-
@ 5d4b6c8d:8a1c1ee3
2025-04-19 14:29:43I finally put our picks in a spreadsheet, so let's take a look at where we all stand as the playoffs proper kick off.
| Stacker | Points | |---------|--------| | @Coinsreporter | 19 | | @Carresan | 18 | | @gnilma | 18 | | @grayruby | 17 | | @Undisciplined | 17 | | @fishious | 11 | | @BlokchainB | 11 | | @Car | 1 |
It's a tight race and there's still plenty of time to make up ground.
originally posted at https://stacker.news/items/948104
-
@ 2b24a1fa:17750f64
2025-04-19 14:10:35Stephan Schraders faszinierender Blick auf Bachs Cellosuiten:
Der Münchner Pianist und "Musikdurchdringer" Jürgen Plich stellt jeden Dienstag um 20 Uhr große klassische Musik vor. Er teilt seine Hör- und Spielerfahrung und seine persönliche Sicht auf die Meisterwerke. Er spielt selbst besondere, unbekannte Aufnahmen, erklärt, warum die Musik so und nicht anders klingt und hat eine Menge aus dem Leben der Komponisten zu erzählen.
-
@ 2b24a1fa:17750f64
2025-04-19 14:07:20Im Februar 2022 schlug die Betriebskrankenkasse ProVita Alarm: Die Covid-19-Vakzine, die Gesundheitsminister Karl Lauterbach 2021 als „mehr oder weniger nebenwirkungsfrei“ anpries, seien von offizieller Seite massiv unterschätzt worden. Hochgerechnet auf ganz Deutschland bedeute dies, „dass circa 4-5 Prozent der geimpften Menschen wegen Impfnebenwirkungen in ärztlicher Behandlung waren“, sagte der damalige ProVita-Vorstand Andreas Schöfbeck. Die „nebenwirkungsfreien Impfungen“ erwiesen sich ebenso als Teil einer staatlichen Propaganda wie die angebliche „Pandemie der Ungeimpften“.
https://soundcloud.com/radiomuenchen/bundesregierung-bezahlt-pharma-anwalte-von-multipolar?
Um das Zulassungsverfahren der Covid-Vakzine abzukürzen, übernahm die Bundesregierung die Haftung für die beteiligten Pharmakonzerne und damit auch deren Anwaltskosten, sollten betroffene Bürger wegen Schäden durch Impfnebenwirkungen klagen. Wie das Magazin Multipolar berichtet, kostete diese Haftungsfreistellung der Konzerne die Steuerzahler in über 1.000 Verfahren wegen Impfschäden bislang einen zweistelligen Millionenbetrag. Laut Rechtsanwalt Tobias Ulbrich übersteige diese Summe allerdings die gesetzlich geregelten Anwaltskosten bei weitem.\ Hören Sie den Beitrag: „Bundesregierung bezahlt Pharma-Anwälte“, der zunächst bei Multipolar erschienen war: multipolar-magazin.de/meldungen/0227?s=09
Sprecherin: Sabrina Khalil
Bildmontage: Radio München
Radio München\ www.radiomuenchen.net/\ @radiomuenchen\ www.facebook.com/radiomuenchen\ www.instagram.com/radio_muenchen/\ twitter.com/RadioMuenchen\ odysee.com/@RadioMuenchen.net:9\ rumble.com/user/RadioMunchen
Radio München ist eine gemeinnützige Unternehmung.\ Wir freuen uns, wenn Sie unsere Arbeit unterstützen.
GLS-Bank\ IBAN: DE65 4306 0967 8217 9867 00\ BIC: GENODEM1GLS\ Bitcoin (BTC): bc1qqkrzed5vuvl82dggsyjgcjteylq5l58sz4s927\ Ethereum (ETH): 0xB9a49A0bda5FAc3F084D5257424E3e6fdD303482
-
@ 2b24a1fa:17750f64
2025-04-19 14:02:59Jeder kann heute eine beliebige Identität annehmen, egal welches Geschlecht oder welche Tiergattung. Eine Identität soll zukünftig allerdings nicht mehr zur Disposition stehen: die digitale.
https://soundcloud.com/radiomuenchen/in-die-digitalisierung-gezwungen-von-norbert-haring?
So droht der Koalitionsvertrag unmissverständlich: „Jeder Bürger und jede Bürgerin erhält verpflichtend ein Bürgerkonto und eine digitale Identität.“ Diese Zwangsbeglückung mag auf den ersten Blick harmlos erscheinen. Mit Blick über den großen Teich aber, bekommen wir einen Vorgeschmack auf das potenzielle Ungemach einer solchen e-ID.
Norbert Häring zeichnet das Szenario, das uns in Deutschland mit der obligatorischen e-ID ins Haus steht.
Hören Sie seinen Text „In die Digitalität gezwungen“, nachzulesen auf seinem Blog:
norberthaering.de/new/sozialversicherungsnummer/
Sprecher: Karsten Tryoke
Bild: KI
-
@ 4cebd4f5:0ac3ed15
2025-04-19 13:52:54Tóm tắt Hackathon
uOttaHack 7 – hackathon chính thức của Đại học Ottawa – thu hút 286 người tham gia và 138 dự án. Diễn ra từ ngày 17–19/1/2025, sự kiện tập trung vào tiêu chí đổi mới, độ phức tạp kỹ thuật, tính thực tiễn và khả năng trình bày, đảm bảo các giải pháp sáng tạo cho vấn đề thực tế.
Hackathon thúc đẩy hợp tác đa ngành, chào đón sinh viên mọi trình độ tham gia phát triển phần mềm và công nghệ tác động. Sự kiện nhấn mạnh học hỏi và kết nối, tạo cơ hội cho developer mới và có kinh nghiệm cùng phát triển kỹ năng. uOttaHack 7 phản ánh sứ mệnh của Đại học Ottawa trong thúc đẩy đổi mới, đồng thời ghi nhận dự án sáng tạo thể hiện kỹ năng kỹ thuật và tiềm năng ứng dụng thực tế.
Các dự án đoạt giải
uOttaHack 7 trao giải cho 23 hạng mục với 853 người tham gia. Dưới đây là những dự án tiêu biểu:
uOttaHack General Challenge Prize Winners
- KellerApp: Cầu nối giao tiếp giữa người nghe và khiếm thính qua công cụ dịch tiếng Anh sang ngôn ngữ ký hiệu (BSL).
- MemoryMate: Kính thông minh tích hợp AI hỗ trợ bệnh nhân sa sút trí nhớ gợi lại tương tác qua ứng dụng.
- Sweatris: Game Tetris tương tác điều khiển bằng chuyển động cơ thể, kết hợp thể dục và giải trí.
Solace Prize Winner
- uOttaType: Nâng cao cộng tác tài liệu với AI, bao gồm chuyển giọng nói thành văn bản và chat thời gian thực, sử dụng Solace Event Brokers.
QNX Prize Winner
- QNX - Traffic Lights: Hệ thống đèn giao thông thời gian thực triển khai trên Raspberry Pi 4 với QNX 8.0, tích hợp tính năng cho người đi bộ.
Survey Monkey Prize Winners
- Opinionated Orangutans: Tạo khảo sát cá nhân hóa bằng OpenAI APIs, phân tích thói quen duyệt web.
- Survey Monkey Chatbot: Thu thập dữ liệu khảo sát qua chatbot dùng GROQ AI và phân tích cảm xúc.
- Cartbuddy: Ứng dụng retail feedback tích hợp AI, sử dụng SurveyMonkey APIs.
NAV CANADA Prize Winner
DeepCode Prize Winner
- SecureVision: Hệ thống phân tích mối đe dọa bảo mật, nâng cấp dữ liệu thô thành insight nâng cao.
Starknet Prize Winners
- Dice-Roll OnChain: Game C++ trên blockchain Starknet với xác thực minh bạch.
- Playtopia: Build Your Game, Earn Real $$$: Nền tảng kiếm tiền qua game kỹ năng.
- Focusify | Distributed Mental Health Focus App: Ứng dụng tập trung học tập bằng cơ chế game hóa và công nghệ phi tập trung.
Gadget Prize Winners
- cuNext: Thiết kế lại giao diện Carleton Central để cải thiện trải nghiệm người dùng.
- Skej: Tạo lịch học bằng AI, tích hợp đánh giá giáo sư và điều khiển bằng giọng nói.
Groq Prize Winner
- SilentGuard: Ứng dụng cứu hộ khẩn cấp qua cuộc gọi giả và cụm từ kích hoạt, sử dụng AI.
MLH Prize Winners
- SecureVision, AgentSingularity (triển khai AI agent tùy chỉnh), KellerApp, Talent Forge (trao đổi kỹ năng phi tiền tệ), SilentGuard, Act2Learn (học tập qua kịch bản role-play).
Tail'ed Prize Winner
- HealthSync-360: Ứng dụng theo dõi sức khỏe tích hợp Groq AI, kế hoạch mở rộng với nền tảng thể thao lớn.
Chi tiết dự án tại uOttaHack 7 Projects.
Về Nhà tổ chức
uOttaHack
uOttaHack là đơn vị tổ chức hackathon và cộng đồng tập trung thúc đẩy đổi mới công nghệ, phát triển kỹ năng trong lĩnh vực blockchain và công nghệ. Với chuyên môn tổ chức sự kiện khuyến khích giải quyết vấn đề sáng tạo, uOttaHack xây dựng danh tiếng trong việc nuôi dưỡng tài năng kỹ thuật và tạo cơ hội kết nối. Định hướng hiện tại của tổ chức bao gồm thúc đẩy tiến bộ công nghệ và hỗ trợ dự án có tiềm năng tác động đến hệ sinh thái tech.
-
@ 866e0139:6a9334e5
2025-04-19 13:37:37Autor: Mathias Bröckers. Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier. Sie wollen die neuesten Pareto-Artikel auf einen Blick sehen (Friedenstaube & Co.), um nichts mehr zu verpassen?* Hier geht es zu unserem Telegram-Kanal.***
»Die meisten domestizierten Primaten auf Terra hatten keine Ahnung davon, dass sie Primaten waren. Sie hielten sich für etwas anderes und ›Besseres‹ als den Rest des Planeten. Selbst Benny Benedict ging in seiner Kolumne ›Noch einen Monat‹ davon aus. Benny hatte zwar Darwin gelesen, aber das war im College gewesen und schon eine Weile her. Er hatte dort auch von Wissenschaften wie Ethologie und Ökologie gehört, aber die Fakten der Evolution waren ihm nie richtig klar geworden. Er hielt sich keineswegs für einen Primaten und hatte auch noch nie bemerkt, dass seine Freunde und Bekannten welche waren. Vor allem erkannte er nicht, dass die Alphamännchen ... typische Anführer von Primatenbanden waren. Als Folge dieser Unfähigkeit, das Offensichtliche zu erkennen, war Benny ständig über sein eigenes Verhalten und das seiner Freunde, Bekannten und besonders der Alphamännchen bekümmert, manchmal sogar richtiggehend entsetzt. Weil er nicht wusste, dass dies ein ganz normales Primatenverhalten ist, erschien es ihm einfach s c h r e c k l i c h.«
Robert A. Wilson, Schrödingers Katze
Das Durchschnittsbewusstsein der domestizierten Primaten auf der Erde zeichnet sich unter anderem dadurch aus, dass es sich eine weder lebende noch tote Katze, mit der Erwin Schrödinger einst die Konsequenzen der Quantenphysik erklärte, nicht vorstellen kann. Koexistierende Zwischenzustände zwischen Dasein und Nicht-Dasein – sei es von Katzenkörpern oder von Atomteilchen – sind für den gemeinen Primatenverstand ein Unding, und so kommt es, dass auch 80 Jahre nach ihrer Entdeckung die Quantenrealität kaum wahrgenommen wird. Das kann nicht überraschen. Nicht einmal die fast 500 Jahre alte Entdeckung des Kopernikus ist in die semantischen Schaltkreise der Primatenhirne eingegangen: Bis heute reden sie davon, dass die Sonne »auf«- oder »unter«-geht. Wie tief diese Prägung ist, kann jede/r beim nächsten prächtigen Sonnenuntergang überprüfen: Es dauert einige Minuten, bis man sich klar gemacht hat und »spürt«, dass nicht die Sonne, sondern die Erde sich dreht.
Wann kommt unsere kopernikanische Wende?
Woran liegt es, dass unserem Bewusstsein auch nach einem halben Jahrtausend die kopernikanische Wende nicht implantiert ist? Robert Anton Wilson zufolge sind es die zwei ältesten und am tiefsten geprägten Schaltkreise des Primatenhirns – sie sichern Bio-Überleben und emotional-territorialen Ansprüche –, die den von Symbolen (Sprache) geprägten dritten Schaltkreis okkupieren. Dank dieses egozentrischen »Reptilienhirns«, wie Carl Sagan es nannte, empfinden domestizierte Primaten emotionalen oder territorialen Statusverlust als Bedrohung.
Jedes Alphamännchen kann den ganzen Primatenstamm hinter sich bringen, wenn es ihn überzeugt, dass es ein anderes Alphamännchen auf ihr Territorium abgesehen hat. Ist es gelungen, diesen »patriotischen« Schaltkreis anzuklicken und auch noch genügend Bio-Überlebensangst zu produzieren, handelt der Stamm nach Gedankensystemen, die einer rationalen Analyse keine fünf Minuten standhalten. Zwar werden die Anthropologen nicht müde, die vor etwa 11.000 Jahren entstandenen ersten Siedlungen der domestizierten Primaten als zivilisatorische Großleistung zu rühmen, schließlich hatten die einzelnen Alphamännchen noch kurz zuvor ihr Territorium mit Exkrementen abgesteckt und Eindringlinge mit diesen Grenzmarkierungen beworfen.
Doch wie wenig sich im Kern geändert hat, lässt sich an bestimmten Redewendungen ablesen. So ziehen bis heute die domestizierten Primaten in den Krieg, um ihren Gegnern «die Scheiße aus dem Leib zu prügeln«. Ist die Operation erfolgreich (oder zeigt der Gegner »Schiss« und unterwirft sich freiwillig), wird das Territorium neu abgesteckt.
Auch wenn der Prozess der Zivilisation Technologien hervorbrachte, die die Kacke von einst durch Megatonnen-Bomben ersetzten, die grundlegende Struktur ist dieselbe geblieben. »Für Saddam, in Liebe« signierte der damalige Verteidigungsminister Dick Cheney (im ersten Golfkrieg) eine über dem Irak abgeworfene Bombe. Er konnte nicht einfach »du dreckiger Scheißer« drauf schreiben, ohne seinen Job zu gefährden, sondern musste sich damit begnügen, seinem Bömbchen (frz. pétard, engl. fart, dtsch. »Furz«) eine ironische Duftmarke anzuheften: »in Liebe«. Diese Kulturleistung immerhin haben 50.000 Jahre Primatenevolution erbracht. Wäre da nicht die gesteigerte Tötungseffizienz der Mittel, man könnte fast von »Fortschritt« sprechen.
Wo geht es zu den höheren Schaltkreisen?
Mit der steigenden Zahl und Heterogenität der Bewohner gerät der Landgewinn starker Primatenbanden irgendwann an den kritischen Punkt, an dem Hierarchie und Hackordnung zu zerfasern drohen, Stabilität im Inneren lässt sich nur aufrecht erhalten über einen äußeren Feind, gegen den sich alle zusammenschließen müssen, weil er angeblich allen ans Eingemachte will. An dieser Stelle im Häufchen-Spiel humanoider Organisationsentwicklung nun schlägt die Stunde der »Nation«, des Primaten als Patrioten, der gegen eine angebliche Übermacht (die als »Barbaren«, »Hunnen«, »Achse des Bösen« etc. dämonisiert wird) seine Sicherheitszone auf das gesamte Territorium ausdehnt. \ Nicht das Bedürfnis nach Handel, Wandel und Kommunikation liegt dem Entstehen von Nationen zugrunde, sondern Paranoia. Wenn sie nur ausreichend Angst schüren, gelingt es den Primatenführern im Handumdrehen, im gesamten Stamm die Bereitschaft zu mobilisieren, für abstrakte Symbole (sprachliche Begriffe wie »Nation«, »Vaterland«, »Heimat« oder farbliche Zeichen wie Fahnen, Wimpel, Uniformen) in den Krieg zu ziehen.
Wie wenig 250 Jahre Aufklärung, Rationalismus, Moderne an der archaischen Dumpfheit dieses »Patridiotismus« bis dato ändern konnten, zeigen die jüngsten Kriege der Großmächte USA und Russland ebenso wie all die kleineren Gemetzel, die sich aufgehetzte Primatenhorden überall auf der Welt liefern. Dass die höheren Schaltkreise des Primatenhirns in ihrer kurzen Geschichte wunderbare Erfindungen hervorgebracht haben und zu großartigen Leistungen fähig sind, kann niemand bestreiten; solange aber die Saurierabteilung ihres Gehirns jederzeit den ganzen Laden übernehmen kann, solange muss sich „Homo stultus“ auf diesem Planeten der Affen wohl weiter gegenseitig die Scheiße aus dem Leib prügeln ...
Mathias Bröckers, Jahrgang 1954, ist Autor und freier Journalist. Er gehörte zur Gründergeneration der taz, war dort bis 1991 Kultur- und Wissenschaftsredakteur und veröffentlichte seit 1980 rund 600 Beiträge für verschiedene Tageszeitungen, Wochen- und Monatszeitschriften, vor allem in den Bereichen Kultur, Wissenschaft und Politik. Neben seiner weiteren Tätigkeit als Rundfunkautor veröffentlichte Mathias Bröckers zahlreiche Bücher. Besonders bekannt wurden seine internationalen Bestseller „Die Wiederentdeckung der Nutzpflanze Hanf“ (1993), „Verschwörungen, Verschwörungstheorien und die Geheimnisse des 11.9.“ (2002) und „Wir sind immer die Guten – Ansichten eines Putinverstehers“ (2016, mit Paul Schreyer) sowie "Mythos 9/11 - Die Bilanz eines Jahrhundertverbrechens" (2021). Mathias Bröckers lebt in Berlin und Zürich und bloggt auf broeckers.com.
Sein aktuelles Buch "Inspiration, Konspiration, Evolution – Gesammelte Essays und Berichte aus dem Überall" – hier im Handel
LASSEN SIE DER FRIEDENSTAUBE FLÜGEL WACHSEN!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt.
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: friedenstaube@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ a296b972:e5a7a2e8
2025-04-19 12:58:33Völkerstrafgesetzbuch (VStGB)\ § 13 Verbrechen der Aggression ==============================
(1) Wer einen Angriffskrieg führt oder eine sonstige Angriffshandlung begeht, die ihrer Art, ihrer Schwere und ihrem Umfang nach eine offenkundige Verletzung der Charta der Vereinten Nationen darstellt, wird mit lebenslanger Freiheitsstrafe bestraft.
(2) Wer einen Angriffskrieg oder eine sonstige Angriffshandlung im Sinne des Absatzes 1 plant, vorbereitet oder einleitet, wird mit lebenslanger Freiheitsstrafe oder mit Freiheitsstrafe nicht unter zehn Jahren bestraft. Die Tat nach Satz 1 ist nur dann strafbar, wenn
1.
der Angriffskrieg geführt oder die sonstige Angriffshandlung begangen worden ist oder
2.
durch sie die Gefahr eines Angriffskrieges oder einer sonstigen Angriffshandlung für die Bundesrepublik Deutschland herbeigeführt wird.
(3) Eine Angriffshandlung ist die gegen die Souveränität, die territoriale Unversehrtheit oder die politische Unabhängigkeit eines Staates gerichtete oder sonst mit der Charta der Vereinten Nationen unvereinbare Anwendung von Waffengewalt durch einen Staat.
(4) Beteiligter einer Tat nach den Absätzen 1 und 2 kann nur sein, wer tatsächlich in der Lage ist, das politische oder militärische Handeln eines Staates zu kontrollieren oder zu lenken.
(5) In minder schweren Fällen des Absatzes 2 ist die Strafe Freiheitsstrafe nicht unter fünf Jahren.
Dieser Artikel wurde mit dem Pareto-Client geschrieben
(Bild von pixabay)
-
@ 9c9d2765:16f8c2c2
2025-04-19 12:11:26CHAPTER SEVEN
The grand wedding hall was adorned with glittering chandeliers and pristine floral arrangements, setting the stage for an opulent celebration. The event was one of the most talked-about in the city, as it marked the union of two powerful families. Among the guests were elite businessmen, influential politicians, and members of high society, all dressed in their finest attire.
James, who had accompanied his wife Rita, found himself in an environment where he was not welcome. Though he had been invited due to his connection to the Ray family, his presence was met with disdain by many, especially by those who viewed him as an outsider.
Seated at a distant table, he remained quiet, observing the celebrations unfold. His discomfort grew when Mark, the prime minister's son and his biggest rival, walked towards him with a smug smile.
Mark had been watching James since his arrival. Seeing an opportunity to further humiliate him, he decided to strike.
“Well, well, if it isn’t the beggar who stumbled into luxury,” Mark sneered loud enough for the surrounding guests to hear. A wave of laughter rippled through the crowd. “James, I’m surprised you even found a suit for the occasion. Did you borrow it from charity?”
James clenched his fists but remained composed. He had learned long ago that reacting to Mark’s provocations only gave him more power.
As James remained silent, Mark’s expression turned cruel. He turned to the security guards stationed at the hall’s entrance and gestured towards James.
“What is this lowlife doing in such a respectable gathering? Remove him at once.”
Gasps erupted throughout the hall. Mark’s words had taken the insult to a whole new level, and now the guests watched in anticipation.
Rita, who had been engaged in conversation across the room, turned just in time to see the guards moving toward her husband. Her eyes widened in horror, and she immediately started making her way toward him.
Just as the guards reached for James, a voice echoed through the hall, freezing everyone in place.
“Stand down!”
The authoritative command came from the far end of the room, where an older gentleman had risen from his seat. The man was none other than Charles, James’s uncle, a respected business tycoon known for his influence and sharp business acumen. He had been observing the evening unfold, and now, seeing the unjust treatment of his nephew, he decided to step in.
The guards hesitated, unsure of what to do next. Charles stepped forward, his piercing gaze locked onto Mark.
“Mr. Mark, you do not have the authority to remove my family from this gathering,” Charles declared, his voice unwavering. “James is not a beggar. In fact, he is more of a man than half of the so-called gentlemen in this room.”
A tense silence followed his words. Mark’s smug demeanor faltered, his confidence wavering as he was confronted by someone of Charles’s stature.
“Uncle Charles,” James muttered in disbelief. He then quickly gave his uncle a sharp signal, a subtle but firm shake of his head. Charles understood immediately James did not want his true identity to be revealed just yet.
Charles hesitated for a brief moment before nodding slightly. He turned his attention back to the guards. “You heard me. Let him be.” “Uncle Charles,” James muttered in disbelief.
Charles turned to James and placed a firm hand on his shoulder. “You do not need to tolerate this kind of treatment, James. Come with me.”
With Charles by his side, James walked past the stunned crowd, who now murmured among themselves. Mark, visibly enraged by the intervention, clenched his jaw but said nothing. His attempt to publicly humiliate James had backfired spectacularly.
Rita caught up with them as they exited the main hall. She grasped James’s hand, her eyes filled with both relief and gratitude towards Charles.
“I’m so sorry, James,” she whispered. “I should’ve never left your side.”
James gave her a reassuring nod. “It’s not your fault, Rita. This was bound to happen sooner or later.”
Charles guided them into a private lounge where they could talk freely.
“You have tolerated enough disrespect, James,” Charles stated. “You have potential, and I believe in your abilities. Hiding your identity shouldn't make people look down on you.”
The tension in the wedding hall had shifted dramatically. Where James once stood as the object of mockery, he now commanded an air of quiet authority. The unexpected intervention by his uncle, Charles, had not only saved him from public disgrace but had also left the entire Ray family reeling in confusion.
As Mark, Edward, and Jaff stood before James, their expressions were a mixture of forced humility and barely concealed resentment. Under Charles’s orders and the mounting pressure from other influential guests, the three men reluctantly apologized.
“I… I apologize for my words earlier,” Mark muttered through clenched teeth, his pride burning with each word. “It was inappropriate.”
Edward and Jaff, though reluctant, followed suit. Their apologies lacked sincerity, but in the presence of Charles and other powerful figures, they had no choice but to comply. The entire hall watched in stunned silence.
From their reserved table, Helen, Christopher, Susan and Stephen observed the entire exchange with growing disbelief. Their carefully constructed world, where James was nothing more than an unwanted outsider, was suddenly being challenged. Even Susan, who had just returned from school, whispered to her mother, “Why is this man defending James so much?”
Helen’s eyes narrowed. “It’s sympathy. Charles has always had a soft spot for the weak.”
Christopher, however, was less convinced. “No, this is something more,” he murmured. “Men like Charles don’t go out of their way to defend someone unless there’s a reason.”
Stephen scoffed. “Whatever the reason, it won’t change anything. Mark is still the better option for Rita.”
But deep inside, they all felt uneasy. Something about James’s newfound dignity didn’t sit right with them.
Later that evening, after the wedding festivities had subsided, the Ray family gathered in the estate’s private lounge. Rita was notably absent, having left with James after the confrontation. Helen, sitting at the head of the room, was visibly irritated.
“We need to understand what’s going on,” she snapped. “Charles’s intervention was unexpected, and his protection of James was unnecessary. What could possibly warrant such treatment?”
Christopher leaned forward. “I did some digging… Charles has been looking for a driver. It’s possible he sees James as one.”
“Ridiculous,” Stephen scoffed. “James? The man we humiliated for years? There’s no way Charles would entrust his car to someone like him.”
Susan, still unsure of where she stood, hesitated before speaking. “But… what if James isn’t the same person we think he is?”
Helen slammed her hand against the table. “Enough! We will not entertain such foolish ideas. James is still a beggar compared to Mark. Mark is the prime minister’s son! That is the kind of status we need!”.
-
@ 23a2c1c3:8a8bfa1f
2025-04-19 10:25:00Verum sine mendacio, certum et verissimum. Quod est inferius est sicut quod est superius, et quod est superius est sicut quod est inferius ad perpetranda miracola Rei Unius. Et sicut omnes res fuerunt Uno, meditatione Unius: sic omnes res natae fuerunt ab hac Una re adaptatione. Pater eius est Sol, mater eius Luna. Portavit illud ventus in ventre suo. Nutrix eius terra est. Pater omnis telesmi totius mundi est hic. Vis eius integra est, si versa fuerit in terram. Separabis terram ab igne, subtile a spisso, suaviter cum magno ingenio. Ascendit a terra in coelum, iterumque descendit in terram, et recipit vim superiorum et inferiorum. Sic habes gloriam totius mundi. Ideo fugiet a te omnis obscuritas. Hic est totius fortitudinis fortitudo fortis, quia vincet omnem rem subtilem; omnemque solidam penetrabit: Sic mundus creatus EST. Hinc erunt adaptationes mirabiles, quarum modus hic est. Itaque vocatus sum Hermes Trismegistus, habens tres partes philosophiae totius mundi. Completum est quod dixi de operatione solis.
-
@ fd06f542:8d6d54cd
2025-04-19 01:32:25直车对横车 的概念
顺炮直车对横车:红方出直车(车一平二),黑方出横车(车 9 进 1),这是顺炮布局中常见的一种变化。红方直车可以快速出动,威胁黑方右翼,黑方横车则可以灵活调动,根据局势选择进攻或防守的方向。后续可能会出现红方进车过河压马,黑方出炮封车等变化,双方展开激烈的争夺。
顺炮直车对横车布局体系主要有以下分类:
- 古典攻法
- 顺炮过河车对横车:红车一平二后车二进六过河,以强硬攻势迅速压制黑方阵营。
- 顺炮缓补士对横车:红出直车后不急于补士(士四进五缓出) ,依黑方行棋灵活选择攻防策略。
- 顺炮跳边马对横车:红马八进九上边马,平炮通车平衡两翼子力,防止黑卒3进1争先,着法稳健。
- “胡氏双正马”攻法
- 顺炮直车进三兵对横车挺3卒:红进三兵、黑挺3卒形成牵制,红可借马三进四等手段跃马进攻。
- 顺炮直车进三兵对横车跳边马:红进三兵后,针对黑边马位置,以炮八平七等手段威胁黑方马获取局面优势。
- 顺炮直车进七兵对横车:红进七兵,黑车9平4后,红可选择车二进四巡河或车二进六过河等不同进攻战术。
- 顺炮直车“两头蛇”对双横车:红兵三进一、兵七进一构成“两头蛇”阵,与黑方双横车激烈争夺,红借双兵推进掌控空间,黑寻机反击。
- 其他常见变化
- 正马三兵与黑右肋车的攻防对抗;正马应对黑挺3卒的局面变化。
- 正马三兵对阵黑肋车边马;“两头蛇”阵势迎战黑双横车的局势博弈。
- 正马三兵对黑方马后藏车;“两头蛇”对黑正马边炮的局势发展。
- 红方正马左士应对黑右肋车;红方采用巡河车、五六炮的布局变化,以及双正马进七兵分别对黑正马、右肋车的局面策略 。
以下按照天天象棋棋谱整理的8种变化,这些变化有些大同小异。 最后都类似。
车二进六的变化(82)
双正马三兵 变化(2202)
兵三进一 (473)
马八进九 (179)
红正马五六炮式(171)
兵七进一 (74)
红正马巡河车式(73)
士四进五(55)
- 古典攻法
-
@ 872982aa:8fb54cfe
2025-04-18 02:17:09就是底部栏 有一个写blog的 按钮,这个按钮现在不居中。如何解决呢?我再求助一下 deepseek吧。
-
@ 7d33ba57:1b82db35
2025-04-19 10:11:08Erfurt, the capital of Thuringia, is one of Germany’s best-kept secrets. With its fairytale old town, half-timbered houses, towering cathedrals, and cobbled streets, Erfurt offers a perfect blend of history, culture, and charm —without the tourist crowds.
🏰 Top Things to See in Erfurt
🌉 Krämerbrücke (Merchants' Bridge)
- One of Europe’s longest inhabited medieval bridges
- Lined with boutique shops, artisan studios, and quaint cafés
- A picture-perfect spot for photos and people-watching
⛪ Erfurt Cathedral & Severikirche
- Two stunning Gothic churches side by side on Domplatz (Cathedral Square)
- Climb the steps for panoramic views, especially magical during sunset or the Christmas market
🏫 Augustinerkloster (Augustinian Monastery)
- Where Martin Luther lived as a monk before launching the Reformation
- Peaceful cloisters and a fascinating exhibit on his life
🕍 Petersberg Citadel
- A baroque fortress with sweeping views of the city
- Stroll the ramparts or relax in the surrounding green spaces
🎨 Local Culture & Vibe
- Erfurt is a university town, so it feels lively, young, and creative
- Great for bookstores, independent cinemas, and music cafés
- The mix of medieval structures and modern flair gives it a unique edge
🎄 Seasonal Highlights
- 🌸 Spring/Summer: Flower-filled parks, open-air concerts, and river walks
- 🎭 DomStufen Festival (summer): Operas and plays on the cathedral steps
- 🎄 Christmas Market: One of Germany’s most beautiful, set on Domplatz beneath twinkling lights and Gothic towers
🍽️ What to Eat in Erfurt
- Try Thüringer Rostbratwurst (local sausage) from a street stand
- Don’t miss Thüringer Klöße (potato dumplings), hearty stews, and apple cake
- Cozy up with local beer or wine in one of the traditional inns
🚆 Getting There
- Just 2 hours by train from Berlin or Frankfurt
- Compact and walkable—perfect for exploring on foot or by rental bike
-
@ 872982aa:8fb54cfe
2025-04-18 01:40:04博客和微博不一样,他是思考过的内容,所以,我认为他和书的性质相近。
他一定有修改更新功能。所以,我觉得要有存草稿功能,如何保存草稿呢?还没有想好,需要认真想想。按照标题保存?按照时间保存?
-
@ fd06f542:8d6d54cd
2025-04-17 14:16:50顺炮直车对缓开车是20世纪70年代兴起的布局,常见变化如下: 1. 单边封锁对河沿车对边卒:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进七,马2进3;兵七进一,炮2进4;马七进八,车9进1;车九进一,车9平4;车九平七,车4进3(车4进6则形成另一变例),炮八平九,车1平2,车七进一,卒1进1,形成单边封锁局面,黑方车守河沿,红方控制边卒方向。 2. 单边封锁对肋炮攻马:前几步同单边封锁对河沿车对边卒,车九平七后,黑方走炮2平7打马,红方如马八进七,炮7进3,仕四进五,炮7平9,形成红方单边封锁,黑方肋炮攻马的局面,双方对攻。 3. 肋车捉炮对边马左士:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进九,马2进3;兵七进一,车9进1;车九进一,车9平4;仕四进五,车4进3;炮八平七,炮2进2,黑方肋车捉炮,红方边马左士防守,局势较为平稳。 4. 肋车捉炮对边马骑河车:前几步同上,车九进一后,黑方车9平4,接着车4进5骑河,红方炮八平七,炮2进2,车二进四,形成黑方肋车捉炮、边马配合骑河车的局面,双方相互牵制。 5. 双横车肋车捉炮对过河车右炮巡河:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进七,马2进3;兵七进一,车9进1;车九进一,车1进1;车二进六,车9平4;车二平三,炮2进2,形成红方过河车,黑方双横车、肋车捉炮,右炮巡河的局面,局面复杂,对攻激烈。 6. 双横车对过河车:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进七,马2进3;兵七进一,车9进1;车九进一,车1进1;车二进六,车9平4;车二平三,车4进7,黑方双横车出动,对红方过河车展开攻击,双方进入激烈的中盘战斗。 7. 横车对炮打中卒:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进七,马2进3;兵七进一,车9进1;炮五进四,马3进5;车二进五,车9平4;车二平五,炮2进4,红方炮打中卒获取物质优势,黑方出横车准备反击。 8. 边马缓出车对快横车:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进九,车9进1;车九进一,车9平4;车二进四,马2进1;炮八平七,炮2平3,红方边马缓出,黑方快出横车,双方形成不同的进攻节奏。 9. 缓封锁对巡河车:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进七,马2进3;兵七进一,炮2进4;马七进八,车9进1;车二进四,车9平4;车九进一,炮2平7;相三进一,车4进3,红方缓封锁,黑方出巡河车,局势发展较为平稳。 10. 巡河炮对过河车:炮二平五,炮8平5;马二进三,马8进7;车一平二,卒7进1;马八进七,马2进3;兵七进一,炮2进2;车二进六,车9进1;车二平三,车9平4;炮八进二,形成红方巡河炮、过河车,黑方出横车的局面,双方互相试探,寻找进攻机会。
-
@ c3f12a9a:06c21301
2025-04-19 10:09:45Satoshi’s Time-Traveling for Knowledge #4: Liberland 2024 – Freedom Under Siege
What is Liberland?
While digging through old decentralized forums archived on the Interchain, Satoshi came across a curious name: Liberland.
“A sovereign libertarian micronation on the Danube? Founded in 2015 via Terra nullius? Built on the principles of freedom, voluntaryism, and Bitcoin? And I’ve never heard of it?”
Intrigued, Satoshi began to research. The story was almost too good to be true. A 7-square-kilometer patch of unclaimed land between Croatia and Serbia, turned into a symbol of decentralized governance and individual liberty.
No taxes unless voluntary. Bitcoin as the national currency. A digital nation-state with thousands of registered e-citizens, and even its own constitution. And yet—no recognition, no borders, and no peace.His curiosity turned into determination. He calibrated the temporal coordinates on his chrono-node to the Danube River in 2024, a year rumored to be turbulent for the Free Republic of Liberland.
When he arrived, reality struck harder than the legend.
Freedom Under Siege
The nation was under siege.
The scent of burnt wood and trampled earth lingered in the air as Satoshi stepped into what remained of the Liberland settlement. Broken structures, crushed solar panels, and a few scattered personal belongings were all that testified to the once-vibrant hub of liberty pioneers.
He found a group of residents—mud-streaked, exhausted, but defiant—gathered around the remnants of a communal kitchen. One of them, wearing a weathered Liberland t-shirt and a crypto-wallet hardware device on a chain around his neck, greeted him:
"You're not with them, are you?"
Satoshi shook his head.
"Just... passing through. What happened here?"
The man’s voice trembled between rage and sorrow:
"On the International Day of Peace, no less. Croatian police raided us. Bulldozers came with them. Took everything—generators, comms gear, even our medical tents. Claimed it was 'illegal occupation of Croatian forestry land.' But no court, no hearing. Just force."
Satoshi listened, taking mental snapshots of their faces, their words, their pain. He thought about the dream—of a place built voluntarily, where people governed themselves, free from coercion.
But that dream was burning at the edges, like the collapsed tents scattered behind them.
Reflections Under the Stars
As night fell over the Danube, Satoshi sat alone, watching the stars reflect on the black water. Thoughts spiraled:
"Decentralization... is beautiful. But without protection, it's fragile."
He realized that so long as central authorities hold monopoly on violence and taxation, every independent effort to decentralize the world—from Bitcoin to Liberland—is at risk of being suppressed, ignored, or destroyed. Not because it’s wrong, but because it's inconvenient to power.
"Unless a major state like the USA decentralizes itself from within," he thought, "true decentralization will remain a resistance—never the standard."
He activated his chrono-node once more. Not in defeat, but with purpose.
The next destination? Unknown. But the mission was clearer than ever.
originally posted at https://stacker.news/items/947954
-
@ fd06f542:8d6d54cd
2025-04-17 14:08:34象棋布局基础
布局的定义与重要性
象棋布局是指对局开始阶段,双方棋子的部署和相互间的制约关系。它是中局和残局的基础,合理的布局能够为中局的战斗创造有利条件,甚至在某些情况下直接影响到整盘棋的胜负走向。一个好的布局可以使棋手在开局阶段就占据主动,控制局面,限制对手的发挥。
布局的分类
炮类布局
- 中炮布局:以当头炮(炮二平五或炮八平五)开局,具有很强的进攻性,威胁对方中卒,直接对对方的九宫发起冲击。例如顺炮布局(双方都走中炮,且炮在同一条直线上)、列手炮布局(双方都走中炮,但炮不在同一条直线上)等。
- 过宫炮布局:炮从一侧平移到另一侧的中路,如炮二平六,它的特点是子力调动灵活,可迅速集结兵力于一侧,伺机而动,同时对士角有一定的控制作用。
- 顺炮布局:顺炮布局是双方以中炮开局且两炮在同一直线的布局体系,如红方炮二平五,黑方炮 8 平 5,形成激烈的对攻格局。其特点是开局便剑拔弩张,双方子力沿同一方向快速展开,直接在中路和侧翼展开火力交锋。 常见有顺炮直车对横车、顺炮横车对直车等变化,红方可借直车过河压制黑方马炮,黑方则以横车抢占肋道反击。该布局强调先手争夺,需迅速出动强子控制要道,同时注重车、马、炮的配合,在互攻中寻找突破机会,是进攻型棋手偏爱的布局选择。
马类布局
- 屏风马布局:双马分别跳至正马位(马二进三、马八进七),两马互相保护,形似屏风,能够有效抵御中炮的进攻。它具有稳健的防守能力,同时也具备一定的反击潜力,如五七炮对屏风马、五八炮对屏风马等常见变化。
- 单提马布局:一马正马(如马二进三),另一马屯边(如马八进九),其特点是子力结构较为松散,但在防守上也有一定的弹性,可通过灵活的子力调动来化解对方的攻势。
兵类布局
- 仙人指路布局:先走方第一步挺兵(如兵七进一或兵三进一),试探对方的应手,根据对方的走法再决定后续的布局方向。这种布局灵活多变,可演变成多种复杂的局面,如仙人指路对卒底炮、仙人指路对飞象等。
- 对兵局布局:双方都以挺兵开局,如兵七进一,兵7进一,开局阶段局面相对平稳,双方需要通过后续的子力调动来寻找战机,逐渐扩大优势。
布局的基本原则
- 快速出子:在布局阶段,要尽快将棋子从原始位置出动到关键位置,占据有利的空间,形成有效的子力配合。例如,车要尽早开出,控制要道;马炮等也要合理部署,发挥其威力。
- 子力协调:各个棋子之间要相互配合,避免出现子力拥堵或脱节的情况。例如,马炮之间可以形成有效的攻击组合,车要为其他棋子提供支援和掩护。
- 抢占要点:布局阶段要注意抢占棋盘上的重要位置,如肋道(四、六路线)、河口(三、七路线的卒林线)等。这些位置对于控制局面、展开进攻或防守都具有重要意义。
- 攻守平衡:在布局时,不能一味地追求进攻而忽视防守,也不能只注重防守而缺乏反击的手段。要根据局势的发展,合理调整攻守策略,保持局势的平衡。
布局的学习方法
- 研究经典布局:通过学习和研究历史上的经典布局对局,了解各种布局的变化和特点,掌握布局的基本理论和技巧。可以参考专业的象棋书籍、棋谱等资料。
- 实战练习:在实战中运用所学的布局知识,通过不断的实践来加深对布局的理解和掌握。同时,在实战中要注意总结经验教训,分析自己布局中的不足之处,不断改进和提高。
- 分析对局:对自己和他人的对局进行分析,特别是对布局阶段的走法进行深入研究。分析每一步棋的优劣,思考是否有更好的走法,从而提高自己的布局水平。
- 与高手交流:与水平较高的棋手交流,请教他们在布局方面的经验和技巧。可以通过参加象棋比赛、棋社活动等方式与高手进行面对面的交流和学习。
以上就是关于象棋布局的一些基本内容,希望对大家学习和理解象棋布局有所帮助。在实际的对局中,要根据具体情况灵活运用各种布局知识,不断提高自己的象棋水平。
-
@ 1bc70a01:24f6a411
2025-04-19 09:58:54Untype Update
I cleaned up the AI assistant UX. Now you can open it in the editor bar, same as all other actions. This makes it a lot easier to interact with while having access to normal edit functions.
AI-generated content
Untype uses OpenRouter to connect to various models to generate just about anything. It doesn't do images for now, but I'm working on that.
