-
@ 3f770d65:7a745b24
2025-05-14 18:26:17đď¸ Monday, May 26 â Bitcoin Golf Championship & Kickoff Party
Location: Las Vegas, Nevada\ Event: 2nd Annual Bitcoin Golf Championship & Kick Off Party"\ Where: Bali Hai Golf Clubhouse, 5160 S Las Vegas Blvd, Las Vegas, NV 89119\ đď¸ Get Tickets!
Details:
-
The week tees off in style with the Bitcoin Golf Championship. Swing clubs by day and swing to music by night.
-
Live performances from Nostr-powered acts courtesy of Tunestr, including Ainsley Costello and others.
-
Stop by the Purple Pill Booth hosted by Derek and Tanja, who will be on-boarding golfers and attendees to the decentralized social future with Nostr.
đŹ May 27â29 â Bitcoin 2025 Conference at the Las Vegas Convention Center
Location: The Venetian Resort\ Main Attraction for Nostr Fans: The Nostr Lounge\ When: All day, Tuesday through Thursday\ Where: Right outside the Open Source Stage\ đď¸ Get Tickets!
Come chill at the Nostr Lounge, your home base for all things decentralized social. With seating for \~50, comfy couches, high-tops, and good vibes, itâs the perfect space to meet developers, community leaders, and curious newcomers building the future of censorship-resistant communication.
Bonus: Right across the aisle, youâll find Shopstr, a decentralized marketplace app built on Nostr. Stop by their booth to explore how peer-to-peer commerce works in a truly open ecosystem.
Daily Highlights at the Lounge:
-
âď¸ Hang out casually or sit down for a deeper conversation about the Nostr protocol
-
đ§ 1:1 demos from app teams
-
đď¸ Merch available onsite
-
đ§ Impromptu lightning talks
-
đ¤ Scheduled Meetups (details below)
đŻ Nostr Lounge Meetups
Wednesday, May 28 @ 1:00 PM
- Damus Meetup: Come meet the team behind Damus, the OG Nostr app for iOS that helped kickstart the social revolution. They'll also be showcasing their new cross-platform app, Notedeck, designed for a more unified Nostr experience across devices. Grab some merch, get a demo, and connect directly with the developers.
Thursday, May 29 @ 1:00 PM
- Primal Meetup: Dive into Primal, the slickest Nostr experience available on web, Android, and iOS. With a built-in wallet, zapping your favorite creators and friends has never been easier. The team will be on-site for hands-on demos, Q\&A, merch giveaways, and deeper discussions on building the social layer of Bitcoin.
đď¸ Nostr Talks at Bitcoin 2025
If you want to hear from the minds building decentralized social, make sure you attend these two official conference sessions:
1. FROSTR Workshop: Multisig Nostr Signing
-
đ Time: 11:30 AM â 12:00 PM
-
đ Date: Wednesday, May 28
-
đ Location: Developer Zone
-
đ¤ Speaker: nostr:nprofile1qy2hwumn8ghj7etyv4hzumn0wd68ytnvv9hxgqgdwaehxw309ahx7uewd3hkcqpqs9etjgzjglwlaxdhsveq0qksxyh6xpdpn8ajh69ruetrug957r3qf4ggfm (Austin Kelsay) @ Voltage\ A deep-dive into FROST-based multisig key management for Nostr. Geared toward devs and power users interested in key security.
2. Panel: Decentralizing Social Media
-
đ Time: 2:00 PM â 2:30 PM
-
đ Date: Thursday, May 29
-
đ Location: Genesis Stage
-
đď¸ Moderator: nostr:nprofile1qyxhwumn8ghj7mn0wvhxcmmvqy08wumn8ghj7mn0wd68yttjv4kxz7fwv3jhyettwfhhxuewd4jsqgxnqajr23msx5malhhcz8paa2t0r70gfjpyncsqx56ztyj2nyyvlq00heps - Bitcoin Strategy @ Roxom TV
-
đĽ Speakers:
-
nostr:nprofile1qyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcppemhxue69uhkummn9ekx7mp0qqsy2ga7trfetvd3j65m3jptqw9k39wtq2mg85xz2w542p5dhg06e5qmhlpep â Early Bitcoin dev, CEO @ Sirius Business Ltd
-
nostr:nprofile1qy2hwumn8ghj7mn0wd68ytndv9kxjm3wdahxcqg5waehxw309ahx7um5wfekzarkvyhxuet5qqsw4v882mfjhq9u63j08kzyhqzqxqc8tgf740p4nxnk9jdv02u37ncdhu7e3 â Analyst & Partner @ Ego Death Capital
Get the big-picture perspective on why decentralized social matters and how Nostr fits into the future of digital communication.
đ NOS VEGAS Meetup & Afterparty
Date: Wednesday, May 28\ Time: 7:00 PM â 1:00 AM\ Location: We All Scream Nightclub, 517 Fremont St., Las Vegas, NV 89101\ đď¸ Get Tickets!
What to Expect:
-
đś Live Music Stage â Featuring Ainsley Costello, Sara Jade, Able James, Martin Groom, Bobby Shell, Jessie Lark, and other V4V artists
-
𪊠DJ Party Deck â With sets by nostr:nprofile1qy0hwumn8ghj7cmgdae82uewd45kketyd9kxwetj9e3k7mf6xs6rgqgcwaehxw309ahx7um5wgh85mm694ek2unk9ehhyecqyq7hpmq75krx2zsywntgtpz5yzwjyg2c7sreardcqmcp0m67xrnkwylzzk4 , nostr:nprofile1qy2hwumn8ghj7etyv4hzumn0wd68ytnvv9hxgqgkwaehxw309anx2etywvhxummnw3ezucnpdejqqg967faye3x6fxgnul77ej23l5aew8yj0x2e4a3tq2mkrgzrcvecfsk8xlu3 , and more DJs throwing down
-
đ°ď¸ Live-streamed via Tunestr
-
đ§ Nostr Education â Talks by nostr:nprofile1qy88wumn8ghj7mn0wvhxcmmv9uq37amnwvaz7tmwdaehgu3dwfjkccte9ejx2un9ddex7umn9ekk2tcqyqlhwrt96wnkf2w9edgr4cfruchvwkv26q6asdhz4qg08pm6w3djg3c8m4j , nostr:nprofile1qyx8wumn8ghj7cnjvghxjmcpz4mhxue69uhk2er9dchxummnw3ezumrpdejqqgxchnavlnv8t5vky5dsa87ddye0jc8z9eza8ekvfryf3yt649mytvhadgpe , nostr:nprofile1q9z8wumn8ghj7erzx3jkvmmzw4eny6tvw368wdt8da4kxamrdvek76mrwg6rwdngw94k67t3v36k77tev3kx7vn2xa5kjem9dp4hjepwd3hkxctvqyg8wumn8ghj7mn0wd68ytnhd9hx2qpqyaul8k059377u9lsu67de7y637w4jtgeuwcmh5n7788l6xnlnrgssuy4zk , nostr:nprofile1qy28wue69uhnzvpwxqhrqt33xgmn5dfsx5cqz9thwden5te0v4jx2m3wdehhxarj9ekxzmnyqqswavgevxe9gs43vwylumr7h656mu9vxmw4j6qkafc3nefphzpph8ssvcgf8 , and more.
-
đ§ž Vendors & Project Booths â Explore new tools and services
-
đ Onboarding Stations â Learn how to use Nostr hands-on
-
đŚ Nostrich Flocking â Meet your favorite nyms IRL
-
đ¸ Three Full Bars â Two floors of socializing overlooking vibrant Fremont Street
This is the after-party of the year for those who love freedom technology and decentralized social community. Donât miss it.
Final Thoughts
Whether you're there to learn, network, party, or build, Bitcoin 2025 in Las Vegas has a packed week of Nostr-friendly programming. Be sure to catch all the events, visit the Nostr Lounge, and experience the growing decentralized social revolution.
đŁ Find us. Flock with us. Purple pill someone.
-
-
@ ee6ea13a:959b6e74
2025-05-13 21:29:02Reposted without permission from Business Insider.
Bitcoin Is A Joke
Joe Weisenthal Nov 6, 2013, 10:42 PM UTC
REUTERS/Eliana Aponte
Bitcoin is back in the news, as the digital currency has surged to new all-time highs in recent weeks.
A few weeks ago, it was just above $100. Today it's over $260.
This surge has prompted Timothy B Lee at The Washington Post to ask whether those who have called it a bubble in the past should retract and admit that they were wrong.
Well I'm not totally sure if I've called it a bubble, but I have spoken negatively of it, and I'll say that I still think it's a joke, and probably in a bubble.
Now first of all, I find the premise of Lee's post to be hilarious. The currency has been surging several percent every day lately, and that's evidence that it's not in a bubble?
Before going on, I want to be clear that saying something is a bubble is not saying it will go down. It could go to $500 or $1000 or $10,000. That's the nature of manias.
But make no mistake, Bitcoin is not the currency of the future. It has no intrinsic value.
Now this idea of "intrinsic value" when it comes to currency bothers people, and Bitcoin Bugs will immediately ask why the U.S. dollar has intrinsic value. There's an answer to that. The U.S. Dollar has intrinsic value because the U.S. government which sets the laws of doing business in the United States says it has intrinsic value. If you want to conduct commerce in the United States you have to pay taxes, and there's only one currency you're allowed to pay taxes in: U.S. dollars. There's no getting around this fact. Furthermore, if you want to use the banking system at all, there's no choice but to use U.S. dollars, because that's the currency of the Fed which is behind the whole thing.
On top of all these laws requiring the U.S. dollar to be used, the United States has a gigantic military that can force people around the world to use dollars (if it came to that) so yes, there's a lot of real-world value behind greenbacks.
Bitcoin? Nada. There's nothing keeping it being a thing. If people lose faith in it, it's over. Bitcoin is fiat currency in the most literal sense of the word.
But it gets worse. Bitcoin is mostly just a speculative vehicle. Yes, there are PR stunts about bars and other shops accepting bitcoins. And there is a Bitcoin ATM for some reason. But mostly Bitcoin is a speculative vehicle. And really, you'd be insane to actually conduct a sizable amount of commerce in bitcoins. That's because the price swings so wildly, that the next day, there's a good chance that one of the parties will have gotten royally screwed. Either the purchaser of the good will have ended up totally blowing a huge opportunity (by not holding longer) or the seller will be totally screwed (if Bitcoin instantly plunges). The very volatility that excited people to want to play the Bitcoin game is death when it comes to real transactions in the real world.
Again, Bitcoin might go up a lot more before it ultimately ends. That's the nature of bubbles. The dotcom bubble crashed a bunch of times on its way up. Then one day it ended. The same will happen with this.
In the meantime, have fun speculating!
-
@ 374ee93a:36623347
2025-05-13 11:47:55Chef's notes
Lovely tart rhubarb jam with the extra firey kick of fresh root ginger.
Technically a vegetable rhubarb has low pectin content so be sure to include a high pectin fruit such as lemon/cooking apple/redcurrant/gooseberry. It also quite watery so we use a slightly higher fruit to sugar ratio (1.2:1) and evaporate off some water at the beginning.
Testing for setting point: put a saucer in the freezer to chill whilst cooking the fruit, after 5 mins of a high boil with the sugar put a small blob of jam on the cold saucer and return to the freezer for 2 minutes. If the jam forms a solid wrinkle when pushed with a spoon it is ready, if it is runny continue cooking and retest every 5 mins
The recipe can be halved for a small batch but if you have lots of rhubarb to process it is better to cook double batches in separate pans because it will take much longer to heat through, this affects the colour and flavour - the jam will taste warm and mellow rather than zingy
Sterilise glass jars in a 120c oven and pot the jam hot leaving 1/4 inch head space, it will keep for 5 years unopened if the lids are well sealed and does not require water bath canning
Details
- â˛ď¸ Prep time: 20 mins
- đł Cook time: 30 mins
- đ˝ď¸ Servings: 6 (jars)
Ingredients
- 1.2kg Rhubarb
- 200g Grated Root Ginger
- 100g Chopped Crystalised Ginger
- 1kg Sugar
- 1 Lemon
Directions
- Chop the rhubarb into 1/2 inch pieces, peel and finely grate the fresh root ginger, chop crystalised ginger into tiny bits. Juice and quarter a lemon (discard pips) and add all these to a pan with a small amount of water
- Simmer gently for 20 mins until the lemon and rhubarb are soft then add the sugar, stir until fully dissolved
- Boil on high to reach setting point, usually at 105 degrees c or when a small blob of jam wrinkles on a cold plate instead of being runny
- Remove the lemon pieces and pot into sterilised jars
-
@ 95543309:196c540e
2025-05-11 12:42:09Lets see if this works with the blossom upload and without markdown hassle.
:cat:
https://blossom.primal.net/73a099f931366732c18dd60da82db6ef65bb368eb96756f07d9fa7a8a3644009.mp4
-
@ 7459d333:f207289b
2025-05-10 10:38:56Description: Just as Bitcoin enabled sovereignty over money, a decentralized shipping protocol would enable sovereignty over trade. An LN/Bisq inspired shipping protocol could create an unstoppable free market.
Bitcoin gave us monetary sovereignty, freeing us from central bank manipulation, inflation, and censorship. But there's a missing link in our freedom journey: the physical world of goods.
The Problem: Even with Bitcoin, global trade remains at the mercy of: - Arbitrary tariffs and import restrictions - Political censorship of goods - Privacy invasion of shipping information - Centralized shipping carriers
The Vision: A decentralized shipping protocol with these properties:
- "Onion-routed" packages: Each carrier only knows the previous and next hop
- Bitcoin-secured multi-sig escrow: Funds locked until package delivery confirmed
- Incentive alignment: Carriers set their own fees based on risk assessment
- Privacy tiers: Options for inspected vs. sealed packages with appropriate pricing
- End-to-end sovereignty: Sender and receiver maintain control, intermediate carriers just fulfill their role
How it could work:
- Sender creates shipping request with package details and destination
- Protocol finds optimal route through independent carriers
- Each hop secured by multi-sig deposits larger than package value
- Carriers only see next hop, not ultimate destination
- Reputation systems and economic incentives maintain integrity
This creates a free market where any individual can participate as a carrier, earning Bitcoin for facilitating trade. Just like Lightning Network nodes, anyone can open "channels" with trusted partners.
Impact: This would enable true free market principles globally, making artificial trade barriers obsolete and empowering individuals to engage in voluntary exchange regardless of geographic or political boundaries.
There are a lot of challenges. But the first question is if this is a real problem and if its worth solving it.
What components would need development first? How would you solve the physical handoff challenges?
originally posted at https://stacker.news/items/976326
-
@ 21335073:a244b1ad
2025-05-09 13:56:57Someone asked for my thoughts, so Iâll share them thoughtfully. Iâm not here to dictate how to promote NostrâIâm still learning about it myself. While Iâm not new to Nostr, freedom tech is a newer space for me. Iâm skilled at advocating for topics I deeply understand, but freedom tech isnât my expertise, so take my words with a grain of salt. Nothing I say is set in stone.
Those who need Nostr the most are the ones most vulnerable to censorship on other platforms right now. Reaching them requires real-time awareness of global issues and the dynamic relationships between governments and tech providers, which can shift suddenly. Effective Nostr promoters must grasp this and adapt quickly.
The best messengers are people from or closely tied to these at-risk regionsâthose who truly understand the local political and cultural dynamics. They can connect with those in need when tensions rise. Ideal promoters are rational, trustworthy, passionate about Nostr, but above all, dedicated to amplifying peopleâs voices when it matters most.
Forget influencers, corporate-backed figures, or traditional online PRâit comes off as inauthentic, corny, desperate and forced. Nostrâs promotion should be grassroots and organic, driven by a few passionate individuals who believe in Nostr and the communities they serve.
The idea that âpeople wonât join Nostr due to lack of reachâ is nonsense. Everyone knows Xâs âreachâ is mostly with bots. If humans want real conversations, Nostr is the place. X is great for propaganda, but Nostr is for the authentic voices of the people.
Those spreading Nostr must be so passionate theyâre willing to onboard others, which is time-consuming but rewarding for the right person. Theyâll need to make Nostr and onboarding a core part of who they are. I see no issue with that level of dedication. Iâve been known to get that way myself at times. Itâs fun for some folks.
With love, I suggest not adding Bitcoin promotion with Nostr outreach. Zaps already integrate that element naturally. (Still promote within the Bitcoin ecosystem, but this is about reaching vulnerable voices who needed Nostr yesterday.)
To promote Nostr, forget conventional strategies. âInfluencersâ arenât the answer. âInfluencersâ are not the future. A trusted local community member has real influenceâreach them. Connect with people seeking Nostrâs benefits but lacking the technical language to express it. This means some in the Nostr community might need to step outside of the Bitcoin bubble, which is uncomfortable but necessary. Thank you in advance to those who are willing to do that.
I donât know who is paid to promote Nostr, if anyone. This piece isnât shade. But itâs exhausting to see innocent voices globally silenced on corporate platforms like X while Nostr exists. Last night, I wondered: how many more voices must be censored before the Nostr community gets uncomfortable and thinks creatively to reach the vulnerable?
A warning: the global need for censorship-resistant social media is undeniable. If Nostr doesnât make itself known, something else will fill that void. Letâs start this conversation.
-
@ d61f3bc5:0da6ef4a
2025-05-06 01:37:28I remember the first gathering of Nostr devs two years ago in Costa Rica. We were all psyched because Nostr appeared to solve the problem of self-sovereign online identity and decentralized publishing. The protocol seemed well-suited for textual content, but it wasn't really designed to handle binary files, like images or video.
The Problem
When I publish a note that contains an image link, the note itself is resilient thanks to Nostr, but if the hosting service disappears or takes my image down, my note will be broken forever. We need a way to publish binary data without relying on a single hosting provider.
We were discussing how there really was no reliable solution to this problem even outside of Nostr. Peer-to-peer attempts like IPFS simply didn't work; they were hopelessly slow and unreliable in practice. Torrents worked for popular files like movies, but couldn't be relied on for general file hosting.
Awesome Blossom
A year later, I attended the Sovereign Engineering demo day in Madeira, organized by Pablo and Gigi. Many projects were presented over a three hour demo session that day, but one really stood out for me.
Introduced by hzrd149 and Stu Bowman, Blossom blew my mind because it showed how we can solve complex problems easily by simply relying on the fact that Nostr exists. Having an open user directory, with the corresponding social graph and web of trust is an incredible building block.
Since we can easily look up any user on Nostr and read their profile metadata, we can just get them to simply tell us where their files are stored. This, combined with hash-based addressing (borrowed from IPFS), is all we need to solve our problem.
How Blossom Works
The Blossom protocol (Blobs Stored Simply on Mediaservers) is formally defined in a series of BUDs (Blossom Upgrade Documents). Yes, Blossom is the most well-branded protocol in the history of protocols. Feel free to refer to the spec for details, but I will provide a high level explanation here.
The main idea behind Blossom can be summarized in three points:
- Users specify which media server(s) they use via their public Blossom settings published on Nostr;
- All files are uniquely addressable via hashes;
- If an app fails to load a file from the original URL, it simply goes to get it from the server(s) specified in the user's Blossom settings.
Just like Nostr itself, the Blossom protocol is dead-simple and it works!
Let's use this image as an example:
If you look at the URL for this image, you will notice that it looks like this:
blossom.primal.net/c1aa63f983a44185d039092912bfb7f33adcf63ed3cae371ebe6905da5f688d0.jpg
All Blossom URLs follow this format:
[server]/[file-hash].[extension]
The file hash is important because it uniquely identifies the file in question. Apps can use it to verify that the file they received is exactly the file they requested. It also gives us the ability to reliably get the same file from a different server.
Nostr users declare which media server(s) they use by publishing their Blossom settings. If I store my files on Server A, and they get removed, I can simply upload them to Server B, update my public Blossom settings, and all Blossom-capable apps will be able to find them at the new location. All my existing notes will continue to display media content without any issues.
Blossom Mirroring
Let's face it, re-uploading files to another server after they got removed from the original server is not the best user experience. Most people wouldn't have the backups of all the files, and/or the desire to do this work.
This is where Blossom's mirroring feature comes handy. In addition to the primary media server, a Blossom user can set one one or more mirror servers. Under this setup, every time a file is uploaded to the primary server the Nostr app issues a mirror request to the primary server, directing it to copy the file to all the specified mirrors. This way there is always a copy of all content on multiple servers and in case the primary becomes unavailable, Blossom-capable apps will automatically start loading from the mirror.
Mirrors are really easy to setup (you can do it in two clicks in Primal) and this arrangement ensures robust media handling without any central points of failure. Note that you can use professional media hosting services side by side with self-hosted backup servers that anyone can run at home.
Using Blossom Within Primal
Blossom is natively integrated into the entire Primal stack and enabled by default. If you are using Primal 2.2 or later, you don't need to do anything to enable Blossom, all your media uploads are blossoming already.
To enhance user privacy, all Primal apps use the "/media" endpoint per BUD-05, which strips all metadata from uploaded files before they are saved and optionally mirrored to other Blossom servers, per user settings. You can use any Blossom server as your primary media server in Primal, as well as setup any number of mirrors:
## Conclusion
For such a simple protocol, Blossom gives us three major benefits:
- Verifiable authenticity. All Nostr notes are always signed by the note author. With Blossom, the signed note includes a unique hash for each referenced media file, making it impossible to falsify.
- File hosting redundancy. Having multiple live copies of referenced media files (via Blossom mirroring) greatly increases the resiliency of media content published on Nostr.
