e organizar seu ambiente.\ Arquitetos e urbanistas, muitas vezes moradores especializados, serão responsáveis pela concepção de espaços que atendam a esses critérios, criando ambientes agradáveis, com áreas para lazer, trabalho e convivência que atendam às diversas necessidades de cada grupo.\ Além disso, condomínios com nessecidades semelhantes poderão adotar ideias que deram certo em outros e certamente também dará no seu.
Segurança e Vigilância
Em relação à segurança, cada condomínio pode adotar sistemas de vigilância e proteção que atendam à sua realidade específica. Algumas comunidades podem optar por sistemas de câmeras de segurança, armamento pleno de seus moradores, patrulhamento privado ou até mesmo formas alternativas de garantir a proteção, como vigilância por meio de criptografia e monitoramento descentralizado. A chave para a segurança será a confiança mútua e a colaboração voluntária entre os moradores, que terão a liberdade de definir suas próprias medidas.
Comércio entre Condomínios
A troca de bens e serviços entre as diferentes comunidades é essencial para o funcionamento da rede. Como cada condomínio possui um grau de especialização ou uma mistura de profissionais em diversas áreas, a interdependência entre eles se torna crucial para suprir necessidades e promover a colaboração.
Embora alguns condomínios sejam especializados em áreas como saúde, agricultura ou tecnologia, outros podem ter um perfil mais diversificado, com moradores que atuam em diferentes campos de conhecimento. Por exemplo, um condomínio agrícola pode produzir alimentos orgânicos frescos, enquanto um condomínio de saúde oferece consultas médicas, terapias e cuidados especializados. Já um condomínio tecnológico pode fornecer inovações em software ou equipamentos de energia. Podem haver condomínios universitários que oferecem todo tipo de solução no campo de ensino. Ao mesmo tempo, um condomínio misto, com moradores de diversas áreas, pode oferecer uma variedade de serviços e produtos, tornando-se um centro de intercâmbio de diferentes tipos de expertise.
Essa divisão de trabalho, seja especializada ou diversificada, permite que os condomínios ofereçam o melhor de suas áreas de atuação, ao mesmo tempo em que atendem às demandas de outros. Um condomínio que não se especializa pode, por exemplo, buscar um acordo de troca com um condomínio agrícola para obter alimentos frescos ou com um condomínio tecnológico para adquirir soluções inovadoras.
Embora os condomínios busquem a autossuficiência, alguns recursos essenciais não podem ser produzidos internamente. Itens como minérios para construção, combustíveis ou até mesmo água, em regiões secas, não estão disponíveis em todas as áreas. A natureza não distribui os recursos de maneira uniforme, e a capacidade de produção local pode ser insuficiente para suprir todas as necessidades dos moradores. Isso implica que, para garantir a qualidade de vida e a continuidade das operações, os condomínios precisarão estabelecer relações comerciais e de fornecimento com fontes externas, seja através de mercados, importações ou parcerias com outras comunidades ou fornecedores fora do sistema de condomínios. O comércio intercondomínios e com o exterior será vital para a complementaridade das necessidades, assegurando que os moradores tenham acesso a tudo o que não pode ser produzido localmente.
O sistema econômico entre os condomínios pode ser flexível, permitindo o uso de uma moeda comum (como o Bitcoin) ou até mesmo um sistema de troca direta. Por exemplo, um morador de um condomínio misto pode oferecer serviços de design gráfico em troca de alimentos ou cuidados médicos. Esse tipo de colaboração estimula a produtividade e cria incentivos para que cada condomínio ofereça o melhor de seus recursos e habilidades, garantindo acesso aos bens e serviços necessários.
Relações Externas e Diplomacia
O isolamento excessivo pode limitar o acesso a inovações, avanços culturais e tecnológicos, e até mesmo dificultar o acesso a mercados externos. Por isso, é importante que haja canais de comunicação e métodos de diplomacia para interagir com outras comunidades. Os condomínios podem, por exemplo, estabelecer parcerias com outras regiões, seja para troca de produtos, serviços ou até para inovação. Isso garante que a rede de condomínios não se torne autossuficiente ao ponto de se desconectar do resto do mundo, o que pode resultar em estagnação.
Feiras, mercados intercondomínios e até eventos culturais e educacionais podem ser organizados para promover essas interações. A colaboração entre as comunidades e o exterior não precisa ser baseada em uma troca de dependência, mas sim numa rede de oportunidades que cria benefícios para todas as partes envolvidas. Uma boa reputação atrai novos moradores, pode valorizar propriedades e facilitar parcerias. A diplomacia entre as comunidades também pode ser exercida para resolver disputas ou desafios externos.
A manutenção de boas relações entre condomínios é essencial para garantir uma rede de apoio mútuo eficiente. Essas relações incentivam a troca de bens e serviços, como alimentos, assistência médica ou soluções tecnológicas, além de fortalecer a autossuficiência regional. Ao colaborar em segurança, infraestrutura compartilhada, eventos culturais e até mesmo na resolução de conflitos, os condomínios se tornam mais resilientes e eficientes, reduzindo a dependência externa e melhorando a qualidade de vida dos moradores. A cooperação contínua cria um ambiente mais seguro e harmonioso.
Educação e Desenvolvimento Humano
Cada comunidade pode criar escolas internas com currículos adaptados às especializações de seus moradores. Por exemplo, em um condomínio agrícola, podem ser ensinadas práticas agrícolas sustentáveis, e em um condomínio tecnológico, cursos de programação e inovação. Isso permite que crianças e jovens cresçam em ambientes que reforçam as competências valorizadas pela comunidade.
Além das escolas internas, o conceito de homeschooling pode ser incentivado, permitindo que os pais eduquem seus filhos conforme seus próprios valores e necessidades, com o apoio da comunidade. Esse modelo oferece uma educação mais flexível e personalizada, ao contrário do currículo tradicional oferecido pelo sistema público atual.
Os condomínios universitários também podem surgir, criando ambientes dedicados ao desenvolvimento acadêmico, científico e profissional, onde estudantes vivem e aprendem. Além disso, programas de capacitação contínua são essenciais, com oficinas e cursos oferecidos dentro do condomínio para garantir que os moradores se atualizem com novas tecnologias e práticas.
Para ampliar os horizontes educacionais, os intercâmbios estudantis entre diferentes condomínios podem ser incentivados. Esses intercâmbios não se limitam apenas ao ambiente educacional, mas também se estendem ao aprendizado de práticas de vida e habilidades técnicas. Os jovens de diferentes condomínios podem viajar para outras comunidades para estudar, trabalhar ou simplesmente trocar ideias. Isso pode ocorrer de diversas formas, como programas de curto e longo prazo, através de acordos entre os próprios condomínios, permitindo que os estudantes se conectem com outras comunidades, aprendam sobre diferentes especializações e desenvolvam uma compreensão mais ampla.
Essa abordagem descentralizada permite que cada comunidade desenvolva as competências essenciais sem depender de estruturas limitantes do estado ou sistemas educacionais centralizados. Ao proporcionar liberdade de escolha e personalização, os condomínios criam ambientes propícios ao crescimento humano, alinhados às necessidades e interesses de seus moradores.
A sociedade dos condomínios privados propõe uma estrutura alternativa de convivência onde as pessoas podem viver de acordo com seus próprios valores e necessidades. Esses condomínios oferecem um modelo de organização que desafia a centralização estatal, buscando criar comunidades adaptáveis e inovadoras. A liberdade garante que as habilidades necessárias para o sustento e crescimento das comunidades sejam mantidas ao longo do tempo.
A troca de bens, serviços e conhecimentos entre os condomínios, sem a imposição de forças externas, cria uma rede de boas relações, onde o comércio e a colaboração substituem a intervenção estatal. Em vez de depender de sistemas coercitivos, cada condomínio funciona como um microcosmo autônomo que, juntos, formam um ecossistema dinâmico e próspero. Este modelo propõe que, por meio de trocas voluntárias, possamos construir uma sociedade mais saudável. Lembre-se: Ideias e somente ideias podem iluminar a escuridão.
-
@ 04c915da:3dfbecc9
2025-03-26 20:54:33Capitalism is the most effective system for scaling innovation. The pursuit of profit is an incredibly powerful human incentive. Most major improvements to human society and quality of life have resulted from this base incentive. Market competition often results in the best outcomes for all.
That said, some projects can never be monetized. They are open in nature and a business model would centralize control. Open protocols like bitcoin and nostr are not owned by anyone and if they were it would destroy the key value propositions they provide. No single entity can or should control their use. Anyone can build on them without permission.
As a result, open protocols must depend on donation based grant funding from the people and organizations that rely on them. This model works but it is slow and uncertain, a grind where sustainability is never fully reached but rather constantly sought. As someone who has been incredibly active in the open source grant funding space, I do not think people truly appreciate how difficult it is to raise charitable money and deploy it efficiently.
Projects that can be monetized should be. Profitability is a super power. When a business can generate revenue, it taps into a self sustaining cycle. Profit fuels growth and development while providing projects independence and agency. This flywheel effect is why companies like Google, Amazon, and Apple have scaled to global dominance. The profit incentive aligns human effort with efficiency. Businesses must innovate, cut waste, and deliver value to survive.
Contrast this with non monetized projects. Without profit, they lean on external support, which can dry up or shift with donor priorities. A profit driven model, on the other hand, is inherently leaner and more adaptable. It is not charity but survival. When survival is tied to delivering what people want, scale follows naturally.
The real magic happens when profitable, sustainable businesses are built on top of open protocols and software. Consider the many startups building on open source software stacks, such as Start9, Mempool, and Primal, offering premium services on top of the open source software they build out and maintain. Think of companies like Block or Strike, which leverage bitcoin’s open protocol to offer their services on top. These businesses amplify the open software and protocols they build on, driving adoption and improvement at a pace donations alone could never match.
When you combine open software and protocols with profit driven business the result are lean, sustainable companies that grow faster and serve more people than either could alone. Bitcoin’s network, for instance, benefits from businesses that profit off its existence, while nostr will expand as developers monetize apps built on the protocol.
Capitalism scales best because competition results in efficiency. Donation funded protocols and software lay the groundwork, while market driven businesses build on top. The profit incentive acts as a filter, ensuring resources flow to what works, while open systems keep the playing field accessible, empowering users and builders. Together, they create a flywheel of innovation, growth, and global benefit.
-
@ 7776c32d:45558888
2025-04-17 02:05:15Opinion about Bitcoin Wallet (android)
I think this was the first self-custody wallet I ever used. I'm really glad it's still maintained and reproducible from source 🤙
WalletScrutiny #nostrOpinion
-
@ b12e2899:ed9d9c8b
2025-03-26 17:33:37I have completely switched to Nostr and today am going to share my experience, which may be useful to those of you who want to launch a bot on a social network and encounters censorship. The thing is Nostr is ideal for this, but first things first:
It all started when I suddenly woke up to see my twitter bot @cryptoratingbot suspended without any explanation. I contacted support, but they apparently considered my case too insignificant to even respond. The goal of my bot was to attract users and provide free tools like charts.xport.top, tickerbell.xport.top and few others that you can find out about in my previous publications. It worked, and accumulated all in all around 60k engagement a year. Silly, right? You can do this in two days doing it the right way. But I was in no hurry. Overall I gained 10 new users per day and that was enough for me to begin with since I wasn’t prepared for the big wave of users. But that is not the topic for today. I can tell you more about this later on, if you are interested click like and subscribe.
I was planning to buy a premium, but then twitter suspended my bot which actually didn’t do anything bad if you think about it. Furthermore, it was useful, otherwise why would people use it and like its tweets. Anyway, this ruined my plans and forced me to think about switching to Nostr. Today I can tell that it was definitely worth it! I haven’t lost anything, except time and overall gained from it! But I won’t say too much, so as not to bore you. However, this context is important for a better understanding of my situation. There are much more details and if you have any questions, feel free to ask, I will try to answer everyone.
Hard to believe, but these things can help you make money from buying cryptocurrency on the bottoms in a right time just when it starts trading, if you understand what you’re doing. That’s not easy. Maybe I will share some thoughts later on, until then you may find more info in my previous articles.
In fact, I decided to write this because for the first time since I was introduced to Nostr I finally tried proof-of-work(nip-13 pow) myself and I love it! I see such a thing for the first time on a social media. No moderation or censorship measures are needed. After all, if you are ready to burn resources to publish events, then it is definitely not a spam. And that’s the beauty of it!
I’ve picked 7 relays to try and publish 5000+ events that my previous version collected from top 12 cryptocurrency exchanges. Two relays rejected those events after some time, most likely because as always I have forgot to add something crucial — nonce tag, to help relays understand I am using pow. I thought it would add it itself, but seemes that it wouldn’t. What a shame! However, other 5 relays are ok with that! Maybe because I wasn’t publishing events too often, I don’t know, but anyway the more freedom the more I love it! And if you want find more about relays you can use use nostrwat.ch which is the greatest resource for finding the best relays to use.
While I was writing this article, another few relays dropped connections, but that’s fine, I have selected 7 relays out of about 700 active online.
This is how my server statistics looks like:
So, besides everything else, I also checked Netcup root server G11 stats. In my opinion, this is the best of all that I have ever dealt with. And this is not an advertisement, no. I found this company on my own, just watching how Nostr relays works in terms of price/quality, so this is my personal recommendation. But if you think you know better root server solutions please let me know in the comment below.
The only disadvantage I have encountered is you can wait for their support for few days to answer, but that’s ok if you know what you’re doing. I have no problem with this. I try to be careful and there were no problems for two months since I ordered it and use it on the daily basis.
In short, this is my journey. Don’t scold me for this. It’s just that I’ve been saving all this up for a long time, and today I realized that I simply have to tell you about it!
Thank you all and see you soon! Cheers 🍻
-
@ 35da2266:15e70970
2025-04-16 22:45:504EimyzmhhmH4plLDC0nv/KQniv8JrJY/2A8svVqsZ8efXrRGCEsrCJwSzvJOrK6sLkfiVcvJ8r3yXW8QDYceQSDjgTDtoxoL+0U1v66lfEvc/OASt/dICMTrrUe5LXFitve6fmhhnJfUie9Smmgd0kpd5q/pzTBeKUwhdV69t6Q3zs7ACAXncojtHjCqORHDcvJq14pwocpqQjqNu0LGoXT81L4RvIBcN/a+QGwHsQMPTnwje0ryCPpp4BsMZx5XIkvagVRWGwI7oA4361lGer0c1Rx0cxphETaGL3oNlEQGGgO0A++VqiVRp5LpHW0JYVRHpGQn++KV2zIhCk9UcwlgxEx2SYg8fXh0G0l2fUo=?iv=wqlunJB3xhRRILfuEfDe9A==
-
@ 04c915da:3dfbecc9
2025-03-25 17:43:44One of the most common criticisms leveled against nostr is the perceived lack of assurance when it comes to data storage. Critics argue that without a centralized authority guaranteeing that all data is preserved, important information will be lost. They also claim that running a relay will become prohibitively expensive. While there is truth to these concerns, they miss the mark. The genius of nostr lies in its flexibility, resilience, and the way it harnesses human incentives to ensure data availability in practice.
A nostr relay is simply a server that holds cryptographically verifiable signed data and makes it available to others. Relays are simple, flexible, open, and require no permission to run. Critics are right that operating a relay attempting to store all nostr data will be costly. What they miss is that most will not run all encompassing archive relays. Nostr does not rely on massive archive relays. Instead, anyone can run a relay and choose to store whatever subset of data they want. This keeps costs low and operations flexible, making relay operation accessible to all sorts of individuals and entities with varying use cases.
Critics are correct that there is no ironclad guarantee that every piece of data will always be available. Unlike bitcoin where data permanence is baked into the system at a steep cost, nostr does not promise that every random note or meme will be preserved forever. That said, in practice, any data perceived as valuable by someone will likely be stored and distributed by multiple entities. If something matters to someone, they will keep a signed copy.
Nostr is the Streisand Effect in protocol form. The Streisand effect is when an attempt to suppress information backfires, causing it to spread even further. With nostr, anyone can broadcast signed data, anyone can store it, and anyone can distribute it. Try to censor something important? Good luck. The moment it catches attention, it will be stored on relays across the globe, copied, and shared by those who find it worth keeping. Data deemed important will be replicated across servers by individuals acting in their own interest.
Nostr’s distributed nature ensures that the system does not rely on a single point of failure or a corporate overlord. Instead, it leans on the collective will of its users. The result is a network where costs stay manageable, participation is open to all, and valuable verifiable data is stored and distributed forever.
-
@ 35da2266:15e70970
2025-04-16 22:45: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?iv=SBph/Z93dPwAx0qGijw19w==
-
@ b17fccdf:b7211155
2025-03-25 11:23:36Si vives en España, quizás hayas notado que no puedes acceder a ciertas páginas webs durante los fines de semana o en algunos días entre semana, entre ellas, la guía de MiniBolt.
Esto tiene una razón, por supuesto una solución, además de una conclusión. Sin entrar en demasiados detalles:
La razón
El bloqueo a Cloudflare, implementado desde hace casi dos meses por operadores de Internet (ISPs) en España (como Movistar, O2, DIGI, Pepephone, entre otros), se basa en una orden judicial emitida tras una demanda de LALIGA (Fútbol). Esta medida busca combatir la piratería en España, un problema que afecta directamente a dicha organización.
Aunque la intención original era restringir el acceso a dominios específicos que difundieran dicho contenido, Cloudflare emplea el protocolo ECH (Encrypted Client Hello), que oculta el nombre del dominio, el cual antes se transmitía en texto plano durante el proceso de establecimiento de una conexión TLS. Esta medida dificulta que las operadoras analicen el tráfico para aplicar bloqueos basados en dominios, lo que les obliga a recurrir a bloqueos más amplios por IP o rangos de IP para cumplir con la orden judicial.
Esta práctica tiene consecuencias graves, que han sido completamente ignoradas por quienes la ejecutan. Es bien sabido que una infraestructura de IP puede alojar numerosos dominios, tanto legítimos como no legítimos. La falta de un "ajuste fino" en los bloqueos provoca un perjuicio para terceros, restringiendo el acceso a muchos dominios legítimos que no tiene relación alguna con actividades ilícitas, pero que comparten las mismas IPs de Cloudflare con dominios cuestionables. Este es el caso de la web de MiniBolt y su dominio
minibolt.info
, los cuales utilizan Cloudflare como proxy para aprovechar las medidas de seguridad, privacidad, optimización y servicios adicionales que la plataforma ofrece de forma gratuita.Si bien este bloqueo parece ser temporal (al menos durante la temporada 24/25 de fútbol, hasta finales de mayo), es posible que se reactive con el inicio de la nueva temporada.
La solución
Obviamente, MiniBolt no dejará de usar Cloudflare como proxy por esta razón. Por lo que a continuación se exponen algunas medidas que como usuario puedes tomar para evitar esta restricción y poder acceder:
~> Utiliza una VPN:
Existen varias soluciones de proveedores de VPN, ordenadas según su reputación en privacidad: - IVPN - Mullvad VPN - Proton VPN (gratis) - Obscura VPN (solo para macOS) - Cloudfare WARP (gratis) + permite utilizar el modo proxy local para enrutar solo la navegación, debes utilizar la opción "WARP a través de proxy local" siguiendo estos pasos: 1. Inicia Cloudflare WARP y dentro de la pequeña interfaz haz click en la rueda dentada abajo a la derecha > "Preferencias" > "Avanzado" > "Configurar el modo proxy" 2. Marca la casilla "Habilite el modo proxy en este dispositivo" 3. Elige un "Puerto de escucha de proxy" entre 0-65535. ej: 1080, haz click en "Aceptar" y cierra la ventana de preferencias 4. Accede de nuevo a Cloudflare WARP y pulsa sobre el switch para habilitar el servicio. 3. Ahora debes apuntar el proxy del navegador a Cloudflare WARP, la configuración del navegador es similar a esta para el caso de navegadores basados en Firefox. Una vez hecho, deberías poder acceder a la guía de MiniBolt sin problemas. Si tienes dudas, déjalas en comentarios e intentaré resolverlas. Más info AQUÍ.
~> Proxifica tu navegador para usar la red de Tor, o utiliza el navegador oficial de Tor (recomendado).
La conclusión
Estos hechos ponen en tela de juicio los principios fundamentales de la neutralidad de la red, pilares esenciales de la Declaración de Independencia del Ciberespacio que defiende un internet libre, sin restricciones ni censura. Dichos principios se han visto quebrantados sin precedentes en este país, confirmando que ese futuro distópico que muchos negaban, ya es una realidad.
Es momento de actuar y estar preparados: debemos impulsar el desarrollo y la difusión de las herramientas anticensura que tenemos a nuestro alcance, protegiendo así la libertad digital y asegurando un acceso equitativo a la información para todos
Este compromiso es uno de los pilares fundamentales de MiniBolt, lo que convierte este desafío en una oportunidad para poner a prueba las soluciones anticensura ya disponibles, así como las que están en camino.
¡Censúrame si puedes, legislador! ¡La lucha por la privacidad y la libertad en Internet ya está en marcha!
Fuentes: * https://bandaancha.eu/articulos/movistar-o2-deja-clientes-sin-acceso-11239 * https://bandaancha.eu/articulos/esta-nueva-sentencia-autoriza-bloqueos-11257 * https://bandaancha.eu/articulos/como-saltarse-bloqueo-webs-warp-vpn-9958 * https://bandaancha.eu/articulos/como-activar-ech-chrome-acceder-webs-10689 * https://comunidad.movistar.es/t5/Soporte-Fibra-y-ADSL/Problema-con-web-que-usan-Cloudflare/td-p/5218007
-
@ 35da2266:15e70970
2025-04-16 22:45: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?iv=4u1hEphYhLWkGEvq+Jp1/A==
-
@ 66675158:1b644430
2025-03-23 11:39:41I don't believe in "vibe coding" – it's just the newest Silicon Valley fad trying to give meaning to their latest favorite technology, LLMs. We've seen this pattern before with blockchain, when suddenly Non Fungible Tokens appeared, followed by Web3 startups promising to revolutionize everything from social media to supply chains. VCs couldn't throw money fast enough at anything with "decentralized" (in name only) in the pitch deck. Andreessen Horowitz launched billion-dollar crypto funds, while Y Combinator batches filled with blockchain startups promising to be "Uber for X, but on the blockchain."
The metaverse mania followed, with Meta betting its future on digital worlds where we'd supposedly hang out as legless avatars. Decentralized (in name only) autonomous organizations emerged as the next big thing – supposedly democratic internet communities that ended up being the next scam for quick money.
Then came the inevitable collapse. The FTX implosion in late 2022 revealed fraud, Luna/Terra's death spiral wiped out billions (including my ten thousand dollars), while Celsius and BlockFi froze customer assets before bankruptcy.
By 2023, crypto winter had fully set in. The SEC started aggressive enforcement actions, while users realized that blockchain technology had delivered almost no practical value despite a decade of promises.
Blockchain's promises tapped into fundamental human desires – decentralization resonated with a generation disillusioned by traditional institutions. Evangelists presented a utopian vision of freedom from centralized control. Perhaps most significantly, crypto offered a sense of meaning in an increasingly abstract world, making the clear signs of scams harder to notice.
The technology itself had failed to solve any real-world problems at scale. By 2024, the once-mighty crypto ecosystem had become a cautionary tale. Venture firms quietly scrubbed blockchain references from their websites while founders pivoted to AI and large language models.
Most reading this are likely fellow bitcoiners and nostr users who understand that Bitcoin is blockchain's only valid use case. But I shared that painful history because I believe the AI-hype cycle will follow the same trajectory.
Just like with blockchain, we're now seeing VCs who once couldn't stop talking about "Web3" falling over themselves to fund anything with "AI" in the pitch deck. The buzzwords have simply changed from "decentralized" to "intelligent."
"Vibe coding" is the perfect example – a trendy name for what is essentially just fuzzy instructions to LLMs. Developers who've spent years honing programming skills are now supposed to believe that "vibing" with an AI is somehow a legitimate methodology.
This might be controversial to some, but obvious to others:
Formal, context-free grammar will always remain essential for building precise systems, regardless of how advanced natural language technology becomes
The mathematical precision of programming languages provides a foundation that human language's ambiguity can never replace. Programming requires precision – languages, compilers, and processors operate on explicit instructions, not vibes. What "vibe coding" advocates miss is that beneath every AI-generated snippet lies the same deterministic rules that have always governed computation.
LLMs don't understand code in any meaningful sense—they've just ingested enormous datasets of human-written code and can predict patterns. When they "work," it's because they've seen similar patterns before, not because they comprehend the underlying logic.
This creates a dangerous dependency. Junior developers "vibing" with LLMs might get working code without understanding the fundamental principles. When something breaks in production, they'll lack the knowledge to fix it.
Even experienced developers can find themselves in treacherous territory when relying too heavily on LLM-generated code. What starts as a productivity boost can transform into a dependency crutch.
The real danger isn't just technical limitations, but the false confidence it instills. Developers begin to believe they understand systems they've merely instructed an AI to generate – fundamentally different from understanding code you've written yourself.
We're already seeing the warning signs: projects cobbled together with LLM-generated code that work initially but become maintenance nightmares when requirements change or edge cases emerge.
The venture capital money is flowing exactly as it did with blockchain. Anthropic raised billions, OpenAI is valued astronomically despite minimal revenue, and countless others are competing to build ever-larger models with vague promises. Every startup now claims to be "AI-powered" regardless of whether it makes sense.
Don't get me wrong—there's genuine innovation happening in AI research. But "vibe coding" isn't it. It's a marketing term designed to make fuzzy prompting sound revolutionary.
Cursor perfectly embodies this AI hype cycle. It's an AI-enhanced code editor built on VS Code that promises to revolutionize programming by letting you "chat with your codebase." Just like blockchain startups promised to "revolutionize" industries, Cursor promises to transform development by adding LLM capabilities.
Yes, Cursor can be genuinely helpful. It can explain unfamiliar code, suggest completions, and help debug simple issues. After trying it for just an hour, I found the autocomplete to be MAGICAL for simple refactoring and basic functionality.
But the marketing goes far beyond reality. The suggestion that you can simply describe what you want and get production-ready code is dangerously misleading. What you get are approximations with:
- Security vulnerabilities the model doesn't understand
- Edge cases it hasn't considered
- Performance implications it can't reason about
- Dependency conflicts it has no way to foresee
The most concerning aspect is how such tools are marketed to beginners as shortcuts around learning fundamentals. "Why spend years learning to code when you can just tell AI what you want?" This is reminiscent of how crypto was sold as a get-rich-quick scheme requiring no actual understanding.
When you "vibe code" with an AI, you're not eliminating complexity—you're outsourcing understanding to a black box. This creates developers who can prompt but not program, who can generate but not comprehend.
The real utility of LLMs in development is in augmenting existing workflows:
- Explaining unfamiliar codebases
- Generating boilerplate for well-understood patterns
- Suggesting implementations that a developer evaluates critically
- Assisting with documentation and testing
These uses involve the model as a subordinate assistant to a knowledgeable developer, not as a replacement for expertise. This is where the technology adds value—as a sophisticated tool in skilled hands.