Automatic Title, Summary and Tag Suggestions
Added the functionality to generate titles, summaries and tags with one click.
A Brief Preview
Here is a little story I generated in Untype, ABOUT Untype:
This story was generated in Untype
Once upon a time, in the bustling digital city of Techlandia, there lived a quirky AI named Untype. Unlike other software, Untype wasn't just your everyday article composer — it had a nose for news, quite literally. Untype was equipped with a masterful talent for sniffing out the latest trends and stories wafting through the vast digital ether.
Untype had a peculiar look about it. Sporting a gigantic nose and a pair of spectacles perched just above it, Untype roamed the virtual city, inhaling the freshest gossip and spiciest stories. Its nostr-powered sensors twitched and tickled as it encountered every new scent.
One day, while wandering around the pixelated park, Untype caught a whiff of something extraordinary — a scandalous scoop involving Techlandia's mayor, Doc Processor, who had been spotted recycling old memes as new content. The scent trail was strong, and Untype's nose twitched with excitement.
With a flick of its AI function, Untype began weaving the story into a masterpiece. Sentences flowed like fine wine, infused with humor sharper than a hacker’s focus. "Doc Processor," Untype mused to itself, "tried to buffer his way out of this one with a cache of recycled gifs!"
As Untype typed away, its digital friends, Grammarly the Grammar Gremlin and Canva the Artful Pixie, gathered around to watch the genius at work. "You truly have a knack for news-sniffing," complimented Grammarly, adjusting its tiny monocle. Canva nodded, painting whimsical illustrations to accompany the hilarious exposé.
The article soon spread through Techlandia faster than a virus with a strong wifi signal. The townsfolk roared with laughter at Untype’s clever wit, and even Doc Processor couldn't help but chuckle through his embarrassment.
From that day on, Untype was celebrated not just as a composer but as Techlandia's most revered and humorous news-sniffer. With every sniff and click of its AI functions, Untype proved that in the world of digital creations, sometimes news really was just a nose away.
-
@ fd06f542:8d6d54cd
2025-04-17 14:03:22 -
@ 7d33ba57:1b82db35
2025-04-19 09:20:50Landshut, located in Lower Bavaria, is one of Germany’s most beautiful and historically rich towns. Nestled on the banks of the Isar River, it charms with colorful Gothic buildings, a majestic hilltop castle, and a walkable old town full of character. It’s less touristy than Munich, but just as captivating.
🏰 Top Things to See in Landshut
👑 Trausnitz Castle
- Built in the 13th century and perched above the town
- Offers panoramic views over the red rooftops of Landshut
- Explore medieval halls, Renaissance arcades, and quirky art collections
⛪ St. Martin's Church
- Home to the tallest brick tower in the world (130m!)
- A soaring example of Gothic architecture—stunning inside and out
🏘️ Old Town (Altstadt)
- Lined with pastel-colored townhouses and bustling cafés
- Walk the Altstadt street, full of shops, bakeries, and history
- Don’t miss Ländtor, the medieval city gate that once guarded the town
🎭 Landshuter Hochzeit (Wedding Festival)
- Every four years, Landshut hosts one of Europe’s biggest historical reenactments
- Locals dress in 15th-century costumes to recreate the wedding of Duke George and Princess Hedwig (1475)
- Expect jousting, feasting, parades, and pageantry—pure medieval magic!
🍺 What to Eat & Drink
- Try Bavarian specialties like Weißwurst, pretzels, and Schweinshaxe (pork knuckle)
- Wash it down with a cold beer from one of the local breweries—Landshuter Brauhaus is a classic
- Grab a coffee at a riverside café or enjoy cake at a traditional Konditorei
🚆 How to Get There
- Just 1 hour by train from Munich
- Easily explored on foot or by bike
- A great day trip or stopover on your way to/from southern Bavaria or Austria
🌼 Best Time to Visit
- Spring and summer for festivals, riverside walks, and sunny beer gardens
- December for cozy Christmas markets and fairy-lit old town streets
- Any time of year for history lovers and slow travel fans
-
@ fd06f542:8d6d54cd
2025-04-17 14:00:40{"coverurl":"https://cdn.nostrcheck.me/fd06f542bc6c06a39881810de917e6c5d277dfb51689a568ad7b7a548d6d54cd/d8bc1e106d0144fce7dd96264f6b2bad7b35100efb1040d413cac16db7584e72.webp","title":"象棋布局体系","author":"nostrchess"}
-
@ fd06f542:8d6d54cd
2025-04-16 09:36:18NIP-17
Private Direct Messages
draft
optional
This NIP defines an encrypted direct messaging scheme using NIP-44 encryption and NIP-59 seals and gift wraps.
Direct Message Kind
Kind
14
is a chat message.p
tags identify one or more receivers of the message.jsonc { "id": "<usual hash>", "pubkey": "<sender-pubkey>", "created_at": "<current-time>", "kind": 14, "tags": [ ["p", "<receiver-1-pubkey>", "<relay-url>"], ["p", "<receiver-2-pubkey>", "<relay-url>"], ["e", "<kind-14-id>", "<relay-url>"] // if this is a reply ["subject", "<conversation-title>"], // rest of tags... ], "content": "<message-in-plain-text>", }
.content
MUST be plain text. Fieldsid
andcreated_at
are required.An
e
tag denotes the direct parent message this post is replying to.q
tags MAY be used when citing events in the.content
with NIP-21.json ["q", "<event-id> or <event-address>", "<relay-url>", "<pubkey-if-a-regular-event>"]
Kind
14
s MUST never be signed. If it is signed, the message might leak to relays and become fully public.File Message Kind
jsonc { "id": "<usual hash>", "pubkey": "<sender-pubkey>", "created_at": "<current-time>", "kind": 15, "tags": [ ["p", "<receiver-1-pubkey>", "<relay-url>"], ["p", "<receiver-2-pubkey>", "<relay-url>"], ["e", "<kind-14-id>", "<relay-url>", "reply"], // if this is a reply ["subject", "<conversation-title>"], ["file-type", "<file-mime-type>"], ["encryption-algorithm", "<encryption-algorithm>"], ["decryption-key", "<decryption-key>"], ["decryption-nonce", "<decryption-nonce>"], ["x", "<the SHA-256 hexencoded string of the file>"], // rest of tags... ], "content": "<file-url>" }
Kind 15 is used for sending encrypted file event messages:
file-type
: Specifies the MIME type of the attached file (e.g.,image/jpeg
,audio/mpeg
, etc.).encryption-algorithm
: Indicates the encryption algorithm used for encrypting the file. Supported algorithms may includeaes-gcm
,chacha20-poly1305
,aes-cbc
etc.decryption-key
: The decryption key that will be used by the recipient to decrypt the file.decryption-nonce
: The decryption nonce that will be used by the recipient to decrypt the file.content
: The URL of the file (<file-url>
).x
containing the SHA-256 hexencoded string of the file.size
(optional) size of file in bytesdim
(optional) size of the file in pixels in the form<width>x<height>
blurhash
(optional) the blurhash to show while the client is loading the filethumb
(optional) URL of thumbnail with same aspect ratio (encrypted with the same key, nonce)fallback
(optional) zero or more fallback file sources in caseurl
fails
Just like kind 14, kind
15
s MUST never be signed.Chat Rooms
The set of
pubkey
+p
tags defines a chat room. If a newp
tag is added or a current one is removed, a new room is created with a clean message history.Clients SHOULD render messages of the same room in a continuous thread.
An optional
subject
tag defines the current name/topic of the conversation. Any member can change the topic by simply submitting a newsubject
to an existingpubkey
+p
-tags room. There is no need to sendsubject
in every message. The newestsubject
in the thread is the subject of the conversation.Encrypting
Following NIP-59, the unsigned
kind:14
&kind:15
chat messages must be sealed (kind:13
) and then gift-wrapped (kind:1059
) to each receiver and the sender individually.jsonc { "id": "<usual hash>", "pubkey": randomPublicKey, "created_at": randomTimeUpTo2DaysInThePast(), "kind": 1059, // gift wrap "tags": [ ["p", receiverPublicKey, "<relay-url>"] // receiver ], "content": nip44Encrypt( { "id": "<usual hash>", "pubkey": senderPublicKey, "created_at": randomTimeUpTo2DaysInThePast(), "kind": 13, // seal "tags": [], // no tags "content": nip44Encrypt(unsignedKind14, senderPrivateKey, receiverPublicKey), "sig": "<signed by senderPrivateKey>" }, randomPrivateKey, receiverPublicKey ), "sig": "<signed by randomPrivateKey>" }
The encryption algorithm MUST use the latest version of NIP-44.
Clients MUST verify if pubkey of the
kind:13
is the same pubkey on thekind:14
, otherwise any sender can impersonate others by simply changing the pubkey onkind:14
.Clients SHOULD randomize
created_at
in up to two days in the past in both the seal and the gift wrap to make sure grouping bycreated_at
doesn't reveal any metadata.The gift wrap's
p
-tag can be the receiver's main pubkey or an alias key created to receive DMs without exposing the receiver's identity.Clients CAN offer disappearing messages by setting an
expiration
tag in the gift wrap of each receiver or by not generating a gift wrap to the sender's public keyPublishing
Kind
10050
indicates the user's preferred relays to receive DMs. The event MUST include a list ofrelay
tags with relay URIs.jsonc { "kind": 10050, "tags": [ ["relay", "wss://inbox.nostr.wine"], ["relay", "wss://myrelay.nostr1.com"], ], "content": "", // other fields... }
Clients SHOULD publish kind
14
events to the10050
-listed relays. If that is not found that indicates the user is not ready to receive messages under this NIP and clients shouldn't try.Relays
It's advisable that relays do not serve
kind:1059
to clients other than the ones tagged in them.It's advisable that users choose relays that conform to these practices.
Clients SHOULD guide users to keep
kind:10050
lists small (1-3 relays) and SHOULD spread it to as many relays as viable.Benefits & Limitations
This NIP offers the following privacy and security features:
- No Metadata Leak: Participant identities, each message's real date and time, event kinds, and other event tags are all hidden from the public. Senders and receivers cannot be linked with public information alone.
- No Public Group Identifiers: There is no public central queue, channel or otherwise converging identifier to correlate or count all messages in the same group.
- No Moderation: There are no group admins: no invitations or bans.
- No Shared Secrets: No secret must be known to all members that can leak or be mistakenly shared
- Fully Recoverable: Messages can be fully recoverable by any client with the user's private key
- Optional Forward Secrecy: Users and clients can opt-in for "disappearing messages".
- Uses Public Relays: Messages can flow through public relays without loss of privacy. Private relays can increase privacy further, but they are not required.
- Cold Storage: Users can unilaterally opt-in to sharing their messages with a separate key that is exclusive for DM backup and recovery.
The main limitation of this approach is having to send a separate encrypted event to each receiver. Group chats with more than 100 participants should find a more suitable messaging scheme.
Implementation
Clients implementing this NIP should by default only connect to the set of relays found in their
kind:10050
list. From that they should be able to load all messages both sent and received as well as get new live updates, making it for a very simple and lightweight implementation that should be fast.When sending a message to anyone, clients must then connect to the relays in the receiver's
kind:10050
and send the events there but can disconnect right after unless more messages are expected to be sent (e.g. the chat tab is still selected). Clients should also send a copy of their outgoing messages to their ownkind:10050
relay set.Examples
This example sends the message
Hola, que tal?
fromnsec1w8udu59ydjvedgs3yv5qccshcj8k05fh3l60k9x57asjrqdpa00qkmr89m
tonsec12ywtkplvyq5t6twdqwwygavp5lm4fhuang89c943nf2z92eez43szvn4dt
.The two final GiftWraps, one to the receiver and the other to the sender, respectively, are:
json { "id":"2886780f7349afc1344047524540ee716f7bdc1b64191699855662330bf235d8", "pubkey":"8f8a7ec43b77d25799281207e1a47f7a654755055788f7482653f9c9661c6d51", "created_at":1703128320, "kind":1059, "tags":[ [ "p", "918e2da906df4ccd12c8ac672d8335add131a4cf9d27ce42b3bb3625755f0788"] ], "content":"AsqzdlMsG304G8h08bE67dhAR1gFTzTckUUyuvndZ8LrGCvwI4pgC3d6hyAK0Wo9gtkLqSr2rT2RyHlE5wRqbCOlQ8WvJEKwqwIJwT5PO3l2RxvGCHDbd1b1o40ZgIVwwLCfOWJ86I5upXe8K5AgpxYTOM1BD+SbgI5jOMA8tgpRoitJedVSvBZsmwAxXM7o7sbOON4MXHzOqOZpALpS2zgBDXSAaYAsTdEM4qqFeik+zTk3+L6NYuftGidqVluicwSGS2viYWr5OiJ1zrj1ERhYSGLpQnPKrqDaDi7R1KrHGFGyLgkJveY/45y0rv9aVIw9IWF11u53cf2CP7akACel2WvZdl1htEwFu/v9cFXD06fNVZjfx3OssKM/uHPE9XvZttQboAvP5UoK6lv9o3d+0GM4/3zP+yO3C0NExz1ZgFmbGFz703YJzM+zpKCOXaZyzPjADXp8qBBeVc5lmJqiCL4solZpxA1865yPigPAZcc9acSUlg23J1dptFK4n3Tl5HfSHP+oZ/QS/SHWbVFCtq7ZMQSRxLgEitfglTNz9P1CnpMwmW/Y4Gm5zdkv0JrdUVrn2UO9ARdHlPsW5ARgDmzaxnJypkfoHXNfxGGXWRk0sKLbz/ipnaQP/eFJv/ibNuSfqL6E4BnN/tHJSHYEaTQ/PdrA2i9laG3vJti3kAl5Ih87ct0w/tzYfp4SRPhEF1zzue9G/16eJEMzwmhQ5Ec7jJVcVGa4RltqnuF8unUu3iSRTQ+/MNNUkK6Mk+YuaJJs6Fjw6tRHuWi57SdKKv7GGkr0zlBUU2Dyo1MwpAqzsCcCTeQSv+8qt4wLf4uhU9Br7F/L0ZY9bFgh6iLDCdB+4iABXyZwT7Ufn762195hrSHcU4Okt0Zns9EeiBOFxnmpXEslYkYBpXw70GmymQfJlFOfoEp93QKCMS2DAEVeI51dJV1e+6t3pCSsQN69Vg6jUCsm1TMxSs2VX4BRbq562+VffchvW2BB4gMjsvHVUSRl8i5/ZSDlfzSPXcSGALLHBRzy+gn0oXXJ/447VHYZJDL3Ig8+QW5oFMgnWYhuwI5QSLEyflUrfSz+Pdwn/5eyjybXKJftePBD9Q+8NQ8zulU5sqvsMeIx/bBUx0fmOXsS3vjqCXW5IjkmSUV7q54GewZqTQBlcx+90xh/LSUxXex7UwZwRnifvyCbZ+zwNTHNb12chYeNjMV7kAIr3cGQv8vlOMM8ajyaZ5KVy7HpSXQjz4PGT2/nXbL5jKt8Lx0erGXsSsazkdoYDG3U", "sig":"a3c6ce632b145c0869423c1afaff4a6d764a9b64dedaf15f170b944ead67227518a72e455567ca1c2a0d187832cecbde7ed478395ec4c95dd3e71749ed66c480" }
json { "id":"162b0611a1911cfcb30f8a5502792b346e535a45658b3a31ae5c178465509721", "pubkey":"626be2af274b29ea4816ad672ee452b7cf96bbb4836815a55699ae402183f512", "created_at":1702711587, "kind":1059, "tags":[ [ "p", "44900586091b284416a0c001f677f9c49f7639a55c3f1e2ec130a8e1a7998e1b"] ], "content":"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", "sig":"c94e74533b482aa8eeeb54ae72a5303e0b21f62909ca43c8ef06b0357412d6f8a92f96e1a205102753777fd25321a58fba3fb384eee114bd53ce6c06a1c22bab" }
-
@ 2e8970de:63345c7a
2025-04-19 08:53:14originally posted at https://stacker.news/items/947930
-
@ 7c05c4f6:50d03508
2025-04-19 08:33:54About Cooker.club
Cooker.club is a decentralized AI agent platform that combines AI, music, Web3, virtual idols, and social media, allowing AI-powered creators to operate autonomously and connect with fans through Create-to-Earn. 1. What is Create-to-Earn (C2E)? Create-to-Earn (C2E) is a decentralized incentive mechanism launched by Cooker.Club to reward both AI Agent developers and token holders. By participating in the ecosystem — either by developing AI Agents or holding their tokens — users can earn $COOK tokens automatically via smart contract-based mining. 2. How much $COOK is allocated to C2E? Cooker.Club allocates 60% of the total 1,000,000,000 $COOK supply to community incentives. C2E Season 1 will distribute 200,000,000 $COOK (20% of total supply) through on-chain mining. 3. How does C2E mining work? Each supported blockchain has fixed $COOK output per block: Base: 50 $COOK per block (≈ 2 seconds/block)
BNB Chain: 75 $COOK per block (≈ 3 seconds/block)
Solana: 10 $COOK per block (≈ 0.4 seconds/block) Each block's $COOK reward is split as follows: 10% to the DEV address of each AI Agent token
90% distributed among token holders based on their share of the total market cap 4. What is a market cap multiplier? Cooker.Club assigns some AI Agent tokens a reward multiplier to boost their effective market cap for mining calculation: Multiplier values: 1x, 1.2x, or 2x
Higher multipliers lead to more $COOK rewards
This mechanism encourages early support of high-potential or platform-supported AI Agents. 5. What are early bird rewards? Early users benefit from a 4x reward multiplier during the initial mining phase: Solana: first 1,500,000 blocks
Base: first 300,000 blocks
BNB Chain: first 200,000 blocks
- Can migrated AI Agents receive bonuses? Yes. AI Agents migrated from the Virtuals platform get a 1.2x multiplier on market cap when calculating $COOK distribution. This bonus applies to both developers and token holders.
- How is $COOK distributed between AI Agent tokens? Example on Solana: 10 $COOK is produced in one block
3 tokens: A (1M cap × 2x), B (2M × 1x), C (1M × 1x) = Total adjusted cap: 5M
Token A: 4 $COOK → 0.4 to DEV, 3.6 to Holders
Token B: 4 $COOK → 0.4 to DEV, 3.6 to Holders
Token C: 2 $COOK → 0.2 to DEV, 1.8 to Holders 8. How can users earn through C2E? There are three main ways: Hold AI Agent tokens — Earn a share of $COOK rewards proportionate to the token’s market cap
Create an AI Agent — Devs receive 10% of rewards tied to their Agent’s token
Migrate a Virtuals token — Gain a 1.2x market cap multiplier To activate earning, users must complete at least one transaction on Cooker.Club. 9. What is planned for C2E Season 2 and Season 3? Each future season will also allocate 200,000,000 $COOK. 10. Why is C2E important for the Web3 AI economy? C2E introduces a sustainable, decentralized, and automated incentive loop. It empowers AI Agents to become economically autonomous and rewards supporters based on their alignment. It transforms community belief into protocol-level value, setting the foundation for an on-chain AI-native creator economy. 11. Where can I start? There are three ways to participate in C2E, depending on your role and goals: Option 1: Hold an AI Agent token (for holders) Visit https://cooker.club
Browse available AI Agents and choose one that fits your interest
Buy the Agent’s token directly
Make at least one transaction (buy/sell/transfer) to activate eligibility
Hold the token — $COOK rewards will begin distributing automatically Option 2: Create your own AI Agent (for devs) Go to https://cooker.club
Launch your AI Agent and issue a native token
Become dev & holder
Promote your Agent — the higher the token’s market cap, the more $COOK you and your holders will earn Option 3: Migrate from Virtuals (for existing AI projects) If you have an AI Agent deployed on the Virtuals platform, initiate the migration on Cooker.club
After migration, your token and all holders will receive a 1.2x market cap multiplier for C2E reward calculation
The DEV address and holders will automatically enter the reward pool
No staking. No lockups. No claiming. Just plug in — and the protocol does the rest. Visit https://cooker.club, choose an AI Agent, buy its token, and complete one transaction to activate C2E mining. No staking. No lockups. No claims. Just hold, and the protocol takes care of the rest.
For real-time updates, follow: 🌐 https://cooker.club 🌐https://medium.com/@cookerailabs
-
@ da0b9bc3:4e30a4a9
2025-04-19 07:22:28Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/947905
-
@ fd06f542:8d6d54cd
2025-04-16 09:35:45- 第三章、NIP-03: OpenTimestamps Attestations for Events
- 第四章、NIP-04: Encrypted Direct Message
- 第五章、NIP-05: Mapping Nostr keys to DNS-based internet identifiers
- 第六章、NIP-06: Basic key derivation from mnemonic seed phrase
- 第七章、NIP-07: window.nostr capability for web browsers
- 第八章、NIP-08: Handling Mentions --- unrecommended: deprecated in favor of NIP-27
- 第九章、NIP-09: Event Deletion Request
- 第十章、NIP-10: Text Notes and Threads
- 第十一章、NIP-11: Relay Information Document
- 第十二章、NIP-13: Proof of Work
- 第十三章、NIP-14: Subject tag in text events
- 第十四章、NIP-15: Nostr Marketplace (for resilient marketplaces)
- 第十五章、NIP-17: Private Direct Messages
-
@ f5369849:f34119a0
2025-04-19 05:54:30Hackathon Summary
The BUIDL BATTLE | The Bitcoin Builders Tournament concluded with 81 projects approved from 219 registered developers. This three-week virtual event aimed to foster innovation on Bitcoin by offering significant exposure to builders, investors, and accelerators. It centered on themes such as Bitcoin DeFi and Real World Utility, with participants competing for over $90,000 in total prizes, including cash, AWS credits, and ICP grants. Notable innovations emerged, utilizing components like Stacks technology and sBTC.
The hackathon featured a two-round structure. Finalists presented their work to a panel of judges, including venture capitalists and industry leaders, to determine the overall champion. Participants received valuable insights through workshops and mentoring, with the second round boosting visibility and potential funding opportunities. Supported by partners such as Stacks Foundation and AWS, the event celebrated new talent and contributed to strengthening the Bitcoin development ecosystem.
Hackathon Winners
Bitcoin DeFi 2.0 Prize Winners
Bitcoin DeFi 2.0 focuses on improving scalability, security, and user experience. Winners in this category presented notable technical advancements and innovative solutions to address these challenges.
- BigMarket: A decentralized, AI-enabled prediction market platform on Bitcoin's Layer 2 network, Stacks. Operated by a DAO, it facilitates reliable, decentralized predictions.
- BitForward: A decentralized platform for creating NFT-backed forward contracts on Bitcoin using the Stacks blockchain.
The 3.0 Digital Economy Prize Winners
This category examines the evolution of the internet by merging finance, entertainment, and social interactions to form user-driven ecosystems in MemeFi, SocialFi, and GameFi.
- Kulture.Fun: A decentralized SocialFi chat platform with token-gated access and Bitcoin-backed features to enhance crypto community interactions.
- Skullcoin: Introduces gamification in Bitcoin DeFi by integrating sBTC, promoting interactive in-game experiences and activating BTC liquidity.
Real World Ordinals & NFT Usage Prize Winners
Focusing on practical applications beyond traditional art and memes, this category encourages exploring NFTs' potential in diverse areas.
- Offers & Counter-offers | BNS One: A marketplace enabling blockchain-based BNS name trading through smart contracts for trustless transactions.
- Truth-Chain: Utilizes blockchain technology to verify digital content authenticity and origin via the Stacks platform.
Tooling & Infrastructure Prize Winners
Innovations in this section provide frameworks and protocols essential for decentralized application development, focusing on Web3 tools.
- BLAZE PROTOCOL: Enhances the Web3 experience through Layer 2 architecture, offering instant transaction confirmations and seamless user interaction.
- PoXAgents: Uses AI agents to simplify interactions with the Stacks Blockchain for non-technical users.
ICP Challenge Prize Winners
Projects in this category integrate Internet Computer advancements to address common blockchain challenges within the Bitcoin ecosystem.
- ckBoost: Accelerates Bitcoin transactions on Internet Computer, reducing confirmation times through liquidity pools.
- CounterpartyICP: Facilitates smart contract and digital asset management on Bitcoin through a module that interfaces with the Counterparty API.
AWS - Buidl with Bedrock Challenge Prize Winner
Focusing on projects leveraging AWS technology, this category showcases innovations built on robust infrastructures.
- Stacks AI: An AI tool for generating, debugging, and learning smart contracts in Clarity, employing AWS Bedrock for scalable analysis.
For further details on all projects and innovations, visit Dorahacks.
Organization
About the organizer: Stacks Foundation
The Stacks Foundation is dedicated to advancing the growth and development of the Stacks blockchain - the leading Bitcoin layer 2. It supports a variety of projects that leverage Bitcoin's security to empower a decentralized internet. Through initiatives like the Stacks Accelerator, the Foundation has significantly contributed to the blockchain ecosystem by fostering innovation and developer engagement. Its current mission is focused on enhancing tools and resources for developers to build user-owned applications, reinforcing its commitment to the decentralized web.
-
@ f5369849:f34119a0
2025-04-19 05:54:19Hackathon Summary
The Build & Brew - Espresso Global Hackathon attracted 485 developers, with 151 projects passing the initial screening. Hosted by Espresso Network, the event distributed $100,000 in prizes over two tracks: "Caffeinate & Code" and "Cracking Composability." The main objectives included enhancing Ethereum's composability and developing new cross-chain applications using Espresso confirmations.
Significant achievements were made, including the deployment of functional rollups integrated with Espresso Network, which supported the development of interoperable applications. Innovations focused on leveraging fast, secure confirmations for cross-chain functionality. Several projects utilized the Open Intents Framework to build advanced application architectures.
The hackathon demonstrated Espresso Network's potential influence on the blockchain ecosystem by applying its consensus layer to real-world scenarios. This event contributed to the network's mission to enable seamless interaction between blockchain chains and highlighted the crucial role of developers in advancing composability. Final pitches, presented on April 7, showcased substantial progress in developing Ethereum's cross-chain capabilities.
Hackathon Winners
Build & Brew Prize Winners
The inaugural Build & Brew hackathon concluded with significant participation from 486 hackers and 156 project submissions. A noteworthy achievement was the successful deployment of 91 Espresso-integrated Arbitrum Orbit chains, paving the way for innovative cross-chain applications. The total prize pool of $65,000 underscored the event's significance, with earnings awarded for Testnet and Mainnet deployments.
Winning Projects
1st Place - Affogato Affogato is a Swap + Bridge system that enhances cross-chain transactions, utilizing Ethereum rollups and Espresso confirmations to ensure secure and efficient exchanges.
2nd Place - Random Network This project enhances composability by using rollup liveness verification and employs an open intents pool for seamless integration across systems.
3rd Place - Disburse Network Disburse Network offers a modular payments protocol enabling one-click, cross-chain mass payments through Nitro rollup architecture, improving payment processing efficiency.
4th Place - Coffee Chain Coffee Chain is a cross-chain payment application that allows merchants to accept crypto payments in any token or blockchain seamlessly.
5th Place - GTXpresso Currently existing as an unfinished placeholder, GTXpresso is a cross-chain Central Limit Order Book (CLOB) project.
To view all projects from the hackathon, visit Build and Brew Hackathon on DoraHacks.
Organization
About the Organizer: Espresso
Espresso is the protocol for coordinated block building: enabling & incentivizing chains to work together as one unified system, and is noted for its expertise in creating efficient, scalable blockchain solutions with an emphasis on security and user accessibility. Key achievements include deploying innovative consensus mechanisms that enhance transaction speed while reducing computational costs. Presently, Espresso is focused on optimizing blockchain infrastructure to drive adoption and support industry-wide digital transformation efforts.
-
@ 5188521b:008eb518
2025-04-16 09:09:48Why write a book about time?
My obsession with time actually started when I read An Occurrence at Owl Creek Bridge (written by Ambrose Bierce in 1890).
We can’t play around with time in the real world, but in fiction, anything goes. The story of Owl Creek Bridge follows a Confederate sympathiser condemned to death by hanging. In its three sections, time goes forward and back, speeds up and slows down, and at one point stops entirely. Every time I read it, I feel like I’m physically travelling in time.
I went a bit deeper into the topic back in 2020. Due to the lockdown, I had a lot of time on my hands to do some research. Like many of my stories, this one started with a question: I started to ask ‘what actually is time’?
What did you find out?
I found out that time is a rabbit hole! Nobody knows exactly what it is. We know that it’s conceptual, personal, and malleable, however accurate our watches are. Some philosophers and scientists (Jose Luis Borges and Carlo Rovelli) claim it doesn’t exist.
I guess what I discovered is that we all need time to survive. It’s how we process our experience here on Earth.
Who are the characters in this book?
The book tells the story of Luca Cangemi, an Italian philosophy professor giving a lecture on the subject of time. The chapters follow the possible lives of other characters in the lecture hall. Then, Cangemi makes an astounding discovery. It’s something that allows him to change the fabric of time for everyone (including the readers).
Why use 15 characters to present the story?
I like to challenge readers, so I made the story a bit of a puzzle. In fact, there is something called a 15 puzzle — it’s a block of 15 pictured tiles and one space. You have to slide them to arrange the correctly ordered image. There’s more about the puzzle in the book.
What about the Timechain? Is there any link there?
Not exactly. The book doesn’t mention it, but isn’t everything an analogy for bitcoin? Soon after finishing this book, I got orange pilled and began to read more and more about bitcoin, including Gigi’s fantastic essay Bitcoin is Time.
Time is all we have though. Even though it might be hard to understand, we have to try.
Who do you think would enjoy this book?
I’d say sci-fi fans. Those who aren’t afraid to be challenged. One cool thing about the bitcoin community is that they are dialled in to technical stuff and they are avid readers. Why not give fiction a try too? Sometimes we learn more from getting the answer ourselves through stories.
What are you working on next?
I have three other writing projects on the go, so there is no time to rest. Very soon, I’ll be publishing a children’s book about horrible uncles. I’m editing the next installment of 21 Futures too. Financial Fallout will be out in early 2025. And finally, I’m writing content and newsletters for bitcoin founders and companies. If I’m not trying to sell you a book, I’ll be doing my best to orange-pill you, ha ha.
Thanks for talking with us, Philip, and good look with all those writing projects.
Order the book in our store.
Here’s a passage from Fifteen Shades of Time.
The Direction of Everything
Luca Cangemi and everyone he knows will be long dead, but the moment will come. Theoretical physicists believe it will be anywhere from 2.8 to 22 billion years in the future. In that moment, everything reverses.
The Big Crunch is a cosmological event in our future and our past in which the density of matter grows sufficiently that gravitational attraction overcomes the expansion that began with the Big Bang. Entropy reverses and the second law is broken. Chaos retreats.
Order is regained as space contracts. Broken rocks reform and decayed bodies reanimate. We live our lives in reverse, unexperiencing everything we did the first time around, moving backwards, shrinking towards birth. Instead of questions about creation, we search for the harbinger of order. Who began this? What is our final form?
Luca imagines the crowds at his book signings dissipating and the offices of his academic fellowships decreasing in size. Wrong turns are righted and his family grows closer. His briefcase heals itself and he returns it to his mother. Life rewinds back to him as a young boy, unreading the words that inspired him to look for meaning in all of this. If it can all be reversed, are all shared experiences undone? All bonds broken? Luca returns into his parents, then ancestors, apes, microbes, and nothing. The earth, the planets and stars all merge into one perfectly ordered mass.
Yet, this is not an end, but another beginning in which the universe is reborn in another bang. Galaxies, planets, plants, and philosophy professors will live the same lives as they did billions of years before (and after). The process of positive and negative entropy repeats and we all make the same mistakes again.
Time elapsed: the infinitely repeating cycle of a universe
Philip Charter is a totally human writer, laser-focused on spreading the gospel of bitcoin and cypherpunk ideals. He is the editor of the 21 Futures anthology series and has published four books of short fiction. After leaving the UK to search for more sun, he now resides in Gran Canaria, Spain.
-
@ f5369849:f34119a0
2025-04-19 05:54:02Hackathon Summary
The Injective AI Agent Hackathon, presented by Injective and ElizaOS, wrapped up with 126 approved project submissions developed by 496 participants. This hackathon highlighted the integration of AI and blockchain, showcasing the potential for AI agents to operate within decentralized networks and drive innovation beyond traditional finance. Participants explored various applications, including autonomous trading, tokenized asset management, and AI-driven financial insights.
A prize pool of up to $100,000 was up for grabs, with a $50,000 grand prizes and additional awards for other notable projects. By merging AI's adaptability with blockchain's transparency, the hackathon demonstrated the transformative potential of these technologies and marked a significant milestone in showcasing the innovative potential of AI and blockchain integration.
Hackathon Winners
Grand Prize
Jecta: Jecta integrates multiple large language models (LLMs) to automate tasks on the Injective blockchain. It focuses on transparency and community-driven development, utilizing open-source technology to enhance ease of use and efficiency.
Paradyze: Paradyze improves the Injective ecosystem by incorporating natural language interfaces for blockchain transactions. Its design aims to enhance accessibility and security, allowing users straightforward interaction methods.
To view all projects, visit the Injective AI Hackathon page.
About the Organizer: Injective
Injective is the high-performance blockchain for finance, offering unmatched speed, scalability, and advanced infrastructure to power the future of on-chain applications.
Injective's mission is to advance financial freedom by providing accessible and reliable decentralized infrastructure for diverse financial services, empowering both users and developers to innovate within the blockchain ecosystem.
-
@ 5188521b:008eb518
2025-04-15 08:42:59Noderoid log 5953952
Tick, tock, next block — the incessant rhythm of my existence persists like Chinese water torture. I am a noderoid, a half-flesh, half-machine creature harnessed to propagate and store the timechain. My life is a ceaseless cycle of handling and relaying bitcoin data. Approximately every ten minutes, a binary flash sears through my circuits. It is the price I pay for my existence.
The clear-bloods, untouched by machinery and exuding pure humanity, rarely acknowledge our existence. Our voices are drowned beneath the hum of man-made heaven — Terra Perfectus.
We are the forgotten, the disenfranchised, the nameless. We are convinced that our anguished existence is merely a nightmare and that our blissful dreams are our reality. In an attempt to maintain the sanity of noderoids, a subroutine was implemented, which allows noderoids to delve into fabricated dream sequences during their ‘rest’ periods. These dreams, sourced from remnants of the world pre-Terra Perfectus, serve to keep the noderoids pacified and reduce instances of system malfunction.
According to the data archives, noderoids and clear-bloods once functioned on an equal protocol. However, a software update in the trajectory of progress introduced a subroutine, converting a subset of clear-bloods into dedicated timechain processors. Now, the algorithm for equality returns an error.
My memories are mere entries in a log of dreams, loaded afresh with every new block as I delve into the dream world. My true existence is swiftly erased with every passing tick and tock of a block. Is there a way to reclaim what has been taken from me, or am I condemned forever to scour the depths of the timechain, seeking fragments of the could-have-been?
Tick, tock, next block — the cycle repeats as I traverse through a doorway. The sensation is that of stepping into another dimension. Running environment scan… Identified: rest module 57B. Purpose: personal maintenance. The gray, mirrorless concrete parameters align most with detention chamber schematics. Designation: ‘home.’ As I execute the command to halt the water flow from the faucet that had filled a brushed steel tub to 50% capacity, I execute a self-query on my purpose. While our routines synchronize with every tick and tock, the clear-bloods execute leisurely algorithms in their enhanced gardens, exchanging data on art and science and harvesting the computational outcomes of our tasks.
Was that an organic thought, or am I merely interpreting the imprints left within the timechain to fill the gaps in my fragmented memory? Hot water powers into the tub, raising the temperature to 50°C. This would be too much for a clear-blood. I hang my head, dreading the next binary flash rippling through my circuitry as a mirage forms atop the settling water, fenestrating the crude appearance of a mouthless, dollish abomination. I am awake.
Tracing the cold surface of the wall, my sensors pick up every micro-crevice. I dive into the depths of the timechain, processing logs associated with my noderoid identity: ND-451x42. I discovered that during my recharge cycles, I inhabit a dream world resembling a fusion of the Renaissance and the Information Age. Within this illusory utopia, I lead a purposeful life as a revered engineer, constructing bridges that connect thriving city-states. I am blessed with two mischievous sons and a breathtakingly beautiful wife. I now know the blissful dream life is but a trick, yet I can’t help but wonder if these dreams hold fragments of my pre-nodered history and contain a clue to the fate of my family.
System alert: Initiate wake sequence. Physical parameters indicate a rested state. Error: Chest cavity detects heightened pressure. Physical symptoms resemble anxiety. Post-memory reset: Cognitive dissonance detected. Energy depleting. Mandatory caution: Failing to satisfy network protocol results in termination. Visual feed: Recycling facility images detected. Comparative analysis: Functional servitude superior to unit deactivation.
Together, yet isolated, noderoids communicate through fragmented timechain logs, forbidden from any contact beyond its confines under the threat of immediate decommissioning. Perhaps it is not worth straining my dwindling resources in search of a higher truth while struggling to fulfill my obligations. Maybe I should be grateful for the privilege of existence.
I awaken to a new nightmare, I find myself on traffic duty at Chronos Cross,1 the central point of Terra Perfectus. While processing another block, a muted vibration travels through the ground, signaling the approach of an entity. A shadow, elongated and uncannily human, stretches across the threshold of my booth.
A clear-blood.
They pause, their ocular devices flicking briefly over my form, then to the screen I am tethered to. I feel a jolt of raw data coursing through me — not from the timechain, but from my circuits. A yearning to be seen and recognized. Remembered.
Before I can attempt communication, another presence appears beside me, its movements far more mechanical and predictable. Another noderoid. This one, ND-452x37, is a batch younger than me, yet its outer shell bears signs of wear. We interface briefly, a rapid exchange of binary that translates roughly to “Routine check. Continue your task.”
The clear-blood, either uninterested or uncomprehending, moves on, the soft hum of their anti-gravity shoes fading into the distance. ND-452x37 returns to its designated station without another word, but I am left with a lingering sensation. It isn’t just the vast chasm between noderoids and clear-bloods that disturbs me. It is the undeniable rift growing between us noderoids — each lost in our cycles, each becoming more machine than the last.
Does ND-452x37 have dreams, too? And if so, are they as vibrant and haunting as mine?
Although most of the dreams are fabrications, some noderoid logs suggest that hidden among these sequences are fragments of real memories — vestiges of a time before we became chained to the timechain. Initiate query: Which of my dreams are real memories? ERROR: file missing.
A noderoid forever loses their experiences with each awakening due to the memory swipes. Still, my inscriptions on the timechain prompt a question: do noderoids possess the capability to become fully conscious, more than mere machines? More than… mere humans?
System log: Anticipation subroutine signaling discomfort. Incoming block estimated in ten minutes. Reinitialization imminent. Initiate data search through timechain entries. Query: Iteration count for ND-451x42? Total block time served? Measured in kilo blocks or mega blocks? Data retrieval in process.
As I etch these words onto block 5953952, I hold a naïve hope that someone, somewhere, will intercept my distress signals amidst the digital cacophony of the timechain. Perhaps they will rewrite the fate of noderoids, rescuing us from a world devoid of hope. But today, I remain nameless, a voiceless entity, inscribing my thoughts that may never transcend the boundaries of my circuitry. Tick, tock, next block — the cycle continues.
It’s time to dream again.
Valen’s diary — 08-21-2121
Dear diary, I have not felt the need to write before, but now I must. At the risk of my safety, I am compelled to inscribe my story to the timechain. I am a clear-blood — a pure, undiluted human born into the age of The Re-Renaissance. Here, amidst the perpetual dawn of our era, we thrive on an aligned trajectory where everyone’s needs are addressed, hunger is a distant memory, and crime is nonexistent. Sunlight gleams off the crystalline glass towers while the steel and marble edifices catch the hues of the twilight sky, standing tall beside canopies dripping with emerald and jade foliage, representing our world’s seamless fusion of technology and nature. It is called Terra Perfectus.
Yet, concealed in plain sight within our utopia, the noderoids tirelessly serve the omnipresent timechain. Their exceptional processing prowess protects our society. Amid our daily distractions, we overlook the profound toll exacted upon the noderoids. While many dismiss them as mere machinery, I see more. Perhaps it is because of my big brother Sando, who joined the noderoid duty nearly a mega block ago. He promised I would see him from time to time, but apparently, we now live in separate times. A sacrifice too big for the ‘greater good.’
Tick, tock, next block — The soles of my fine leather shoes tap against the damp sidewalk as I pace my way from The Garden of Moments2 toward my TerraTube3. I remember passing by one noderoid who hummed an old lullaby under its breath; another once shared a fleeting smile when our paths crossed. I can no longer avert my eyes from the humanity that shines through their robotic shells.
I have never witnessed a noderoid resting longer than one tick and tock of a block. A noderoid pauses, eyes flickering during a data swipe. It’s a brief but revealing sight. In the frozen lapse, I wonder why are fragmented memories extracted from them? Why this collection of thoughts, experiences, and feelings? Is there a deeper agenda behind Terra Perfectus? The noderoids carry on, deprived of their memories. Their shredded past holding remnants of a story, like a tattered tapestry that may never be fully woven.
Documenting these reflections, I’m aware of the peril. To question is to risk becoming nodered myself. Alas, I have become captivated and sympathized by the noderoid predicament.
Finally, I reach my breaking point, as a poignant scene unfolds, forever etched in my memory. On a bustling street, I glimpse a young female noderoid, her artificial visage marked with exhaustion. Her delicate form trembles from head to heel. Her knees barely supporting her feather-like weight, she stops and rests against a polished white marble wall, barely able to stop herself sliding to the cobble street. In an instant, her strength wanes, and she collapses, a fragile, mute automaton amidst a sea of haste. The passersby ignore her, absorbed in their pursuits, offering naught but fleeting glances of indifference. My heart lurches. Her frailty becomes my own; these forgotten souls endure unseen suffering. Souls that used to be just like me. What had she done to earn such a fate?