- Censorship resistance. Blossom enables us to seamlessly switch media hosting providers in case of censorship.
Thanks for reading; and enjoy! đ¸
-
@ 6e64b83c:94102ee8
2025-05-05 16:50:13Nostr-static is a powerful static site generator that transforms long-form Nostr content into beautiful, standalone websites. It makes your content accessible to everyone, even those not using Nostr clients. For more information check out my previous blog post How to Create a Blog Out of Nostr Long-Form Articles
What's New in Version 0.7?
RSS and Atom Feeds
Version 0.7 brings comprehensive feed support with both RSS and Atom formats. The system automatically generates feeds for your main content, individual profiles, and tag-specific pages. These feeds are seamlessly integrated into your site's header, making them easily discoverable by feed readers and content aggregators.
This feature bridges the gap between Nostr and traditional web publishing, allowing your content to reach readers who prefer feed readers or automated content distribution systems.
Smart Content Discovery
The new tag discovery system enhances your readers' experience by automatically finding and recommending relevant articles from the Nostr network. It works by:
- Analyzing the tags in your articles
- Fetching popular articles from Nostr that share these tags
- Using configurable weights to rank these articles based on:
- Engagement metrics (reactions, reposts, replies)
- Zap statistics (amount, unique zappers, average zap size)
- Content quality signals (report penalties)
This creates a dynamic "Recommended Articles" section that helps readers discover more content they might be interested in, all while staying within the Nostr ecosystem.
See the new features yourself by visiting our demo at: https://blog.nostrize.me
-
@ 6e0ea5d6:0327f353
2025-05-04 14:53:42Amico mio, ascolta bene!
Without hesitation, the woman you attract with lies is not truly yours. Davvero, she is the temporary property of the illusion youâve built to seduce her. And every illusion, sooner or later, crumbles.
Weak men sell inflated versions of themselves. They talk about what they donât have, promise what they canât sustain, adorn their empty selves with words that are nothing more than a coat of paint. And they do this thinking that, later, theyâll be able to "show who they really are." Fatal mistake, cazzo!
The truth, amico mio, is not something that appears at the end. It is what holds up the whole beginning.
The woman who approaches a lie may smile at first â but she is smiling at the theater, not at the actor. When the curtains fall, what she will see is not a man. It will be a character tired of performing, begging for love from a self-serving audience in the front row.
Thatâs why I always point out that lying to win a womanâs heart is the same as sabotaging your own nature. The woman who comes through an invented version of you will be the first to leave when the veil of lies tears apart. Not out of cruelty, but out of consistency with her own interest. Fine... She didnât leave you, but rather, that version of yourself never truly existed to be left behind.
A worthy man presents himself without deceptive adornments. And those who stay, stay because they know exactly who they are choosing as a man. Thatâs what differentiates forged seduction from the convenience of love built on honor, loyalty, and respect.
Ah, amico mio, I remember well. It was lunch on an autumn day in Catania. Mediterranean heat, and the Nero D'Avola wine from midday clinging to the lips like dried blood. Sitting in the shade of a lemon tree planted right by my grandfather's vineyard entrance, my uncle â the oldest of my fatherâs brothers â spoke little, but when he called us to sit by his side, all the nephews would quiet down to listen. And in my youth, he told me something that has never left my mind.
âIn Sicily, the woman who endures the silence of a man about his business is more loyal than the one who is enchanted by speeches about what he does or how much he earns. Perchè, figlio mio, the first one has seen the truth. The second one, only a false shine.â
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "đĽ" as a token of appreciation.
A toast to our family!
-
@ 266815e0:6cd408a5
2025-05-02 22:24:59Its been six long months of refactoring code and building out to the applesauce packages but the app is stable enough for another release.
This update is pretty much a full rewrite of the non-visible parts of the app. all the background services were either moved out to the applesauce packages or rewritten, the result is that noStrudel is a little faster and much more consistent with connections and publishing.
New layout
The app has a new layout now, it takes advantage of the full desktop screen and looks a little better than it did before.
Removed NIP-72 communities
The NIP-72 communities are no longer part of the app, if you want to continue using them there are still a few apps that support them ( like satellite.earth ) but noStrudel won't support them going forward.
The communities where interesting but ultimately proved too have some fundamental flaws, most notably that all posts had to be approved by a moderator. There were some good ideas on how to improve it but they would have only been patches and wouldn't have fixed the underlying issues.
I wont promise to build it into noStrudel, but NIP-29 (relay based groups) look a lot more promising and already have better moderation abilities then NIP-72 communities could ever have.
Settings view
There is now a dedicated settings view, so no more hunting around for where the relays are set or trying to find how to add another account. its all in one place now
Cleaned up lists
The list views are a little cleaner now, and they have a simple edit modal
New emoji picker
Just another small improvement that makes the app feel more complete.
Experimental Wallet
There is a new "wallet" view in the app that lets you manage your NIP-60 cashu wallet. its very experimental and probably won't work for you, but its there and I hope to finish it up so the app can support NIP-61 nutzaps.
WARNING: Don't feed the wallet your hard earned sats, it will eat them!
Smaller improvements
- Added NSFW flag for replies
- Updated NIP-48 bunker login to work with new spec
- Linkfy BIPs
- Added 404 page
- Add NIP-22 comments under badges, files, and articles
- Add max height to timeline notes
- Fix articles view freezing on load
- Add option to mirror blobs when sharing notes
- Remove "open in drawer" for notes
-
@ 005bc4de:ef11e1a2
2025-05-14 22:14:33My Actifit Report Card: May 14 2025
After about two months of going easy, I finally got back to a light jog for 15 minutes. Hurt my knee then (and the hurt lingered), but happy to try again. Need to slowly strengthen now. Random pic of a vase of birds from this weekend. This report was published via Actifit app (https://bit.ly/actifit-app | https://bit.ly/actifit-ios). Check out the original version https://actifit.io/@crrdlx/actifit-crrdlx-20250514t221316977z 14/05/2025 6035 Cycling, Jogging
Originally posted on Hive at https://hive.blog/@crrdlx/actifit-crrdlx-20250514t221316977z
Auto cross-post via Hostr bridge v0.1.0 at https://hostr-home.vercel.app
-
@ 088436cd:9d2646cc
2025-05-01 21:01:55The arrival of the coronavirus brought not only illness and death but also fear and panic. In such an environment of uncertainty, people have naturally stocked up on necessities, not knowing when things will return to normal.
Retail shelves have been cleared out, and even online suppliers like Amazon and Walmart are out of stock for some items. Independent sellers on these e-commerce platforms have had to fill the gap. With the huge increase in demand, they have found that their inventory has skyrocketed in value.
Many in need of these items (e.g. toilet paper, hand sanitizer and masks) balk at the new prices. They feel they are being taken advantage of in a time of need and call for intervention by the government to lower prices. The government has heeded that call, labeling the independent sellers as "price gougers" and threatening sanctions if they don't lower their prices. Amazon has suspended seller accounts and law enforcement at all levels have threatened to prosecute. Prices have dropped as a result and at first glance this seems like a victory for fair play. But, we will have to dig deeper to understand the unseen consequences of this intervention.
We must look at the economics of the situation, how supply and demand result in a price and how that price acts as a signal that goes out to everyone, informing them of underlying conditions in the economy and helping coordinate their actions.
It all started with a rise in demand. Given a fixed supply (e.g., the limited stock on shelves and in warehouses), an increase in demand inevitably leads to higher prices. Most people are familiar with this phenomenon, such as paying more for airline tickets during holidays or surge pricing for rides.
Higher prices discourage less critical uses of scarce resources. For example, you might not pay $1,000 for a plane ticket to visit your aunt if you can get one for $100 the following week, but someone else might pay that price to visit a dying relative. They value that plane seat more than you.
*** During the crisis, demand surged and their shelves emptied even though
However, retail outlets have not raised prices. They have kept them low, so the low-value uses of things like toilet paper, masks and hand sanitizer has continued. Often, this "use" just takes the form of hoarding. At everyday low prices, it makes sense to buy hundreds of rolls and bottles. You know you will use them eventually, so why not stock up? And, with all those extra supplies in the closet and basement, you don't need to change your behavior much. You don't have to ration your use.
At the low prices, these scarce resources got bought up faster and faster until there was simply none left. The reality of the situation became painfully clear to those who didn't panic and got to the store late: You have no toilet paper and you're not going to any time soon.
However, if prices had been allowed to rise, a number of effects would have taken place that would have coordinated the behavior of everyone so that valuable resources would not have been wasted or hoarded, and everyone could have had access to what they needed.
On the demand side, if prices had been allowed to rise, people would have begun to self-ration. You might leave those extra plies on the roll next time if you know they will cost ten times as much to replace. Or, you might choose to clean up a spill with a rag rather than disposable tissue. Most importantly, you won't hoard as much. That 50th bottle of hand sanitizer might just not be worth it at the new, high price. You'll leave it on the shelf for someone else who may have none.
On the supply side, higher prices would have incentivized people to offer up more of their stockpiles for sale. If you have a pallet full of toilet paper in your basement and all of the sudden they are worth $15 per roll, you might just list a few online. But, if it is illegal to do so, you probably won't.
Imagine you run a business installing insulation and have a few thousand respirator masks on hand for your employees. During a pandemic, it is much more important that people breathe filtered air than that insulation get installed, and that fact is reflected in higher prices. You will sell your extra masks at the higher price rather than store them for future insulation jobs, and the scarce resource will be put to its most important use.
Producers of hand sanitizer would go into overdrive if prices were allowed to rise. They would pay their employees overtime, hire new ones, and pay a premium for their supplies, making sure their raw materials don't go to less important uses.
These kinds of coordinated actions all across the economy would be impossible without real prices to guide them. How do you know if it makes sense to spend an extra $10k bringing a thousand masks to market unless you know you can get more than $10 per mask? If the price is kept artificially low, you simply can't do it. The money just isn't there.
These are the immediate effects of a price change, but incredibly, price changes also coordinate people's actions across space and time.
Across space, there are different supply and demand conditions in different places, and thus prices are not uniform. We know some places are real "hot spots" for the virus, while others are mostly unaffected. High demand in the hot spots leads to higher prices there, which attracts more of the resource to those areas. Boxes and boxes of essential items would pour in where they are needed most from where they are needed least, but only if prices were allowed to adjust freely.
This would be accomplished by individuals and businesses buying low in the unaffected areas, selling high in the hot spots and subtracting their labor and transportation costs from the difference. Producers of new supply would know exactly where it is most needed and ship to the high-demand, high-price areas first. The effect of these actions is to increase prices in the low demand areas and reduce them in the high demand areas. People in the low demand areas will start to self-ration more, reflecting the reality of their neighbors, and people in the hotspots will get some relief.
However, by artificially suppressing prices in the hot spot, people there will simply buy up the available supply and run out, and it will be cost prohibitive to bring in new supply from low-demand areas.
Prices coordinate economic actions across time as well. Just as entrepreneurs and businesses can profit by transporting scarce necessities from low-demand to high-demand areas, they can also profit by buying in low-demand times and storing their merchandise for when it is needed most.
Just as allowing prices to freely adjust in one area relative to another will send all the right signals for the optimal use of a scarce resource, allowing prices to freely adjust over time will do the same.
When an entrepreneur buys up resources during low-demand times in anticipation of a crisis, she restricts supply ahead of the crisis, which leads to a price increase. She effectively bids up the price. The change in price affects consumers and producers in all the ways mentioned above. Consumers self-ration more, and producers bring more of the resource to market.
Our entrepreneur has done a truly incredible thing. She has predicted the future, and by so doing has caused every individual in the economy to prepare for a shortage they don't even know is coming! And, by discouraging consumption and encouraging production ahead of time, she blunts the impact the crisis will have. There will be more of the resource to go around when it is needed most.
On top of this, our entrepreneur still has her stockpile she saved back when everyone else was blithely using it up. She can now further mitigate the damage of the crisis by selling her stock during the worst of it, when people are most desperate for relief. She will know when this is because the price will tell her, but only if it is allowed to adjust freely. When the price is at its highest is when people need the resource the most, and those willing to pay will not waste it or hoard it. They will put it to its highest valued use.
The economy is like a big bus we are all riding in, going down a road with many twists and turns. Just as it is difficult to see into the future, it is difficult to see out the bus windows at the road ahead.
On the dashboard, we don't have a speedometer or fuel gauge. Instead we have all the prices for everything in the economy. Prices are what tell us the condition of the bus and the road. They tell us everything. Without them, we are blind.
Good times are a smooth road. Consumer prices and interest rates are low, investment returns are steady. We hit the gas and go fast. But, the road is not always straight and smooth. Sometimes there are sharp turns and rough patches. Successful entrepreneurs are the ones who can see what is coming better than everyone else. They are our navigators.
When they buy up scarce resources ahead of a crisis, they are hitting the brakes and slowing us down. When they divert resources from one area to another, they are steering us onto a smoother path. By their actions in the market, they adjust the prices on our dashboard to reflect the conditions of the road ahead, so we can prepare for, navigate and get through the inevitable difficulties we will face.
Interfering with the dashboard by imposing price floors or price caps doesn't change the conditions of the road (the number of toilet paper rolls in existence hasn't changed). All it does is distort our perception of those conditions. We think the road is still smooth--our heavy foot stomping the gas--as we crash onto a rocky dirt road at 80 miles per hour (empty shelves at the store for weeks on end).
Supply, demand and prices are laws of nature. All of this is just how things work. It isn't right or wrong in a moral sense. Price caps lead to waste, shortages and hoarding as surely as water flows downhill. The opposite--allowing prices to adjust freely--leads to conservation of scarce resources and their being put to their highest valued use. And yes, it leads to profits for the entrepreneurs who were able to correctly predict future conditions, and losses for those who weren't.
Is it fair that they should collect these profits? On the one hand, anyone could have stocked up on toilet paper, hand sanitizer and face masks at any time before the crisis, so we all had a fair chance to get the supplies cheaply. On the other hand, it just feels wrong that some should profit so much at a time when there is so much need.
Our instinct in the moment is to see the entrepreneur as a villain, greedy "price gouger". But we don't see the long chain of economic consequences the led to the situation we feel is unfair.
If it weren't for anti-price-gouging laws, the major retailers would have raised their prices long before the crisis became acute. When they saw demand outstrip supply, they would have raised prices, not by 100 fold, but gradually and long before anyone knew how serious things would have become. Late comers would have had to pay more, but at least there would be something left on the shelf.
As an entrepreneur, why take risks trying to anticipate the future if you can't reap the reward when you are right? Instead of letting instead of letting entrepreneurs--our navigators--guide us, we are punishing and vilifying them, trying to force prices to reflect a reality that simply doesn't exist.
In a crisis, more than any other time, prices must be allowed to fluctuate. To do otherwise is to blind ourselves at a time when danger and uncertainty abound. It is economic suicide.
In a crisis, there is great need, and the way to meet that need is not by pretending it's not there, by forcing prices to reflect a world where there isn't need. They way to meet the need is the same it has always been, through charity.
If the people in government want to help, the best way for the to do so is to be charitable and reduce their taxes and fees as much as possible, ideally to zero in a time of crisis. Amazon, for example, could instantly reduce the price of all crisis related necessities by 20% if they waived their fee. This would allow for more uses by more people of these scarce supplies as hoarders release their stockpiles on to the market, knowing they can get 20% more for their stock. Governments could reduce or eliminate their tax burden on high-demand, crisis-related items and all the factors that go into their production, with the same effect: a reduction in prices and expansion of supply. All of us, including the successful entrepreneurs and the wealthy for whom high prices are not a great burden, could donate to relief efforts.
These ideas are not new or untested. This is core micro economics. It has been taught for hundreds of years in universities the world over. The fact that every crisis that comes along stirs up ire against entrepreneurs indicates not that the economics is wrong, but that we have a strong visceral reaction against what we perceive to be unfairness. This is as it should be. Unfairness is wrong and the anger it stirs in us should compel us to right the wrong. Our anger itself isn't wrong, it's just misplaced.
Entrepreneurs didn't cause the prices to rise. Our reaction to a virus did that. We saw a serious threat and an uncertain future and followed our natural impulse to hoard. Because prices at major retail suppliers didn't rise, that impulse ran rampant and we cleared the shelves until there was nothing left. We ran the bus right off the road and them blamed the entrepreneurs for showing us the reality of our situation, for shaking us out of the fantasy of low prices.
All of this is not to say that entrepreneurs are high-minded public servants. They are just doing their job. Staking your money on an uncertain future is a risky business. There are big risks and big rewards. Most entrepreneurs just scrape by or lose their capital in failed ventures.
However, the ones that get it right must be allowed to keep their profits, or else no one will try and we'll all be driving blind. We need our navigators. It doesn't even matter if they know all the positive effects they are having on the rest of us and the economy as a whole. So long as they are buying low and selling high--so long as they are doing their job--they will be guiding the rest of us through the good times and the bad, down the open road and through the rough spots.
-
@ 979ab082:dedeefb6
2025-05-14 21:56:32â ď¸ Disclaimer: This article is provided for educational purposes only. The software and tools described are intended for testing, simulation, and blockchain research. @crypptrcver is not responsible for any misuse.
đĄ What Is Flash Bitcoin? Flash Bitcoin refers to a spoofed BTC transaction that appears instantly in a wallet but is not confirmed on the blockchain. It is a temporary, visual transaction used for simulations, testing, or demonstrating wallet behavior.
đ Flash Bitcoin Meaning: BTC appears in the recipient wallet balance. It disappears after a set number of blocks or minutes. Not confirmed by miners, not spendable. Used in demos, stress tests, or simulated âproof of fundsâ. Flash BTC is also called:
Flash Bitcoin sender Flash BTC software Flash Bitcoin APK (mobile version) đ˝ Flash Bitcoin Software â What It Does Flash Bitcoin software lets you:
Send unconfirmed BTC to any wallet (SegWit, Legacy, etc.) Choose expiry time (e.g. 20 minutes or 6 blocks) Configure amount, transaction speed, and delay Simulate flash bitcoin transactions that display as real Popular for:
Blockchain app testing Wallet balance simulation Flashing BTC to cold wallets or watch-only addresses Versions like Flash Bitcoin Sender APK also exist for Android, making it easy to simulate transfers on mobile wallets like Electrum or Trust Wallet.
đ ď¸ Key Features of Flash Bitcoin Sender: FeatureDescriptionFlash BTC balanceAppears instantly in walletExpiry optionsDisappears after blocks/timeOffline mode supportSend from private environmentsFlash Bitcoin APKAvailable for Android useFlash Bitcoin priceVaries by volume and license type
đ How to Flash Bitcoin (Step-by-Step) â Install Flash BTC software or APK â Enter the receiving wallet address â Set BTC amount (e.g. 0.5 BTC) â Choose expiration (e.g. 30 mins) â Send â transaction appears instantly in the target wallet Note: The transaction is visible but will never confirm on-chain. It vanishes after a set delay.
⥠What Is Flash USDT? Flash USDT is a spoofed USDT (Tether) transaction that mimics a legitimate token transfer. Like flash BTC, it appears in the wallet without a real blockchain confirmation, then disappears after a time or network rejection.
Flash USDT Basics: Works on TRC20, ERC20, and BEP20 Appears in Trust Wallet, MetaMask, Binance Smart Chain wallets Often referred to as: Flash USDT wallet Atomic Flash USDT Flash USDT Binance spoof đ§ Flash USDT Use Cases: Simulate âproof of fundsâ Show fake USDT deposits in investor training Flash USDT for Binance wallet tests đź Flash Software Options: Bitcoin vs USDT FeatureFlash BitcoinFlash USDTCurrencyBTCUSDTWallet typeLegacy/SegWitTRC20, ERC20, BEP20Disappear timingBy block or timerTime-based (20â60 mins)Spendable?â Noâ NoConfirmed?â Never confirmsâ Never confirms
Both tools are simulation-only and should never be used to deceive others.
đą Flash Bitcoin Sender for Android Looking to flash on mobile?
The Flash Bitcoin APK is the easiest way to send spoofed BTC from your Android phone. Itâs designed for:
On-the-go wallet testing Real-time balance visualizations Lightweight operation for mobile testing labs â ď¸ Warning: Never Use Flash Transactions for Fraud Flash BTC and Flash USDT tools are not real money. They cannot be sent, traded, or withdrawn. Using them in real marketplaces, to deceive vendors, or for financial gain is illegal and traceable.
Use only in:
Environments you control Simulation labs Wallet development or education đ Ready to Get Started? To purchase Flash Bitcoin tools, Flash USDT packages, or the sender software:
đŹ Telegram: @crypptrcver đą WhatsApp: +1 941 217 1821
Custom builds, APK delivery, and live testing support available.
â Frequently Asked Questions What is flash bitcoin? A temporary BTC transaction that appears in the wallet balance without being confirmed.
How to flash bitcoin? Use flash BTC software or APK, input wallet address, choose amount and expiry, then send.
What is flash bitcoin sender APK? A mobile version of the flash sender that allows you to simulate BTC deposits on Android.
How to buy flash USDT? Contact @crypptrcver for Flash USDT packages tailored to TRC20, ERC20, or BEP20 wallets. Is flash bitcoin or flash usdt real? No â both are for testing and do not exist on the blockchain permanently.
đ§ Final Thoughts In 2025, Flash Bitcoin and Flash USDT have become critical tools for developers, security researchers, and crypto educators. If youâre looking to explore blockchain simulations safely and responsibly, these tools offer unmatched realism â without actual crypto movement.