Cursor is just a better hammer, not a replacement for understanding what you're building. The actual value emerges when used by developers who understand what happens beneath the abstractions. They can recognize when AI suggestions make sense and when they don't because they have the fundamental knowledge to evaluate output critically.
This is precisely where the "vibe coding" narrative falls apart.
-
@ 35da2266:15e70970
2025-04-16 22:26:550uKO4r+WwogO34up9lu1CuIfR6YzkiEoN2Anyiqc6+CKJaREAgvMBeQliTvz34Fm1PymGPb0QjN2kGs5zCY8BrHyFUCjGF5nHpC6mGjQzBbeL1PFQDUsF9QcgGptUstlAMsP8HaYdK8fxG5/5ML+p+yRUR/HuRf4H7Tpwd4QMba+IzKimy/3EstVPe+EQcWbbZSw/yQTsvDoZGPhAX7Hpffg4WfKukOw2KFStKvbbboXqEfcfxlddvpdKr0aU9xKZDvXDKMf/LWl+8ZEqD95lOAv/ymnrtyRgUzjxkHB/1oAIFNnve9yM0EESiYNCVz5NL9mS5W/q/i7SBXRiPb+cbcInuvkKtfcVawpMPqPaCo=?iv=L6Yvtf+8L4j0Puogh15kig==
-
@ 3b7fc823:e194354f
2025-03-23 03:54:16A quick guide for the less than technical savvy to set up their very own free private tor enabled email using Onionmail. Privacy is for everyone, not just the super cyber nerds.
Onion Mail is an anonymous POP3/SMTP email server program hosted by various people on the internet. You can visit this site and read the details: https://en.onionmail.info/
- Download Tor Browser
First, if you don't already, go download Tor Browser. You are going to need it. https://www.torproject.org/
- Sign Up
Using Tor browser go to the directory page (https://onionmail.info/directory.html) choose one of the servers and sign up for an account. I say sign up but it is just choosing a user name you want to go before the @xyz.onion email address and solving a captcha.
- Account information
Once you are done signing up an Account information page will pop up. MAKE SURE YOU SAVE THIS!!! It has your address and passwords (for sending and receiving email) that you will need. If you lose them then you are shit out of luck.
- Install an Email Client
You can use Claws Mail, Neomutt, or whatever, but for this example, we will be using Thunderbird.
a. Download Thunderbird email client
b. The easy setup popup page that wants your name, email, and password isn't going to like your user@xyz.onion address. Just enter something that looks like a regular email address such as name@example.com and the Configure Manuallyoption will appear below. Click that.
- Configure Incoming (POP3) Server
Under Incoming Server: Protocol: POP3 Server or Hostname: xyz.onion (whatever your account info says) Port: 110 Security: STARTTLS Authentication: Normal password Username: (your username) Password: (POP3 password).
- Configure Outgoing (SMTP) Server
Under Outgoing Server: Server or Hostname: xyz.onion (whatever your account info says) Port: 25 Security: STARTTLS Authentication: Normal password Username: (your username) Password: (SMTP password).
-
Click on email at the top and change your address if you had to use a spoof one to get the configure manually to pop up.
-
Configure Proxy
a. Click the gear icon on the bottom left for settings. Scroll all the way down to Network & Disk Space. Click the settings button next to Connection. Configure how Thunderbird connects to the internet.
b. Select Manual Proxy Configuration. For SOCKS Host enter 127.0.0.1 and enter port 9050. (if you are running this through a VM the port may be different)
c. Now check the box for SOCKS5 and then Proxy DNS when using SOCKS5 down at the bottom. Click OK
- Check Email
For thunderbird to reach the onion mail server it has to be connected to tor. Depending on your local setup, it might be fine as is or you might have to have tor browser open in the background. Click on inbox and then the little cloud icon with the down arrow to check mail.
- Security Exception
Thunderbird is not going to like that the onion mail server security certificate is self signed. A popup Add Security Exception will appear. Click Confirm Security Exception.
You are done. Enjoy your new private email service.
REMEMBER: The server can read your emails unless they are encrypted. Go into account settings. Look down and click End-toEnd Encryption. Then add your OpenPGP key or open your OpenPGP Key Manager (you might have to download one if you don't already have one) and generate a new key for this account.
-
@ 35da2266:15e70970
2025-04-16 22:26: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?iv=bl4ZGJ8keKfKYGTyv2OdDQ==
-
@ 35da2266:15e70970
2025-04-16 22:26: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?iv=5Zlu0jBwAcvWV1egl6CgaA==
-
@ 5c8a5765:4fc5edee
2025-03-22 18:38:23[Читать в IPFS]
Итак, детки-котлетки, сегодня мы поговорим, как ~~не~~правильно распространять агиацию. Возьмите свои любимые антифашистские стикеры и используйте этот текст как инструкцию к ним — иначе у меня голова лопнет от того, что я вижу на улицах.
Агитация
Для начала определитесь, чем вы занимаетесь: агитируете к чему-то или поддерживаете чего-то, потому что это предполагает совершенно разные подходы. Агитацией может быть призыв к анархизму, классовой борьбе, неуплате налогов, гендерному равенству и т.д. Поддержкой может быть поддержка анархической борьбы, антифашистский идей и т.д. Первое — "вербует"/приманивает новых людей к идее, второе поддерживает только тех, кто уже знаком с идеей и уже с ней согласен.
Как должна выглядеть агитация? Представьте, что некий неонацист решил за-агитировать вас в неонацизм (с учетом, что сейчас вы его не поддерживаете): в каком случае у него больше всего на это шансов? Если вы заметите на мусорном баке наклейку "бей жыдоф"? Или если вам, например, выдадут в руки грамотный агитационный текст? Поставьте себя на место читающего: агитация должна выглядеть именно так, как мог бы выглядеть материал, который хоть немного мог бы поменять ваши текущие взгляды. А именно...
1. Агитация доступна
Она не висит на задней стороне мусорки. Она не нарисована на заброшке. Обыватель не рассматривает мусорки и не ходит по заброшкам. Чтобы масса увидела вашу агитацию, она должна висеть в заметном месте.
Ещё лучше, если она висит там, где человек по внешним причинам на мгновение задерживается, и имеет время проглядеть вашу агитацию: ибо обыватель никогда не остановится у столба посреди длинной тропы, чтобы прочесть стикер.
И учтите: если место, которое вы выбрали, уже забито стикерами, вашему придётся делить привлеченное внимание с каждым остальным.
К доступности стоит также отнести то, что агитация более значительна, если она написана на самом популярном в вашей стране языке, развешивается в разных локациях (чтобы люди разного класса могли её увидеть), если вы развешиваете в туалетах — то туалетах разного гендера (и не забывайте про инвалидные кабинки!), так далее.
Лучшие места для стикеров: лифт, автобусная остановка, метро, поручен эскалатора, внешняя сторона дверцы туалета, чистое (не разрисованное или расклеенное) зеркало.
Лучшие места для крупных агитационных листов или графитти: указанные выше, а также — заметные места подъездов,
Лучшие места для "визиток"*: оставлять под задницей на выходе из автобуса, метро, маршрутки, на стульях, скамейках и т.д.
*"Визитка" — это са-а-амый простой метод агитации: выводите нужный текст или картинки мелкими блоками на листе А4, нарезаете бумагу на кусочки "визиток" с небольшим текстом, картинкой или ссылкой, и оставляете где попало.
2. Агитация запоминается
Если вы не неонацист, какие эмоции в вас побуждает "бей жыдоф"? Вы возжелали стать неонацистом? Или это только укрепило ваши антифашистские взгляды? Или это для вас вообще никак не прозвучало?
Также для ваших противников и обывателей звучат ваши "ешь богатых!", "классовая борьба сегодня!!", "доёш онархию!!!". Это — поддержка. Уже-анархисты будут рады увидеть, что в городе есть левые активисты кроме них самих. Но это никого не переубедит и не привлечет.
А агитация привлекает. Агитация задаёт острые вопросы, которые остаются в голове. Агитация манит предложениями нового. Агитация нестереотипно предлагает.
Примеры хорошей агитации:
"Если большинство проголосует за то, чтобы ты спрыгнул(а) с вмоста, ты бы сделал(а) это? / - Может быть — если это было честным голосованием!"
"Этот телефон прослушивается - согласно законодательству США, телефонные разговоры прослушиваются без ордера или уведомленияю"
"Вы под наблюдением — текст, объясняющий тезис, и ссылка, где можно прочесть об этом подробнее."
Примеры никудышной агитации (но хорошей поддержки):
3. Агитация даёт возможность изучить больше
Хорошее правило для любой агитации: иметь ссылку на сайт, где можно найти больше информации о том, к чему агитируется. Это не обязательное, но рекомендуемое правило, ибо мало толку от человека, согласившегося с идеей анархизма и захотевшего (редчайший случай!) самостоятельно изучить больше, но не имевшего к этому простой возможности и забывшего вследствие обо всей идее.
Поддержка
А вот поддержка — ориентированная на тех, кто уже знает и уже поддерживает то, что вы любите — может быть совершенно любой. Поддержать антифашистов своего города, позлить фашистов и остаться совершенно незамеченными для обывателя — самое место для диалектики "бей жыдоф!" и "доёш онтифошизм!!".
Напоминание о безопасности
Несколько базовых напоминаний о том, что нужно помнить во время агитации:
- ОСТЕРЕГАЙТЕСЬ КАМЕР! Особенно в России! Метро, маршрутки, автобусы, учебные заведения полны ими!
- Если вас заметили гестаповцы, лучшее, что вы можете сделать — это бежать, что есть мочи.
- Шифруйте материалы, которые храните для распечаток.
- Не распечатывайте стикеры/"визитки" в публичных местах (вроде библиотек).
Спасибо за прочтение!
-
@ bccf33d8:4b705625
2025-03-19 10:07:46{"title":"nostrbook 创建的五本四书哈哈哈","author":"nostrbook.com","intro":"This is a book from ....很不错","picture":"https://432fds"}
-
@ 35da2266:15e70970
2025-04-16 22:26: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?iv=zEN50OwsSEEtA0V47e+bHA==
-
@ e111a405:fa441558
2025-03-19 08:57:18Erdoğan'ın İmamoğlu'nu akademik teknik detaylar ve iddia edilen PKK bağlantıları üzerinden sistematik olarak saf dışı bırakması, yalnızca Türkiye'ye özgü bir durum değil; demokrasinin küresel çöküşünün bir örneğidir.
Dün Almanya, yeterli inceleme yapılmadan ve zaten görevden alınmış bir çoğunlukla anayasal değişiklikleri aceleyle geçirdi; Romanya ise adayları prosedürel gerekçelerle diskalifiye ediyor. Liste uzayıp gidiyor: Macaristan'da Viktor Orbán, Sırbistan'da Aleksandar Vučić, İsrail'de Netanyahu, Polonya'da Hukuk ve Adalet Partisi – demokratik gerileme bölgeler ve siyasi sistemlerin ötesine geçiyor. Bugün insanlığın %72'si otoriter rejimler altında yaşıyor.
Yeni bir oyun kitabı var: yasal kurumları muhaliflere karşı silah olarak kullanmak, prosedürel tiyatro yoluyla meşruiyet üretmek ve anayasal görüntüyü korurken demokratik güvenceleri ortadan kaldırmak.
Demokrasinin dramatik bir çöküşünü değil, bürokratik manipülasyonla metodik olarak boğulmasını izliyoruz. Bu erozyon tesadüfi değil; merkezi güç yapılarının, ne kadar iyi tasarlanmış olursa olsun, kaçınılmaz olarak yozlaşmasının bir sonucudur.
İnanıyorum ki tek sürdürülebilir yolumuz radikal bir merkezsizleşmeden geçiyor: yönetimin yerel topluluklara dağıtılması, kripto ağları aracılığıyla finansal egemenlik sağlanması ve hiçbir tekil varlığın kontrol edemeyeceği sansüre dayanıklı platformlar üzerinden iletişim kurulması.
Merkezi olmayan sistemler, insan onurunu, merkezi otoritelerin, kariyer politikacılarının ve atanmış bürokratların boş vaatlerine bel bağlamak yerine kırılmaz kriptografik garantilerle yeniden tesis eder.
Gelecek, özgürlüğü temel alan sistemler aracılığıyla gönüllü olarak işbirliği yapan ağ bağlantılı bireylere aittir. Merkezi olmayan ve küresel olarak ağ bağlantılı toplumlar, tek noktadan başarısızlık yerine binlerce eşzamanlı deneyi mümkün kılarak yeniliği serbest bırakan antifragil toplumlardır.
Türk arkadaşlarıma tavsiyelerim: https://primal.net'i kullanın (X'e merkeziyetsiz bir alternatif), günlük işlemler ve akıllı sözleşmeler için https://zano.org 'u kullanmaya ve kabul etmeye başlayın (merkeziyetsiz, izinsiz kripto para birimi ve işlemler; yakında gizlilik odaklı bir stabilcoin ile).
-
@ 35da2266:15e70970
2025-04-16 22:23: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?iv=KAipagrOb84TsUXkLD27JQ==
-
@ e111a405:fa441558
2025-03-19 08:54:18Erdogan's calculated elimination of Imamoglu through academic technicalities and alleged ties to PKK is not really an isolated Turkish case but an example of democracy's global collapse.
Yesterday, Germany rushed constitutional changes without proper scrutiny and with a majority that was already voted out of office, Romania disqualifies candidates on procedural grounds. The list goes on: Hungary under Viktor Orbán, Serbia under Aleksandar Vučić, Israel under Netanyahu, Poland under the Law and Justice party – the democratic backsliding goes well beyond regions and political systems. 72% of humanity now lives under authoritarian control.
There is a new playbook: weaponize legal institutions against opponents, manufacture legitimacy through procedural theater, and dismantle democratic safeguards while maintaining the illusion of constitutionality.
We're witnessing not democracy's dramatic collapse but its methodical strangulation through bureaucratic manipulation. This erosion isn't coincidental but the inevitable outcome of centralized power structures that invariably corrupt even well-designed systems.
I believe that our only viable path forward lies in radical decentralization: distributing governance to local communities, financial sovereignty through crypto networks, and communication via censorship-resistant platforms that no single entity controls.
Decentralized systems restore human dignity by establishing unbreakable cryptographic guarantees rather than depending on the hollow promises of centralized authorities, career politicians, and unelected bureaucrats .
The future belongs to networked individuals collaborating voluntarily through systems designed with liberty as their foundation. Decentralized and globally networked societies are antifragile societies that unleash innovation by enabling thousands of concurrent experiments instead of single-point failures.
-
@ 35da2266:15e70970
2025-04-16 22:23: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?iv=qAlON7S2yHUCqSwGCcaWKQ==
-
@ 21335073:a244b1ad
2025-03-18 20:47:50Warning: This piece contains a conversation about difficult topics. Please proceed with caution.
TL;DR please educate your children about online safety.
Julian Assange wrote in his 2012 book Cypherpunks, “This book is not a manifesto. There isn’t time for that. This book is a warning.” I read it a few times over the past summer. Those opening lines definitely stood out to me. I wish we had listened back then. He saw something about the internet that few had the ability to see. There are some individuals who are so close to a topic that when they speak, it’s difficult for others who aren’t steeped in it to visualize what they’re talking about. I didn’t read the book until more recently. If I had read it when it came out, it probably would have sounded like an unknown foreign language to me. Today it makes more sense.
This isn’t a manifesto. This isn’t a book. There is no time for that. It’s a warning and a possible solution from a desperate and determined survivor advocate who has been pulling and unraveling a thread for a few years. At times, I feel too close to this topic to make any sense trying to convey my pathway to my conclusions or thoughts to the general public. My hope is that if nothing else, I can convey my sense of urgency while writing this. This piece is a watchman’s warning.
When a child steps online, they are walking into a new world. A new reality. When you hand a child the internet, you are handing them possibilities—good, bad, and ugly. This is a conversation about lowering the potential of negative outcomes of stepping into that new world and how I came to these conclusions. I constantly compare the internet to the road. You wouldn’t let a young child run out into the road with no guidance or safety precautions. When you hand a child the internet without any type of guidance or safety measures, you are allowing them to play in rush hour, oncoming traffic. “Look left, look right for cars before crossing.” We almost all have been taught that as children. What are we taught as humans about safety before stepping into a completely different reality like the internet? Very little.
I could never really figure out why many folks in tech, privacy rights activists, and hackers seemed so cold to me while talking about online child sexual exploitation. I always figured that as a survivor advocate for those affected by these crimes, that specific, skilled group of individuals would be very welcoming and easy to talk to about such serious topics. I actually had one hacker laugh in my face when I brought it up while I was looking for answers. I thought maybe this individual thought I was accusing them of something I wasn’t, so I felt bad for asking. I was constantly extremely disappointed and would ask myself, “Why don’t they care? What could I say to make them care more? What could I say to make them understand the crisis and the level of suffering that happens as a result of the problem?”
I have been serving minor survivors of online child sexual exploitation for years. My first case serving a survivor of this specific crime was in 2018—a 13-year-old girl sexually exploited by a serial predator on Snapchat. That was my first glimpse into this side of the internet. I won a national award for serving the minor survivors of Twitter in 2023, but I had been working on that specific project for a few years. I was nominated by a lawyer representing two survivors in a legal battle against the platform. I’ve never really spoken about this before, but at the time it was a choice for me between fighting Snapchat or Twitter. I chose Twitter—or rather, Twitter chose me. I heard about the story of John Doe #1 and John Doe #2, and I was so unbelievably broken over it that I went to war for multiple years. I was and still am royally pissed about that case. As far as I was concerned, the John Doe #1 case proved that whatever was going on with corporate tech social media was so out of control that I didn’t have time to wait, so I got to work. It was reading the messages that John Doe #1 sent to Twitter begging them to remove his sexual exploitation that broke me. He was a child begging adults to do something. A passion for justice and protecting kids makes you do wild things. I was desperate to find answers about what happened and searched for solutions. In the end, the platform Twitter was purchased. During the acquisition, I just asked Mr. Musk nicely to prioritize the issue of detection and removal of child sexual exploitation without violating digital privacy rights or eroding end-to-end encryption. Elon thanked me multiple times during the acquisition, made some changes, and I was thanked by others on the survivors’ side as well.
I still feel that even with the progress made, I really just scratched the surface with Twitter, now X. I left that passion project when I did for a few reasons. I wanted to give new leadership time to tackle the issue. Elon Musk made big promises that I knew would take a while to fulfill, but mostly I had been watching global legislation transpire around the issue, and frankly, the governments are willing to go much further with X and the rest of corporate tech than I ever would. My work begging Twitter to make changes with easier reporting of content, detection, and removal of child sexual exploitation material—without violating privacy rights or eroding end-to-end encryption—and advocating for the minor survivors of the platform went as far as my principles would have allowed. I’m grateful for that experience. I was still left with a nagging question: “How did things get so bad with Twitter where the John Doe #1 and John Doe #2 case was able to happen in the first place?” I decided to keep looking for answers. I decided to keep pulling the thread.
I never worked for Twitter. This is often confusing for folks. I will say that despite being disappointed in the platform’s leadership at times, I loved Twitter. I saw and still see its value. I definitely love the survivors of the platform, but I also loved the platform. I was a champion of the platform’s ability to give folks from virtually around the globe an opportunity to speak and be heard.
I want to be clear that John Doe #1 really is my why. He is the inspiration. I am writing this because of him. He represents so many globally, and I’m still inspired by his bravery. One child’s voice begging adults to do something—I’m an adult, I heard him. I’d go to war a thousand more lifetimes for that young man, and I don’t even know his name. Fighting has been personally dark at times; I’m not even going to try to sugarcoat it, but it has been worth it.
The data surrounding the very real crime of online child sexual exploitation is available to the public online at any time for anyone to see. I’d encourage you to go look at the data for yourself. I believe in encouraging folks to check multiple sources so that you understand the full picture. If you are uncomfortable just searching around the internet for information about this topic, use the terms “CSAM,” “CSEM,” “SG-CSEM,” or “AI Generated CSAM.” The numbers don’t lie—it’s a nightmare that’s out of control. It’s a big business. The demand is high, and unfortunately, business is booming. Organizations collect the data, tech companies often post their data, governments report frequently, and the corporate press has covered a decent portion of the conversation, so I’m sure you can find a source that you trust.
Technology is changing rapidly, which is great for innovation as a whole but horrible for the crime of online child sexual exploitation. Those wishing to exploit the vulnerable seem to be adapting to each technological change with ease. The governments are so far behind with tackling these issues that as I’m typing this, it’s borderline irrelevant to even include them while speaking about the crime or potential solutions. Technology is changing too rapidly, and their old, broken systems can’t even dare to keep up. Think of it like the governments’ “War on Drugs.” Drugs won. In this case as well, the governments are not winning. The governments are talking about maybe having a meeting on potentially maybe having legislation around the crimes. The time to have that meeting would have been many years ago. I’m not advocating for governments to legislate our way out of this. I’m on the side of educating and innovating our way out of this.
I have been clear while advocating for the minor survivors of corporate tech platforms that I would not advocate for any solution to the crime that would violate digital privacy rights or erode end-to-end encryption. That has been a personal moral position that I was unwilling to budge on. This is an extremely unpopular and borderline nonexistent position in the anti-human trafficking movement and online child protection space. I’m often fearful that I’m wrong about this. I have always thought that a better pathway forward would have been to incentivize innovation for detection and removal of content. I had no previous exposure to privacy rights activists or Cypherpunks—actually, I came to that conclusion by listening to the voices of MENA region political dissidents and human rights activists. After developing relationships with human rights activists from around the globe, I realized how important privacy rights and encryption are for those who need it most globally. I was simply unwilling to give more power, control, and opportunities for mass surveillance to big abusers like governments wishing to enslave entire nations and untrustworthy corporate tech companies to potentially end some portion of abuses online. On top of all of it, it has been clear to me for years that all potential solutions outside of violating digital privacy rights to detect and remove child sexual exploitation online have not yet been explored aggressively. I’ve been disappointed that there hasn’t been more of a conversation around preventing the crime from happening in the first place.
What has been tried is mass surveillance. In China, they are currently under mass surveillance both online and offline, and their behaviors are attached to a social credit score. Unfortunately, even on state-run and controlled social media platforms, they still have child sexual exploitation and abuse imagery pop up along with other crimes and human rights violations. They also have a thriving black market online due to the oppression from the state. In other words, even an entire loss of freedom and privacy cannot end the sexual exploitation of children online. It’s been tried. There is no reason to repeat this method.
It took me an embarrassingly long time to figure out why I always felt a slight coldness from those in tech and privacy-minded individuals about the topic of child sexual exploitation online. I didn’t have any clue about the “Four Horsemen of the Infocalypse.” This is a term coined by Timothy C. May in 1988. I would have been a child myself when he first said it. I actually laughed at myself when I heard the phrase for the first time. I finally got it. The Cypherpunks weren’t wrong about that topic. They were so spot on that it is borderline uncomfortable. I was mad at first that they knew that early during the birth of the internet that this issue would arise and didn’t address it. Then I got over it because I realized that it wasn’t their job. Their job was—is—to write code. Their job wasn’t to be involved and loving parents or survivor advocates. Their job wasn’t to educate children on internet safety or raise awareness; their job was to write code.
They knew that child sexual abuse material would be shared on the internet. They said what would happen—not in a gleeful way, but a prediction. Then it happened.
I equate it now to a concrete company laying down a road. As you’re pouring the concrete, you can say to yourself, “A terrorist might travel down this road to go kill many, and on the flip side, a beautiful child can be born in an ambulance on this road.” Who or what travels down the road is not their responsibility—they are just supposed to lay the concrete. I’d never go to a concrete pourer and ask them to solve terrorism that travels down roads. Under the current system, law enforcement should stop terrorists before they even make it to the road. The solution to this specific problem is not to treat everyone on the road like a terrorist or to not build the road.
So I understand the perceived coldness from those in tech. Not only was it not their job, but bringing up the topic was seen as the equivalent of asking a free person if they wanted to discuss one of the four topics—child abusers, terrorists, drug dealers, intellectual property pirates, etc.—that would usher in digital authoritarianism for all who are online globally.
Privacy rights advocates and groups have put up a good fight. They stood by their principles. Unfortunately, when it comes to corporate tech, I believe that the issue of privacy is almost a complete lost cause at this point. It’s still worth pushing back, but ultimately, it is a losing battle—a ticking time bomb.
I do think that corporate tech providers could have slowed down the inevitable loss of privacy at the hands of the state by prioritizing the detection and removal of CSAM when they all started online. I believe it would have bought some time, fewer would have been traumatized by that specific crime, and I do believe that it could have slowed down the demand for content. If I think too much about that, I’ll go insane, so I try to push the “if maybes” aside, but never knowing if it could have been handled differently will forever haunt me. At night when it’s quiet, I wonder what I would have done differently if given the opportunity. I’ll probably never know how much corporate tech knew and ignored in the hopes that it would go away while the problem continued to get worse. They had different priorities. The most voiceless and vulnerable exploited on corporate tech never had much of a voice, so corporate tech providers didn’t receive very much pushback.
Now I’m about to say something really wild, and you can call me whatever you want to call me, but I’m going to say what I believe to be true. I believe that the governments are either so incompetent that they allowed the proliferation of CSAM online, or they knowingly allowed the problem to fester long enough to have an excuse to violate privacy rights and erode end-to-end encryption. The US government could have seized the corporate tech providers over CSAM, but I believe that they were so useful as a propaganda arm for the regimes that they allowed them to continue virtually unscathed.
That season is done now, and the governments are making the issue a priority. It will come at a high cost. Privacy on corporate tech providers is virtually done as I’m typing this. It feels like a death rattle. I’m not particularly sure that we had much digital privacy to begin with, but the illusion of a veil of privacy feels gone.
To make matters slightly more complex, it would be hard to convince me that once AI really gets going, digital privacy will exist at all.
I believe that there should be a conversation shift to preserving freedoms and human rights in a post-privacy society.
I don’t want to get locked up because AI predicted a nasty post online from me about the government. I’m not a doomer about AI—I’m just going to roll with it personally. I’m looking forward to the positive changes that will be brought forth by AI. I see it as inevitable. A bit of privacy was helpful while it lasted. Please keep fighting to preserve what is left of privacy either way because I could be wrong about all of this.
On the topic of AI, the addition of AI to the horrific crime of child sexual abuse material and child sexual exploitation in multiple ways so far has been devastating. It’s currently out of control. The genie is out of the bottle. I am hopeful that innovation will get us humans out of this, but I’m not sure how or how long it will take. We must be extremely cautious around AI legislation. It should not be illegal to innovate even if some bad comes with the good. I don’t trust that the governments are equipped to decide the best pathway forward for AI. Source: the entire history of the government.