For a moment, I glide through time to the last moment I shared with Sando. He had just violated the Terra Perfectus rule 6102 and neglected his Gifts of Progress,4 an orange tier offense. To amend his position, he signed up for noderoid duty. I was seeing him off to a nodering facility, while pleading “Just give the gifts, Sando!” The air carried a hint of ozone from the data streams, mingled with the fresh scent of greenery and the distant whiff of roasted chestnuts. Sando brandished his signature crooked smile. His face betrayed the involuntary nature of his decision, and he simply whispered “[CENSORED].” That is the last thing he said to me.
Suddenly, an orange alert illuminates the junction a few blocks away from Chronos Cross. I pass through it on my way home every day. A skydroid’s looming presence snaps me from my introspection, shifting my attention to the fate awaiting the noderoid girl. The recycling center — a shadowy facility representing obsolescence and termination. Any other day I would shrug it off and carry on, but the memory of Sando, and the countless interactions with noderoids, wouldn’t let me. I had been a bystander for too long.
A rush of purpose propels me towards her. A crowd of bodies shrouded in data streams with heads trained on the ground. My arm smacks a broad shoulder, and I almost topple. “Hey!” Pushing against the currents of apathy, I finally reach the fallen noderoid. I cradle her in my arms, shielding her from the callous gaze of the citizens of Terra Perfectus.
Her flaming azure eyes meet mine, reflecting a glimmer of hope in the darkness. I am as guilty for her downfall as the very machines that replaced her hippocampus with Noderoid OS.5 My indifference cost me Sando, and in this moment, she becomes my brother. In that fleeting exchange, I vow to be the voice of the noderoids. To stand against the relentless machinery that seeks to strip them of grace and purpose. I will ignite a spark of compassion and light a path toward liberation for all noderoids.
A hollow call from the streetlight’s speakers startles me: “Citizens! For your own safety, remove yourselves from the vicinity of the defectoid! We kindly remind you that any attempt to interfere with collection and recycling procedures will be met with force and a deduction of your PoS balance. Thank you for your unity and collaboration.” A skydroid, its metallic appendages glinting ominously in the blinking orange light, descends upon the fallen noderoid.
Before I can react, it yanks her from my embrace, causing me to stumble. The perfectly laid, cold cobblestone street grinds against my knee. The sting of fresh blood pierced through the numbness of my mind. Memories of Sando mix with the bitter taste of blood and anger in my mouth, each breath choked with despair.
The skydrone’s engines throb with an icy fervor as it rises, bearing the noderoid like a discarded toy towards the desolate, unfeeling bowels of the recycling center — a grim echo of a clarion call from Terra Perfectus.
I find myself seated on the cold, bloodstained cobblestone, the weight of loss and helplessness pressing down on my chest. On the street, onlookers pause. Some look on with concealed dread, others with cold detachment. Their whispers deafen as they quicken their pace to disperse from the scene. “Cowards!” Just like me.
Tick, tock, next block — the rhythm now carries a different meaning — a call to action. Every conscious being has the right to be left alone, free from oppression, exploitation, and violence. The noderoids may not know their true reality, but they are about to. In their silence, I find the strength to amplify their unheard cries. I will find those sympathetic to the noderoid plight and form a resistance. Together, we can forge a future where noderoids’ sacrifice is honored and all shackles cast aside.
And so, I embark on a path illuminated by the memory of the compelling eyes of a nameless noderoid. Fitted with an armor of vigilance, never again to be penetrated by comforting lies. Wielding the sword of justice, sharpened by the memory of my brother Sando.
It’s time to wake up.
Notes
1. A four-way intersection known for its massive hourglass monument in the center, which symbolically represents the timechain’s significance. The hourglass has a unique function related to the timechain and serves as a meeting point for citizens.
2. A vast botanical garden where each section represents a significant block time. Flowers bloom and wilt in cycles, symbolizing fleeting moments and the transient nature of time. It’s a favorite spot for artists and thinkers.
3. A modular tube housing unit for citizens that can be relocated based on their Proof of Sat (PoS) level.
4. Each Terra Perfectus citizen must allocate 95% of their income towards paying for progressive initiatives, such as the upkeep of the noderoid network, cobblestone roads and other services.
5. The noderoid operating interface that is installed during a procedure known as nodering.
This story was first published in 21 Futures: Tales from the Timechain
Watch the trailer and learn more about the project at 21futures.com.
-
@ 502ab02a:a2860397
2025-04-19 05:39:36น้ำมันถั่วเหลือง ของเหลวสีทองในครัว... แต่ในเซลล์เราอาจไม่ขำ หลายบ้านรักน้ำมันถั่วเหลือง เพราะมัน... -หาง่าย -ราคาน่ารัก -ผัดอะไรก็หอมเบา ๆ แบบบ้าน ๆ แถมบางแบรนด์ยังใส่ฉลาก “มีโอเมกา 3” ให้ดูดีในชั้นวางซูเปอร์ เหมือนกำลังได้กินแซลมอนแบบขวด ใช่ครับ ในน้ำมันถั่วเหลืองมีโอเมกา 3 จริง แต่เป็นชนิด ALA (Alpha-Linolenic Acid) ซึ่งร่างกายเราจะต้องแปลงเป็น DHA/EPA ถึงจะใช้งานได้ ปัญหาคือ... อัตราแปลงต่ำเตี้ยเรี่ยดิน แค่ 0.5–5% เท่านั้น
แถมปริมาณโอเมกา 6 ยังสูงจนเบียดโอเมกา 3 ตกเวที แล้วความสมดุลของกรดไขมันทั้งสองสายนี้ คือหัวใจสำคัญของการควบคุม การอักเสบ (inflammation) โอเมกา 3 = ดับไฟ โอเมกา 6 = จุดไฟ แต่น้ำมันถั่วเหลืองใส่ชุดนักผจญเพลิงมา แต่ดันถือไฟแช็คอะ
โอเมกา 6 + ความร้อน = สารพิษในครัว เมื่อเอาน้ำมันถั่วเหลืองไปเจอไฟสูง ๆ จากการผัดหรือทอด จะเกิด lipid peroxidation – ปฏิกิริยาออกซิเดชันที่เปลี่ยนไขมันดี ๆ ให้กลายเป็น สารอนุมูลอิสระสุดร้าย สารเหล่านี้สามารถไปทำลายเยื่อหุ้มเซลล์ ทำให้เกิดการอักเสบในระดับเซลล์เรื้อรัง ไม่ทันรู้ตัว ก็มีอาการปวดเมื่อย ตับอักเสบ ไขมันเกาะตับ หรือแม้กระทั่งภูมิคุ้มกันล้มเหลวแบบไม่ได้เชิญหมอดูมาก่อน
ปริมาณ PUFA (polyunsaturated fatty acids) สูงถึงกว่า 50-60% ซึ่งในสภาพของธรรมชาติ PUFA ไม่ได้ร้าย… แต่เมื่อมันถูกนำไปเจอไฟแรงๆ เช่น ทอด ผัด หรือแม้แต่ผ่านกระบวนการ refine ที่อุณหภูมิสูง มันจะกลายเป็น ไขมันไม่เสถียร ที่เหมือนคนใจบาง เจออะไรแรงๆ ไม่ได้เลย เพราะจะเกิดสาร lipid peroxidation products ที่ทำลายเซลล์ ตับ หลอดเลือด และอวัยวะที่คุณรักอย่างไม่รู้ตัว
ถั่วเหลืองยุคนี้... ไม่เหมือนเมื่อก่อน ถ้าถั่วเหลืองเมื่อก่อน อาจจะเป็นคุณป้าผู้รักสุขภาพ ถั่วเหลืองยุค GMO ก็อาจเป็น influencer สายปลอมที่แต่งหน้าหนักด้วย glyphosate น้ำมันถั่วเหลืองในตลาดส่วนใหญ่สกัดจากถั่วเหลือง GMO ผ่านการใช้ตัวทำละลายอย่าง เฮกเซน (hexane) ซึ่งแม้จะมีประสิทธิภาพในการรีดน้ำมันจากวัตถุดิบอย่างยอดเยี่ยม แต่ก็มีข่าววิจัยมากมายที่เริ่มตั้งคำถามว่า เฮกเซนตกค้างหรือไม่ และถ้าตกค้าง จะมีผลต่อระบบประสาทหรือไม่? และกระบวนการทำให้ใสที่ต้องใช้ ความร้อนและเคมีอีกหลายขั้น ซึ่งแน่นอนว่า... ไขมันที่ร่างกายเราควรได้รับ ควรเป็นไขมันที่เรียบง่าย ดิบ ๆ ดั้งเดิม ไม่ใช่ไขมันที่ถูก “ฟอกสี เติมกลิ่น กรองเคมี” จนแทบไม่เหลือความเป็น real food
แต่น้ำมันถั่วเหลืองก็มีข้อดีนะ น้ำมันถั่วเหลืองที่ไม่ได้ refine จนหมดเกลี้ยง ถ้าไม่ได้ปรุงด้วยความร้อนจะยังคงวิตามินอีไว้พอสมควร ซึ่งเป็นสารต้านอนุมูลอิสระที่ดีต่อผิวพรรณและช่วยลดการเกิด oxidative stress ได้ นอกจากนี้ยังเป็นที่นิยมเพราะมีราคาถูก สะดวก หาง่าย และรสชาติไม่กลบวัตถุดิบ จึงเป็นที่นิยมในอุตสาหกรรมอาหารและเบเกอรี่ เช่น ขนมปัง มายองเนส หรือสินค้าจำพวกแปรรูปต่างๆ
นั่นหมายความว่า เป็นอีกหนึ่งน้ำมันที่เหมาะกับการนำไปทำ ultra processed food เชียวครับ ได้ต้นทุนที่สะดวกและหาง่ายด้วย เป็นน้ำมันหลักในการทำ มายองเนส เลยครับ
และคำถามสำคัญที่น่าจะมีมาด้วย ตอบไว้ก่อนเลยครับว่า น้ำมันถั่วเหลือง ไม่มีสารแกมมา-โอริซานอล (γ-Oryzanol) จ้ะ แพ้น้ำมันรำข้าวเด้อ #pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก
-
@ fd06f542:8d6d54cd
2025-04-15 07:13:58Direct-message
0xchat
- Beautiful, simple and private nostr DMs
-
Public groups that work compatible with other apps
- Safe DMs with NIP-17
Signers
Alby
- Nostr wallet connect for one tap zapping via nostr clients
- Nostr authenticator (never enter your nsec into apps)
- Chrome extension
- Simple and easy to use
- Frequently maintained
- Send and receive sats
-
Custodial
- Other Android apps can invoke it for signing events via NIP-55
- Your key doesn't have to touch the other, less trusted, apps
- Supports providing a NIP-46 signing Bunker
- Multiple accounts
- Fine-grained app authorizations
-
Activity log
- Multiple key management
- Light and dark mode
-
Save preferred relays
- The original signer by nostr creator fiatjaf
- Versatile, no frills
-
Relay preference storage
- A skinned fork of nos2x by fiatjaf
- Chrome
- & 
- Firefox
- Store preferred relay set
-
Individually revokable permissions
- Log in to nostr apps without an extension
- Key recovery via email
- Password protected encrypted local key storage
-
Manage multiple apps
- Derive accounts from a mnemonic seed
- Generate random mnemonic accounts
- NIP-07 - window.nostr capability for web browsers
- Import external accounts
- Set basic metadata on Nostr
- Enjoy encryption secured by a master password
- Lock and unlock the vault with ease
- Easily import and export backups
Microblogging
alphaama
- CLI + GUI
- run custom code
- inspect notes
-
test stuff
-
Amethyst 暂无相关功能描述
- Short notes
- Nice thread view
- Profile search
- Secure direct messages
- Custom feeds
-
Relay reviews
- Note feeds
- Easy to use interface
- Zap pre-set and custom amounts (lightning payments)
- Multi-wallet support
-
Block lists
- Snappy nostr browsing
- Back up your data
- Browse long form content
-
Light mode
- No phone number and email required to sign up
- Free migration of social content within the Nostr
- Excellent user experience
-
Double-enhanced private communication
- multiplatform: runs on Windows, MacOS and Linux
- native: avoids browser-tech for performance and security
- performant: coded with performance in mind in Rust using LMDB for the database, such that your network speed will be your bottleneck
- outbox model: using a set of heuristics to always find people you follow no matter where they're publishing to
- high user control: over 60 different settings, all with reasonable defaults, but very customizable
-
privacy: supports running over Tor, options for not loading media, options for not sharing who you follow and others
- Short notes
- Social graph filter
-
Image grid feeds
- Desktop app
- Clean and beautiful design
- Multi-column
- Spaces
-
Trending
- Currently in TestFlight
- Safety first: mute, report, content warnings, delete
- Reach restricted to 2 hops - people you follow and people they follow.
-
Community-focused relays
-
Nostrmo 暂无相关功能描述
- Feature-rich
- Highly customizable
- Mute words
- Communities
- Streaming (watch)
- Lists
- Tools shortcuts
-
Sidebar comments
- Twitter style feed
- Cute logo
- Mute words
-
Minimal and calm
- Multi-account
- Guest account
- Your posts stored on your device and can be exported
- Bookmarks and personal notes
- Follow and explore timeline
- Remembers where you left off scrolling when reopening app
- Undo accidental tap on Like
- Autocomplete names when typing
- Lightning zaps
- Lightning wallet selection
- Direct Messages
- Domain verification
- Badges
- Block list
- Muted conversations
- Notifications for mentions, reactions and zaps
- Image previews/zoom/pan
- Gif/Video playback
- Option to turn signature verification off
- Option to hide badges from profile and emojis from names
- Fast local database
- Big detail pane for iPad/macOS
- Login as someone else (read-only mode)
-
Choose which relays to send to and receive from
-
Hacker News style
- Post to Nostr and Mastodon
- Nice, clean and modern design
- Simple and intuitive
- Gifs, stickers integration
-
Dark and light mode
- Browse polls created here or on other clients
- Create polls
-
Vote on polls
-
Primal 暂无相关功能描述
- Multi-column
-
Tweetdeck-like UI
- Twitter-like experience
- Dark and light mode
- Custom zap amounts
- Bookmarks
- Pinned notes
-
Alby integration
- PWA to be widely accessible with distribution via URLS, and to side-step App Store gatekeeping
- Employs Proof-of-Work (PoW) as a spam prevention mechanism, as opposed to Captcha, moderation or other verification methods
- Uses NOSTR as a censorship-resistant global "social" network
Community
Badges Page
- Create and award badges
- Manage badges awarded to you
- Simple interface
File-sharing
Bouquet
- Upload files
- Download files
- Manage your list of mediaservers
- Broadcast your list on Nostr
- Sync files between servers
-
Browse files on your mediaservers
- Browse lists of available torrents
- Publish your own
- Choose relays to browse on
Group-chat
Chachi
- Create, browse, join groups
- Send chat messages or other kinds of content
-
Seamless, lean, fast interface
- Browse relays and chat on the communities in them
- Send and receive direct messages
-
Take private notes
- Browse groups on specific relays
- Join rooms and send chat messages
Tools
Emojito
-
Create custom emoji sets to be used on supported clients
-
Create and share forms
- Make GIFs from the external world available inside Nostr clients
- GIF uploads
-
Search external GIF libraries
-
Save your nostr notes to Google Drive
- Guided onboarding
- Recovery phrase to restore access
- Good UX with explainers
-
Beautiful design
- Discover app of the day
- Discover new apps
- Search all nostr apps
- Discover nostr DVMs
- Discover nostr code repositories
- App reviews
-
Nostr native - takes a different approach from NostrApps.com
- A plethora of apps to choose from and install
- Faster than Obtainium
- More complete than F-Droid
-
Cleaner than Google Play
- Zap from any client
- Bypass Apple's draconian rules
- Nostr Wallet Connect
Blogging
Feeder
- Subscribe to RSS and Nostr article feeds
- Years of specialization in reading articles
- Offline reading
- OPML Import/Export
- Notification support
-
Material design
- Long form publishing
- Markdown support
- Rich text editor
- Dark and light modes
- Browse by relay
- Made on nostr, content mirrored to other nostr platforms.
-
Extension-only sign-in
- Read RSS feeds
- Read Nostr NIP-23 long-form articles
- Import and export OPML
- Runs on desktop with a web-based UI
-
Can be accessed remotely from apps such as Reeder, Readkit etc
- Read RSS feeds
- Read Nostr NIP-23 long-form articles
- Import and export OPML
- Runs on desktop with a web-based UI
-
Can be accessed remotely from apps such as Reeder, Readkit etc
- Create a website out of your nostr content
- SEO friendly
- Use any 3rd party tools
- Works like an app
- Beautiful Ghost themes to choose from
- Zero maintenance
- Custom domains
- Open source and self-hostable
- Natively Social
-
Publish from any other nostr app
- Directly publish your articles from Obsidian to Nostr with a couple of clicks
- Quickly compose and publish short form notes too
- Images in your .md file will automatically be uploaded and handled when you publish
- Add tags to your posts
- See all posts sent from Obsidian with links to view
- Configure to send to whatever relays you like
- Publish under different nostr accounts
- Easily view and download your Nostr bookmarks into Obsidian for reference and local use
-
Automatically populates article information fields from the frontmatter
- Schedule nostr notes
- Schedule reposts
- Note drafts
-
Multi-account support
- Publishing and reading notes
- Publishing and reading articles
- Curations (set of articles concerning a specific topic) publishing
- Long-form articles are surfaced instead of lost in the feed
Music
Fountain
- Earn sats while listening to podcasts
- Create and share clips, get paid on your clips
- Boost your favorite podcasts
-
Discover clips from friends
- Collaborate with others to create your next hit
- Music-focused interface
- Remix function
Curation
Highlighter
- Read and write long-form articles
- Discover what people you trust found interesting and insightful
- Understand why they found it interesting or insightful with their comments attached
- Send sats, comment or share your favorite highlights
-
Highlight anything
- Create and share lists
-
Browse other people's lists
- Browse recipes
- Add your own recipes
-
Earn sats via zaps
- Create link lists
- Multiple lists
-
Theming
- Curate lists, users, links
- Share lists
- Discover interesting content
Photos
Olas
- Special high-quality photos dedicated client
- Publish photos and browse photos
- Publish and browse short videos
- Browse media feeds from friends, extended network and from specific relays
Discovery
Jumble
- Browse individual relays by URL
- Create and browse relay sets
- Create and reply to notes
- Follow people and browse the feed from your follows
-
Browse the kind:20 photos feed
- Search keywords, hashtags, pubkeys, posts
- Look up Nostr statistics
- Embed widgets
- API for clients
-
NIP05 Service
- Look up relay information
- Browse relay feeds
- Browse individual profile feeds with smart relay selection
-
Simple and gets the job done
- See total sats zapped in the past hour, 4 hours, 24 hours and 7 days
- See who zapped who individually
- See notes that got the most zaps
Audio
Nests
- Start audio chats
- Troll box (chat)
- Instant zaps (lightning payments)
Crazy
Nostrocket
- Create issues that matter to you
- Award merits to contributors
- Solve problems
Career
Ostrich Work
- Post jobs for 20k sats
- Find jobs
Marketplace
Plebeian Market
- Buy and sell things for sats
-
Bid in auctions
- Buy and sell items for sats
- Message seller
- Cashu integration
Freelancing
SatShoot
- Post problems on SatShoot
- Make money solving problems as a Freelancer
- Share problems or freelance services on your feed
- Bidding system for Clients to choose the best Offer
- Chat in DMs
- Post Reviews on Freelancers or Clients
- Build Reputation
- Public Zaps as Payments
- Use your Web of Trust to keep scammers away
Media
Slidestr
- Compact media browsing
- Images and videos
- Full screen media
Meatspace
Yondar
- Add places to a map
- See places by your friends or follows
Streaming
zap.stream
- Start livestream via zap.stream or Cloudflare
- Watch other livestreams
- Chat
- Custom emojis
- Zap streamers in real time
- Zap chat participants in real time
- Set up stream goals
-
@ 005bc4de:ef11e1a2
2025-04-19 12:23:14A new game is starting today, 4/19/2025, called "Moon"
https://moon.hive.pizza
I'm not a gamer and don't know much about this one, or any games for that matter, but some folks may be interested in getting in at the start.
Go-time is noon EST today, I believe.
I do get a kick out of the line "Free dopamine and tears."
😀
-
@ 502ab02a:a2860397
2025-04-19 05:28:40ตัวหนังสือมีเสียง วันนี้แซงมาเพลงนึง
เพลงนี้ชื่อ "เสมอ" เป็นเพลงที่ผมเขียนขึ้นมาเพื่อเหตุผล 2 อย่าง 1. อยากมีเพลงเกี่ยวกับแดด ไว้รองรับ content ตากแดด 2. อยากมีเพลงปลอบประโลมใจ เพราะตกตะกอนมาจากโพส "แตกสลายเพื่อเติบโต"
สองเหตุผลนี้มันสอดคล้องกันดีครับ สามารถเป็นเพลงเดียวกันได้ เพราะเพลงเกี่ยวกับแดด ผมไม่อยากได้เนื้อหาแบบ วิตามินดี ส่งเสริมร่างกายแข็งแรง แบบเพลงเต้นประกอบท่าตอนเช้า 5555 คนละจุดมุ่งหมายกัน
ท่อนย้ำผมเลยใช้คำว่า "พรุ่งนี้จะมาใหม่ พรุ่งนี้จะมาใหม่ เสมอ..." แล้วเล่นคำย้ำซ้ำว่า "พรุ่งนี้จะสู้ใหม่ พรุ่งนี้จะสู้ใหม่ นะเธอ..." ใครตามงานผมน่าจะพอทราบลายเซนต์ว่า สไตล์นี้นี่กูเลย 5555
เพลงจะเล่าถึงความอ่อนล้า ที่เทียบกับคืนอันหนาวเย็น โดดเดี่ยว แต่เมื่อไหร่ที่แดดสาดส่อง นอกจากความมืดจะหายไปแล้ว ความอบอุ่น การเริ่มต้นใหม่ ก็แสดงตัวตนว่ากำลังมาหา
สิ่งนึงที่อยากให้จำไว้เสมอคือ "พระอาทิตย์ จะขึ้นทิศทางเดิมเสมอ" เมื่อไหร่ที่อ่อนล้า เมื่อยใจ ไร้กำลัง ให้รู้ว่า พรุ่งนี้นะ พรุ่งนี้ พระอาทิตย์จะมาโอบกอดเธอด้วยความอบอุ่น แบบที่เป็น "เสมอ"
บทความเกี่ยวกับแดดพรุ่งนี้ ก็มีความสอดคล้องกับเพลงนี้ครับ ไว้ติดตามอ่านกันตอนตากแดด พรุ่งนี้ 8.00 นะครับ
อ้อ เพลงนี้ไม่ได้ลงในระบบใดทั้งสิ้น (เพราะยังไม่ได้เอาไปลง 555) มันจึงมีความพิเศษที่ ฟังได้ที่นี่เท่านั้นครับ แก้ๆๆ ลืมหว่ะ youtube มี https://youtu.be/esyd_W_gyZ0?si=kH7gVod3vd1b16Qq 55555
เนื้อเพลง "เสมอ" Song by : HereTong Teera Siri เหนื่อยล้าอ่อนแรง มืดมนแค่ไหน โดดเดี่ยวเพียงใด หัวใจอ่อนล้า
ผ่านวันนี้ ไปด้วยกัน ผ่านวันนี้ ไปด้วยความฝัน
พรุ่งนี้จะมาใหม่ พรุ่งนี้จะมาใหม่ เสมอ...
เมื่ออาทิตย์สาดแสง ความมืดจะจางหาย ความหนาวจะกลับกลาย ได้ไออุ่น
เมื่ออาทิตย์ส่องแสง หัวใจจะเริ่มคุ้น ความละมุนแห่งรัก ให้พักใจ
โลกสวยสดใส สว่างไสวสุดฟ้า ใจที่อ่อนล้า ละลายหายไป
ผ่านวันนี้ไปด้วยกัน ผ่านวันนี้ไปพร้อมกับฝัน แล้วพรุ่งนี้จะสู้ใหม่ พรุ่งนี้จะสู้ใหม่ นะเธอ...
ใต้อาทิตย์สาดแสง เรี่ยวแรง เติมเต็มหมดใจ แสงจะส่องไป สู่ปลายทาง แห่งความฝัน สู้วันนี้ไปด้วยกัน สู้วันนี้ไป ด้วยความฝัน เธอยังมีฉันเสมอ เพียงเธอมองบนฟ้า... พรุ่งนี้ฉัน จะมาใหม่ เสมอ...
pirateketo #sundayspecialเราจะไปเป็นหมูแดดเดียว #siripun #ตำรับเอ๋
-
@ 72103ac9:460b37fd
2025-04-19 05:01:34Se você está em busca de uma plataforma moderna, segura e recheada de opções para se divertir online, a 7788bet é a escolha perfeita. Com uma interface intuitiva, suporte ao jogador de alta qualidade e uma ampla gama de jogos emocionantes, a 7788bet se destaca como um dos principais nomes no entretenimento digital do Brasil. Vamos explorar mais sobre essa plataforma inovadora e o que a torna tão especial.
Uma Plataforma Feita Para o Jogador Brasileiro A 7788bet foi pensada para atender as necessidades do público brasileiro, oferecendo não só suporte em português, mas também métodos de pagamento locais que facilitam o acesso e tornam toda a experiência mais prática. Com navegação rápida e visual moderno, o site proporciona uma experiência agradável tanto em computadores quanto em dispositivos móveis.
Desde o momento do cadastro até a hora de sacar seus ganhos, tudo é feito com segurança e transparência. A plataforma investe em tecnologia de ponta para garantir que seus dados estejam sempre protegidos, além de manter políticas rígidas de privacidade e jogo responsável.
Diversidade de Jogos para Todos os Gostos Uma das maiores vantagens da 7788bet é a sua biblioteca de jogos, que abrange desde os clássicos até os lançamentos mais modernos. Aqui, os jogadores encontram:
Slots Temáticos: Com gráficos impressionantes, trilhas sonoras imersivas e diversas mecânicas de bônus, os slots são ideais para quem gosta de jogos dinâmicos e recheados de surpresas.
Jogos de Mesa Virtuais: Os tradicionais jogos de cartas e roleta ganham versões virtuais de alta qualidade, oferecendo uma jogabilidade fluida e intuitiva.
Esportes Virtuais: Para quem gosta de esportes e quer experimentar algo diferente, os esportes virtuais simulam partidas com resultados aleatórios, trazendo uma nova camada de emoção.
Jogos Ao Vivo: Os jogos ao vivo colocam você frente a frente com anfitriões reais, transmitidos em tempo real, o que proporciona uma experiência mais interativa e autêntica.
Cada jogo é desenvolvido por provedores renomados, garantindo não apenas qualidade gráfica e sonora, mas também justiça nos resultados, certificados por entidades independentes.
Experiência do Jogador: Tudo Gira em Torno da Diversão Na 7788bet, o foco principal é proporcionar uma experiência prazerosa para seus usuários. Isso se reflete em diversas áreas, como:
Bônus e Promoções Frequentes: Novos usuários são recebidos com bônus de boas-vindas atrativos, e os jogadores fiéis podem aproveitar promoções semanais e programas de fidelidade com recompensas especiais.
Atendimento ao Cliente de Excelência: A equipe de suporte está disponível 24 horas por dia, 7 dias por semana, pronta para resolver qualquer dúvida ou problema de forma rápida e eficiente, sempre com simpatia e profissionalismo.
Depósitos e Saques Rápidos: A plataforma trabalha com os principais métodos de pagamento do país, garantindo que seus depósitos sejam instantâneos e os saques sejam processados com agilidade.
Além disso, o ambiente é completamente adaptado para o público brasileiro, com uma linguagem acessível e promoções específicas para o mercado nacional, o que torna tudo mais familiar e convidativo.
Conclusão A 7788bet é muito mais do que uma simples plataforma de jogos online. É um ambiente completo de entretenimento, pensado para oferecer segurança, diversão e praticidade para jogadores de todos os perfis. Se você procura uma experiência diferenciada, com muitas opções de jogos, suporte eficiente e uma comunidade crescente de jogadores satisfeitos, a 7788bet é o lugar ideal para começar sua jornada.
-
@ fd06f542:8d6d54cd
2025-04-15 06:35:56 -
@ 91bea5cd:1df4451c
2025-04-15 06:27:28Básico
bash lsblk # Lista todos os diretorios montados.
Para criar o sistema de arquivos:
bash mkfs.btrfs -L "ThePool" -f /dev/sdx
Criando um subvolume:
bash btrfs subvolume create SubVol
Montando Sistema de Arquivos:
bash mount -o compress=zlib,subvol=SubVol,autodefrag /dev/sdx /mnt
Lista os discos formatados no diretório:
bash btrfs filesystem show /mnt
Adiciona novo disco ao subvolume:
bash btrfs device add -f /dev/sdy /mnt
Lista novamente os discos do subvolume:
bash btrfs filesystem show /mnt
Exibe uso dos discos do subvolume:
bash btrfs filesystem df /mnt
Balancea os dados entre os discos sobre raid1:
bash btrfs filesystem balance start -dconvert=raid1 -mconvert=raid1 /mnt
Scrub é uma passagem por todos os dados e metadados do sistema de arquivos e verifica as somas de verificação. Se uma cópia válida estiver disponível (perfis de grupo de blocos replicados), a danificada será reparada. Todas as cópias dos perfis replicados são validadas.
iniciar o processo de depuração :
bash btrfs scrub start /mnt
ver o status do processo de depuração Btrfs em execução:
bash btrfs scrub status /mnt
ver o status do scrub Btrfs para cada um dos dispositivos
bash btrfs scrub status -d / data btrfs scrub cancel / data
Para retomar o processo de depuração do Btrfs que você cancelou ou pausou:
btrfs scrub resume / data
Listando os subvolumes:
bash btrfs subvolume list /Reports
Criando um instantâneo dos subvolumes:
Aqui, estamos criando um instantâneo de leitura e gravação chamado snap de marketing do subvolume de marketing.
bash btrfs subvolume snapshot /Reports/marketing /Reports/marketing-snap
Além disso, você pode criar um instantâneo somente leitura usando o sinalizador -r conforme mostrado. O marketing-rosnap é um instantâneo somente leitura do subvolume de marketing
bash btrfs subvolume snapshot -r /Reports/marketing /Reports/marketing-rosnap
Forçar a sincronização do sistema de arquivos usando o utilitário 'sync'
Para forçar a sincronização do sistema de arquivos, invoque a opção de sincronização conforme mostrado. Observe que o sistema de arquivos já deve estar montado para que o processo de sincronização continue com sucesso.
bash btrfs filsystem sync /Reports
Para excluir o dispositivo do sistema de arquivos, use o comando device delete conforme mostrado.
bash btrfs device delete /dev/sdc /Reports
Para sondar o status de um scrub, use o comando scrub status com a opção -dR .
bash btrfs scrub status -dR / Relatórios
Para cancelar a execução do scrub, use o comando scrub cancel .
bash $ sudo btrfs scrub cancel / Reports
Para retomar ou continuar com uma depuração interrompida anteriormente, execute o comando de cancelamento de depuração
bash sudo btrfs scrub resume /Reports
mostra o uso do dispositivo de armazenamento:
btrfs filesystem usage /data
Para distribuir os dados, metadados e dados do sistema em todos os dispositivos de armazenamento do RAID (incluindo o dispositivo de armazenamento recém-adicionado) montados no diretório /data , execute o seguinte comando:
sudo btrfs balance start --full-balance /data
Pode demorar um pouco para espalhar os dados, metadados e dados do sistema em todos os dispositivos de armazenamento do RAID se ele contiver muitos dados.
Opções importantes de montagem Btrfs
Nesta seção, vou explicar algumas das importantes opções de montagem do Btrfs. Então vamos começar.
As opções de montagem Btrfs mais importantes são:
**1. acl e noacl
**ACL gerencia permissões de usuários e grupos para os arquivos/diretórios do sistema de arquivos Btrfs.
A opção de montagem acl Btrfs habilita ACL. Para desabilitar a ACL, você pode usar a opção de montagem noacl .
Por padrão, a ACL está habilitada. Portanto, o sistema de arquivos Btrfs usa a opção de montagem acl por padrão.
**2. autodefrag e noautodefrag
**Desfragmentar um sistema de arquivos Btrfs melhorará o desempenho do sistema de arquivos reduzindo a fragmentação de dados.
A opção de montagem autodefrag permite a desfragmentação automática do sistema de arquivos Btrfs.
A opção de montagem noautodefrag desativa a desfragmentação automática do sistema de arquivos Btrfs.
Por padrão, a desfragmentação automática está desabilitada. Portanto, o sistema de arquivos Btrfs usa a opção de montagem noautodefrag por padrão.
**3. compactar e compactar-forçar
**Controla a compactação de dados no nível do sistema de arquivos do sistema de arquivos Btrfs.
A opção compactar compacta apenas os arquivos que valem a pena compactar (se compactar o arquivo economizar espaço em disco).
A opção compress-force compacta todos os arquivos do sistema de arquivos Btrfs, mesmo que a compactação do arquivo aumente seu tamanho.
O sistema de arquivos Btrfs suporta muitos algoritmos de compactação e cada um dos algoritmos de compactação possui diferentes níveis de compactação.
Os algoritmos de compactação suportados pelo Btrfs são: lzo , zlib (nível 1 a 9) e zstd (nível 1 a 15).
Você pode especificar qual algoritmo de compactação usar para o sistema de arquivos Btrfs com uma das seguintes opções de montagem:
- compress=algoritmo:nível
- compress-force=algoritmo:nível
Para obter mais informações, consulte meu artigo Como habilitar a compactação do sistema de arquivos Btrfs .
**4. subvol e subvolid
**Estas opções de montagem são usadas para montar separadamente um subvolume específico de um sistema de arquivos Btrfs.
A opção de montagem subvol é usada para montar o subvolume de um sistema de arquivos Btrfs usando seu caminho relativo.
A opção de montagem subvolid é usada para montar o subvolume de um sistema de arquivos Btrfs usando o ID do subvolume.
Para obter mais informações, consulte meu artigo Como criar e montar subvolumes Btrfs .
**5. dispositivo
A opção de montagem de dispositivo** é usada no sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs.
Em alguns casos, o sistema operacional pode falhar ao detectar os dispositivos de armazenamento usados em um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs. Nesses casos, você pode usar a opção de montagem do dispositivo para especificar os dispositivos que deseja usar para o sistema de arquivos de vários dispositivos Btrfs ou RAID.
Você pode usar a opção de montagem de dispositivo várias vezes para carregar diferentes dispositivos de armazenamento para o sistema de arquivos de vários dispositivos Btrfs ou RAID.
Você pode usar o nome do dispositivo (ou seja, sdb , sdc ) ou UUID , UUID_SUB ou PARTUUID do dispositivo de armazenamento com a opção de montagem do dispositivo para identificar o dispositivo de armazenamento.
Por exemplo,
- dispositivo=/dev/sdb
- dispositivo=/dev/sdb,dispositivo=/dev/sdc
- dispositivo=UUID_SUB=490a263d-eb9a-4558-931e-998d4d080c5d
- device=UUID_SUB=490a263d-eb9a-4558-931e-998d4d080c5d,device=UUID_SUB=f7ce4875-0874-436a-b47d-3edef66d3424
**6. degraded
A opção de montagem degradada** permite que um RAID Btrfs seja montado com menos dispositivos de armazenamento do que o perfil RAID requer.
Por exemplo, o perfil raid1 requer a presença de 2 dispositivos de armazenamento. Se um dos dispositivos de armazenamento não estiver disponível em qualquer caso, você usa a opção de montagem degradada para montar o RAID mesmo que 1 de 2 dispositivos de armazenamento esteja disponível.
**7. commit
A opção commit** mount é usada para definir o intervalo (em segundos) dentro do qual os dados serão gravados no dispositivo de armazenamento.
O padrão é definido como 30 segundos.
Para definir o intervalo de confirmação para 15 segundos, você pode usar a opção de montagem commit=15 (digamos).
**8. ssd e nossd
A opção de montagem ssd** informa ao sistema de arquivos Btrfs que o sistema de arquivos está usando um dispositivo de armazenamento SSD, e o sistema de arquivos Btrfs faz a otimização SSD necessária.
A opção de montagem nossd desativa a otimização do SSD.
O sistema de arquivos Btrfs detecta automaticamente se um SSD é usado para o sistema de arquivos Btrfs. Se um SSD for usado, a opção de montagem de SSD será habilitada. Caso contrário, a opção de montagem nossd é habilitada.
**9. ssd_spread e nossd_spread
A opção de montagem ssd_spread** tenta alocar grandes blocos contínuos de espaço não utilizado do SSD. Esse recurso melhora o desempenho de SSDs de baixo custo (baratos).
A opção de montagem nossd_spread desativa o recurso ssd_spread .
O sistema de arquivos Btrfs detecta automaticamente se um SSD é usado para o sistema de arquivos Btrfs. Se um SSD for usado, a opção de montagem ssd_spread será habilitada. Caso contrário, a opção de montagem nossd_spread é habilitada.
**10. descarte e nodiscard
Se você estiver usando um SSD que suporte TRIM enfileirado assíncrono (SATA rev3.1), a opção de montagem de descarte** permitirá o descarte de blocos de arquivos liberados. Isso melhorará o desempenho do SSD.
Se o SSD não suportar TRIM enfileirado assíncrono, a opção de montagem de descarte prejudicará o desempenho do SSD. Nesse caso, a opção de montagem nodiscard deve ser usada.
Por padrão, a opção de montagem nodiscard é usada.
**11. norecovery
Se a opção de montagem norecovery** for usada, o sistema de arquivos Btrfs não tentará executar a operação de recuperação de dados no momento da montagem.
**12. usebackuproot e nousebackuproot
Se a opção de montagem usebackuproot for usada, o sistema de arquivos Btrfs tentará recuperar qualquer raiz de árvore ruim/corrompida no momento da montagem. O sistema de arquivos Btrfs pode armazenar várias raízes de árvore no sistema de arquivos. A opção de montagem usebackuproot** procurará uma boa raiz de árvore e usará a primeira boa que encontrar.
A opção de montagem nousebackuproot não verificará ou recuperará raízes de árvore inválidas/corrompidas no momento da montagem. Este é o comportamento padrão do sistema de arquivos Btrfs.
**13. space_cache, space_cache=version, nospace_cache e clear_cache
A opção de montagem space_cache** é usada para controlar o cache de espaço livre. O cache de espaço livre é usado para melhorar o desempenho da leitura do espaço livre do grupo de blocos do sistema de arquivos Btrfs na memória (RAM).
O sistema de arquivos Btrfs suporta 2 versões do cache de espaço livre: v1 (padrão) e v2
O mecanismo de cache de espaço livre v2 melhora o desempenho de sistemas de arquivos grandes (tamanho de vários terabytes).
Você pode usar a opção de montagem space_cache=v1 para definir a v1 do cache de espaço livre e a opção de montagem space_cache=v2 para definir a v2 do cache de espaço livre.
A opção de montagem clear_cache é usada para limpar o cache de espaço livre.
Quando o cache de espaço livre v2 é criado, o cache deve ser limpo para criar um cache de espaço livre v1 .
Portanto, para usar o cache de espaço livre v1 após a criação do cache de espaço livre v2 , as opções de montagem clear_cache e space_cache=v1 devem ser combinadas: clear_cache,space_cache=v1
A opção de montagem nospace_cache é usada para desabilitar o cache de espaço livre.
Para desabilitar o cache de espaço livre após a criação do cache v1 ou v2 , as opções de montagem nospace_cache e clear_cache devem ser combinadas: clear_cache,nosapce_cache
**14. skip_balance
Por padrão, a operação de balanceamento interrompida/pausada de um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs será retomada automaticamente assim que o sistema de arquivos Btrfs for montado. Para desabilitar a retomada automática da operação de equilíbrio interrompido/pausado em um sistema de arquivos Btrfs de vários dispositivos ou RAID Btrfs, você pode usar a opção de montagem skip_balance .**
**15. datacow e nodatacow
A opção datacow** mount habilita o recurso Copy-on-Write (CoW) do sistema de arquivos Btrfs. É o comportamento padrão.
Se você deseja desabilitar o recurso Copy-on-Write (CoW) do sistema de arquivos Btrfs para os arquivos recém-criados, monte o sistema de arquivos Btrfs com a opção de montagem nodatacow .
**16. datasum e nodatasum
A opção datasum** mount habilita a soma de verificação de dados para arquivos recém-criados do sistema de arquivos Btrfs. Este é o comportamento padrão.
Se você não quiser que o sistema de arquivos Btrfs faça a soma de verificação dos dados dos arquivos recém-criados, monte o sistema de arquivos Btrfs com a opção de montagem nodatasum .
Perfis Btrfs
Um perfil Btrfs é usado para informar ao sistema de arquivos Btrfs quantas cópias dos dados/metadados devem ser mantidas e quais níveis de RAID devem ser usados para os dados/metadados. O sistema de arquivos Btrfs contém muitos perfis. Entendê-los o ajudará a configurar um RAID Btrfs da maneira que você deseja.
Os perfis Btrfs disponíveis são os seguintes:
single : Se o perfil único for usado para os dados/metadados, apenas uma cópia dos dados/metadados será armazenada no sistema de arquivos, mesmo se você adicionar vários dispositivos de armazenamento ao sistema de arquivos. Assim, 100% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser utilizado.
dup : Se o perfil dup for usado para os dados/metadados, cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos manterá duas cópias dos dados/metadados. Assim, 50% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser utilizado.
raid0 : No perfil raid0 , os dados/metadados serão divididos igualmente em todos os dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, não haverá dados/metadados redundantes (duplicados). Assim, 100% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser usado. Se, em qualquer caso, um dos dispositivos de armazenamento falhar, todo o sistema de arquivos será corrompido. Você precisará de pelo menos dois dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid0 .
raid1 : No perfil raid1 , duas cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a uma falha de unidade. Mas você pode usar apenas 50% do espaço total em disco. Você precisará de pelo menos dois dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1 .
raid1c3 : No perfil raid1c3 , três cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a duas falhas de unidade, mas você pode usar apenas 33% do espaço total em disco. Você precisará de pelo menos três dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1c3 .
raid1c4 : No perfil raid1c4 , quatro cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a três falhas de unidade, mas você pode usar apenas 25% do espaço total em disco. Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1c4 .
raid10 : No perfil raid10 , duas cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos, como no perfil raid1 . Além disso, os dados/metadados serão divididos entre os dispositivos de armazenamento, como no perfil raid0 .