đ Contact to get started:
đŹ Telegram: @crypptrcver đą WhatsApp: +1 941 217 1821
â ď¸Â Disclaimer: This article is provided for educational purposes only. The software and tools described are intended for testing, simulation, and blockchain research. @crypptrcver is not responsible for any misuse.
đĄ What Is Flash Bitcoin?
Flash Bitcoin refers to a spoofed BTC transaction that appears instantly in a wallet but is not confirmed on the blockchain. It is a temporary, visual transaction used for simulations, testing, or demonstrating wallet behavior.
đ Flash Bitcoin Meaning:
- BTC appears in the recipient wallet balance.
- It disappears after a set number of blocks or minutes.
- Not confirmed by miners, not spendable.
- Used in demos, stress tests, or simulated âproof of fundsâ.
Flash BTC is also called:
- Flash Bitcoin sender
- Flash BTC software
- Flash Bitcoin APK (mobile version)
đ˝ Flash Bitcoin Software â What It Does
Flash Bitcoin software lets you:
- Send unconfirmed BTC to any wallet (SegWit, Legacy, etc.)
- Choose expiry time (e.g. 20 minutes or 6 blocks)
- Configure amount, transaction speed, and delay
- Simulate flash bitcoin transactions that display as real
Popular for:
- Blockchain app testing
- Wallet balance simulation
- Flashing BTC to cold wallets or watch-only addresses
Versions like Flash Bitcoin Sender APK also exist for Android, making it easy to simulate transfers on mobile wallets like Electrum or Trust Wallet.
đ ď¸ Key Features of Flash Bitcoin Sender:
FeatureDescriptionFlash BTC balanceAppears instantly in walletExpiry optionsDisappears after blocks/timeOffline mode supportSend from private environmentsFlash Bitcoin APKAvailable for Android useFlash Bitcoin priceVaries by volume and license type
đ How to Flash Bitcoin (Step-by-Step)
- â Install Flash BTC software or APK
- â Enter the receiving wallet address
- â Set BTC amount (e.g. 0.5 BTC)
- â Choose expiration (e.g. 30 mins)
- â Send â transaction appears instantly in the target wallet
Note: The transaction is visible but will never confirm on-chain. It vanishes after a set delay.
⥠What Is Flash USDT?
Flash USDT is a spoofed USDT (Tether) transaction that mimics a legitimate token transfer. Like flash BTC, it appears in the wallet without a real blockchain confirmation, then disappears after a time or network rejection.
Flash USDT Basics:
- Works on TRC20, ERC20, and BEP20
- Appears in Trust Wallet, MetaMask, Binance Smart Chain wallets
- Often referred to as:
- Flash USDT wallet
- Atomic Flash USDT
- Flash USDT Binance spoof
đ§ Flash USDT Use Cases:
- Simulate âproof of fundsâ
- Show fake USDT deposits in investor training
- Flash USDT for Binance wallet tests
đź Flash Software Options: Bitcoin vs USDT
FeatureFlash BitcoinFlash USDTCurrencyBTCUSDTWallet typeLegacy/SegWitTRC20, ERC20, BEP20Disappear timingBy block or timerTime-based (20â60 mins)Spendable?â Noâ NoConfirmed?â Never confirmsâ Never confirms
Both tools are simulation-only and should never be used to deceive others.
đą Flash Bitcoin Sender for Android
Looking to flash on mobile?
The Flash Bitcoin APK is the easiest way to send spoofed BTC from your Android phone. Itâs designed for:
- On-the-go wallet testing
- Real-time balance visualizations
- Lightweight operation for mobile testing labs
â ď¸ Warning: Never Use Flash Transactions for Fraud
Flash BTC and Flash USDT tools are not real money. They cannot be sent, traded, or withdrawn. Using them in real marketplaces, to deceive vendors, or for financial gain is illegal and traceable.
Use only in:
- Environments you control
- Simulation labs
- Wallet development or education
đ Ready to Get Started?
To purchase Flash Bitcoin tools, Flash USDT packages, or the sender software:
đŹÂ Telegram: @crypptrcver\ đąÂ WhatsApp: +1 941 217 1821
Custom builds, APK delivery, and live testing support available.
â Frequently Asked Questions
What is flash bitcoin?
A temporary BTC transaction that appears in the wallet balance without being confirmed.
How to flash bitcoin?
Use flash BTC software or APK, input wallet address, choose amount and expiry, then send.
What is flash bitcoin sender APK?
A mobile version of the flash sender that allows you to simulate BTC deposits on Android.
How to buy flash USDT?
Contact @crypptrcver for Flash USDT packages tailored to TRC20, ERC20, or BEP20 wallets.
Is flash bitcoin or flash usdt real?
No â both are for testing and do not exist on the blockchain permanently.
đ§ Final Thoughts
In 2025, Flash Bitcoin and Flash USDT have become critical tools for developers, security researchers, and crypto educators. If youâre looking to explore blockchain simulations safely and responsibly, these tools offer unmatched realism â without actual crypto movement.
đ Contact to get started:
đŹÂ Telegram: @crypptrcver\ đąÂ WhatsApp: +1 941 217 1821
-
@ 21335073:a244b1ad
2025-05-01 01:51:10Please respect Virginia Giuffreâs memory by refraining from asking about the circumstances or theories surrounding her passing.
Since Virginia Giuffreâs death, Iâve reflected on what she would want me to say or do. This piece is my attempt to honor her legacy.
When I first spoke with Virginia, I was struck by her unshakable hope. I had grown cynical after years in the anti-human trafficking movement, worn down by a broken system and a government that often seemed complicit. But Virginiaâs passion, creativity, and belief that survivors could be heard reignited something in me. She reminded me of my younger, more hopeful self. Instead of warning her about the challenges ahead, I let her dream big, unburdened by my own disillusionment. That conversation changed me for the better, and following her lead led to meaningful progress.
Virginia was one of the bravest people Iâve ever known. As a survivor of Epstein, Maxwell, and their co-conspirators, she risked everything to speak out, taking on some of the worldâs most powerful figures.
She loved when I said, âEpstein isnât the only Epstein.â This wasnât just about one manâit was a call to hold all abusers accountable and to ensure survivors find hope and healing.
The Epstein case often gets reduced to sensational details about the elite, but that misses the bigger picture. Yes, we should be holding all of the co-conspirators accountable, we must listen to the survivorsâ stories. Their experiences reveal how predators exploit vulnerabilities, offering lessons to prevent future victims.
Youâre not powerless in this fight. Educate yourself about trafficking and abuseâonline and offlineâand take steps to protect those around you. Supporting survivors starts with small, meaningful actions. Free online resources can guide you in being a safe, supportive presence.
When high-profile accusations arise, resist snap judgments. Instead of dismissing survivors as âcrazy,â pause to consider the trauma they may be navigating. Speaking out or coping with abuse is never easy. You donât have to believe every claim, but you can refrain from attacking accusers online.
Society also fails at providing aftercare for survivors. The government, often part of the problem, wonât solve this. Itâs up to us. Prevention is critical, but when abuse occurs, step up for your loved ones and community. Protect the vulnerable. itâs a challenging but a rewarding journey.
If youâre contributing to Nostr, youâre helping build a censorship resistant platform where survivors can share their stories freely, no matter how powerful their abusers are. Their voices can endure here, offering strength and hope to others. This gives me great hope for the future.
Virginia Giuffreâs courage was a gift to the world. It was an honor to know and serve her. She will be deeply missed. My hope is that her story inspires others to take on the powerful.
-
@ a008def1:57a3564d
2025-04-30 17:52:11A Vision for #GitViaNostr
Git has long been the standard for version control in software development, but over time, we has lost its distributed nature. Originally, Git used open, permissionless email for collaboration, which worked well at scale. However, the rise of GitHub and its centralized pull request (PR) model has shifted the landscape.
Now, we have the opportunity to revive Git's permissionless and distributed nature through Nostr!
Weâve developed tools to facilitate Git collaboration via Nostr, but there are still significant friction that prevents widespread adoption. This article outlines a vision for how we can reduce those barriers and encourage more repositories to embrace this approach.
First, weâll review our progress so far. Then, weâll propose a guiding philosophy for our next steps. Finally, weâll discuss a vision to tackle specific challenges, mainly relating to the role of the Git server and CI/CD.
I am the lead maintainer of ngit and gitworkshop.dev, and Iâve been fortunate to work full-time on this initiative for the past two years, thanks to an OpenSats grant.
How Far Weâve Come
The aim of #GitViaNostr is to liberate discussions around code collaboration from permissioned walled gardens. At the core of this collaboration is the process of proposing and applying changes. That's what we focused on first.
Since Nostr shares characteristics with email, and with NIP34, weâve adopted similar primitives to those used in the patches-over-email workflow. This is because of their simplicity and that they donât require contributors to host anything, which adds reliability and makes participation more accessible.
However, the fork-branch-PR-merge workflow is the only model many developers have known, and changing established workflows can be challenging. To address this, we developed a new workflow that balances familiarity, user experience, and alignment with the Nostr protocol: the branch-PR-merge model.
This model is implemented in ngit, which includes a Git plugin that allows users to engage without needing to learn new commands. Additionally, gitworkshop.dev offers a GitHub-like interface for interacting with PRs and issues. We encourage you to try them out using the quick start guide and share your feedback. You can also explore PRs and issues with gitplaza.
For those who prefer the patches-over-email workflow, you can still use that approach with Nostr through gitstr or the
ngit send
andngit list
commands, and explore patches with patch34.The tools are now available to support the core collaboration challenge, but we are still at the beginning of the adoption curve.
Before we dive into the challengesâsuch as why the Git server setup can be jarring and the possibilities surrounding CI/CDâletâs take a moment to reflect on how we should approach the challenges ahead of us.
Philosophy
Here are some foundational principles I shared a few years ago:
- Let Git be Git
- Let Nostr be Nostr
- Learn from the successes of others
Iâd like to add one more:
- Embrace anarchy and resist monolithic development.
Micro Clients FTW
Nostr celebrates simplicity, and we should strive to maintain that. Monolithic developments often lead to unnecessary complexity. Projects like gitworkshop.dev, which aim to cover various aspects of the code collaboration experience, should not stifle innovation.
Just yesterday, the launch of following.space demonstrated how vibe-coded micro clients can make a significant impact. They can be valuable on their own, shape the ecosystem, and help push large and widely used clients to implement features and ideas.
The primitives in NIP34 are straightforward, and if there are any barriers preventing the vibe-coding of a #GitViaNostr app in an afternoon, we should work to eliminate them.
Micro clients should lead the way and explore new workflows, experiences, and models of thinking.
Take kanbanstr.com. It provides excellent project management and organization features that work seamlessly with NIP34 primitives.
From kanban to code snippets, from CI/CD runners to SatShootâmay a thousand flowers bloom, and a thousand more after them.
Friction and Challenges
The Git Server
In #GitViaNostr, maintainers' branches (e.g.,
master
) are hosted on a Git server. Hereâs why this approach is beneficial:- Follows the original Git vision and the "let Git be Git" philosophy.
- Super efficient, battle-tested, and compatible with all the ways people use Git (e.g., LFS, shallow cloning).
- Maintains compatibility with related systems without the need for plugins (e.g., for build and deployment).
- Only repository maintainers need write access.
In the original Git model, all users would need to add the Git server as a 'git remote.' However, with ngit, the Git server is hidden behind a Nostr remote, which enables:
- Hiding complexity from contributors and users, so that only maintainers need to know about the Git server component to start using #GitViaNostr.
- Maintainers can easily swap Git servers by updating their announcement event, allowing contributors/users using ngit to automatically switch to the new one.
Challenges with the Git Server
While the Git server model has its advantages, it also presents several challenges:
- Initial Setup: When creating a new repository, maintainers must select a Git server, which can be a jarring experience. Most options come with bloated social collaboration features tied to a centralized PR model, often difficult or impossible to disable.
-
Manual Configuration: New repositories require manual configuration, including adding new maintainers through a browser UI, which can be cumbersome and time-consuming.
-
User Onboarding: Many Git servers require email sign-up or KYC (Know Your Customer) processes, which can be a significant turn-off for new users exploring a decentralized and permissionless alternative to GitHub.
Once the initial setup is complete, the system works well if a reliable Git server is chosen. However, this is a significant "if," as we have become accustomed to the excellent uptime and reliability of GitHub. Even professionally run alternatives like Codeberg can experience downtime, which is frustrating when CI/CD and deployment processes are affected. This problem is exacerbated when self-hosting.
Currently, most repositories on Nostr rely on GitHub as the Git server. While maintainers can change servers without disrupting their contributors, this reliance on a centralized service is not the decentralized dream we aspire to achieve.
Vision for the Git Server
The goal is to transform the Git server from a single point of truth and failure into a component similar to a Nostr relay.
Functionality Already in ngit to Support This
-
State on Nostr: Store the state of branches and tags in a Nostr event, removing reliance on a single server. This validates that the data received has been signed by the maintainer, significantly reducing the trust requirement.
-
Proxy to Multiple Git Servers: Proxy requests to all servers listed in the announcement event, adding redundancy and eliminating the need for any one server to match GitHub's reliability.
Implementation Requirements
To achieve this vision, the Nostr Git server implementation should:
-
Implement the Git Smart HTTP Protocol without authentication (no SSH) and only accept pushes if the reference tip matches the latest state event.
-
Avoid Bloat: There should be no user authentication, no database, no web UI, and no unnecessary features.
-
Automatic Repository Management: Accept or reject new repositories automatically upon the first push based on the content of the repository announcement event referenced in the URL path and its author.
Just as there are many free, paid, and self-hosted relays, there will be a variety of free, zero-step signup options, as well as self-hosted and paid solutions.
Some servers may use a Web of Trust (WoT) to filter out spam, while others might impose bandwidth or repository size limits for free tiers or whitelist specific npubs.
Additionally, some implementations could bundle relay and blossom server functionalities to unify the provision of repository data into a single service. These would likely only accept content related to the stored repositories rather than general social nostr content.
The potential role of CI / CD via nostr DVMs could create the incentives for a market of highly reliable free at the point of use git servers.
This could make onboarding #GitViaNostr repositories as easy as entering a name and selecting from a multi-select list of Git server providers that announce via NIP89.
!(image)[https://image.nostr.build/badedc822995eb18b6d3c4bff0743b12b2e5ac018845ba498ce4aab0727caf6c.jpg]
Git Client in the Browser
Currently, many tasks are performed on a Git server web UI, such as:
- Browsing code, commits, branches, tags, etc.
- Creating and displaying permalinks to specific lines in commits.
- Merging PRs.
- Making small commits and PRs on-the-fly.
Just as nobody goes to the web UI of a relay (e.g., nos.lol) to interact with notes, nobody should need to go to a Git server to interact with repositories. We use the Nostr protocol to interact with Nostr relays, and we should use the Git protocol to interact with Git servers. This situation has evolved due to the centralization of Git servers. Instead of being restricted to the view and experience designed by the server operator, users should be able to choose the user experience that works best for them from a range of clients. To facilitate this, we need a library that lowers the barrier to entry for creating these experiences. This library should not require a full clone of every repository and should not depend on proprietary APIs. As a starting point, I propose wrapping the WASM-compiled gitlib2 library for the web and creating useful functions, such as showing a file, which utilizes clever flags to minimize bandwidth usage (e.g., shallow clone, noblob, etc.).
This approach would not only enhance clients like gitworkshop.dev but also bring forth a vision where Git servers simply run the Git protocol, making vibe coding Git experiences even better.
song
nostr:npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6 created song with a complementary vision that has shaped how I see the role of the git server. Its a self-hosted, nostr-permissioned git server with a relay baked in. Its currently a WIP and there are some compatability with ngit that we need to work out.
We collaborated on the nostr-permissioning approach now reflected in nip34.
I'm really excited to see how this space evolves.
CI/CD
Most projects require CI/CD, and while this is often bundled with Git hosting solutions, it is currently not smoothly integrated into #GitViaNostr yet. There are many loosely coupled options, such as Jenkins, Travis, CircleCI, etc., that could be integrated with Nostr.
However, the more exciting prospect is to use DVMs (Data Vending Machines).
DVMs for CI/CD
Nostr Data Vending Machines (DVMs) can provide a marketplace of CI/CD task runners with Cashu for micro payments.
There are various trust levels in CI/CD tasks:
- Tasks with no secrets eg. tests.
- Tasks using updatable secrets eg. API keys.
- Unverifiable builds and steps that sign with Android, Nostr, or PGP keys.
DVMs allow tasks to be kicked off with specific providers using a Cashu token as payment.
It might be suitable for some high-compute and easily verifiable tasks to be run by the cheapest available providers. Medium trust tasks could be run by providers with a good reputation, while high trust tasks could be run on self-hosted runners.
Job requests, status, and results all get published to Nostr for display in Git-focused Nostr clients.
Jobs could be triggered manually, or self-hosted runners could be configured to watch a Nostr repository and kick off jobs using their own runners without payment.
But I'm most excited about the prospect of Watcher Agents.
CI/CD Watcher Agents
AI agents empowered with a NIP60 Cashu wallet can run tasks based on activity, such as a push to master or a new PR, using the most suitable available DVM runner that meets the user's criteria. To keep them running, anyone could top up their NIP60 Cashu wallet; otherwise, the watcher turns off when the funds run out. It could be users, maintainers, or anyone interested in helping the project who could top up the Watcher Agent's balance.
As aluded to earlier, part of building a reputation as a CI/CD provider could involve running reliable hosting (Git server, relay, and blossom server) for all FOSS Nostr Git repositories.
This provides a sustainable revenue model for hosting providers and creates incentives for many free-at-the-point-of-use hosting providers. This, in turn, would allow one-click Nostr repository creation workflows, instantly hosted by many different providers.
Progress to Date
nostr:npub1hw6amg8p24ne08c9gdq8hhpqx0t0pwanpae9z25crn7m9uy7yarse465gr and nostr:npub16ux4qzg4qjue95vr3q327fzata4n594c9kgh4jmeyn80v8k54nhqg6lra7 have been working on a runner that uses GitHub Actions YAML syntax (using act) for the dvm-cicd-runner and takes Cashu payment. You can see example runs on GitWorkshop. It currently takes testnuts, doesn't give any change, and the schema will likely change.
Note: The actions tab on GitWorkshop is currently available on all repositories if you turn on experimental mode (under settings in the user menu).
It's a work in progress, and we expect the format and schema to evolve.
Easy Web App Deployment
For those disapointed not to find a 'Nostr' button to import a git repository to Vercel menu: take heart, they made it easy. vercel.com_import_options.png there is a vercel cli that can be easily called in CI / CD jobs to kick of deployments. Not all managed solutions for web app deployment (eg. netlify) make it that easy.
Many More Opportunities
Large Patches via Blossom
I would be remiss not to mention the large patch problem. Some patches are too big to fit into Nostr events. Blossom is perfect for this, as it allows these larger patches to be included in a blossom file and referenced in a new patch kind.
Enhancing the #GitViaNostr Experience
Beyond the large patch issue, there are numerous opportunities to enhance the #GitViaNostr ecosystem. We can focus on improving browsing, discovery, social and notifications. Receiving notifications on daily driver Nostr apps is one of the killer features of Nostr. However, we must ensure that Git-related notifications are easily reviewable, so we donât miss any critical updates.
We need to develop tools that cater to our curiosityâtools that enable us to discover and follow projects, engage in discussions that pique our interest, and stay informed about developments relevant to our work.
Additionally, we should not overlook the importance of robust search capabilities and tools that facilitate migrations.
Concluding Thoughts
The design space is vast. Its an exciting time to be working on freedom tech. I encourage everyone to contribute their ideas and creativity and get vibe-coding!
I welcome your honest feedback on this vision and any suggestions you might have. Your insights are invaluable as we collaborate to shape the future of #GitViaNostr. Onward.
Contributions
To conclude, I want to acknowledge some the individuals who have made recent code contributions related to #GitViaNostr:
nostr:npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6 (gitstr, song, patch34), nostr:npub1useke4f9maul5nf67dj0m9sq6jcsmnjzzk4ycvldwl4qss35fvgqjdk5ks (gitplaza)
nostr:npub1elta7cneng3w8p9y4dw633qzdjr4kyvaparuyuttyrx6e8xp7xnq32cume (ngit contributions, git-remote-blossom),nostr:npub16p8v7varqwjes5hak6q7mz6pygqm4pwc6gve4mrned3xs8tz42gq7kfhdw (SatShoot, Flotilla-Budabit), nostr:npub1ehhfg09mr8z34wz85ek46a6rww4f7c7jsujxhdvmpqnl5hnrwsqq2szjqv (Flotilla-Budabit, Nostr Git Extension), nostr:npub1ahaz04ya9tehace3uy39hdhdryfvdkve9qdndkqp3tvehs6h8s5slq45hy (gnostr and experiments), and others.
nostr:npub1uplxcy63up7gx7cladkrvfqh834n7ylyp46l3e8t660l7peec8rsd2sfek (git-remote-nostr)
Project Management nostr:npub1ltx67888tz7lqnxlrg06x234vjnq349tcfyp52r0lstclp548mcqnuz40t (kanbanstr) Code Snippets nostr:npub1ygzj9skr9val9yqxkf67yf9jshtyhvvl0x76jp5er09nsc0p3j6qr260k2 (nodebin.io) nostr:npub1r0rs5q2gk0e3dk3nlc7gnu378ec6cnlenqp8a3cjhyzu6f8k5sgs4sq9ac (snipsnip.dev)
CI / CD nostr:npub16ux4qzg4qjue95vr3q327fzata4n594c9kgh4jmeyn80v8k54nhqg6lra7 nostr:npub1hw6amg8p24ne08c9gdq8hhpqx0t0pwanpae9z25crn7m9uy7yarse465gr
and for their nostr:npub1c03rad0r6q833vh57kyd3ndu2jry30nkr0wepqfpsm05vq7he25slryrnw nostr:npub1qqqqqq2stely3ynsgm5mh2nj3v0nk5gjyl3zqrzh34hxhvx806usxmln03 and nostr:npub1l5sga6xg72phsz5422ykujprejwud075ggrr3z2hwyrfgr7eylqstegx9z for their testing, feedback, ideas and encouragement.