I have been personally negatively impacted by AI-generated content. Every few days, I get another alert that I’m featured again in what’s called “deep fake pornography” without my consent. I’m not happy about it, but what pains me the most is the thought that for a period of time down the road, many globally will experience what myself and others are experiencing now by being digitally sexually abused in this way. If you have ever had your picture taken and posted online, you are also at risk of being exploited in this way. Your child’s image can be used as well, unfortunately, and this is just the beginning of this particular nightmare. It will move to more realistic interpretations of sexual behaviors as technology improves. I have no brave words of wisdom about how to deal with that emotionally. I do have hope that innovation will save the day around this specific issue. I’m nervous that everyone online will have to ID verify due to this issue. I see that as one possible outcome that could help to prevent one problem but inadvertently cause more problems, especially for those living under authoritarian regimes or anyone who needs to remain anonymous online. A zero-knowledge proof (ZKP) would probably be the best solution to these issues. There are some survivors of violence and/or sexual trauma who need to remain anonymous online for various reasons. There are survivor stories available online of those who have been abused in this way. I’d encourage you seek out and listen to their stories.
There have been periods of time recently where I hesitate to say anything at all because more than likely AI will cover most of my concerns about education, awareness, prevention, detection, and removal of child sexual exploitation online, etc.
Unfortunately, some of the most pressing issues we’ve seen online over the last few years come in the form of “sextortion.” Self-generated child sexual exploitation (SG-CSEM) numbers are continuing to be terrifying. I’d strongly encourage that you look into sextortion data. AI + sextortion is also a huge concern. The perpetrators are using the non-sexually explicit images of children and putting their likeness on AI-generated child sexual exploitation content and extorting money, more imagery, or both from minors online. It’s like a million nightmares wrapped into one. The wild part is that these issues will only get more pervasive because technology is harnessed to perpetuate horror at a scale unimaginable to a human mind.
Even if you banned phones and the internet or tried to prevent children from accessing the internet, it wouldn’t solve it. Child sexual exploitation will still be with us until as a society we start to prevent the crime before it happens. That is the only human way out right now.
There is no reset button on the internet, but if I could go back, I’d tell survivor advocates to heed the warnings of the early internet builders and to start education and awareness campaigns designed to prevent as much online child sexual exploitation as possible. The internet and technology moved quickly, and I don’t believe that society ever really caught up. We live in a world where a child can be groomed by a predator in their own home while sitting on a couch next to their parents watching TV. We weren’t ready as a species to tackle the fast-paced algorithms and dangers online. It happened too quickly for parents to catch up. How can you parent for the ever-changing digital world unless you are constantly aware of the dangers?
I don’t think that the internet is inherently bad. I believe that it can be a powerful tool for freedom and resistance. I’ve spoken a lot about the bad online, but there is beauty as well. We often discuss how victims and survivors are abused online; we rarely discuss the fact that countless survivors around the globe have been able to share their experiences, strength, hope, as well as provide resources to the vulnerable. I do question if giving any government or tech company access to censorship, surveillance, etc., online in the name of serving survivors might not actually impact a portion of survivors negatively. There are a fair amount of survivors with powerful abusers protected by governments and the corporate press. If a survivor cannot speak to the press about their abuse, the only place they can go is online, directly or indirectly through an independent journalist who also risks being censored. This scenario isn’t hard to imagine—it already happened in China. During #MeToo, a survivor in China wanted to post their story. The government censored the post, so the survivor put their story on the blockchain. I’m excited that the survivor was creative and brave, but it’s terrifying to think that we live in a world where that situation is a necessity.
I believe that the future for many survivors sharing their stories globally will be on completely censorship-resistant and decentralized protocols. This thought in particular gives me hope. When we listen to the experiences of a diverse group of survivors, we can start to understand potential solutions to preventing the crimes from happening in the first place.
My heart is broken over the gut-wrenching stories of survivors sexually exploited online. Every time I hear the story of a survivor, I do think to myself quietly, “What could have prevented this from happening in the first place?” My heart is with survivors.
My head, on the other hand, is full of the understanding that the internet should remain free. The free flow of information should not be stopped. My mind is with the innocent citizens around the globe that deserve freedom both online and offline.
The problem is that governments don’t only want to censor illegal content that violates human rights—they create legislation that is so broad that it can impact speech and privacy of all. “Don’t you care about the kids?” Yes, I do. I do so much that I’m invested in finding solutions. I also care about all citizens around the globe that deserve an opportunity to live free from a mass surveillance society. If terrorism happens online, I should not be punished by losing my freedom. If drugs are sold online, I should not be punished. I’m not an abuser, I’m not a terrorist, and I don’t engage in illegal behaviors. I refuse to lose freedom because of others’ bad behaviors online.
I want to be clear that on a long enough timeline, the governments will decide that they can be better parents/caregivers than you can if something isn’t done to stop minors from being sexually exploited online. The price will be a complete loss of anonymity, privacy, free speech, and freedom of religion online. I find it rather insulting that governments think they’re better equipped to raise children than parents and caretakers.
So we can’t go backwards—all that we can do is go forward. Those who want to have freedom will find technology to facilitate their liberation. This will lead many over time to decentralized and open protocols. So as far as I’m concerned, this does solve a few of my worries—those who need, want, and deserve to speak freely online will have the opportunity in most countries—but what about online child sexual exploitation?
When I popped up around the decentralized space, I was met with the fear of censorship. I’m not here to censor you. I don’t write code. I couldn’t censor anyone or any piece of content even if I wanted to across the internet, no matter how depraved. I don’t have the skills to do that.
I’m here to start a conversation. Freedom comes at a cost. You must always fight for and protect your freedom. I can’t speak about protecting yourself from all of the Four Horsemen because I simply don’t know the topics well enough, but I can speak about this one topic.
If there was a shortcut to ending online child sexual exploitation, I would have found it by now. There isn’t one right now. I believe that education is the only pathway forward to preventing the crime of online child sexual exploitation for future generations.
I propose a yearly education course for every child of all school ages, taught as a standard part of the curriculum. Ideally, parents/caregivers would be involved in the education/learning process.
Course: - The creation of the internet and computers - The fight for cryptography - The tech supply chain from the ground up (example: human rights violations in the supply chain) - Corporate tech - Freedom tech - Data privacy - Digital privacy rights - AI (history-current) - Online safety (predators, scams, catfishing, extortion) - Bitcoin - Laws - How to deal with online hate and harassment - Information on who to contact if you are being abused online or offline - Algorithms - How to seek out the truth about news, etc., online
The parents/caregivers, homeschoolers, unschoolers, and those working to create decentralized parallel societies have been an inspiration while writing this, but my hope is that all children would learn this course, even in government ran schools. Ideally, parents would teach this to their own children.
The decentralized space doesn’t want child sexual exploitation to thrive. Here’s the deal: there has to be a strong prevention effort in order to protect the next generation. The internet isn’t going anywhere, predators aren’t going anywhere, and I’m not down to let anyone have the opportunity to prove that there is a need for more government. I don’t believe that the government should act as parents. The governments have had a chance to attempt to stop online child sexual exploitation, and they didn’t do it. Can we try a different pathway forward?
I’d like to put myself out of a job. I don’t want to ever hear another story like John Doe #1 ever again. This will require work. I’ve often called online child sexual exploitation the lynchpin for the internet. It’s time to arm generations of children with knowledge and tools. I can’t do this alone.
Individuals have fought so that I could have freedom online. I want to fight to protect it. I don’t want child predators to give the government any opportunity to take away freedom. Decentralized spaces are as close to a reset as we’ll get with the opportunity to do it right from the start. Start the youth off correctly by preventing potential hazards to the best of your ability.
The good news is anyone can work on this! I’d encourage you to take it and run with it. I added the additional education about the history of the internet to make the course more educational and fun. Instead of cleaning up generations of destroyed lives due to online sexual exploitation, perhaps this could inspire generations of those who will build our futures. Perhaps if the youth is armed with knowledge, they can create more tools to prevent the crime.
This one solution that I’m suggesting can be done on an individual level or on a larger scale. It should be adjusted depending on age, learning style, etc. It should be fun and playful.
This solution does not address abuse in the home or some of the root causes of offline child sexual exploitation. My hope is that it could lead to some survivors experiencing abuse in the home an opportunity to disclose with a trusted adult. The purpose for this solution is to prevent the crime of online child sexual exploitation before it occurs and to arm the youth with the tools to contact safe adults if and when it happens.
In closing, I went to hell a few times so that you didn’t have to. I spoke to the mothers of survivors of minors sexually exploited online—their tears could fill rivers. I’ve spoken with political dissidents who yearned to be free from authoritarian surveillance states. The only balance that I’ve found is freedom online for citizens around the globe and prevention from the dangers of that for the youth. Don’t slow down innovation and freedom. Educate, prepare, adapt, and look for solutions.
I’m not perfect and I’m sure that there are errors in this piece. I hope that you find them and it starts a conversation.
-
@ 35da2266:15e70970
2025-04-16 22:22:39Q7baVGp93Od0qDcvFWvotn3WJzwEinU8m7vHADa6prAZwHWVXDwggHU8+hbX/qdtGIjezOohlgAeOKS6p7vtCu5yA/ybXXRmgoNJxOMeSwRG4sL+Romo9ZmZREY7DVSPfkQQ2Z7refm/JKNP6vP3+MOqqlWxlRzICyj3DZZGGMfd8uBBI4YQj77UMbH6PjwgxPGh0uFyri0SIPzocciCMQwb3Se+POuM2s4jaseeBywLJ+Y66E91dHxOIzub6G/TimyhTPxUdEFygT5v4jVGcnn/YGR5qQqILTD8llNMJasTH0KO82yvmw4WRg+HzN+a42iZcJKjZR0sl6RbsZAYUiBYYvvJ7MT4F1nMmSP1+fg=?iv=mIOrW9I6J5sCS9K4S+i6Qg==
-
@ a39d19ec:3d88f61e
2025-03-18 17:16:50Nun da das deutsche Bundesregime den Ruin Deutschlands beschlossen hat, der sehr wahrscheinlich mit dem Werkzeug des Geld druckens "finanziert" wird, kamen mir so viele Gedanken zur Geldmengenausweitung, dass ich diese für einmal niedergeschrieben habe.
Die Ausweitung der Geldmenge führt aus klassischer wirtschaftlicher Sicht immer zu Preissteigerungen, weil mehr Geld im Umlauf auf eine begrenzte Menge an Gütern trifft. Dies lässt sich in mehreren Schritten analysieren:
1. Quantitätstheorie des Geldes
Die klassische Gleichung der Quantitätstheorie des Geldes lautet:
M • V = P • Y
wobei:
- M die Geldmenge ist,
- V die Umlaufgeschwindigkeit des Geldes,
- P das Preisniveau,
- Y die reale Wirtschaftsleistung (BIP).Wenn M steigt und V sowie Y konstant bleiben, muss P steigen – also Inflation entstehen.
2. Gütermenge bleibt begrenzt
Die Menge an real produzierten Gütern und Dienstleistungen wächst meist nur langsam im Vergleich zur Ausweitung der Geldmenge. Wenn die Geldmenge schneller steigt als die Produktionsgütermenge, führt dies dazu, dass mehr Geld für die gleiche Menge an Waren zur Verfügung steht – die Preise steigen.
3. Erwartungseffekte und Spekulation
Wenn Unternehmen und Haushalte erwarten, dass mehr Geld im Umlauf ist, da eine zentrale Planung es so wollte, können sie steigende Preise antizipieren. Unternehmen erhöhen ihre Preise vorab, und Arbeitnehmer fordern höhere Löhne. Dies kann eine sich selbst verstärkende Spirale auslösen.
4. Internationale Perspektive
Eine erhöhte Geldmenge kann die Währung abwerten, wenn andere Länder ihre Geldpolitik stabil halten. Eine schwächere Währung macht Importe teurer, was wiederum Preissteigerungen antreibt.
5. Kritik an der reinen Geldmengen-Theorie
Der Vollständigkeit halber muss erwähnt werden, dass die meisten modernen Ökonomen im Staatsauftrag argumentieren, dass Inflation nicht nur von der Geldmenge abhängt, sondern auch von der Nachfrage nach Geld (z. B. in einer Wirtschaftskrise). Dennoch zeigt die historische Erfahrung, dass eine unkontrollierte Geldmengenausweitung langfristig immer zu Preissteigerungen führt, wie etwa in der Hyperinflation der Weimarer Republik oder in Simbabwe.
-
@ df67f9a7:2d4fc200
2025-04-16 22:13:20Businesses want Nostr, but Nostr is not ready for business. What can be done?
TLDR :
What Nostr brings to business apps…
- Get your brands in front of users with your choice of SEO and Algos that YOU control.
- Access unlimited public user data from across the network without fees or permission.
- Keep your business data private, while "releasing" liability for other data collected by your apps.
- Build one app to reach a diversity of users from across the network, even from other apps.
- Build your own tech and to use it as you wish. No gate keepers or code review process.
Businesses want Nostr.
- Businesses want reliable SEO and socials to put their brands in front of users, rather than arbitrary gate keepers, censoring the marketplace on a whim.
- Businesses want open access to harvest public data for free on a soveregnty respecting network, rather than paying gate keepers for access to user data of questionalble origin.
- Businesses want the freedom to NOT take ownership of certain user data collected by their apps, rather than being liabile for moderation and safe handling on their private infrastructure.
- Busineses want a single open protocol on which to build their apps, with unlimited potential and a diversity of shared users from other apps, rather than multiple siloed networks with difering APIs and demographics.
- Businesses want to own the technology they build and to use it as they wish, rather than submit their code for approval and control by arbitrary gate keepers.
But Nostr is not ready for business.
- Businesses DON'T want proprietary app data stored publicly as signed Nostr events on user specified relays.
- Businesses DON'T want to have to specify, or be constrained by, or even navigate the complexity of Nostr NIP standards for every novel kind of content that their apps generate.
- Businesses DON'T want to "open source" their entire suite of native apps JUST to assure end users that Nostr private keys are being safely handled.
- Businesses DON'T want to have to "rewrite" their entire app backend just to accomodate the Nostr way of "users sign events but dont actually login to your server" auth architecture.
- Businesses DONT want to suffer DDOS from bots and bad actors, or to expose their users to unwanted content, or even to have their own content disappear a sea of spam and misinformation.
Here’s what can be done.
- More tools and services for private business apps to coexist with freedom tech, and even thrive together, on the Nostr network.
- Extensible Webs of Trust algos for discovery and reach into any audience or demographic of trusted users.
- WoT powered standard APIs for exposing content to Nostr (and other business apps) from within a “black box” business app.
- HTTP AUTH (NIP 98) integration for business apps, allowing users to create local content WITHOUT needing discrete signatures or “linked” user accounts.
- Frost compatible “login“ for business apps, allowing users to paste “disposable” nsecs into proprietary clients without fear of their “cold” nsec being compromised.
- Support for “incremental” (and voluntary) adoption of freedom tech into existing business apps, with easy off-ramps for businesses to transfer more and more siloed data onto the “public” network.
Thoughts so far…
-
@ 35da2266:15e70970
2025-04-16 21:10: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?iv=v9KrIoMHT1d9aqXuqmbkbw==
-
@ f839fb67:5c930939
2025-04-16 21:07:13Relays
| Name | Address | Price (Sats/Year) | Status | | - | - | - | - | | stephen's aegis relay | wss://paid.relay.vanderwarker.family | 42069 |
| | stephen's Outbox | wss://relay.vanderwarker.family | Just Me |
| | stephen's Inbox | wss://haven.vanderwarker.family/inbox | WoT |
| | stephen's DMs | wss://haven.vanderwarker.family/chat | WoT |
| | VFam Data Relay | wss://data.relay.vanderwarker.family | 0 |
| | VFam Bots Relay | wss://skeme.vanderwarker.family | Invite |
| | VFGroups (NIP29) | wss://groups.vanderwarker.family | 0 |
| | [TOR] My Phone Relay | ws://naswsosuewqxyf7ov7gr7igc4tq2rbtqoxxirwyhkbuns4lwc3iowwid.onion | 0 | Meh... |
My Pubkeys
| Name | hex | nprofile | | - | - | - | | Main | f839fb6714598a7233d09dbd42af82cc9781d0faa57474f1841af90b5c930939 | nostr:nprofile1qqs0sw0mvu29nznjx0gfm02z47pve9up6ra22ar57xzp47gttjfsjwgpramhxue69uhhyetvv9ujuanpdejx2unhv9exketj9enxzmtfd3us9mapfx | | Vanity (Backup) | 82f21be67353c0d68438003fe6e56a35e2a57c49e0899b368b5ca7aa8dde7c23 | nostr:nprofile1qqsg9usmuee48sxkssuqq0lxu44rtc4903y7pzvmx694efa23h08cgcpramhxue69uhhyetvv9ujuanpdejx2unhv9exketj9enxzmtfd3ussel49x | | VFStore | 6416f1e658ba00d42107b05ad9bf485c7e46698217e0c19f0dc2e125de3af0d0 | nostr:nprofile1qqsxg9h3uevt5qx5yyrmqkkehay9cljxdxpp0cxpnuxu9cf9mca0p5qpramhxue69uhhyetvv9ujuanpdejx2unhv9exketj9enxzmtfd3usaa8plu | | NostrSMS | 9be1b8315248eeb20f9d9ab2717d1750e4f27489eab1fa531d679dadd34c2f8d | nostr:nprofile1qqsfhcdcx9fy3m4jp7we4vn305t4pe8jwjy74v062vwk08dd6dxzlrgpramhxue69uhhyetvv9ujuanpdejx2unhv9exketj9enxzmtfd3us595d45 |
Bots
Unlocks Bot
Hex: 2e941ad17144e0a04d1b8c21c4a0dbc3fbcbb9d08ae622b5f9c85341fac7c2d0
nprofile:
nostr:nprofile1qqsza9q669c5fc9qf5dccgwy5rdu877th8gg4e3zkhuus56pltru95qpramhxue69uhhx6m9d4jjuanpdejx2unhv9exketj9enxzmtfd3ust4kvak
Latest Data:
nostr:naddr1qq882mnvda3kkttrda6kuar9wgq37amnwvaz7tmnddjk6efwweskuer9wfmkzuntv4ezuenpd45kc7gzyqhfgxk3w9zwpgzdrwxzr39qm0plhjae6z9wvg44l8y9xs06clpdqqcyqqq823cgnl9u5Step Counter
Hex: 9223d2faeb95853b4d224a184c69e1df16648d35067a88cdf947c631b57e3de7
nprofile: nostr:nprofile1qqsfyg7jlt4etpfmf53y5xzvd8sa79ny356sv75gehu50333k4lrmecpramhxue69uhhx6m9d4jjuanpdejx2unhv9exketj9enxzmtfd3ustswp3w
Latest Data:
nostr:naddr1qvzqqqr4gupzpy3r6tawh9v98dxjyjscf357rhckvjxn2pn63rxlj37xxx6hu008qys8wumn8ghj7umtv4kk2tnkv9hxgetjwashy6m9wghxvctdd9k8jtcqp3ehgets943k7atww3jhyn39gffRCTGuest
Hex: 373904615c781e46bf5bf87b4126c8a568a05393b1b840b1a2a3234d20affa0c
nprofile: nostr:nprofile1qqsrwwgyv9w8s8jxhadls76pymy2269q2wfmrwzqkx32xg6dyzhl5rqpramhxue69uhhx6m9d4jjuanpdejx2unhv9exketj9enxzmtfd3usy92jlxNow Playing
Hex: 8096ed6ba1f21a3713bd47a503ee377b0ce2f187b3e5a3ae909a25b84901018b
nprofile: nostr:nprofile1qqsgp9hddwslyx3hzw750fgracmhkr8z7xrm8edr46gf5fdcfyqsrzcpramhxue69uhhx6m9d4jjuanpdejx2unhv9exketj9enxzmtfd3uspk5v4w
Latest Data:
nostr:naddr1qq9kummh94cxccted9hxwqglwaehxw309aekketdv5h8vctwv3jhyampwf4k2u3wvesk66tv0ypzpqyka446rus6xufm63a9q0hrw7cvutcc0vl95whfpx39hpyszqvtqvzqqqr4gupdk2hd
NIP-29 Groups
- Minecraft Group Chat
nostr:naddr1qqrxvc33xpnxxqfqwaehxw309anhymm4wpejuanpdejx2unhv9exketj9enxzmtfd3usygrzymrpd2wz8ularp06y8ad5dgaddlumyt7tfzqge3vc97sgsarjvpsgqqqnpvqazypfd
- VFNet Group Chat
nostr:naddr1qqrrwvfjx9jxzqfqwaehxw309anhymm4wpejuanpdejx2unhv9exketj9enxzmtfd3usygrzymrpd2wz8ularp06y8ad5dgaddlumyt7tfzqge3vc97sgsarjvpsgqqqnpvq08hx48
"Nostrified Websites"
[D] = Saves darkmode preferences over nostr
[A] = Auth over nostr
[B] = Beta (software)
[z] = zap enabled
Other Services (Hosted code)
Emojis Packs
- Minecraft
nostr:naddr1qqy566twv43hyctxwsq37amnwvaz7tmjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gzyrurn7m8z3vc5u3n6zwm6s40stxf0qwsl2jhga83ssd0jz6ujvynjqcyqqq82nsd0k5wp
- AIM
nostr:naddr1qqxxz6tdv4kk7arfvdhkuucpramhxue69uhhyetvv9ujuanpdejx2unhv9exketj9enxzmtfd3usyg8c88akw9ze3fer85yah4p2lqkvj7qap749w360rpq6ly94eycf8ypsgqqqw48qe0j2yk
- Blobs
nostr:naddr1qqz5ymr0vfesz8mhwden5te0wfjkccte9emxzmnyv4e8wctjddjhytnxv9kkjmreqgs0sw0mvu29nznjx0gfm02z47pve9up6ra22ar57xzp47gttjfsjwgrqsqqqa2wek4ukj
- FavEmojis
nostr:naddr1qqy5vctkg4kk76nfwvq37amnwvaz7tmjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gzyrurn7m8z3vc5u3n6zwm6s40stxf0qwsl2jhga83ssd0jz6ujvynjqcyqqq82nsf7sdwt
- Modern Family
nostr:naddr1qqx56mmyv4exugzxv9kkjmreqy0hwumn8ghj7un9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jq3qlqulkec5tx98yv7snk759tuzejtcr5865468fuvyrtuskhynpyusxpqqqp65ujlj36n
- nostriches (Amethyst collection)
nostr:naddr1qq9xummnw3exjcmgv4esz8mhwden5te0wfjkccte9emxzmnyv4e8wctjddjhytnxv9kkjmreqgs0sw0mvu29nznjx0gfm02z47pve9up6ra22ar57xzp47gttjfsjwgrqsqqqa2w2sqg6w
- Pepe
nostr:naddr1qqz9qetsv5q37amnwvaz7tmjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gzyrurn7m8z3vc5u3n6zwm6s40stxf0qwsl2jhga83ssd0jz6ujvynjqcyqqq82ns85f6x7
- Minecraft Font
nostr:naddr1qq8y66twv43hyctxwssyvmmwwsq37amnwvaz7tmjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gzyrurn7m8z3vc5u3n6zwm6s40stxf0qwsl2jhga83ssd0jz6ujvynjqcyqqq82nsmzftgr
- Archer Font
nostr:naddr1qq95zunrdpjhygzxdah8gqglwaehxw309aex2mrp0yh8vctwv3jhyampwf4k2u3wvesk66tv0ypzp7peldn3gkv2wgeap8dag2hc9nyhs8g04ft5wnccgxhepdwfxzfeqvzqqqr4fclkyxsh
- SMB Font
nostr:naddr1qqv4xatsv4ezqntpwf5k7gzzwfhhg6r9wfejq3n0de6qz8mhwden5te0wfjkccte9emxzmnyv4e8wctjddjhytnxv9kkjmreqgs0sw0mvu29nznjx0gfm02z47pve9up6ra22ar57xzp47gttjfsjwgrqsqqqa2w0wqpuk
Git Over Nostr
- NostrSMS
nostr:naddr1qqyxummnw3e8xmtnqy0hwumn8ghj7un9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jqfrwaehxw309amk7apwwfjkccte9emxzmnyv4e8wctjddjhytnxv9kkjmreqyj8wumn8ghj7urpd9jzuun9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jqg5waehxw309aex2mrp0yhxgctdw4eju6t0qyxhwumn8ghj7mn0wvhxcmmvqgs0sw0mvu29nznjx0gfm02z47pve9up6ra22ar57xzp47gttjfsjwgrqsqqqaueqp0epk
- nip51backup
nostr:naddr1qq9ku6tsx5ckyctrdd6hqqglwaehxw309aex2mrp0yh8vctwv3jhyampwf4k2u3wvesk66tv0yqjxamnwvaz7tmhda6zuun9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jqfywaehxw309acxz6ty9eex2mrp0yh8vctwv3jhyampwf4k2u3wvesk66tv0yq3gamnwvaz7tmjv4kxz7fwv3sk6atn9e5k7qgdwaehxw309ahx7uewd3hkcq3qlqulkec5tx98yv7snk759tuzejtcr5865468fuvyrtuskhynpyusxpqqqpmej4gtqs6
- bukkitstr
nostr:naddr1qqykyattdd5hgum5wgq37amnwvaz7tmjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gpydmhxue69uhhwmm59eex2mrp0yh8vctwv3jhyampwf4k2u3wvesk66tv0yqjgamnwvaz7tmsv95kgtnjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gpz3mhxue69uhhyetvv9ujuerpd46hxtnfduqs6amnwvaz7tmwdaejumr0dspzp7peldn3gkv2wgeap8dag2hc9nyhs8g04ft5wnccgxhepdwfxzfeqvzqqqrhnyf6g0n2
Market Places
Please use Nostr Market or somthing simular, to view.