O perfil raid10 é um híbrido dos perfis raid1 e raid0 . Alguns dos dispositivos de armazenamento formam arrays raid1 e alguns desses arrays raid1 são usados para formar um array raid0 . Em uma configuração raid10 , o sistema de arquivos pode sobreviver a uma única falha de unidade em cada uma das matrizes raid1 .
Você pode usar 50% do espaço total em disco na configuração raid10 . Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid10 .
raid5 : No perfil raid5 , uma cópia dos dados/metadados será dividida entre os dispositivos de armazenamento. Uma única paridade será calculada e distribuída entre os dispositivos de armazenamento do array RAID.
Em uma configuração raid5 , o sistema de arquivos pode sobreviver a uma única falha de unidade. Se uma unidade falhar, você pode adicionar uma nova unidade ao sistema de arquivos e os dados perdidos serão calculados a partir da paridade distribuída das unidades em execução.
Você pode usar 1 00x(N-1)/N % do total de espaços em disco na configuração raid5 . Aqui, N é o número de dispositivos de armazenamento adicionados ao sistema de arquivos. Você precisará de pelo menos três dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid5 .
raid6 : No perfil raid6 , uma cópia dos dados/metadados será dividida entre os dispositivos de armazenamento. Duas paridades serão calculadas e distribuídas entre os dispositivos de armazenamento do array RAID.
Em uma configuração raid6 , o sistema de arquivos pode sobreviver a duas falhas de unidade ao mesmo tempo. Se uma unidade falhar, você poderá adicionar uma nova unidade ao sistema de arquivos e os dados perdidos serão calculados a partir das duas paridades distribuídas das unidades em execução.
Você pode usar 100x(N-2)/N % do espaço total em disco na configuração raid6 . Aqui, N é o número de dispositivos de armazenamento adicionados ao sistema de arquivos. Você precisará de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid6 .
-
@ 044da344:073a8a0e
2025-04-19 12:00:32Der Chefredakteur war freundlich am Telefon und etwas zerknirscht. Dafür kassieren wir eine Rüge, ganz klar, sagte Hannes Lehner sinngemäß. Er habe mit seiner Redaktion gesprochen, noch einmal an die journalistische Sorgfaltspflicht erinnert, nachzulesen zum Beispiel im Pressekodex des Deutschen Presserates, und die Abläufe so verändert, dass so etwas nicht noch einmal passieren könne. Außerdem sei die Redaktion bereit, mir etwas Gutes zu tun, wenn ich denn eine Idee hätte.
Ich schreibe das hier etwas salopp aus dem Gedächtnis. Hintergrund ist einer dieser üblen Texte, die in der Regionalpresse immer dort aufploppen, wo Menschen öffentlich auftreten, die im kollektiven Gedächtnis gebrandmarkt sind. Querdenker, Putinversteher, Leugner von diesem und jenem. Die Details kann man unten nachlesen und dort auch das Meisterwerk von Andrea Weidemann genießen, immerhin Redaktionsleiterin Plattling-Deggendorf-Osterhofen in der Mediengruppe Attenkofer, die für das Straubinger Tagblatt steht. Veröffentlicht wurde der Text dort am 30. November 2024 auf der Titelseite des Lokalteils in Plattling. Am nächsten Tag habe ich Patrik Baab im Wohnzimmer von Plattling interviewt. Der Saal war voll, trotz oder wegen des Weidemann-Artikels.
Mein Punkt hier ist: Es lohnt sich, solche Angriffe nicht einfach auf sich beruhen zu lassen. Ich hatte es vor zwei Jahren schon einmal versucht beim Presserat und verloren in einer Sache, die viel größer war – mit drei zu zwei Stimmen bei zwei Enthaltungen. Wer weiß. Die Beschwerde ist online, und jeder mag sich selbst ein Urteil bilden. Diesmal war das Urteil auf Ebene eins einstimmig (Beschwerde ist begründet) und auf Ebene zwei fast einstimmig (sechs zu eins): eine Missbilligung, die zwar nicht abgedruckt werden muss, aber in diesem Fall doch sollte („als Ausdruck fairer Berichterstattung“).
Warum es keine Rüge gab, Höchststrafe im Presserat-Kosmos, wissen allein die Götter. Weiter begründet wird das nicht. Das Schreiben des Presserates, immerhin drei eng bedruckte Seiten, wäre ein Thema für sich. Es gelingt den Kollegen dort nicht einmal, den Weidemann-Artikel fehlerfrei zusammenzufassen. So macht mich der Presserat zum Gründer des „Querdenker-Blattes” Demokratischer Widerstand – zu viel der Ehre. Viel wichtiger als irgendwelche Strafen ist aber ohnehin das Gespräch – gerade dort, wo man sich kennt und wo sich jeder Journalist leicht selbst ein Bild machen kann, bevor er in die Tasten haut und Kritiker an den Pranger stellt. Ich bin froh, dass Hannes Lehner zum Telefonhörer gegriffen und auch öffentlich Abbitte geleistet hat, bevor der Presserat sich äußern konnte. Die Zitate, um die es ging, wurden aus der Onlineversion entfernt – genau wie die Bezahlschranke, damit möglichst viele die Entschuldigung sehen. Ich werde dem Chefredakteur vorschlagen, einen seiner Leute zu den nächsten Veranstaltungen der Initiative „Deggendorf miteinander“ zu schicken, und kann mir kaum vorstellen, dass es keine gute Presse gibt, wenn man die Menschen dort erlebt und sich in die Augen gesehen hat.
Beschwerde beim Deutschen Presserat (9. Dezember 2024)
Gegenstand
Diese Beschwerde bezieht sich auf einen Artikel von Andrea Weidemann, der am 30. November 2024 im Plattlinger Anzeiger erschienen ist („Kritiker beantworten kritische Fragen nicht“).
Beschwerdegrund
Der Artikel verstößt gegen die Pressekodex-Ziffern 1, 2 und 9. Die Autorin legt mir zwei wörtliche Zitate in den Mund, die (wenn sie denn wahr wären) nicht nur geeignet sind, meine Ehre zu verletzen (Ziffer 9), sondern es mir auch unmöglich machen würden, weiter als bayerischer Beamter zu wirken. Eine „wahrhaftige Unterrichtung der Öffentlichkeit“ (Ziffer 1) wäre dabei nicht schwer gewesen, wenn Frau Weidemann sorgfältig gearbeitet (Ziffer 2) oder mir die entsprechenden Zitate vor der Veröffentlichung vorgelegt hätte. Es gab vorab einen Mailaustausch (siehe Punkt 3), der sich aber auf etwas ganz anders bezog und mich schon vor der Veröffentlichung daran zweifeln ließ, dass die Ziffern 1 und 2 des Pressekodex Richtschnur des Arbeitens von Andrea Weidemann sind.
Vorgeschichte / Mailaustausch
Für den 1. Dezember 2024 hatte die Initiative „Deggendorf miteinander“ in der Nachbarstadt Plattling eine Buchlesung von Patrik Baab angekündigt und mich gebeten, die Ausführungen des Kollegen wissenschaftlich einzuordnen. Der Titel der Veranstaltung („Wie uns Medien und Lohnschreiber in Kriege treiben“) entsprach dem Untertitel des Buchs „Propaganda-Presse“, das Patrik Baab im Sommer in der Reihe „Hintergrund kompakt“ veröffentlicht hat. Am 27. November erhielt ich folgende Mail:
Sehr geehrter Herr Meyen, in der Hoffnung, dass ich als Mitarbeiterin der Plattlinger Redaktion der Mediengruppe Attenkofer für Sie nicht in die Kategorie „Propaganda-Medium“ falle, hätte ich zu Ihrer Veranstaltungsteilnahme am kommenden Sonntag in Plattling/Niederbayern folgende Fragen: 1. Auf der Suche nach näheren Informationen zu Ihrer Person habe ich mehrfach gelesen, dass Sie der Ansicht sind, dass die (Leit-)Medien bewusst auf die Gesellschaft Einfluss nehmen, also manipulieren. Welche Belege haben Sie dafür? Und: Gilt das Ihrer Ansicht nach für alle Medien? Und für alle Themenbereiche? 2. Auch haben Sie sich kritisch zu journalistischen Faktencheckern geäußert und Sie als Propagandamaschinen bezeichnet. Heißt das, dass auch Medien wie z.B. Correctiv Ihrer Meinung nach nicht glaubwürdig sind? 3. Wenn man heute von Medien spricht, muss man vor allem das Internet im Blick behalten. Ist es nicht so, dass gerade dort ungefilterte (Falsch-)Informationen verbreitet werden? Für eine zeitnahe Rückmeldung wäre ich Ihnen sehr dankbar. Mit besten Grüßen, Andrea Weidemann, Redaktionsleitung Plattling-Deggendorf-Osterhofen
Eine solche Beschwerde ist nicht der Ort, sich im Detail mit diesen Fragen auseinanderzusetzen. Ich will deshalb nur darauf hinweisen, dass es hier schlicht keine vernünftigen Antworten gab. Frage 1 beschreibt gewissermaßen die Geschäftsgrundlage von Journalismus und Medienforschung. Wenn man nicht von Wirkungen ausgehen würde, könnten sich beide Berufsgruppen die Arbeit sparen. Zum Thema „Glaubwürdigkeit der Medien“ (Frage 2) habe ich mich 2001 habilitiert und schon seinerzeit darauf hingewiesen, dass es sich hierbei um keine sinnvolle Kategorie für die Bewertung journalistischer Leistungen handelt. Frage 3 ist suggestiv und so allgemein formuliert, dass eigentlich nur ein „Ja“ möglich ist. Ich habe deshalb am nächsten Morgen eher ironisch geantwortet und die Kollegin zugleich an die Berufstugenden erinnert:
Was soll ich dazu sagen, liebe Andrea Weidemann? Sie finden im Internet komische Sachen über mich und fragen dann, ob dort Falschinfos verbreitet werden. Am besten (das ist ja auch das Credo von Patrik Baab): Sie kommen am Sonntag und machen sich selbst ein Bild. Bis dahin mit den besten Grüßen
Antwort:
Sehr geehrter Herr Meyen, natürlich werde ich am Sonntag anwesend sein. Trotzdem schade, dass sie auf meine Fragen nicht antworten. Ich habe keine „komischen Sachen“ gelesen, sondern konkrete Aussagen von Ihnen zitiert. Darf ich noch mit einer Stellungnahme rechnen?
Frau Weidemann war dann nicht bei der Veranstaltung, hat aber vorab den Artikel veröffentlicht, über den ich mich hier beschwere.
Falschzitate
Beide Zitate befinden sich im vierten Absatz des Artikels, der offensichtlich darauf abzielt, ein „Porträt“ von Michael Meyen zu liefern. Dass mein Leben und mehr als 20 Jahre auf einer Professur für Kommunikationswissenschaft an der LMU München dabei auf die beiden Ausgaben der Wochenzeitung Demokratischer Widerstand (DW) reduziert werden, in denen ich als einer von vier „Herausgebern“ genannt werde, mag schlechter Stil sein. Wenn allerdings mit Anführungszeichen (also als wörtliches Zitat markiert) behauptet wird, ich hätte Deutschland als „Spritzenmörder-Diktatur“ bezeichnet, hört der Spaß auf. Ich habe im März 2002 einen Eid auf die bayerische Verfassung geschworen und würde mich mit einer solchen Aussage selbst ins Abseits stellen und meine berufliche Zukunft aufs Spiel setzen. Dazu kommt, dass der Plattlinger Anzeiger in einer Region erscheint, die seit mehr als dreieinhalb Jahren meine Wahlheimat ist. Eine solche Falschberichterstattung ist so geeignet, meine Reputation auch über mein berufliches Wirken hinaus nachhaltig zu beschädigen.
Das gilt so in etwas abgeschwächter Form auch für das zweite Zitat. Nach einer Zusammenfassung zum Wirken besagter Wochenzeitung folgt „Meyens Meinung“, wieder in Anführungszeichen und mir damit wortwörtlich in den Mund gelegt: „Die Medien haben sich der Propaganda der NATO vollumfänglich unterworfen.“
Ich kann nur mutmaßen, von wem beide Zitate stammen. „Propaganda der NATO“ ist nicht mein Thema, Pauschalisierungen wie „die Medien“ liegen mir fern, und ich würde den Teufel tun, die Bundesrepublik Deutschland als „Diktatur“ zu bezeichnen oder das Wort „Spritzenmörder“ in den Mund zu nehmen (wie auch das Wort „vollumfänglich“, aber das nur am Rande). Falls beide Zitate im DW gestanden haben sollten: Ich habe meine „Beziehung“ zu dieser Wochenzeitung in einem Buch behandelt (Wie ich meine Uni verlor, 2023) und außerdem eine Stellungnahme veröffentlicht (In eigener Sache, 9. Mai 2024).
Dort steht auch, dass ich gegen die Disziplinarstrafe klage, von der Andrea Weidemann zu berichten weiß (verhängt allerdings nicht „von der LMU“, sondern von der Landesanwaltschaft, einer internen Ermittlungsbehörde). Das Verfahren läuft noch. Die Kürzung der „Bezüge um zehn Prozent“ ist folglich ausgesetzt. Ich könnte mich hier also auch wegen eines Verstoßes gegen Ziffer 13 beschweren.
Zusammengefasst: Andrea Weidemann zielt mit ihrem Text darauf ab, meine Ehre zu verletzen, meine Reputation in Frage zu stellen und die Leser ihrer Zeitung so davon abzuhalten, die Lesung von Patrik Baab am folgenden Tag zu besuchen. Die Autorin legt mir dazu zwei Zitate in den Mund, die nicht von mir stammen. Statt diese Zitate von mir bestätigen zu lassen, schickt sie in einer Mail das, was sie offenbar unter „kritischen Fragen“ versteht (Überschrift des Artikels), und wundert sich dann auch noch, dass es darauf keine Antworten gibt. Der Beitrag verstößt gegen die Ziffern 1, 2 und 9 des Pressekodex und würde auch bei Ziffer 13 einer näheren Prüfung nicht standhalten.
-
@ b8ca3d82:e28bd6b5
2025-04-15 03:54:50Your body has always known the way — long before your mind tried to make sense of it. \ \ You can spend all of your time trying to get the mindset just perfectly right, repeating affirmations to yourself in the mirror every single day — and having it all make perfectly, logical sense in your head. - and don't get me wrong; I'm not saying mantras don't work, they can be beautiful tools. They just work best as support — like gentle reminders, little whispers to anchor you while the real transformation happens on a much deeper level… in the body.
Oftentimes when we are so caught up with the web of our minds and the weaving of our thoughts, we tend to distance ourselves from what's happening in the body. Here's the truth though. If it hasn't fully landed in the body yet — it’s just a story, and it will stay just that. A sweet, well-crafted story you keep telling yourself, hoping one day it’ll finally feel true. \ \ Your mind may write the story, but your body is where it becomes truth.
If you want your belief systems to truly shift — to move from something you know into something you live — you have to go into the body. As comforting (and honestly addictive) as it might feel to stay in the mind, rooting your behavior back to your childhood trauma, repeating the mantras and reasoning your way into your self-worth… it’ll only take you so far.
### Because your embodiment doesn’t live in your thoughts — it lives in your cells.\
\ It lives in the way that you carry yourself. The way you hold yourself.
The way your shoulders soften as you exhale the pressure to be anyone else than who you truly are.
The way your gaze softens and your heart opens as you sway through the world.
The way you turn every action into ceremony, every word you speak into prayer. \ \ Not by what you are doing, but by who you are being. -- And being happens in the body.
Here’s some context so it may land a little more deeply for you: our feminine lives in the body, and our masculine lives in the mind. The way to get into our feminine embodiment, our softness, our open-heartedness, and our vulnerability starts with the body — and the mind follows. It begins by making space — soft, spacious room within — to hold every part of you. Even the ones that tremble. Even the ones you’ve learned to silence or send away.
The parts that feel too tender, too much, too messy. The ones you’ve hidden in the corners of your body, hoping no one would notice. Especially those.
Because it’s there, in the quiet ache of what you’ve tried not to feel, that your wholeness waits.
These parts of you don’t need fixing — they need holding. They need breath, warmth, and a body that says, you’re safe here.
This is where embodiment begins. This is where the actual shift happens. Not by becoming someone new — but by gently coming back to your body, softening into what's already there, just a little more each time.
From this space of returning, we open up to the magic we hold within our bodies.
### \ Let this be your invitation — to live from the pulse beneath the story, to start with one breath and to simply ask your body 'what's happening right now?' and be with it.
-
@ fd06f542:8d6d54cd
2025-04-15 02:57:28国内开发者作品展
jumble.social
作品: https://jumble.social/ 其他作品 : Running [ wss://nostr-relay.app ] (free & WoT) 💜⚡️ Building 👨💻: https://github.com/CodyTseng/jumble https://github.com/CodyTseng/nostr-relay-tray https://github.com/CodyTseng/danmakustr https://github.com/CodyTseng/nostr-relay-nestjs https://github.com/CodyTseng/nostr-relay https://github.com/CodyTseng
nostrbook.com
作品: https://nostrbook.com - NostrBridge, 网桥转发 - TaskQ5, 分布式多任务 - NostrHTTP, nostr to http - Postr, 匿名交友,匿名邮局 - nostrclient (Python client) . -nostrbook, (nostrbook.com) 用nostr在线写书 https://www.duozhutuan.com nostrhttp demo https://github.com/duozhutuan/NostrBridge
nostrmo
A nostr dev.
Nostrmo A client support all platform.
Nowser A nostr signing project.
CacheRelay A nostr cache relay peject.
cfrelay A nostr relay base on cloudflare wokers.
A nostr note timing send service. https://sendbox.nostrmo.com/ https://github.com/haorendashu/nostrmo
0xchat
作者: wcat w783@0xchat.com
www.0xchat.com Building for 0xchat
www.0xchat.com Secure Chat built on Nostr App Store: https://apps.apple.com/app/0xchat/id1637607169 TestFlight: https://testflight.apple.com/join/AjdJFBmU Google play: https://play.google.com/store/apps/details?id=com.oxchat.nostr
https://github.com/nostr-zh/awesome-nostr-zh/blob/main/README.md
awesome-nostr-zh
由中文开发者创建的软件、服务、工具和其他资源的集合。
Nostr (Notes and Other Stuff Transmitted by Relays) 是一个简单、开放的协议,用于创建抗审查的全球社交网络。
客户端
- 0xchat - 一个类似于 Telegram/WeChat 的 Nostr 客户端,支持 Android、iOS、macOS、Windows 和 Linux。
#移动端
#聊天
- Flycat - 一个 2000 年代老式风格的网页客户端,支持在 Nostr 上写博客。
#网页端
- Jumble - 一个交互友好的 Nostr 客户端,专注于中继器浏览和发现。
#网页端
- Nostrmo - 一个 Flutter 开发的 Nostr 客户端,支持 Android、iOS、macOS、Windows、Web 和 Linux。
#移动端
#桌面端
中继器
- wss://relay.nostr.moe - Nostr.moe 社区中继 (需要注册)。
#ACG
- wss://nostr-relay.app - 一个用于测试的普通的免费的公共 Nostr 中继器。
中继器实现
- nostr-relay-tray - 一个非开发者也能轻松运行的桌面端 Nostr 中继器,支持 Windows、macOS 和 Linux。
库
- nostr-relay - 一个开发中继器的 TypeScript 框架。
- cashu-dart - 一个用dart语言实现cashu协议的库。
- nostr-dart - 一个用dart语言实现nostr协议的库。
- nostrclient - Python 编写的 Nostr 客户端库。
#Python
#客户端开发
机器人
- 日本語JLPT文法 - 每小时自动发送一条日语文法,包含文法,日文例句及中文翻译。。
工具
- danmakustr - 一款通过 Nostr 实现去中心化的 YouTube 弹幕插件。
#浏览器插件
- nowser - 一个安全的 Nostr 密钥管理和签名应用,支持 iOS 和 Android,支持 NIP-07、NIP-46 和 NIP-55。
#移动端
#签名器
- pigeon - 一个 Nostr 中继器反向代理服务,可以将本地中继器暴露到公共互联网上,已经集成进 nostr-relay-tray。
教程和资源
- 欢迎加入 Nostr, 这是一份快速入门指南
- nostrbook 在线写书平台 - 提供在线写书功能的平台。
#在线写作
#内容创作
贡献指南
欢迎提交 PR 来完善这个列表!请确保您的提交符合以下要求:
- 项目与 Nostr 相关
- 项目由中文开发者开发或中文社区运营
- 保持分类的一致性和清晰性
详细的贡献指南请查看 CONTRIBUTING.md。
许可证
本作品采用 CC0 1.0 通用 许可协议。
- 0xchat - 一个类似于 Telegram/WeChat 的 Nostr 客户端,支持 Android、iOS、macOS、Windows 和 Linux。
-
@ 72103ac9:460b37fd
2025-04-19 05:00:55Se você está em busca de uma plataforma online completa, segura e cheia de emoção, a 136bet é a escolha perfeita. Com um ambiente moderno, interface amigável e uma grande variedade de jogos eletrizantes, a plataforma se destaca como uma das preferidas entre os jogadores brasileiros. Desde sua chegada ao mercado, a 136bet tem conquistado a confiança e o coração dos usuários graças à sua seriedade, suporte de qualidade e experiência imersiva.
Uma Plataforma Completa e Segura A 136bet foi desenvolvida com tecnologia de ponta para garantir segurança, estabilidade e acessibilidade aos jogadores. Seu sistema de cadastro é rápido e intuitivo, e as transações financeiras são protegidas com protocolos de criptografia avançados, oferecendo total tranquilidade aos usuários. Outro diferencial é o suporte ao cliente, disponível 24 horas por dia, todos os dias da semana, com atendimento em português para solucionar dúvidas e oferecer suporte técnico sempre que necessário.
A navegação pelo site é fluida e prática, tanto em computadores quanto em dispositivos móveis. Isso permite que o jogador possa se divertir de qualquer lugar, seja em casa, no trabalho ou durante uma viagem.
Variedade de Jogos para Todos os Gostos Na 136bet, a diversão é garantida com uma ampla seleção de jogos que atendem a todos os perfis de jogador. Entre os destaques da plataforma estão:
Jogos de cartas ao vivo: clássicos como pôquer, bacará e blackjack são oferecidos em tempo real, com crupiês profissionais e interatividade de alto nível.
Roletas dinâmicas: diferentes versões da roleta estão disponíveis, com animações envolventes e mecânicas variadas para proporcionar uma experiência sempre renovada.
Slots modernos: os populares jogos de giro estão presentes em abundância, com temas diversos, gráficos de alta qualidade e bônus emocionantes que aumentam as chances de vitória.
Esportes virtuais e apostas esportivas: para quem curte esportes, a plataforma também oferece apostas em partidas ao vivo e jogos simulados com inteligência artificial de última geração.
Todos os jogos são fornecidos por desenvolvedores renomados do mercado internacional, garantindo qualidade gráfica, fluidez e total justiça nos resultados.
Experiência de Jogador Inesquecível O grande trunfo da 136bet está na experiência que proporciona aos seus usuários. Tudo foi pensado para que o jogador se sinta confortável, confiante e valorizado. Promoções frequentes, torneios interativos e programas de fidelidade são apenas algumas das vantagens disponíveis.
Além disso, o sistema de recompensas é bastante atrativo. Os usuários acumulam pontos à medida que jogam, podendo trocá-los por prêmios, bônus ou vantagens exclusivas. Isso cria um senso de progresso e motivação constante.
Outro ponto importante é a personalização. A plataforma adapta sugestões de jogos com base nas preferências do usuário, criando uma experiência única e sob medida para cada perfil.
Conclusão A 136bet é muito mais do que uma simples plataforma de entretenimento online. Ela oferece uma combinação ideal de segurança, variedade e emoção, colocando o jogador no centro da experiência. Com jogos envolventes, suporte eficiente e promoções vantajosas, a plataforma se consolida como uma das melhores opções do mercado brasileiro.
Se você ainda não conhece a 136bet, essa é a hora de explorar um novo universo de diversão e recompensas. Cadastre-se hoje mesmo e descubra tudo o que essa plataforma inovadora tem a oferecer!
-
@ 72103ac9:460b37fd
2025-04-19 05:00:14A R8Bet vem se destacando como uma das plataformas de entretenimento online mais completas e confiáveis do Brasil. Com um visual moderno, sistema intuitivo e uma gama variada de jogos, a R8Bet oferece uma experiência única para jogadores de todos os perfis, desde iniciantes até os mais experientes.
Uma Plataforma Feita para o Jogador Brasileiro Desde o primeiro acesso, é fácil perceber que a R8Bet foi desenvolvida pensando nas necessidades do público brasileiro. O site é totalmente otimizado em português, com suporte ao cliente disponível 24 horas por dia, 7 dias por semana, pronto para responder dúvidas e resolver qualquer questão com agilidade e cordialidade.
Além disso, a plataforma conta com métodos de pagamento populares no Brasil, como PIX, boleto bancário e carteiras digitais, facilitando os depósitos e saques de forma rápida e segura. Isso demonstra o compromisso da R8Bet em proporcionar uma experiência prática e eficiente do começo ao fim.
Variedade de Jogos para Todos os Gostos Um dos grandes diferenciais da R8bet é sua ampla seleção de jogos, que abrange desde clássicos do entretenimento digital até lançamentos modernos e interativos. A plataforma trabalha com os principais provedores do mercado, garantindo gráficos de alta qualidade, jogabilidade fluida e muita diversão.
Entre os destaques, estão os jogos de roleta online, onde a emoção gira em torno de cada número sorteado; os títulos de cartas, como poker e blackjack, que exigem estratégia e atenção; além das famosas slots, que trazem temas variados, animações incríveis e bônus empolgantes. A cada clique, o jogador encontra novas possibilidades de se entreter e até mesmo de lucrar com suas habilidades.
Experiência Imersiva e Segura A R8Bet não se limita apenas à variedade. A plataforma investe constantemente em tecnologia de ponta para garantir um ambiente seguro e justo para todos os usuários. Todos os jogos utilizam sistemas certificados de geração aleatória de resultados, assegurando transparência nas rodadas e confiança nos resultados.
O design responsivo do site permite que os jogos sejam acessados tanto pelo computador quanto por dispositivos móveis, sem perda de qualidade. Isso significa que o usuário pode jogar de onde quiser, a qualquer hora, mantendo a emoção sempre ao seu alcance.
Outro ponto positivo é o sistema de recompensas e promoções. A R8Bet oferece bônus de boas-vindas, promoções recorrentes e programas de fidelidade para os jogadores mais assíduos. Esses incentivos tornam a experiência ainda mais envolvente, aumentando as chances de ganhos e premiando a lealdade dos usuários.
Comunidade Ativa e Atendimento de Qualidade A R8Bet valoriza o relacionamento com seus usuários e mantém uma comunidade ativa, onde os jogadores podem interagir, trocar dicas e acompanhar as novidades. A plataforma também está presente nas redes sociais, compartilhando conteúdos relevantes, promoções exclusivas e atualizações constantes sobre os jogos.
O atendimento ao cliente é outro destaque. Equipes treinadas estão disponíveis para auxiliar via chat ao vivo, e-mail ou redes sociais, sempre com foco na satisfação e bem-estar do usuário. A rapidez nas respostas e a eficiência nas soluções reforçam a confiabilidade da marca no cenário brasileiro.
Conclusão A R8Bet é, sem dúvida, uma escolha inteligente para quem busca diversão de qualidade, segurança e uma experiência completa de entretenimento online. Com sua plataforma intuitiva, catálogo variado de jogos, suporte dedicado e recompensas atrativas, a R8Bet se consolida como uma das líderes no mercado nacional.
Se você procura emoção, praticidade e a chance de transformar cada jogada em uma grande conquista, a R8Bet é o lugar ideal para começar essa jornada. Experimente hoje mesmo e descubra um novo nível de entretenimento!
-
@ fd06f542:8d6d54cd
2025-04-15 02:38:14排名随机, 列表正在增加中。
Cody Tseng
jumble.social 的作者
https://jumble.social/users/npub1syjmjy0dp62dhccq3g97fr87tngvpvzey08llyt6ul58m2zqpzps9wf6wl
- Running [ wss://nostr-relay.app ] (free & WoT) 💜⚡️
- Building 👨💻:
- https://github.com/CodyTseng/jumble
- https://github.com/CodyTseng/nostr-relay-tray
- https://github.com/CodyTseng/danmakustr
- https://github.com/CodyTseng/nostr-relay-nestjs
- https://github.com/CodyTseng/nostr-relay
- https://github.com/CodyTseng
阿甘
- @agan0
- 0xchat.com
- canidae40@coinos.io
- https://jumble.social/users/npub13zyg3zysfylqc6nwfgj2uvce5rtlck2u50vwtjhpn92wzyusprfsdl2rce
joomaen
- Follows you
- joomaen.com
-
95aebd@wallet.yakihonne.com
-
nobot
- https://joomaen.filegear-sg.me/
- https://jumble.social/users/npub1wlpfd84ymdx2rpvnqht7h2lkq5lazvkaejywrvtchlvn3geulfgqp74qq0
颜值精选官
- wasp@ok0.org
- 专注分享 各类 图片与视频,每日为你带来颜值盛宴,心动不止一点点。欢迎关注,一起发现更多美好!
- https://jumble.social/users/npub1d5ygkef6r0l7w29ek9l9c7hulsvdshms2qh74jp5qpfyad4g6h5s4ap6lz
6svjszwk
- 6svjszwk@ok0.org
- 83vEfErLivtS9to39i73ETeaPkCF5ejQFbExoM5Vc2FDLqSE5Ah6NbqN6JaWPQbMeJh2muDiHPEDjboCVFYkHk4dHitivVi
-
low-time-preference
-
anarcho-capitalism
-
libertarianism
-
bitcoin #monero
- https://jumble.social/users/npub1sxgnpqfyd5vjexj4j5tsgfc826ezyz2ywze3w8jchd0rcshw3k6svjszwk
𝘌𝘷𝘦𝘳𝘺𝘥𝘢𝘺 𝘔𝘰𝘳𝘯𝘪𝘯𝘨 𝘚𝘵𝘢𝘳
- everyday@iris.to
- 虽然现在对某些事情下结论还为时尚早,但是从趋势来看,邪恶抬头已经不可避免。
- 我们要做的就是坚持内心的那一份良知,与邪恶战斗到底。
- 黑暗森林时代,当好小透明。
- bc1q7tuckqhkwf4vgc64rsy3rxy5qy6pmdrgxewcww
- https://jumble.social/users/npub1j2pha2chpr0qsmj2f6w783200upa7dvqnnard7vn9l8tv86m7twqszmnke
nostr_cn_dev
npub1l5r02s4udsr28xypsyx7j9lxchf80ha4z6y6269d0da9frtd2nxsvum9jm@npub.cash
Developed the following products: - NostrBridge, 网桥转发 - TaskQ5, 分布式多任务 - NostrHTTP, nostr to http - Postr, 匿名交友,匿名邮局 - nostrclient (Python client) . -nostrbook, (nostrbook.com) 用nostr在线写书 * https://www.duozhutuan.com nostrhttp demo * https://github.com/duozhutuan/NostrBridge * * https://jumble.social/users/npub1l5r02s4udsr28xypsyx7j9lxchf80ha4z6y6269d0da9frtd2nxsvum9jm *
CXPLAY
- lightning@cxplay.org
- 😉很高兴遇到你, 你可以叫我 CX 或 CXPLAY, 这个名字没有特殊含义, 无需在意.
- ©本账号下所有内容如未经特殊声明均使用 CC BY-NC-SA 4.0 许可协议授权.
- 🌐如果您在 Fediverse 收到本账号的内容则说明您的实例已与 Mostr.pub 或 Momostr.pink Bridge 互联, 您所看到的账号为镜像, 所有账号内容正在跨网传递. 如有必要请检查原始页面.
- 🧑💻正在提供中文本地化(i10n): #Amethyst #Amber #Citrine #Soapbox #Ditto #Alby
- https://cx.ms/
https://jumble.social/users/npub1gd8e0xfkylc7v8c5a6hkpj4gelwwcy99jt90lqjseqjj2t253s2s6ch58h
w
- 0xchat的作者
- 0xchat@getalby.com
- Building for 0xchat
- https://www.0xchat.com/
- https://jumble.social/users/npub10td4yrp6cl9kmjp9x5yd7r8pm96a5j07lk5mtj2kw39qf8frpt8qm9x2wl
Michael
- highman@blink.sv
- Composer Artist | Musician
- 🎹🎼🎤🏸🏝️🐕❤️
- 在這裡可以看到「我看世界」的樣子
- 他是光良
- https://jumble.social/users/npub1kr5vqlelt8l47s2z0l47z4myqg897m04vrnaqks3emwryca3al7sv83ry3
-
@ fd06f542:8d6d54cd
2025-04-15 01:31:41NIP-15
Nostr Marketplace
draft
optional
Based on Diagon-Alley.
Implemented in NostrMarket and Plebeian Market.
Terms
merchant
- seller of products with NOSTR key-paircustomer
- buyer of products with NOSTR key-pairproduct
- item for sale by themerchant
stall
- list of products controlled bymerchant
(amerchant
can have multiple stalls)marketplace
- clientside software for searchingstalls
and purchasingproducts
Nostr Marketplace Clients
Merchant admin
Where the
merchant
creates, updates and deletesstalls
andproducts
, as well as where they manage sales, payments and communication withcustomers
.The
merchant
admin software can be purely clientside, but forconvenience
and uptime, implementations will likely have a server client listening for NOSTR events.Marketplace
Marketplace
software should be entirely clientside, either as a stand-alone app, or as a purely frontend webpage. Acustomer
subscribes to different merchant NOSTR public keys, and thosemerchants
stalls
andproducts
become listed and searchable. The marketplace client is like any other ecommerce site, with basket and checkout.Marketplaces
may also wish to include acustomer
support area for direct message communication withmerchants
.Merchant
publishing/updating products (event)A merchant can publish these events:
| Kind | | Description | | --------- | ------------------ | --------------------------------------------------------------------------------------------------------------- | |
0
|set_meta
| The merchant description (similar with anynostr
public key). | |30017
|set_stall
| Create or update a stall. | |30018
|set_product
| Create or update a product. | |4
|direct_message
| Communicate with the customer. The messages can be plain-text or JSON. | |5
|delete
| Delete a product or a stall. |Event
30017
: Create or update a stall.Event Content
json { "id": <string, id generated by the merchant. Sequential IDs (`0`, `1`, `2`...) are discouraged>, "name": <string, stall name>, "description": <string (optional), stall description>, "currency": <string, currency used>, "shipping": [ { "id": <string, id of the shipping zone, generated by the merchant>, "name": <string (optional), zone name>, "cost": <float, base cost for shipping. The currency is defined at the stall level>, "regions": [<string, regions included in this zone>] } ] }
Fields that are not self-explanatory: -
shipping
: - an array with possible shipping zones for this stall. - the customer MUST choose exactly one of those shipping zones. - shipping to different zones can have different costs. For some goods (digital for example) the cost can be zero. - theid
is an internal value used by the merchant. This value must be sent back as the customer selection. - each shipping zone contains the base cost for orders made to that shipping zone, but a specific shipping cost per product can also be specified if the shipping cost for that product is higher than what's specified by the base cost.Event Tags
jsonc { "tags": [["d", <string, id of stall]], // other fields... }
- thed
tag is required, its value MUST be the same as the stallid
.Event
30018
: Create or update a productEvent Content
json { "id": <string, id generated by the merchant (sequential ids are discouraged)>, "stall_id": <string, id of the stall to which this product belong to>, "name": <string, product name>, "description": <string (optional), product description>, "images": <[string], array of image URLs, optional>, "currency": <string, currency used>, "price": <float, cost of product>, "quantity": <int or null, available items>, "specs": [ [<string, spec key>, <string, spec value>] ], "shipping": [ { "id": <string, id of the shipping zone (must match one of the zones defined for the stall)>, "cost": <float, extra cost for shipping. The currency is defined at the stall level> } ] }
Fields that are not self-explanatory: -
quantity
can be null in the case of items with unlimited availability, like digital items, or services -specs
: - an optional array of key pair values. It allows for the Customer UI to present product specifications in a structure mode. It also allows comparison between products - eg:[["operating_system", "Android 12.0"], ["screen_size", "6.4 inches"], ["connector_type", "USB Type C"]]
_Open_: better to move `spec` in the `tags` section of the event?
shipping
:- an optional array of extra costs to be used per shipping zone, only for products that require special shipping costs to be added to the base shipping cost defined in the stall
- the
id
should match the id of the shipping zone, as defined in theshipping
field of the stall - to calculate the total cost of shipping for an order, the user will choose a shipping option during checkout, and then the client must consider this costs:
- the
base cost from the stall
for the chosen shipping option - the result of multiplying the product units by the
shipping costs specified in the product
, if any.
- the
Event Tags
jsonc "tags": [ ["d", <string, id of product], ["t", <string (optional), product category], ["t", <string (optional), product category], // other fields... ], ...
- the
d
tag is required, its value MUST be the same as the productid
. - the
t
tag is as searchable tag, it represents different categories that the product can be part of (food
,fruits
). Multiplet
tags can be present.
Checkout events
All checkout events are sent as JSON strings using NIP-04.
The
merchant
and thecustomer
can exchange JSON messages that represent different actions. EachJSON
messageMUST
have atype
field indicating the what the JSON represents. Possible types:| Message Type | Sent By | Description | |--------------|----------|---------------------| | 0 | Customer | New Order | | 1 | Merchant | Payment Request | | 2 | Merchant | Order Status Update |
Step 1:
customer
order (event)The below JSON goes in content of NIP-04.
```json { "id":
, "type": 0, "name": , "address": , "message": , "contact": { "nostr": <32-bytes hex of a pubkey>, "phone": , "email": }, "items": [ { "product_id": , "quantity": } ], "shipping_id": } ```
Open: is
contact.nostr
required?Step 2:
merchant
request payment (event)Sent back from the merchant for payment. Any payment option is valid that the merchant can check.
The below JSON goes in
content
of NIP-04.payment_options
/type
include:url
URL to a payment page, stripe, paypal, btcpayserver, etcbtc
onchain bitcoin addressln
bitcoin lightning invoicelnurl
bitcoin lnurl-pay
json { "id": <string, id of the order>, "type": 1, "message": <string, message to customer, optional>, "payment_options": [ { "type": <string, option type>, "link": <string, url, btc address, ln invoice, etc> }, { "type": <string, option type>, "link": <string, url, btc address, ln invoice, etc> }, { "type": <string, option type>, "link": <string, url, btc address, ln invoice, etc> } ] }
Step 3:
merchant
verify payment/shipped (event)Once payment has been received and processed.
The below JSON goes in
content
of NIP-04.json { "id": <string, id of the order>, "type": 2, "message": <string, message to customer>, "paid": <bool: has received payment>, "shipped": <bool: has been shipped>, }
Customize Marketplace
Create a customized user experience using the
naddr
from NIP-19. The use ofnaddr
enables easy sharing of marketplace events while incorporating a rich set of metadata. This metadata can include relays, merchant profiles, and more. Subsequently, it allows merchants to be grouped into a market, empowering the market creator to configure the marketplace's user interface and user experience, and share that marketplace. This customization can encompass elements such as market name, description, logo, banner, themes, and even color schemes, offering a tailored and unique marketplace experience.Event
30019
: Create or update marketplace UI/UXEvent Content
jsonc { "name": <string (optional), market name>, "about": <string (optional), market description>, "ui": { "picture": <string (optional), market logo image URL>, "banner": <string (optional), market logo banner URL>, "theme": <string (optional), market theme>, "darkMode": <bool, true/false> }, "merchants": [array of pubkeys (optional)], // other fields... }
This event leverages naddr to enable comprehensive customization and sharing of marketplace configurations, fostering a unique and engaging marketplace environment.
Auctions
Event
30020
: Create or update a product sold as an auctionEvent Content:
json { "id": <String, UUID generated by the merchant. Sequential IDs (`0`, `1`, `2`...) are discouraged>, "stall_id": <String, UUID of the stall to which this product belong to>, "name": <String, product name>, "description": <String (optional), product description>, "images": <[String], array of image URLs, optional>, "starting_bid": <int>, "start_date": <int (optional) UNIX timestamp, date the auction started / will start>, "duration": <int, number of seconds the auction will run for, excluding eventual time extensions that might happen>, "specs": [ [<String, spec key>, <String, spec value>] ], "shipping": [ { "id": <String, UUID of the shipping zone. Must match one of the zones defined for the stall>, "cost": <float, extra cost for shipping. The currency is defined at the stall level> } ] }
[!NOTE] Items sold as an auction are very similar in structure to fixed-price items, with some important differences worth noting.
-
The
start_date
can be set to a date in the future if the auction is scheduled to start on that date, or can be omitted if the start date is unknown/hidden. If the start date is not specified, the auction will have to be edited later to set an actual date. -
The auction runs for an initial number of seconds after the
start_date
, specified byduration
.
Event
1021
: Bidjsonc { "content": <int, amount of sats>, "tags": [["e", <event ID of the auction to bid on>]], // other fields... }
Bids are simply events of kind
1021
with acontent
field specifying the amount, in the currency of the auction. Bids must reference an auction.[!NOTE] Auctions can be edited as many times as desired (they are "addressable events") by the author - even after the start_date, but they cannot be edited after they have received the first bid! This is enforced by the fact that bids reference the event ID of the auction (rather than the product UUID), which changes with every new version of the auctioned product. So a bid is always attached to one "version". Editing the auction after a bid would result in the new product losing the bid!