Thank you for your support and collaboration! Let me know if I've missed you.
-
@ 6be5cc06:5259daf0
2025-04-28 01:05:49Eu reconheço que Deus, e somente Deus, ĂŠ o soberano legĂtimo sobre todas as coisas. Nenhum homem, nenhuma instituição, nenhum parlamento tem autoridade para usurpar aquilo que pertence ao Rei dos reis. O Estado moderno, com sua pretensĂŁo totalizante, ĂŠ uma farsa blasfema diante do trono de Cristo. NĂŁo aceito outro senhor.
A Lei que me guia não Ê a ditada por burocratas, mas a gravada por Deus na própria natureza humana. A razão, quando iluminada pela fÊ, Ê suficiente para discernir o que Ê justo. Rejeito as leis arbitrårias que pretendem legitimar o roubo, o assassinato ou a escravidão em nome da ordem. A justiça não nasce do decreto, mas da verdade.
Acredito firmemente na propriedade privada como extensão da própria pessoa. Aquilo que Ê fruto do meu trabalho, da minha criatividade, da minha dedicação, dos dons a mim concedidos por Deus, pertence a mim por direito natural. NinguÊm pode legitimamente tomar o que Ê meu sem meu consentimento. Todo imposto Ê uma agressão; toda expropriação, um roubo. Defendo a liberdade econômica não por idolatria ao mercado, mas porque a liberdade Ê condição necessåria para a virtude.
Assumo o PrincĂpio da NĂŁo AgressĂŁo como o mĂnimo ĂŠtico que devo respeitar. NĂŁo iniciarei o uso da força contra ninguĂŠm, nem contra sua propriedade. Exijo o mesmo de todos. Mas sei que isso nĂŁo basta. O PNA delimita o que nĂŁo devo fazer â ele nĂŁo me ensina o que devo ser. A liberdade exterior sĂł ĂŠ boa se houver liberdade interior. O mercado pode ser livre, mas se a alma estiver escravizada pelo vĂcio, o colapso serĂĄ inevitĂĄvel.
Por isso, nĂŁo me basta a ĂŠtica negativa. Creio que uma sociedade justa precisa de valores positivos: honra, responsabilidade, compaixĂŁo, respeito, fidelidade Ă verdade. Sem isso, mesmo uma sociedade que respeite formalmente os direitos individuais apodrecerĂĄ por dentro. Um povo que ama o lucro, mas despreza a verdade, que celebra a liberdade mas esquece a justiça, estĂĄ se preparando para ser dominado. TrocarĂĄ um dĂŠspota visĂvel por mil tiranias invisĂveis â o hedonismo, o consumismo, a mentira, o medo.
Não aceito a falsa caridade feita com o dinheiro tomado à força. A verdadeira generosidade nasce do coração livre, não da coerção institucional. Obrigar alguÊm a ajudar o próximo destrói tanto a liberdade quanto a virtude. Só hå mÊrito onde hå escolha. A caridade que nasce do amor Ê redentora; a que nasce do fisco Ê propaganda.
O Estado moderno ĂŠ um Ădolo. Ele promete segurança, mas entrega servidĂŁo. Promete justiça, mas entrega privilĂŠgios. Disfarça a opressĂŁo com linguagem tĂŠcnica, legal e democrĂĄtica. Mas por trĂĄs de suas mĂĄscaras, vejo apenas a velha serpente. Um parasita que se alimenta do trabalho alheio e manipula consciĂŞncias para se perpetuar.
Resistir nĂŁo ĂŠ apenas um direito, ĂŠ um dever. Obedecer a Deus antes que aos homens â essa ĂŠ a minha regra. O poder se volta contra a verdade, mas minha lealdade pertence a quem criou o cĂŠu e a terra. A tirania nĂŁo se combate com outro tirano, mas com a desobediĂŞncia firme e pacĂfica dos que amam a justiça.
NĂŁo acredito em utopias. Desejo uma ordem natural, orgânica, enraizada no voluntarismo. Uma sociedade que se construa de baixo para cima: a partir da famĂlia, da comunidade local, da tradição e da fĂŠ. NĂŁo quero uma mĂĄquina que planeje a vida alheia, mas um tecido de relaçþes voluntĂĄrias onde a liberdade floresça Ă sombra da cruz.
Desejo, sim, o reinado social de Cristo. NĂŁo por imposição, mas por convicção. Que Ele reine nos coraçþes, nas famĂlias, nas ruas e nos contratos. Que a fĂŠ guie a razĂŁo e a razĂŁo ilumine a vida. Que a liberdade seja meio para a santidade â nĂŁo um fim em si. E que, livres do jugo do LeviatĂŁ, sejamos servos apenas do Senhor.
-
@ 52b4a076:e7fad8bd
2025-04-28 00:48:57I have been recently building NFDB, a new relay DB. This post is meant as a short overview.
Regular relays have challenges
Current relay software have significant challenges, which I have experienced when hosting Nostr.land: - Scalability is only supported by adding full replicas, which does not scale to large relays. - Most relays use slow databases and are not optimized for large scale usage. - Search is near-impossible to implement on standard relays. - Privacy features such as NIP-42 are lacking. - Regular DB maintenance tasks on normal relays require extended downtime. - Fault-tolerance is implemented, if any, using a load balancer, which is limited. - Personalization and advanced filtering is not possible. - Local caching is not supported.
NFDB: A scalable database for large relays
NFDB is a new database meant for medium-large scale relays, built on FoundationDB that provides: - Near-unlimited scalability - Extended fault tolerance - Instant loading - Better search - Better personalization - and more.
Search
NFDB has extended search capabilities including: - Semantic search: Search for meaning, not words. - Interest-based search: Highlight content you care about. - Multi-faceted queries: Easily filter by topic, author group, keywords, and more at the same time. - Wide support for event kinds, including users, articles, etc.
Personalization
NFDB allows significant personalization: - Customized algorithms: Be your own algorithm. - Spam filtering: Filter content to your WoT, and use advanced spam filters. - Topic mutes: Mute topics, not keywords. - Media filtering: With Nostr.build, you will be able to filter NSFW and other content - Low data mode: Block notes that use high amounts of cellular data. - and more
Other
NFDB has support for many other features such as: - NIP-42: Protect your privacy with private drafts and DMs - Microrelays: Easily deploy your own personal microrelay - Containers: Dedicated, fast storage for discoverability events such as relay lists
Calcite: A local microrelay database
Calcite is a lightweight, local version of NFDB that is meant for microrelays and caching, meant for thousands of personal microrelays.
Calcite HA is an additional layer that allows live migration and relay failover in under 30 seconds, providing higher availability compared to current relays with greater simplicity. Calcite HA is enabled in all Calcite deployments.
For zero-downtime, NFDB is recommended.
Noswhere SmartCache
Relays are fixed in one location, but users can be anywhere.
Noswhere SmartCache is a CDN for relays that dynamically caches data on edge servers closest to you, allowing: - Multiple regions around the world - Improved throughput and performance - Faster loading times
routerd
routerd
is a custom load-balancer optimized for Nostr relays, integrated with SmartCache.routerd
is specifically integrated with NFDB and Calcite HA to provide fast failover and high performance.Ending notes
NFDB is planned to be deployed to Nostr.land in the coming weeks.
A lot more is to come. đď¸ď¸ď¸ď¸ď¸ď¸
-
@ 30ceb64e:7f08bdf5
2025-04-26 20:33:30Status: Draft
Author: TheWildHustleAbstract
This NIP defines a framework for storing and sharing health and fitness profile data on Nostr. It establishes a set of standardized event kinds for individual health metrics, allowing applications to selectively access specific health information while preserving user control and privacy.
In this framework exists - NIP-101h.1 Weight using kind 1351 - NIP-101h.2 Height using kind 1352 - NIP-101h.3 Age using kind 1353 - NIP-101h.4 Gender using kind 1354 - NIP-101h.5 Fitness Level using kind 1355
Motivation
I want to build and support an ecosystem of health and fitness related nostr clients that have the ability to share and utilize a bunch of specific interoperable health metrics.
- Selective access - Applications can access only the data they need
- User control - Users can choose which metrics to share
- Interoperability - Different health applications can share data
- Privacy - Sensitive health information can be managed independently
Specification
Kind Number Range
Health profile metrics use the kind number range 1351-1399:
| Kind | Metric | | --------- | ---------------------------------- | | 1351 | Weight | | 1352 | Height | | 1353 | Age | | 1354 | Gender | | 1355 | Fitness Level | | 1356-1399 | Reserved for future health metrics |
Common Structure
All health metric events SHOULD follow these guidelines:
- The content field contains the primary value of the metric
- Required tags:
['t', 'health']
- For categorizing as health data['t', metric-specific-tag]
- For identifying the specific metric['unit', unit-of-measurement]
- When applicable- Optional tags:
['converted_value', value, unit]
- For providing alternative unit measurements['timestamp', ISO8601-date]
- When the metric was measured['source', application-name]
- The source of the measurement
Unit Handling
Health metrics often have multiple ways to be measured. To ensure interoperability:
- Where multiple units are possible, one standard unit SHOULD be chosen as canonical
- When using non-standard units, a
converted_value
tag SHOULD be included with the canonical unit - Both the original and converted values should be provided for maximum compatibility
Client Implementation Guidelines
Clients implementing this NIP SHOULD:
- Allow users to explicitly choose which metrics to publish
- Support reading health metrics from other users when appropriate permissions exist
- Support updating metrics with new values over time
- Preserve tags they don't understand for future compatibility
- Support at least the canonical unit for each metric
Extensions
New health metrics can be proposed as extensions to this NIP using the format:
- NIP-101h.X where X is the metric number
Each extension MUST specify: - A unique kind number in the range 1351-1399 - The content format and meaning - Required and optional tags - Examples of valid events
Privacy Considerations
Health data is sensitive personal information. Clients implementing this NIP SHOULD:
- Make it clear to users when health data is being published
- Consider incorporating NIP-44 encryption for sensitive metrics
- Allow users to selectively share metrics with specific individuals
- Provide easy ways to delete previously published health data
NIP-101h.1: Weight
Description
This NIP defines the format for storing and sharing weight data on Nostr.
Event Kind: 1351
Content
The content field MUST contain the numeric weight value as a string.
Required Tags
- ['unit', 'kg' or 'lb'] - Unit of measurement
- ['t', 'health'] - Categorization tag
- ['t', 'weight'] - Specific metric tag
Optional Tags
- ['converted_value', value, unit] - Provides the weight in alternative units for interoperability
- ['timestamp', ISO8601 date] - When the weight was measured
Examples
json { "kind": 1351, "content": "70", "tags": [ ["unit", "kg"], ["t", "health"], ["t", "weight"] ] }
json { "kind": 1351, "content": "154", "tags": [ ["unit", "lb"], ["t", "health"], ["t", "weight"], ["converted_value", "69.85", "kg"] ] }
NIP-101h.2: Height
Status: Draft
Description
This NIP defines the format for storing and sharing height data on Nostr.
Event Kind: 1352
Content
The content field can use two formats: - For metric height: A string containing the numeric height value in centimeters (cm) - For imperial height: A JSON string with feet and inches properties
Required Tags
['t', 'health']
- Categorization tag['t', 'height']
- Specific metric tag['unit', 'cm' or 'imperial']
- Unit of measurement
Optional Tags
['converted_value', value, 'cm']
- Provides height in centimeters for interoperability when imperial is used['timestamp', ISO8601-date]
- When the height was measured
Examples
```jsx // Example 1: Metric height Apply to App.jsx
// Example 2: Imperial height with conversion Apply to App.jsx ```
Implementation Notes
- Centimeters (cm) is the canonical unit for height interoperability
- When using imperial units, a conversion to centimeters SHOULD be provided
- Height values SHOULD be positive integers
- For maximum compatibility, clients SHOULD support both formats
NIP-101h.3: Age
Status: Draft
Description
This NIP defines the format for storing and sharing age data on Nostr.
Event Kind: 1353
Content
The content field MUST contain the numeric age value as a string.
Required Tags
['unit', 'years']
- Unit of measurement['t', 'health']
- Categorization tag['t', 'age']
- Specific metric tag
Optional Tags
['timestamp', ISO8601-date]
- When the age was recorded['dob', ISO8601-date]
- Date of birth (if the user chooses to share it)
Examples
```jsx // Example 1: Basic age Apply to App.jsx
// Example 2: Age with DOB Apply to App.jsx ```
Implementation Notes
- Age SHOULD be represented as a positive integer
- For privacy reasons, date of birth (dob) is optional
- Clients SHOULD consider updating age automatically if date of birth is known
- Age can be a sensitive metric and clients may want to consider encrypting this data
NIP-101h.4: Gender
Status: Draft
Description
This NIP defines the format for storing and sharing gender data on Nostr.
Event Kind: 1354
Content
The content field contains a string representing the user's gender.
Required Tags
['t', 'health']
- Categorization tag['t', 'gender']
- Specific metric tag
Optional Tags
['timestamp', ISO8601-date]
- When the gender was recorded['preferred_pronouns', string]
- User's preferred pronouns
Common Values
While any string value is permitted, the following common values are recommended for interoperability: - male - female - non-binary - other - prefer-not-to-say
Examples
```jsx // Example 1: Basic gender Apply to App.jsx
// Example 2: Gender with pronouns Apply to App.jsx ```
Implementation Notes
- Clients SHOULD allow free-form input for gender
- For maximum compatibility, clients SHOULD support the common values
- Gender is a sensitive personal attribute and clients SHOULD consider appropriate privacy controls
- Applications focusing on health metrics should be respectful of gender diversity
NIP-101h.5: Fitness Level
Status: Draft
Description
This NIP defines the format for storing and sharing fitness level data on Nostr.
Event Kind: 1355
Content
The content field contains a string representing the user's fitness level.
Required Tags
['t', 'health']
- Categorization tag['t', 'fitness']
- Fitness category tag['t', 'level']
- Specific metric tag
Optional Tags
['timestamp', ISO8601-date]
- When the fitness level was recorded['activity', activity-type]
- Specific activity the fitness level relates to['metrics', JSON-string]
- Quantifiable fitness metrics used to determine level
Common Values
While any string value is permitted, the following common values are recommended for interoperability: - beginner - intermediate - advanced - elite - professional
Examples
```jsx // Example 1: Basic fitness level Apply to App.jsx
// Example 2: Activity-specific fitness level with metrics Apply to App.jsx ```
Implementation Notes
- Fitness level is subjective and may vary by activity
- The activity tag can be used to specify fitness level for different activities
- The metrics tag can provide objective measurements to support the fitness level
- Clients can extend this format to include activity-specific fitness assessments
- For general fitness apps, the simple beginner/intermediate/advanced scale is recommended
-
@ 91bea5cd:1df4451c
2025-04-26 10:16:21O Contexto Legal Brasileiro e o Consentimento
No ordenamento jurĂdico brasileiro, o consentimento do ofendido pode, em certas circunstâncias, afastar a ilicitude de um ato que, sem ele, configuraria crime (como lesĂŁo corporal leve, prevista no Art. 129 do CĂłdigo Penal). Contudo, o consentimento tem limites claros: nĂŁo ĂŠ vĂĄlido para bens jurĂdicos indisponĂveis, como a vida, e sua eficĂĄcia ĂŠ questionĂĄvel em casos de lesĂľes corporais graves ou gravĂssimas.
A pråtica de BDSM consensual situa-se em uma zona complexa. Em tese, se ambos os parceiros são adultos, capazes, e consentiram livre e informadamente nos atos praticados, sem que resultem em lesþes graves permanentes ou risco de morte não consentido, não haveria crime. O desafio reside na comprovação desse consentimento, especialmente se uma das partes, posteriormente, o negar ou alegar coação.
A Lei Maria da Penha (Lei nÂş 11.340/2006)
A Lei Maria da Penha ĂŠ um marco fundamental na proteção da mulher contra a violĂŞncia domĂŠstica e familiar. Ela estabelece mecanismos para coibir e prevenir tal violĂŞncia, definindo suas formas (fĂsica, psicolĂłgica, sexual, patrimonial e moral) e prevendo medidas protetivas de urgĂŞncia.
Embora essencial, a aplicação da lei em contextos de BDSM pode ser delicada. Uma alegação de violĂŞncia por parte da mulher, mesmo que as lesĂľes ou situaçþes decorram de prĂĄticas consensuais, tende a receber atenção prioritĂĄria das autoridades, dada a presunção de vulnerabilidade estabelecida pela lei. Isso pode criar um cenĂĄrio onde o parceiro masculino enfrenta dificuldades significativas em demonstrar a natureza consensual dos atos, especialmente se nĂŁo houver provas robustas prĂŠ-constituĂdas.
Outros riscos:
LesĂŁo corporal grave ou gravĂssima (art. 129, §§ 1Âş e 2Âş, CP), nĂŁo pode ser justificada pelo consentimento, podendo ensejar persecução penal.
Crimes contra a dignidade sexual (arts. 213 e seguintes do CP) sĂŁo de ação pĂşblica incondicionada e independem de representação da vĂtima para a investigação e denĂşncia.
Riscos de Falsas Acusaçþes e Alegação de Coação Futura
Os riscos para os praticantes de BDSM, especialmente para o parceiro que assume o papel dominante ou que inflige dor/restrição (frequentemente, mas não exclusivamente, o homem), podem surgir de diversas frentes:
- Acusaçþes Externas: Vizinhos, familiares ou amigos que desconhecem a natureza consensual do relacionamento podem interpretar sons, marcas ou comportamentos como sinais de abuso e denunciar às autoridades.
- Alegaçþes Futuras da Parceira: Em caso de tÊrmino conturbado, vingança, arrependimento ou mudança de perspectiva, a parceira pode reinterpretar as pråticas passadas como abuso e buscar reparação ou retaliação atravÊs de uma denúncia. A alegação pode ser de que o consentimento nunca existiu ou foi viciado.
- Alegação de Coação: Uma das formas mais complexas de refutar ĂŠ a alegação de que o consentimento foi obtido mediante coação (fĂsica, moral, psicolĂłgica ou econĂ´mica). A parceira pode alegar, por exemplo, que se sentia pressionada, intimidada ou dependente, e que seu "sim" nĂŁo era genuĂno. Provar a ausĂŞncia de coação a posteriori ĂŠ extremamente difĂcil.
- Ingenuidade e Vulnerabilidade Masculina: Muitos homens, confiando na dinâmica consensual e na parceira, podem negligenciar a necessidade de precauçþes. A crença de que "isso nunca aconteceria comigo" ou a falta de conhecimento sobre as implicaçþes legais e o peso processual de uma acusação no âmbito da Lei Maria da Penha podem deixĂĄ-los vulnerĂĄveis. A presença de marcas fĂsicas, mesmo que consentidas, pode ser usada como evidĂŞncia de agressĂŁo, invertendo o Ă´nus da prova na prĂĄtica, ainda que nĂŁo na teoria jurĂdica.
EstratÊgias de Prevenção e Mitigação
NĂŁo existe um mĂŠtodo infalĂvel para evitar completamente o risco de uma falsa acusação, mas diversas medidas podem ser adotadas para construir um histĂłrico de consentimento e reduzir vulnerabilidades:
- Comunicação ExplĂcita e ContĂnua: A base de qualquer prĂĄtica BDSM segura ĂŠ a comunicação constante. Negociar limites, desejos, palavras de segurança ("safewords") e expectativas antes, durante e depois das cenas ĂŠ crucial. Manter registros dessas negociaçþes (e-mails, mensagens, diĂĄrios compartilhados) pode ser Ăştil.
-
Documentação do Consentimento:
-
Contratos de Relacionamento/Cena: Embora a validade jurĂdica de "contratos BDSM" seja discutĂvel no Brasil (nĂŁo podem afastar normas de ordem pĂşblica), eles servem como forte evidĂŞncia da intenção das partes, da negociação detalhada de limites e do consentimento informado. Devem ser claros, datados, assinados e, idealmente, reconhecidos em cartĂłrio (para prova de data e autenticidade das assinaturas).
-
Registros Audiovisuais: Gravar (com consentimento explĂcito para a gravação) discussĂľes sobre consentimento e limites antes das cenas pode ser uma prova poderosa. Gravar as prĂłprias cenas ĂŠ mais complexo devido a questĂľes de privacidade e potencial uso indevido, mas pode ser considerado em casos especĂficos, sempre com consentimento mĂştuo documentado para a gravação.
Importante: a gravação deve ser com ciência da outra parte, para não configurar violação da intimidade (art. 5º, X, da Constituição Federal e art. 20 do Código Civil).