- VFStore
nostr:naddr1qqjx2v34xe3kxvpn95cnqven956rwvpc95unscn9943kxet98q6nxde58p3ryqglwaehxw309aex2mrp0yh8vctwv3jhyampwf4k2u3wvesk66tv0yqjvamnwvaz7tmgv9mx2m3wweskuer9wfmkzuntv4ezuenpd45kc7f0da6hgcn00qqjgamnwvaz7tmsv95kgtnjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gpydmhxue69uhhwmm59eex2mrp0yh8vctwv3jhyampwf4k2u3wvesk66tv0ypzqeqk78n93wsq6sss0vz6mxl5shr7ge5cy9lqcx0smshpyh0r4uxsqvzqqqr4gvlfm7gu
Badges
Created
- paidrelayvf
nostr:naddr1qq9hqctfv3ex2mrp09mxvqglwaehxw309aex2mrp0yh8vctwv3jhyampwf4k2u3wvesk66tv0ypzp7peldn3gkv2wgeap8dag2hc9nyhs8g04ft5wnccgxhepdwfxzfeqvzqqqr48y85v3u3
- iPow
nostr:naddr1qqzxj5r02uq37amnwvaz7tmjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gzyrurn7m8z3vc5u3n6zwm6s40stxf0qwsl2jhga83ssd0jz6ujvynjqcyqqq82wgg02u0r
- codmaster
nostr:naddr1qqykxmmyd4shxar9wgq37amnwvaz7tmjv4kxz7fwweskuer9wfmkzuntv4ezuenpd45kc7gzyrurn7m8z3vc5u3n6zwm6s40stxf0qwsl2jhga83ssd0jz6ujvynjqcyqqq82wgk3gm4g
- iMine
nostr:naddr1qqzkjntfdejsz8mhwden5te0wfjkccte9emxzmnyv4e8wctjddjhytnxv9kkjmreqgs0sw0mvu29nznjx0gfm02z47pve9up6ra22ar57xzp47gttjfsjwgrqsqqqafed5s4x5
Clients I Use
- Amethyst
nostr:naddr1qqxnzd3cx5urqv3nxymngdphqgsyvrp9u6p0mfur9dfdru3d853tx9mdjuhkphxuxgfwmryja7zsvhqrqsqqql8kavfpw3
- noStrudel
nostr:naddr1qqxnzd3cxccrvd34xser2dpkqy28wumn8ghj7un9d3shjtnyv9kh2uewd9hsygpxdq27pjfppharynrvhg6h8v2taeya5ssf49zkl9yyu5gxe4qg55psgqqq0nmq5mza9n
- nostrsms
nostr:naddr1qq9rzdejxcunxde4xymqz8mhwden5te0wfjkccte9emxzmnyv4e8wctjddjhytnxv9kkjmreqgsfhcdcx9fy3m4jp7we4vn305t4pe8jwjy74v062vwk08dd6dxzlrgrqsqqql8kjn33qm
Lists
- Bluesky
nostr:naddr1qvzqqqr4xqpzp7peldn3gkv2wgeap8dag2hc9nyhs8g04ft5wnccgxhepdwfxzfeqys8wumn8ghj7un9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jtcqqapxcat9wd4hj0ah0jw
- Fediverse
nostr:naddr1qvzqqqr4xqpzp7peldn3gkv2wgeap8dag2hc9nyhs8g04ft5wnccgxhepdwfxzfeqys8wumn8ghj7un9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jtcqp9rx2erfwejhyum9j4g0xh
- Fediverse_Bots
nostr:naddr1qvzqqqr4xqpzp7peldn3gkv2wgeap8dag2hc9nyhs8g04ft5wnccgxhepdwfxzfeqys8wumn8ghj7un9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jtcqperx2erfwejhyum9tapx7arnfcpdzh
- My Bots
nostr:naddr1qvzqqqr4xqpzp7peldn3gkv2wgeap8dag2hc9nyhs8g04ft5wnccgxhepdwfxzfeqys8wumn8ghj7un9d3shjtnkv9hxgetjwashy6m9wghxvctdd9k8jtcqz4uh5jnpwscyss24fpkxw4fewafk566twa2q8f6fyk
-
@ 21335073:a244b1ad
2025-03-18 14:43:08Warning: This piece contains a conversation about difficult topics. Please proceed with caution.
TL;DR please educate your children about online safety.
Julian Assange wrote in his 2012 book Cypherpunks, “This book is not a manifesto. There isn’t time for that. This book is a warning.” I read it a few times over the past summer. Those opening lines definitely stood out to me. I wish we had listened back then. He saw something about the internet that few had the ability to see. There are some individuals who are so close to a topic that when they speak, it’s difficult for others who aren’t steeped in it to visualize what they’re talking about. I didn’t read the book until more recently. If I had read it when it came out, it probably would have sounded like an unknown foreign language to me. Today it makes more sense.
This isn’t a manifesto. This isn’t a book. There is no time for that. It’s a warning and a possible solution from a desperate and determined survivor advocate who has been pulling and unraveling a thread for a few years. At times, I feel too close to this topic to make any sense trying to convey my pathway to my conclusions or thoughts to the general public. My hope is that if nothing else, I can convey my sense of urgency while writing this. This piece is a watchman’s warning.
When a child steps online, they are walking into a new world. A new reality. When you hand a child the internet, you are handing them possibilities—good, bad, and ugly. This is a conversation about lowering the potential of negative outcomes of stepping into that new world and how I came to these conclusions. I constantly compare the internet to the road. You wouldn’t let a young child run out into the road with no guidance or safety precautions. When you hand a child the internet without any type of guidance or safety measures, you are allowing them to play in rush hour, oncoming traffic. “Look left, look right for cars before crossing.” We almost all have been taught that as children. What are we taught as humans about safety before stepping into a completely different reality like the internet? Very little.
I could never really figure out why many folks in tech, privacy rights activists, and hackers seemed so cold to me while talking about online child sexual exploitation. I always figured that as a survivor advocate for those affected by these crimes, that specific, skilled group of individuals would be very welcoming and easy to talk to about such serious topics. I actually had one hacker laugh in my face when I brought it up while I was looking for answers. I thought maybe this individual thought I was accusing them of something I wasn’t, so I felt bad for asking. I was constantly extremely disappointed and would ask myself, “Why don’t they care? What could I say to make them care more? What could I say to make them understand the crisis and the level of suffering that happens as a result of the problem?”
I have been serving minor survivors of online child sexual exploitation for years. My first case serving a survivor of this specific crime was in 2018—a 13-year-old girl sexually exploited by a serial predator on Snapchat. That was my first glimpse into this side of the internet. I won a national award for serving the minor survivors of Twitter in 2023, but I had been working on that specific project for a few years. I was nominated by a lawyer representing two survivors in a legal battle against the platform. I’ve never really spoken about this before, but at the time it was a choice for me between fighting Snapchat or Twitter. I chose Twitter—or rather, Twitter chose me. I heard about the story of John Doe #1 and John Doe #2, and I was so unbelievably broken over it that I went to war for multiple years. I was and still am royally pissed about that case. As far as I was concerned, the John Doe #1 case proved that whatever was going on with corporate tech social media was so out of control that I didn’t have time to wait, so I got to work. It was reading the messages that John Doe #1 sent to Twitter begging them to remove his sexual exploitation that broke me. He was a child begging adults to do something. A passion for justice and protecting kids makes you do wild things. I was desperate to find answers about what happened and searched for solutions. In the end, the platform Twitter was purchased. During the acquisition, I just asked Mr. Musk nicely to prioritize the issue of detection and removal of child sexual exploitation without violating digital privacy rights or eroding end-to-end encryption. Elon thanked me multiple times during the acquisition, made some changes, and I was thanked by others on the survivors’ side as well.
I still feel that even with the progress made, I really just scratched the surface with Twitter, now X. I left that passion project when I did for a few reasons. I wanted to give new leadership time to tackle the issue. Elon Musk made big promises that I knew would take a while to fulfill, but mostly I had been watching global legislation transpire around the issue, and frankly, the governments are willing to go much further with X and the rest of corporate tech than I ever would. My work begging Twitter to make changes with easier reporting of content, detection, and removal of child sexual exploitation material—without violating privacy rights or eroding end-to-end encryption—and advocating for the minor survivors of the platform went as far as my principles would have allowed. I’m grateful for that experience. I was still left with a nagging question: “How did things get so bad with Twitter where the John Doe #1 and John Doe #2 case was able to happen in the first place?” I decided to keep looking for answers. I decided to keep pulling the thread.
I never worked for Twitter. This is often confusing for folks. I will say that despite being disappointed in the platform’s leadership at times, I loved Twitter. I saw and still see its value. I definitely love the survivors of the platform, but I also loved the platform. I was a champion of the platform’s ability to give folks from virtually around the globe an opportunity to speak and be heard.
I want to be clear that John Doe #1 really is my why. He is the inspiration. I am writing this because of him. He represents so many globally, and I’m still inspired by his bravery. One child’s voice begging adults to do something—I’m an adult, I heard him. I’d go to war a thousand more lifetimes for that young man, and I don’t even know his name. Fighting has been personally dark at times; I’m not even going to try to sugarcoat it, but it has been worth it.
The data surrounding the very real crime of online child sexual exploitation is available to the public online at any time for anyone to see. I’d encourage you to go look at the data for yourself. I believe in encouraging folks to check multiple sources so that you understand the full picture. If you are uncomfortable just searching around the internet for information about this topic, use the terms “CSAM,” “CSEM,” “SG-CSEM,” or “AI Generated CSAM.” The numbers don’t lie—it’s a nightmare that’s out of control. It’s a big business. The demand is high, and unfortunately, business is booming. Organizations collect the data, tech companies often post their data, governments report frequently, and the corporate press has covered a decent portion of the conversation, so I’m sure you can find a source that you trust.
Technology is changing rapidly, which is great for innovation as a whole but horrible for the crime of online child sexual exploitation. Those wishing to exploit the vulnerable seem to be adapting to each technological change with ease. The governments are so far behind with tackling these issues that as I’m typing this, it’s borderline irrelevant to even include them while speaking about the crime or potential solutions. Technology is changing too rapidly, and their old, broken systems can’t even dare to keep up. Think of it like the governments’ “War on Drugs.” Drugs won. In this case as well, the governments are not winning. The governments are talking about maybe having a meeting on potentially maybe having legislation around the crimes. The time to have that meeting would have been many years ago. I’m not advocating for governments to legislate our way out of this. I’m on the side of educating and innovating our way out of this.
I have been clear while advocating for the minor survivors of corporate tech platforms that I would not advocate for any solution to the crime that would violate digital privacy rights or erode end-to-end encryption. That has been a personal moral position that I was unwilling to budge on. This is an extremely unpopular and borderline nonexistent position in the anti-human trafficking movement and online child protection space. I’m often fearful that I’m wrong about this. I have always thought that a better pathway forward would have been to incentivize innovation for detection and removal of content. I had no previous exposure to privacy rights activists or Cypherpunks—actually, I came to that conclusion by listening to the voices of MENA region political dissidents and human rights activists. After developing relationships with human rights activists from around the globe, I realized how important privacy rights and encryption are for those who need it most globally. I was simply unwilling to give more power, control, and opportunities for mass surveillance to big abusers like governments wishing to enslave entire nations and untrustworthy corporate tech companies to potentially end some portion of abuses online. On top of all of it, it has been clear to me for years that all potential solutions outside of violating digital privacy rights to detect and remove child sexual exploitation online have not yet been explored aggressively. I’ve been disappointed that there hasn’t been more of a conversation around preventing the crime from happening in the first place.
What has been tried is mass surveillance. In China, they are currently under mass surveillance both online and offline, and their behaviors are attached to a social credit score. Unfortunately, even on state-run and controlled social media platforms, they still have child sexual exploitation and abuse imagery pop up along with other crimes and human rights violations. They also have a thriving black market online due to the oppression from the state. In other words, even an entire loss of freedom and privacy cannot end the sexual exploitation of children online. It’s been tried. There is no reason to repeat this method.
It took me an embarrassingly long time to figure out why I always felt a slight coldness from those in tech and privacy-minded individuals about the topic of child sexual exploitation online. I didn’t have any clue about the “Four Horsemen of the Infocalypse.” This is a term coined by Timothy C. May in 1988. I would have been a child myself when he first said it. I actually laughed at myself when I heard the phrase for the first time. I finally got it. The Cypherpunks weren’t wrong about that topic. They were so spot on that it is borderline uncomfortable. I was mad at first that they knew that early during the birth of the internet that this issue would arise and didn’t address it. Then I got over it because I realized that it wasn’t their job. Their job was—is—to write code. Their job wasn’t to be involved and loving parents or survivor advocates. Their job wasn’t to educate children on internet safety or raise awareness; their job was to write code.
They knew that child sexual abuse material would be shared on the internet. They said what would happen—not in a gleeful way, but a prediction. Then it happened.
I equate it now to a concrete company laying down a road. As you’re pouring the concrete, you can say to yourself, “A terrorist might travel down this road to go kill many, and on the flip side, a beautiful child can be born in an ambulance on this road.” Who or what travels down the road is not their responsibility—they are just supposed to lay the concrete. I’d never go to a concrete pourer and ask them to solve terrorism that travels down roads. Under the current system, law enforcement should stop terrorists before they even make it to the road. The solution to this specific problem is not to treat everyone on the road like a terrorist or to not build the road.
So I understand the perceived coldness from those in tech. Not only was it not their job, but bringing up the topic was seen as the equivalent of asking a free person if they wanted to discuss one of the four topics—child abusers, terrorists, drug dealers, intellectual property pirates, etc.—that would usher in digital authoritarianism for all who are online globally.
Privacy rights advocates and groups have put up a good fight. They stood by their principles. Unfortunately, when it comes to corporate tech, I believe that the issue of privacy is almost a complete lost cause at this point. It’s still worth pushing back, but ultimately, it is a losing battle—a ticking time bomb.
I do think that corporate tech providers could have slowed down the inevitable loss of privacy at the hands of the state by prioritizing the detection and removal of CSAM when they all started online. I believe it would have bought some time, fewer would have been traumatized by that specific crime, and I do believe that it could have slowed down the demand for content. If I think too much about that, I’ll go insane, so I try to push the “if maybes” aside, but never knowing if it could have been handled differently will forever haunt me. At night when it’s quiet, I wonder what I would have done differently if given the opportunity. I’ll probably never know how much corporate tech knew and ignored in the hopes that it would go away while the problem continued to get worse. They had different priorities. The most voiceless and vulnerable exploited on corporate tech never had much of a voice, so corporate tech providers didn’t receive very much pushback.
Now I’m about to say something really wild, and you can call me whatever you want to call me, but I’m going to say what I believe to be true. I believe that the governments are either so incompetent that they allowed the proliferation of CSAM online, or they knowingly allowed the problem to fester long enough to have an excuse to violate privacy rights and erode end-to-end encryption. The US government could have seized the corporate tech providers over CSAM, but I believe that they were so useful as a propaganda arm for the regimes that they allowed them to continue virtually unscathed.
That season is done now, and the governments are making the issue a priority. It will come at a high cost. Privacy on corporate tech providers is virtually done as I’m typing this. It feels like a death rattle. I’m not particularly sure that we had much digital privacy to begin with, but the illusion of a veil of privacy feels gone.
To make matters slightly more complex, it would be hard to convince me that once AI really gets going, digital privacy will exist at all.
I believe that there should be a conversation shift to preserving freedoms and human rights in a post-privacy society.
I don’t want to get locked up because AI predicted a nasty post online from me about the government. I’m not a doomer about AI—I’m just going to roll with it personally. I’m looking forward to the positive changes that will be brought forth by AI. I see it as inevitable. A bit of privacy was helpful while it lasted. Please keep fighting to preserve what is left of privacy either way because I could be wrong about all of this.
On the topic of AI, the addition of AI to the horrific crime of child sexual abuse material and child sexual exploitation in multiple ways so far has been devastating. It’s currently out of control. The genie is out of the bottle. I am hopeful that innovation will get us humans out of this, but I’m not sure how or how long it will take. We must be extremely cautious around AI legislation. It should not be illegal to innovate even if some bad comes with the good. I don’t trust that the governments are equipped to decide the best pathway forward for AI. Source: the entire history of the government.
I have been personally negatively impacted by AI-generated content. Every few days, I get another alert that I’m featured again in what’s called “deep fake pornography” without my consent. I’m not happy about it, but what pains me the most is the thought that for a period of time down the road, many globally will experience what myself and others are experiencing now by being digitally sexually abused in this way. If you have ever had your picture taken and posted online, you are also at risk of being exploited in this way. Your child’s image can be used as well, unfortunately, and this is just the beginning of this particular nightmare. It will move to more realistic interpretations of sexual behaviors as technology improves. I have no brave words of wisdom about how to deal with that emotionally. I do have hope that innovation will save the day around this specific issue. I’m nervous that everyone online will have to ID verify due to this issue. I see that as one possible outcome that could help to prevent one problem but inadvertently cause more problems, especially for those living under authoritarian regimes or anyone who needs to remain anonymous online. A zero-knowledge proof (ZKP) would probably be the best solution to these issues. There are some survivors of violence and/or sexual trauma who need to remain anonymous online for various reasons. There are survivor stories available online of those who have been abused in this way. I’d encourage you seek out and listen to their stories.
There have been periods of time recently where I hesitate to say anything at all because more than likely AI will cover most of my concerns about education, awareness, prevention, detection, and removal of child sexual exploitation online, etc.
Unfortunately, some of the most pressing issues we’ve seen online over the last few years come in the form of “sextortion.” Self-generated child sexual exploitation (SG-CSEM) numbers are continuing to be terrifying. I’d strongly encourage that you look into sextortion data. AI + sextortion is also a huge concern. The perpetrators are using the non-sexually explicit images of children and putting their likeness on AI-generated child sexual exploitation content and extorting money, more imagery, or both from minors online. It’s like a million nightmares wrapped into one. The wild part is that these issues will only get more pervasive because technology is harnessed to perpetuate horror at a scale unimaginable to a human mind.
Even if you banned phones and the internet or tried to prevent children from accessing the internet, it wouldn’t solve it. Child sexual exploitation will still be with us until as a society we start to prevent the crime before it happens. That is the only human way out right now.
There is no reset button on the internet, but if I could go back, I’d tell survivor advocates to heed the warnings of the early internet builders and to start education and awareness campaigns designed to prevent as much online child sexual exploitation as possible. The internet and technology moved quickly, and I don’t believe that society ever really caught up. We live in a world where a child can be groomed by a predator in their own home while sitting on a couch next to their parents watching TV. We weren’t ready as a species to tackle the fast-paced algorithms and dangers online. It happened too quickly for parents to catch up. How can you parent for the ever-changing digital world unless you are constantly aware of the dangers?
I don’t think that the internet is inherently bad. I believe that it can be a powerful tool for freedom and resistance. I’ve spoken a lot about the bad online, but there is beauty as well. We often discuss how victims and survivors are abused online; we rarely discuss the fact that countless survivors around the globe have been able to share their experiences, strength, hope, as well as provide resources to the vulnerable. I do question if giving any government or tech company access to censorship, surveillance, etc., online in the name of serving survivors might not actually impact a portion of survivors negatively. There are a fair amount of survivors with powerful abusers protected by governments and the corporate press. If a survivor cannot speak to the press about their abuse, the only place they can go is online, directly or indirectly through an independent journalist who also risks being censored. This scenario isn’t hard to imagine—it already happened in China. During #MeToo, a survivor in China wanted to post their story. The government censored the post, so the survivor put their story on the blockchain. I’m excited that the survivor was creative and brave, but it’s terrifying to think that we live in a world where that situation is a necessity.
I believe that the future for many survivors sharing their stories globally will be on completely censorship-resistant and decentralized protocols. This thought in particular gives me hope. When we listen to the experiences of a diverse group of survivors, we can start to understand potential solutions to preventing the crimes from happening in the first place.
My heart is broken over the gut-wrenching stories of survivors sexually exploited online. Every time I hear the story of a survivor, I do think to myself quietly, “What could have prevented this from happening in the first place?” My heart is with survivors.
My head, on the other hand, is full of the understanding that the internet should remain free. The free flow of information should not be stopped. My mind is with the innocent citizens around the globe that deserve freedom both online and offline.
The problem is that governments don’t only want to censor illegal content that violates human rights—they create legislation that is so broad that it can impact speech and privacy of all. “Don’t you care about the kids?” Yes, I do. I do so much that I’m invested in finding solutions. I also care about all citizens around the globe that deserve an opportunity to live free from a mass surveillance society. If terrorism happens online, I should not be punished by losing my freedom. If drugs are sold online, I should not be punished. I’m not an abuser, I’m not a terrorist, and I don’t engage in illegal behaviors. I refuse to lose freedom because of others’ bad behaviors online.
I want to be clear that on a long enough timeline, the governments will decide that they can be better parents/caregivers than you can if something isn’t done to stop minors from being sexually exploited online. The price will be a complete loss of anonymity, privacy, free speech, and freedom of religion online. I find it rather insulting that governments think they’re better equipped to raise children than parents and caretakers.
So we can’t go backwards—all that we can do is go forward. Those who want to have freedom will find technology to facilitate their liberation. This will lead many over time to decentralized and open protocols. So as far as I’m concerned, this does solve a few of my worries—those who need, want, and deserve to speak freely online will have the opportunity in most countries—but what about online child sexual exploitation?
When I popped up around the decentralized space, I was met with the fear of censorship. I’m not here to censor you. I don’t write code. I couldn’t censor anyone or any piece of content even if I wanted to across the internet, no matter how depraved. I don’t have the skills to do that.
I’m here to start a conversation. Freedom comes at a cost. You must always fight for and protect your freedom. I can’t speak about protecting yourself from all of the Four Horsemen because I simply don’t know the topics well enough, but I can speak about this one topic.
If there was a shortcut to ending online child sexual exploitation, I would have found it by now. There isn’t one right now. I believe that education is the only pathway forward to preventing the crime of online child sexual exploitation for future generations.
I propose a yearly education course for every child of all school ages, taught as a standard part of the curriculum. Ideally, parents/caregivers would be involved in the education/learning process.
Course: - The creation of the internet and computers - The fight for cryptography - The tech supply chain from the ground up (example: human rights violations in the supply chain) - Corporate tech - Freedom tech - Data privacy - Digital privacy rights - AI (history-current) - Online safety (predators, scams, catfishing, extortion) - Bitcoin - Laws - How to deal with online hate and harassment - Information on who to contact if you are being abused online or offline - Algorithms - How to seek out the truth about news, etc., online
The parents/caregivers, homeschoolers, unschoolers, and those working to create decentralized parallel societies have been an inspiration while writing this, but my hope is that all children would learn this course, even in government ran schools. Ideally, parents would teach this to their own children.
The decentralized space doesn’t want child sexual exploitation to thrive. Here’s the deal: there has to be a strong prevention effort in order to protect the next generation. The internet isn’t going anywhere, predators aren’t going anywhere, and I’m not down to let anyone have the opportunity to prove that there is a need for more government. I don’t believe that the government should act as parents. The governments have had a chance to attempt to stop online child sexual exploitation, and they didn’t do it. Can we try a different pathway forward?
I’d like to put myself out of a job. I don’t want to ever hear another story like John Doe #1 ever again. This will require work. I’ve often called online child sexual exploitation the lynchpin for the internet. It’s time to arm generations of children with knowledge and tools. I can’t do this alone.
Individuals have fought so that I could have freedom online. I want to fight to protect it. I don’t want child predators to give the government any opportunity to take away freedom. Decentralized spaces are as close to a reset as we’ll get with the opportunity to do it right from the start. Start the youth off correctly by preventing potential hazards to the best of your ability.
The good news is anyone can work on this! I’d encourage you to take it and run with it. I added the additional education about the history of the internet to make the course more educational and fun. Instead of cleaning up generations of destroyed lives due to online sexual exploitation, perhaps this could inspire generations of those who will build our futures. Perhaps if the youth is armed with knowledge, they can create more tools to prevent the crime.
This one solution that I’m suggesting can be done on an individual level or on a larger scale. It should be adjusted depending on age, learning style, etc. It should be fun and playful.
This solution does not address abuse in the home or some of the root causes of offline child sexual exploitation. My hope is that it could lead to some survivors experiencing abuse in the home an opportunity to disclose with a trusted adult. The purpose for this solution is to prevent the crime of online child sexual exploitation before it occurs and to arm the youth with the tools to contact safe adults if and when it happens.
In closing, I went to hell a few times so that you didn’t have to. I spoke to the mothers of survivors of minors sexually exploited online—their tears could fill rivers. I’ve spoken with political dissidents who yearned to be free from authoritarian surveillance states. The only balance that I’ve found is freedom online for citizens around the globe and prevention from the dangers of that for the youth. Don’t slow down innovation and freedom. Educate, prepare, adapt, and look for solutions.
I’m not perfect and I’m sure that there are errors in this piece. I hope that you find them and it starts a conversation.
-
@ 3c7dc2c5:805642a8
2025-04-16 20:30:54🧠Quote(s) of the week:
'Let me understand…
I saved 30% of my income in Bitcoin over the last five years at an average price of $30,000. I now have 4.25 years of my income in savings.
Within 5 years, bitcoin goes to $500,000. I now have 25 years of my income in savings. I stop saving at this point and simply live off 100% of my income, avoiding selling any Bitcoin.
Within 15 years, Bitcoin goes to $15,000,000. I now have 750 years of my income in savings. I retire and live on >10x my yearly income for the rest of my life, and pass on generational wealth to my children.
Let me understand… why you didn’t listen to the maxis.' - Bit Paine
🧡Bitcoin news🧡
https://i.ibb.co/1fYbX77F/Go-R7-ZJu-Ww-AA0-Xy-Q.jpg
On the 7th of April:
➡️'Bitcoin has retraced to the 350DMA at ~$76,000! Historically, one of the strongest levels of support for Bitcoin during bull cycles...' - Bitcoin Magazine Pro
➡️ 'Tuttle just filed for a first-of-its-kind ETF: a Double Short MicroStrategy ETF. It aims to profit by shorting both the 2x long ($MSTU) and 2x short ($MSTZ) MSTR ETFs, betting on their decay from daily resets.' - Bitcoin News
➡️3$ billion community bank Union Savings discloses first Bitcoin exposure.
➡️The Rational Root: Bitcoin would have to fall below $64K by next week for the spiral chart to cross the 2021 cycle's first peak (~$64K on Apr 13) Well, that didn't happen. So for now the chart is still valid.
Meanwhile, PlanB was only off by about $320k so far for his April price prediction. Yikes! (I have to admit I fully bought into three S2F models when he came out with it back in 2018)
Personally, I am not fixed on the short-term price, listening to any crypto influencer's "prediction" is like believing in Santa Claus. (Almost) all TA is wrong, very little is useful in the end, and nobody knows shit..including myself.
➡️WHITE HOUSE: “The reserve function of the dollar has caused persistent currency distortions” We’re moving toward a global, distributed, neutral reserve asset for all. You have never needed Bitcoin more than at this moment.
https://i.ibb.co/KckFJTJh/Gn9ae9-XQAEi-1-V.jpg
On the 8th of April:
➡️'Bitcoin's hashrate surpassed 1 zetahash for the first time earlier this week. This means that, in aggregate, miners around the world produced 10^21 hashes per second for some time. 1 sextillion hashes. 1,000,000,000,000,000,000,000.' -TFTC
➡️'Strategy paused Bitcoin buys last week and clarified that shareholders don’t own its BTC. Not your keys, not your coins.' -TFCT Which isn't really news. Common sense: holding exposure, not ownership. "We may be required to sell bitcoin to satisfy our financial obligations, and we may be required to make such sales at prices below our cost basis or that are otherwise unfavorable."
➡️BlackRock expands Bitcoin custody beyond Coinbase. SEC filings reveal Anchorage Digital will safeguard a portion of BTC for BlackRock’s $45B iShares Bitcoin Trust. BlackRock cites the move as part of its “ongoing risk management” and growing presence in digital assets.
➡️Phoenix Wallet is back in the USA. Why are they back?
'We welcome the "Ending Regulation By Prosecution" memo by the US DAG, and the clarity it provides for developers and operators of Bitcoin software. This is consistent with Executive Order 14178 which recognized the importance of "protecting and promoting the ability of individual citizens and private-sector entities alike to [...] develop and deploy software [and] transact with other persons [...] and to maintain self-custody". We are happy to make our products available again in the USA.'
➡️The World Food Program USA now accepts bitcoin! WFP is the world’s largest humanitarian organization and part of the United Nations. Chief Philanthropy Officer says, “Embracing new technologies like cryptocurrency isn’t just a choice—it’s necessary.”