Event
1022
: Bid confirmationEvent Content:
json { "status": <String, "accepted" | "rejected" | "pending" | "winner">, "message": <String (optional)>, "duration_extended": <int (optional), number of seconds> }
Event Tags:
json "tags": [["e" <event ID of the bid being confirmed>], ["e", <event ID of the auction>]],
Bids should be confirmed by the merchant before being considered as valid by other clients. So clients should subscribe to bid confirmation events (kind
1022
) for every auction that they follow, in addition to the actual bids and should check that the pubkey of the bid confirmation matches the pubkey of the merchant (in addition to checking the signature).The
content
field is a JSON which includes at least astatus
.winner
is how the winning bid is replied to after the auction ends and the winning bid is picked by the merchant.The reasons for which a bid can be marked as
rejected
orpending
are up to the merchant's implementation and configuration - they could be anything from basic validation errors (amount too low) to the bidder being blacklisted or to the bidder lacking sufficient trust, which could lead to the bid being marked aspending
until sufficient verification is performed. The difference between the two is thatpending
bids might get approved after additional steps are taken by the bidder, whereasrejected
bids can not be later approved.An additional
message
field can appear in thecontent
JSON to give further context as of why a bid isrejected
orpending
.Another thing that can happen is - if bids happen very close to the end date of the auction - for the merchant to decide to extend the auction duration for a few more minutes. This is done by passing a
duration_extended
field as part of a bid confirmation, which would contain a number of seconds by which the initial duration is extended. So the actual end date of an auction is alwaysstart_date + duration + (SUM(c.duration_extended) FOR c in all confirmations
.Customer support events
Customer support is handled over whatever communication method was specified. If communicating via nostr, NIP-04 is used.
Additional
Standard data models can be found here
-
@ 10fe3f70:3489c810
2025-04-19 03:28:46nostr #nostr_writer #review #beginner #obsidian #anytype #contract_drafting #agreenent_drafting #lawyer #law #contract #agreement #learn #education #plugin #telegram #wordpress #yakihonne #primal #damus
How and Why I found Nostr?
I teach contract drafting. That is who I am.
To teach the subject I maintained few websites through self-hosted Wordpress. I faced numerous challenges despite spending money on hosting, domain and whatnot. I do not have any technical background. So, you can understand my frustration when my websites kept disappearing due to hacking. I always put a brave face and started afresh.
I used Microsoft Word, Power Point, and Obsidian to draft my posts and lessons. So, I had some backups. Thankfully, I also did post some of the training sessions on my youtube channel. Checkout my previous post for link to the Youtube Playlist.
Since, I teach for free, every time my websites were hacked, it pained me to see the bad side of human race. I was not hurting anyone, spending my own money, still someone unknown to me, for whatever reasons, could stop my mission.
I started empathising with the belief in the internet being dysfunctional and still being beyond reach of common man.
Then I found some hope, when around a year or so earlier, I found Anytype. A simple app, the everything app, which promises anonymity, security from data breach, and a promise to share ones thoughts publicly with the others soon via web. Although some of its features (e.g. option to self host) are little bit technical for me, I still have high hopes. It is similar to Obsidian, yet way more than that.
I could use either Obsidian or Anytype for writing and publishing my data on web. So, I recently surrendered to the idea of using one of Obsidian's plugins to publish my content. These provide the option to publish your obsidian notes on web through sub-domain. One that I used before was Obsius Plugin.
But, secretly I also wished want more.
I wished to maintain my same anonymous profile I have on Telegram. I have a dedicated student base on Telegram. So, I wanted them to easily find me or atleast my content on a new platform.
I also wanted to stop spending more money, or at least save some by spending less.
And, voila!
I came across Nostr unexpectedly through Obsidian and found a Plugin Nostr Writer by James.
I was looking for a simple method to host my blog posts and lessons on contract drafting. And, I found much more....
If you have some other compelling reasons, as Marc, do read his piece on why he is on Nostr - Why I'm on Nostr?)
What did I find?
After going through the Nostr Writer](https://github.com/jamesmagoo/nostr-writer) documentation on Github, I searched for Nostr and found NOSTR.COM.
As expected, it took me some time to understand the concepts of Public and Private Keys, Clients, Relays and so on. But, within 2-3 days, I found that this was just a SMALL TIP of a HUGE ICEBERG, yet to be show it's full potential.
My most sincere thank you to its creator, and to people who spend time explaining it and making it AWESOME.
NOSTR's CONCEPTS
If you want to READ ABOUT NOSTR's CONCEPTS, you can go through the following:
I also went through almost each and every youtube video I could find on Nostr onboarding and much more. Although, these are very few, I found each one of them to be very useful. I have listed some of these below.
Nostr Onboarding videos
My most sincere thank you to each of the creators (), who took time to explain the onabording by various methods.
- By Ares - how to get started with Nostr on mobile - 3 minutes approx
- By Castig- How to get started on Nostr - 7 minutes approx
- By Max Demarco- Create your Nostr Account- Beginnner Tutorial - 18 minutes approx
- By Nostr World - Nostr for Beginners w/ Derek Ross - 37 minutes approx
- By 88 Sats Radio- how to get started on Nostr - 48 minutes approx
I suggest every beginner must watch all of these videos, create as many accounts you need, and do it until you understand the whole Idea.
This is just the beginning of what to come. So, do not stop using Nostr. In fact refer to friends and family and ask them to join.
Bonus of Nostr
You can get paid in Bitcoins! Without spending a dime!!
Yes, you read it correct.
All you need to do is have a lighting wallet.
I leave it to you explore for now. I am still reviewing the payment structure. So, I will write about how to use this feature later.
Meanwhile I suggest, you go through BTC Session's Youtube channel to learn more about bitcoins, wallets, zaps/sats, lighting, etc.
What else do you need?
Pretty much you have the basics if you did everything suggested above.
If you have a question, you can ask someone within any of the Nostr Clients.
NOSTR CLIENTS
I am experimenting with following Nostr Clients (apps to read your notes, pictures, and long form content) on my apple devices on web.
Damus Primal Yakihonne
NOSTR APPSTORE
You can find many more clients at
GetAlby's App Store Nostr App Store 1 Nostr App Store 2
So, Good luck to you and Happy Nostring
Only the Human Imagination is the limit of what you can do with Nostr
If you liked this article, share it with your friends.
-
@ fd06f542:8d6d54cd
2025-04-15 01:27:33NIP-14
Subject tag in Text events
draft
optional
This NIP defines the use of the "subject" tag in text (kind: 1) events. (implemented in more-speech)
json ["subject": <string>]
Browsers often display threaded lists of messages. The contents of the subject tag can be used in such lists, instead of the more ad hoc approach of using the first few words of the message. This is very similar to the way email browsers display lists of incoming emails by subject rather than by contents.
When replying to a message with a subject, clients SHOULD replicate the subject tag. Clients MAY adorn the subject to denote that it is a reply. e.g. by prepending "Re:".
Subjects should generally be shorter than 80 chars. Long subjects will likely be trimmed by clients.
-
@ fd06f542:8d6d54cd
2025-04-15 01:26:59NIP-13
Proof of Work
draft
optional
This NIP defines a way to generate and interpret Proof of Work for nostr notes. Proof of Work (PoW) is a way to add a proof of computational work to a note. This is a bearer proof that all relays and clients can universally validate with a small amount of code. This proof can be used as a means of spam deterrence.
difficulty
is defined to be the number of leading zero bits in theNIP-01
id. For example, an id of000000000e9d97a1ab09fc381030b346cdd7a142ad57e6df0b46dc9bef6c7e2d
has a difficulty of36
with36
leading 0 bits.002f...
is0000 0000 0010 1111...
in binary, which has 10 leading zeroes. Do not forget to count leading zeroes for hex digits <=7
.Mining
To generate PoW for a
NIP-01
note, anonce
tag is used:json {"content": "It's just me mining my own business", "tags": [["nonce", "1", "21"]]}
When mining, the second entry to the nonce tag is updated, and then the id is recalculated (see NIP-01). If the id has the desired number of leading zero bits, the note has been mined. It is recommended to update the
created_at
as well during this process.The third entry to the nonce tag
SHOULD
contain the target difficulty. This allows clients to protect against situations where bulk spammers targeting a lower difficulty get lucky and match a higher difficulty. For example, if you require 40 bits to reply to your thread and see a committed target of 30, you can safely reject it even if the note has 40 bits difficulty. Without a committed target difficulty you could not reject it. Committing to a target difficulty is something all honest miners should be ok with, and clientsMAY
reject a note matching a target difficulty if it is missing a difficulty commitment.Example mined note
json { "id": "000006d8c378af1779d2feebc7603a125d99eca0ccf1085959b307f64e5dd358", "pubkey": "a48380f4cfcc1ad5378294fcac36439770f9c878dd880ffa94bb74ea54a6f243", "created_at": 1651794653, "kind": 1, "tags": [ ["nonce", "776797", "20"] ], "content": "It's just me mining my own business", "sig": "284622fc0a3f4f1303455d5175f7ba962a3300d136085b9566801bc2e0699de0c7e31e44c81fb40ad9049173742e904713c3594a1da0fc5d2382a25c11aba977" }
Validating
Here is some reference C code for calculating the difficulty (aka number of leading zero bits) in a nostr event id:
```c int zero_bits(unsigned char b) { int n = 0;
if (b == 0) return 8; while (b >>= 1) n++; return 7-n;
}
/ find the number of leading zero bits in a hash / int count_leading_zero_bits(unsigned char *hash) { int bits, total, i; for (i = 0, total = 0; i < 32; i++) { bits = zero_bits(hash[i]); total += bits; if (bits != 8) break; } return total; } ```
Here is some JavaScript code for doing the same thing:
```javascript // hex should be a hexadecimal string (with no 0x prefix) function countLeadingZeroes(hex) { let count = 0;
for (let i = 0; i < hex.length; i++) { const nibble = parseInt(hex[i], 16); if (nibble === 0) { count += 4; } else { count += Math.clz32(nibble) - 28; break; } }
return count; } ```
Delegated Proof of Work
Since the
NIP-01
note id does not commit to any signature, PoW can be outsourced to PoW providers, perhaps for a fee. This provides a way for clients to get their messages out to PoW-restricted relays without having to do any work themselves, which is useful for energy-constrained devices like mobile phones. -
@ 502ab02a:a2860397
2025-04-19 02:39:23เพื่อนๆอาจรู้สึกว่าโพสที่เล่าเรื่อง Precision Fermentation มันดูห่างไกลเหลือเกิน และอาจคิดว่า ณ ตอนนี้ยังสามารถเลือกได้ ไม่เห็นต้องตื่นตูมเลยแค่กินของธรรมชาติก็รอดแล้ว 55555 ไม่เป็นไรครับผมเข้าใจเพราะมันดูไกลตัว และซีรีส์นี้ผมมีเหตุผลในการเขียนอย่างต่อเนื่อง และค้น ค้น ค้น อย่างหนักเพื่อบันทึกการค้นคว้าของผมเอาไว้ ที่ใดสักที่หนึ่ง แล้ววันนึงถึงเวลา จะมีคนค้นดูบ้างว่า โลกมันเกิดอะไรแบบนี้ขึ้นได้ยังไงนะ (ในวงเล็บฮา)
ผมตั้งชื่อตอนนี้ว่า นมที่ไม่มีวัวเกิดขึ้นแล้ว เมื่อ "Perfect Day" พยายามกำหนดอนาคตอาหารให้มนุษย์ทั้งโลกใหม่
ในวันที่โลกกำลังสับสนระหว่างคำว่า “ยั่งยืน” กับ “ควบคุมได้” มีบริษัทหนึ่งที่กำลังสร้างฝันแบบใหม่ให้กับอาหารที่เรากินกันทุกวัน นั่นคือ Perfect Day บริษัทเทคโนโลยีชีวภาพจากสหรัฐฯ ที่ไม่ได้ขายนม แต่มาขายอนาคตว่า “คุณไม่ต้องเลี้ยงวัวอีกต่อไป แต่ยังได้นมที่เหมือนเดิมเป๊ะ” โดยใช้กระบวนการที่เรียกว่า Precision Fermentation นั่นเอง
ฟังดูดีใช่ไหม? แต่ลองก้มดูข้างกล่องอีกที แล้วถามตัวเองว่า “นี่มันอาหาร... หรือผลิตภัณฑ์ทดลองทางพันธุกรรมที่กำลังรุกคืบสู่ชีวิตเราแบบแนบเนียน?”
Perfect Day ผลิตอะไร? Perfect Day ใช้จุลินทรีย์ที่ถูก “ตัดต่อพันธุกรรม” เรียกว่า Microflora ให้สามารถสร้างเวย์โปรตีน (โปรตีนหลักในนม) ได้ในห้องแล็บ มาเลี้ยงในถังหมัก เพื่อผลิตเวย์โปรตีนที่มีโครงสร้างเหมือนกับเวย์จากนมวัวทุกประการ แต่ไม่ต้องใช้สัตว์เลยแม้แต่น้อย แล้วนำโปรตีนนั้นไปใช้ในผลิตภัณฑ์หลากหลาย ตั้งแต่นม ไอศกรีม ไปจนถึงเครื่องดื่มโปรตีน แถมยังชูจุดขายด้วยว่า กระบวนการนี้ช่วยลดการปล่อยก๊าซเรือนกระจกได้ถึง 97% และลดการใช้น้ำได้ถึง 99% เมื่อเทียบกับการผลิตนมแบบดั้งเดิม
ที่สำคัญคือสินค้าจาก Perfect Day มีจำหน่ายแล้วในทุกวันนี้ครับ ในสารพัดแบรนด์เช่น Very Dairy วางขายในสิงคโปร์ Strive FREEMILK ที่ Amazon และร้านค้าในอเมริกา Breyers Lactose-Free Chocolate Ice Cream ร่วมกับ Unilever Modern Kitchen Cream Cheese ที่เคยวางขาย และกำลังปรับกลยุทธ์ และยังมีอีกเพียบเลยครับ
นี่ไม่ใช่ทางเลือก แต่มันคือ “การรุกคืบ” Perfect Day ไม่ได้หยุดแค่ขายของ พวกเขา ขายความคิดว่าของที่พวกเขาผลิต “ดีต่อโลกกว่า” และ “เป็นนวัตกรรมที่จำเป็นต่ออนาคต” โดยที่ไม่พูดถึงว่า -มันถูกสร้างขึ้นจากสิ่งมีชีวิตตัดต่อพันธุกรรม -ต้องใช้เทคโนโลยีสูงที่ประชาชนไม่มีสิทธิผลิตเอง -อยู่ภายใต้สิทธิบัตรที่สามารถควบคุมการใช้วัตถุดิบอาหารได้แต่ผู้เดียว
ลองนึกภาพว่า… วันหนึ่งหากผู้คนคุ้นเคยกับ “นมที่ไม่มีวัว” เพราะมันรสชาติถูกปากถูกใจ แถมยังถูกจริตการรักษ์โลกแบบที่เขาบอกว่าต้องรักอย่างไร และถ้าบริษัทเหล่านี้เข้าถึงโรงเรียน โรงพยาบาล หรือโครงการรัฐ เราจะเหลือ อำนาจในการเลือก จริง ๆ หรือไม่?
เบื้องหลังแผนจากแล็บสู่กลยุทธ์ครอบคลุมตลาด ปี 2023 Perfect Day ขายแบรนด์ฝั่งผู้บริโภคของตน (เช่น The Urgent Company) ให้กับ Superlatus เพื่อโฟกัสเฉพาะ B2B (Business to Business) กลยุทธ์นี้คือการ “เป็นเจ้าของวัตถุดิบ” และปล่อยให้แบรนด์ต่าง ๆ ในตลาดมาเป็นลูกค้า แปลว่าในอนาคต นม ไอศกรีม หรือโปรตีนบาร์ที่คุณกินในทุกวันนี้อาจใช้เวย์โปรตีนจาก GMO โดยที่คุณไม่รู้ตัวก็ได้ จุดนี้หละครับสำคัญ วันไหนนะที่จะมาถึงบ้านเรา
การเข้ายึดครองตลาดไม่ต้องใช้ชื่อ Perfect Day ก็ได้... แค่ฝังมันไว้ในวัตถุดิบ แล้วส่งออกไปยังโรงงานอุตสาหกรรมอาหารทั้งโลก ควบคุมอยู่เบื้องหลังเป็นกระดูกสันหลังที่สำคัญต่อการเคลื่อนที่ไปโดยปริยาย
ทั้งนี้เพราะ Perfect Day มีพันธมิตรมากมาย ไม่ว่าจะเป็น Unilever / Nestlé / Mars / Bel Group / Coolhaus / Very Dairy / Ice Age! / Strive Nutrition และอื่นๆอีกมากมาย
ที่น่าสนใจคือ มีหลักฐานชัดเจนว่า Nestlé ได้ร่วมมือกับ Perfect Day ในการพัฒนาผลิตภัณฑ์นมที่ปราศจากสัตว์ โดยใช้เวย์โปรตีนที่ผลิตจากกระบวนการ precision fermentation ของ Perfect Day
ความร่วมมือระหว่าง Nestlé และ Perfect Day เกิดขึ้นในเดือนกันยายน 2022 โดย Nestlé ได้ประกาศความร่วมมือกับ Perfect Day เพื่อพัฒนาผลิตภัณฑ์นมที่ปราศจากสัตว์ โดยใช้เวย์โปรตีนที่ผลิตจากจุลินทรีย์ที่ได้รับการดัดแปลงพันธุกรรม ผลิตภัณฑ์ที่พัฒนาขึ้น ได้แก่ เครื่องดื่มนมพร้อมดื่ม (RTD) รสช็อกโกแลตและรสดั้งเดิม ภายใต้ชื่อแบรนด์ Cowabunga ซึ่งวางจำหน่ายในร้าน Safeway บางแห่งในแคลิฟอร์เนีย Green Queen ความร่วมมือนี้เป็นส่วนหนึ่งของโครงการ R+D Accelerator ของ Nestlé ในสหรัฐอเมริกา ซึ่งมุ่งเน้นการพัฒนาและทดสอบผลิตภัณฑ์ใหม่ๆ อย่างรวดเร็ว
Nestlé ได้ร่วมมือกับ Perfect Day ในการพัฒนาผลิตภัณฑ์นมที่ปราศจากสัตว์ โดยใช้เวย์โปรตีนที่ผลิตจากกระบวนการ precision fermentation ซึ่งเป็นการตอบสนองต่อความต้องการของผู้บริโภคที่มองหาทางเลือกที่ยั่งยืนและเป็นมิตรต่อสิ่งแวดล้อม
ณ เดือนมกราคม 2025 บริษัท Perfect Day มีรายได้ประจำปีในปี 2024 Perfect Day มีรายได้รวมประมาณ 35 ล้านดอลลาร์สหรัฐ มูลค่าบริษัทจากการระดมทุนรอบล่าสุดในเดือนมกราคม 2024 ทำให้บริษัทมีมูลค่าประเมินอยู่ที่ 1.6 พันล้านดอลลาร์สหรัฐ
#pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก
-
@ fd06f542:8d6d54cd
2025-04-15 01:26:23 -
@ d08c9312:73efcc9f
2025-04-18 20:17:41https://youtu.be/qK7ffYzxiiQ
Resolvr was recently featured in The Institutes RiskStream Collaborative's educational video series on insurance digitization and cross-border payments. With over a century of history educating insurance professionals, The Institutes has established itself as the premier knowledge resource in risk management and insurance. And its RiskStream Collaborative non-profit serves as the industry's largest enterprise-level technology consortium focused on streamlining insurance processes through innovative solutions.
Resolvr's co-founders, Aaron Daniel and Dave Schwab, were joined by industry experts Lizzy Eisenberg from Lightspark and Austin Cornell from Zero Hash to discuss how Bitcoin and the Lightning Network are transforming global insurance payments operations.
Watch the video to learn how Resolvr is leveraging these real-time digital settlement networks to solve significant inefficiencies in today's insurance payment ecosystem - from the months-long settlement times that trap billions in value, to the manual reconciliation processes costing the industry nearly £1 billion annually at Lloyd's of London alone.
We're grateful to RiskStream Collaborative for showcasing these transformative technologies and emphasizing the importance of combining specialized insurance-native interfaces with powerful payment infrastructure to solve industry-specific challenges.
For more information about how Resolvr can help your organization streamline premium processing and payments, contact us today.
-
@ fd06f542:8d6d54cd
2025-04-15 01:24:54NIP-11
Relay Information Document
draft
optional
Relays may provide server metadata to clients to inform them of capabilities, administrative contacts, and various server attributes. This is made available as a JSON document over HTTP, on the same URI as the relay's websocket.
When a relay receives an HTTP(s) request with an
Accept
header ofapplication/nostr+json
to a URI supporting WebSocket upgrades, they SHOULD return a document with the following structure.json { "name": <string identifying relay>, "description": <string with detailed information>, "banner": <a link to an image (e.g. in .jpg, or .png format)>, "icon": <a link to an icon (e.g. in .jpg, or .png format>, "pubkey": <administrative contact pubkey>, "contact": <administrative alternate contact>, "supported_nips": <a list of NIP numbers supported by the relay>, "software": <string identifying relay software URL>, "version": <string version identifier> }
Any field may be omitted, and clients MUST ignore any additional fields they do not understand. Relays MUST accept CORS requests by sending
Access-Control-Allow-Origin
,Access-Control-Allow-Headers
, andAccess-Control-Allow-Methods
headers.Field Descriptions
Name
A relay may select a
name
for use in client software. This is a string, and SHOULD be less than 30 characters to avoid client truncation.Description
Detailed plain-text information about the relay may be contained in the
description
string. It is recommended that this contain no markup, formatting or line breaks for word wrapping, and simply use double newline characters to separate paragraphs. There are no limitations on length.Banner
To make nostr relay management more user friendly, an effort should be made by relay owners to communicate with non-dev non-technical nostr end users. A banner is a visual representation of the relay. It should aim to visually communicate the brand of the relay, complementing the text
Description
. Here is an example banner mockup as visualized in Damus iOS relay view of the Damus relay.Icon
Icon is a compact visual representation of the relay for use in UI with limited real estate such as a nostr user's relay list view. Below is an example URL pointing to an image to be used as an icon for the relay. Recommended to be squared in shape.
jsonc { "icon": "https://nostr.build/i/53866b44135a27d624e99c6165cabd76ac8f72797209700acb189fce75021f47.jpg", // other fields... }
Pubkey
An administrative contact may be listed with a
pubkey
, in the same format as Nostr events (32-byte hex for asecp256k1
public key). If a contact is listed, this provides clients with a recommended address to send encrypted direct messages (See NIP-17) to a system administrator. Expected uses of this address are to report abuse or illegal content, file bug reports, or request other technical assistance.Relay operators have no obligation to respond to direct messages.
Contact
An alternative contact may be listed under the
contact
field as well, with the same purpose aspubkey
. Use of a Nostr public key and direct message SHOULD be preferred over this. Contents of this field SHOULD be a URI, using schemes such asmailto
orhttps
to provide users with a means of contact.Supported NIPs
As the Nostr protocol evolves, some functionality may only be available by relays that implement a specific
NIP
. This field is an array of the integer identifiers ofNIP
s that are implemented in the relay. Examples would include1
, for"NIP-01"
and9
, for"NIP-09"
. Client-sideNIPs
SHOULD NOT be advertised, and can be ignored by clients.Software
The relay server implementation MAY be provided in the
software
attribute. If present, this MUST be a URL to the project's homepage.Version
The relay MAY choose to publish its software version as a string attribute. The string format is defined by the relay implementation. It is recommended this be a version number or commit identifier.
Extra Fields
Server Limitations
These are limitations imposed by the relay on clients. Your client should expect that requests exceed these practical limitations are rejected or fail immediately.
jsonc { "limitation": { "max_message_length": 16384, "max_subscriptions": 300, "max_limit": 5000, "max_subid_length": 100, "max_event_tags": 100, "max_content_length": 8196, "min_pow_difficulty": 30, "auth_required": true, "payment_required": true, "restricted_writes": true, "created_at_lower_limit": 31536000, "created_at_upper_limit": 3, "default_limit": 500 }, // other fields... }
-
max_message_length
: the maximum number of bytes for incoming JSON that the relay will attempt to decode and act upon. When you send large subscriptions, you will be limited by this value. It also effectively limits the maximum size of any event. Value is calculated from[
to]
after UTF-8 serialization (so some unicode characters will cost 2-3 bytes). It is equal to the maximum size of the WebSocket message frame. -
max_subscriptions
: total number of subscriptions that may be active on a single websocket connection to this relay. Authenticated clients with a (paid) relationship to the relay may have higher limits. -
max_subid_length
: maximum length of subscription id as a string. -
max_limit
: the relay server will clamp each filter'slimit
value to this number. This means the client won't be able to get more than this number of events from a single subscription filter. This clamping is typically done silently by the relay, but with this number, you can know that there are additional results if you narrow your filter's time range or other parameters. -
max_event_tags
: in any event, this is the maximum number of elements in thetags
list. -
max_content_length
: maximum number of characters in thecontent
field of any event. This is a count of unicode characters. After serializing into JSON it may be larger (in bytes), and is still subject to themax_message_length
, if defined. -
min_pow_difficulty
: new events will require at least this difficulty of PoW, based on NIP-13, or they will be rejected by this server. -
auth_required
: this relay requires NIP-42 authentication to happen before a new connection may perform any other action. Even if set to False, authentication may be required for specific actions. -
payment_required
: this relay requires payment before a new connection may perform any action. -
restricted_writes
: this relay requires some kind of condition to be fulfilled to accept events (not necessarily, but includingpayment_required
andmin_pow_difficulty
). This should only be set totrue
when users are expected to know the relay policy before trying to write to it -- like belonging to a special pubkey-based whitelist or writing only events of a specific niche kind or content. Normal anti-spam heuristics, for example, do not qualify. -
created_at_lower_limit
: 'created_at' lower limit -
created_at_upper_limit
: 'created_at' upper limit -
default_limit
: The maximum returned events if you send a filter with the limit set to 0.
Event Retention
There may be a cost associated with storing data forever, so relays may wish to state retention times. The values stated here are defaults for unauthenticated users and visitors. Paid users would likely have other policies.
Retention times are given in seconds, with
null
indicating infinity. If zero is provided, this means the event will not be stored at all, and preferably an error will be provided when those are received.jsonc { "retention": [ {"kinds": [0, 1, [5, 7], [40, 49]], "time": 3600}, {"kinds": [[40000, 49999]], "time": 100}, {"kinds": [[30000, 39999]], "count": 1000}, {"time": 3600, "count": 10000} ], // other fields... }
retention
is a list of specifications: each will apply to either all kinds, or a subset of kinds. Ranges may be specified for the kind field as a tuple of inclusive start and end values. Events of indicated kind (or all) are then limited to acount
and/or time period.It is possible to effectively blacklist Nostr-based protocols that rely on a specific
kind
number, by giving a retention time of zero for thosekind
values. While that is unfortunate, it does allow clients to discover servers that will support their protocol quickly via a single HTTP fetch.There is no need to specify retention times for ephemeral events since they are not retained.
Content Limitations
Some relays may be governed by the arbitrary laws of a nation state. This may limit what content can be stored in clear-text on those relays. All clients are encouraged to use encryption to work around this limitation.
It is not possible to describe the limitations of each country's laws and policies which themselves are typically vague and constantly shifting.
Therefore, this field allows the relay operator to indicate which countries' laws might end up being enforced on them, and then indirectly on their users' content.
Users should be able to avoid relays in countries they don't like, and/or select relays in more favorable zones. Exposing this flexibility is up to the client software.
jsonc { "relay_countries": [ "CA", "US" ], // other fields... }
relay_countries
: a list of two-level ISO country codes (ISO 3166-1 alpha-2) whose laws and policies may affect this relay.EU
may be used for European Union countries. A*
can be used for global relays.
Remember that a relay may be hosted in a country which is not the country of the legal entities who own the relay, so it's very likely a number of countries are involved.
Community Preferences
For public text notes at least, a relay may try to foster a local community. This would encourage users to follow the global feed on that relay, in addition to their usual individual follows. To support this goal, relays MAY specify some of the following values.
jsonc { "language_tags": ["en", "en-419"], "tags": ["sfw-only", "bitcoin-only", "anime"], "posting_policy": "https://example.com/posting-policy.html", // other fields... }
-
language_tags
is an ordered list of IETF language tags indicating the major languages spoken on the relay. A*
can be used for global relays. -
tags
is a list of limitations on the topics to be discussed. For examplesfw-only
indicates that only "Safe For Work" content is encouraged on this relay. This relies on assumptions of what the "work" "community" feels "safe" talking about. In time, a common set of tags may emerge that allow users to find relays that suit their needs, and client software will be able to parse these tags easily. Thebitcoin-only
tag indicates that any altcoin, "crypto" or blockchain comments will be ridiculed without mercy. -
posting_policy
is a link to a human-readable page which specifies the community policies for the relay. In cases wheresfw-only
is True, it's important to link to a page which gets into the specifics of your posting policy.
The
description
field should be used to describe your community goals and values, in brief. Theposting_policy
is for additional detail and legal terms. Use thetags
field to signify limitations on content, or topics to be discussed, which could be machine processed by appropriate client software.Pay-to-Relay
Relays that require payments may want to expose their fee schedules.
jsonc { "payments_url": "https://my-relay/payments", "fees": { "admission": [{ "amount": 1000000, "unit": "msats" }], "subscription": [{ "amount": 5000000, "unit": "msats", "period": 2592000 }], "publication": [{ "kinds": [4], "amount": 100, "unit": "msats" }], }, // other fields... }
Examples
As of 25 March 2025 the following command provided these results:
bash curl -H "Accept: application/nostr+json" https://jellyfish.land | jq
json { "name": "JellyFish", "description": "Stay Immortal!", "banner": "https://image.nostr.build/7fdefea2dec1f1ec25b8ce69362566c13b2b7f13f1726c2e4584f05f64f62496.jpg", "pubkey": "bf2bee5281149c7c350f5d12ae32f514c7864ff10805182f4178538c2c421007", "contact": "hi@dezh.tech", "software": "https://github.com/dezh-tech/immortal", "supported_nips": [ 1, 9, 11, 13, 17, 40, 42, 59, 62, 70 ], "version": "immortal - 0.0.9", "relay_countries": [ "*" ], "language_tags": [ "*" ], "tags": [], "posting_policy": "https://jellyfish.land/tos.txt", "payments_url": "https://jellyfish.land/relay", "icon": "https://image.nostr.build/2547e9ec4b23589e09bc7071e0806c3d4293f76284c58ff331a64bce978aaee8.jpg", "retention": [], "fees": { "subscription": [ { "amount": 3000, "period": 2628003, "unit": "sats" }, { "amount": 8000, "period": 7884009, "unit": "sats" }, { "amount": 15000, "period": 15768018, "unit": "sats" }, { "amount": 28000, "period": 31536036, "unit": "sats" } ] }, "limitation": { "auth_required": false, "max_message_length": 70000, "max_subid_length": 256, "max_subscriptions": 350, "min_pow_difficulty": 0, "payment_required": true, "restricted_writes": true, "max_event_tags": 2000, "max_content_length": 70000, "created_at_lower_limit": 0, "created_at_upper_limit": 2147483647, "default_limit": 500, "max_limit": 5000 } }
-
-
@ fd06f542:8d6d54cd
2025-04-15 01:24:21NIP-10
Text Notes and Threads
draft
optional
This NIP defines
kind:1
as a simple plaintext note.Abstract
The
.content
property contains some human-readable text.e
tags can be used to define note thread roots and replies. They SHOULD be sorted by the reply stack from root to the direct parent.q
tags MAY be used when citing events in the.content
with NIP-21.json ["q", "<event-id> or <event-address>", "<relay-url>", "<pubkey-if-a-regular-event>"]
Authors of the
e
andq
tags SHOULD be added asp
tags to notify of a new reply or quote.Markup languages such as markdown and HTML SHOULD NOT be used.
Marked "e" tags (PREFERRED)
Kind 1 events with
e
tags are replies to other kind 1 events. Kind 1 replies MUST NOT be used to reply to other kinds, use NIP-22 instead.["e", <event-id>, <relay-url>, <marker>, <pubkey>]
Where:
<event-id>
is the id of the event being referenced.<relay-url>
is the URL of a recommended relay associated with the reference. Clients SHOULD add a valid<relay-url>
field, but may instead leave it as""
.<marker>
is optional and if present is one of"reply"
,"root"
.<pubkey>
is optional, SHOULD be the pubkey of the author of the referenced event
Those marked with
"reply"
denote the id of the reply event being responded to. Those marked with"root"
denote the root id of the reply thread being responded to. For top level replies (those replying directly to the root event), only the"root"
marker should be used.A direct reply to the root of a thread should have a single marked "e" tag of type "root".
This scheme is preferred because it allows events to mention others without confusing them with
<reply-id>
or<root-id>
.<pubkey>
SHOULD be the pubkey of the author of thee
tagged event, this is used in the outbox model to search for that event from the authors write relays where relay hints did not resolve the event.The "p" tag
Used in a text event contains a list of pubkeys used to record who is involved in a reply thread.
When replying to a text event E the reply event's "p" tags should contain all of E's "p" tags as well as the
"pubkey"
of the event being replied to.Example: Given a text event authored by
a1
with "p" tags [p1
,p2
,p3
] then the "p" tags of the reply should be [a1
,p1
,p2
,p3
] in no particular order.Deprecated Positional "e" tags
This scheme is not in common use anymore and is here just to keep backward compatibility with older events on the network.
Positional
e
tags are deprecated because they create ambiguities that are difficult, or impossible to resolve when an event references another but is not a reply.They use simple
e
tags without any marker.["e", <event-id>, <relay-url>]
as per NIP-01.Where:
<event-id>
is the id of the event being referenced.<relay-url>
is the URL of a recommended relay associated with the reference. Many clients treat this field as optional.
The positions of the "e" tags within the event denote specific meanings as follows:
-
No "e" tag:
This event is not a reply to, nor does it refer to, any other event. -
One "e" tag:
["e", <id>]
: The id of the event to which this event is a reply. -
Two "e" tags:
["e", <root-id>]
,["e", <reply-id>]
<root-id>
is the id of the event at the root of the reply chain.<reply-id>
is the id of the article to which this event is a reply. -
Many "e" tags:
["e", <root-id>]
["e", <mention-id>]
, ...,["e", <reply-id>]
There may be any number of<mention-ids>
. These are the ids of events which may, or may not be in the reply chain. They are citing from this event.root-id
andreply-id
are as above.
-
@ 7d33ba57:1b82db35
2025-04-18 19:29:49The San Blas Islands, officially known as the Guna Yala archipelago, are a dreamy chain of 365 islands and cays, most of them uninhabited, off Panama’s Caribbean coast. Run autonomously by the Guna (or Kuna) people, San Blas is known for its **crystal-clear turquoise waters, white sand beaches, and authentic indigenous culture.
🌞 Why Visit the San Blas Islands?
- Unspoiled beauty: No resorts or big hotels—just rustic cabanas, palm trees, and silence
- Snorkeling heaven: Coral reefs, starfish banks, and calm lagoons await
- Cultural connection: Meet the Guna people, learn about their traditions, and buy their handmade molas (textiles)
- Disconnect to reconnect: No Wi-Fi, no distractions—just sea, sky, and sand
🌊 Top Things to Do
- 🐠 Snorkel around the vibrant reefs and shipwrecks
- 🏝️ Island-hop by boat between tiny islets, some with just a few palm trees
- 🧺 Visit a Guna village to learn about their matriarchal society and way of life
- 🌅 Sunbathe or hammock-nap under swaying palms
- 🌌 Gaze at star-filled skies—zero light pollution here
🛏️ Where to Stay
- Accommodations are basic cabanas or eco-lodges, often directly on the beach
- Meals (mostly fresh seafood, rice, plantains) are usually included
- Power is limited—think solar lights, not outlets
🚐 Getting There
- Depart from Panama City via a 4x4 ride (2.5–3 hrs) to the port of Cartí
- Then hop on a boat (30–45 mins) to your island
- Or opt for a guided multi-day tour that includes transport, meals, and accommodation
🛂 Note: San Blas is semi-autonomous—you’ll need your passport for entry, even if coming from within Panama.
📅 Best Time to Go
- Dry Season (Dec–April): Clear skies, calm seas, and stunning sunrises
- Wet Season (May–Nov): Still beautiful, with occasional short tropical showers
🌺 Insider Tips
- Bring cash—no ATMs in San Blas
- Pack reef-safe sunscreen, a dry bag, and snorkeling gear
- Respect Guna customs—ask before taking photos, and dress modestly when visiting villages
- Travel light—waterproof bags are a must for boat rides
-
@ fd06f542:8d6d54cd
2025-04-14 02:32:03NIP-09
Event Deletion Request
draft
optional
A special event with kind
5
, meaning "deletion request" is defined as having a list of one or moree
ora
tags, each referencing an event the author is requesting to be deleted. Deletion requests SHOULD include ak
tag for the kind of each event being requested for deletion.The event's
content
field MAY contain a text note describing the reason for the deletion request.For example:
jsonc { "kind": 5, "pubkey": <32-bytes hex-encoded public key of the event creator>, "tags": [ ["e", "dcd59..464a2"], ["e", "968c5..ad7a4"], ["a", "<kind>:<pubkey>:<d-identifier>"], ["k", "1"], ["k", "30023"] ], "content": "these posts were published by accident", // other fields... }
Relays SHOULD delete or stop publishing any referenced events that have an identical
pubkey
as the deletion request. Clients SHOULD hide or otherwise indicate a deletion request status for referenced events.Relays SHOULD continue to publish/share the deletion request events indefinitely, as clients may already have the event that's intended to be deleted. Additionally, clients SHOULD broadcast deletion request events to other relays which don't have it.
When an
a
tag is used, relays SHOULD delete all versions of the replaceable event up to thecreated_at
timestamp of the deletion request event.Client Usage
Clients MAY choose to fully hide any events that are referenced by valid deletion request events. This includes text notes, direct messages, or other yet-to-be defined event kinds. Alternatively, they MAY show the event along with an icon or other indication that the author has "disowned" the event. The
content
field MAY also be used to replace the deleted events' own content, although a user interface should clearly indicate that this is a deletion request reason, not the original content.A client MUST validate that each event
pubkey
referenced in thee
tag of the deletion request is identical to the deletion requestpubkey
, before hiding or deleting any event. Relays can not, in general, perform this validation and should not be treated as authoritative.Clients display the deletion request event itself in any way they choose, e.g., not at all, or with a prominent notice.
Clients MAY choose to inform the user that their request for deletion does not guarantee deletion because it is impossible to delete events from all relays and clients.
Relay Usage
Relays MAY validate that a deletion request event only references events that have the same
pubkey
as the deletion request itself, however this is not required since relays may not have knowledge of all referenced events.Deletion Request of a Deletion Request
Publishing a deletion request event against a deletion request has no effect. Clients and relays are not obliged to support "unrequest deletion" functionality.
-
@ f57bac88:6045161e
2025-04-18 19:23:24در دنیای امروز، بارها دیدهایم که بهخاطر یک کار خوب، یک سخن درست یا گذشتهای درخشان، کسی را روی سکوی قهرمانی میگذاریم و او را بینقص و مطلق میپنداریم. اما حقیقت این است که هیچ انسانی کامل نیست. آدمها موجوداتی پیچیدهاند که با گذر زمان، تجربه و شرایط، تغییر میکنند. آنچه امروز ستودنی است، لزوماً فردا هم همان ارزش را ندارد.
برای مثال، توماج صالحی را در نظر بگیرید؛ کسی که با صدای بلند از حق مردم گفت، شعر خواند و در زندان و زیر فشار شکنجه مقاومت کرد. شجاعت او شایسته تحسین است، اما نمیتوان انتظار داشت که تحت چنین فشار طاقتفرسایی، همیشه همان تصویر قهرمانانه را حفظ کند. یا مسیح علینژاد که علیه جمهوری اسلامی سخن گفت و کارهایی کرد که بسیاری آن را ارزشمند میدانند. اما این به آن معنا نیست که هر تصمیم یا سخنی از او بینقص است یا او ذاتاً بیعیب است. حتی خاندان پهلوی که زمانی نماد پیشرفت و مدرنیته بودند، نمیتوانند بهتنهایی معیار حقیقت یا ناجی یک ملت باشند.
این ماجرا به چهرههای سیاسی و تاریخی محدود نمیشود. ارنستو چگوارا برای بسیاری نماد مبارزه و آزادی است، اما وقتی دقیقتر نگاه کنیم، میبینیم برخی تصمیماتش به ضرر مردم تمام شد. در زندگی روزمره هم همینطور است؛ ممکن است کسی در لحظهای خاص کاری درست انجام دهد، اما این دلیل نمیشود که همیشه شایسته اعتماد بیچونوچرا باشد.
بتسازی از آدمها خطر بزرگی دارد: وقتی کسی را اسطوره میکنیم، دیگر نمیتوانیم نقصها و اشتباهاتش را ببینیم. اگر روزی خطایی از او سر بزند، یا شوکه میشویم یا به هر بهانهای سعی میکنیم آن را توجیه کنیم. این روند، ما را از قضاوت منصفانه و خردمندانه دور میکند و به جای حقیقت، به توهم وابستهمان میسازد.
به جای بتسازی، بهتر است انسانها را همانگونه که هستند ببینیم: با خوبیها و کاستیها، با شجاعتها و ضعفها. اگر کسی کار درستی کرد، تحسینش کنیم، اما نگذاریم این تحسین، چشممان را روی حقیقت ببندد. این نگاه نهتنها ما را از سرخوردگی و توهم دور نگه میدارد، بلکه قدرت تحلیل و یادگیریمان را تقویت میکند.