-
-
Testemunhas: Em alguns contextos de comunidade BDSM, a presença de terceiros de confiança durante negociaçþes ou mesmo cenas pode servir como testemunho, embora isso possa alterar a dinâmica Ăntima do casal.
- Estabelecimento Claro de Limites e Palavras de Segurança: Definir e respeitar rigorosamente os limites (o que Ê permitido, o que Ê proibido) e as palavras de segurança Ê fundamental. O desrespeito a uma palavra de segurança encerra o consentimento para aquele ato.
- Avaliação ContĂnua do Consentimento: O consentimento nĂŁo ĂŠ um cheque em branco; ele deve ser entusiĂĄstico, contĂnuo e revogĂĄvel a qualquer momento. Verificar o bem-estar do parceiro durante a cena ("check-ins") ĂŠ essencial.
- Discrição e Cuidado com EvidĂŞncias FĂsicas: Ser discreto sobre a natureza do relacionamento pode evitar mal-entendidos externos. ApĂłs cenas que deixem marcas, ĂŠ prudente que ambos os parceiros estejam cientes e de acordo, talvez documentando por fotos (com data) e uma nota sobre a consensualidade da prĂĄtica que as gerou.
- Aconselhamento JurĂdico Preventivo: Consultar um advogado especializado em direito de famĂlia e criminal, com sensibilidade para dinâmicas de relacionamento alternativas, pode fornecer orientação personalizada sobre as melhores formas de documentar o consentimento e entender os riscos legais especĂficos.
Observaçþes Importantes
- Nenhuma documentação substitui a necessidade de consentimento real, livre, informado e contĂnuo.
- A lei brasileira protege a "integridade fĂsica" e a "dignidade humana". PrĂĄticas que resultem em lesĂľes graves ou que violem a dignidade de forma nĂŁo consentida (ou com consentimento viciado) serĂŁo ilegais, independentemente de qualquer acordo prĂŠvio.
- Em caso de acusação, a existência de documentação robusta de consentimento não garante a absolvição, mas fortalece significativamente a defesa, ajudando a demonstrar a natureza consensual da relação e das pråticas.
-
A alegação de coação futura ĂŠ particularmente difĂcil de prevenir apenas com documentos. Um histĂłrico consistente de comunicação aberta (whatsapp/telegram/e-mails), respeito mĂştuo e ausĂŞncia de dependĂŞncia ou controle excessivo na relação pode ajudar a contextualizar a dinâmica como nĂŁo coercitiva.
-
Cuidado com Marcas VisĂveis e LesĂľes Graves PrĂĄticas que resultam em hematomas severos ou lesĂľes podem ser interpretadas como agressĂŁo, mesmo que consentidas. Evitar excessos protege nĂŁo apenas a integridade fĂsica, mas tambĂŠm evita questionamentos legais futuros.
O que vem a ser consentimento viciado
No Direito, consentimento viciado ĂŠ quando a pessoa concorda com algo, mas a vontade dela nĂŁo ĂŠ livre ou plena â ou seja, o consentimento existe formalmente, mas ĂŠ defeituoso por alguma razĂŁo.
O CĂłdigo Civil brasileiro (art. 138 a 165) define vĂĄrias formas de vĂcio de consentimento. As principais sĂŁo:
Erro: A pessoa se engana sobre o que estĂĄ consentindo. (Ex.: A pessoa acredita que vai participar de um jogo leve, mas na verdade ĂŠ exposta a prĂĄticas pesadas.)
Dolo: A pessoa ĂŠ enganada propositalmente para aceitar algo. (Ex.: AlguĂŠm mente sobre o que vai acontecer durante a prĂĄtica.)
Coação: A pessoa ĂŠ forçada ou ameaçada a consentir. (Ex.: "Se vocĂŞ nĂŁo aceitar, eu termino com vocĂŞ" â pressĂŁo emocional forte pode ser vista como coação.)
Estado de perigo ou lesão: A pessoa aceita algo em situação de necessidade extrema ou abuso de sua vulnerabilidade. (Ex.: AlguÊm em situação emocional muito fragilizada Ê induzida a aceitar pråticas que normalmente recusaria.)
No contexto de BDSM, isso ĂŠ ainda mais delicado: Mesmo que a pessoa tenha "assinado" um contrato ou dito "sim", se depois ela alegar que seu consentimento foi dado sob medo, engano ou pressĂŁo psicolĂłgica, o consentimento pode ser considerado viciado â e, portanto, juridicamente invĂĄlido.
Isso tem duas implicaçþes sÊrias:
-
O crime nĂŁo se descaracteriza: Se houver vĂcio, o consentimento ĂŠ ignorado e a prĂĄtica pode ser tratada como crime normal (lesĂŁo corporal, estupro, tortura, etc.).
-
A prova do consentimento precisa ser sólida: Mostrando que a pessoa estava informada, lúcida, livre e sem qualquer tipo de coação.
Consentimento viciado ĂŠ quando a pessoa concorda formalmente, mas de maneira enganada, forçada ou pressionada, tornando o consentimento inĂştil para efeitos jurĂdicos.
ConclusĂŁo
Casais que praticam BDSM consensual no Brasil navegam em um terreno que exige nĂŁo apenas confiança mĂştua e comunicação excepcional, mas tambĂŠm uma consciĂŞncia aguçada das complexidades legais e dos riscos de interpretaçþes equivocadas ou acusaçþes mal-intencionadas. Embora o BDSM seja uma expressĂŁo legĂtima da sexualidade humana, sua prĂĄtica no Brasil exige responsabilidade redobrada. Ter provas claras de consentimento, manter a comunicação aberta e agir com prudĂŞncia sĂŁo formas eficazes de se proteger de falsas alegaçþes e preservar a liberdade e a segurança de todos os envolvidos. Embora leis controversas como a Maria da Penha sejam "vitais" para a proteção contra a violĂŞncia real, os praticantes de BDSM, e em particular os homens nesse contexto, devem adotar uma postura proativa e prudente para mitigar os riscos inerentes Ă potencial mĂĄ interpretação ou instrumentalização dessas prĂĄticas e leis, garantindo que a expressĂŁo de sua consensualidade esteja resguardada na medida do possĂvel.
Importante: No Brasil, mesmo com tudo isso, o MinistĂŠrio PĂşblico pode denunciar por crime como lesĂŁo corporal grave, estupro ou tortura, independente de consentimento. EntĂŁo a prudĂŞncia nas prĂĄticas ĂŠ fundamental.
Aviso Legal: Este artigo tem carĂĄter meramente informativo e nĂŁo constitui aconselhamento jurĂdico. As leis e interpretaçþes podem mudar, e cada situação ĂŠ Ăşnica. Recomenda-se buscar orientação de um advogado qualificado para discutir casos especĂficos.
Se curtiu este artigo faça uma contribuição, se tiver algum ponto relevante para o artigo deixe seu comentårio.
-
@ 3c389c8f:7a2eff7f
2025-05-14 21:14:38Writing about writing, that's what I'm doing today. A couple months in, trying to make writing on Nostr a regular part of my routine has been both interesting and enlightening. This Spatia Nostra blog started as passion project of unknown intention, beginning with an attempt to fill a glaring educational void... but creating these resources has also served as my own schooling. I've learned that everything works well sometimes but nothing works well all the time. Given that Nostr development, as a whole, is akin to stray cats herding chickens, in hopes that they will trample out 100 fires, this was not an unexpected experience. Beyond a few painful days when nothing would work, its actually gone smoother that I expected. The state of reading and writing tools is yet in major flux. Some are way behind but still work, others are in active development... which has its own set of pros and cons. I've read in notes, that the Primal team is currently riding their white stallions (across a beach, no less) to deliver the writing tools that save will save the day. There is no single solution to a multi-faceted problem, though, so writing is no different than search problems or spam problems, in that regard. I have no doubt that whatever they deliver will be functional and suitable for their readers and writers , but ultimately there needs to be many Nostr tools available for many different styles of author and many ways for readers to uptake their works. There might be value in sharing some of my insights, for anyone looking to write natively to Nostr or for anyone who may be building writing and reading related tools, so that is my aim here today. (With hope that most of this piece will become outdated sooner rather than later.) For the sake of not turning this into a multi-client review, because its already going to be really long, I will direct anyone who wants to dive right in to writing on Nostr here .
Where to begin:
Right now, there is no easy way to see which client was used to write a piece. There are exceptions, of course, and there are things I have not tried or cannot use due to my hardware, so I can't say that this rings true across the broader view of Nostr. If we assume that most people are introduced to Nostr through the microblogging/social media gateways, then they are likely introduced to longer Nostr content through their follow feed, either by a client that nicely displays these publications as standalone items or by authors and readers referencing a piece within a typical note (Kind 1, for all us Nostr nerds). As with the writing tools themselves, I know that support for advertising which client was used to create an event is rolling out with varying perceptions of its importance. In the interem, Nostr has the benefit of a wildly passionate user-base to fill these gaps. Oftentimes, the author themselves are willing to share which client was used to write a piece. If not, someone will almost surely be able and willing to answer. As the ecosystem grows, I imagine that it will suffer the same problem as every other human-occupied spaces... the more people there are, the less likely they are to talk to each other. Nostr makes it incredibly easy to reduce those types of negative social impacts, but I can still easily envision a situation in which the aspirational writer finds their calling from a piece written by a popular big-name writer, where the reply sections tend to become too noisy to find answers. To alleviate this, client tags are an obvious mitigation. I would love to see all major social/microblogging clients build in support for that one day, so that anyone new to Nostr can easily figure out where to begin.
Writing:
Oof, yeah... This is where things start to branch out into the wild and weird world that we all love so much. Prior to this 2-month stint ( which I have every intention of continuing), I had only written a couple of long notes, one wiki entry, and a few recipes. No hitches whatsoever. I have found now, that the more frequently I attempt to write, the more interesting problems I encounter... But sometimes it all works so silky, smoothly that it becomes a sensational, powerful experience where one can see just how much potential Nostr has to revolutionize the way we exchange information, with ourselves, our friends and the world.
When everything, or at least most things, are working well, its amazing. You can send yourself nostr events through messaging clients on mobile to access and reference from a web client later, with many of the different Nostr messaging apps. Not all messaging apps perform in the same way, so before you go confusing yourself, send a test message or two to see if your messaging app handles the 'note to self' concept in a way that makes sense to you. This might sound a little bit janky, but it's really just a simple way of creating notes for yourself. Having some quick thoughts that you don't want to lose while your on the go, so you can build upon them later, is another strong use aside from gathering reference materials. I like this method because nothing is so good at organizing my thoughts than my own brain. If you prefer to use a note taking app, there are some out there that have integrated Nostr features so that you can maintain your usual workflow while benefitting from Nostr's ubiquity. Once You have your basis, you know when its time to write. You have a few solid choices that all have the same basic functions, with a slightly different feel and interface, and slightly different additional features. You can find the one you like, bang out your thoughts, and use the others to tweak and adjust things. Because... Nostr, the reading side will always be somewhat variable, so you'll likely want to proof your own writing a few times, in a few clients, that you believe your readers will be using the most.
Everything Works!
For me, the amazing Nostr writing experience looks something like this:
I send myself some notes and thoughts on a multi-device messaging app. I visit my favorite publishing app for the majority of my writing because I like the thoughtful, quiet design. I can then jump to another and add tags, because I forgot to do that. It also has the best editing experience, so I can fix my damn typos while I'm there. Later on, I realize that maybe part of the revenue should go to the person who inspired my thoughts, so I visit a different client, initiate an edit, and add a revenue split to the post. Once I'm done, it looks amazing, and I want to check that it looks amazing in the places that I think my readers might see it, as well. I check through a few mobile social clients. Native display looks great, formatted neatly enough to call it a piece, with all referenced Nostr events displayed in pretty purple letters and linking to their naddr as intended. In posts that reference events, it links up great and takes me to a reading client intended to manage walls of text. Nice. All the while, I'm keeping in my mind that my work, should I or anyone else deem it worthy of longevity, is being stored across multiple relays, including my own rented relay (I should really set something up at home, I'll get there eventually). These thoughts are out there and they have the potential to stay there, wherever "there" may be. I don't have to worry about them being taken down or becoming unavailable because at least one of these many relays will be up and keeping my notes at any given moment, and the more my readers interact, the more sticky and distributed my work becomes. It'd be pretty rare for a controversial piece to come out of these fingertips, but its not impossible. I find a lot of peace in that, more predominately as the reader than the writer.
Nothing Works!
Unfortunately, this is not always the outcome of writing on Nostr regularly (Honestly, everything has its problems. This is not unique to Nostr). The more frequently you do something, the more likely you are to come across flaws and temporary issues or outages. So... the other side of this coin looks something like this:
I find a few things that I would like to reference in articles, I message them to myself. Unfortunately, the massages, though sent to myself, by myself, show up as recieved as sent by the authors of the notes I want to reference. Its not a big deal, I can sort that out but they easily become lost among all the other messages that I send and receive in between. It's a bit inconvenient but it still works. Thoughts to myself still work just fine. I sit down to write and my preferred client isn't recognizing my signing extension. Why? It worked yesterday. No matter, lets hop over to a different client, sign in, and ... nothing. Its recognizing my key but its not loading anything beyond an npub. Maybe its still working? I try writing... it looks like its working but upon publishing, nothing. No error, no loaders, my text just sits in the editor. Copy. Move to another client. Sign in, paste. adjust all the stuff because this one doesn't recognize the markdown links. I need to use their built-in tools for this (I know this from a previous day of some things working). Okay, this is great. Publish. At which point the text disappears and no note show up... hmm... its not connecting to any relays. I wish there was a way to check that before I had started. My clipboard is empty now because I wiped it clean while editing all the links. Hmm... One more try because I'm no quitter (to the point of detriment sometimes). Last try. Sign in, looks good. I half -ass rewrite my lost piece and attempt to publish and I am met with the infinite loading icon. I can't save my draft or publish. Smarter this time, I leave the text there, copy it to a local document, just in case, and quit for the day. The next day, I go back to this with a new client name I came across. It seems to work, its lacking some important features but that's ok. When the other editors are having better days, I can go back to edit tags and titles. Publish... Success! Or so I thought. I go around to do my checks, the event is no where to be found except in the client that was used to publish it. I copy the note ID from there and search around. Everything tells me: error, the event string is too short. I call it a wash. Over the next few days, the presence of that post comes and goes. Eventually it just stops showing up anywhere. Another new editor arrives, and once I figured out this stupid (me) signer issue that I was having, I republish that piece.
Things work, just not all at once...
Because of my own ignorance and because I think there is still value in interfacing with the outside-nostr world, for now I've opted keep publishing to both legacy web and Nostr. It acts as my fallback but also a little island of Nostr information. One day, I'll quit doing that but I'm not there yet. Nor are the tools that I would like to use in order to do so. That's okay, it's been incredible to witness the coordination amongst the chaos while the ecosystem gets fleshed out to something that can replace all of that. Everyday, I'm looking for ways to realistically help this process along and sometimes the best I can do is simply be willing to endure the mess while everything comes together. As I said at the beginning, this are just my insights and experiences. Most days are a happy middle between these two extremes. Writing on Nostr has huge potential to change the landscape of digital information and I will continue doing whatever the hell it is that at do so that it can be ready for the people who may really need it.
Reading...
Nah. Another day, maybe.
Find a list of Nostr writing tools here .
-
@ 3c389c8f:7a2eff7f
2025-05-14 21:03:32Clients:
https://untype.app
https://habla.news
https://yakihonne.com
https://cypher.space
https://highlighter.com
Plug Ins:
https://github.com/jamesmagoo/nostr-writer
Content Tagging:
https://labelmachine.org
https://ontolo.social
Blog-like Display and Personal Pages:
https://orocolo.me
https://npub.pro
Personal Notes and Messaging:
https://app.flotilla.social There's an app, too!
https://nosbin.com
RSS Readers:
https://nostrapps.com/noflux
https://nostrapps.com/narr
https://nostrapps.com/feeder
-
@ 8125b911:a8400883
2025-04-25 07:02:35In Nostr, all data is stored as events. Decentralization is achieved by storing events on multiple relays, with signatures proving the ownership of these events. However, if you truly want to own your events, you should run your own relay to store them. Otherwise, if the relays you use fail or intentionally delete your events, you'll lose them forever.
For most people, running a relay is complex and costly. To solve this issue, I developed nostr-relay-tray, a relay that can be easily run on a personal computer and accessed over the internet.
Project URL: https://github.com/CodyTseng/nostr-relay-tray
This article will guide you through using nostr-relay-tray to run your own relay.
Download
Download the installation package for your operating system from the GitHub Release Page.
| Operating System | File Format | | --------------------- | ---------------------------------- | | Windows |
nostr-relay-tray.Setup.x.x.x.exe
| | macOS (Apple Silicon) |nostr-relay-tray-x.x.x-arm64.dmg
| | macOS (Intel) |nostr-relay-tray-x.x.x.dmg
| | Linux | You should know which one to use |Installation
Since this app isnât signed, you may encounter some obstacles during installation. Once installed, an ostrich icon will appear in the status bar. Click on the ostrich icon, and you'll see a menu where you can click the "Dashboard" option to open the relay's control panel for further configuration.
macOS Users:
- On first launch, go to "System Preferences > Security & Privacy" and click "Open Anyway."
- If you encounter a "damaged" message, run the following command in the terminal to remove the restrictions:
bash sudo xattr -rd com.apple.quarantine /Applications/nostr-relay-tray.app
Windows Users:
- On the security warning screen, click "More Info > Run Anyway."
Connecting
By default, nostr-relay-tray is only accessible locally through
ws://localhost:4869/
, which makes it quite limited. Therefore, we need to expose it to the internet.In the control panel, click the "Proxy" tab and toggle the switch. You will then receive a "Public address" that you can use to access your relay from anywhere. It's that simple.
Next, add this address to your relay list and position it as high as possible in the list. Most clients prioritize connecting to relays that appear at the top of the list, and relays lower in the list are often ignored.
Restrictions
Next, we need to set up some restrictions to prevent the relay from storing events that are irrelevant to you and wasting storage space. nostr-relay-tray allows for flexible and fine-grained configuration of which events to accept, but some of this is more complex and will not be covered here. If you're interested, you can explore this further later.
For now, I'll introduce a simple and effective strategy: WoT (Web of Trust). You can enable this feature in the "WoT & PoW" tab. Before enabling, you'll need to input your pubkey.
There's another important parameter,
Depth
, which represents the relationship depth between you and others. Someone you follow has a depth of 1, someone they follow has a depth of 2, and so on.- Setting this parameter to 0 means your relay will only accept your own events.
- Setting it to 1 means your relay will accept events from you and the people you follow.
- Setting it to 2 means your relay will accept events from you, the people you follow, and the people they follow.
Currently, the maximum value for this parameter is 2.
Conclusion
You've now successfully run your own relay and set a simple restriction to prevent it from storing irrelevant events.
If you encounter any issues during use, feel free to submit an issue on GitHub, and I'll respond as soon as possible.
Not your relay, not your events.
-
@ 5f078e90:b2bacaa3
2025-05-14 20:59:12Tortoise test 2
Tortoise title And a subtitle https://files.peakd.com/file/peakd-hive/hostr/23vsBdQma3chpbmdYd6M3yBdn5teaCsbPHhWLcKKEyLjcaw1r7Ae1vdUvVg4y8yfaTcT7.png In a sunny meadow, Tucker the tortoise trudged with steady steps. His shell gleamed under the noon sun. Each day, he roamed, seeking sweet clover. One spring, a flood trapped his friends. Tucker, calm and strong, carried them to high ground. By dusk, all were safe. His quiet resolve united the meadow, their cheers a soft hum. Tuckerâs slow pace became a tale of grit in every blade of grass. Character count: 349
Originally posted on Hive at https://hive.blog/@hostr/tortoise-test-2
Auto cross-post via Hostr bridge v0.0.26 at https://hostr-home.vercel.app
-
@ e691f4df:1099ad65
2025-04-24 18:56:12Viewing Bitcoin Through the Light of Awakening
Ankh & Ohm Capitalâs Overview of the Psycho-Spiritual Nature of Bitcoin
Glossary:
I. Preface: The Logos of Our Logo
II. An Oracular Introduction
III. Alchemizing Greed
IV. Layers of Fractalized Thought
V. Permissionless Individuation
VI. Dispelling Paradox Through Resonance
VII. Ego Deflation
VIII. The Coin of Great Price
Preface: The Logos of Our Logo
Before we offer our lens on Bitcoin, itâs important to illuminate the meaning behind Ankh & Ohmâs name and symbol. These elements are not ornamentalâthey are foundational, expressing the cosmological principles that guide our work.
Our mission is to bridge the eternal with the practical. As a Bitcoin-focused family office and consulting firm, we understand capital not as an end, but as a toolâone that, when properly aligned, becomes a vehicle for divine order. We see Bitcoin not simply as a technological innovation but as an emanation of the Divine Logosâa harmonic expression of truth, transparency, and incorruptible structure. Both the beginning and the end, the Alpha and Omega.
The Ankh (âĽ), an ancient symbol of eternal life, is a key to the integration of opposites. It unites spirit and matter, force and form, continuity and change. It reminds us that capital, like Life, must not only be generative, but regenerative; sacred. Money must serve Life, not siphon from it.
The Ohm (Ί) holds a dual meaning. In physics, it denotes a unit of electrical resistanceâthe formative tension that gives energy coherence. In the Vedic tradition, Om (ŕĽ) is the primordial vibrationâthe sound from which all existence unfolds. Together, these symbols affirm a timeless truth: resistance and resonance are both sacred instruments of the Creator.