➡️Mastercard partners with Kraken to allow European users to spend Bitcoin at over 150 million merchants worldwide.
On the 9th of April:
➡️VanEck confirms that China and Russia are settling energy trades in Bitcoin. On top of that, the $115 billion VanEck stated on President Trump's tariffs the following: "Bitcoin is evolving from a speculative asset into a functional monetary tool—particularly in economies looking to bypass the dollar and reduce exposure to U.S.-led financial systems."
Meanwhile on the same day...
➡️The United States Secretary of the Treasury Scott Bessent just ended his speech this morning by saying, “We will take a close look at regulatory impediments to the blockchain, stablecoins, and new payment systems”
➡️Pakistan plans to allocate part of its surplus electricity to Bitcoin mining, Reuters reports.
➡️'In the Swedish Parliament: “No plans for a national Bitcoin reserve – that wouldn’t be wise. We will focus on safe assets that can help us in times of crisis.” A “safe” asset—or an asset to control? Bitcoin is neutral, borderless, and unconfiscatable. It’s the hedge modern nations need.' - BT-Chick
Watch the video here
What are safe assets? Does the S&P have more volatility? US treasuries? haha How can something be more liquid than Bitcoin which trades 24/7/365 on a global scale? What is "safe" is keywords for centralized and controlled. I am not surprised though, they are one of the most conservative countries in the world, HFSP! Tack!
On a side note, Christian Ander on X: "Meeting with an MP on Monday to push the idea of a Swedish Bitcoin reserve. Interest is growing across parties—but still a "no" for now. This has never been discussed this much in Parliament. Clear trend: younger MPs are driving it, and older ones blocking it. Vote accordingly."
➡️The world’s largest credit ratings agency, S&P Global Ratings says, ‘We are focused on Bitcoin. We are focused on its characteristics as an alternative form of money, and the fact it’s decentralized and geopolitically neutral. We are starting to see adoption’ - Reuters Business
➡️Laurastacksats gave a lesson about Bitcoin to an economics class at the University of Bologna, in Italy: the oldest university in the world.
➡️ On this day, Bitcoin accumulation addresses received 48,575 BTC, the largest single-day inflow since February 2022, per CryptoQuant.
On the 10th of April:
➡️'After utterly massive outperformance in the years and decades prior, Warren Buffett's Berkshire Hathaway is about even with simply owning gold since 1998, or about 27 years ago.' - Lyn Alden
https://i.ibb.co/cSqWStcC/Go-I-3-J4-Xg-AATd-Jd.png
if you want to understand what interest rates do to investors, this tweet and graph would be a good immediate transmission on the nature of fake economies. Just be like Warren Buffet, without all the work. Just buy and hold a store of value. Bitcoin!
➡️The $30 billion public company founded by Jack Dorsey, Blocks, just released an open-source dashboard to make Bitcoin more accessible and transparent for corporate treasuries, helping lower the operational barriers for companies looking to add Bitcoin to their balance sheets.
➡️'The S&P 500 is as volatile as Bitcoin now, (and a day later) the S&P 500 is now more volatile than Bitcoin. A 77% standard deviation is NUTS, it's normally 10-15%.' - Eric Balchunas
Stocks merely adopted the volatility. Bitcoin was born in it. No more excuses for TradFi for saying Bitcoin is too volatile.
https://i.ibb.co/1GM2ghtQ/Go-La-Pkd-W8-AAJjz-C.png
For those who think Bitcoin is too volatile.
➡️'One of these things is not like the others. Change in currency supply (updated through 2024): bitcoin vs. global reserve currencies.' -Peter Parker https://i.ibb.co/5QjQ7Rf/Go-Mblov-Wk-AAz4-ZN.png
➡️S&P Global: “Bitcoin holdings may provide a hedge against long-term debasement of fiat currency through inflation, due to bitcoin's finite supply. Its value may also be driven by geopolitical factors if its security and decentralized nature lead to its increasing adoption as a reserve asset.”
➡️Parker Lewis: With or without Bessent, the Fed is functionally leveraging the US financial system by draining the system of dollar liquidity. Taking out dollars doesn't make the debt go away. Eventually, it breaks and the Fed will have to print even more money. It goes on and on until...Bitcoin.
https://i.ibb.co/MDNt07WS/Go-MV-Ho-WYAASy-M4.png
➡️Florida's House Bill 487 unanimously passed the House Insurance and Banking Subcommittee, proposing to allow the investment of up to 10% of key public funds in Bitcoin. The bill must now clear three more committees before reaching the full House and Senate for a vote.
➡️US investors are increasingly buying Bitcoin as a hedge against a weakening dollar, reflecting broader concerns about capital exodus from US financial markets, per 10x Research. "it remains premature to adopt a bullish stance."
On the 11th of April:
➡️Pakistan plans to leverage part of its 10,000 megawatts in surplus electricity for Bitcoin mining, per News Desk.
➡️Arizona PASSES Bitcoin Mining Rights Bill! The bill protects anyone running a node or mining digital assets from zoning or usage bans. Voted 17 - 12 in favor!
➡️'Former UK Prime Minister Liz Truss says Bitcoin is “a tool for taking power away from government.” “The bureaucracy knows perfectly well that it is an antidote to their power which is why they hate it.” - Simply Bitcoin
On the 12th of April:
➡️The White House official says. The U.S. may tap gold reserves to buy Bitcoin. If there is any gold in reserve of course! And this is only one senior White House official hinting...
On the 13th of April:
https://i.ibb.co/spBGXChM/Go-Zi7-Ok-XIAAo-B6.jpg
➡️Bitcoin outperforms the NASDAQ in every single timeframe. Bear in mind, that the NASDAQ outperforms the S&P 500, Dow Jones, and Gold. Outperforming short-term in a correction is impressive. Outperforming long-term is simply expected. In the end, everything is going to zero against Bitcoin.
➡️'Trump’s exemption of phones, laptops, and chips from his 145% China tariffs spares HS code 8471, which covers Bitcoin miners. This is a major win for US Bitcoin mining companies, who were staring down crippling price hikes on new rigs.' -Bitcoin News
➡️'The Bitcoin Network just broke ONE SEXTILLION HASHES (1k EH/s) for the first time in history!! 1,000,000,000,000,000,000,000 (one thousand million million million)
https://i.ibb.co/yFd0mJ0M/Gob-O6g-DWMAAj-RJq.jpg
FOR COMPARISON: - There are 1 sextillion grains of sand on Earth. - You could fit 615 earths in a flat layer with an area of one sextillion square centimeters. - There are about 6 sextillion cups of water in all the oceans of the world.
Bitcoin mining power is f* INSANE!' - CarlBMenger
On the 14th of April:
➡️Strategy has acquired 3,459 BTC for ~$285.8 million at ~$82,618 per Bitcoin and has achieved a BTC Yield of 11.4% YTD 2025. As of 4/13/2025, Strategy holds 531,644 Bitcoin acquired for ~$35.92 billion at ~$67,556 per bitcoin.
➡️On the same day, Japanese public company Metaplanet buys 319 Bitcoin for $26.3 million.
➡️'Tether will deploy its existing and future Bitcoin hashrate to OCEAN, the mining pool launched by Bitcoin Core developer Luke Dashjr. Tether says supporting decentralized mining is key to protecting Bitcoin’s long-term integrity.' - Bitcoin News
➡️Publicly traded HK Asia Holdings bought 10 Bitcoin worth $806,671 for its balance sheet.
➡️Public companies added 95,431 BTC to their balance sheets in Q1 2025. 12 new firms joined. Holdings now total 688K BTC worth $57B. - Bitwise
https://i.ibb.co/DPmshn5H/Goh-ONkl-X0-AAp-OVe.jpg
💸Traditional Finance / Macro:
On the 7th of April:
👉🏽The Hang Seng just closed at 19,828, down 3,021 points or 13.2%, officially entering a bear market, down 20% from its March peak. In China, over 2,000 stocks hit the limit down, and the CSI 1000 futures plunged 10%, also hitting its trading halt limit.
On the 8th of April:
👉🏽Apple flies in 5 planes full of iPhones to avoid US tariffs.
👉🏽'THE S&P 500 OFFICIALLY ERASES +4.5% GAIN AND TURNS RED ON THE DAY. $2.3 TRILLION erased over the last 3 hours. On a point basis, the S&P 500 just posted its largest intraday reversal in history, even larger than 2020, 2008, and 2001. You have just witnessed history.' -TKL
On the 10th of April:
👉🏽The amount of SPY calls increased by over 10x literally 10 min before the announcement. It's very obvious that Trump's "now is a good time to buy" tweet was a way for insider traders to have plausible deniability.
https://i.ibb.co/TxpKMrbk/Go-IB-P8-XYAEp-YV5.png
Explanation: SPY is a way to buy/sell the S&P 500. When you buy a SPY 504 call, it gives you the right (for a fee) to buy a stock of SPY from someone at $504 at any time If it goes up to 554, you make (50 dollars - the fee).
Just so non-traders really understand what happened here: Right before the S&P 500 (SPY) suddenly spiked, someone bought a huge number of call options — bets that the index would go up that same day. These were zero-day options, meaning they expire worthless by the end of the day unless SPY rises quickly. At the time, they were almost worthless. Then, SPY shot up. Those dirt-cheap options exploded in value. A $100K bet turned into $21 million in minutes. That green spike before the jump is not luck. It’s foreknowledge. Someone knew exactly what was about to happen.
🏦Banks:
👉🏽 no news
🌎Macro/Geopolitics:
The current state of Macro & Geopolitics can be summed up like this: Everything about current market dynamics is just ‘Madness!’ Economic policy uncertainty is TWICE the level during the Pandemic.
https://i.ibb.co/SXxTRtMt/Go-Vss-Sq-Wg-AEZAP4.jpg
On the 7th of April:
👉🏽A great post by Ray Dalio on X says tariffs are just the start. In the end, it's about a breakdown of the economic/monetary order (excessive global debt) & the global geopolitical order (US vs China). Basically, Trump is forcing the Fourth Turning through.
https://x.com/RayDalio/status/1909296189473693729 https://i.ibb.co/d0JqLqX9/Go-AO57n-W0-AADosd.jpg
I would say we are at stage 13 - 14.
Tariffs are a symptom of bigger problems. Don’t let arguments about tariffs distract us from solving the bigger problems. Also, governments are dysfunctional and life is hard. It’s the controlled demolition of a dying global system built on cheap Chinese labor, Wall Street debt games, and Washington sellouts. Ray sees the Big Cycle turning.
1) The global debt engine is seizing up. 2) The dollar is cornered by its own inflation. 3) The supply chain is a foreign hostage situation. 4) And the (U.S.) middle class got hollowed out so Davos could cash in.
To summarize: - Tariffs are a symptom, not the core issue. - Economic: Unsustainable debt, trade imbalances. - Political: Inequality fuels instability. - Geopolitical: Shift to a multipolar world. - Natural disasters: More frequent, disruptive. - Tech: AI reshapes economies and politics. - Key takeaway: Forces are linked; study history for future insight.
👉🏽On that same day: China restricts exports of seven rare earth metals to all countries.
👉🏽Lobby scandal: Between 2021 and 2023, NGOs received over €7 billion in support from the European budget. The European Court of Auditors has criticized the lack of transparency in EU funding to NGOs. There is a particular lack of reliable information and insufficient oversight. The European Commission funneled billions of euros to NGOs to promote its own policies and discredit opponents, as now also acknowledged by the European Court of Auditors. With a dubious leading role played by Frans Timmermans and Diederik Samsom.
For the Dutch readers:
https://fd.nl/samenleving/1551598/europese-rekenkamer-kritisch-over-financiering-ngos
👉🏽 'When a university with a $53 billion endowment needs to tap the bond market in this environment, it just tells you just how illiquid their investments really are.' -Mr. Vix Or is it just the game that you need to play? It is just a whole lot easier to do a debt raise than go to all stakeholders to adjust the allocation of the AUM, as all is earmarked, it would be a lengthy process.
https://i.ibb.co/mC0x8gdv/Gn8uzrn-Wk-AEJt6-G.jpg
They tapped the bond market in every prior year and they are rated aaa by ratings agencies. It isn’t just a function of the illiquidity of their investments. They hold about $3 billion that could be liquidated in one day or less (according to their financial statements). The real problem is that a vast majority of an endowment is earmarked for specific purposes—not that it is invested in illiquids.
On the 8th of April:
👉🏽President Trump says "China wants to make a deal, badly, but they don't know how to get it started." He also says that "we have the probability of a great deal" with South Korea after a call with their President.
Scott Bessent, US Treasury: Almost 70 countries have now approached us wanting to help rebalance global trade.
Regarding Bessent, read the following: an excellent thread. 'The Bessent Short' explained, so even you and I can understand it.
thread.exceptional.https://x.com/sethjlevy/status/1909634800136212608
This is a very interesting narrative. If this plays out this thinking was exceptional. Another excellent thread on Bessent: https://x.com/timjcarden/status/1910440389217312784
👉🏽 The People's Bank of China injects a net 102.5 billion yuan in open market operations. Hello, liquidity!
👉🏽There is now a 98% chance of a 25 bps interest rate cut by the June FOMC meeting.
👉🏽The White House says 104% additional tariffs on China went into EFFECT at noon ET today because China has not removed their 34% tariff on the US, per Fox News. US Dollar vs. Chinese Yuan is going vertical, meaning China's currency is depreciating swiftly.
China's beginning currency devaluation is more than just an economic signal—it's a trigger. Historically, when the yuan weakens, capital doesn’t stay put. It escapes. Some of it flows into gold, some into foreign assets—and a meaningful slice finds its way into Bitcoin.
https://i.ibb.co/KpKSLrHd/Go-HRen8-Xo-AAOpi-H.jpg
Regarding the US and China theme above one more interesting stat: 'One shipyard in China made more commercial ships in 2024 than the total number the US has produced since World War II. The destruction of America’s industrial base is a massive national security threat.' - Geiger Capital
Now Europe is going to invest € 800billion in their 'Europe Army'. I am not saying we are getting a World War III, but the dynamics are interesting.
From your perspective, why the above statement from a US perspective is a bad one... Mother Russia is building combat vehicles & munitions at “an unprecedented pace" according to a U.S. commander in Europe. A reinvigorated Russian defense industrial base is rolling out:
-1,500 tanks,
-3,000 armored vehicles,
& -200 Iskander ballistic & cruise missiles this year.
By comparison, the U.S. builds just
-135 tanks/yr and
-0 / no longer produces Bradley Fighting Vehicles.
China now boasts the world’s largest -navy, -army, -air force, and -strategic rocket force. China’s robust maritime industry is primed to build and repair ships at a wartime tempo. In a drawn-out conflict, China would have the clear advantage in building, repairing, & maintaining warships at sea.' Source: https://www.19fortyfive.com/2025/04/russia-and-chinas-military-production-surge-why-the-u-s-military-is-alarmed/
https://i.ibb.co/6G1Z6Nw/Gn-Qc-LVXYAAo-NH6-1.jpg
This is why the tariffs are happening still not sure I agree with the blanket nature of them. It sounds like the US does not understand the macro picture very well and is very overconfident. But who am I to judge?
On the 9th of April:
👉🏽'Oil prices fall below $57 for the first time since February 2021 as markets price in a global recession.' -TKL
👉🏽The European privacy legislation GDPR is a bureaucratic monster created by the European Commission, which stifles innovation and causes enormous economic damage — especially to SMEs. After 7 years, it’s finally being seriously reviewed. GDPR should never have been introduced.
Brussels finally admits it: GDPR was an economic disaster. No kidding! Here's why this rollback could save Europe's dying tech scene
Here is a great thread:
https://x.com/itsolelehmann/status/1909924693819461993
And for anyone who wants to explore the topic in depth: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3160404
On the 10th of April:
👉🏽'Lots of headlines and rumors about Trump "asking the Supreme Court to fire Powell." Here's what really happened: President Trump asked the Supreme Court to "let him fire top officials at 2 independent agencies," per Bloomberg. This could test whether Trump has the power to fire Fed Chair Powell. Trump did NOT explicitly ask to fire Powell.' - TKL
👉🏽'Gold closed up 3.3% to $3082, the biggest one-day jump since 2023, as traders anticipate much more fiat devaluation. A couple of hours later... And there it is: gold soars to new record high $3165/oz as global trade war turns to a currency war and global devaluation.' -ZeroHedge
Gold prices are flying off the chart. If you can’t tell yet, something is broken. Capital flight to Gold and CHF happening now. Eventually Bitcoin. These are not signs of winning. These are signs of the mother of all debt crises.
On the 11th of April:
👉🏽ZeroHedge: "Absolutely Spectacular Meltdown": The Basis Trade Is Blowing Up, Sparking Multi-Trillion Liquidation Panic:
https://www.zerohedge.com/markets/absolutely-spectacular-meltdown-basis-trade-blowing-sparking-multi-trillion-liquidation
Explanation: The basis trade is when investors buy Treasury bonds and sell their futures, betting on small price gaps to make money. They often borrow a lot to boost profits, but it’s risky. Right now in April 2025, this trade is crashing, like in 2020. Hedge funds are losing big, selling bonds fast, which spikes Treasury yields and shakes markets. It’s a multi-trillion dollar mess, and some fear it could spark a crisis needing a huge Fed bailout, like last time. The chart likely shows yields jumping, signaling this panic.
👉🏽China raises tariffs on U.S. imports to 125%.
Here’s the real question, who gives up first? 1. President Trump 2. China 3. Bond market At this rate, the 10Y Note Yield will be at 5% next week. Inevitably, one of these 3 factors has to give very soon as this is unsustainable. Anyway... https://i.ibb.co/VYXByy2S/Go-ODsv-OWIAAu-M9v.jpg
👉🏽UK millionaires are fleeing in record numbers. In 2024, the UK ranked second only to China in wealth exodus – ahead of even India. People vote with their feet, and it will happen in Europe, and it is concerning.
Great thread: https://x.com/thealepalombo/status/1910327100286115952
👉🏽US 10Y rises to 4.48%, the largest single weekly increase since 2001. U.S. 30-year treasury yields rise to 4.95%, the weekly increase is the biggest since 1982.
On the 11th of April:
👉🏽European Central Bank President Christine Lagarde: ECB is a ready-to-use instrument it has if needed!
On the same day, FED's Kashkari: The Fed has a tool to provide more liquidity. The Fed is reportedly "absolutely" ready to stabilize the market if needed, per Financial Times. Never discount the power of the bond market or the REPO market.
Coughing and clearing my throat for the people in the back: more liquidity, debt, printing money!
James Lavish: "Choose your phrase for translation:
“All roads lead to inflation.”
“Nothing stops this train.”
“The Fed will print again.”
👉🏽'March PPI inflation FALLS to 2.7%, below expectations of 3.3%. Core PPI inflation FALLS to 3.3%, below expectations of 3.6%. We just saw the first month-over-month decline in PPI inflation, down -0.4%, since March 2024. Both CPI and PPI inflation are down SHARPLY.' -TKL
👉🏽The U.S. budget deficit has risen to $1.3 trillion as government debt interest hits record levels. Data released by the Treasury Department on Thursday showed a deficit of $1.307 trillion for the first six months of the 2025 fiscal year, covering the period from October to March. This was the second-highest fiscal year deficit the U.S. has ever seen, with only the $1.706 trillion deficit in the first half of the 2021 fiscal year being larger.
On the 12th of April: 👉🏽M2 Money Supply going parabolic right now. Bitcoin is going parabolic soon. https://i.ibb.co/FL0W19kB/Go-VLj-Dv-Xk-AAol-Dt.jpg
BTC has tracked M2's movements 80% of the time for the past several years.
👉🏽The US publishes reciprocal tariff exclusions for computers, smartphones, and chip-making equipment. TKL: "Let's put the tariff exemptions into perspective: The US imports approximately $100 billion of computers, smartphones, and chip-making equipment from China PER YEAR. A total of $439 billion of goods were imported from China into the US in 2024. This means ~23% of ALL Chinese imports coming to the US are now exempt from "reciprocal tariffs." This is a massive U-Turn in tariff policy."
The bond market is Trump's #1 priority, and everyone knows it now.
Oh fun note, 2 minutes before the close on Friday someone bought $850,000 worth of SPY 554 calls expiring Monday. This morning the US released tariff exclusions...fascinating innit?
👉🏽If said it before and will say it again. It doesn't matter if the U.S. has a red or blue president. The US government has spent $154 billion more in 2025 than it did over the same period in 2024. Unless treasury yields drop, and fast, no amount of DOGE cutting will stop this from spiraling out of control. https://i.ibb.co/WNVJNxqh/Go-VYumq-Xw-AAod-Sv.jpg
👉🏽RAY DALIO ON DOMESTIC & WORLD ORDER “I think that right now, we are at a decision-making point and very close to a recession. I'm worried about something worse than a recession if this isn't handled well. A recession is two negative quarters of GDP, and whether it goes slightly there, we always have those things. We have something that's much more profound. We have a breakdown of the monetary order. We are going to change the monetary order because we cannot spend the amounts of money.
So, we have that problem. And when we talk about the dollar, and we talk about tariffs, we have that. We are having profound changes in our domestic order, and how ruling is existing, and we're having profound changes in the world order. Such times are very much like the 1930s.
I've studied history, and this repeats over and over again. So, if you take tariffs, if you take debt, if you take the rising power challenging existing power, if you take those factors and look at the factors that those changes in the orders, the systems, are very, very disruptive. How that's handled could produce something much worse than a recession…” - NBCNews
Yes, Bitcoin is the new monetary order, and civilizational infrastructure. Got some Bitcoin?
On the 14th of April:
👉🏽'Global net gold purchases by central banks hit 24 tonnes in February, the most since November 2024. This marks the 20th month of net buying over the last 21 months. Central banks are now on track for their 16th consecutive year of net purchases, according to the World Gold Council. Over the last 3 years, world central banks have acquired a massive 3,176 tonnes of gold. Central banks are buying gold like we are in a crisis.' -TKL
https://i.ibb.co/vvsx4qv9/Goh-TQ-n-WYAAm-6-I.jpg
🎁If you have made it this far I would like to give you a little gift, well in this case two gifts:
In April 2023, Tuur Demeester of Adamant Research published what has become another legendary entry in his line of Bitcoin bear market reports dating back to 2012. These pages aged like wine—as important today as they were 2 years ago. Download it here:
https://www.unchained.com/how-to-position-bitcoin-boom
Lyn Alden of Lyn Alden Investment Strategy explains the connection between the capital and financial imbalances the U.S. has with the rest of the world and its trade imbalances which are under so much scrutiny by the current U.S. administration. Alden argues that turbulence in markets, particularly U.S. assets, could continue, and warns listeners not to be exposed beyond their risk limits at a juncture that could be a historic time for markets and the global economy. Recorded April 10, 2025.
https://www.youtube.com/watch?v=TZN_eL_wubQ
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly.
Use the code SE3997
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple. ⠀ ⠀
⠀⠀ ⠀ ⠀⠀⠀
Do you think this post is helpful to you?
If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
@ 9063ef6b:fd1e9a09
2025-04-16 20:20:39Bitcoin is more than just a digital currency. It’s a technological revolution built on a unique set of properties that distinguish it from all other financial systems—past and present. From its decentralized architecture to its digitally verifiable scarcity, Bitcoin represents a fundamental shift in how we store and transfer value.
A Truly Decentralized Network
As of April 2025, the Bitcoin network comprises approximately 62,558 reachable nodes globally. The United States leads with 13,791 nodes (29%), followed by Germany with 6,418 nodes (13.5%), and Canada with 2,580 nodes (5.43%). bitnodes
This distributed structure is central to Bitcoin’s strength. No single entity can control the network, making it robust against censorship, regulation, or centralized failure.
Open Participation at Low Cost
Bitcoin's design allows almost anyone to participate meaningfully in the network. Thanks to its small block size and streamlined protocol, running a full node is technically and financially accessible. Even a Raspberry Pi or a basic PC is sufficient to synchronize and validate the blockchain.
However, any significant increase in block size could jeopardize this accessibility. More storage and bandwidth requirements would shift participation toward centralized data centers and cloud infrastructure—threatening Bitcoin’s decentralized ethos. This is why the community continues to fiercely debate such protocol changes.
Decentralized Governance
Bitcoin has no CEO, board, or headquarters. Its governance model is decentralized, relying on consensus among various stakeholders, including miners, developers, node operators, and increasingly, institutional participants.
Miners signal support for changes by choosing which version of the Bitcoin software to run when mining new blocks. However, full node operators ultimately enforce the network’s rules by validating blocks and transactions. If miners adopt a change that is not accepted by the majority of full nodes, that change will be rejected and the blocks considered invalid—effectively vetoing the proposal.
This "dual-power structure" ensures that changes to the network only happen through widespread consensus—a system that has proven resilient to internal disagreements and external pressures.
Resilient by Design
Bitcoin's decentralized nature gives it a level of geopolitical and technical resilience unmatched by any traditional financial system. A notable case is the 2021 mining ban in China. While initially disruptive, the network quickly recovered as miners relocated, ultimately improving decentralization.
This event underlined Bitcoin's ability to withstand regulatory attacks and misinformation (FUD—Fear, Uncertainty, Doubt), cementing its credibility as a global, censorship-resistant network.
Self-Sovereign Communication
Bitcoin enables peer-to-peer transactions across borders without intermediaries. There’s no bank, payment processor, or centralized authority required. This feature is not only technically efficient but also politically profound—it empowers individuals globally to transact freely and securely.
Absolute Scarcity
Bitcoin is the first asset in history with a mathematically verifiable, fixed supply: 21 million coins. This cap is hard-coded into its protocol and enforced by every full node. At the atomic level, Bitcoin is measured in satoshis (sats), with a total cap of approximately 2.1 quadrillion sats.
This transparency contrasts with assets like gold, whose total supply is estimated and potentially (through third parties on paper) expandable. Moreover, unlike fiat currencies, which can be inflated through central bank policy, Bitcoin is immune to such manipulation. This makes it a powerful hedge against monetary debasement.
Anchored in Energy and Time
Bitcoin's security relies on proof-of-work, a consensus algorithm that requires real-world energy and computation. This “work” ensures that network participants must invest time and electricity to mine new blocks.
This process incentivizes continual improvement in hardware and energy sourcing—helping decentralize mining geographically and economically. In contrast, alternative systems like proof-of-stake tend to favor wealth concentration by design, as influence is determined by how many tokens a participant holds.
Censorship-Resistant
The Bitcoin network itself is inherently censorship-resistant. As a decentralized system, Bitcoin transactions consist of mere text and numerical data, making it impossible to censor the underlying protocol.
However, centralized exchanges and trading platforms can be subject to censorship through regional regulations or government pressure, potentially limiting access to Bitcoin.
Decentralized exchanges and peer-to-peer marketplaces offer alternative solutions, enabling users to buy and sell Bitcoins without relying on intermediaries that can be censored or shut down.
High Security
The Bitcoin blockchain is secured through a decentralized network of thousands of nodes worldwide, which constantly verify its integrity, making it highly resistant to hacking. To add a new block of bundled transactions, miners compete to solve complex mathematical problems generated by Bitcoin's cryptography. Once a miner solves the problem, the proposed block is broadcast to the network, where each node verifies its validity. Consensus is achieved when a majority of nodes agree on the block's validity, at which point the Bitcoin blockchain is updated accordingly, ensuring the network's decentralized and trustless nature.