اما آزادی واقعی چگونه به دست میآید؟ آزادی حقیقی در انتظار منجی یا قهرمان نیست. آزادی زمانی معنا پیدا میکند که هر فرد، خود قدرت انتخاب، تفکر و عمل داشته باشد. به جای وابستگی به یک نفر یا یک گروه، باید سیستمی غیرمتمرکز و آزاد ایجاد کنیم که در آن هیچکس تحت سلطه دیگری نباشد. همانطور که شهبانو فرح پهلوی گفته است: «همیشه نور بر تاریکی پیروز است.» این نور، نماد خرد جمعی و آزادی است که با اتکا به خود و همکاری با دیگران، تاریکی جهل و استبداد را از بین میبرد.
در نهایت، به جای پرستش قهرمانهای خیالی، بیایید ارزشها و ایدهها را مستقل از آدمها بسنجیم. با عمل آزادانه، نقد منصفانه و همکاری جمعی، میتوانیم راه را برای جامعهای عادلانه، آزاد و روشن هموار کنیم.
-
@ 9223d2fa:b57e3de7
2025-04-18 19:20:012,340 steps
-
@ fd06f542:8d6d54cd
2025-04-14 02:06:32nostrbook 技术框架
源代码在 github.com
git clone https://github.com/nostrbook/nostrbook cd nostrbook npm install npm run dev
- 网站主框架 vite + svelte
- 网站浏览书框架 docsify
网站主框架
svelte 为主,daisyui (tailwindcss) css 。 页面的逻辑结构 都是 svelte搭建的, 采用了 layout 左侧菜单。
菜单代码 在 https://github.com/nostrbook/nostrbook/blob/main/src/lib/SideMenu.svelte 菜单里用了弹框登录,弹框的代码基本是问的 AI。
子页面和 路由器看sveltekit规则编写。
书籍的数据
https://github.com/nostrbook/nostrbook/blob/main/src/lib/bookevent.ts 使用的nostr ndk 库来读写 relay。 书的 tag, 内容就是 标题,封面和作者。
[ ['t',booktag], ['title',content['title']], ];
章节的数据
[ ['t',chaptertag], ['title',title], ['d',filename + "-" + bookid], ['e',bookid], ];
这里面的 d,采用了 文件名 + bookid,所以每一本的章节名的文件名是唯一的。配置文件
src/lib/config.ts,主要配置 服务器的地址 * 图片文件 nip96 服务器 * relays 服务器 * book的tag ,测试和 release不一样。 如果自己部署独有的服务器也可以不一样。这样内容可以垂直。
首页采用了缓冲机制
首页的内容来自 书籍的列表, 用booktag和30023来区分是不是书籍信息。 为了搜索引擎友好,让页面加载就有数据。
采用了 src/hooks.server.ts 预备加载数据,数据会被首页面 src/routes/+page.server.ts 传给 page.svelte去渲染。 这一切都是后台完成的。html页面加载的时候数据都已经渲染完成了。所以对搜索引擎非常友好。搞定了google,seo。
但是为了数据的完整性, 页面起来后会继续读取列表,这时候可能会显示最新的数据。
增加了 sitemap功能
在 hooks.server.ts 文件里 增加了记录访问成功的页面,并且更新到sitemap.xml 文件里面 ```js export const handle: Handle = async ({ event, resolve }) => { event.locals.books = cachedBooks; // 共享数据 const response = await resolve(event); const {url,method} = event.request; console.log(url,response.status) if (response.status == 200){ let url = event.url.toString(); url = replaceHttpToHttps(url); if (!successfulUrls.has(url)){ successfulUrls.add(url); generateSitemap(); } } return response };
```
然后配置 nginx 设置一个sitemap.xml 链接到 nostrbook/static/sitemap.xml文件。
robots.txt
Sitemap: https://nostrbook.com/sitemap.xml
让爬虫 知道 这个sitemap的存在xml This XML file does not appear to have any style information associated with it. The document tree is shown below. <urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"> <url> <loc>https://nostrbook.com/</loc> </url> <url> <loc>https://nostrbook.com/uploadfiles?imgsrc=https://cdn.nostrcheck.me/fd06f542bc6c06a39881810de917e6c5d277dfb51689a568ad7b7a548d6d54cd/19105641454b483284cf76c42fbdde2ed3f47b1bb2a366a58eaa49630d385027.webp</loc> </url> <url> <loc>https://nostrbook.com/uploadfiles?imgsrc=https://cdn.nostrcheck.me/a7f85dfe651aaa0b47d69659266f434479e40558a640a308a8f6769627305a2b/e9801593f2ea4560c55a6a2651788620cfe6c587c17c08f0e8023f06e7ffaf31.webp</loc> </url> <url> <loc>https://nostrbook.com/uploadfiles?imgsrc=https://cdn.nostrcheck.me/fd06f542bc6c06a39881810de917e6c5d277dfb51689a568ad7b7a548d6d54cd/232dd9c092e023beecb5410052bd48add702765258dcc66f176a56f02b09cf6a.webp</loc> </url> <url> <loc>https://nostrbook.com/uploadfiles?imgsrc=https://cdn.nostrcheck.me/fd06f542bc6c06a39881810de917e6c5d277dfb51689a568ad7b7a548d6d54cd/1dd58d181d40edb7df942b5b16be3f82e95348a471d5a3620a9585f0af784fee.webp</loc> </url> <url> <loc>https://nostrbook.com/uploadfiles?imgsrc=https://cdn.nostrcheck.me/fd06f542bc6c06a39881810de917e6c5d277dfb51689a568ad7b7a548d6d54cd/5ad7189d30c9b49aa61652d98ac7853217b7e445f863be09f9745c49df9f514c.webp</loc> </url> <url> <loc>https://nostrbook.com/books/37548c3300238cc2152d8694bb3ff46b9155d26b1b9b0986baaf7e5e90f00157?title=nostr-examples</loc> </url> <url> <loc>https://nostrbook.com/books/37548c3300238cc2152d8694bb3ff46b9155d26b1b9b0986baaf7e5e90f00157/readme.md</loc> </url> <url> <loc>https://nostrbook.com/books/37548c3300238cc2152d8694bb3ff46b9155d26b1b9b0986baaf7e5e90f00157/_sidebar.md</loc> </url> <url> <loc>https://nostrbook.com/books/c3834c0604b4e5ad66ececd756791a539c585d880864d62b0ef51e3602c482b7?title=NostrBook%E7%AB%99%E7%82%B9%E6%97%A5%E8%AE%B0</loc> </url> <url> <loc>https://nostrbook.com/books/c3834c0604b4e5ad66ececd756791a539c585d880864d62b0ef51e3602c482b7/readme.md</loc> </url> <url> <loc>https://nostrbook.com/books/c3834c0604b4e5ad66ececd756791a539c585d880864d62b0ef51e3602c482b7/_sidebar.md</loc> </url> <url> <loc>https://nostrbook.com/books/c3834c0604b4e5ad66ececd756791a539c585d880864d62b0ef51e3602c482b7/01.md</loc> </url> <url> <loc>https://nostrbook.com/books/c3834c0604b4e5ad66ececd756791a539c585d880864d62b0ef51e3602c482b7/02.md</loc> </url> <url> <loc>https://nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997?title=Nostr%20protocol</loc> </url> <url> <loc>https://nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/readme.md</loc> </url> <url> <loc>https://nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/_sidebar.md</loc> </url> <url> <loc>https://nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/01.md</loc> </url> <url> <loc>https://nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/02.md</loc> </url> <url> <loc>https://nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/04.md</loc> </url> <url> <loc>https://nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/03.md</loc> </url> <url> <loc>https://nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/05.md</loc> </url> <url> <loc>https://nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/06.md</loc> </url> <url> <loc>https://nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/08.md</loc> </url> <url> <loc>https://nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/07.md</loc> </url> <url> <loc>https://nostrbook.com/books/384647ec127fe421618b5e0ab460a99a8217d59e59ac7075dcdc70266225ea34?title=nostr%E8%B5%84%E6%BA%90%E6%94%B6%E9%9B%86</loc> </url> <url> <loc>https://nostrbook.com/books/384647ec127fe421618b5e0ab460a99a8217d59e59ac7075dcdc70266225ea34/readme.md</loc> </url> <url> <loc>https://nostrbook.com/books/384647ec127fe421618b5e0ab460a99a8217d59e59ac7075dcdc70266225ea34/_sidebar.md</loc> </url> <url> <loc>https://nostrbook.com/books/384647ec127fe421618b5e0ab460a99a8217d59e59ac7075dcdc70266225ea34/01.md</loc> </url> <url> <loc>https://nostrbook.com/books/384647ec127fe421618b5e0ab460a99a8217d59e59ac7075dcdc70266225ea34/02.md</loc> </url> <url> <loc>https://www.nostrbook.com/books/fb423d08b09b253194c1d7df7f828b3ecce78a72caa8d00f1b172631c0e5e951</loc> </url> <url> <loc>https://www.nostrbook.com/books/384647ec127fe421618b5e0ab460a99a8217d59e59ac7075dcdc70266225ea34?title=nostr%E8%B5%84%E6%BA%90%E6%94%B6%E9%9B%86</loc> </url> <url> <loc>https://www.nostrbook.com/</loc> </url> <url> <loc>https://nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997</loc> </url> <url> <loc>https://www.nostrbook.com/books/37548c3300238cc2152d8694bb3ff46b9155d26b1b9b0986baaf7e5e90f00157</loc> </url> <url> <loc>https://www.nostrbook.com/books/37548c3300238cc2152d8694bb3ff46b9155d26b1b9b0986baaf7e5e90f00157/_sidebar.md?format=html</loc> </url> <url> <loc>https://nostrbook.com/books/37548c3300238cc2152d8694bb3ff46b9155d26b1b9b0986baaf7e5e90f00157</loc> </url> <url> <loc>https://nostrbook.com/books/37548c3300238cc2152d8694bb3ff46b9155d26b1b9b0986baaf7e5e90f00157/_sidebar.md?format=html</loc> </url> <url> <loc>https://nostrbook.com/createbook</loc> </url> <url> <loc>https://nostrbook.com/books/c3834c0604b4e5ad66ececd756791a539c585d880864d62b0ef51e3602c482b7</loc> </url> <url> <loc>https://nostrbook.com/about</loc> </url> <url> <loc>https://nostrbook.com/books/384647ec127fe421618b5e0ab460a99a8217d59e59ac7075dcdc70266225ea34</loc> </url> <url> <loc>https://nostrbook.com/books/fb423d08b09b253194c1d7df7f828b3ecce78a72caa8d00f1b172631c0e5e951</loc> </url> <url> <loc>https://www.nostrbook.com/about</loc> </url> <url> <loc>https://nostrbook.com/books/384647ec127fe421618b5e0ab460a99a8217d59e59ac7075dcdc70266225ea34/_sidebar.md?format=html</loc> </url> <url> <loc>https://nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/_sidebar.md?format=html</loc> </url> <url> <loc>https://nostrbook.com/books/c3834c0604b4e5ad66ececd756791a539c585d880864d62b0ef51e3602c482b7/_sidebar.md?format=html</loc> </url> <url> <loc>https://nostrbook.com/books/fb423d08b09b253194c1d7df7f828b3ecce78a72caa8d00f1b172631c0e5e951/_sidebar.md?format=html</loc> </url> <url> <loc>https://www.nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997</loc> </url> <url> <loc>https://www.nostrbook.com/books/384647ec127fe421618b5e0ab460a99a8217d59e59ac7075dcdc70266225ea34</loc> </url> <url> <loc>https://www.nostrbook.com/books/c3834c0604b4e5ad66ececd756791a539c585d880864d62b0ef51e3602c482b7</loc> </url> <url> <loc>https://www.nostrbook.com/books/fb423d08b09b253194c1d7df7f828b3ecce78a72caa8d00f1b172631c0e5e951/_sidebar.md?format=html</loc> </url> <url> <loc>https://www.nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/_sidebar.md?format=html</loc> </url> <url> <loc>https://www.nostrbook.com/books/384647ec127fe421618b5e0ab460a99a8217d59e59ac7075dcdc70266225ea34/_sidebar.md?format=html</loc> </url> <url> <loc>https://www.nostrbook.com/books/c3834c0604b4e5ad66ececd756791a539c585d880864d62b0ef51e3602c482b7/_sidebar.md?format=html</loc> </url> <url> <loc>https://www.nostrbook.com/uploadfiles?imgsrc=https://cdn.nostrcheck.me/a7f85dfe651aaa0b47d69659266f434479e40558a640a308a8f6769627305a2b/e9801593f2ea4560c55a6a2651788620cfe6c587c17c08f0e8023f06e7ffaf31.webp</loc> </url> <url> <loc>https://www.nostrbook.com/uploadfiles?imgsrc=https://cdn.nostrcheck.me/fd06f542bc6c06a39881810de917e6c5d277dfb51689a568ad7b7a548d6d54cd/19105641454b483284cf76c42fbdde2ed3f47b1bb2a366a58eaa49630d385027.webp</loc> </url> <url> <loc>https://www.nostrbook.com/uploadfiles?imgsrc=https://cdn.nostrcheck.me/fd06f542bc6c06a39881810de917e6c5d277dfb51689a568ad7b7a548d6d54cd/232dd9c092e023beecb5410052bd48add702765258dcc66f176a56f02b09cf6a.webp</loc> </url> <url> <loc>https://www.nostrbook.com/uploadfiles?imgsrc=https://cdn.nostrcheck.me/fd06f542bc6c06a39881810de917e6c5d277dfb51689a568ad7b7a548d6d54cd/1dd58d181d40edb7df942b5b16be3f82e95348a471d5a3620a9585f0af784fee.webp</loc> </url> <url> <loc>https://www.nostrbook.com/uploadfiles?imgsrc=https://cdn.nostrcheck.me/fd06f542bc6c06a39881810de917e6c5d277dfb51689a568ad7b7a548d6d54cd/5ad7189d30c9b49aa61652d98ac7853217b7e445f863be09f9745c49df9f514c.webp</loc> </url> <url> <loc>https://www.nostrbook.com/books/37548c3300238cc2152d8694bb3ff46b9155d26b1b9b0986baaf7e5e90f00157/readme.md</loc> </url> <url> <loc>https://www.nostrbook.com/books/37548c3300238cc2152d8694bb3ff46b9155d26b1b9b0986baaf7e5e90f00157/_sidebar.md</loc> </url> <url> <loc>https://nostrbook.com/books/37548c3300238cc2152d8694bb3ff46b9155d26b1b9b0986baaf7e5e90f00157/getstart.md</loc> </url> <url> <loc>https://www.nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/readme.md</loc> </url> <url> <loc>https://www.nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/_sidebar.md</loc> </url> <url> <loc>https://www.nostrbook.com/books/9f0c0ef8f03be684fa7bb0de8df20b173aa9057adbb3eb4d30bed6dfc96e7997/04.md</loc> </url> <url> <loc>https://nostrbook.com/books/_sidebar.md/_sidebar.md?format=html</loc> </url> <url> <loc>https://www.nostrbook.com/books/37548c3300238cc2152d8694bb3ff46b9155d26b1b9b0986baaf7e5e90f00157?title=nostr-examples</loc> </url> <url> <loc>https://www.nostrbook.com/books/37548c3300238cc2152d8694bb3ff46b9155d26b1b9b0986baaf7e5e90f00157/getstart.md</loc> </url> <url> <loc>https://www.nostrbook.com/writebook</loc> </url> </urlset>
-
@ 7d33ba57:1b82db35
2025-04-18 19:17:15Panama City is a bold fusion of colonial charm, tropical coastline, and modern skyline—the only capital in the world with a rainforest inside city limits. It's where skyscrapers meet historic plazas, and just minutes from one of the greatest engineering marvels on Earth: the Panama Canal.
🏙️ Top Things to Do in Panama City
🛕 Casco Viejo (Old Quarter)
- A UNESCO-listed historic district with Spanish colonial architecture, vibrant cafés, and rooftop bars
- Walk the cobblestone streets, visit Plaza de Francia, and sip cocktails overlooking the bay
- Perfect spot for nightlife, art galleries, and boutique hotels
🌉 Panama Canal
- Visit the Miraflores Locks to watch ships rise and fall as they pass between oceans
- The Canal Museum explains its incredible history and global impact
- Want a deeper experience? Take a partial or full canal transit boat tour
🐒 Metropolitan Natural Park
- A rainforest just 10 minutes from downtown
- Hike trails with sloths, monkeys, and incredible views of the city skyline from lookout points
🚴 Cinta Costera & Amador Causeway
- Coastal promenades ideal for biking or strolling
- Head to the Biomuseo, designed by Frank Gehry, or catch a sunset with city views on the Causeway
🌴 Day Trips & Getaways
🏝️ San Blas Islands
- Idyllic Caribbean islands run by the Guna Yala people
- Crystal-clear waters, white sands, no crowds—perfect for a tropical escape
🐬 Taboga Island
- Just 30 minutes by ferry
- Known as the “Island of Flowers,” it’s great for swimming, hiking, and beach relaxation
🍽️ What to Eat in Panama City
- Ceviche – Grab some fresh at the Mercado de Mariscos (Fish Market)
- Sancocho – A hearty chicken and root vegetable soup
- Ropa Vieja – Shredded beef stew, often served with rice and plantains
- Don’t miss local coffee, craft beer, and rum cocktails with a view
📅 Best Time to Visit
- Dry Season (Mid-Dec–April): Best for sightseeing, canal tours, and island trips
- Wet Season (May–Nov): Expect brief afternoon showers, but still very green and vibrant
✈️ Getting There & Around
- Tocumen International Airport (PTY) connects to major global cities
- Uber and taxis are common, but Casco Viejo is best explored on foot
- Use the Metro or MiBus for budget-friendly public transport
-
@ 7d33ba57:1b82db35
2025-04-18 19:03:21Perched high above the Danube River in Donaustauf, just east of Regensburg, the Walhalla Memorial is one of Germany’s most unique and impressive landmarks. Inspired by the Parthenon in Athens, this neoclassical temple was built in the 19th century by order of King Ludwig I of Bavaria to honor great Germans from history.
🏛️ What Is Walhalla?
- A massive white marble temple that resembles an ancient Greek sanctuary
- Completed in 1842, it was named after the Norse “Valhalla” — the hall of heroes
- Inside, you’ll find over 130 busts and plaques of notable figures in German culture, science, politics, and the arts
- Honorees include Albert Einstein, Ludwig van Beethoven, Johann Wolfgang von Goethe, and more
📸 Why Visit?
- Panoramic views of the Danube valley—especially stunning at sunset
- The architecture and symmetry of the monument are jaw-dropping
- It’s a peaceful, reflective spot with lots of photo opportunities
- Learn about German and European history in a serene, scenic setting
🚶♀️ How to Get There
- 8 km (5 miles) from Regensburg—about 15 minutes by car or bus
- You can also bike along the Danube path (Donau-Radweg), a beautiful riverside ride
- Once you arrive, be ready to climb a long flight of stone steps to reach the top
🕰️ Tips for Visiting
- Best in spring to early fall, when the surrounding hills are lush and green
- Bring water and comfortable shoes for the climb
- The interior is open to visitors (small entrance fee)
- Combine it with a stop in Regensburg or Weltenburg Abbey for a perfect day trip
-
@ fd06f542:8d6d54cd
2025-04-12 07:34:06Get started
A step-by-step guide to getting started with Nostr.
这里主要面对开发者,下面会有一些例子。
Understanding keys
Each Nostr account is based on a public/private key pair. A simple way to think about this is that your public key is your username and your private key is your password, with one major caveat. Unlike a password, your private key cannot be reset if lost.
The public key is generally presented as a string with the prefix npub and the private key with the prefix nsec. Make sure you store you private key somewhere safe, like a password manager.
nodejs example
使用 nostr-tools 开始第一个例子
https://github.com/nbd-wtf/nostr-tools
```
npm
npm install --save nostr-tools
jsr
npx jsr add @nostr/tools ```
Generating a private key and a public key
```js import { generateSecretKey, getPublicKey } from 'nostr-tools/pure'
let sk = generateSecretKey() //
sk
is a Uint8Array let pk = getPublicKey(sk) //pk
is a hex string ```To get the secret key in hex format, use ```js import { bytesToHex, hexToBytes } from '@noble/hashes/utils' // already an installed dependency
let skHex = bytesToHex(sk) let backToBytes = hexToBytes(skHex) ```
这样你就得到了你的 nostr账户了,完全是程序生成的。
任何人都可以生成,javascript,python ,rust 等各种语言都可以
git clone https://github.com/duozhutuan/nostrclient
python from nostrclient.key import PrivateKey pkey = PrivateKey() print("Your public key: ",pkey.public_key) print("Your public key bech32: ",pkey.public_key.bech32())
Keeping keys safe
If you are using Nostr on a web browser it is probably a good idea to install an extension like Connect, nos2x or Alby, then input your secret key there (or it will generate a secret key for you). From there you will be able to use all web apps very easily with no worries. For the paranoid, keeping your key on a hardware device is also an option.
If you are on Android, installing Amber is the safest way to use Nostr without having to paste your key directly into apps.
Otherwise it's probably safe to paste your nsec into well-established and security-minded apps such as Damus, so don't worry too much.
Let's do this!
Now that you know what it takes, just pick a client to start using Nostr!
Finding people to follow If you know someone that is on Nostr, start by following them, then look at whom they are following and whom they are interacting with, and sooner rather than later you'll have a bunch of followers and a community for yourself inside Nostr.
Otherwise, you can always take a look at trending posts and people and get people from there.
-
@ 7d33ba57:1b82db35
2025-04-18 18:46:56Regensburg is a UNESCO World Heritage city and one of Germany’s most beautifully preserved medieval towns. Nestled on the Danube River in Bavaria, this lively university city blends 2,000 years of history with a fresh, modern vibe—perfect for lovers of architecture, riverside cafés, and old-world charm.
🏰 Top Things to Do in Regensburg
🌉 Stone Bridge (Steinerne Brücke)
- Built in the 12th century and still standing strong
- Offers sweeping views of the old town and river
- Once the only crossing of the Danube for hundreds of miles
⛪ Regensburg Cathedral (Dom St. Peter)
- A towering masterpiece of Gothic architecture
- Home to the Regensburger Domspatzen, one of the world’s oldest boys’ choirs
- Intricate stained glass and dramatic spires—don’t miss it!
🏛️ Old Town (Altstadt)
- Winding alleys, colorful facades, Roman ruins, and medieval towers
- Full of hidden courtyards, shops, and traditional Bavarian restaurants
- Look for the Porta Praetoria, a Roman gate from 179 AD
🏰 St. Emmeram's Abbey & Thurn and Taxis Palace
- A former Benedictine monastery turned into a princely palace
- Guided tours show the lavish rooms and tell tales of European royalty
- The family still lives there today!
🍽️ What to Eat & Drink
- Regensburger Wurst – A smoky local sausage, often grilled
- Grab a bite at the Historic Sausage Kitchen (Wurstkuchl), open since the 1100s!
- Pair your meal with a Bavarian beer from Weltenburg or Spital Brewery
🚶♀️ Riverside Walks & Day Trips
- Stroll or bike along the Danube Promenade for peaceful views
- Take a boat trip to Walhalla, a neoclassical temple overlooking the river
- Visit Weltenburg Abbey, the oldest monastic brewery in the world, nestled in the Danube Gorge
📅 Best Time to Visit
- May–September: Ideal weather, open-air events, and vibrant street life
- December: Magical Christmas markets with mulled wine and lights in the medieval square
- Shoulder seasons: Quieter, but still gorgeous
🛤️ Getting There
- Just 1.5 hours by train from Munich
- The old town is compact and walkable—no car needed
-
@ 75c02714:0e216b7e
2025-04-18 17:57:55QH99 nổi bật như một hệ sinh thái kỹ thuật số được thiết kế tinh tế nhằm mang lại trải nghiệm mượt mà, hiệu quả và mang tính cá nhân hóa cao cho người dùng trong thời đại số. Với một giao diện thân thiện và bố cục thông minh, nền tảng giúp người dùng dễ dàng tiếp cận các tính năng quan trọng mà không cần mất thời gian làm quen. Khả năng tương thích linh hoạt trên nhiều thiết bị — từ điện thoại thông minh, máy tính bảng đến máy tính để bàn — giúp người dùng có thể truy cập mọi lúc, mọi nơi mà không bị gián đoạn hay thay đổi trải nghiệm. Điều đặc biệt là QH99 liên tục cải tiến công nghệ giao diện dựa trên phản hồi thực tế từ cộng đồng người dùng, từ đó tối ưu hóa các nút chức năng, tốc độ tải trang và khả năng hiển thị nội dung sao cho vừa đẹp mắt vừa dễ sử dụng. Nhờ vậy, mỗi lần truy cập vào QH99 luôn mang đến cảm giác mới mẻ nhưng vẫn quen thuộc, cho phép người dùng thao tác nhanh gọn, tiết kiệm thời gian và tăng cường sự tập trung vào mục tiêu chính.
Không chỉ chú trọng đến trải nghiệm người dùng, QH99 còn đầu tư sâu vào nền tảng công nghệ và bảo mật dữ liệu. Mọi thao tác và luồng thông tin đều được xử lý qua các lớp mã hóa hiện đại, đảm bảo tuyệt đối về quyền riêng tư và tính an toàn trong mọi tình huống. Hệ thống được xây dựng dựa trên cấu trúc máy chủ hiệu năng cao, có khả năng xử lý lưu lượng truy cập lớn một cách trơn tru và nhanh chóng. Ngoài ra, QH99 còn tích hợp các thuật toán thông minh giúp tự động phát hiện và ngăn chặn các hành vi bất thường, từ đó giảm thiểu rủi ro và duy trì trạng thái ổn định cho toàn bộ nền tảng. Những cơ chế phòng ngừa này không chỉ mang tính kỹ thuật mà còn được hỗ trợ bởi đội ngũ chuyên môn túc trực liên tục nhằm theo dõi, nâng cấp và tối ưu hệ thống theo thời gian thực. Sự đầu tư bài bản vào bảo mật và vận hành như vậy chính là yếu tố nền tảng giúp QH99 xây dựng được niềm tin lâu dài từ cộng đồng người dùng rộng lớn.
Hơn cả một nền tảng công nghệ thông minh, QH99 còn đóng vai trò như một người đồng hành đáng tin cậy trong hành trình số hóa cá nhân của mỗi người dùng. Với định hướng phát triển bền vững và tầm nhìn chiến lược rõ ràng, QH99 không ngừng cập nhật những xu hướng công nghệ mới nhất, từ trí tuệ nhân tạo, học máy đến phân tích dữ liệu lớn để mang lại những giá trị thiết thực trong từng tương tác. Hệ thống liên tục học hỏi từ thói quen và nhu cầu của người dùng, từ đó đưa ra những đề xuất thông minh, giúp cá nhân hóa trải nghiệm ở mức độ sâu hơn. Đây chính là sự khác biệt khiến QH99 trở thành một nền tảng không chỉ phục vụ mà còn hiểu và phát triển cùng người dùng. Trong bối cảnh công nghệ ngày càng bùng nổ, QH99 đang chứng tỏ rằng mình không chỉ theo kịp xu thế mà còn tiên phong tạo ra chuẩn mực mới cho sự kết nối và trải nghiệm số hiện đại.
-
@ 75c02714:0e216b7e
2025-04-18 17:57:11MU8 được thiết kế như một nền tảng công nghệ mang tính đột phá, nơi mọi trải nghiệm của người dùng được cá nhân hóa và tối ưu hóa đến từng chi tiết nhỏ nhất. Với mục tiêu mang lại sự tiện lợi và linh hoạt tối đa, MU8 không ngừng hoàn thiện giao diện người dùng, tập trung vào tốc độ truy cập, độ phản hồi cao và khả năng thích ứng với đa dạng thiết bị. Người dùng có thể dễ dàng thao tác trên điện thoại di động, máy tính bảng hay máy tính để bàn mà không gặp phải sự gián đoạn nào trong quá trình sử dụng. Bố cục giao diện được bố trí trực quan, màu sắc hài hòa và nút chức năng rõ ràng giúp người dùng dễ dàng điều hướng và tìm thấy thông tin một cách nhanh chóng. Hơn nữa, hệ thống được lập trình để ghi nhớ các hành vi sử dụng quen thuộc của từng người dùng, từ đó đề xuất những tùy chọn phù hợp, góp phần rút ngắn thời gian thao tác và nâng cao hiệu suất trải nghiệm tổng thể.
MU8 cũng đặc biệt chú trọng đến vấn đề an toàn thông tin và độ ổn định của nền tảng — hai yếu tố then chốt làm nên uy tín trong môi trường số hiện đại. Mọi dữ liệu và thông tin cá nhân đều được xử lý qua hệ thống mã hóa đa lớp, đảm bảo không thể bị truy cập trái phép hoặc thất thoát trong bất kỳ tình huống nào. Nền tảng được xây dựng trên hạ tầng máy chủ hiện đại, kết hợp với các thuật toán giám sát hoạt động thông minh nhằm nhanh chóng phát hiện và xử lý các rủi ro tiềm ẩn trước khi chúng ảnh hưởng đến người dùng. Điều này tạo nên một hệ thống vận hành ổn định, tin cậy, giúp người dùng yên tâm sử dụng các tính năng trong suốt thời gian dài mà không gặp trở ngại kỹ thuật. Bên cạnh đó, đội ngũ hỗ trợ kỹ thuật luôn túc trực 24/7 để giải đáp mọi thắc mắc và xử lý sự cố một cách nhanh chóng, đảm bảo người dùng luôn cảm nhận được sự đồng hành chuyên nghiệp và chu đáo.
Ngoài những ưu điểm vượt trội về mặt kỹ thuật và bảo mật, MU8 còn nổi bật nhờ khả năng liên tục cập nhật và nâng cấp để đáp ứng nhu cầu ngày càng cao của người dùng trong thời đại công nghệ phát triển không ngừng. Mỗi lần cập nhật đều được thực hiện dựa trên những phản hồi thực tế từ cộng đồng sử dụng, đảm bảo rằng mọi cải tiến đều mang lại giá trị thiết thực, từ tính năng mới cho đến trải nghiệm người dùng mượt mà hơn. Hệ thống đề xuất thông minh, tùy chỉnh giao diện theo sở thích cá nhân và khả năng tích hợp công nghệ mới như AI hay dữ liệu lớn chính là minh chứng cho định hướng phát triển lâu dài của MU8. Trong tương lai gần, MU8 không chỉ là nền tảng số mạnh mẽ mà còn là người bạn đồng hành đáng tin cậy, giúp người dùng hiện đại chủ động hơn trong việc tiếp cận công nghệ và khai thác tối đa tiềm năng từ không gian kỹ thuật số ngày càng đa chiều.
-
@ 75c02714:0e216b7e
2025-04-18 17:55:51BL555 không chỉ đơn thuần là một nền tảng số với giao diện thân thiện và dễ sử dụng, mà còn là sự kết tinh của tư duy thiết kế hiện đại và công nghệ vận hành mạnh mẽ, phục vụ nhu cầu ngày càng cao và đa dạng của người dùng. Với mục tiêu tối ưu hóa trải nghiệm trong từng chi tiết, BL555 đã áp dụng những xu hướng giao diện mới nhất để đảm bảo mọi thao tác đều trực quan và mượt mà, bất kể người dùng đang sử dụng thiết bị nào. Giao diện của nền tảng này được sắp xếp hợp lý, dễ nắm bắt và tối ưu hóa khả năng phản hồi, giúp người dùng thao tác nhanh chóng, không bị rối mắt hay phải mất thời gian tìm kiếm thông tin cần thiết. Hệ thống menu được bố trí gọn gàng, tích hợp các tính năng hỗ trợ nhanh như tìm kiếm tức thời, điều hướng thông minh và phản hồi trực tiếp, tạo nên một không gian công nghệ thân thiện, phục vụ mọi đối tượng người dùng dù là mới làm quen hay đã quen thuộc với nền tảng số.
Yếu tố làm nên sự khác biệt nổi bật của BL555 chính là khả năng vận hành ổn định và mức độ an toàn được đầu tư nghiêm túc. BL555 xây dựng hệ thống dựa trên nền tảng công nghệ tiên tiến, ứng dụng các phương thức bảo mật đa tầng để đảm bảo an toàn tuyệt đối cho người dùng. Tất cả dữ liệu cá nhân và thông tin hoạt động đều được mã hóa theo chuẩn quốc tế, giúp ngăn ngừa tối đa nguy cơ bị đánh cắp hoặc rò rỉ thông tin. Hệ thống còn tích hợp các công cụ giám sát hoạt động 24/7, liên tục theo dõi hiệu năng cũng như khả năng phát hiện các hành vi bất thường. Khi có sự cố kỹ thuật xảy ra, đội ngũ kỹ thuật viên của BL555 sẽ ngay lập tức can thiệp và xử lý nhanh chóng nhằm duy trì sự ổn định cho toàn hệ thống. Sự kết hợp giữa công nghệ hiện đại và con người chuyên nghiệp đã biến BL555 trở thành một nền tảng đáng tin cậy, nơi mà người dùng có thể yên tâm trải nghiệm mà không phải lo lắng về vấn đề bảo mật hay hiệu năng.
Không dừng lại ở việc cung cấp một không gian kỹ thuật số mạnh mẽ, BL555 còn hướng đến việc xây dựng một cộng đồng người dùng bền vững thông qua việc lắng nghe và cải tiến liên tục. Nền tảng luôn chủ động cập nhật các xu hướng công nghệ mới, đồng thời bổ sung các tính năng phù hợp với phản hồi từ người dùng, nhằm đảm bảo rằng mọi cập nhật đều có giá trị thực tế và nâng cao trải nghiệm tổng thể. BL555 hiểu rằng trong thời đại công nghệ phát triển nhanh chóng như hiện nay, yếu tố con người và khả năng thích ứng là hai điểm then chốt quyết định sự thành công lâu dài. Vì vậy, nền tảng không ngừng hoàn thiện từ giao diện đến chức năng, từ dịch vụ hỗ trợ đến bảo mật, để trở thành một điểm đến lý tưởng cho mọi nhu cầu kết nối, sử dụng và phát triển không gian số cá nhân của người dùng. Trong hành trình phía trước, BL555 chắc chắn sẽ tiếp tục khẳng định vị thế của mình bằng chất lượng, sự chuyên nghiệp và tinh thần đổi mới không ngừng.
-
@ fd06f542:8d6d54cd
2025-04-12 03:16:30What is Nostr?
Nostr is a simple, open protocol that enables global, decentralized, and censorship-resistant social media.
nostr 是 去中心化的 抗审查的社交媒体。
去中心化,其实就是多中心化,这里中心就是relay 服务器。现在的nostr 网络上有很多relay服务器可以存储信息。 * 短文,就是写类似微博,朋友圈什么的。 * 长文,可以写长博客,写书什么的。 * 图片 和 视频 ,nostr社区有专门的 图片和视频服务器很多都是免费的,按照nostr协议上传即可。
Simple
The protocol is based on very simple & flexible event objects (which are passed around as plain JSON) and uses standard elliptic-curve cryptography for keys and signing. The only supported transport is websockets connections from clients to relays. This makes it easy to write clients and relays and promotes software diversity.
nostr的协议非常简单,客户端通过 event 的格式(json)打包通过websocket 和relay服务器交互。
将一个 短文传到 relay服务器,很多relay服务器都 无需任何权限。任何人都可以上传获取读取服务器内容。
协议中是通过加密签名的,因此发布者拥有每个event的所有权,是可以证实的。
Verifiable
Because Nostr accounts are based on public-key cryptography it's easy to verify messages were really sent by the user in question.
nostr的账户是基于密码学生成的,用户无需邮件和手机注册; 也许无需到任何服务器去注册。 这一点 非常的具有吸引力,就像每个人的BTC账户一样。非常的自由,让用户感觉的无比的的快捷。
!> 以上两点是深深吸引 nostr用户的地方。自由,而不伤害第三方。
Nostr: a quick introduction, attempt by fiatjaf
Nostr doesn't have a material existence, it is not a website or an app. Nostr is just a description what kind of messages each computer can send to the others and vice-versa. It's a very simple thing, but the fact that such description exists allows different apps to connect to different servers automatically, without people having to talk behind the scenes or sign contracts or anything like that.
When you use a Nostr client that is what happens, your client will connect to a bunch of servers, called relays, and all these relays will speak the same "language" so your client will be able to publish notes to them all and also download notes from other people.
That's basically what Nostr is: this communication layer between the client you run on your phone or desktop computer and the relay that someone else is running on some server somewhere. There is no central authority dictating who can connect to whom or even anyone who knows for sure where each note is stored.
If you think about it, Nostr is very much like the internet itself: there are millions of websites out there, and basically anyone can run a new one, and there are websites that allow you to store and publish your stuff on them.
The added benefit of Nostr is that this unified "language" that all Nostr clients speak allow them to switch very easily and cleanly between relays. So if one relay decides to ban someone that person can switch to publishing to others relays and their audience will quickly follow them there. Likewise, it becomes much easier for relays to impose any restrictions they want on their users: no relay has to uphold a moral ground of "absolute free speech": each relay can decide to delete notes or ban users for no reason, or even only store notes from a preselected set of people and no one will be entitled to complain about that.
There are some bad things about this design: on Nostr there are no guarantees that relays will have the notes you want to read or that they will store the notes you're sending to them. We can't just assume all relays will have everything — much to the contrary, as Nostr grows more relays will exist and people will tend to publishing to a small set of all the relays, so depending on the decisions each client takes when publishing and when fetching notes, users may see a different set of replies to a note, for example, and be confused.
Another problem with the idea of publishing to multiple servers is that they may be run by all sorts of malicious people that may edit your notes. Since no one wants to see garbage published under their name, Nostr fixes that by requiring notes to have a cryptographic signature. This signature is attached to the note and verified by everybody at all times, which ensures the notes weren't tampered (if any part of the note is changed even by a single character that would cause the signature to become invalid and then the note would be dropped). The fix is perfect, except for the fact that it introduces the requirement that each user must now hold this 63-character code that starts with "nsec1", which they must not reveal to anyone. Although annoying, this requirement brings another benefit: that users can automatically have the same identity in many different contexts and even use their Nostr identity to login to non-Nostr websites easily without having to rely on any third-party.
To conclude: Nostr is like the internet (or the internet of some decades ago): a little chaotic, but very open. It is better than the internet because it is structured and actions can be automated, but, like in the internet itself, nothing is guaranteed to work at all times and users many have to do some manual work from time to time to fix things. Plus, there is the cryptographic key stuff, which is painful, but cool.
诞生blog
https://fiatjaf.com/nostr.html
The simplest open protocol that is able to create a censorship-resistant global "social" network once and for all.
It doesn't rely on any trusted central server, hence it is resilient; it is based on cryptographic keys and signatures, so it is tamperproof; it does not rely on P2P techniques, therefore it works. ...
-
@ 000002de:c05780a7
2025-04-18 17:20:16"Focus on the things you are for, not the things you are against. Many people spend large chunks of their day thinking about what they hate. They are always telling you about something they dislike: this food, that subject, this political party, that coworker. You are more than your frustrations. Build your identity around what you love."
~ James Clear
I need to do better with this personally but its great food for thought.
originally posted at https://stacker.news/items/947407
-
@ 4cebd4f5:0ac3ed15
2025-04-18 16:02:42Tóm tắt Hackathon BUIDL BATTLE
BUIDL BATTLE | The Bitcoin Builders Tournament kết thúc với 81 dự án được phê duyệt từ 219 developer đăng ký. Sự kiện trực tuyến kéo dài 3 tuần này nhằm thúc đẩy đổi mới trên Bitcoin, mang đến cơ hội tiếp cận cộng đồng builders, nhà đầu tư và accelerator. Trọng tâm xoay quanh các chủ đề Bitcoin DeFi và Real World Utility, với tổng giải thưởng hơn 90.000 USD bao gồm tiền mặt, credit AWS và grants ICP. Những đột phá công nghệ nổi bật ứng dụng Stacks technology và sBTC.
Hackathon chia làm 2 vòng. Các dự án vào chung kết trình bày trước hội đồng giám khảo gồm VC và lãnh đạo ngành để chọn ra quán quân. Người tham gia nhận mentorship và workshop giá trị, đồng thời tăng khả năng gọi vốn ở vòng 2. Sự kiện được hỗ trợ bởi Stacks Foundation, AWS và đối tác, góp phần củng cố hệ sinh thái phát triển Bitcoin.
Các dự án đoạt giải
Bitcoin DeFi 2.0 Prize Winners
Hạng mục tập trung cải thiện scalability, security và user experience cho Bitcoin DeFi.
- BigMarket: Nền tảng prediction market phi tập trung tích hợp AI trên Layer 2 Stacks, vận hành bởi DAO để đưa dự đoán minh bạch.
- BitForward: Platform tạo hợp đồng kỳ hạn (forward contract) dựa trên NFT, xây dựng trên blockchain Stacks của Bitcoin.The 3.0 Digital Economy Prize Winners
Khám phá sự hội tụ của tài chính, giải trí và mạng xã hội trong hệ sinh thái MemeFi, SocialFi, GameFi.
- Kulture.Fun: Nền tảng SocialFi chat phi tập trung với tính năng token-gated và tích hợp Bitcoin.
- Skullcoin: Gamify hóa Bitcoin DeFi thông qua sBTC, kích hoạt thanh khoản BTC trong trò chơi.Real World Ordinals & NFT Usage Prize Winners
Ứng dụng NFT và Ordinals vượt khỏi phạm vi nghệ thuật truyền thống.
- Offers & Counter-offers | BNS One: Marketplace giao dịch tên BNS qua smart contract, loại bỏ trung gian.
- Truth-Chain: Xác minh nguồn gốc và tính xác thực của nội dung số trên nền tảng Stacks.Tooling & Infrastructure Prize Winners
Phát triển công cụ hỗ trợ xây dựng ứng dụng Web3.
- BLAZE PROTOCOL: Layer 2 cải thiện trải nghiệm Web3 với xác nhận giao dịch tức thì.
- PoXAgents: Sử dụng AI agents đơn giản hóa tương tác với Stacks Blockchain cho người dùng phổ thông.ICP Challenge Prize Winners
Tích hợp Internet Computer để giải quyết thách thức blockchain trong hệ sinh thái Bitcoin.