Ankh & Ohm, then, represents our striving for union, for harmony âbetween the flow of life and intentional structure, between incalculable abundance and measured restraint, between the lightbulbâs electrical impulse and its light-emitting filament. We stand at the threshold where intention becomes action, and where capital is not extracted, but cultivated in rhythm with the cosmos.Â
We exist to shepherd this transformation, as guides of this threshold âhelping families, founders, and institutions align with a deeper order, where capital serves not as the prize, but as a pathway to collective Presence, Purpose, Peace and Prosperity.
An Oracular Introduction
Bitcoin is commonly understood as the first truly decentralized and secure form of digital moneyâa breakthrough in monetary sovereignty. But this view, while technically correct, is incomplete and spiritually shallow. Bitcoin is more than a tool for economic disruption. Bitcoin represents a mythic threshold: a symbol of the psycho-spiritual shift that many ancient traditions have long foretold.
For millennia, sages and seers have spoken of a coming Golden Age. In the Vedic Yuga cycles, in Platoâs Great Year, in the Eagle and Condor prophecies of the Americasâthere exists a common thread: that humanity will emerge from darkness into a time of harmony, cooperation, and clarity. That the veil of illusion (maya, materiality) will thin, and reality will once again become transparent to the transcendent. In such an age, systems based on scarcity, deception, and centralization fall away. A new cosmology takes rootâone grounded in balance, coherence, and sacred reciprocity.
But we must askâhow does such a shift happen? How do we cross from the age of scarcity, fear, and domination into one of coherence, abundance, and freedom?
One possible answer lies in the alchemy of incentive.
Bitcoin operates not just on the rules of computer science or Austrian economics, but on something far more old and subtle: the logic of transformation. It transmutes greedâa base instinct rooted in scarcityâinto cooperation, transparency, and incorruptibility.
In this light, Bitcoin becomes more than codeâit becomes a psychoactive protocol, one that rewires human behavior by aligning individual gain with collective integrity. It is not simply a new form of money. It is a new myth of value. A new operating system for human consciousness.
Bitcoin does not moralize. It harmonizes. It transforms the instinct for self-preservation into a pathway for planetary coherence.
Alchemizing Greed
At the heart of Bitcoin lies the ancient alchemical principle of transmutation: that which is base may be refined into gold.
Greed, long condemned as a vice, is not inherently evil. It is a distorted longing. A warped echo of the drive to preserve life. But in systems built on scarcity and deception, this longing calcifies into hoarding, corruption, and decay.
Bitcoin introduces a new game. A game with memory. A game that makes deception inefficient and truth profitable. It does not demand virtueâit encodes consequence. Its design does not suppress greed; it reprograms it.
In traditional models, game theory often illustrates the fragility of trust. The Prisonerâs Dilemma reveals how self-interest can sabotage collective well-being. But Bitcoin inverts this. It creates an environment where self-interest and integrity convergeâwhere the most rational action is also the most truthful.
Its ledger, immutable and transparent, exposes manipulation for what it is: energetically wasteful and economically self-defeating. Dishonesty burns energy and yields nothing. The network punishes incoherence, not by decree, but by natural law.
This is the spiritual elegance of Bitcoin: it does not suppress greedâit transmutes it. It channels the drive for personal gain into the architecture of collective order. Miners compete not to dominate, but to validate. Nodes collaborate not through trust, but through mathematical proof.
This is not austerity. It is alchemy.
Greed, under Bitcoin, is refined. Tempered. Re-forged into a generative forceâno longer parasitic, but harmonic.
Layers of Fractalized Thought Fragments
All living systems are layered. So is the cosmos. So is the human being. So is a musical scale.
At its foundation lies the timechainâthe pulsing, incorruptible record of truth. Like the heart, it beats steadily. Every block, like a pulse, affirms its life through continuity. The difficulty adjustmentâBitcoinâs internal calibrationâfunctions like heart rate variability, adapting to pressure while preserving coherence.
Above this base layer is the Lightning Networkâa second layer facilitating rapid, efficient transactions. It is the nervous system: transmitting energy, reducing latency, enabling real-time interaction across a distributed whole.
Beyond that, emerging tools like Fedimint and Cashu function like the capillariesâbringing vitality to the extremities, to those underserved by legacy systems. They empower the unbanked, the overlooked, the forgotten. Privacy and dignity in the palms of those the old system refused to see.
And then there is NOSTRâthe decentralized protocol for communication and creation. It is the throat chakra, the vocal cords of the âfreedom-techâ body. It reclaims speech from the algorithmic overlords, making expression sovereign once more. It is also the reproductive system, as it enables the propagation of novel ideas and protocols in fertile, uncensorable soil.
Each layer plays its part. Not in hierarchy, but in harmony. In holarchy. Bitcoin and other open source protocols grow not through exogenous command, but through endogenous coherence. Like cells in an organism. Like a song.
Imagine the cell as a piece of glass from a shattered holographic plate âby which its perspectival, moving image can be restructured from the single shard. DNA isnât only a logical script of base pairs, but an evolving progressive song. Its lyrics imbued with wise reflections on relationships. The nucleus sings, the cell respondsânot by command, but by memory. Life is not imposed; it is expressed. A reflection of a hidden pattern.
Bitcoin chants this. Each node, a living cell, holds the full timechainâTruth distributed, incorruptible. Remove one, and the whole remains. This isnât redundancy. Itâs a revelation on the power of protection in Truth.
Consensus is communion. Verification becomes a sacred riteâTruth made audible through math.Â
Not just the signal; the song. A web of self-expression woven from Truth.
No center, yet every point alive with the whole. Like Indraâs Net, each reflects all. This is more than currency and information exchange. It is memory; a self-remembering Mind, unfolding through consensus and code. A Mind reflecting the Truth of reality at the speed of thought.
Heuristics are mental shortcutsâefficient, imperfect, alive. Like cells, they must adapt or decay. To become unbiased is to have self-balancing heuristics which carry feedback loops within them: they listen to the environment, mutate when needed, and survive by resonance with reality. Mutation is not error, but evolution. Its rules are simple, but their expression is dynamic.Â
What persists is not rigidity, but pattern.Â
To think clearly is not necessarily to be certain, but to dissolve doubt by listening, adjusting, and evolving thought itself.
To understand Bitcoin is simply to listenâpatiently, clearly, as one would to a familiar rhythm returning.
Permissionless Individuation
Bitcoin is a path. One that no one can walk for you.
Said differently, it is not a passive act. It cannot be spoon-fed. Like a spiritual path, it demands initiation, effort, and the willingness to question inherited beliefs.
Because Bitcoin is permissionless, no one can be forced to adopt it. One must choose to engage itâcompelled by need, interest, or intuition. Each person who embarks undergoes their own version of the heroâs journey.
Carl Jung called this process Individuationâthe reconciliation of fragmented psychic elements into a coherent, mature Self. Bitcoin mirrors this: it invites individuals to confront the unconscious assumptions of the fiat paradigm, and to re-integrate their relationship to time, value, and agency.
In Western traditionsâalchemy, Christianity, Kabbalahâthe individual is sacred, and salvation is personal. In Eastern systemsâDaoism, Buddhism, the Vedasâthe self is ultimately dissolved into the cosmic whole. Bitcoin, in a paradoxical way, echoes both: it empowers the individual, while aligning them with a holistic, transcendent order.
To truly see Bitcoin is to allow something false to die. A belief. A habit. A self-concept.
In that deathâa space opens for deeper connection with the Divine itSelf.Â
In that dissolution, something luminous is reborn.Â
After the passing, Truth becomes resurrected. Â
Dispelling Paradox Through Resonance
There is a subtle paradox encoded into the heroâs journey: each starts in solidarity, yet the awakening affects the collective.
No one can be forced into understanding Bitcoin. Like a spiritual truth, it must be seen. And yet, once seen, it becomes nearly impossible to unseeâand easier for others to glimpse. The pattern catches.
This phenomenon mirrors the concept of morphic resonance, as proposed and empirically tested by biologist Rupert Sheldrake. Once a critical mass of individuals begins to embody a new behavior or awareness, it becomes easierâinstinctiveâfor others to follow suit. Like the proverbial hundredth monkey who begins to wash the fruit in the sea water, and suddenly, monkeys across islands begin doing the sameâwithout ever meeting.
When enough individuals embody a pattern, it ripples outward. Not through propaganda, but through field effect and wave propagation. It becomes accessible, instinctive, familiarâeven across great distance.
Bitcoin spreads in this way. Not through centralized broadcast, but through subtle resonance. Each new node, each individual who integrates the protocol into their life, strengthens the signal for others. The protocol doesnât shout; it hums, oscillates and vibratesââpersistently, coherently, patiently.
One awakens. Another follows. The current builds. What was fringe becomes familiar. What was radical becomes obvious.
This is the sacred geometry of spiritual awakening. One awakens, another follows, and soon the fluidic current is strong enough to carry the rest. One becomes two, two become many, and eventually the many become One again. This tessellation reverberates through the human aura, not as ideology, but as perceivable pattern recognition.
Bitcoinâs most powerful marketing tool is truth. Its most compelling evangelist is reality. Its most unstoppable force is resonance.
Therefore, Bitcoin is not just financial infrastructureâit is psychic scaffolding. It is part of the subtle architecture through which new patterns of coherence ripple across the collective field.Â
The training wheels from which humanity learns to embody Peace and Prosperity.
Ego Deflation
The process of awakening is not linear, and its beginning is rarely gentleâit usually begins with disruption, with ego inflation and destruction.
To individuate is to shape a center; to recognize peripherals and create boundariesâto say, âI am.â But without integration, the ego tiltsâcollapsing into void or inflating into noise. Fiat reflects this pathology: scarcity hoarded, abundance simulated. Stagnation becomes disguised as safety, and inflation masquerades as growth.
In other words, to become whole, the ego must first riseâclaiming agency, autonomy, and identity. However, when left unbalanced, it inflates, or implodes. It forgets its context. It begins to consume rather than connect. And so the process must reverse: what inflates must deflate.
In the fiat paradigm, this inflation is literal. More is printed, and ethos is diluted. Savings decay. Meaning erodes. Value is abstracted. The economy becomes bloated with inaudible noise. And like the psyche that refuses to confront its own shadow, it begins to collapse under the weight of its own illusions.
But under Bitcoin, time is honored. Value is preserved. Energy is not abstracted but grounded.
Bitcoin is inherently deflationaryâin both economic and spiritual senses. With a fixed supply, it reveals what is truly scarce. Not money, not statusâbut the finite number of heartbeats we each carry.
To see Bitcoin is to feel that limit in oneâs soul. To hold Bitcoin is to feel Timeâs weight again. To sense the importance of Bitcoin is to feel the value of preserved, potential energy. It is to confront the reality that what matters cannot be printed, inflated, or faked. In this way, Bitcoin gently confronts the egoânot through punishment, but through clarity.
Deflation, rightly understood, is not collapseâit is refinement. It strips away illusion, bloat, and excess. It restores the clarity of essence.
Spiritually, this is liberation.
The Coin of Great Price
There is an ancient parable told by a wise man:
âThe kingdom of heaven is like a merchant seeking fine pearls, who, upon finding one of great price, sold all he had and bought it.â
Bitcoin is such a pearl.
But the ledger is more than a chest full of treasure. It is a key to the heart of things.
It is not just softwareâit is sacrament.
A symbol of what cannot be corrupted. A mirror of divine order etched into code. A map back to the sacred center.
It reflects what endures. It encodes what cannot be falsified. It remembers what we forgot: that Truth, when aligned with form, becomes Light once again.
Its design is not arbitrary. It speaks the language of life itselfâÂ
The elliptic orbits of the planets mirrored in its cryptography,
The logarithmic spiral of the nautilus shell discloses its adoption rate,
The interconnectivity of mycelium in soil reflect the network of nodes in cyberspace,Â
A webbed breadth of neurons across synaptic space fires with each new confirmed transaction.
It is geometry in devotion. Stillness in motion.
It is the Logos clothed in protocol.
What this key unlocks is beyond external riches. It is the eternal gold within us.
Clarity. Sovereignty. The unshakeable knowing that what is real cannot be taken. That what is sacred was never for sale.
Bitcoin is not the destination.
It is the Path.
And weâwhen we are willing to see itâare the Temple it leads back to.
-
@ 40b9c85f:5e61b451
2025-04-24 15:27:02Introduction
Data Vending Machines (DVMs) have emerged as a crucial component of the Nostr ecosystem, offering specialized computational services to clients across the network. As defined in NIP-90, DVMs operate on an apparently simple principle: "data in, data out." They provide a marketplace for data processing where users request specific jobs (like text translation, content recommendation, or AI text generation)
While DVMs have gained significant traction, the current specification faces challenges that hinder widespread adoption and consistent implementation. This article explores some ideas on how we can apply the reflection pattern, a well established approach in RPC systems, to address these challenges and improve the DVM ecosystem's clarity, consistency, and usability.
The Current State of DVMs: Challenges and Limitations
The NIP-90 specification provides a broad framework for DVMs, but this flexibility has led to several issues:
1. Inconsistent Implementation
As noted by hzrd149 in "DVMs were a mistake" every DVM implementation tends to expect inputs in slightly different formats, even while ostensibly following the same specification. For example, a translation request DVM might expect an event ID in one particular format, while an LLM service could expect a "prompt" input that's not even specified in NIP-90.
2. Fragmented Specifications
The DVM specification reserves a range of event kinds (5000-6000), each meant for different types of computational jobs. While creating sub-specifications for each job type is being explored as a possible solution for clarity, in a decentralized and permissionless landscape like Nostr, relying solely on specification enforcement won't be effective for creating a healthy ecosystem. A more comprehensible approach is needed that works with, rather than against, the open nature of the protocol.
3. Ambiguous API Interfaces
There's no standardized way for clients to discover what parameters a specific DVM accepts, which are required versus optional, or what output format to expect. This creates uncertainty and forces developers to rely on documentation outside the protocol itself, if such documentation exists at all.
The Reflection Pattern: A Solution from RPC Systems
The reflection pattern in RPC systems offers a compelling solution to many of these challenges. At its core, reflection enables servers to provide metadata about their available services, methods, and data types at runtime, allowing clients to dynamically discover and interact with the server's API.
In established RPC frameworks like gRPC, reflection serves as a self-describing mechanism where services expose their interface definitions and requirements. In MCP reflection is used to expose the capabilities of the server, such as tools, resources, and prompts. Clients can learn about available capabilities without prior knowledge, and systems can adapt to changes without requiring rebuilds or redeployments. This standardized introspection creates a unified way to query service metadata, making tools like
grpcurl
possible without requiring precompiled stubs.How Reflection Could Transform the DVM Specification
By incorporating reflection principles into the DVM specification, we could create a more coherent and predictable ecosystem. DVMs already implement some sort of reflection through the use of 'nip90params', which allow clients to discover some parameters, constraints, and features of the DVMs, such as whether they accept encryption, nutzaps, etc. However, this approach could be expanded to provide more comprehensive self-description capabilities.
1. Defined Lifecycle Phases
Similar to the Model Context Protocol (MCP), DVMs could benefit from a clear lifecycle consisting of an initialization phase and an operation phase. During initialization, the client and DVM would negotiate capabilities and exchange metadata, with the DVM providing a JSON schema containing its input requirements. nip-89 (or other) announcements can be used to bootstrap the discovery and negotiation process by providing the input schema directly. Then, during the operation phase, the client would interact with the DVM according to the negotiated schema and parameters.
2. Schema-Based Interactions
Rather than relying on rigid specifications for each job type, DVMs could self-advertise their schemas. This would allow clients to understand which parameters are required versus optional, what type validation should occur for inputs, what output formats to expect, and what payment flows are supported. By internalizing the input schema of the DVMs they wish to consume, clients gain clarity on how to interact effectively.
3. Capability Negotiation
Capability negotiation would enable DVMs to advertise their supported features, such as encryption methods, payment options, or specialized functionalities. This would allow clients to adjust their interaction approach based on the specific capabilities of each DVM they encounter.
Implementation Approach
While building DVMCP, I realized that the RPC reflection pattern used there could be beneficial for constructing DVMs in general. Since DVMs already follow an RPC style for their operation, and reflection is a natural extension of this approach, it could significantly enhance and clarify the DVM specification.
A reflection enhanced DVM protocol could work as follows: 1. Discovery: Clients discover DVMs through existing NIP-89 application handlers, input schemas could also be advertised in nip-89 announcements, making the second step unnecessary. 2. Schema Request: Clients request the DVM's input schema for the specific job type they're interested in 3. Validation: Clients validate their request against the provided schema before submission 4. Operation: The job proceeds through the standard NIP-90 flow, but with clearer expectations on both sides
Parallels with Other Protocols
This approach has proven successful in other contexts. The Model Context Protocol (MCP) implements a similar lifecycle with capability negotiation during initialization, allowing any client to communicate with any server as long as they adhere to the base protocol. MCP and DVM protocols share fundamental similarities, both aim to expose and consume computational resources through a JSON-RPC-like interface, albeit with specific differences.
gRPC's reflection service similarly allows clients to discover service definitions at runtime, enabling generic tools to work with any gRPC service without prior knowledge. In the REST API world, OpenAPI/Swagger specifications document interfaces in a way that makes them discoverable and testable.
DVMs would benefit from adopting these patterns while maintaining the decentralized, permissionless nature of Nostr.
Conclusion
I am not attempting to rewrite the DVM specification; rather, explore some ideas that could help the ecosystem improve incrementally, reducing fragmentation and making the ecosystem more comprehensible. By allowing DVMs to self describe their interfaces, we could maintain the flexibility that makes Nostr powerful while providing the structure needed for interoperability.
For developers building DVM clients or libraries, this approach would simplify consumption by providing clear expectations about inputs and outputs. For DVM operators, it would establish a standard way to communicate their service's requirements without relying on external documentation.
I am currently developing DVMCP following these patterns. Of course, DVMs and MCP servers have different details; MCP includes capabilities such as tools, resources, and prompts on the server side, as well as 'roots' and 'sampling' on the client side, creating a bidirectional way to consume capabilities. In contrast, DVMs typically function similarly to MCP tools, where you call a DVM with an input and receive an output, with each job type representing a different categorization of the work performed.
Without further ado, I hope this article has provided some insight into the potential benefits of applying the reflection pattern to the DVM specification.
-
@ 9223d2fa:b57e3de7
2025-05-14 20:26:2314,888 steps
-
@ 56cd780f:cbde8b29
2025-05-14 19:32:05Jo, blomster kommer i alle farger og fasonger. Her har du to eksempler:
sha256:157e9ab54c0d78651aa3b33ecbc64b2e9ce4d5a22bdb6755def739086d286f60 sha256:d6facbbc74b17c83c161c2a2baee2040d427c5e5dd3c55051089ec59370e4a08
-
@ d64f3475:8e56b3bf
2025-05-14 21:31:24Let'âs see if they appear in the right order.
First we have an apple.
Then we have a banana.
And lastly, a pear.
-
@ c9badfea:610f861a
2025-05-14 18:38:04- Install KeePassDX (it's free and open source)
- Launch the app, tap Create New Vault, and choose a location to store the database file
- Activate the Password slider
- Type a Password and Confirm Password, then tap OK
- Tap + and Add Entry to add your first credentials
- Enter a Title, Username, and Password (you can also generate a password here)
- Tap â at the bottom to create the entry
- Tap ⎠and then Save Data to save the database
- Tap đ to lock the database
â ď¸ Make sure you use strong, high-entropy passphrases
â ď¸ Back up the database file to a secure location (e.g. encrypted USB drive)
âšď¸ The database file (
.kdbx
) can also be opened with various KeePass ports -
@ 6e64b83c:94102ee8
2025-04-23 20:23:34How to Run Your Own Nostr Relay on Android with Cloudflare Domain
Prerequisites
- Install Citrine on your Android device:
- Visit https://github.com/greenart7c3/Citrine/releases
- Download the latest release using:
- zap.store
- Obtainium
- F-Droid
- Or download the APK directly
-
Note: You may need to enable "Install from Unknown Sources" in your Android settings
-
Domain Requirements:
- Purchase a domain if you don't have one
-
Transfer your domain to Cloudflare if it's not already there (for free SSL certificates and cloudflared support)
-
Tools to use:
- nak (the nostr army knife):
- Download from https://github.com/fiatjaf/nak/releases
- Installation steps:
-
For Linux/macOS: ```bash # Download the appropriate version for your system wget https://github.com/fiatjaf/nak/releases/latest/download/nak-linux-amd64 # for Linux # or wget https://github.com/fiatjaf/nak/releases/latest/download/nak-darwin-amd64 # for macOS
# Make it executable chmod +x nak-*
# Move to a directory in your PATH sudo mv nak-* /usr/local/bin/nak
- For Windows:
batch # Download the Windows version curl -L -o nak.exe https://github.com/fiatjaf/nak/releases/latest/download/nak-windows-amd64.exe# Move to a directory in your PATH (e.g., C:\Windows) move nak.exe C:\Windows\nak.exe
- Verify installation:
bash nak --version ```
Setting Up Citrine
- Open the Citrine app
- Start the server
- You'll see it running on
ws://127.0.0.1:4869
(local network only) - Go to settings and paste your npub into "Accept events signed by" inbox and press the + button. This prevents others from publishing events to your personal relay.