Manipulation of the Bitcoin network is virtually impossible due to its decentralized and robust architecture. The blockchain's chronological and immutable design prevents the deletion or alteration of previously validated blocks, ensuring the integrity of the network.
To successfully attack the Bitcoin network, an individual or organization would need to control a majority of the network's computing power, also known as a 51% attack. However, the sheer size of the Bitcoin network and the competitive nature of the proof-of-work consensus mechanism make it extremely difficult to acquire and sustain the necessary computational power. Even if an attacker were to achieve this, they could potentially execute double spends and censor transactions. Nevertheless, the transparent nature of the blockchain would quickly reveal the attack, allowing the Bitcoin network to respond and neutralize it. By invalidating the first block of the malicious chain, all subsequent blocks would also become invalid, rendering the attack futile and resulting in significant financial losses for the attacker.
One potential source of uncertainty arises from changes to the Bitcoin code made by developers. While developers can modify the software, they cannot unilaterally enforce changes to the Bitcoin protocol, as all users have the freedom to choose which version they consider valid. Attempts to alter Bitcoin's fundamental principles have historically resulted in hard forks, which have ultimately had negligible impact (e.g., BSV, BCH). The Bitcoin community has consistently rejected new ideas that compromise decentralization in favor of scalability, refusing to adopt the resulting blockchains as the legitimate version. This decentralized governance model ensures that changes to the protocol are subject to broad consensus, protecting the integrity and trustworthiness of the Bitcoin network.
Another source of uncertainty in the future could be quantum computers. The topic is slowly gaining momentum in the community and is being discussed.
My attempt to write an article with Yakihonne. Simple editor with the most necessary formatting. Technically it worked quite well so far.
Some properties are listed in the article. Which properties are missing?
-
@ dbbd7125:07ff73f8
2025-03-16 05:57:18https://weibo.com/2169989911/5137332916715995
-
@ 35da2266:15e70970
2025-04-16 18:00:26Y4lygZ3LEoXWuJtC8XaOXhzJxACtrNlgVpIZDuEZ4uObp1YL+SaPAIaAaVIUBWvCvzOabX2RxzhQJalv/C3SRCNQmcXGobODPxgz/4BNtSAmmc2UKEHvm1GhWTo6CB0EoOzVS6g97F7Mfas9jsQnwW8qEHUFiy8lSnSeFcGIkAJcUjXzvd8IoZeoF76s0uEFPuQPAtaHUTObCLwHEOj0/YuBkahCFxju9tlU9xlq+tVb0h6eZ1zr+LWW2Riejn4lDDq7D11MvVnTkAFDoW8C+xhU8OT3dX3Vz4XJ7vpKTMplyza1zZVBgD+ALOemLWO9FCEAMmd3x+8HKTZB75rCzxYMNDuIUNxMJFLLwlXu9qk=?iv=4RaKnRhDkvApSsmgJ9TttQ==
-
@ dbbd7125:07ff73f8
2025-03-16 05:48:12https://weibo.com/5324708177/5144638344398410
-
@ 21335073:a244b1ad
2025-03-15 23:00:40I want to see Nostr succeed. If you can think of a way I can help make that happen, I’m open to it. I’d like your suggestions.
My schedule’s shifting soon, and I could volunteer a few hours a week to a Nostr project. I won’t have more total time, but how I use it will change.
Why help? I care about freedom. Nostr’s one of the most powerful freedom tools I’ve seen in my lifetime. If I believe that, I should act on it.
I don’t care about money or sats. I’m not rich, I don’t have extra cash. That doesn’t drive me—freedom does. I’m volunteering, not asking for pay.
I’m not here for clout. I’ve had enough spotlight in my life; it doesn’t move me. If I wanted clout, I’d be on Twitter dropping basic takes. Clout’s easy. Freedom’s hard. I’d rather help anonymously. No speaking at events—small meetups are cool for the vibe, but big conferences? Not my thing. I’ll never hit a huge Bitcoin conference. It’s just not my scene.
That said, I could be convinced to step up if it’d really boost Nostr—as long as it’s legal and gets results.
In this space, I’d watch for social engineering. I watch out for it. I’m not here to make friends, just to help. No shade—you all seem great—but I’ve got a full life and awesome friends irl. I don’t need your crew or to be online cool. Connect anonymously if you want; I’d encourage it.
I’m sick of watching other social media alternatives grow while Nostr kinda stalls. I could trash-talk, but I’d rather do something useful.
Skills? I’m good at spotting social media problems and finding possible solutions. I won’t overhype myself—that’s weird—but if you’re responding, you probably see something in me. Perhaps you see something that I don’t see in myself.
If you need help now or later with Nostr projects, reach out. Nostr only—nothing else. Anonymous contact’s fine. Even just a suggestion on how I can pitch in, no project attached, works too. 💜
Creeps or harassment will get blocked or I’ll nuke my simplex code if it becomes a problem.
https://simplex.chat/contact#/?v=2-4&smp=smp%3A%2F%2FSkIkI6EPd2D63F4xFKfHk7I1UGZVNn6k1QWZ5rcyr6w%3D%40smp9.simplex.im%2FbI99B3KuYduH8jDr9ZwyhcSxm2UuR7j0%23%2F%3Fv%3D1-2%26dh%3DMCowBQYDK2VuAyEAS9C-zPzqW41PKySfPCEizcXb1QCus6AyDkTTjfyMIRM%253D%26srv%3Djssqzccmrcws6bhmn77vgmhfjmhwlyr3u7puw4erkyoosywgl67slqqd.onion
-
@ ba36d0f7:cd802cba
2025-04-16 16:45:071. The creative (but fleeting) pleasure of tactics
Chess tactics are like candy between meals - instant delight, but not true nourishment. Choosing whether to attack a bishop or a knight feels like picking between vanilla and chocolate ice cream: sprinkles or none, cherry on top or not...
-
They’re freedom within boundaries: the board has limits, but imagination doesn’t.
-
They mirror your style: quick strikes like an espresso? Or slow grinds like green tea?
2. Two tactics, two joys
-
Simple (an exposed king): everyday wins (like finding cash in your pocket).
-
Complex (3+ move combos): earned triumphs (like a project you’ve sweat over).
3. The Buddha’s warning: "Don’t Confuse the Sugar Rush for the Meal"
Buddhism teaches that clinging to pleasure (kāma-tanha) breeds suffering. In chess and life:
-
Tactics are desserts: sweet, but not the feast.
- Example: Beating a blunder is like winning the lottery; outplaying strategically is like building wealth.
-
The balance: Revel in that dazzling queen sacrifice - but don’t bet your game on it. Like savoring cake, not devouring the whole bakery.
4. How to play (and Live) this wisdom
✅ Ask yourself:
-
Is this move sound - or just seductive? (Like craving junk food vs. needing sustenance).
-
Am I here to win, or to wow? (Ego checkmates you faster than any opponent).
Final Move: The middle path on 64 squares
Buddhism invites joy without attachment. On the board:
-
Tactics = spice: they dazzle, but strategy feeds growth.
-
Strategy = the harvest: the patience that crowns kings.
♟️ So - do you chase the fireworks, or cultivate the long game?
Online Resources
Chess tactics - chess.com https://www.chess.com/terms/chess-tactics
Tactic examples - chess.com https://www.chess.com/article/view/chess-tactics
Tactics - lichess.org https://lichess.org/study/topic/Tactics/hot
somachess #buddhism #philosophy #chessphilosophy #chess #elsalvador #btc #apaneca #chesselsalvador
-
-
@ 66675158:1b644430
2025-03-13 11:20:49In the twilight of his days, Myrddin sat upon the weathered stone bench overlooking what remained of Libertalia. His ancient hands—once steady enough to craft the most intricate mechanisms known to the Free Realms—now trembled as they rested upon the gnarled walking stick he had carved from windfall oak. The city below, once a marvel of independent districts connected by the invisible threads of mutual cooperation, had become something else entirely. Something monstrous.
The sun was setting, casting long shadows across the Grand Plaza where the Central Authority's banners now flew. Myrddin's eyes, still sharp despite his five hundred and seventy years, could make out the uniformed guards patrolling in perfect synchronicity. The sight made his stomach turn.
"I built the foundations for freedom," he whispered to himself, "and they have erected prisons upon them."
A figure approached from behind, footsteps deliberately heavy to announce their presence. Myrddin did not turn.
"Master Myrddin," came the voice of Thalion, one of his few remaining former apprentices not yet captured by the Authority. "The Council of Remnants awaits your wisdom."
Myrddin scoffed. "Wisdom? What wisdom can I offer now? I who planted the seeds of our destruction through my own shortsightedness?"
"You could not have known—"
"I should have known!" Myrddin's voice cracked with the force of his outburst. "Every great civilization before us fell to the same disease. Centralization. The pooling of power into fewer and fewer hands until the many are crushed beneath the weight of the few. I knew this. I studied the ancient texts. I designed our systems specifically to prevent this very outcome."
Thalion remained silent, allowing the old engineer his moment of self-recrimination.
"Come," Myrddin finally said, rising with difficulty. "Let us not keep your Council waiting. Though what good words can do against the machinery of oppression, I cannot say."
As they walked the hidden path down from the overlook, Myrddin's mind drifted back to the beginning, to the founding of Libertalia four centuries earlier...
The Founding Council had gathered beneath the great oak that would later mark the center of Libertalia. Twelve visionaries from twelve different traditions, united by a single purpose: to create a society where no person would rule over another.
Young Myrddin, barely forty years old but already renowned for his brilliance, unrolled the plans he had spent a decade perfecting.
"The Nexus System," he explained, pointing to the intricate diagrams. "A method of connection that requires no central authority. Each district, each guild, each family unit can connect to the whole while maintaining complete sovereignty over their own affairs."
Lorien the Sage, eldest among them, leaned forward with interest. "You propose that trade, communication, defense—all can function without a ruling body?"
"Not only can they function," Myrddin replied with the confidence of youth, "they will function better. A decentralized system is resilient. Cut one connection, and a hundred others remain. Attack one node, and the system routes around the damage. But most importantly, when power is distributed, corruption finds no fertile ground in which to take root."
"And what prevents a group from seizing control?" asked Marwen the Warrior. "From forcing others to submit to their will?"
Myrddin smiled. "The architecture itself. See here—" he pointed to a complex series of interlocking mechanisms, "—the Consensus Protocol. Any attempt to exert control beyond one's rightful domain triggers automatic resistance from the system. The more one tries to centralize power, the more difficult it becomes."
"You speak of mechanisms as if they have will," Marwen said skeptically.
"Not will, but design," Myrddin corrected. "Like water flowing downhill. I have designed a system where power naturally disperses rather than concentrates."
The Council debated through the night, questioning every aspect of Myrddin's design. By morning, they had agreed to build their new society upon his principles. Libertalia would be a constellation of sovereign individuals and voluntary associations, connected but never controlled.
For three generations, it worked exactly as Myrddin had envisioned. The Free Realms prospered as never before. Innovation flourished in the absence of restrictive oversight. Disputes were resolved through mutual arbitration rather than imposed judgment. The Nexus System facilitated trade and communication while preserving the independence of all participants.
Myrddin, his lifespan extended by the alchemical discoveries his system had made possible, watched with pride as Libertalia became the envy of the known world.
But he had made one critical error.
"You created a system that required vigilance," Thalion said as they descended toward the hidden meeting place. "Perhaps that was the flaw."
"No," Myrddin replied. "The flaw was in believing that making something difficult would make it impossible. I should have made centralization not merely hard, but unachievable by any means."
They reached the abandoned mill that served as the Council's current hiding place. Inside, two dozen faces turned toward them—the last free thinkers in a land that once celebrated independence above all else.
Myrddin took his seat at the rough-hewn table. "Tell me," he said without preamble, "how much worse has it become since we last met?"
A woman named Sera, who had once been the foremost architect in the Eastern District, spoke first. "The Authority has implemented the Unified Identification Protocol. No citizen may trade, travel, or even purchase food without presenting their Authority Crystal for scanning."
"And these crystals track their movements?" Myrddin asked, though he already knew the answer.
"Every step," confirmed Sera. "Every transaction. Every word spoken near an Echo Stone."
Myrddin closed his eyes briefly. Echo Stones—his invention, meant to record important discoveries and preserve the wisdom of the ages. Now perverted into tools of surveillance.
"The schools have been consolidated," added a younger man named Ferris. "All children now learn from the same Authority-approved texts. The history of Libertalia is being rewritten. They claim you designed the Nexus System to eventually unite under central guidance."
"A lie," Myrddin spat.
"But a believable one," Thalion said gently. "You did build the infrastructure that made this possible, however unintentional."
Myrddin could not deny it. The Nexus System, designed for voluntary connection, had been gradually modified over the centuries. What began as simple efficiency improvements eventually created vulnerabilities. The Consensus Protocol, once the guardian of decentralization, had been subverted by those who understood its mechanics but not its purpose.
"The disease always begins the same way," Myrddin said, addressing the Council. "With promises of efficiency. Of security. Of protection from unseen threats. The centralizers never announce their true intentions. They speak of unity while forging chains."
"We know this, Master Myrddin," said Sera impatiently. "What we need is a solution, not a history lesson."
Myrddin smiled sadly. "The history is the solution, if only we would heed it. Every great civilization before us fell to centralization. The Aurelian Empire, whose emperors claimed divine right to rule all lands beneath the twin moons. The Dynasty of Eternal Harmony, whose bureaucracy grew so vast it consumed half the realm's production. The Jade Confederation, whose Council of Nine became a single Overlord within three generations."
He paused, gathering his thoughts.
"In every case, the pattern was identical. Power, once distributed among many, gradually accumulated in the hands of few. Those few, corrupted by their unnatural position, made decisions that benefited themselves rather than the whole. Resources were misallocated. Innovation stagnated. The system became brittle rather than resilient. And when crisis came—whether famine, war, or natural disaster—the centralized structure collapsed under its own weight."
"Yet people never learn," said Ferris bitterly.
"Because the benefits of centralization are immediate and visible, while its costs are delayed and diffuse," Myrddin replied. "The Authority provides convenience today at the cost of freedom tomorrow. They offer solutions to problems that would resolve themselves naturally in a decentralized system."
"What was your mistake, then?" asked Thalion. "Where in your design did you leave the opening for this disease to take hold?"
Myrddin's face darkened with regret. "I built a system that was resistant to centralization, but not immune to it. I created tools of such power and efficiency that they became irresistible targets for those who would control others. And most critically, I failed to encode the philosophical foundations of decentralization into the system itself."
He looked around at the faces of the Council, seeing in them the last embers of the fire that had once burned so brightly in Libertalia.
"I believed that people would choose freedom if given the option. I did not account for how seductive the promises of centralization would be. How easily people would trade liberty for convenience. How willingly they would accept security over sovereignty."
The decline had been gradual, almost imperceptible at first. It began two centuries after the founding, with the creation of the Coordination Council.
"Merely to improve efficiency," its proponents had argued. "To eliminate redundancies in our wonderfully decentralized system."
Myrddin, by then well into his second century, had voiced concerns but was overruled by younger generations who found the original Nexus System too cumbersome for their modern needs. The Coordination Council was given limited authority to standardize certain protocols across districts.
Within a decade, those standards became requirements. Requirements became regulations. Regulations became laws. The Council, originally composed of representatives who returned to their districts after brief terms of service, gradually transformed into a permanent body of administrators.
By the time Myrddin recognized the pattern, the disease had already taken root. The Coordination Council had become the Central Authority. The voluntary associations that once formed the backbone of Libertalian society were now subordinate to its dictates.
He had tried to warn them. He had written treatises on the dangers of centralization, had spoken at public forums, had even attempted to modify the Nexus System to restore its decentralizing functions. But he was dismissed as an outdated thinker, unable to appreciate the "improvements" of modern governance.
Now, four hundred years after the founding, Libertalia was Libertalia in name only. The Authority controlled all aspects of life. The districts, once proudly independent, were administrative zones whose boundaries could be redrawn at the Authority's whim. The guilds, once self-governing bodies of skilled craftspeople, were now licensing bureaus that enforced Authority standards.
And the people—the free, sovereign individuals for whom Myrddin had designed his system—had become subjects. Citizens, they were called, but the word had lost its original meaning of self-governance and had come to signify merely a registered and tracked unit of the Authority.
"We cannot defeat the Authority directly," Myrddin told the Council of Remnants. "They control too much. The military, the food supply, the Nexus itself. Any direct confrontation would be suicidal."
"Then what hope remains?" asked Sera.
"We must build anew," Myrddin said, his voice finding strength in purpose. "Not reform, but replace. The old system cannot be saved—it is too thoroughly corrupted. We must create a parallel system that makes centralization not merely difficult, but impossible by its very nature."
"How?" several voices asked at once.
Myrddin reached into his worn leather satchel and withdrew a small crystal, unlike the Authority Crystals in both color and cut. "I have spent the last fifty years designing what should have been built from the beginning. A truly decentralized system that cannot be subverted because its very operation depends on remaining distributed."
He placed the crystal in the center of the table. It pulsed with a soft blue light.
"The Arx," he explained. "Each crystal contains the complete system, yet functions as only one node within it. No node can control another. No group of nodes can outvote or overpower the minority. Consensus is achieved not through majority rule, but through voluntary participation."
Thalion picked up the crystal, examining it skeptically. "The Authority will never allow this."
"They need not allow what they cannot detect," Myrddin replied. "The Arx operates on principles the Authority's systems cannot recognize. It exists alongside their network but remains invisible to it."
"And what can this network do?" asked Ferris. "How does it help us against the might of the Authority?"
"It allows us to trade without their knowledge. To communicate without their oversight. To organize without their permission. And most importantly, to remember who we truly are—sovereign individuals who require no masters."
Myrddin stood, his ancient frame seeming to straighten with the weight of his purpose.
"Centralization is not merely inefficient or unjust—it is a disease that infects and ultimately kills any society it touches. It promises order but delivers stagnation. It promises security but creates vulnerability. It promises prosperity but ensures that wealth flows only to those who control the center."
He looked each Council member in the eye.
"I made a mistake in believing that making centralization difficult would be enough. This time, we will make it impossible. The Arx cannot be centralized because its very operation depends on distribution. Any attempt to control it causes it to fragment and reform beyond the controller's reach."
"And if the Authority discovers these crystals?" Sera asked.
"They can destroy individual crystals, but the network will continue. They can imprison those who carry them, but more will take their place. The design is now the important thing, not the designer. I have encoded the knowledge of how to create these crystals within the crystals themselves. The idea cannot be killed."
Myrddin sat back down, suddenly looking every one of his many years.
"I cannot undo the damage my oversight has caused. I cannot restore the Libertalia I helped to build. But I can give you the tools to create something better—something truly resistant to the disease of centralization."
The Council members looked at one another, hope kindling in eyes that had known only despair for too long.
"How do we begin?" Thalion asked.
Myrddin smiled. "We begin by remembering what we have forgotten. That no person has the right to rule another. That voluntary cooperation always outperforms forced compliance. That systems must serve individuals, not the reverse. That decentralization is not merely a technical architecture but a moral imperative."
He gestured to the crystal, still glowing in Thalion's palm.
"And we begin by building connections that cannot be controlled. Person to person. District to district. Free association by free association. The Authority believes itself invincible because it sits at the center of all things. But when there is no center, there is nothing to seize, nothing to corrupt, nothing to control."
As night fell over Libertalia, the Council of Remnants listened as the ancient engineer outlined his vision for a truly decentralized future. Outside, the Authority's patrols marched in perfect order, their uniformity a testament to the disease that had consumed what was once the freest society in the known world.
Myrddin knew he would not live to see his new design reach fruition. But for the first time in decades, he felt something like peace. He had identified his error. He had created a solution. And most importantly, he had ensured that the knowledge would outlive him.
Centralization was indeed a disease—perhaps the most persistent and destructive disease ever to afflict human societies. But like all diseases, it could be overcome with the right medicine. And the medicine was not more centralization, not better rulers, not wiser authorities.
The medicine was decentralization. Complete, uncompromising, and irreversible decentralization.
As the meeting concluded and the Council members departed with their crystals, Myrddin remained seated at the table. Thalion lingered behind.
"You know they will come for you eventually," his former apprentice said. "You are too significant a symbol to ignore forever."
Myrddin nodded. "Let them come. An old man is a small price to pay for the rebirth of freedom."
"Your new system," Thalion said hesitantly, "you are certain it cannot be centralized? That we are not simply repeating the cycle?"
"Nothing created by human hands can be perfect," Myrddin admitted. "But I have learned from my mistake. The Arx does not merely resist centralization—it actively works against it. The more one tries to control it, the more it disperses. It is not merely a technical solution but a philosophical one."
He placed a hand on Thalion's shoulder. "Remember always: centralization benefits only those at the center. For everyone else—the 99.999% who stand at the periphery—it is nothing but chains disguised as safety. Never again can we allow the disease to take root by promising efficiency at the cost of sovereignty."
Thalion nodded solemnly. "I will remember."
As his former apprentice departed, Myrddin turned to look out the small window at the city below. The Authority's lights blazed from the central towers, pushing back the natural darkness of night. So much power, concentrated in so few hands. So much potential, wasted in the service of control rather than creation.
He had lived long enough to see his greatest work corrupted. With what time remained to him, he would ensure that his final creation could not suffer the same fate. The Arx would spread, node by node, person by person, until the very concept of centralized authority became as obsolete as the diseases his earlier inventions had eradicated.
Myrddin Myrddin, Master Engineer of the Free Realms, closed his eyes and allowed himself, just for a moment, to imagine a world reborn in true freedom. A world where the disease of centralization had finally been cured.
It would not happen in his lifetime. Perhaps not even in Thalion's. But it would happen. Of that, he was certain.
For the truth that the Authority and all centralizers before them had never understood was simple: humans were not meant to be controlled. They were meant to be free. And in the end, that natural state would reassert itself, no matter how elaborate the systems of control became.
Centralization was a disease. And like all diseases, it would eventually meet a cure.
-
@ ba36d0f7:cd802cba
2025-04-16 16:39:581. El placer creativo (pero efímero) de las tácticas
Las tácticas en ajedrez son como las golosinas entre comidas: satisfacción inmediata, pero no sustento real. Escoger entre atacar a un alfil o un caballo puede ser como elegir entre helado de vainilla o chocolate - con chispas o sin chispas, cereza o sin cereza....
-
Son libertad dentro de las reglas: el tablero es finito, pero la creatividad no.
-
Reflejan tu estilo: ¿ataques rápidos como un espresso? ¿O finales lentos como un té verde?
2. Dos tipos de tácticas, dos tipos de placeres
-
Sencillas (como un rey descubierto): placeres cotidianos (como un golpe de buena suerte).
-
Complejas (combinaciones de 3+ jugadas): placeres que exigen planificación (como cumplir metas).
3. La advertencia budista: "No confundas el postre con la cena"
El Buddha enseñó que aferrarse a los placeres (kāma-tanha) genera sufrimiento. En ajedrez y en la vida:
-
Las tácticas son golosinas: te dan ventaja, pero no son estrategia.
- Ejemplo: Ganar por un descuido del rival es como heredar dinero; ganar por planificación es como construir un negocio.
-
El equilibrio: Disfruta ese sacrificio de dama espectacular… pero no bases tu juego en ellos. Como saborear un pastel ocasional sin volverse adicto al azúcar.
4. Cómo aplicar esto en el tablero (y en la vida)
✅ Pregúntate siempre:
-
¿Esta táctica es sólida o solo emocionante? (Como diferenciar antojo de hambre real).
-
¿Estoy jugando para ganar… o para impresionar? (El ego es peor enemigo que el rival).
Conclusión: El camino medio (ajedrecístico)
El budismo no pide renunciar a los placeres, sino disfrutarlos sin apego. En el ajedrez:
-
Tácticas = especias: dan sabor, pero no son el plato principal.
-
Estrategia = nutrición: lo que realmente te hace mejor jugador.
♟️ ¿Y tú? ¿Eres de los que prefieren un ataque brillante (aunque riesgoso) o una victoria lenta pero segura?
Recursos en linea
Tácticas - chess.com https://www.chess.com/es/article/view/tacticas-ajedrez
Problemas de ajedrez - chess.com https://www.chess.com/es/puzzles
Tácticas - lichess.org https://lichess.org/study/qgLXlnIF/udsuAudN
ajedrez #somachess #chess #chesselsalvador #budismo #budhism #filosofia #philosophy #apaneca #rutadelasflores #article #longform #articulo
-
-
@ 8d5ba92c:c6c3ecd5
2025-03-13 00:31:41It’s no exaggeration to say that Bitcoin has moved beyond its roots as a monetary innovation, growing into a cultural movement built on resistance, decentralization, truth, and freedom. This makes perfect sense.
Money and technology are powerful forces redefining how we interact with each other and ultimately live. From the invention of the printing press to the rise of the Internet—and the countless areas they’ve transformed to this day—every major shift in how we exchange value and information has sparked cultural revolutions. The key here is to choose authenticity over the shallow narratives so often thrown our way.
Bitcoin, by its very nature, challenges current systems. The culture it fosters naturally becomes a counterbalance to a world dominated by fiat—its rotten values, dishonest incentives, hopelessness, greed, and increasingly weaker social interactions.
Go Out and Meet Your Tribe
Over the years, I’ve been to plenty of Bitcoin-themed events. Conferences, meetups, hackathons, and so on. All sorts of gatherings. Each one has left me with not just cool memories and lessons learned, but also genuine connections. I’ve met so many amazing people—some I’m lucky to call friends now, and I know that if it weren’t for Bitcoin and the incredible community that’s grown around it, I probably never would’ve crossed paths with most of them.
Culture is not just about where we’ve come from. It’s about where we’re going...
Last year, I joined 5 different conferences, not to mention smaller gatherings. Regardless of their format, they always enrich my personal perspectives, and, in turn, shape how I see the world and my place within it.
My calendar for the first part of this year is already marked with 6 major events, one of which I’m personally co-organizing. From January to March alone, I’ve attended around 10 Bitcoin meetups and 1 larger event in Thailand—SatsNFacts, a signal-rich 'unconference' (here you can read some memories from it).
The more I travel and spend time with Bitcoiners from around the world, the happier, more hopeful, and more motivated I become. I truly believe that the places we choose to go and the people we meet along the way can profoundly shape our near and distant futures.
Discover the Heartbeat of Bitcoin Culture
Now, imagine a unique gathering that embodies the ethos of Bitcoin while blending artistic expression, intellectual stimulation and collaborative spirit. Not too big, with thousands of attendees you’ll never have a chance to talk to, and not as small as an average local meetup where every face is already familiar.
That’s exactly what Bitcoin FilmFest 2025 (#BFF25) feels like—the event I’m honored to co-create (again) this year. It’s not a typical conference but a community-driven cultural experience, that, for the third time already, is taking over one of Warsaw’s most iconic landmarks: the Palace of Culture and Science. Once known as 'Stalin’s Ziggurat,' now our Cinematic Rebel ₿ase.