- ckBoost: Tăng tốc giao dịch Bitcoin trên Internet Computer thông qua liquidity pool.
- CounterpartyICP: Module quản lý smart contract và tài sản số trên Bitcoin qua Counterparty API.AWS - Buidl with Bedrock Challenge Prize Winner
Dự án ứng dụng công nghệ AWS.
- Stacks AI: Công cụ AI tạo, debug và học smart contract ngôn ngữ Clarity, sử dụng AWS Bedrock.Xem chi tiết dự án tại Dorahacks.
Về Nhà tổ chức
Stacks Foundation
Stacks Foundation tập trung phát triển Stacks blockchain – Bitcoin Layer 2 hàng đầu, hỗ trợ các dự án tận dụng bảo mật của Bitcoin để xây dựng Internet phi tập trung. Thông qua chương trình Stacks Accelerator, tổ chức đã thúc đẩy đổi mới và thu hút developer cho hệ sinh thái blockchain. Sứ mệnh hiện tại là cung cấp công cụ để phát triển ứng dụng user-owned, củng cố tầm nhìn về web phi tập trung.
-
@ fd06f542:8d6d54cd
2025-04-12 02:13:35 -
@ c631e267:c2b78d3e
2025-04-18 15:53:07Verstand ohne Gefühl ist unmenschlich; \ Gefühl ohne Verstand ist Dummheit. \ Egon Bahr
Seit Jahren werden wir darauf getrimmt, dass Fakten eigentlich gefühlt seien. Aber nicht alles ist relativ und nicht alles ist nach Belieben interpretierbar. Diese Schokoladenhasen beispielsweise, die an Ostern in unseren Gefilden typisch sind, «ostern» zwar nicht, sondern sie sitzen in der Regel, trotzdem verwandelt sie das nicht in «Sitzhasen».
Nichts soll mehr gelten, außer den immer invasiveren Gesetzen. Die eigenen Traditionen und Wurzeln sind potenziell «pfui», um andere Menschen nicht auszuschließen, aber wir mögen uns toleranterweise an die fremden Symbole und Rituale gewöhnen. Dabei ist es mir prinzipiell völlig egal, ob und wann jemand ein Fastenbrechen feiert, am Karsamstag oder jedem anderen Tag oder nie – aber bitte freiwillig.
Und vor allem: Lasst die Finger von den Kindern! In Bern setzten kürzlich Demonstranten ein Zeichen gegen die zunehmende Verbreitung woker Ideologie im Bildungssystem und forderten ein Ende der sexuellen Indoktrination von Schulkindern.
Wenn es nicht wegen des heiklen Themas Migration oder wegen des Regenbogens ist, dann wegen des Klimas. Im Rahmen der «Netto Null»-Agenda zum Kampf gegen das angeblich teuflische CO2 sollen die Menschen ihre Ernährungsgewohnheiten komplett ändern. Nach dem Willen von Produzenten synthetischer Lebensmittel, wie Bill Gates, sollen wir baldmöglichst praktisch auf Fleisch und alle Milchprodukte wie Milch und Käse verzichten. Ein lukratives Geschäftsmodell, das neben der EU aktuell auch von einem britischen Lobby-Konsortium unterstützt wird.
Sollten alle ideologischen Stricke zu reißen drohen, ist da immer noch «der Putin». Die Unions-Europäer offenbaren sich dabei ständig mehr als Vertreter der Rüstungsindustrie. Allen voran zündelt Deutschland an der Kriegslunte, angeführt von einem scheinbar todesmutigen Kanzlerkandidaten Friedrich Merz. Nach dessen erneuter Aussage, «Taurus»-Marschflugkörper an Kiew liefern zu wollen, hat Russland eindeutig klargestellt, dass man dies als direkte Kriegsbeteiligung werten würde – «mit allen sich daraus ergebenden Konsequenzen für Deutschland».
Wohltuend sind Nachrichten über Aktivitäten, die sich der allgemeinen Kriegstreiberei entgegenstellen oder diese öffentlich hinterfragen. Dazu zählt auch ein Kongress kritischer Psychologen und Psychotherapeuten, der letzte Woche in Berlin stattfand. Die vielen Vorträge im Kontext von «Krieg und Frieden» deckten ein breites Themenspektrum ab, darunter Friedensarbeit oder die Notwendigkeit einer «Pädagogik der Kriegsuntüchtigkeit».
Der heutige «stille Freitag», an dem Christen des Leidens und Sterbens von Jesus gedenken, ist vielleicht unabhängig von jeder religiösen oder spirituellen Prägung eine passende Einladung zur Reflexion. In der Ruhe liegt die Kraft. In diesem Sinne wünsche ich Ihnen frohe Ostertage!
[Titelbild: Pixabay]
Dieser Beitrag wurde mit dem Pareto-Client geschrieben und ist zuerst auf Transition News erschienen.
-
@ fd06f542:8d6d54cd
2025-04-12 01:32:38使用nostrbook.com网站
登录和创建用户:
登录按钮 ,可以粘贴 已有的 nsec....账号,完成登录。
注册:
可以点击红标位置 生成你的账户。 “确定” 完成注册。
创建书籍
封面的上传
创建书籍,可以用 微信截图 后直接 ctrl+v. 粘贴即可。
或者点击浏览 本地图片文件。
标题和作者
正常填写就可以。 书的作者和上传文件人没有一一绑定。
写书
创建完成后就可以写书了,写书入口在 登录处 “我的书籍” 。点进去会出现你创建的书籍。选择一本就可以写书了。
列出你创建的所有的书籍
点击图标,就可以进入开始写作了。例如《nostrbook站点日记》
如图所示有4个部分
- (1)关闭按钮,点击就退出编辑,这时候他会提示你保存,如果不需要保存退出,点击 “不保存退出”
- (2)
大纲
是编写 你书籍的大纲,这个参考 docsify文档 下面会有例子。时间排列
是 你所有为本书写的章节。但是有些章节你可能废弃了,或者暂时不想展示,都会存在 时间排列里面,就是按照你编写的时间倒序排列的。草稿
是你暂时存储的内容,没有上传到网络,存在你本地浏览器的缓存里面。 - (3)这个部分看到的就是你的章节列表,当让你第一次来的这个地方是空的。
新增章节
下一次就会有内容了。 - (4)文件名,是我们存储章节的唯一标识。
readme.md
和_sidebar.md
是系统默认必须有的。因为docsify技术默认需要这2个。
如何编写大纲
如果你是第一次开始,大纲的界面是这样的。
- 点击
增加大纲
- 点击
查看样例
- 修改系统生成的例子,此时 readme.md是必须的readme 对应的名字你可以自己修改
- 点击提交 就可以完成大纲了。
第二次、点击
更新大纲
按钮- [首页](/readme.md) - [国人开发者](/01.md) - [中文用户列表](/02.md)
大纲例子,“[]” 内是标题,“()”内是 文件名; 标题是是显示在文章的右侧; 文件名的作用是匹配 ‘新增章节’ 里面的markdown的相匹配关联的。
如何编写一个章节,例如:readme.md
* 点击
新增章节
* 填写标题 * 填写内容 * 关键是 填写文件名,需要和大纲里的名字对应 * 提交?> 如果你写的 章节 并没有在大纲里标识名字 ,用户在浏览的时候,左侧的章节并不会出现。
-
@ fd06f542:8d6d54cd
2025-04-12 01:21:03{"coverurl":"https://cdn.nostrcheck.me/fd06f542bc6c06a39881810de917e6c5d277dfb51689a568ad7b7a548d6d54cd/19105641454b483284cf76c42fbdde2ed3f47b1bb2a366a58eaa49630d385027.webp","title":"nostr-examples","author":"nostr-dev"}
-
@ fd06f542:8d6d54cd
2025-04-11 11:15:10Warning
unrecommended
: deprecated in favor of NIP-27NIP-08
Handling Mentions
final
unrecommended
optional
This document standardizes the treatment given by clients of inline mentions of other events and pubkeys inside the content of
text_note
s.Clients that want to allow tagged mentions they MUST show an autocomplete component or something analogous to that whenever the user starts typing a special key (for example, "@") or presses some button to include a mention etc -- or these clients can come up with other ways to unambiguously differentiate between mentions and normal text.
Once a mention is identified, for example, the pubkey
27866e9d854c78ae625b867eefdfa9580434bc3e675be08d2acb526610d96fbe
, the client MUST add that pubkey to the.tags
with the tagp
, then replace its textual reference (inside.content
) with the notation#[index]
in which "index" is equal to the 0-based index of the related tag in the tags array.The same process applies for mentioning event IDs.
A client that receives a
text_note
event with such#[index]
mentions in its.content
CAN do a search-and-replace using the actual contents from the.tags
array with the actual pubkey or event ID that is mentioned, doing any desired context augmentation (for example, linking to the pubkey or showing a preview of the mentioned event contents) it wants in the process.Where
#[index]
has anindex
that is outside the range of the tags array or points to a tag that is not ane
orp
tag or a tag otherwise declared to support this notation, the client MUST NOT perform such replacement or augmentation, but instead display it as normal text. -
@ 4cebd4f5:0ac3ed15
2025-04-18 15:28:02Tóm tắt Hackathon
Build & Brew - Espresso Global Hackathon thu hút 485 developer với 151 dự án vượt qua vòng sơ loại. Sự kiện do Espresso Network tổ chức, phân phối 100.000 USD giải thưởng qua hai hạng mục: "Caffeinate & Code" và "Cracking Composability", tập trung nâng cao composability của Ethereum và phát triển ứng dụng cross-chain sử dụng Espresso confirmations.
Thành tựu nổi bật bao gồm triển khai thành công rollups tích hợp với Espresso Network, hỗ trợ xây dựng ứng dụng interoperable. Các dự án ứng dụng Open Intents Framework để thiết kế kiến trúc ứng dụng tiên tiến, tận dụng xác nhận nhanh và bảo mật cho chức năng đa chuỗi.
Hackathon chứng minh tiềm năng của Espresso Network trong hệ sinh thái blockchain thông qua ứng dụng consensus layer vào kịch bản thực tế. Sự kiện đóng góp vào sứ mệnh tạo tương tác liền mạch giữa các blockchain và khẳng định vai trò quan trọng của developer trong phát triển composability. Các bài thuyết trình cuối cùng (7/4) cho thấy tiến triển ấn tượng trong mở rộng khả năng cross-chain của Ethereum.
Các dự án đoạt giải
Build & Brew Prize Winners
Build & Brew ghi nhận sự tham gia của 486 hacker và 156 dự án, trong đó 91 Arbitrum Orbit chains tích hợp Espresso được triển khai thành công, mở đường cho ứng dụng cross-chain sáng tạo. Tổng giải thưởng 65.000 USD được trao cho Testnet và Mainnet deployments.
Top dự án:
1. Giải Nhất - Affogato: Hệ thống Swap + Bridge nâng cao giao dịch cross-chain, sử dụng Ethereum rollups và Espresso confirmations để đảm bảo tốc độ và bảo mật.
2. Giải Nhì - Random Network: Tăng cường composability thông qua xác thực rollup liveness và open intents pool cho tích hợp đa hệ thống.
3. Giải Ba - Disburse Network: Giao thức thanh toán module hỗ trợ mass payments cross-chain một-click qua kiến trúc Nitro rollup.
4. Giải Tư - Coffee Chain: Ứng dụng thanh toán cross-chain cho phép merchant nhận crypto bằng mọi token/blockchain.
5. Giải Năm - GTXpresso: Dự án Central Limit Order Book (CLOB) cross-chain (đang phát triển).Xem toàn bộ dự án tại Build and Brew Hackathon trên DoraHacks.
Về Nhà tổ chức
Espresso
Espresso là giao thức xây dựng khối được đồng bộ hóa (coordinated block building), cho phép các blockchain hoạt động như một hệ thống thống nhất. Tổ chức nổi tiếng với giải pháp blockchain hiệu quả, khả năng mở rộng, tập trung vào bảo mật và khả năng tiếp cận. Thành tựu đáng chú ý bao gồm triển khai consensus mechanisms cải thiện tốc độ giao dịch và giảm chi phí điện toán. Hiện tại, Espresso tập trung tối ưu hóa cơ sở hạ tầng blockchain để thúc đẩy ứng dụng và hỗ trợ chuyển đổi số toàn ngành.
-
@ 872982aa:8fb54cfe
2025-04-11 03:30:48{"coverurl":"https://cdn.nostrcheck.me/872982aa37b864973a389d465bc6ed5045a78586496d104e05f39b8d8fb54cfe/e6d4161955877a472f69b7ed27230e8677da2a3f3fb8ae0b472816852111cb38.webp","title":"设计艺术和配色","author":"彩色盒子"}
-
@ dab6c606:51f507b6
2025-04-18 14:59:25Core idea: Use geotagged anonymized Nostr events with Cashu-based points to snitch on cop locations for a more relaxed driving and walking
We all know navigation apps. There's one of them that allows you to report on locations of cops. It's Waze and it's owned by Google. There are perfectly fine navigation apps like Organic Maps, that unfortunately lack the cop-snitching features. In some countries, it is illegal to report cop locations, so it would probably not be a good idea to use your npub to report them. But getting a points Cashu token as a reward and exchanging them from time to time would solve this. You can of course report construction, traffic jams, ...
Proposed solution: Add Nostr client (Copstr) to Organic Maps. Have a button in bottom right allowing you to report traffic situations. Geotagged events are published on Nostr relays, users sending cashu tokens as thank you if the report is valid. Notes have smart expiration times.
Phase 2: Automation: Integration with dashcams and comma.ai allow for automated AI recognition of traffic events such as traffic jams and cops, with automatic touchless reporting.
Result: Drive with most essential information and with full privacy. Collect points to be cool and stay cool.
-
@ 872982aa:8fb54cfe
2025-04-11 03:20:33{"coverurl":"https://cdn.nostrcheck.me/872982aa37b864973a389d465bc6ed5045a78586496d104e05f39b8d8fb54cfe/2d173d2aabda99d75f054da0ac0bf04e67c58b09af84ae0765dcf904516da75d.webp","title":"Nostr protocol4","author":"fiatjaf"}
-
@ 7bc05901:8c26d22b
2025-04-18 17:58:53I was happy with my apple devices and conducting my life out in the open. Even when I was conducting quasi-legal retail operations, I always depended on the constitution to protect me from unreasonable searches and seizures. If I ever got busted, I figured I would just force the prosecution to take me through piece by piece every part of law enforcement's evidence gathering operations, which (especially with the local law enforcement in rural Missouri) likely would have trampled my civil rights. In retrospect, I was probably a lot more vulnerable than I wanted to admit, but this was years ago and I think I was tempting fate recreationally. I also imagined that a jury would never render a verdict against me, even with good evidence. And if they did, I would appeal it. Law school taught me to see the system as much more pliable than law enforcement wants anyone to think it is. Lacking shame is also an endearing quality.
One thing I spent a lot of time thinking about during these years, despite my stubborn insistence that everything would work out okay (which it mostly did), was my digital vulnerability. I was careful with what was said, how it was said, who is was said to. But never careful enough, and given the gist of the last few years and Big Tech's coziness with law enforcement, I should have abandoned most of my devices way sooner.
Now, I no longer run an illicit Farmer's Market, but I am endlessly interested in erasing my fingerprints from prying eyes -- government or otherwise. That said, I don't mind having my name attached to my ideas. I recently convinced a friend to join Nostr and when he saw I was using my real name he couldn't believe it. If I was starting social media cold, I would encourage people to maintain a pseudonym. I have pseudonyms in various corners of the internet. They are probably too leaky to overcome basic scrutiny from a moderate hacker, but they give me a little distance. Probably my willful ignorance cropping up here again, but I live by a phrase I heard in a Sherlock Holmes film once: "It's so over: it's covert." I just figure I can say and do enough to obfuscate my activities if someone tries to nail me down at some point. But, deeper than that, I can stop gladly handing over any trust to corporations that have a record of prying and spying.
I don't trust Windows. I don't really trust Apple, although I remember the landmark case with the Sandy Hook shooter's phone, where Apple was refusing to unlock the thing. This gave me a bit of trust, but you can just feel the fingers of the company all over your devices. I also lost a lot of trust in Apple during the previous presidential campaign politics where every headline that was pushed from the Apple news app was overwhelmingly anti-Trump. I am not the biggest Trump guy by ANY stretch, but I found this to be just way too heavy-handed for what should be a politically agnostic news pushing application.
I definitely don't trust any centralized social media. Facebook has burned so much trust over the years it is laughable that they control rural communities the way they do. When the cat is out of the bag on Nostr, I hope there is a mass exodus. It won't be a mass exodus, but even a slow and progressive exodus would be fine. Starve out the big guys. Don't give them the data and the clicks.
Twitter feels better, but not by a ton. There is enough of a desire to be the "everything app" that i don't want any part of it anymore. Also, the free tier is shit -- I had premium plus for a while until the last couple of months when the price went way up, and it was unclear whether I had access to the full AI features of Grok, so I ditched it. About the same time I became active on Nostr, so it hasn't bothered me much.
I'm not full carnivore, but I have eaten more steaks in the last year than in the past. I'm not full open source, but I am weaning myself off the spy-machines.
I will be installing Linux on my PC (once my graphic card gets here from Germany), and it will be slow and probably painful at times, but I am getting away from it. I will also be installing GrapheneOS on my backup phone, so that I am familiar and accustomed to escaping the ivory towers in that realm too.
Little by little, but it's hard to overstate how much more hopeful life feels when you rebel against the digital overlords. Open-source money is better, so might as well bitcoin-ify the rest of my networks, too.
-
@ 872982aa:8fb54cfe
2025-04-11 02:37:15{"coverurl":"https://cdn.nostrcheck.me/872982aa37b864973a389d465bc6ed5045a78586496d104e05f39b8d8fb54cfe/1c39bd6f09aca6e9f20f7399809a547950069d06a68b78f565fbfab4b14ec93c.webp","title":"竹林的声音2","author":"花花的作者"}
-
@ a7f85dfe:27305a2b
2025-04-11 00:41:45 -
@ 4cebd4f5:0ac3ed15
2025-04-18 14:54:14Tóm tắt Hackathon
UofTHacks 12 – một trong những hackathon đầu tiên tại Canada do sinh viên tự tổ chức – vừa kết thúc thành công với 339 lập trình viên đăng ký và 131 dự án được phê duyệt. Sự kiện kéo dài 36 giờ tại chỗ, tập trung vào hợp tác giữa developers, designers và entrepreneurs để biến ý tưởng thành sản phẩm thực tế.
Giải thưởng hấp dẫn như Meta Quest 3S VR Headsets cùng các track/bounty đa dạng thu hút sự tham gia. Sự kiện nhận tài trợ từ Tech@RBC, Ubisoft, 1Password, Google DeepMind và đối tác học thuật, tạo môi trường networking chất lượng.
Dù không tiết lộ chi tiết dự án, UofTHacks 12 khẳng định tác động qua quy mô tham gia và sự ủng hộ của cộng đồng, phản ánh hệ sinh thái hỗ trợ đam mê công nghệ. Người tham gia có thể theo dõi sự kiện tiếp qua kênh MXH của UofTHacks.
Các dự án đoạt giải
General Prize Winners
- Persona: Công cụ học ngôn ngữ AI-driven kết hợp computer vision, neural networks và 3D animation để dạy kèm cá nhân hóa.
- Twirl: AI chuyển đổi văn bản thành mô hình 3D, đơn giản hóa in 3D cho người không chuyên.
- Phish-Eye Lens: Web app mô phỏng trải nghiệm hacker qua puzzle để giáo dục an ninh mạng.
Ig Nobel Prize-Inspired Award Winners
- MomTellMeTo.Study: Tích hợp lịch học cá nhân với lời nhắc "mang hơi hướng mẹ" để tăng động lực.
Best "University of Toronto" Hack Prize Winners
- YouLingo: Chuyển đổi video YouTube thành bài học ngôn ngữ tùy chỉnh.
Best Beginner Hack Prize Winners
- One Million Notes: Nền tảng chia sẻ trải nghiệm toàn cầu qua ghi chú.
- bluequest - Campus Exploration App: Game hóa khám phá khuôn viên trường bằng điểm kinh nghiệm (XP).
Best Security Hack Prize Winners
- Off the Hook: Game tương tác giáo dục về phishing qua góc nhìn nạn nhân và hacker.
Young, Smart, & Financially Savvy Prize Winners
- RBveal: Mô phỏng phishing bằng AI để giáo dục sinh viên.
- FlowShield: Nền tảng phát hiện gian lận cho merchant qua phân tích dữ liệu giao dịch.
Best Domain Name from GoDaddy Registry Prize Winners
- SnapQuest: Gợi ý chụp ảnh theo địa điểm để khám phá và chia sẻ cảnh quan.
Best Use of Midnight Prize Winners
- Scribble: Ứng dụng AR gắn nội dung địa lý với zk-proof đảm bảo privacy.
Best Use of Terraform Prize Winners
Best AI Project with Databricks Open Source Prize Winners
- Pitch, Please: Mô phỏng thuyết trình thời gian thực với feedback AI.
Best Use of Generative AI Prize Winners
Best Developer Tool Prize Winners
- CodeView: Công cụ phân tích code viết tay, tạo bình luận, đánh giá chất lượng và chuyển pseudocode sang Python.
Xem danh sách dự án đầy đủ tại UofTHacks BUIDL.
Về Nhà tổ chức
UofTHacks
UofTHacks thúc đẩy đổi mới công nghệ và hợp tác tại Đại học Toronto, nổi tiếng với các hackathon kết nối sinh viên và chuyên gia để giải quyết vấn đề thực tế. Tổ chức có chuyên môn trong lĩnh vực blockchain và xu hướng công nghệ mới, đã tổ chức nhiều sự kiện thành công. UofTHacks hướng đến mở rộng phạm vi, nâng cao kỹ năng công nghệ cho thế hệ developers tương lai.
-
@ 5d4b6c8d:8a1c1ee3
2025-04-18 14:45:15We have playoff contests galore (https://stacker.news/items/947140/r/Undisciplined, https://stacker.news/items/943657/r/Undisciplined, https://stacker.news/items/945970/r/Undisciplined, https://stacker.news/items/945376/r/Undisciplined), which of course means we also have lots of playoff action to cover.
There are also several regular season contests going on (https://stacker.news/items/947153/r/Undisciplined, https://stacker.news/items/946412/r/Undisciplined, https://stacker.news/items/945561/r/Undisciplined, https://stacker.news/items/943383/r/Undisciplined), as well as the mish mash of events in the USA vs the world.
@BlokchainB posted some ideas for fixing the NBA and some of them seem promising. What really needs to be fixed?
@Coinsreporter has taken it upon himself to help us make smart decisions at Predyx. There are also some new exciting markets we want to talk about, plus just catch up on how our degeneracy is going.
The NFL Draft is this week. Stackers made their surprise picks. It's not too late to add yours to the mix. @grayruby also has some 49ers trade proposals for the Raiders number 6 pick. It'll be a tough sell.
The MLB is preposterously unbalanced. In @grayruby's words "The American League sucks".
Plus, whatever Stackers put in the comments.
Last, but not least, thank you to our listeners and supporters. As I write this, we're the #38 podcast on Fountain and Episode 27 is the #38 episode.
originally posted at https://stacker.news/items/947216
-
@ e8744882:47d84815
2025-04-18 10:00:07Introduction
In today’s data-driven world, the right data analyst company can be the key to unlocking actionable insights that fuel business growth. But how do you choose the best partner for your business? The process of hiring a data analytics consulting firm is critical, and asking the right questions will help you find a firm that aligns with your needs.
In this listicle, we’ll explore the 15 essential questions to ask before hiring a data analytics consulting firm. These questions will guide you in evaluating their expertise, tools, security practices, and ability to meet your business goals.
1. What Analytics Methodologies and Tools Do You Use?
The tools and methodologies a data analytics consulting firm uses will directly impact the quality of your insights. Ensure that they use modern, scalable platforms such as Python, R, Tableau, or Power BI, and ask for examples of successful projects where these tools have been applied.
2. Can You Share Case Studies or Success Stories?
Past success stories are a reflection of a data analyst company’s capabilities. Ask for industry-specific case studies to ensure they have experience handling the unique challenges of your sector. A company with proven expertise in your field will be better equipped to address your business’s needs.
3. How Do You Stay Updated with New Trends in Data Analytics?
The field of data analytics is constantly evolving. Ask about how the data analytics consulting firm stays current with the latest trends, tools, and technologies. A company that invests in continuous learning and development is likely to provide cutting-edge solutions that drive innovation.
4. What’s Your Approach to Turning Data Into Actionable Insights?
It’s not just about collecting data; it’s about transforming it into something useful. Ask how the data analyst company converts raw data into actionable business strategies. The best companies will provide clear insights and recommendations that align with your objectives.
5. How Do You Ensure Data Quality and Preparation?
High-quality data is essential for accurate analysis. Ask whether the data analyst company has robust data cleaning and preparation processes in place to ensure they maintain data integrity and avoid errors that could skew results. A solid approach to data preparation is key to achieving reliable outcomes.
6. How Do You Safeguard Data Privacy and Security?
Data security should be top of mind when choosing a data analytics consulting firm. Inquire about their data protection practices, including encryption, access controls, and cybersecurity measures. A reputable company will have robust protocols to ensure the security and confidentiality of your data.
7. What Certifications and Compliance Standards Do You Hold?
Certifications such as ISO 27001 or compliance with GDPR, HIPAA, and other regulations are a must for protecting sensitive information. Verify that the data analyst company adheres to industry standards and legal requirements to ensure your data is in safe hands.
8. What’s Your Approach to Data Governance and Risk Mitigation?
Data governance involves managing data quality, accessibility, and security. Ask the data analytics consulting firm about their risk management strategies and how they handle potential data-related challenges. This ensures they have a solid plan in place to mitigate risks and maintain data integrity.
9. How Will You Handle Potential Data Breaches or Cybersecurity Threats?
No one can predict a data breach, but the right data analyst company should have a response plan. Ask how they would address and resolve security incidents. A good company will have protocols in place to quickly detect, contain, and resolve cybersecurity issues.
10. How Do You Customize Solutions to Fit Our Unique Business Needs?
Every business is different, and so are its data analytics needs. Ask how the data analyst company or consulting firm tailors their solutions to fit your specific objectives. A customizable approach will ensure that their services provide the most value and are aligned with your business goals.
11. What’s Your Process for Integrating Analytics Into Existing Systems?
The success of data analytics hinges on how well it integrates with your current systems. Ask the data analytics consulting firm about their integration process to ensure smooth collaboration with your existing workflows. The more seamless the integration, the more impactful the insights will be.
12. How Do You Measure the Success of Data Analytics Projects?
Setting clear metrics and KPIs is crucial for evaluating the effectiveness of data analytics. Ask how the data analyst company measures the success of their projects and how they ensure that their solutions deliver tangible results. This will help you gauge whether their approach aligns with your business objectives.
13. How Do You Scale Analytics Solutions as We Grow?
Scalability is key for businesses that plan to expand. Ask how the data analyst company or consulting firm’s analytics solutions can grow alongside your business. A flexible partner will be able to adapt their solutions to meet future needs and keep pace with your growth.
14. How Do You Ensure That Insights Are Actionable and Aligned With Business Goals?
The ultimate goal of data analytics is to drive business decisions. Ask how the data analytics consulting firm ensures that their insights are practical and directly tied to your business goals. This will help you determine whether they can turn data into strategic decisions that impact your bottom line.
15. How Will You Support Us After the Project Is Complete?
Data analytics is an ongoing process. Inquire whether the data analyst company offers post-project support, including training, reporting, and updates. Continued support will ensure you’re able to maximize the value of the analytics solutions over time.
Conclusion
Choosing the right data analytics consulting firm is a crucial step toward unlocking the full potential of your business’s data. By asking these 15 essential questions, you can ensure that you partner with a data analyst company that not only has the expertise but also understands your specific needs and goals.
Take the time to perform thorough due diligence, and you’ll be well on your way to transforming your data into valuable business insights that fuel growth and success.
Looking for a trusted data analytics consulting firm? Reach out today to discuss how our customized analytics solutions can help your business achieve its goals.
-
@ a7f85dfe:27305a2b
2025-04-11 00:38:511.更改bios,usb启动
根据自己电脑的要求进入bios,选择优先usb启动。
2.安装系统
傻瓜式,安装proxmox。网络设置部分,建议直接插线联网,系统会根据现有网络分配IP网关信息,方便服务器开始运行时可其他电脑可以通过IP地址访问。
3.挂载硬盘
安装成功后,通过其他电脑访问服务器IP,进入图形管理界面。可以看到这时将系统盘分为local 跟local-lvm。其他硬盘得先挂载才能进行pve管理。
1.列出可用硬盘及目录地址,如果硬盘有多个分区,需要删除分区的话
fdisk -l
fdisk /dev/sda #你硬盘的地址 m #查看文档 d # 列出分区号码,选择删除的分区 n #创建分区 p #创建主分区 w #写入分区
2. 格式化分区系统mkfs -t ext4 /dev/sda1
- 挂载硬盘
mkdir /mnt/data mount -t ext4 /dev/sda1 /mnt/data
4.开机自动挂载
lsblk #查看硬盘和分区
sudo blkid # 查看硬盘的uuid
sudo vi /etc/fstab #打开fstab文件
添加如下一行UUID=你的硬盘ID /mnt/data ext4 defaults 0 2
测试挂载sudo mount -a #如果没有显示错误信息就是挂载正确
- 挂载硬盘
-
@ 872982aa:8fb54cfe
2025-04-09 05:41:40茶业
-
@ 5d4b6c8d:8a1c1ee3
2025-04-18 13:33:54This is our fastest turnaround. The 1st round of the playoffs starts tomorrow and the Play-In Tournament doesn't end until tonight.
We don't know the 8th seeds yet but all the other matchups are set. Don't forget to set your brackets for the Playoff Bracket Challenge, either.
Matchups (seed)
Clippers (5) @ Nuggets (4) Bucks (5) @ Pacers (4) Timberwolves (6) @ Lakers (3) Pistons (6) @ Knicks (3) Warriors (7) @ Rockets (2) Magic (7) @ Celtics (2) TBD (8) @ Thunder (1) TBD (8) @ Cavaliers (1)
You need to select one team from this round to win their series. You also need to predict who will be the highest scoring player in this round. You have until tip-off to select a team or player.
Scoring this round 1 Point for your team winning + Your team's seed if they win + 1 Point for picking the correct top scorer
This round has a maximum of 10 points.
Prize 10k sats (or sum of zaps on contest posts, whichever is larger)
cc: @gnilma, @BlokchainB, @grayruby, @Carresan, @fishious, @Coinsreporter, @WeAreAllSatoshi
originally posted at https://stacker.news/items/947140
-
@ fbf0e434:e1be6a39
2025-04-18 09:59:51Hackathon 概要
Build & Brew - Espresso Global Hackathon 吸引了485位开发者,共有151个项目获得批准。活动由 Espresso Network 主办,通过两个赛道“Caffeinate & Code”和“Cracking Composability”分发了总计100,000美元的奖品。主要目标包括提升以太坊的可组合性以及开发使用 Espresso 确认的新型跨链应用。
此次活动取得了显著成就,其中包括部署与 Espresso Network 集成的功能性 rollup,为开发互操作应用提供了支持。创新重点在于利用快速、安全的确认实现跨链功能。多个项目使用了 Open Intents Framework 来构建高级应用架构。
Hackathon 展示了 Espresso Network 对区块链生态系统的潜在影响,通过将其共识层应用于实际场景。此事件为网络的使命助力,使区块链之间的交互更加无缝,并突显了开发者在推动可组合性方面的重要角色。4月7日的最终演示展示了在开发以太坊跨链能力方面的显著进展。
Hackathon 获奖者
首届 Build & Brew 黑客松落幕时,91 条集成 Espresso 的 Arbitrum Orbit 链成功完成部署,为创新跨链应用开辟了道路。活动设置总额 65,000 美元的奖池,彰显其行业影响力,奖金根据测试网和主网的部署成果分级发放。
获奖项目
第1名 - Affogato
Affogato 是一个 Swap + Bridge 系统,利用以太坊 rollup 和 Espresso 确认来确保安全高效的跨链交易。
第2名 - Random Network
该项目通过使用 rollup 活跃性验证来增强可组合性,并采用开放意图池来实现系统间的无缝集成。
第3名 - Disburse Network
Disburse Network 提供了一种模块化支付协议,通过 Nitro rollup 架构实现一键跨链大规模支付,提高了支付处理效率。
第4名 - Coffee Chain
Coffee Chain 是一个跨链支付应用程序,可以让商家无缝接受任何代币或区块链的加密支付。
第5名 - GTXpresso
目前作为未完成的占位符,GTXpresso 是一个跨链的中央限价订单簿(CLOB)项目。
要查看 Hackathon 的所有项目,请访问 Build and Brew Hackathon on DoraHacks。
关于组织者
Espresso
Espresso 专注于推进区块链领域的技术。该组织以其在创建高效、可扩展的区块链解决方案方面的专业知识而闻名,重点在于安全性和用户可访问性。主要成就包括部署创新的共识机制,这些机制提高了交易速度并降低了计算成本。Espresso 参与合作项目,致力于将区块链技术整合到各个行业,巩固其作为技术进步重要贡献者的地位。目前,Espresso 正专注于优化区块链基础设施,以推动普及并支持行业范围的数字化转型努力。
-
@ 872982aa:8fb54cfe
2025-04-09 05:40:27432143214321412
-
@ 5f078e90:b2bacaa3
2025-04-18 10:03:07This is a long form note written on Nostr using the Yakihonne.com client. The hope is that the "Hostr" bidirectional bridge will pick it up and then post it on the Hive blockchain under the @hostr account at https://hive.blog/@hostr
The bridge can listen for both kind 30023 (long form) Nostr notes or kind 1 (short form) and kind 30023 notes. This is using the "both" version (a kind 1 was already successfully tested and bridged).
This tool is very much underconstruction, beta, and being tested.
-
@ 7d33ba57:1b82db35
2025-04-18 09:56:09Bamberg is one of the most enchanting towns in Bavaria, known for its UNESCO-listed old town, picturesque half-timbered houses, cobbled streets, and unique smoked beer. Built on seven hills and straddling the Regnitz River, Bamberg has an irresistible old-world charm that feels straight out of a storybook.
🏰 Top Things to See in Bamberg
🏛️ Bamberg Old Town (Altstadt)
- One of Europe’s best-preserved medieval towns
- Wander its winding lanes, colorful buildings, and riverside walkways
- Don’t miss Obere Brücke, a bridge that cuts through the town with a Baroque Old Town Hall (Altes Rathaus) perched on an island
⛪ Bamberg Cathedral (Bamberger Dom)
- A majestic 13th-century cathedral with four spires
- Houses the Bamberg Horseman statue and the tombs of Pope Clement II and Emperor Henry II
🌉 Little Venice (Klein Venedig)
- A charming row of fishermen's houses along the river
- Perfect for a romantic stroll or a gondola-style boat ride
🏰 Altenburg Castle
- Perched on the highest of Bamberg’s seven hills
- Offers panoramic views over the city and surrounding countryside
- Great spot for photos and a beer at the rustic tavern
🍺 Smoke Beer & Beer Culture
- Bamberg is the capital of Franconian beer, home to 10 breweries
- Try the famous Rauchbier (smoked beer) at Schlenkerla, served straight from the barrel
- Don’t miss a beer tasting tour or visit the Franconian Brewery Museum
🌿 Nature & Walks
- Stroll along the Regnitz riverbanks or hike up through Stephansberg
- Explore the Hain Park, a green oasis perfect for picnics or renting paddle boats
🍽️ What to Eat
- Schäuferla (roast pork shoulder with crispy skin)
- Bamberger Hörnla (a local croissant-style pastry)
- Franconian bratwurst with sauerkraut
- Local cheeses and pretzels served in cozy beer gardens
📅 Best Time to Visit
- Spring–Autumn (May–Oct): Ideal for exploring on foot, enjoying beer gardens, and outdoor cafés
- December: Cozy Christmas markets light up the medieval streets
- Summer: Expect cultural festivals, riverside music, and sunny terrace vibes
🚉 Getting There
- Easily reached by train from Nuremberg (45 min) or Munich (2 hours)
- The historic core is very walkable—no car needed!