Installing Required Tools
- Install Termux from Google Play Store
- Open Termux and run:
bash pkg update && pkg install wget wget https://github.com/cloudflare/cloudflared/releases/latest/download/cloudflared-linux-arm64.deb dpkg -i cloudflared-linux-arm64.deb
Cloudflare Authentication
- Run the authentication command:
bash cloudflared tunnel login
- Follow the instructions:
- Copy the provided URL to your browser
- Log in to your Cloudflare account
- If the URL expires, copy it again after logging in
Creating the Tunnel
- Create a new tunnel:
bash cloudflared tunnel create <TUNNEL_NAME>
- Choose any name you prefer for your tunnel
-
Copy the tunnel ID after creating the tunnel
-
Create and configure the tunnel config:
bash touch ~/.cloudflared/config.yml nano ~/.cloudflared/config.yml
-
Add this configuration (replace the placeholders with your values): ```yaml tunnel:
credentials-file: /data/data/com.termux/files/home/.cloudflared/ .json ingress: - hostname: nostr.yourdomain.com service: ws://localhost:4869
- service: http_status:404 ```
- Note: In nano editor:
CTRL+O
and Enter to saveCTRL+X
to exit
-
Note: Check the credentials file path in the logs
-
Validate your configuration:
bash cloudflared tunnel validate
-
Start the tunnel:
bash cloudflared tunnel run my-relay
Preventing Android from Killing the Tunnel
Run these commands to maintain tunnel stability:
bash date && apt install termux-tools && termux-setup-storage && termux-wake-lock echo "nameserver 1.1.1.1" > $PREFIX/etc/resolv.conf
Tip: You can open multiple Termux sessions by swiping from the left edge of the screen while keeping your tunnel process running.
Updating Your Outbox Model Relays
Once your relay is running and accessible via your domain, you'll want to update your relay list in the Nostr network. This ensures other clients know about your relay and can connect to it.
Decoding npub (Public Key)
Private keys (nsec) and public keys (npub) are encoded in bech32 format, which includes: - A prefix (like nsec1, npub1 etc.) - The encoded data - A checksum
This format makes keys: - Easy to distinguish - Hard to copy incorrectly
However, most tools require these keys in hexadecimal (hex) format.
To decode an npub string to its hex format:
bash nak decode nostr:npub1dejts0qlva8mqzjlrxqkc2tmvs2t7elszky5upxaf3jha9qs9m5q605uc4
Change it with your own npub.
bash { "pubkey": "6e64b83c1f674fb00a5f19816c297b6414bf67f015894e04dd4c657e94102ee8" }
Copy the pubkey value in quotes.
Create a kind 10002 event with your relay list:
- Include your new relay with write permissions
- Include other relays you want to read from and write to, omit 3rd parameter to make it both read and write
Example format:
json { "kind": 10002, "tags": [ ["r", "wss://your-relay-domain.com", "write"], ["r", "wss://eden.nostr.land/"], ["r", "wss://nos.lol/"], ["r", "wss://nostr.bitcoiner.social/"], ["r", "wss://nostr.mom/"], ["r", "wss://relay.primal.net/"], ["r", "wss://nostr.wine/", "read"], ["r", "wss://relay.damus.io/"], ["r", "wss://relay.nostr.band/"], ["r", "wss://relay.snort.social/"] ], "content": "" }
Save it to a file called
event.json
Note: Add or remove any relays you want. To check your existing 10002 relays: - Visit https://nostr.band/?q=by%3Anpub1dejts0qlva8mqzjlrxqkc2tmvs2t7elszky5upxaf3jha9qs9m5q605uc4+++kind%3A10002 - nostr.band is an indexing service, it probably has your relay list. - Replace
npub1xxx
in the URL with your own npub - Click "VIEW JSON" from the menu to see the raw event - Or use thenak
tool if you know the relaysbash nak req -k 10002 -a <your-pubkey> wss://relay1.com wss://relay2.com
Replace `<your-pubkey>` with your public key in hex format (you can get it using `nak decode <your-npub>`)
- Sign and publish the event:
- Use a Nostr client that supports kind 10002 events
- Or use the
nak
command-line tool:bash nak event --sec ncryptsec1... wss://relay1.com wss://relay2.com $(cat event.json)
Important Security Notes: 1. Never share your nsec (private key) with anyone 2. Consider using NIP-49 encrypted keys for better security 3. Never paste your nsec or private key into the terminal. The command will be saved in your shell history, exposing your private key. To clear the command history: - For bash: use
history -c
- For zsh: usefc -W
to write history to file, thenfc -p
to read it back - Or manually edit your shell history file (e.g.,~/.zsh_history
or~/.bash_history
) 4. if you're usingzsh
, usefc -p
to prevent the next command from being saved to history 5. Or temporarily disable history before running sensitive commands:bash unset HISTFILE nak key encrypt ... set HISTFILE
How to securely create NIP-49 encypted private key
```bash
Read your private key (input will be hidden)
read -s SECRET
Read your password (input will be hidden)
read -s PASSWORD
encrypt command
echo "$SECRET" | nak key encrypt "$PASSWORD"
copy and paste the ncryptsec1 text from the output
read -s ENCRYPTED nak key decrypt "$ENCRYPTED"
clear variables from memory
unset SECRET PASSWORD ENCRYPTED ```
On a Windows command line, to read from stdin and use the variables in
nak
commands, you can use a combination ofset /p
to read input and then use those variables in your command. Here's an example:```bash @echo off set /p "SECRET=Enter your secret key: " set /p "PASSWORD=Enter your password: "
echo %SECRET%| nak key encrypt %PASSWORD%
:: Clear the sensitive variables set "SECRET=" set "PASSWORD=" ```
If your key starts with
ncryptsec1
, thenak
tool will securely prompt you for a password when using the--sec
parameter, unless the command is used with a pipe< >
or|
.bash nak event --sec ncryptsec1... wss://relay1.com wss://relay2.com $(cat event.json)
- Verify the event was published:
- Check if your relay list is visible on other relays
-
Use the
nak
tool to fetch your kind 10002 events:bash nak req -k 10002 -a <your-pubkey> wss://relay1.com wss://relay2.com
-
Testing your relay:
- Try connecting to your relay using different Nostr clients
- Verify you can both read from and write to your relay
- Check if events are being properly stored and retrieved
- Tip: Use multiple Nostr clients to test different aspects of your relay
Note: If anyone in the community has a more efficient method of doing things like updating outbox relays, please share your insights in the comments. Your expertise would be greatly appreciated!
-
@ f32184ee:6d1c17bf
2025-04-23 13:21:52Ads Fueling Freedom
Ross Ulbrichtâs "Decentralize Social Media" painted a picture of a user-centric, decentralized future that transcended the limitations of platforms like the tech giants of today. Though focused on social media, his concept provided a blueprint for decentralized content systems writ large. The PROMO Protocol, designed by NextBlock while participating in Sovereign Engineering, embodies this blueprint in the realm of advertising, leveraging Nostr and Bitcoinâs Lightning Network to give individuals control, foster a multi-provider ecosystem, and ensure secure value exchange. In this way, Ulbrichtâs 2021 vision can be seen as a prescient prediction of the PROMO Protocolâs structure. This is a testament to the enduring power of his ideas, now finding form in NextBlockâs innovative approach.
[Current Platform-Centric Paradigm, source: Ross Ulbricht's Decentralize Social Media]
Ulbrichtâs Vision: A Decentralized Social Protocol
In his 2021 Medium article Ulbricht proposed a revolutionary vision for a decentralized social protocol (DSP) to address the inherent flaws of centralized social media platforms, such as privacy violations and inconsistent content moderation. Writing from prison, Ulbricht argued that decentralization could empower users by giving them control over their own content and the value they create, while replacing single, monolithic platforms with a competitive ecosystem of interface providers, content servers, and advertisers. Though his focus was on social media, Ulbrichtâs ideas laid a conceptual foundation that strikingly predicts the structure of NextBlockâs PROMO Protocol, a decentralized advertising system built on the Nostr protocol.
[A Decentralized Social Protocol (DSP), source: Ross Ulbricht's Decentralize Social Media]
Ulbrichtâs Principles
Ulbrichtâs article outlines several key principles for his DSP: * User Control: Users should own their content and dictate how their data and creations generate value, rather than being subject to the whims of centralized corporations. * Decentralized Infrastructure: Instead of a single platform, multiple interface providers, content hosts, and advertisers interoperate, fostering competition and resilience. * Privacy and Autonomy: Decentralized solutions for profile management, hosting, and interactions would protect user privacy and reduce reliance on unaccountable intermediaries. * Value Creation: Users, not platforms, should capture the economic benefits of their contributions, supported by decentralized mechanisms for transactions.
These ideas were forward-thinking in 2021, envisioning a shift away from the centralized giants dominating social media at the time. While Ulbricht didnât specifically address advertising protocols, his framework for decentralization and user empowerment extends naturally to other domains, like NextBlockâs open-source offering: the PROMO Protocol.
NextBlockâs Implementation of PROMO Protocol
The PROMO Protocol powers NextBlock's Billboard app, a decentralized advertising protocol built on Nostr, a simple, open protocol for decentralized communication. The PROMO Protocol reimagines advertising by: * Empowering People: Individuals set their own ad prices (e.g., 500 sats/minute), giving them direct control over how their attention or space is monetized. * Marketplace Dynamics: Advertisers set budgets and maximum bids, competing within a decentralized system where a 20% service fee ensures operational sustainability. * Open-Source Flexibility: As an open-source protocol, it allows multiple developers to create interfaces or apps on top of it, avoiding the single-platform bottleneck Ulbricht critiqued. * Secure Payments: Using Strike Integration with Bitcoin Lightning Network, NextBlock enables bot-resistant and intermediary-free transactions, aligning value transfer with each person's control.
This structure decentralizes advertising in a way that mirrors Ulbrichtâs broader vision for social systems, with aligned principles showing a specific use case: monetizing attention on Nostr.
Aligned Principles
Ulbrichtâs 2021 article didnât explicitly predict the PROMO Protocol, but its foundational concepts align remarkably well with NextBlock's implementation the protocolâs design: * Autonomy Over Value: Ulbricht argued that users should control their content and its economic benefits. In the PROMO Protocol, people dictate ad pricing, directly capturing the value of their participation. Whether itâs their time, influence, or digital space, rather than ceding it to a centralized ad network. * Ecosystem of Providers: Ulbricht envisioned multiple providers replacing a single platform. The PROMO Protocolâs open-source nature invites a similar diversity: anyone can build interfaces or tools on top of it, creating a competitive, decentralized advertising ecosystem rather than a walled garden. * Decentralized Transactions: Ulbrichtâs DSP implied decentralized mechanisms for value exchange. NextBlock delivers this through the Bitcoin Lightning Network, ensuring that payments for ads are secure, instantaneous and final, a practical realization of Ulbrichtâs call for user-controlled value flows. * Privacy and Control: While Ulbricht emphasized privacy in social interactions, the PROMO Protocol is public by default. Individuals are fully aware of all data that they generate since all Nostr messages are signed. All participants interact directly via Nostr.
[Blueprint Match, source NextBlock]
Who We Are
NextBlock is a US-based new media company reimagining digital ads for a decentralized future. Our founders, software and strategy experts, were hobbyist podcasters struggling to promote their work online without gaming the system. That sparked an idea: using new tech like Nostr and Bitcoin to build a decentralized attention market for people who value control and businesses seeking real connections.
Our first product, Billboard, is launching this June.
Open for All
Our modelâs open-source! Check out the PROMO Protocol, built for promotion and attention trading. Anyone can join this decentralized ad network. Run your own billboard or use ours. This is a growing ecosystem for a new ad economy.
Our Vision
NextBlock wants to help build a new decentralized internet. Our revolutionary and transparent business model will bring honest revenue to companies hosting valuable digital spaces. Together, we will discover what our attention is really worth.
Read our Manifesto to learn more.
NextBlock is registered in Texas, USA.
-
@ d64f3475:8e56b3bf
2025-05-14 21:31:23â¤ď¸đĽâ¨
-
@ d64f3475:8e56b3bf
2025-05-14 21:31:21And this is the regular text.
-
@ 9bde4214:06ca052b
2025-04-22 18:13:37"It's gonna be permissionless or hell."
Gigi and gzuuus are vibing towards dystopia.
Books & articles mentioned:
- AI 2027
- DVMs were a mistake
- Careless People by Sarah Wynn-Williams
- Takedown by Laila michelwait
- The Ultimate Resource by Julian L. Simon
- Harry Potter by J.K. Rowling
- Momo by Michael Ende
In this dialogue:
- Pablo's Roo Setup
- Tech Hype Cycles
- AI 2027
- Prompt injection and other attacks
- Goose and DVMCP
- Cursor vs Roo Code
- Staying in control thanks to Amber and signing delegation
- Is YOLO mode here to stay?
- What agents to trust?
- What MCP tools to trust?
- What code snippets to trust?
- Everyone will run into the issues of trust and micropayments
- Nostr solves Web of Trust & micropayments natively
- Minimalistic & open usually wins
- DVMCP exists thanks to Totem
- Relays as Tamagochis
- Agents aren't nostr experts, at least not right now
- Fix a mistake once & it's fixed forever
- Giving long-term memory to LLMs
- RAG Databases signed by domain experts
- Human-agent hybrids & Chess
- Nostr beating heart
- Pluggable context & experts
- "You never need an API key for anything"
- Sats and social signaling
- Difficulty-adjusted PoW as a rare-limiting mechanism
- Certificate authorities and centralization
- No solutions to policing speech!
- OAuth and how it centralized
- Login with nostr
- Closed vs open-source models
- Tiny models vs large models
- The minions protocol (Stanford paper)
- Generalist models vs specialized models
- Local compute & encrypted queries
- Blinded compute
- "In the eyes of the state, agents aren't people"
- Agents need identity and money; nostr provides both
- "It's gonna be permissionless or hell"
- We already have marketplaces for MCP stuff, code snippets, and other things
- Most great stuff came from marketplaces (browsers, games, etc)
- Zapstore shows that this is already working
- At scale, central control never works. There's plenty scams and viruses in the app stores.
- Using nostr to archive your user-generated content
- HAVEN, blossom, novia
- The switcharoo from advertisements to training data
- What is Truth?
- What is Real?
- "We're vibing into dystopia"
- Who should be the arbiter of Truth?
- First Amendment & why the Logos is sacred
- Silicon Valley AI bros arrogantly dismiss wisdom and philosophy
- Suicide rates & the meaning crisis
- Are LLMs symbiotic or parasitic?
- The Amish got it right
- Are we gonna make it?
- Careless People by Sarah Wynn-Williams
- Takedown by Laila michelwait
- Harry Potter dementors & Momo's time thieves
- Facebook & Google as non-human (superhuman) agents
- Zapping as a conscious action
- Privacy and the internet
- Plausible deniability thanks to generative models
- Google glasses, glassholes, and Meta's Ray Ben's
- People crave realness
- Bitcoin is the realest money we ever had
- Nostr allows for real and honest expression
- How do we find out what's real?
- Constraints, policing, and chilling effects
- Jesus' plans for DVMCP
- Hzrd's article on how DVMs are broken (DVMs were a mistake)
- Don't believe the hype
- DVMs pre-date MCP tools
- Data Vending Machines were supposed to be stupid: put coin in, get stuff out.
- Self-healing vibe-coding
- IP addresses as scarce assets
- Atomic swaps and the ASS protocol
- More marketplaces, less silos
- The intensity of #SovEng and the last 6 weeks
- If you can vibe-code everything, why build anything?
- Time, the ultimate resource
- What are the LLMs allowed to think?
- Natural language interfaces are inherently dialogical
- Sovereign Engineering is dialogical too
-
@ d64f3475:8e56b3bf
2025-05-14 21:31:18I will add a picture, a hyperlink and a video. Letâs see if it works.
-
@ a39d19ec:3d88f61e
2025-04-22 12:44:42Die Debatte um Migration, Grenzsicherung und Abschiebungen wird in Deutschland meist emotional gefßhrt. Wer fordert, dass illegale Einwanderer abgeschoben werden, sieht sich nicht selten dem Vorwurf des Rassismus ausgesetzt. Doch dieser Vorwurf ist nicht nur sachlich unbegrßndet, sondern verkehrt die Realität ins Gegenteil: Tatsächlich sind es gerade diejenigen, die hinter jeder Forderung nach Rechtssicherheit eine rassistische Motivation vermuten, die selbst in erster Linie nach Hautfarbe, Herkunft oder Nationalität urteilen.
Das Recht steht Ăźber Emotionen
Deutschland ist ein Rechtsstaat. Das bedeutet, dass Regeln nicht nach BauchgefĂźhl oder politischer Stimmungslage ausgelegt werden kĂśnnen, sondern auf klaren gesetzlichen Grundlagen beruhen mĂźssen. Einer dieser Grundsätze ist in Artikel 16a des Grundgesetzes verankert. Dort heiĂt es:
âAuf Absatz 1 [Asylrecht] kann sich nicht berufen, wer aus einem Mitgliedstaat der Europäischen Gemeinschaften oder aus einem anderen Drittstaat einreist, in dem die Anwendung des Abkommens Ăźber die Rechtsstellung der FlĂźchtlinge und der Europäischen Menschenrechtskonvention sichergestellt ist.â
Das bedeutet, dass jeder, der ßber sichere Drittstaaten nach Deutschland einreist, keinen Anspruch auf Asyl hat. Wer dennoch bleibt, hält sich illegal im Land auf und unterliegt den geltenden Regelungen zur Rßckfßhrung. Die Forderung nach Abschiebungen ist daher nichts anderes als die Forderung nach der Einhaltung von Recht und Gesetz.
Die Umkehrung des Rassismusbegriffs
Wer einerseits behauptet, dass das deutsche Asyl- und Aufenthaltsrecht strikt durchgesetzt werden soll, und andererseits nicht nach Herkunft oder Hautfarbe unterscheidet, handelt wertneutral. Diejenigen jedoch, die in einer solchen Forderung nach Rechtsstaatlichkeit einen rassistischen Unterton sehen, projizieren ihre eigenen Denkmuster auf andere: Sie unterstellen, dass die Debatte ausschlieĂlich entlang ethnischer, rassistischer oder nationaler Kriterien gefĂźhrt wird â und genau das ist eine rassistische Denkweise.
Jemand, der illegale Einwanderung kritisiert, tut dies nicht, weil ihn die Herkunft der Menschen interessiert, sondern weil er den Rechtsstaat respektiert. Hingegen erkennt jemand, der hinter dieser Kritik Rassismus wittert, offenbar in erster Linie die âRasseâ oder Herkunft der betreffenden Personen und reduziert sie darauf.
Finanzielle Belastung statt ideologischer Debatte
Neben der rechtlichen gibt es auch eine Ăśkonomische Komponente. Der deutsche Wohlfahrtsstaat basiert auf einem Solidarprinzip: Die BĂźrger zahlen in das System ein, um sich gegenseitig in schwierigen Zeiten zu unterstĂźtzen. Dieser Wohlstand wurde Ăźber Generationen hinweg von denjenigen erarbeitet, die hier seit langem leben. Die Priorität liegt daher darauf, die vorhandenen Mittel zuerst unter denjenigen zu verteilen, die durch Steuern, Sozialabgaben und Arbeit zum Erhalt dieses Systems beitragen â nicht unter denen, die sich durch illegale Einreise und fehlende wirtschaftliche Eigenleistung in das System begeben.
Das ist keine ideologische Frage, sondern eine rein wirtschaftliche Abwägung. Ein Sozialsystem kann nur dann nachhaltig funktionieren, wenn es nicht unbegrenzt belastet wird. WĂźrde Deutschland keine klaren Regeln zur Einwanderung und Abschiebung haben, wĂźrde dies unweigerlich zur Ăberlastung des Sozialstaates fĂźhren â mit negativen Konsequenzen fĂźr alle.
Sozialpatriotismus
Ein weiterer wichtiger Aspekt ist der Schutz der Arbeitsleistung jener Generationen, die Deutschland nach dem Zweiten Weltkrieg mĂźhsam wieder aufgebaut haben. Während oft betont wird, dass die Deutschen moralisch kein Erbe aus der Zeit vor 1945 beanspruchen dĂźrfen â auĂer der Verantwortung fĂźr den Holocaust â, ist es umso bedeutsamer, das neue Erbe nach 1945 zu respektieren, das auf FleiĂ, Disziplin und harter Arbeit beruht. Der Wiederaufbau war eine kollektive Leistung deutscher Menschen, deren FrĂźchte nicht bedenkenlos verteilt werden dĂźrfen, sondern vorrangig denjenigen zugutekommen sollten, die dieses Fundament mitgeschaffen oder es Ăźber Generationen mitgetragen haben.
Rechtstaatlichkeit ist nicht verhandelbar
Wer sich fĂźr eine konsequente Abschiebepraxis ausspricht, tut dies nicht aus rassistischen Motiven, sondern aus Respekt vor der Rechtsstaatlichkeit und den wirtschaftlichen Grundlagen des Landes. Der Vorwurf des Rassismus in diesem Kontext ist daher nicht nur falsch, sondern entlarvt eine selektive Wahrnehmung nach rassistischen Merkmalen bei denjenigen, die ihn erheben.