I’m not writing this piece to promote the event itself but rather to show how attending more culture-themed events can impact your journey. By participating in these experiences, you’re not just learning or networking—you’re becoming part of a movement that values creativity, authentic storytelling, and human connections.
📣 Why to attend Bitcoin FilmFest (or any similar event):
#1: Fresh Perspectives Through Art and Storytelling
Even if you’re not an artist or filmmaker, most probably you consume their work in one way or another, anyway. Viewing Bitcoin’s cultural impact through the lens of independent art can make you a more conscious, and inspired member of this space. The best part? You won’t just watch films or artistic projects—you’ll also have the chance to meet the creators, ask questions, and dive deeper into their stories. This isn’t about being a random spectator. It’s about engaging with narratives that fuel your mind and heart in ways you can’t yet imagine. Simply put, step in and become part of the story.
#2: From Cypherpunks to Spiritual Awakening
Cultural events like BFF feel more organic than traditional conferences, where networking can often feel rushed or transactional. Built on art and creativity, they foster a relaxed and open atmosphere—a perfect environment to explore deeper conversations, even those with philosophical dimensions. Topics could span a wide range, from the cypherpunk movement and its emphasis on privacy to using Bitcoin to escape inflation, real-world examples of micro-nations, freedom-tech innovations, powerful music, permissionless art, higher consciousness, personal awakenings, and spirituality. When you add the opportunity to engage with like-minded participants who have firsthand experience in many of these areas, you gain mind-blowing insights that can inspire you for months to come.
#3: Non-Technical Areas and New Opportunities
While developers and their work is essential, Bitcoin thrives on a wide range of skills and perspectives. Attending events like BFF might reveal how your unique talents can contribute to this space—something you might not realize while sitting at home. As Anya, founder of Bitvocation (*a partner of this year’s BFF, running a mini-site event where you can learn more about the Bitcoin job market, details to come), once told me:
Face-to-face interactions create real connection and trust—vital ingredients for Bitcoin's social layer.
Just like her, I know that by attending Bitcoin meetups and conferences, we gain an unmatched opportunity to grow our network in real life, resulting in much closer relations than hanging out with someone on X or Nostr.
It could even be the first step toward a new career path that, precisely because of your presence, begins to take shape. Indeed, quoting Anya again:
The best opportunities come to those who truly show up.
Of course, this doesn’t mean that after attending an event, you’ll immediately walk away with a job in Bitcoin (though you might!). But you’ll likely leave with valuable connections, fresh ideas, and a clearer sense of direction.
Final Thoughts
A year has 12 months—whether that’s a lot or a little depends on how we spend it. But please remember that a sound culture thrives when we gather, create, and connect. That’s why I’d like to encourage you to make Bitcoin events and meetups part of your plans this year.
Hope to see you in Warsaw at BFF25 (May 22-25)—so you can verify for yourself whether the points I’ve raised above resonate with your own experience.
Who knows? Maybe our paths will cross at other events I’ve penciled into my calendar as well 😎
BTC Your Mind. Let it Beat. Şela
-
@ 04c915da:3dfbecc9
2025-03-12 15:30:46Recently we have seen a wave of high profile X accounts hacked. These attacks have exposed the fragility of the status quo security model used by modern social media platforms like X. Many users have asked if nostr fixes this, so lets dive in. How do these types of attacks translate into the world of nostr apps? For clarity, I will use X’s security model as representative of most big tech social platforms and compare it to nostr.
The Status Quo
On X, you never have full control of your account. Ultimately to use it requires permission from the company. They can suspend your account or limit your distribution. Theoretically they can even post from your account at will. An X account is tied to an email and password. Users can also opt into two factor authentication, which adds an extra layer of protection, a login code generated by an app. In theory, this setup works well, but it places a heavy burden on users. You need to create a strong, unique password and safeguard it. You also need to ensure your email account and phone number remain secure, as attackers can exploit these to reset your credentials and take over your account. Even if you do everything responsibly, there is another weak link in X infrastructure itself. The platform’s infrastructure allows accounts to be reset through its backend. This could happen maliciously by an employee or through an external attacker who compromises X’s backend. When an account is compromised, the legitimate user often gets locked out, unable to post or regain control without contacting X’s support team. That process can be slow, frustrating, and sometimes fruitless if support denies the request or cannot verify your identity. Often times support will require users to provide identification info in order to regain access, which represents a privacy risk. The centralized nature of X means you are ultimately at the mercy of the company’s systems and staff.
Nostr Requires Responsibility
Nostr flips this model radically. Users do not need permission from a company to access their account, they can generate as many accounts as they want, and cannot be easily censored. The key tradeoff here is that users have to take complete responsibility for their security. Instead of relying on a username, password, and corporate servers, nostr uses a private key as the sole credential for your account. Users generate this key and it is their responsibility to keep it safe. As long as you have your key, you can post. If someone else gets it, they can post too. It is that simple. This design has strong implications. Unlike X, there is no backend reset option. If your key is compromised or lost, there is no customer support to call. In a compromise scenario, both you and the attacker can post from the account simultaneously. Neither can lock the other out, since nostr relays simply accept whatever is signed with a valid key.
The benefit? No reliance on proprietary corporate infrastructure.. The negative? Security rests entirely on how well you protect your key.
Future Nostr Security Improvements
For many users, nostr’s standard security model, storing a private key on a phone with an encrypted cloud backup, will likely be sufficient. It is simple and reasonably secure. That said, nostr’s strength lies in its flexibility as an open protocol. Users will be able to choose between a range of security models, balancing convenience and protection based on need.
One promising option is a web of trust model for key rotation. Imagine pre-selecting a group of trusted friends. If your account is compromised, these people could collectively sign an event announcing the compromise to the network and designate a new key as your legitimate one. Apps could handle this process seamlessly in the background, notifying followers of the switch without much user interaction. This could become a popular choice for average users, but it is not without tradeoffs. It requires trust in your chosen web of trust, which might not suit power users or large organizations. It also has the issue that some apps may not recognize the key rotation properly and followers might get confused about which account is “real.”
For those needing higher security, there is the option of multisig using FROST (Flexible Round-Optimized Schnorr Threshold). In this setup, multiple keys must sign off on every action, including posting and updating a profile. A hacker with just one key could not do anything. This is likely overkill for most users due to complexity and inconvenience, but it could be a game changer for large organizations, companies, and governments. Imagine the White House nostr account requiring signatures from multiple people before a post goes live, that would be much more secure than the status quo big tech model.
Another option are hardware signers, similar to bitcoin hardware wallets. Private keys are kept on secure, offline devices, separate from the internet connected phone or computer you use to broadcast events. This drastically reduces the risk of remote hacks, as private keys never touches the internet. It can be used in combination with multisig setups for extra protection. This setup is much less convenient and probably overkill for most but could be ideal for governments, companies, or other high profile accounts.
Nostr’s security model is not perfect but is robust and versatile. Ultimately users are in control and security is their responsibility. Apps will give users multiple options to choose from and users will choose what best fits their need.
-
@ 35da2266:15e70970
2025-04-16 16:36:173Thc9pM9tFy/utIde/qGIH+K1BoMJjFiwdp0eS6jqRfltsfuphy1p6B/Gex4pgWJCTl2nlJs29ZIwSksqxRZSOGT3HEZpTo/FCDUsKsGkLwxu0nIzzgMz92wVDfUgRtDuPHtiUwLJi9aadqFJO8AZfmA8MHhVe3OBUwBqUTPs4j/XlrQjzgFJzCIt9KvQ5YRPF7ttcTI9JLbrRR5WIPzTk0y/DJqQnayhZ1Gi8Tec08JK5Io8lKnF7oMHpyvbEAYKMm38GJiDfKizz1Jq+WCcWhFela3PJfsbtSOM2GjEofq7ZbsGjv8dzhwaCKx8AWfDTfavWoMk17obrhrYn5yog==?iv=cE6RWgHD7fmiVCOuok9kpg==
-
@ 9dd283b1:cf9b6beb
2025-03-12 09:46:45My Raspberry Pi 4 (running Umbrel) has been disconnecting approximately once a month, and my 1TB SSD now has only 80GB of space remaining. I'm considering an upgrade—possibly moving to a Pi 5 with a 2TB drive—but I'm open to any suggestions for a better setup within a similar budget. Any recommendations?
originally posted at https://stacker.news/items/911133
-
@ 35da2266:15e70970
2025-04-16 16:29:222XNIX3i+F/eoSNicWbYwlh/ZcuLVCOfvRbjDAoLKDKDDPxGmRl5FZoShLa4iZTve6sXUOlPxG8/70hG/ANcSumK4Xb7hPDhfSOilc+v+QWhWqm6qjEiW7XP52dJsRIek7DhnOR1KNO68WZqXIwVWZzASY9GGCmXCHDyDKOSrrFHC+kSotAtpwXJeYu5d13CdizvBDxAV5wmtsrQhtNur9DMI3ra6q7QQRtNQ/cT5RRqzKE5J6d37KZgR/XbdnGCg53rruvijbO3CxZYz0YV/O56J+NP/Kp/2jROkmFNL5R90S26ezpzRoDH1aZP9z3asCNl9gbDAXbvPH+KMG4wcwcXwgiEOtcTNeT3PjOaxOn4=?iv=vkFiBD9xurO+GQ9r6UR9Kw==
-
@ 21335073:a244b1ad
2025-03-12 00:40:25Before I saw those X right-wing political “influencers” parading their Epstein binders in that PR stunt, I’d already posted this on Nostr, an open protocol.
“Today, the world’s attention will likely fixate on Epstein, governmental failures in addressing horrific abuse cases, and the influential figures who perpetrate such acts—yet few will center the victims and survivors in the conversation. The survivors of Epstein went to law enforcement and very little happened. The survivors tried to speak to the corporate press and the corporate press knowingly covered for him. In situations like these social media can serve as one of the only ways for a survivor’s voice to be heard.
It’s becoming increasingly evident that the line between centralized corporate social media and the state is razor-thin, if it exists at all. Time and again, the state shields powerful abusers when it’s politically expedient to do so. In this climate, a survivor attempting to expose someone like Epstein on a corporate tech platform faces an uphill battle—there’s no assurance their voice would even break through. Their story wouldn’t truly belong to them; it’d be at the mercy of the platform, subject to deletion at a whim. Nostr, though, offers a lifeline—a censorship-resistant space where survivors can share their truths, no matter how untouchable the abuser might seem. A survivor could remain anonymous here if they took enough steps.
Nostr holds real promise for amplifying survivor voices. And if you’re here daily, tossing out memes, take heart: you’re helping build a foundation for those who desperately need to be heard.“
That post is untouchable—no CEO, company, employee, or government can delete it. Even if I wanted to, I couldn’t take it down myself. The post will outlive me on the protocol.
The cozy alliance between the state and corporate social media hit me hard during that right-wing X “influencer” PR stunt. Elon owns X. Elon’s a special government employee. X pays those influencers to post. We don’t know who else pays them to post. Those influencers are spurred on by both the government and X to manage the Epstein case narrative. It wasn’t survivors standing there, grinning for photos—it was paid influencers, gatekeepers orchestrating yet another chance to re-exploit the already exploited.
The bond between the state and corporate social media is tight. If the other Epsteins out there are ever to be unmasked, I wouldn’t bet on a survivor’s story staying safe with a corporate tech platform, the government, any social media influencer, or mainstream journalist. Right now, only a protocol can hand survivors the power to truly own their narrative.
I don’t have anything against Elon—I’ve actually been a big supporter. I’m just stating it as I see it. X isn’t censorship resistant and they have an algorithm that they choose not the user. Corporate tech platforms like X can be a better fit for some survivors. X has safety tools and content moderation, making it a solid option for certain individuals. Grok can be a big help for survivors looking for resources or support! As a survivor, you know what works best for you, and safety should always come first—keep that front and center.
That said, a protocol is a game-changer for cases where the powerful are likely to censor. During China's # MeToo movement, survivors faced heavy censorship on social media platforms like Weibo and WeChat, where posts about sexual harassment were quickly removed, and hashtags like # MeToo or "woyeshi" were blocked by government and platform filters. To bypass this, activists turned to blockchain technology encoding their stories—like Yue Xin’s open letter about a Peking University case—into transaction metadata. This made the information tamper-proof and publicly accessible, resisting censorship since blockchain data can’t be easily altered or deleted.
I posted this on X 2/28/25. I wanted to try my first long post on a nostr client. The Epstein cover up is ongoing so it’s still relevant, unfortunately.
If you are a survivor or loved one who is reading this and needs support please reach out to: National Sexual Assault Hotline 24/7 https://rainn.org/
Hours: Available 24 hours
-
@ 0c469779:4b21d8b0
2025-03-11 10:52:49Sobre el amor
Mi percepción del amor cambió con el tiempo. Leer literatura rusa, principalmente a Dostoevsky, te cambia la perspectiva sobre el amor y la vida en general.
Por mucho tiempo mi visión sobre la vida es que la misma se basa en el sufrimiento: también la Biblia dice esto. El amor es igual, en el amor se sufre y se banca a la otra persona. El problema es que hay una distinción de sufrimientos que por mucho tiempo no tuve en cuenta. Está el sufrimiento del sacrificio y el sufrimiento masoquista. Para mí eran indistintos.
Para mí el ideal era Aliosha y Natasha de Humillados y Ofendidos: estar con alguien que me amase tanto como Natasha a Aliosha, un amor inclusive autodestructivo para Natasha, pero real. Tiene algo de épico, inalcanzable. Un sufrimiento extremo, redentor, es una vara altísima que en la vida cotidiana no se manifiesta. O el amor de Sonia a Raskolnikov, quien se fue hasta Siberia mientras estuvo en prisión para que no se quede solo en Crimen y Castigo.
Este es el tipo de amor que yo esperaba. Y como no me pasó nada tan extremo y las situaciones que llegan a ocurrir en mi vida están lejos de ser tan extremas, me parecía hasta poco lo que estaba pidiendo y que nadie pueda quedarse conmigo me parecía insuficiente.
Ahora pienso que el amor no tiene por qué ser así. Es un pensamiento nuevo que todavía estoy construyendo, y me di cuenta cuando fui a la iglesia, a pesar de que no soy cristiano. La filosofía cristiana me gusta. Va conmigo. Tiene un enfoque de humildad, superación y comunidad que me recuerda al estoicismo.
El amor se trata de resaltar lo mejor que hay en el otro. Se trata de ser un plus, de ayudar. Por eso si uno no está en su mejor etapa, si no se está cómodo con uno mismo, no se puede amar de verdad. El amor empieza en uno mismo.
Los libros son un espejo, no necesariamente vas a aprender de ellos, sino que te muestran quién sos. Resaltás lo que te importa. Por eso a pesar de saber los tipos de amores que hay en los trabajos de Dostoevsky, cometí los mismos errores varias veces.
Ser mejor depende de uno mismo y cada día se pone el granito de arena.
-
@ 35da2266:15e70970
2025-04-16 16:16:31CeZvXkLOxnAsTOPILfQtMKjpfhXfnZjEHmZlCTVflUOkJVyuw1J1fXO0A7OaQAPBZ8O/6BcGWbrEzEFo65UDCjEBmf1ADKEPDAUjNrvmCnoGlQLuSDH8Ji6JnFFc0fsCpENbbddwk+j2v0GINqlRrlHXL1aNBMj+5EgWIJu+YfS12dFzpfe1fu7in3/jtaH1lY3O347ne9usJdXEVa/admzB3VKZP6GBub6m9lWLmzRuPkgJNTEGhm0cwqZ5IhHEnfhHyY4SRfTwCQ088Z5Vjo2wkFWYizKngl4L1SQa5e9C99c+ujdgm+LkIhVc29TdbRKvRgDgPxN+W0j1TnBoOTdTbQO1nutyFyOO70E7fbt+vxgVRxJ6+M64MjuvfT447R6Rw1JEPkpxwAFWnguBzHwOKz/M0XY7vESX+dgmSKAbvp79SkdEZpVDZCi7/h5RfrmMoPzgfkVGJt4fe0A5zw==?iv=NUi6SfNxUzZIDLzom5oI3w==
-
@ 35da2266:15e70970
2025-04-16 16:16:31y/NRckVQs+cgsxN7+BTzUyD5rOcazRSXLfZwUIPLyDngDcDNLlbXkY4WPlSjZjMO8zKPR4gZSyq8NleqCqtO/4Xe/co965H2g2UUouA+xVzNCVc4lP5rR0+w0oJV6Va54MF13V0q8A3m+V19cJyePxU8zYgfYYnPUa2gMFZQzX7JTY+wPJPFORvaXiU9PV+tlfwU2eWbjDZ9mQ3nT0V0nSGIRLJR8ph9ob06/S+hHhMeeYBgQj5D3KCsm7sZ7bjZDZ6tUUZdHUBmCSeNtjJnLumXhEJB6ynV6Gtge15eZPMVjWgrk0Le+gYDSjT3LN8Bei/QIpS1Fl1MnlkMkq2OT2ZnLBvn9sQaBOa2VIMMuRI=?iv=HIac74wGlvFNlvg0LwmnCQ==
-
@ 35da2266:15e70970
2025-04-16 16:07:08nCDzwaoZ+Yr7YEMAEJU1JNf+EOiqeF+mnkSIrLMKQnNuKxjr7ivBIBLyGD7ygYMX0qUXl55yRb26nceb/wrdwusCpTvxPmDNEFLt+UUhXQbuTc91D7vC43m/7DnAXNqM2Hv8nP+aTY9gUmSh+nN+qsqn1sVbWUngBbLK1AfszRPrYqyNBBZUwATg6pYvjF6/JEKIbdafE6AAFienSz0aXTJRlmcIr1s1CL7e+7y33ZjXrHL7iQOdgSSXmvS3h7z8BYrBs0aA1T0Rxxs+HXKVTApqlMh8yoG42Ly0sGN54fvmXWBmX5/bytgALRFuYfP2rrvVfBnoYG2zEyAwp2BUSQ==?iv=J6gP01G0/pS7v1VTyU3cNA==
-
@ 4857600b:30b502f4
2025-03-11 01:58:19Key Findings
- Researchers at the University of Cambridge discovered that aspirin can help slow the spread of certain cancers, including breast, bowel, and prostate cancers
- The study was published in the journal Nature
How Aspirin Works Against Cancer
- Aspirin blocks thromboxane A2 (TXA2), a chemical produced by blood platelets
- TXA2 normally weakens T cells, which are crucial for fighting cancer
- By inhibiting TXA2, aspirin "unleashes" T cells to more effectively target and destroy cancer cells
Supporting Evidence
- Previous studies showed regular aspirin use was linked to:
- 31% reduction in cancer-specific mortality in breast cancer patients
- 9% decrease in recurrence/metastasis risk
- 25% reduction in colon cancer risk
Potential Impact
- Aspirin could be particularly effective in early stages of cancer
- It may help prevent metastasis, which causes 90% of cancer fatalities
- As an inexpensive treatment, it could be more accessible globally than antibody-based therapies
Cautions
- Experts warn against self-medicating with aspirin
- Potential risks include internal bleeding and stomach ulcers
- Patients should consult doctors before starting aspirin therapy
Next Steps
- Large-scale clinical trials to determine which cancer types and patients would benefit most
- Development of new drugs that mimic aspirin's benefits without side effects
Citations: Natural News
-
@ 35da2266:15e70970
2025-04-16 16:06:33PGZDGv2lVzc+yrDD/s3Y6LeYcZofe/a6o3Te3LQ/Nieawr9oYL9Bg23/WhOi0fK0jsxN2iKbJHr+OQ9U6mjW2f+qBfHbFkWyDCOSDRGBTfG053AJF3588fIr6Mle+05aN1iF3/TF48NGycwihHRbJIedbPDeO9CnsMaZxG7sKPyM2MmeKhZC2ztBxFctQM1Pbx59cqitP7jPbTDSUBQUa191ii39mDS86JO3W3hSbKaWExMlqhmkqN8ag9YRwhZIpoRkv0sf3fNL65XE9r9dMHa8QW1siovya1mJlsdXv76mQl36jPtiySpZ4Kik+mv6NjxogTOqAvIk8crQYq0SSluK7GKsBKZeYKCJ+QAuwy2ro2c36kbRyOBd9KSjAnJ0XupzkA9fO9+xIu/boCmuusdoeD6qN01Ow2+cXDyIVCU=?iv=nHARCUqW2krqPwQwtxzOQg==
-
@ 04c915da:3dfbecc9
2025-03-10 23:31:30Bitcoin has always been rooted in freedom and resistance to authority. I get that many of you are conflicted about the US Government stacking but by design we cannot stop anyone from using bitcoin. Many have asked me for my thoughts on the matter, so let’s rip it.
Concern
One of the most glaring issues with the strategic bitcoin reserve is its foundation, built on stolen bitcoin. For those of us who value private property this is an obvious betrayal of our core principles. Rather than proof of work, the bitcoin that seeds this reserve has been taken by force. The US Government should return the bitcoin stolen from Bitfinex and the Silk Road.
Usually stolen bitcoin for the reserve creates a perverse incentive. If governments see a bitcoin as a valuable asset, they will ramp up efforts to confiscate more bitcoin. The precedent is a major concern, and I stand strongly against it, but it should be also noted that governments were already seizing coin before the reserve so this is not really a change in policy.
Ideally all seized bitcoin should be burned, by law. This would align incentives properly and make it less likely for the government to actively increase coin seizures. Due to the truly scarce properties of bitcoin, all burned bitcoin helps existing holders through increased purchasing power regardless. This change would be unlikely but those of us in policy circles should push for it regardless. It would be best case scenario for American bitcoiners and would create a strong foundation for the next century of American leadership.
Optimism
The entire point of bitcoin is that we can spend or save it without permission. That said, it is a massive benefit to not have one of the strongest governments in human history actively trying to ruin our lives.
Since the beginning, bitcoiners have faced horrible regulatory trends. KYC, surveillance, and legal cases have made using bitcoin and building bitcoin businesses incredibly difficult. It is incredibly important to note that over the past year that trend has reversed for the first time in a decade. A strategic bitcoin reserve is a key driver of this shift. By holding bitcoin, the strongest government in the world has signaled that it is not just a fringe technology but rather truly valuable, legitimate, and worth stacking.
This alignment of incentives changes everything. The US Government stacking proves bitcoin’s worth. The resulting purchasing power appreciation helps all of us who are holding coin and as bitcoin succeeds our government receives direct benefit. A beautiful positive feedback loop.
Realism
We are trending in the right direction. A strategic bitcoin reserve is a sign that the state sees bitcoin as an asset worth embracing rather than destroying. That said, there is a lot of work left to be done. We cannot be lulled into complacency, the time to push forward is now, and we cannot take our foot off the gas. We have a seat at the table for the first time ever. Let's make it worth it.
We must protect the right to free usage of bitcoin and other digital technologies. Freedom in the digital age must be taken and defended, through both technical and political avenues. Multiple privacy focused developers are facing long jail sentences for building tools that protect our freedom. These cases are not just legal battles. They are attacks on the soul of bitcoin. We need to rally behind them, fight for their freedom, and ensure the ethos of bitcoin survives this new era of government interest. The strategic reserve is a step in the right direction, but it is up to us to hold the line and shape the future.
-
@ c1e9ab3a:9cb56b43
2025-03-10 21:56:07Introduction
Throughout human history, the pyramids of Egypt have fascinated scholars, archaeologists, and engineers alike. Traditionally thought of as tombs for pharaohs or religious monuments, alternative theories have speculated that the pyramids may have served advanced technological functions. One such hypothesis suggests that the pyramids acted as large-scale nitrogen fertilizer generators, designed to transform arid desert landscapes into fertile land.
This paper explores the feasibility of such a system by examining how a pyramid could integrate thermal convection, electrolysis, and a self-regulating breeder reactor to sustain nitrogen fixation processes. We will calculate the total power requirements and estimate the longevity of a breeder reactor housed within the structure.
The Pyramid’s Function as a Nitrogen Fertilizer Generator
The hypothesized system involves several key processes:
- Heat and Convection: A fissile material core located in the King's Chamber would generate heat, creating convection currents throughout the pyramid.
- Electrolysis and Hydrogen Production: Water sourced from subterranean channels would undergo electrolysis, splitting into hydrogen and oxygen due to electrical and thermal energy.
- Nitrogen Fixation: The generated hydrogen would react with atmospheric nitrogen (N₂) to produce ammonia (NH₃), a vital component of nitrogen-based fertilizers.
Power Requirements for Continuous Operation
To maintain the pyramid’s core at approximately 450°C, sufficient to drive nitrogen fixation, we estimate a steady-state power requirement of 23.9 gigawatts (GW).
Total Energy Required Over 10,000 Years
Given continuous operation over 10,000 years, the total energy demand can be calculated as:
[ \text{Total time} = 10,000 \times 365.25 \times 24 \times 3600 \text{ seconds} ]
[ \text{Total time} = 3.16 \times 10^{11} \text{ seconds} ]
[ \text{Total energy} = 23.9 \text{ GW} \times 3.16 \times 10^{11} \text{ s} ]
[ \approx 7.55 \times 10^{21} \text{ J} ]
Using a Self-Regulating Breeder Reactor
A breeder reactor could sustain this power requirement by generating more fissile material than it consumes. This reduces the need for frequent refueling.
Pebble Bed Reactor Design
- Self-Regulation: The reactor would use passive cooling and fuel expansion to self-regulate temperature.
- Breeding Process: The reactor would convert thorium-232 into uranium-233, creating a sustainable fuel cycle.
Fissile Material Requirements
Each kilogram of fissile material releases approximately 80 terajoules (TJ) (or 8 × 10^{13} J/kg). Given a 35% efficiency rate, the usable energy per kilogram is:
[ \text{Usable energy per kg} = 8 \times 10^{13} \times 0.35 = 2.8 \times 10^{13} \text{ J/kg} ]
[ \text{Fissile material required} = \frac{7.55 \times 10^{21}}{2.8 \times 10^{13}} ]
[ \approx 2.7 \times 10^{8} \text{ kg} = 270,000 \text{ tons} ]
Impact of a Breeding Ratio
If the reactor operates at a breeding ratio of 1.3, the total fissile material requirement would be reduced to:
[ \frac{270,000}{1.3} \approx 208,000 \text{ tons} ]
Reactor Size and Fuel Replenishment
Assuming a pebble bed reactor housed in the King’s Chamber (~318 cubic meters), the fuel cycle could be sustained with minimal refueling. With a breeding ratio of 1.3, the reactor could theoretically operate for 10,000 years with occasional replenishment of lost material due to inefficiencies.
Managing Scaling in the Steam Generation System
To ensure long-term efficiency, the water supply must be conditioned to prevent mineral scaling. Several strategies could be implemented:
1. Natural Water Softening Using Limestone
- Passing river water through limestone beds could help precipitate out calcium bicarbonate, reducing hardness before entering the steam system.
2. Chemical Additives for Scaling Prevention
- Chelating Agents: Compounds such as citric acid or tannins could be introduced to bind calcium and magnesium ions.