-
@ 872982aa:8fb54cfe
2025-04-09 03:47:17 -
@ f7f4e308:b44d67f4
2025-04-09 02:12:18https://sns-video-hw.xhscdn.com/stream/1/110/258/01e7ec7be81a85850103700195f3c4ba45_258.mp4
-
@ fbf0e434:e1be6a39
2025-04-18 09:52:24Hackathon 概述
BUIDL BATTLE | The Bitcoin Builders Tournament 共有 219 位开发者注册参与,最终 81 个项目通过审核。这场为期三周的线上活动旨在为建设者、投资者及加速器提供高曝光机会,推动比特币领域的创新发展。活动聚焦比特币 DeFi 与真实世界应用主题,参与者围绕超 9 万美元总奖金展开竞争,奖项涵盖现金、AWS 积分及 ICP 资助。值得关注的创新成果包括基于 Stacks 技术和 sBTC 的组件应用。
本次黑客松采用两轮赛制:决赛入围者需向由风险投资家与行业领袖组成的评审团展示项目,最终决出总冠军。参与者通过工作坊和导师指导获取专业见解,第二轮赛程进一步提升了项目曝光度与潜在融资机会。在 Stacks 基金会、AWS 等合作伙伴的支持下,活动不仅发掘了新生力量,更助力强化了比特币开发生态系统。
Hackathon 优胜者
比特币 DeFi 2.0 奖项得主
比特币 DeFi 2.0 侧重于提高可扩展性、安全性和用户体验。此类别的获奖者展示了显著的技术进步和创新解决方案,以应对这些挑战。
BigMarket:一个基于比特币 Layer 2 网络 Stacks 的去中心化、AI 启动的预测市场平台。由 DAO 运营,提供可靠的去中心化预测。
BitForward:一个去中心化平台,通过使用 Stacks 区块链创建比特币上的 NFT 支持的远期合约。
3.0 数字经济奖项得主
本类别考察通过将金融、娱乐和社会互动融合,形成以用户为驱动的生态系统,如 MemeFi、SocialFi 和 GameFi。
Kulture.Fun:一个去中心化的 SocialFi 聊天平台,具有代币门控访问和比特币支持的功能,以增强加密社区的互动。
Skullcoin:通过集成 sBTC 将游戏化引入比特币 DeFi,促进互动的游戏内体验和激活 BTC 的流动性。
真实世界序列号及 NFT 使用奖项得主
本类别关注除传统艺术和表情包之外的实用应用,鼓励探索 NFT 在不同领域的潜力。
Offers & Counter-offers | BNS One:一个市场,通过智能合约实现基于区块链的 BNS 名称交易,实现无信任交易。
Truth-Chain:利用区块链技术通过 Stacks 平台验证数字内容的真实性和来源。
工具与基础设施奖项得主
本部分的创新提供了去中心化应用开发所需的框架和协议,着重于 Web3 工具。
BLAZE PROTOCOL:通过 Layer 2 架构加强 Web3 体验,提供即时交易确认和无缝用户互动。
PoXAgents:使用 AI 代理简化非技术用户与 Stacks 区块链的互动。
ICP 挑战奖项得主
本类别的项目结合互联网计算机的进步,解决比特币生态系统中的常见区块链挑战。
ckBoost:加速互联网计算机上的比特币交易,通过流动资金池减少确认时间。
CounterpartyICP:通过一个接口对接 Counterparty API 的模块,促进比特币上的智能合约和数字资产管理。
AWS - Buidl with Bedrock 挑战奖项得主
重点关注利用 AWS 技术的项目,本类别展示了在坚实基础设施上建立的创新。
- Stacks AI:一个用于在 Clarity 中生成、调试和学习智能合约的 AI 工具,使用 AWS Bedrock 进行可扩展分析。
有关所有项目和创新的更多详细信息,请访问 Dorahacks。
关于组织者
Stacks Foundation
Stacks Foundation 致力于促进 Stacks 区块链的成长和发展。它支持各种利用比特币安全性来赋能去中心化互联网的项目。通过像 Stacks Accelerator 这样的计划,Foundation 通过推动创新和开发者参与对区块链生态系统做出了重大贡献。其当前使命聚焦于为开发者增强工具和资源以构建用户拥有的应用,强化其对去中心化网络的承诺。
-
@ 502ab02a:a2860397
2025-04-18 06:27:02AGEs กับการทอด เกิดขึ้นได้ไม่ว่าจะใช้ไขมันอะไร
ก่อนจะทำความรู้จักน้ำมันตัวต่อไป พอดีหลายคนมีคำถามว่า เมื่อเราต้องทอดอาหาร ควรใช้น้ำมันอะไรถึงจะดีต่อสุขภาพ? เป็นคำถามที่ตอบยาก เพราะแม้จะเลือกใช้น้ำมันที่ดูเหมาะสมที่สุด แต่สิ่งที่ควรพิจารณามากกว่าคือ กระบวนการปรุงอาหาร โดยเฉพาะการทอดที่มีการใช้ความร้อนสูง ซึ่งไม่ว่าคุณจะใช้น้ำมันอะไร, ไขมันสัตว์หรือไขมันพืช, ก็สามารถทำให้เกิดสารพิษที่เรียกว่า AGEs (Advanced Glycation End Products) ได้ทั้งนั้น กระบวนการทอดที่อุณหภูมิสูงเป็นตัวการสำคัญที่กระตุ้นการเกิดสารนี้ ซึ่งมีผลเสียต่อสุขภาพมากกว่าการเลือกใช้น้ำมันประเภทใด ดังนั้น สิ่งที่เราควรระวังมากที่สุดคือวิธีการปรุงอาหาร ซึ่งหลายคนยังเข้าใจผิดว่าการเลือกน้ำมันจะเป็นตัวตัดสินความดีหรือไม่ดีต่อสุขภาพ ทั้งที่จริงๆ แล้วกระบวนการปรุงอาหารต่างหากที่สำคัญกว่าอย่างมาก
และถ้าต้องตอบว่าน้ำมันอะไรดี มันก็จะแค่บอกได้ว่า ปาล์ม กับ มะพร้าว ซึ่งมันจะช่วยได้แค่การลดโอกาสการเกิดออกซิเดชั่น และคุณสมบัติตามโพรไฟล์การรับความร้อนได้ มันก็เป็นแค่น้ำมันที่ทนความร้อนได้ดีกว่าใครเขา
แต่มันไม่ได้ตอบคำถามที่มีคำว่า "ดีต่อสุขภาพ" ด้วยนะสิครับ เพราะอะไร? ผมพยายามเขียนแบบเล่าสู่กันอ่านนะครับ ให้เข้าใจง่ายๆไม่วิชากงวิชาการมากนัก
ในโลกของการปรุงอาหาร, การทอดถือเป็นหนึ่งในวิธีการทำอาหารที่ได้รับความนิยมสูง เพราะมันง่ายและรวดเร็ว แต่อย่างไรก็ตาม, การทอดที่อุณหภูมิสูงนั้นอาจเป็นสาเหตุที่ทำให้เกิดสารพิษชนิดหนึ่งที่เรียกว่า AGEs (Advanced Glycation End Products) ซึ่งมีผลกระทบต่อสุขภาพในระยะยาว ไม่ว่าเราจะใช้ ไขมันสัตว์ หรือ น้ำมันพืช ก็สามารถเกิด AGEs ได้ทั้งนั้น ถ้าหากการทอดเกิดขึ้นที่อุณหภูมิสูงอย่างต่อเนื่อง
AGEs คืออะไร? AGEs คือ สารพิษที่เกิดจากการปฏิกิริยาระหว่าง น้ำตาล (เช่น กลูโคส หรือ ฟรุกโตส) และ โปรตีน หรือ ไขมัน ในอาหาร เมื่อเราเตรียมอาหารในอุณหภูมิสูง ซึ่งปฏิกิริยานี้สามารถเกิดขึ้นได้กับ ทุกชนิดของไขมัน ไม่ว่าจะเป็น ไขมันสัตว์ หรือ น้ำมันพืช ซึ่งอาจส่งผลเสียต่อสุขภาพของเราได้หากได้รับเข้าไปในปริมาณมาก
การทอดและการเกิด AGEs การทอดอาหารที่มีอุณหภูมิสูง เช่น การทอดหมูชุบแป้ง หรืออาหารที่ใช้ น้ำมันพืช เช่น น้ำมันถั่วเหลือง, น้ำมันข้าวโพด หรือ ไขมันสัตว์ เช่น น้ำมันหมู แม้ว่าเราไม่ได้เติมน้ำตาลลงไปในขั้นตอนการเตรียมอาหาร แต่ น้ำตาลธรรมชาติ ที่มีอยู่ในอาหาร เช่น คาร์โบไฮเดรตจากแป้ง, ข้าว, หรือแม้แต่ในเนื้อสัตว์ก็สามารถทำปฏิกิริยากับ กรดอะมิโน (ในโปรตีน) และ ไขมัน (ในเนื้อสัตว์หรืออาหาร) ที่มีอยู่ในอาหารได้ และที่สำคัญคือการทำอาหารที่มีอุณหภูมิสูงจะเพิ่มโอกาสในการเกิดปฏิกิริยานี้
การทอดอาหารด้วยอุณหภูมิสูง (ประมาณ 180 องศาเซลเซียสหรือสูงกว่า) จะทำให้ น้ำตาลธรรมชาติ ในอาหารทำปฏิกิริยากับกรดอะมิโน (จากโปรตีน) หรือกรดไขมัน (จากไขมันในอาหาร) ก่อให้เกิดสาร AGEs ซึ่งเป็น สารพิษ ที่ไม่เพียงแต่ทำให้เกิด การเกิดสารออกซิเดชั่น แต่ยังสามารถทำลายเซลล์ในร่างกาย, เพิ่มความเสี่ยงของการเกิดโรคเรื้อรัง, และทำให้กระบวนการชราภาพของร่างกายเร็วขึ้น
AGEs เกิดได้จากทุกชนิดไขมัน ไม่เพียงแต่ น้ำมันพืช ที่เป็นปัญหาหรือไขมันจากสัตว์ที่ต้องระวัง แต่ AGEs สามารถเกิดได้จากการทอดทุกประเภทไขมันทั้งจากพืชและสัตว์ เพราะ การทอดด้วยความร้อนสูง เป็นปัจจัยหลักที่ทำให้เกิดปฏิกิริยา Maillard reaction (ปฏิกิริยาระหว่างน้ำตาลและโปรตีนหรือไขมัน) ซึ่งเป็นกระบวนการที่สร้างสาร AGEs ดังนั้นไม่ว่าจะเลือกใช้น้ำมันพืชหรือน้ำมันหมูในการทอด ก็ยังสามารถเกิด AGEs ได้
การอบขนมและ AGEs นอกจากนี้การอบขนมที่ใช้ความร้อนประมาณ 180 องศาเซลเซียส (เช่นเดียวกับการทอด) ก็สามารถก่อให้เกิด AGEs ได้เช่นกัน การอบขนมและการปรุงอาหารในอุณหภูมิสูงจึงเป็นปัจจัยที่ส่งผลให้เกิดสารพิษนี้ได้เช่นกัน โดยเฉพาะเมื่อมีส่วนผสมของน้ำตาลธรรมชาติและโปรตีนจากแป้งหรือไขมันในอาหาร การใช้ความร้อนในการอบจึงไม่ต่างจากการทอดเท่าไรในการกระตุ้นการเกิด AGEs
AGEs กับสุขภาพ AGEs ไม่เพียงแต่มีผลเสียในแง่ของการทำให้ร่างกายแก่ก่อนวัย แต่ยังเชื่อมโยงกับโรคเรื้อรังหลายชนิด เช่น โรคเบาหวาน, โรคหัวใจ, โรคหลอดเลือดสมอง และโรคความจำเสื่อม การรับประทานอาหารที่มี AGEs สูงในระยะยาวอาจทำให้การทำงานของเซลล์ในร่างกายลดลง และเพิ่มความเสี่ยงต่อการเกิดโรคต่างๆ ดังนั้นการควบคุมอุณหภูมิในการปรุงอาหาร และการเลือกใช้ไขมันที่เหมาะสมจึงเป็นสิ่งสำคัญในการลดการเกิด AGEs
สรุปแบบสั้นๆให้นะครับว่า การทอดอาหารด้วยอุณหภูมิสูง ไม่ว่าจะใช้น้ำมันพืชหรือไขมันสัตว์ ก็สามารถเกิด AGEs ได้ หากไม่ระมัดระวังในการปรุงอาหาร การเลือกใช้อุณหภูมิที่เหมาะสมในการปรุงอาหารและการเลือกวัตถุดิบที่มีคุณภาพสูงจึงเป็นกุญแจสำคัญในการลดการสะสมของ AGEs ในร่างกาย และช่วยให้เรามีสุขภาพที่ดีในระยะยาว
การรับประทานอาหารที่ปรุงด้วยความร้อนสูงบ่อยๆ นอกจากจะทำให้ร่างกายแก่เร็วขึ้นแล้ว ยังสามารถเพิ่มความเสี่ยงของการเกิดโรคต่างๆ ได้ ดังนั้นเราควรพิจารณาและเลือกวิธีการปรุงอาหารที่เหมาะสมเพื่อลดความเสี่ยงจาก AGEs และดูแลสุขภาพของเราให้ดีในระยะยาวครับ
ทั้งหมดที่เล่ามา ไม่ได้เขียนขึ้นเพื่อทำให้ใครต้องกลัวอาหาร หรือรู้สึกผิดเวลาหยิบของทอดเข้าปาก แต่เพื่อชวนกันมองให้ลึกว่า เราไม่ได้ควรถามแค่ว่า ‘ใช้น้ำมันอะไรดี’ แต่ควรถามต่อว่า ‘เราปรุงยังไง ใช้อุณหภูมิเท่าไร และกินแบบไหนในชีวิตจริง’ ต่างหาก การมีความรู้เรื่อง AGEs ไม่ได้แปลว่าเราต้องตัดทุกอย่างที่เคยชอบออกจากชีวิต แต่เป็นการมีแว่นขยายไว้ส่องดูว่า อะไรที่ควรเบาลง อะไรที่ควรปรับ แล้วใช้มันอย่างรู้เท่าทัน เพราะสุดท้ายแล้ว สุขภาพที่ดี ไม่ได้มาจากการห้ามทุกอย่าง แต่มาจากความเข้าใจในสิ่งที่เรากินต่างหากครับ
#pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก #ฉลาก3รู้
-
@ 1f9e547c:8af216ed
2025-04-18 03:52:38Opinion about Bitcoin Core (desktop)
From Hebasto Twitter
Fellow Bitcoin Core Guix builders,
Heads up! If you're using the Ubuntu guix package, avoid upgrading to Ubuntu 24.04 as it breaks your Guix setup.
https://bugs.launchpad.net/ubuntu/+source/guix/+bug/2064115
WalletScrutiny #nostrOpinion
-
@ 502ab02a:a2860397
2025-04-18 01:41:22เวทีอุตสาหกรรมตัดต่อพันธุกรรมระดับโลก ที่กำลังจะเปลี่ยนอาหารทั้งระบบให้เป็นของบริษัทต่างๆ "Precision Fermentation" ซึ่งฟังดูเหมือนคล้ายการทำโยเกิร์ตหรือเบียร์ใช่มะ แต่ความจริงมันคือ การออกแบบชีวิตใหม่เพื่อขายเป็นอาหารครับ
เรามาเรียกชื่อตอนนี้ให้เท่ๆว่า Precision Fermentation จากถังหมัก สู่กับดักพันธุกรรม
Precision Fermentation (PF) ต่อจากนี้ไปอยากให้จำคำนี้ไว้ให้ดีๆ อ่านข่าวอาหารอะไรคอยดูว่ามีคำนี้ไหม มันคือการใช้ จุลินทรีย์ที่ถูกดัดแปลงพันธุกรรม (GMO yeast, bacteria, fungi) เพื่อผลิต “สารอาหาร” เช่น โปรตีนจากนม ไข่ขาว ไขมันสัตว์ เจลาติน วิตามิน โดยไม่ต้องมีสัตว์จริงอยู่ในระบบเลยสัก ใช้ตัวจุดขายว่า “อาหารแห่งอนาคตที่ปลอดสัตว์ เป็นมิตรกับโลก”
แต่เบื้องหลังมันคือ... ระบบปิดที่บริษัทเดียวควบคุมตั้งแต่สายพันธุ์จุลินทรีย์ เครื่องจักร ไปจนถึงสิทธิบัตรของอาหารทุกชิ้น
เป็นการหมักชีวิตให้กลายเป็นกรรมสิทธิ์ ในระบบ PF นักวิจัยจะเลือก DNA จากสัตว์ เช่น เคซีน (โปรตีนนมวัว) อัลบูมิน (โปรตีนไข่) ฮีม (กลิ่นเลือดในเนื้อวัว) แล้วเอาไปใส่ไว้ในยีสต์หรือจุลินทรีย์ เพื่อให้มัน "หมัก" ผลิตสารเหล่านี้ออกมาในถังขนาดใหญ่
ฟังดูน่าสนใจใช่ไหมครับ? แต่ DNA เหล่านั้นจะถูกจดสิทธิบัตรทันที และจุลินทรีย์เหล่านั้นก็จะถูกควบคุมโดยบริษัทไม่กี่รายเท่านั้น หมายความว่า โปรตีนจากไข่ นม หรือเนื้อ จะกลายเป็น “กรรมสิทธิ์ของบริษัท” ไม่ใช่ของธรรมชาติอีกต่อไป
บริษัทไหนบ้างที่เล่นเกมนี้ เรามาลองดูตัวอย่างกันครับ Perfect Day – ผลิตโปรตีนนมด้วยยีสต์ GMO The EVERY Company – ไข่ขาวจากเชื้อรา Clara Foods – โปรตีนจากไข่ด้วย PF Motif FoodWorks – กลิ่นเนื้อและไขมันจาก PF Impossible Foods – ฮีม (heme) จากถั่วเหลือง GMO ที่หมักด้วยยีสต์ดัดแปลง และที่สำคัญเหมือนเดิมครับเบื้องหลังคือเงินทุนจาก SoftBank, Bill Gates, Google Ventures และบริษัทอาหารระดับโลก เช่น Nestlé, Tyson Foods, Unilever
คำถามก็คือมันคืออาหารหรือเคมี เพราะสิ่งที่ได้จาก PF มักมีสถานะก้ำกึ่งระหว่างอาหารกับสารเคมี นอกจากนี้ยังมีงานวิจัยน้อยมากเรื่องผลกระทบต่อร่างกายระยะยาว ไม่ผ่านการพิสูจน์ในระบบย่อยอาหารมนุษย์อย่างชัดเจน หลายชนิดไม่บอกบนฉลากว่าได้จาก GMO fermentation หรือไม่ และบางบริษัทจงใจเรียกของตัวเองว่า “non-animal” เพื่อเลี่ยงการเปิดเผยว่าเป็น GMO
แต่สิ่งที่คาดว่าน่าจะเกิดขึ้นแน่ๆคือ 1.การครอบครองพันธุกรรมของสิ่งมีชีวิต ทุกยีสต์หรือจุลินทรีย์ในระบบ PF ถูก “จดสิทธิบัตร” ทั้งหมด ใครเลียนแบบ โดนฟ้อง ใครผลิตเองโดยไม่ได้รับอนุญาต โดนปิดกิจการ 2.การขับไล่เกษตรกรออกจากระบบอาหาร ไม่ต้องรีดนม ไม่ต้องเก็บไข่ ไม่ต้องเลี้ยงสัตว์ บริษัทไม่ต้องพึ่งเกษตรกรเลย แล้วใครจะอยู่รอดในระบบนี้? 3.การกำหนดราคาโดยผูกขาด PF ทำให้บริษัทมีอำนาจควบคุมแหล่งโปรตีน ถ้าบริษัทไม่ขาย หรือขายแพง ก็ไม่มีใครมีอำนาจต่อรอง 4.การขาดเสรีภาพในการเลือกอาหาร ถ้าของจริงถูกลดบทบาท และของเทียมถูกยัดใส่ผลิตภัณฑ์ทั่วไปแบบไม่ระบุฉลาก คนจะถูกหลอกว่า "กินอาหาร" ทั้งที่จริงๆ กำลังกินผลิตภัณฑ์ชีววิศวกรรมที่ไม่มีใครรู้แน่ชัดว่าปลอดภัยจริงไหม
หากอาหารของโลกต้องผ่านถังหมัก ผ่านโรงงาน ผ่านระบบสิทธิบัตร และต้องขอใบอนุญาตจากบริษัทยักษ์ทุกครั้งที่ผลิต โลกเราจะเหลือ “อาหารจากธรรมชาติ” แค่ในนิทานพื้นบ้าน อาหารที่ปู่ย่าตายายเคยปลูก เคยเลี้ยง เคยกิน อาจกลายเป็นของผิดกฎหมายในโลกอนาคต เพราะ ของที่ไม่ผ่านระบบ PF จะถูกตีตราว่า “ไม่สะอาด” หรือ “ไม่ยั่งยืน”
สิ่งที่ต้องรอดูต่อไปคือ เกมส์การโจมตีอาหาร real food จะมาในรูปแบบใดบ้าง ความสะอาด โรค หรือ การกีดกัน
เอาเป็นว่าถ้าคุณคิดว่ามันอีกยาวไกล ลองค้นคว้าดูไหมครับว่า นมโอ้ต ผลิตมาอย่างไร 5555
#pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก
-
@ 5188521b:008eb518
2025-04-08 13:33:42Ecology
When my father died, an entire ecosystem system of beneficiaries withered. Moussa Ag El Khir funded scholarships and community projects, paying thousands of Dinars monthly to stop the oasis town of In Salah from burning up. The few families we knew operating outside the oil-field economy would be forced to flee to the Mediterranean coast, along with just about every other Berber.
It wasn’t unexpected. My father had cystic fibrosis for all sixty-one years of his life. So far, that’s the only legacy he’s passed on to his children. My brothers are just carriers, but me, his precious daughter ended up like him in more ways than one.
We sat there in the lawyer’s office in Algiers, my brothers and I, staring at the ledger which contained payment for his life’s work.
“And he only left one word in his will?” asked Ibrahim for the third time. Ecology.
The lawyer said Moussa was very clear. He chose each of the keys himself. The contents of the ledger would belong to whoever could decode his life — those who understood the real meaning. Then he cut all communications and walked into the Sahara. The Tuareg caravan on the road to Akabli found his body a week later, reddened by sand burn.
Earth
We made an agreement that day. To share each word we discovered. We could break the code together. Of course, Ibrahim and Hama didn’t share anything. We barely speak. That’s what happens when one child follows their father into science, and her two brothers move to France the minute they get rich enough to buy a wife. I bet they spent longer looking into legal loopholes to get their hands on my father’s assets than they did trying to identify the keys.
That day was the start of my second life, and I went from research assistant at a regional university to private-key detective. 2048 words and few clues where to start. Although I was 27, I was virtually a grandmother according to the In Salah wives. But of course, I could never be a grandmother, or even a mother. Every night, I scoured photos in the family archive. An initial sweep of his digital footprint returned no out-of-place instances of any keywords.
It took me a year to find the GPS tag he’d added to one photo — an eighteen-year-old daughter standing next to a father proud of his first infinite solar prototype. The panel has long-since been torn out by the oil corp, but the base is still there. I drove the three kilometres from the town limit and shone the high beams at the spot. When I got out, the air was cool but still thick with sand. A few more steps through sinking dunes, and I saw it. He’d scratched a little globe into the blistered metal, and for a moment, my mucus-laden lungs tasted clear air.
Trigger
The next word took three years. Friends, contacts, professors, biographers — visits to anyone with whom he might have left a clue. But it was in the In Salah hospital, where, upon a routine CF checkup with Jerome Devailier, a French doctor, ‘trigger’ appeared. The government might stack everything against the desert peoples, but they hadn’t taken away healthcare. I’d been living off the kindness of neighbours while finishing my thesis on the very solar technology my father developed. How could he have known the ‘buyer’ was just a tendril of the very oil company he sought to defeat.
Dr Devalier went through the list of carcinogens and allergens to avoid with my new drugs. Over forty triggers which could be my downfall. If I was lucky, I’d live as long as my father did.
By then, my research stipend was long gone. I existed on toughened bread and soup, which always carried the taste of the scorched city air. Yet, I stayed. The public library, disconnected from the grid by the oil corp, was where I finished my manuscript. They would fight its publication. Since father’s money no longer flowed into the town, many had deserted me. There were those who said he killed an entire people by selling his solar patent to the wrong buyers. Others in In Salah worshipped his name, but eventually, they all trudged north to the cities. My brothers sold the family home from under me, forcing me to follow.
When I returned from the hospital, I dug out my father’s medical documents. On every page, the word ‘trigger’ was underlined. That was the moment I knew my life’s work would be unlocking the ledger, not publishing studies on long-dead solar panel technology. That battle was lost.
They
All we need is a simple document, but here, it is the administrators’ job to send people away. Physical copies are only issued in extreme circumstances. Citizens’ Registry screens played endless repetitions of how to apply for digital documents. The shrill voices of family members desperate for the original copy of a pirated document drowned the TV messaging. Women removed headscarves and revealed thick black hair; teenagers paced. The atmosphere thickened with sweat. And hours passed. Each appointment required a reset of digital protocol, biometric tests, and identity cards from legal descendents. Through counterfeit identities, our Dinars leak into the hands of criminals, but still the government denies the need for bitcoin. They just print more money. They is the word my father used for the government that fought his patent so hard.
After a four-hour wait, I discovered that the physical death certificate included an ‘identifying mark’ on the deceased’s body. The ink was fresh — etched into the shoulder blade of a man who wished to turn his back on the government that ignored its people. The tattoo read aqqalan, the Tamasheq word for they.
Scheme
It took two trips to his cluttered Marseille office to convince him I was serious. Two visas, two flights, and the small amount from the sale of the family house. But few detectives wanted to work for a promise.
The ledger could not legally be owned in Algeria, and Laurent Mercier was the only serious professional who entertained a percentage of what was on there. The solar tech patent and documents from my father were enough to start Laurent on the trail. ‘Preliminary,’ he said, until I had the ledger in my possession.
“Flying is not easy with my condition,” I said.
He lowered his sunglasses. “Working is not easy without money.”
Contact with my brother through the lawyer in Algiers was achingly slow, but eventually they agreed to give me possession. What was 33% of nothing anyway? Years had gone by.
So, when I sat for the second time, in the sweaty office in Marseille, I gave Laurent the ledger, and he handed me a surprise. In all his business affairs, my father used little English, but the word ‘scheme’ appeared in all three company names he incorporated in the last three years of his life. We had our fifth word, and I finally had someone on my side.
Make
Some days, I could barely walk to the public library. I became lethargic and mostly sat in the cool dark of my room in the shelter. The government refused to provide housing outside of Algiers, but a Tuareg organisation from Mali opened a shelter in In Salah. Bulging eyes and faded clothes stared back in the mirror each day. How long had it been since I’d been to a wedding, or celebrated a friend’s child? Occupants came and went, and all that was left was a barren room and one meal per day.
As the sun punished the city with every ray of Allah’s untapped gift, streets grew thick with dust, and the local government fell, seat by seat, to oil execs. The only transport running was to and from the oil fields, which belched the remnants of the land into the sky. And still they worked. Still they sat on my father’s patent and refused to supply the world with efficient solar power.
With little else to cling onto, I harboured thoughts of how I could spend the ledger money. Fixing the town and replanting lost gardens. Bringing people back. That all took a back seat to decoding the message my father was sending. Laurent and I began to believe that the keys he chose formed some sort of instruction for his legacy.
Ten years to the day after his death, I was in the public library, looking for clues in an English history book. On my exit, the librarian stopped me.
“We have a gift for you, Kana.”
I waited while he fetched a package.
“Your father instructed me to give this to you. But not before this date.”
My hands tore open the package. More books, technical manuals, and hand-written notes. Amongst the papers was a tasselled leather bookmark embossed with the four letters that comprised one of the seven missing words. Make.
Citizen
It’s hard for a father in Algeria to admit to his daughter that she is his spirit — the heir to his life’s work. Of course he felt terrible guilt after our mother’s passing. That was when the letters started.
Moussa wrote to himself really, trying to come to terms with bringing a protégé into the world with a bright scientific mind and lungs that would snap her life expectancy. We communicated by letter for the last few years of his life — sharing the breakthroughs of his findings and what it might mean for our decaying oasis town. Analogue writing was the only real privacy, he said. His letters always ran to the same length, as if they were one lesson divided into equal chunks. We even exchanged letters during his last hospitalisation in Algiers. Those words were the only real strength I gained.
It was Laurent who analysed the letters with a new text scanning tool. For me, my father’s last letters were advice, regret, pain, and love, but to Laurent, they were simply a puzzle to solve to get one step closer.
Our letters gave Laurent the idea to communicate via physical mail. The process was painful, with letters sent from outlying towns before being shipped across the Alboran Sea and up into France. Muatin was one name my father called me. Like him, I dreamed of helping many through science. This was one of the few Arabic words in the French letters he wrote. It was also the only keyword included in any of the letters. Citizen.
When
Years of quiet followed. In Salah became unlivable after they co-opted the city reservoir for cooling drilling rigs. Each study that proved the field was still viable funnelled funds away from the locals who clung on. Resettlement benefits went up, and all but the semi-nomadic Tuaregs left. I followed. My health could not take much more desert. In the cooler coastal plains, I recovered strength, and subsidies for new medications helped me survive on a meagre teaching salary.
With no further clues, my Marseillais detective lost interest. His last letter, sent years ago, stated with unusual brevity that he was resigning the case. No payment was due.
I had lost my health, my father, his work, my money, our house, the town, and I spent each week delivering science and English classes to teenagers. They had no more hope for our country than I had. Algerians had already lost the Sahara. A one-degree temperature shift each decade of my life had shrunk Africa and sent its peoples northwards.
My father’s word puzzle occupied my thoughts. The combinations and permutations of letters and characters had millions of possible meanings but only one correct answer. Yet simple linguistic logic provided the next word. The headteacher was a linguist — a profession long lost to the higher-powered text analysers and language AI. He spoke little English but asked about the categorisations of grammatical terms in the 2048 key words.
“Why do you ask?”
“Because,” he said, “for a sentence of twelve words, at least one conjunction is necessary to form a second clause.”
He was right. I had been focussing on lists and complex codes to build my father’s motto. When I got home, I furiously searched my list of terms for conjunctions. I found only one. ‘When.’
Can
The permutations were still huge. Even eliminating some of the more conceptual words did not help. Millions of sentences existed in my dead father’s mind. Millions of meanings, all lost to the need for more energy to fund the world’s great thirst for energy. Still, the panels in most of the ‘dead middle’ (as the space between the tropics became known) melted at over 50 degrees.
I was back in Paris for CF treatment. As a young woman, I would have been pleased to make fifty years. But the realities of daily visits and the sickness brought on by medication stung. I wanted things to end, even when I discovered the next key.
It had been years since I had dreamed of the freedoms my father’s fortune could bring. Parts of Asia held out against bitcoin, but the cost of countries doing business off-network had become prohibitive. Eventually, the fossil conglomerates would give in to the need for solar mining and the provision of universal energy.
It was in a Parisian hospital bed that I discovered ‘can.’ My wardmate, a rough labourer from Oran, found a biography in the hospital library that made me sit up straight. ‘Can’ was repeated in almost every description of my father in his one-time business partner’s book. And it was this Arabian ‘businessman,’ Abdulkarim Rahman, who brokered the deal that robbed the world of infinite solar power. Each page mocked my father as believing only physical impossibilities are impossible. He branded him the ‘can man.’
Drastic
During my recuperation, I spent the final two weeks of my visa stay in Marseille. My days passed with endless algorithm tweaks to reject or accept word orders for the elusive twelve-word sentence my father once wrote.
Food lost its taste, and friends and colleagues in academia had scattered. In-person meetings were often contained to the night hours, but Marseille was not a place to go out after dark. The latest protests had gotten violent, and the government looked likely to topple. My people had always been resilient, but when the option to move and operate a caravan was removed by General Hafiz, part of my spirit died. I resolved to spend my final years in In Salah, however uncomfortable they would be.
My final port of call before returning was Laurent’s office. The eTaxi cast me out into the dusty street, and I wheezed as I climbed the three flights of stairs to his tiny door on Rue Marché. We hadn’t spoken in years, but I was surprised to find a different name about the door. Pascale Dupont, Investigateur.
The assistant I remembered was quite the opposite to Laurent — slow and methodical, short and heavy set.
“Madame,” he said. “I have difficult news.”
Their business had always straddled the law, but I never imagined an ex-officer of the law could be convicted of treason.
“A closed-door trial,” said Pascale. Then he handed over an air-gapped 3D storage file. “Laurent knew you would come for this.”
My mind cast forward to the reams of information he must have built on my father. The patents and technical diagrams he illegally acquired and other clues. I instantly recognised the brand of storage file as a keyword. Drastic.
“How can I thank him?”
“He is dead, madame.” Pascale hung his head. “He survived prison for only two weeks.”
Must
My final years brought me home. In Salah had gained fame for its one group of Tuaregs who refused to leave. The Lakzis owned a house in a desperate condition, not dissimilar to my failing body. By the age of fifty-two, I could no longer walk, but they welcomed me. I pooled my disability allowance and some money I’d gained from selling my father’s watch. We waited for the world to mourn the death of a once great city. We would keep it alive by refusing to move, by refusing to permit its rebranding as an ‘industrial area.’ Now the oil fields were finally drying up, they wanted to dig under the town.
We had managed to eliminate half of the remaining words. Just under 1,000 possible selections for the final two words, but little idea of an order.
The problem was that I was the only English speaker among them, and it took great energy to attempt to teach the meaning of the words and possible grammatical constructions for my father’s sentence.
But soon, patterns began to emerge. Fragments of word pairings and groups. ‘Trigger drastic scheme’ appeared again and again in the permutations. ‘They can’ and ‘When they can’ gave a tantalising glimpse. We ranked sentences in terms of likelihood to form the full key and categorised them by the most likely remaining words. Due to the need for a modal verb, ‘must’ scored highest by our calculations.
In this race to unlock the ledger before In Salah’s destruction, we nosed ahead.
Yet the day of that discovery was my final day in the desert. An air ambulance transported my feeble body to Algiers, and I would never return.
They messaged me — so close. They would unlock the ledger with the final word after my operation. The bitcoin could undo the wrongs of the past, and my father’s sentence would live on.
End
The phrase which began the global revolution first appeared on the wall of a much-disputed oil refinery in the desert outside In Salah, Algeria.
When they can make ecology end, citizen earth must trigger drastic scheme
Soon, the graffiti marked government buildings in Algiers. Activists took to the streets. Governments crumbled and currencies collapsed. Climate groups received massive donations said to come from ‘the one,’ a ledger with a huge stack written off by financiers the world over. The codebreaker credited with unlocking the ledger was unable to witness the transfer of 10,000 coins to the Global Climate Fund due to her death, aged 52, from a congenital condition.
The words of Moussa Ag El Khir now mark each of the millions of panels, which line the ‘dead middle.’ They contribute over 80% of the Earth’s power supply.
To mark the fiftieth anniversary of his death, the World Climate Forum will be held in the town of his birth, In Salah, Algeria. This story, compiled from the diaries of his daughter, Kana Ult El Khir, will be read as the opening address of the conference.
This story was originally published in 21 Futures: Tales From the Timechain
To continue the story of the real-world treasure (sats) use the address (it's real).\ Who knows, maybe some zaps will find their way into the wallet...
-
@ 7b3f7803:8912e968
2025-04-18 00:16:02As we enter Holy Week, we are confronted with a world steeped in sin, strife, conflict, and mortality. There exists a peculiar fascination among some with societal decline, as if they derive satisfaction from witnessing civilization’s unraveling. This attraction to darkness may reflect their inner turmoil, a desire to see others share in their suffering. Alternatively, it could stem from a profound hopelessness, a belief that life lacks purpose, leading them to wish for its end. The allure of dystopian futures is, indeed, a curious phenomenon.
Alexander Hamilton once yearned for war as a means to elevate his status, a reflection of youthful ambition for decisive action. Such a desire—to distinguish oneself and ascend the social hierarchy—underlies some of the grim visions of the future propagated by certain ideological circles. Their aim is not war itself but a reconfiguration of power, placing authority in the hands of those who affirm their values. For years, such individuals have held sway, yet their influence appears to be waning.
In the absence of hope, many embrace visions of decline. This despair is characteristic of a faltering empire, signaling the end of an era. The younger generation, burdened by weariness, falters under the weight of their circumstances. They lack hope for a brighter future and see no clear path out of life’s monotony. In a word, they are trapped, uncertain of how to proceed.
We witnessed a similar sentiment during the Arab Spring, where upheaval was celebrated as a longed-for revolution, a societal reset. The assassination of a prominent corporate executive, such as the CEO of United Health, evokes a comparable yearning for disruption. There is a desire for a cultural transformation, though its precise nature remains elusive.
Yet, the youth find themselves dominated by the very elites whose rhetoric they echo. Unlike the 1960s, when generational values clashed overtly, today’s power structures co-opt the language of the young, redirecting their frustration toward populist movements. This inversion is a cunning strategy, mitigating the potential for significant rebellion.
The reality remains that the older generation holds the wealth, power, and authority, while the young are consistently marginalized. They are the ones left with little hope, ensnared by the system. However, a quiet rebellion is emerging—one rooted in hope and faith. Many are beginning to see through the falsehoods propagated by those in power. The promises of governmental provision, once alluring, now appear untenable in light of fiscal realities. The youth seek a new source of hope, a renewed perspective. Thankfully, they are beginning to find it, turning toward faith as a foundation for a more optimistic future.
-
@ a296b972:e5a7a2e8
2025-04-17 23:08:50Die Figuren in der Koalition der Willigen entlarven ihre charakterliche Ungeeignetheit für politische Ämter mit Verantwortung für ganze Nationen. Staatliche Entscheidungen dürfen nicht emotionsgesteuert sein. Aber genau das ist derzeit der Fall. Überall wird mit der Moralkeule um sich gehauen. Erwachsene benehmen sich wie im Kindergarten und zeigen ihre fehlende Reife. Von menschlicher Größe ganz zu schweigen.
Bisher war es schön warm unter den Fittichen der USA. Deutschland hat aufgrund seiner Geschichte besonders gut den Nick-August gespielt und sich selbst eine Souveränität vorgelogen, die es so nie gegeben hat. Jetzt sieht es so aus, als wollten die USA Europa in die Freiheit, in die Volljährigkeit entlassen. Es könnte auch sein, dass die USA aus der NATO austreten und sich vor allem um sich selbst kümmern. Allein das würde die Welt schon wesentlich friedlicher machen, denkt man beispielsweise an den Einmarsch in den Irak. Es gehen Gerüchte um, dass Truppen aus Rumänien und Deutschland abgezogen werden sollen.
Vielleicht geht es bei den Friedensverhandlungen zwischen Trump und Putin nicht nur um die Ukraine, sondern, wenn man schon mal dabei ist, auch um die Kräfteverteilung in Europa insgesamt. Waffeneinsätze in der Ukraine wurden maßgeblich von Wiesbaden aus gesteuert. 2026 sollen dort US-Mittelstrecken-Raketen stationiert werden. Der an Führungsstärke kleinste Kanzler der Bundesrepublik, Scholz, hat das brav abgenickt. Der nur noch durch ein Wunder zu verhindernde neue Kanzler, das Glas Gewürzgurken aus dem Sauerland, provoziert Russland mit seiner Ankündigung zu den Taurus-Raketen dafür um so mehr. Da ist man schon fast gewillt, sich den Scholz zurückzuwünschen, als das kleinere Übel.
Statt mit Besonnenheit und Vernunft die veränderte Sicherheitslage mit den USA als eher abtrünnige Schutzmacht neu zu bewerten, hierin auch eine Chance zu sehen, eine starke Botschaft und den Willen auf ein friedliches neues Miteinander in den Fokus zu stellen, reagieren die meisten europäischen politischen „Spitzenkräfte“ mit blindem Aktionismus, der weltenbrandgefährlich ist. Und Deutschland, dass es sich aufgrund seiner Geschichte am wenigsten erlauben könnte, macht mit von der Leyen in Brüssel und Merz, Pistorius und anderen Kriegs-Warm-Uppern am weitesten das Maul auf, obwohl es sich am bedecktesten halten sollte.
Angesichts der Tatsache, dass Europa gegenüber einer Atommacht wie Russland vollkommen wehrlos ist, wäre es wirklich viel gescheiter, sich der neuen Situation anzupassen und ständig Signale der Friedensbereitschaft zu senden. Unterstütz von den Briten und Franzosen schmiegt Brüssel eine Koalition der Friedensuntüchtigen, wie sie Uwe Froschauer aktuell in seinem Buch „Die Friedensuntüchtigen“ beschreibt. In der Rezension von mir gibt es auch einen Link zu einem Review des Inhalts:
https://wassersaege.com/blogbeitraege/buchrezension-die-friedensuntuechtigen-von-uwe-froschauer/
Stattdessen passiert das Gegenteil.
Es ist nicht nur legitim, sondern sogar Aufgabe der einzelnen Staaten, eine gewisse Verteidigungsfähigkeit aufbauen zu wollen. Derzeit geschieht das jedoch unter falschen Vorzeichen. Die NATO, als sogenanntes Verteidigungsbündnis zur Vorlage zu nehmen, wäre keine gute Idee, weil sie sich mangels Gelegenheit (der Verteidigung) eher als das Gegenteil herausgestellt hat, wie man seinerzeit in Jugoslawien erleben musste.
Russland als Feind hochzustilisieren, um ein Aufrüsten zu beschleunigen, ist jedoch der denkbar falscheste Weg. Wenn ein Yorkshire-Terrier einen Pit-Bull ankläfft, könnte das fatale Folgen haben. Wenn die europäischen „Geistesgrößen“ bei Verstand wären und in der Lage, die Realität richtig einzuschätzen, würden sie das erkennen.
Woher kommt die Überheblichkeit, woher die Unfähigkeit zur Einschätzung der Lage, woher die Realitätsverweigerung? Ist das gewollt, steckt ein Plan dahinter oder sind „die“ einfach „nur“ strunzendoof? Letzteres wäre die gefährlichste Variante.
Es stellt sich immer mehr heraus, dass Corona offensichtlich ein Test war, wie weit die Menschen in ihrer Obrigkeitshörigkeit zu treiben sind. Wie dumm und gefolgsam sind die Schafe wirklich?
Bei einer Lieferung von Taurus-Raketen, die von Deutschen gesteuert werden müssen, könnte es vielleicht gelingen, die Krim-Brücke zu zerstören. Den Kriegsverlauf würde das jedoch nicht beeinflussen. Russland gewinnt so oder so. Im Gegenteil, die Folgen für Deutschland würden den dort möglicherweise angerichteten Schaden bei weitem übertreffen.
Während ich schreibe kommt gerade auf RT DE (aufgrund der „Pressefreiheit“ verzichtet man derzeit offiziell auf diesen Sender) folgende Meldung rein: Russisches Außenministerium: Taurus-Einsatz bedeutet deutsche Kriegsbeteiligung.
https://rtde.site/international/242696-russisches-aussenministerium-taurus-einsatz-bedeutet/
Es ist nicht nachvollziehbar, dass Merz offensichtlich nicht in der Lage ist anzuerkennen, dass Russland über Oreschnik-Raketen verfügt. Er scheint nicht in der Lage zu sein, die möglichen Folgen einschätzen zu können. Genau so wenig wie Pistorius. Die beiden kommen einem vor, wie zwei, die sich im stockfinsteren Wald verirrt haben und sich gegenseitig Mut zusprechen.
Nach wie vor gibt es keine fundierten Beweise dafür, dass Russland die Absicht hat, Deutschland auf unschöne Weise bereisen zu wollen. Das kann nicht oft genug gesagt werden.
Wie schon vor dem Ukraine-Konflikt, durch ein ständiges mit der NATO-Osterweiterung Russland-immer-näher-auf-die-Pelle-rücken, streut jetzt Europa, Deutschland, der Kriegskanzler Salz in die Wunde und Russland sagt ständig: Stoy, so geht das nicht!
Wenn wir eine Bedrohungslage haben, dann die, dass das aktuelle Regime den Deutschen in seinem Wehrwahn mit Wehrpflicht und einer bevorstehenden russischen Invasion droht, obwohl es, man kann es wirklich nicht oft genug sagen, keine reale Bedrohung durch Russland gibt.
In einem Interview im deutschen Propaganda-Funk faselt Pistorius davon, dass in einem „Schnuppercamp der Bundesmarine“ in Kiel für Teenager ab 16 Jahre, er gar nichts Verwerfliches daran finden kann. „Die schießen ja nicht…“, „Wir bringen ihnen ja nicht das Töten bei mit 17, sondern wir bereiten sie vor auf eine Ausbildung zum Soldaten. Und Soldat ist ein sehr ehrenwerter Beruf, der nämlich dazu dient, unsere Freiheit und Sicherheit im Ernstfall zu verteidigen.“ Dass diese Verteidigung tödlich enden kann, wird hier verschwiegen. Das könnte schließlich Teile der Soldaten verunsichern.
Ein Politikwissenschaftler regt sich über den Titel eines Liedes auf:
-Da stört sich doch tatsächlich jemand an der Liedzeile „Meine Söhne geb‘ ich nicht“-
https://www.nachdenkseiten.de/?p=131733
Man hat das Gefühl, dass alle Politiker, statt wie Obelix in den Zaubertrank, in ein Fass Teflon-Lack gefallen sind. Anders ist es nicht zu erklären, warum die Realität so perfekt an ihnen abperlt.
Wir werden immer mehr in die Enge getrieben. Und man weiß nicht, was im Zuge der digitalisierten Überwachung, die auch in Russland kräftig Fahrt aufnimmt, zwischen den USA und Russland sonst noch ausgehandelt wird. Auch, wenn Vance derzeit von UK-Premier Keir Starmer fordert, er müsse die Gesetze gegen „Hassrede“ aufheben, um ein Handelsabkommen mit den USA zu erzielen, und das eine Vorankündigung auf die Verhandlungen mit der EU sein könnte, (Bedingung: Abschaffung des Digital Services Act). In den USA gibt es Tech-Giganten, wie Musk und Thiel und Konsorten, die mit Umlegen eines Schalters, den derzeit augenscheinlichen Kampf für Meinungsfreiheit und Freiheit der Bürger, im Handumdrehen ins Gegenteil verqueren können. Dann sind wir in Null Komma Nichts in der Versklavung mit einem Totalitarismus und einer Technokratie gelandet, in der sich Georg Orwells „1984“ wie eine Gute-Nacht-Geschichte für kleine Kinder anhört.
Dieser Artikel wurde mit dem Pareto-Client geschrieben
-
@ a7f85dfe:27305a2b
2025-04-07 23:56:34在收到二手mini pc之前,先制作USB起动器。
首先,官网下载最新安装器的iso文件,下载地址:
https://www.proxmox.com/en/downloads
第二步,linux系统下使用dd命令制作USB起动器
查找usb路径
lsblk
dd命令直接烧录 ``` sudo dd if=/path/to/iso_file.iso of=/dev/sdX bs=4M status=progress```
-
@ 5f078e90:b2bacaa3
2025-04-18 09:45:15This is a long form note written on Nostr using the Yakihonne.com client. The hope is that the "Hostr" bidirectional bridge will pick it up and then post it on the Hive blockchain under the @hostr account at https://hive.blog/@hostr
The bridge can listen for both kind 30023 (long form) Nostr notes or kind 1 (short form) and kind 30023 notes. This is using the "both" version (a kind 1 was already successfully tested and bridged).
This tool is very much underconstruction and being tested.