- Phosphate Compounds: These interfere with crystal formation, preventing scale adhesion.
3. Superheating and Pre-Evaporation
- Pre-Evaporation: Water exposed to extreme heat before entering the system would allow minerals to precipitate out before reaching the reactor.
- Superheated Steam: Ensuring only pure vapor enters the steam cycle would prevent mineral buildup.
- Electrolysis of Superheated Steam: Using multi-million volt electrostatic fields to ionize and separate minerals before they enter the steam system.
4. Electrostatic Control for Scaling Mitigation
- The pyramid’s hypothesized high-voltage environment could ionize water molecules, helping to prevent mineral deposits.
Conclusion
If the Great Pyramid were designed as a self-regulating nitrogen fertilizer generator, it would require a continuous 23.9 GW energy supply, which could be met by a breeder reactor housed within its core. With a breeding ratio of 1.3, an initial load of 208,000 tons of fissile material would sustain operations for 10,000 years with minimal refueling.
Additionally, advanced water treatment techniques, including limestone filtration, chemical additives, and electrostatic control, could ensure long-term efficiency by mitigating scaling issues.
While this remains a speculative hypothesis, it presents a fascinating intersection of energy production, water treatment, and environmental engineering as a means to terraform the ancient world.
-
@ 35da2266:15e70970
2025-04-16 15:59:328zCLHqy6gpR5iLeNR3mdTKnSrYZgla4uRUhdH6vSWjLx/Avcee+FcVf8ryzHsS35GSwNP2KEuhunbUh8fkBXe5Hcc1MZEh1u9f8mj2nR/jSUN3VuEJwAUbpHwF5AeSgD95zpMgg5h+d9zKlP4EkJtQoG8kHPVeBdxTEDEx5l+t8JR0uMX7/hinldeEvzvqgdIGOn1Pvd2UfA+quvsYfQhSK2cLZljK4gJfYOUeByZJaCLuC/7Nxhq25x7ECszE5wxm6NO4DNwqnZp36U2nQuyOhn+TucqmtBGdVEYU3myQdtUQlZIkhDt8CKMqDJyLyFdJZxFEERn8pAGnF3kQefaw==?iv=FiYK+T/Iv+lfjcNjgQu8Tw==
-
@ 4857600b:30b502f4
2025-03-10 12:09:35At this point, we should be arresting, not firing, any FBI employee who delays, destroys, or withholds information on the Epstein case. There is ZERO explanation I will accept for redacting anything for “national security” reasons. A lot of Trump supporters are losing patience with Pam Bondi. I will give her the benefit of the doubt for now since the corruption within the whole security/intelligence apparatus of our country runs deep. However, let’s not forget that probably Trump’s biggest mistakes in his first term involved picking weak and easily corruptible (or blackmailable) officials. It seemed every month a formerly-loyal person did a complete 180 degree turn and did everything they could to screw him over, regardless of the betrayal’s effect on the country or whatever principles that person claimed to have. I think he’s fixed his screening process, but since we’re talking about the FBI, we know they have the power to dig up any dirt or blackmail material available, or just make it up. In the Epstein case, it’s probably better to go after Bondi than give up a treasure trove of blackmail material against the long list of members on his client list.
-
@ f3873798:24b3f2f3
2025-03-10 00:32:44Recentemente, assisti a um vídeo que me fez refletir profundamente sobre o impacto da linguagem na hora de vender. No vídeo, uma jovem relatava sua experiência ao presenciar um vendedor de amendoim em uma agência dos Correios. O local estava cheio, as pessoas aguardavam impacientes na fila e, em meio a esse cenário, um homem humilde tentava vender seu produto. Mas sua abordagem não era estratégica; ao invés de destacar os benefícios do amendoim, ele suplicava para que alguém o ajudasse comprando. O resultado? Ninguém se interessou.
A jovem observou que o problema não era o produto, mas a forma como ele estava sendo oferecido. Afinal, muitas das pessoas ali estavam há horas esperando e perto do horário do almoço – o amendoim poderia ser um ótimo tira-gosto. No entanto, como a comunicação do vendedor vinha carregada de desespero, ele afastava os clientes ao invés de atraí-los. Esse vídeo me tocou profundamente.
No dia seguinte, ao sair para comemorar meu aniversário, vi um menino vendendo balas na rua, sob o sol forte. Assim como no caso do amendoim, percebi que as pessoas ao redor não se interessavam por seu produto. Ao se aproximar do carro, resolvi comprar dois pacotes. Mais do que ajudar, queria que aquele pequeno gesto servisse como incentivo para que ele continuasse acreditando no seu negócio.
Essa experiência me fez refletir ainda mais sobre o poder da comunicação em vendas. Muitas vezes, não é o produto que está errado, mas sim a forma como o vendedor o apresenta. Quando transmitimos confiança e mostramos o valor do que vendemos, despertamos o interesse genuíno dos clientes.
Como a Linguagem Impacta as Vendas?
1. O Poder da Abordagem Positiva
Em vez de pedir por ajuda, é importante destacar os benefícios do produto. No caso do amendoim, o vendedor poderia ter dito algo como: "Que tal um petisco delicioso enquanto espera? Um amendoim fresquinho para matar a fome até o almoço!"
2. A Emoção na Medida Certa
Expressar emoção é essencial, mas sem parecer desesperado. Os clientes devem sentir que estão adquirindo algo de valor, não apenas ajudando o vendedor.
3. Conheça Seu Público
Entender o contexto é fundamental. Se as pessoas estavam com fome e impacientes, uma abordagem mais objetiva e focada no benefício do produto poderia gerar mais vendas.
4. Autoconfiança e Postura
Falar com firmeza e segurança transmite credibilidade. O vendedor precisa acreditar no próprio produto antes de convencer o cliente a comprá-lo.
Conclusão
Vender é mais do que apenas oferecer um produto – é uma arte que envolve comunicação, percepção e estratégia. Pequenos ajustes na abordagem podem transformar completamente os resultados. Se o vendedor de amendoim tivesse apresentado seu produto de outra maneira, talvez tivesse vendido tudo rapidamente. Da mesma forma, se cada um de nós aprender a se comunicar melhor em nossas próprias áreas, poderemos alcançar muito mais sucesso.
E você? Já passou por uma experiência parecida?
-
@ 35da2266:15e70970
2025-04-16 15:58:13mc1AJSRgKkEDGBkMlujx9femkprQTWxp/vwXYI4tYmW6c3ggutSW/yU9lxYPcF9WzhdT4Ngz3J8IT9Y/ICYAG3E7hgRu6to9Bo222qjRD7omrOqNa3i3C5VHRvjwIe3+FqzBL3Rmp6sgOholphtIKSoF7w3DsTTPDhM2Fc2MpMaRIZDKMl+vtiHw+sie4GHhgIiLTzckRdZnIjHJpcPGZjbxTbiKseXW7zGEfNraWJJi3d3vTB70kbDAqo8qf8CHXc1BLdCdey0wPzymIz/caW+J97QwsObuRg3kHfHN+ksBgkVgl8xsG7hXUXlhNITMCnVkmM51Pcmoje/VYvluGbuf1WxQPxNljqdqel3sKVUsFBm99wOvo2aertu6XcOq6V4sTXSU93rVvTiw67aXVS6+pt3TN9I9S0xd+lkrOiA=?iv=7ZyEqqg/ftWwpwJWd3AUTA==
-
@ 732c6a62:42003da2
2025-03-09 22:36:26Não são recentes as táticas da esquerda de tentar reprimir intelectualmente seus opositores na base do deboche, da ironia, do desprezo e do boicote à credibilidade. Até Marx usava ironia para chamar os críticos de "burgueses iludidos". A diferença é que, no século XXI, trocaram o manifesto comunista por threads no Twitter e a dialética por memes de mau gosto.
A Falácia da Superioridade Moral
O debate sobre o "pobre de direita" no Brasil é contaminado por uma premissa tácita da esquerda: a ideia de que classes baixas só podem ter consciência política se aderirem a pautas progressistas. Quem ousa divergir é tratado como "traidor de classe", "manipulado", "ignorante", ou até vítimas de deboches como alguma pessoa com um qi em temperatura ambiente repetir diversas vezes "não é possível que ainda exista pobre de direita", "nunca vou entender pobre de direita", ou "pobre de direita é muito burro, rico eu até entendo", como se o autor dessas frases fosse o paladino dos mais oprimidos e pobres. Esse discurso, porém, não resiste a uma análise empírica, histórica ou sociológica.
Contexto Histórico: A Esquerda e o Mito do "Voto Consciente"
A noção de que o pobre deve votar na esquerda por "interesse de classe" é herança do marxismo ortodoxo, que via a política como mero reflexo da posição econômica. No entanto, a realidade é mais complexa:
- Dados do Latinobarómetro (2022): 41% dos brasileiros de baixa renda (até 2 salários mínimos) apoiam redução de impostos e maior liberdade econômica — pautas tradicionalmente associadas à direita.
- Pesquisa IPEC (2023): 58% dos pobres brasileiros priorizam "segurança pública" como principal demanda, acima de "distribuição de renda".
Esses números não são acidentais. Refletem uma mudança estrutural: o pobre moderno não é mais o "operário industrial" do século XX, mas um empreendedor informal, motorista de app, ou microempresário — figuras que valorizam autonomia e rejeitam paternalismo estatal. Eles dizem não entender o pobre de direita e que nunca vai entendê-los, mas o fato é que não entendem porque nunca conversaram com um sem fazer cara de psicólogo de posto de saúde. Sua "preocupação" é só uma máscara para esconder o desprezo por quem ousa pensar diferente do seu manual de "oprimido ideal".
Se ainda não entenderam:
Direita ≠ rico: Tem gente que trabalha 12h/dia e vota em liberal porque quer ser dono do próprio negócio, não pra pagar mais taxação pra você postar meme no Twitter.
Acham que são o Sherlock Holmes da pobreza: o palpite de que "o pobre é manipulado" é tão raso quanto sua compreensão de economia básica.
A Psicologia por Trás do Voto Conservador nas Periferias
A esquerda atribui o voto pobre em direita a "falta de educação" ou "manipulação midiática". Essa tese é não apenas elitista, mas cientificamente falsa:
Análise Psicológica Básica (para você que se acha o Paulo Freire):
- Síndrome do Branco Salvador: Acha que o pobre é uma criatura tão frágil que precisa de você pra pensar. Spoiler: ele não precisa.
- Viés da Superioridade Moral: "Se você é pobre e não concorda comigo, você é burro". Parabéns, recriou a escravidão intelectual.
- Efeito Dunning-Kruger: Não sabe o que é CLT, mas dá palpite sobre reforma trabalhista.- Estudo da Universidade de São Paulo (USP, 2021): Entre moradores de favelas, 63% associam políticas de segurança dura (como "bandido bom é bandido morto") à proteção de seus negócios e famílias. Para eles, a esquerda é "branda demais" com o crime.
- Pesquisa FGV (2020): 71% dos trabalhadores informais rejeitam aumentos de impostos, mesmo que para financiar programas sociais. Motivo: já sofrem com a burocracia estatal para legalizar seus negócios.
Esses dados revelam uma racionalidade prática: o pobre avalia políticas pelo impacto imediato em sua vida, não por abstrações ideológicas. Enquanto a esquerda fala em "reforma estrutural" e tenta importar discursos estrangeiros para debate, por exemplo, o tema irrelevante do pronome neutro, ele quer resolver problemas como:
- Violência (que afeta seu comércio);
- Impostos (que consomem até 40% do lucro de um camelô);
- Burocracia (que impede a legalização de sua barraca de pastel).
Religião, Valores e a Hipocrisia do "Ateísmo de Redes Sociais"
A esquerda subestima o papel da religião na formação política das classes baixas. No Brasil, 76% dos evangélicos são pobres (Datafolha, 2023), e suas igrejas promovem valores como:
- Família tradicional (contra pautas progressistas como ideologia de gênero em escolas);
- Auto-responsabilidade (ênfase em "trabalho duro" em vez de assistencialismo).Exemplo Concreto:
Nas favelas de São Paulo, pastores evangélicos são frequentemente eleitos a cargos locais com plataformas anticrime e pró-mercado. Para seus eleitores, a esquerda urbana (que defende descriminalização de drogas e críticas à polícia) representa uma ameaça ao seu estilo de vida.
A Esquerda e seu Desprezo pela Autonomia do Pobre
O cerne do debate é a incapacidade da esquerda de aceitar que o pobre possa ser autônomo. Algumas evidências:
O Caso dos Empreendedores Informais
- Segundo o IBGE (2023), 40% dos trabalhadores brasileiros estão na informalidade. Muitos veem o Estado como obstáculo, não aliado. Políticas de direita (como simplificação tributária) são mais atraentes para eles que o Bolsa Família.
A Ascensão do Conservadorismo Periférico
- Pessoas assim tem um pensamento simples. Sua mensagem: "Queremos empreender, não depender de político."
A Rejeição ao "Vitimismo"
- Pesquisa Atlas Intel (2022): 68% dos pobres brasileiros rejeitam o termo "vítima da sociedade". Preferem ser vistos como "lutadores".
A projeção freudiana "o pobre é burro porque eu sou inteligente"
O deboche esquerdista esconde um complexo de inferioridade disfarçado de superioridade moral. É a Síndrome do Salvador em sua forma mais patética:
- Passo 1: Assume-se que o pobre é um ser desprovido de agência.
- Passo 2: Qualquer desvio da narrativa é atribuído a "manipulação da elite".
- Passo 3: Quem critica o processo é chamado de "fascista".Exemplo Prático:
Quando uma empregada doméstica diz que prefere o livre mercado a programas sociais, a esquerda não pergunta "por quê?" — ela grita "lavagem cerebral!". A ironia? Essa mesma esquerda defende a autonomia feminina, exceto quando a mulher é pobre e pensa diferente.Dados Globais: O Fenômeno Não é Brasileiro
A ideia de que "pobre de direita" é uma anomalia é desmentida por evidências internacionais:
- Estados Unidos: 38% dos eleitores com renda abaixo de US$ 30k/ano votaram em Trump em 2020 (Pew Research). Motivos principais: conservadorismo social e rejeição a impostos. A esquerda: "vítimas da falsa consciência". Mais um detalhe: na última eleição de 2024, grande parte da classe "artística" milionária dos Estados Unidos, figuras conhecidas, promoveram em peso a Kamala Harris, do Partido Democrata. Percebe como a esquerda atual é a personificaçãoda burguesia e de só pensar na própria barriga?
- Argentina: Javier Milei, libertário radical, quando candidato, tinha forte apoio nas villas miseria (favelas). Seu lema — "O estado é um parasita" — ressoa entre quem sofria com inflação de 211% ao ano.
- Índia: O partido BJP (direita nacionalista) domina entre os pobres rurais, que associam a esquerda a elites urbanas desconectadas de suas necessidades.
A história que a esquerda tenta apagar: pobres de direita existem desde sempre
A esquerda age como se o "pobre de direita" fosse uma invenção recente do MBL, mas a realidade é que classes baixas conservadoras são regra, não exceção, na história mundial:
- Revolução Francesa (1789): Camponeses apoiaram a monarquia contra os jacobinos urbanos que queriam "libertá-los".
- Brasil Imperial: Escravos libertos que viraram pequenos proprietários rurais rejeitavam o abolicionismo radical — queriam integração, não utopia.Tradução:
Quando o pobre não segue o script, a esquerda inventa teorias conspiratórias.
A Hipocrisia da Esquerda Urbana e Universitária
Enquanto acusa o pobre de direita de "alienado", a esquerda brasileira é dominada por uma elite desconectada da realidade periférica:
- Perfil Socioeconômico: 82% dos filiados ao PSOL têm ensino superior completo (TSE, 2023). Apenas 6% moram em bairros periféricos.
- Prioridades Descoladas: Enquanto o pobre debate segurança e custo de vida, a esquerda pauta discussões como "linguagem não-binária em editais públicos" — tema irrelevante para quem luta contra o desemprego. Os grandes teóricos comunistas se reviram no túmulo quando veem o que a esquerda se tornou: não debatem os reais problemas do Brasil, e sim sobre suas próprias emoções.
"A esquerda brasileira trocou o operário pelo influencer progressista. O pobre virou um personagem de campanha, não um interlocutor real."
A diversidade de pensamento que a esquerda não suporta
A esquerda prega diversidade — desde que você seja diverso dentro de um checklist pré-aprovado. Pobre LGBTQ+? Herói. Pobre evangélico? Fascista. Pobre que abre MEI? "Peão do capitalismo". A realidade é que favelas e periferias são microcosmos de pluralidade ideológica, algo que assusta quem quer reduzir seres humanos a estereótipos.
Respostas aos Argumentos Esquerdistas (e Por que Falham)
"O pobre de direita é manipulado pela mídia!"
- Contradição: Se a mídia tradicional é dominada por elites (como alegam), por que grandes veículos são abertamente progressistas? A Record (evangélica) é exceção, não regra.
Contradição Central:
Como explicar que, segundo o Banco Mundial (2023), países com maior liberdade econômica (ex.: Chile, Polônia) reduziram a pobreza extrema em 60% nas últimas décadas, enquanto modelos estatizantes (ex.: Venezuela, Argentina com o governo peronista) afundaram na miséria? Simples: a esquerda prefere culpar o "neoliberalismo" a admitir que o pobre com o mínimo de consciência quer emprego, não esmola.Dado que Machuca:
- 71% das mulheres da periferia rejeitam o feminismo radical, associando-o a "prioridades distantes da realidade" (Instituto Locomotiva, 2023)."Ele vota contra os próprios interesses!"
- Falácia: Pressupõe que a esquerda define o que é o "interesse do pobre". Para um pai de família na Cidade de Deus, ter a boca de fogo fechada pode ser mais urgente que um aumento de 10% no Bolsa Família.
O pobre de direita não é uma anomalia. É o produto natural de um mundo complexo onde seres humanos têm aspirações, medos e valores diversos. Enquanto a esquerda insiste em tratá-lo como um projeto fracassado, ele está ocupado:
- Trabalhando para não depender do governo.
- Escolhendo religiões que dão sentido à sua vida.
- Rejeitando pautas identitárias que não resolvem o custo do gás de cozinha."É falta de educação política!"
- Ironia: Nos países nórdicos (modelo da esquerda), as classes baixas são as mais conservadoras. Educação não correlaciona com progressismo.
Por que o Debuste Precisa Acabar
A insistência em descredibilizar o pobre de direita revela um projeto de poder fracassado. A esquerda, ao substituir diálogo por deboche, perdeu a capacidade de representar quem mais precisaria dela. Enquanto isso, a direita — nem sempre por virtude, mas por pragmatismo — capturou o descontentamento de milhões com o status quo.
O pobre de direita existe porque ele não precisa da permissão do rico de esquerda para pensar. A incapacidade de entender isso só prova que a esquerda é a nova aristocracia.
Último Dado: Nas eleições de 2022, Tarcísio de Freitas (direita) venceu em 72% das favelas de São Paulo. O motivo? Seu discurso anti-burocracia e pró-microempreendedor.
A mensagem é clara: o pobre não é um projeto ideológico. É um agente político autônomo — e quem não entender isso continuará perdendo eleições.
A esquerda elitista não odeia o pobre de direita por ele ser "irracional". Odeia porque ele desafia o monopólio moral que ela construiu sobre a miséria alheia. Enquanto isso, o pobre segue sua vida, ignorando os berros de quem acha que sabem mais da sua vida que ele mesmo.
Pergunta Retórica (Para Incomodar):
Se a esquerda é tão sábia, por que não usa essa sabedoria para entender que pobre também cansa de ser tratado como cachorro que late no ritmo errado?
Fontes Citadas:
- Latinobarómetro (2022)
- IPEC (2023)
- USP (2021): "Segurança Pública e Percepções nas Favelas Cariocas"
- FGV (2020): "Informalidade e Tributação no Brasil"
- Datafolha (2023): "Perfil Religioso do Eleitorado Brasileiro"
- Atlas Intel (2022): "Autopercepção das Classes Baixas"
- Pew Research (2020): "Voting Patterns by Income in the U.S."
- TSE (2023): "Perfil Socioeconômico dos Filiados Partidários"
Leitura Recomendada para Esquerdistas:
- "Fome de Poder: Por que o Pobre Brasileiro Abandonou a Esquerda" (Fernando Schüller, 2023)
- "A Revolução dos Conservadores: Religião e Política nas Periferias" (Juliano Spyer, 2021)
- "Direita e Esquerda: Razões e Paixões" (Demétrio Magnoli, 2019) -
@ 35da2266:15e70970
2025-04-16 15:57:15j14/L0xa5HHwRX/L/sosXorJfiUPziK08Vb3hPjCkREZWm//16AH2Ki7iamkzvuHn2vhK2R4LArQ4oMr3kcaemT1IXqMjxbICwrCPirW2OQaA08RFTofiG/9n7czdT5TMjAG6YGpjvd65N25GZoIQNVy5NnAueJFqIy3TxesZai62jNoiN1aCdVsig7IZZDpHZc7bgZHxvGx2BHg/vME1rRZfWTcR9767Yw6cusuyS5h1ymPz1Oqj3/dGvwIHtoBsbAHrEurEbkesg090y2i0rPxblpUWBbH3AltS3XmX9nQGZEHPc4qF1nqVwp2o9jxjtSDBEOYnNjIiKDj7yo+2yBKVrv700PMQ8WZXhPjZEGEJ6crkTdWHpjOY2PebDDY2yAkELRv9r+JDAprsCoWLyjIJ3vZykrmeEVB6FUvvSo=?iv=PHgLeDh4EwhHHs/PqAor1g==
-
@ 35da2266:15e70970
2025-04-16 15:57:14TUehB0O6U9Dt7TPlBwhZ4DBrhN8Jv4S9e2DaH32+PLneJ2IEN3bOx49zQjI0vixgNyU/cAct0gT8Fj0tObo/+1UvrrlL7fqYRMN88RQzIjiRjjsSAaZK5CLuvT1H117QeOhA8Nl7ueE6K9wcaa7K8g5mPsev5ZazN+H8GOKtPDZTikpOQ3Dlb19Ft6divgQFIbfwlknCYydePAQjzSbukRMd+N97mKMC+Hp5q2wtnbXbmmPBWDwZbyTQeemgx5CuV7UAUXZy9AGf9Hsf08iQ00ZSp+F6w1InKgLFlfVje1vXT8jxMxj1s20B19LPMtY1DP9q7rzFU4RDdPbsATEgnIJorB6YxLH+tS+TIMSYuSZTGhjswT22IzeMYobFhNxE?iv=9wkQuyoj/lU8r/HvX2/B4Q==
-
@ c1e9ab3a:9cb56b43
2025-03-09 20:13:44Introduction
Since the mid-1990s, American media has fractured into two distinct and increasingly isolated ecosystems, each with its own Overton window of acceptable discourse. Once upon a time, Americans of different political leanings shared a common set of facts, even if they interpreted them differently. Today, they don’t even agree on what the facts are—or who has the authority to define them.
This divide stems from a deeper philosophical rift in how each side determines truth and legitimacy. The institutional left derives its authority from the expert class—academics, think tanks, scientific consensus, and mainstream media. The populist right, on the other hand, finds its authority in traditional belief systems—religion, historical precedent, and what many call "common sense." As these two moral and epistemological frameworks drift further apart, the result is not just political division but the emergence of two separate cultural nations sharing the same geographic space.
The Battle of Epistemologies: Experts vs. Tradition
The left-leaning camp sees scientific consensus, peer-reviewed research, and institutional expertise as the gold standard of truth. Universities, media organizations, and policy think tanks function as arbiters of knowledge, shaping the moral and political beliefs of those who trust them. From this perspective, governance should be guided by data-driven decisions, often favoring progressive change and bureaucratic administration over democratic populism.
The right-leaning camp is skeptical of these institutions, viewing them as ideologically captured and detached from real-world concerns. Instead, they look to religion, historical wisdom, and traditional social structures as more reliable sources of truth. To them, the "expert class" is not an impartial source of knowledge but a self-reinforcing elite that justifies its own power while dismissing dissenters as uneducated or morally deficient.
This fundamental disagreement over the source of moral and factual authority means that political debates today are rarely about policy alone. They are battles over legitimacy itself. One side sees resistance to climate policies as "anti-science," while the other sees aggressive climate mandates as an elite power grab. One side views traditional gender roles as oppressive, while the other sees rapid changes in gender norms as unnatural and destabilizing. Each group believes the other is not just wrong, but dangerous.
The Consequences of Non-Overlapping Overton Windows
As these worldviews diverge, so do their respective Overton windows—the range of ideas considered acceptable for public discourse. There is little overlap left. What is considered self-evident truth in one camp is often seen as heresy or misinformation in the other. The result is:
- Epistemic Closure – Each side has its own trusted media sources, and cross-exposure is minimal. The left dismisses right-wing media as conspiracy-driven, while the right views mainstream media as corrupt propaganda. Both believe the other is being systematically misled.
- Moralization of Politics – Since truth itself is contested, policy debates become existential battles. Disagreements over issues like immigration, education, or healthcare are no longer just about governance but about moral purity versus moral corruption.
- Cultural and Political Balkanization – Without a shared understanding of reality, compromise becomes impossible. Americans increasingly consume separate news, live in ideologically homogeneous communities, and even speak different political languages.
Conclusion: Two Nations on One Land
A country can survive disagreements, but can it survive when its people no longer share a common source of truth? Historically, such deep societal fractures have led to secession, authoritarianism, or violent conflict. The United States has managed to avoid these extremes so far, but the trendline is clear: as long as each camp continues reinforcing its own epistemology while rejecting the other's as illegitimate, the divide will only grow.
The question is no longer whether America is divided—it is whether these two cultures can continue to coexist under a single political system. Can anything bridge the gap between institutional authority and traditional wisdom? Or are we witnessing the slow but inevitable unraveling of a once-unified nation into two separate moral and epistemic realities?
-
@ 35da2266:15e70970
2025-04-16 15:51:33fLQ7sl0CpLUCDLrdbs5mfK02IRQPSy/sMGxtNdzQUTR5XWweRwPwpI/bPzaVGM6Um0+RklOg+2pNY5wxcmKH3mQNqXBcs34ZCg9P5Y+fzpcp37iQNFPmrQOQZFkPiQZB+IOvu1632JR6tFcq4F8dUA+Kplw9k0efS28r0Owth5rZdpjHyUFG57yHTYjkGUwTyD+70UtREL0aoimupqvA5yU5iRIGyfBwM9jXiT73MrknmmajV2k+O3kJmoSMiB9+G55+3TbatSv6/nIFfuCN1LJu3x43dP0QJ+Dr0Fi/QVtiemjHuqwKBoetpbnCTOdA2WnWnSUkx0/LdoXRjDc4+vzL4mpD9WlQzhkKFxqcScZZ8/GyNDv63YY7NCsYK0Bx6NR1kB5xZnuCeB6lNZFLfCVLyfdE6NTVO0EYtT9t6vhm1/Vp6FwiPjj+qQRw9EH1jl3zuLl2rGaz3MR3LzIAfw==?iv=wM0eiWnHd1VN7H0BIkOdKw==