-
@ 4ba8e86d:89d32de4
2025-04-21 02:13:56Tutorial feito por nostr:nostr:npub1rc56x0ek0dd303eph523g3chm0wmrs5wdk6vs0ehd0m5fn8t7y4sqra3tk poste original abaixo:
Parte 1 : http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/263585/tutorial-debloat-de-celulares-android-via-adb-parte-1
Parte 2 : http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/index.php/263586/tutorial-debloat-de-celulares-android-via-adb-parte-2
Quando o assunto ĂŠ privacidade em celulares, uma das medidas comumente mencionadas ĂŠ a remoção de bloatwares do dispositivo, tambĂŠm chamado de debloat. O meio mais eficiente para isso sem dĂşvidas ĂŠ a troca de sistema operacional. Custom Româs como LineageOS, GrapheneOS, IodĂŠ, CalyxOS, etc, jĂĄ sĂŁo bastante enxutos nesse quesito, principalmente quanto nĂŁo ĂŠ instalado os G-Apps com o sistema. No entanto, essa prĂĄtica pode acabar resultando em problemas indesejados como a perca de funçþes do dispositivo, e atĂŠ mesmo incompatibilidade com apps bancĂĄrios, tornando este mĂŠtodo mais atrativo para quem possui mais de um dispositivo e separando um apenas para privacidade.  Pensando nisso, pessoas que possuem apenas um Ăşnico dispositivo mĂłvel, que sĂŁo necessitadas desses apps ou funçþes, mas, ao mesmo tempo, tem essa visĂŁo em prol da privacidade, buscam por um meio-termo entre manter a Stock rom, e nĂŁo ter seus dados coletados por esses bloatwares. Felizmente, a remoção de bloatwares ĂŠ possĂvel e pode ser realizada via root, ou mais da maneira que este artigo irĂĄ tratar, via adb.
O que sĂŁo bloatwares?
Bloatware ĂŠ a junção das palavras bloat (inchar) + software (programa), ou seja, um bloatware ĂŠ basicamente um programa inĂştil ou facilmente substituĂvel â colocado em seu dispositivo previamente pela fabricante e operadora â que estĂĄ no seu dispositivo apenas ocupando espaço de armazenamento, consumindo memĂłria RAM e pior, coletando seus dados e enviando para servidores externos, alĂŠm de serem mais pontos de vulnerabilidades.
O que ĂŠ o adb?
O Android Debug Brigde, ou apenas adb, Ê uma ferramenta que se utiliza das permissþes de usuårio shell e permite o envio de comandos vindo de um computador para um dispositivo Android exigindo apenas que a depuração USB esteja ativa, mas tambÊm pode ser usada diretamente no celular a partir do Android 11, com o uso do Termux e a depuração sem fio (ou depuração wifi). A ferramenta funciona normalmente em dispositivos sem root, e tambÊm funciona caso o celular esteja em Recovery Mode.
Requisitos:
Para computadores:
⢠Depuração USB ativa no celular; ⢠Computador com adb; ⢠Cabo USB;
Para celulares:
⢠Depuração sem fio (ou depuração wifi) ativa no celular; ⢠Termux; ⢠Android 11 ou superior;
Para ambos:
⢠Firewall NetGuard instalado e configurado no celular; ⢠Lista de bloatwares para seu dispositivo;
Ativação de depuração:
Para ativar a Depuração USB em seu dispositivo, pesquise como ativar as opçþes de desenvolvedor de seu dispositivo, e lå ative a depuração. No caso da depuração sem fio, sua ativação irå ser necessåria apenas no momento que for conectar o dispositivo ao Termux.
Instalação e configuração do NetGuard
O NetGuard pode ser instalado atravĂŠs da prĂłpria Google Play Store, mas de preferĂŞncia instale pela F-Droid ou Github para evitar telemetria.
F-Droid: https://f-droid.org/packages/eu.faircode.netguard/
Github: https://github.com/M66B/NetGuard/releases
ApĂłs instalado, configure da seguinte maneira:
Configuraçþes â padrĂľes (lista branca/negra) â ative as 3 primeiras opçþes (bloquear wifi, bloquear dados mĂłveis e aplicar regras âquando tela estiver ligadaâ);
Configuraçþes â opçþes avançadas â ative as duas primeiras (administrar aplicativos do sistema e registrar acesso a internet);
Com isso, todos os apps estarão sendo bloqueados de acessar a internet, seja por wifi ou dados móveis, e na pågina principal do app basta permitir o acesso a rede para os apps que você vai usar (se necessårio). Permita que o app rode em segundo plano sem restrição da otimização de bateria, assim quando o celular ligar, ele jå estarå ativo.
Lista de bloatwares
Nem todos os bloatwares sĂŁo genĂŠricos, haverĂĄ bloatwares diferentes conforme a marca, modelo, versĂŁo do Android, e atĂŠ mesmo regiĂŁo.
Para obter uma lista de bloatwares de seu dispositivo, caso seu aparelho jĂĄ possua um tempo de existĂŞncia, vocĂŞ encontrarĂĄ listas prontas facilmente apenas pesquisando por elas. Supondo que temos um Samsung Galaxy Note 10 Plus em mĂŁos, basta pesquisar em seu motor de busca por:
Samsung Galaxy Note 10 Plus bloatware list
Provavelmente essas listas jĂĄ terĂŁo inclusas todos os bloatwares das mais diversas regiĂľes, lhe poupando o trabalho de buscar por alguma lista mais especĂfica.
Caso seu aparelho seja muito recente, e/ou nĂŁo encontre uma lista pronta de bloatwares, devo dizer que vocĂŞ acaba de pegar em merda, pois ĂŠ chato para um caralho pesquisar por cada aplicação para saber sua função, se ĂŠ essencial para o sistema ou se ĂŠ facilmente substituĂvel.
De antemão jå aviso, que mais para frente, caso vossa gostosura remova um desses aplicativos que era essencial para o sistema sem saber, vai acabar resultando na perda de alguma função importante, ou pior, ao reiniciar o aparelho o sistema pode estar quebrado, lhe obrigando a seguir com uma formatação, e repetir todo o processo novamente.
Download do adb em computadores
Para usar a ferramenta do adb em computadores, basta baixar o pacote chamado SDK platform-tools, disponĂvel atravĂŠs deste link: https://developer.android.com/tools/releases/platform-tools. Por ele, vocĂŞ consegue o download para Windows, Mac e Linux.
Uma vez baixado, basta extrair o arquivo zipado, contendo dentro dele uma pasta chamada platform-tools que basta ser aberta no terminal para se usar o adb.
Download do adb em celulares com Termux.
Para usar a ferramenta do adb diretamente no celular, antes temos que baixar o app Termux, que ĂŠ um emulador de terminal linux, e jĂĄ possui o adb em seu repositĂłrio. VocĂŞ encontra o app na Google Play Store, mas novamente recomendo baixar pela F-Droid ou diretamente no Github do projeto.
F-Droid: https://f-droid.org/en/packages/com.termux/
Github: https://github.com/termux/termux-app/releases
Processo de debloat
Antes de iniciarmos, ĂŠ importante deixar claro que nĂŁo ĂŠ para vocĂŞ sair removendo todos os bloatwares de cara sem mais nem menos, afinal alguns deles precisam antes ser substituĂdos, podem ser essenciais para vocĂŞ para alguma atividade ou função, ou atĂŠ mesmo sĂŁo insubstituĂveis.
Alguns exemplos de bloatwares que a substituição ĂŠ necessĂĄria antes da remoção, ĂŠ o Launcher, afinal, ĂŠ a interface grĂĄfica do sistema, e o teclado, que sem ele sĂł ĂŠ possĂvel digitar com teclado externo. O Launcher e teclado podem ser substituĂdos por quaisquer outros, minha recomendação pessoal ĂŠ por aqueles que respeitam sua privacidade, como Pie Launcher e Simple Laucher, enquanto o teclado pelo OpenBoard e FlorisBoard, todos open-source e disponĂveis da F-Droid.
Identifique entre a lista de bloatwares, quais vocĂŞ gosta, precisa ou prefere nĂŁo substituir, de maneira alguma vocĂŞ ĂŠ obrigado a remover todos os bloatwares possĂveis, modifique seu sistema a seu bel-prazer. O NetGuard lista todos os apps do celular com o nome do pacote, com isso vocĂŞ pode filtrar bem qual deles nĂŁo remover.
Um exemplo claro de bloatware insubstituĂvel e, portanto, nĂŁo pode ser removido, ĂŠ o com.android.mtp, um protocolo onde sua função ĂŠ auxiliar a comunicação do dispositivo com um computador via USB, mas por algum motivo, tem acesso a rede e se comunica frequentemente com servidores externos. Para esses casos, e melhor solução mesmo ĂŠ bloquear o acesso a rede desses bloatwares com o NetGuard.
MTP tentando comunicação com servidores externos:
Executando o adb shell
No computador
Faça backup de todos os seus arquivos importantes para algum armazenamento externo, e formate seu celular com o hard reset. ApĂłs a formatação, e a ativação da depuração USB, conecte seu aparelho e o pc com o auxĂlio de um cabo USB. Muito provavelmente seu dispositivo irĂĄ apenas começar a carregar, por isso permita a transferĂŞncia de dados, para que o computador consiga se comunicar normalmente com o celular.
JĂĄ no pc, abra a pasta platform-tools dentro do terminal, e execute o seguinte comando:
./adb start-server
O resultado deve ser:
daemon not running; starting now at tcp:5037 daemon started successfully
E caso não apareça nada, execute:
./adb kill-server
E inicie novamente.
Com o adb conectado ao celular, execute:
./adb shell
Para poder executar comandos diretamente para o dispositivo. No meu caso, meu celular ĂŠ um Redmi Note 8 Pro, codinome Begonia.
Logo o resultado deve ser:
begonia:/ $
Caso ocorra algum erro do tipo:
adb: device unauthorized. This adb serverâs $ADB_VENDOR_KEYS is not set Try âadb kill-serverâ if that seems wrong. Otherwise check for a confirmation dialog on your device.
Verifique no celular se apareceu alguma confirmação para autorizar a depuração USB, caso sim, autorize e tente novamente. Caso não apareça nada, execute o kill-server e repita o processo.
No celular
ApĂłs realizar o mesmo processo de backup e hard reset citado anteriormente, instale o Termux e, com ele iniciado, execute o comando:
pkg install android-tools
Quando surgir a mensagem âDo you want to continue? [Y/n]â, basta dar enter novamente que jĂĄ aceita e finaliza a instalação
Agora, vå atÊ as opçþes de desenvolvedor, e ative a depuração sem fio. Dentro das opçþes da depuração sem fio, terå uma opção de emparelhamento do dispositivo com um código, que irå informar para você um código em emparelhamento, com um endereço IP e porta, que serå usado para a conexão com o Termux.
Para facilitar o processo, recomendo que abra tanto as configuraçþes quanto o Termux ao mesmo tempo, e divida a tela com os dois appâs, como da maneira a seguir:
Para parear o Termux com o dispositivo, nĂŁo ĂŠ necessĂĄrio digitar o ip informado, basta trocar por âlocalhostâ, jĂĄ a porta e o cĂłdigo de emparelhamento, deve ser digitado exatamente como informado. Execute:
adb pair localhost:porta CĂłdigoDeEmparelhamento
De acordo com a imagem mostrada anteriormente, o comando ficaria âadb pair localhost:41255 757495â.
Com o dispositivo emparelhado com o Termux, agora basta conectar para conseguir executar os comandos, para isso execute:
adb connect localhost:porta
Obs: a porta que você deve informar neste comando não Ê a mesma informada com o código de emparelhamento, e sim a informada na tela principal da depuração sem fio.
Pronto! Termux e adb conectado com sucesso ao dispositivo, agora basta executar normalmente o adb shell:
adb shell
Remoção na pråtica Com o adb shell executado, você estå pronto para remover os bloatwares. No meu caso, irei mostrar apenas a remoção de um app (Google Maps), jå que o comando Ê o mesmo para qualquer outro, mudando apenas o nome do pacote.
Dentro do NetGuard, verificando as informaçþes do Google Maps:
Podemos ver que mesmo fora de uso, e com a localização do dispositivo desativado, o app estå tentando loucamente se comunicar com servidores externos, e informar sabe-se lå que peste. Mas sem novidades atÊ aqui, o mais importante Ê que podemos ver que o nome do pacote do Google Maps Ê com.google.android.apps.maps, e para o remover do celular, basta executar:
pm uninstall âuser 0 com.google.android.apps.maps
E pronto, bloatware removido! Agora basta repetir o processo para o resto dos bloatwares, trocando apenas o nome do pacote.
Para acelerar o processo, vocĂŞ pode jĂĄ criar uma lista do bloco de notas com os comandos, e quando colar no terminal, irĂĄ executar um atrĂĄs do outro.
Exemplo de lista:
Caso a donzela tenha removido alguma coisa sem querer, tambĂŠm ĂŠ possĂvel recuperar o pacote com o comando:
cmd package install-existing nome.do.pacote
PĂłs-debloat
ApĂłs limpar o mĂĄximo possĂvel o seu sistema, reinicie o aparelho, caso entre no como recovery e nĂŁo seja possĂvel dar reboot, significa que vocĂŞ removeu algum app âessencialâ para o sistema, e terĂĄ que formatar o aparelho e repetir toda a remoção novamente, desta vez removendo poucos bloatwares de uma vez, e reiniciando o aparelho atĂŠ descobrir qual deles nĂŁo pode ser removido. Sim, dĂĄ trabalho⌠quem mandou querer privacidade?
Caso o aparelho reinicie normalmente apĂłs a remoção, parabĂŠns, agora basta usar seu celular como bem entender! Mantenha o NetGuard sempre executando e os bloatwares que nĂŁo foram possĂveis remover nĂŁo irĂŁo se comunicar com servidores externos, passe a usar apps open source da F-Droid e instale outros apps atravĂŠs da Aurora Store ao invĂŠs da Google Play Store.
ReferĂŞncias: Caso vocĂŞ seja um Australopithecus e tenha achado este guia difĂcil, eis uma videoaula (3:14:40) do Anderson do canal Ciberdef, realizando todo o processo: http://odysee.com/@zai:5/Como-remover-at%C3%A9-200-APLICATIVOS-que-colocam-a-sua-PRIVACIDADE-E-SEGURAN%C3%87A-em-risco.:4?lid=6d50f40314eee7e2f218536d9e5d300290931d23
Pdfâs do Anderson citados na videoaula: crĂŠditos ao anon6837264 http://eternalcbrzpicytj4zyguygpmkjlkddxob7tptlr25cdipe5svyqoqd.onion/file/3863a834d29285d397b73a4af6fb1bbe67c888d72d30/t-05e63192d02ffd.pdf
Processo de instalação do Termux e adb no celular: https://youtu.be/APolZrPHSms
-
@ d64f3475:8e56b3bf
2025-05-14 21:31:16Is it still working?
-
@ 10f7c7f7:f5683da9
2025-05-14 17:51:45Letâs begin with a simple question, why do students go to a business school? Other than the obvious of not really knowing what they want to do in the future and thinking they will at least be able to get a graduate job of some type when they leave. The difficulty for business schools is then how to develop and deliver an education that provides students with a general overview of important topics of a modern business, finance, accounting, human resources, economics, marketing and a variety of other management topics, such as operations, sustainability and analytics, to name a few, that remains up to date. Not only have difficulties emerged recently with the advent of easily accessible large language models making the life of an unscrupulous student easier and the life of the diligent lecturer more difficult, but the whole nature of business is continually changing. Why learn about operations, if I can get all I need from some dark factory overseas? Why put together a marketing plan for my business, when anyone with a following can sell all the products they want with a single post? Why learn about the nuances of accounting theory when a) youâll need to go through formal training irrespective of the degree the student earned, and b) the job may soon no longer exist as a result of AI based automation?
While a touch dark, these are questions that need to be asked within business schools today to ensure that 18 and 19 year olds, entering university, preparing to saddle themselves with upwards of ÂŁ30,000 worth of debt, are not making a massive, expensive mistake. While there are the benefits related to the social and maturing process of attending university, the cost of university has forever changed this calculation for most, other than the most privileged and wealthy students. Compared to 20 years ago, taking a few years out and then starting a job made sense, where living expensive could be covered by a combination of loans, part time work and help from parents, with resources left over to a little fun. If the above questions are valid, attending university for 3 years, and then potentially feeling the need to also complete a postgraduate degree to âset yourself apartâ, what you actually come out of university with needs to be given a lot of attention. As someone who has taught in university for over 10 years, Iâve seen both changes in the business environment and how students engage with studies have changed. Putting it simply, many are more focused on making ends meet than learning anything, meaning many will take any opportunity to save a little time on a piece of coursework, just to get a pass, e.g. asking chatgpt to write a 3000-word essay on âXâ topic.
For me, this has resulted in students with more focus upon âgetting a good degreeâ, than engaging in learning, meaning every short cut is taken and the drive to come out of university as a better person appears, at least partially, lost. From finding out about bitcoin a little over 5 years ago, and studying it rather intently for the last 2 and a half, I think it represents a critical subject for helping Business Schools remain relevant. Bitcoin is emerging as potentially the most important economic innovation ever, and the most rapidly growing asset in history, but it appears looked down upon in the school I work. Whether off hand comments in department meetings of âpay me in bitcoinâ (followed by muffled laughter), âstudents only want to do research projects on âcryptocurrenciesââ said condescendingly by an economics lecturer or published work clearly stating âwe find empirical evidence that the fundamental price of Bitcoin is zeroâ. If people outside academia worry that universities are becoming indoctrination institutions, training young people not to investigate new topics, these views of academics are unlikely to provide an environment for a balanced, open discussion.
While I would not want to paint all members of the business school where I work with the same broad brush, I would a) be extremely interested to know how many modules make reference to bitcoin, b) how many members of staff are aware of bitcoin and c) how many have actually read the bitcoin white paper. While I wouldnât want to make any assumptions, I would not be surprised if the responses to b) were magnitudes greater than the responses to a) and c) combined. If this is the case, the question is then raised of why this is relevant and what the students are likely missing out on by not providing them with education on this emerging topic. Importantly, this does not mean education on the thousands of new cryptocurrency projects that are released on a daily basis, just education of bitcoin, bitcoin was the first, it is the most valuable by market cap, it is the innovation, everything else doesnât warrant attention.
Firstly, to reflect on bitcoin having a value of zero, if a student graduating university in 2025 spent their first yearâs tuition fees on bitcoin (Fees approximately ÂŁ9,000, bitcoin approximately ÂŁ16,000 in Sept 2022), they would have been able to purchase 0.55btc. By 13-05-2025 (2 months before graduation), that same purchase would be worth over ÂŁ45,000, very much non-zero. While this may be viewed by some as an example that only a high-risk gambler would pursue, a similar argument could be made for a student spending ÂŁ30k (plus living expenses) to study a subject they likely didnât fully understand, to hopefully secure a job to pay back that loan in 3 years time. However, saying that, if the student had bought bitcoin when it was higher (September 2021, so buying 0.23btc) by graduation in July 2024, there bitcoin would ONLY be worth a little over ÂŁ12k (still greater than the initial investment and more than zero). However, as someone who believes in the value of education, Iâm not going to tell my children or anyone of university age to take out a student loan and buy bitcoin with it, apart from likely being illegal, and at least ânot in line with their intended useâ.
The old man academic curmudgeon in me would suggest that the student go and learn a craft, that will have value in the future, becoming a plumber, an electrician or a carpenter, while learning about bitcoin on the side. However, after 15 years from the age of 4, being fed state sponsored indoctrination that âall the smart kids go to universityâ, putting such pressure on a young person may appear unkind, if ultimately âgood for themâ. So, what options might an academically competent individual have when they leave school and may want to keep studying? This might be where a universityâs business school may be able to step in, although in my opinion, every effort must be made to reduce costs, while also increasing value of the experience. Spending money given to children (by government) for their education on administrative staff and new buildings that donât benefit students, not to mention lecture theatres and seminar rooms that many students choose not to frequent, feels deeply wrong. The money students pay for their education should help foster a deep drive to enquire about subjects they do not yet understand and then be able to articulate and communicate that learning to others. Ideally, students will leave university with skills, that may not be quite as hands on as if they had learnt a craft, but hopefully practical in terms of helping their future employers succeed.
Now, while there are near infinite topics and examples that could be considered, from AI to robotization to new marketing philosophies to new approaches to managing supply chains, introducing bitcoin may provide a useful foundation on which to begin development of curriculum. The main concern is the views of those within the business school, while I only have a few data points and would like to be proved wrong, I worry that the British Broadcasting Corporation has successfully tainted their views on bitcoin. Did you know that each bitcoin paymentâuses a swimming pool of waterâ? I hope you didnât because that was a blatantly false statement from the BBC that not been retracted since first being published in November 2023. If the views of those within the business school are misinformed, but also, if this topic they are aware of has not led to them exploring this topic further leads to further concerns, are they not inquisitive? I imagine points in the future when colleagues tell me how luck I was, to have bought bitcoin in 2020 and they arenât so fortunate, I bite my tongue, then say; Iâm not lucky, I just made the effort to learn about bitcoin (which is the most socially acceptable response I can find). But this isnât just about buying an asset that may go up in value, but using bitcoin to add new relevance to so much of what is taught in a business school, to prepare graduates or entrepreneurs for a future that will likely benefit from having bitcoin integrated into it.
This is not a place to begin listing each module and describe in detail how bitcoin must be integrated into it. This is not sustainability, and I would not want module leaders to feel they are required to do something, even when the outcome is students feeling they are repeatedly covering topics that are not relevant to them or the topic they are studying. However, if those designing modules can appreciate what bitcoin is, they may be able to appreciate particular modules within their suite that may have elements that are aligned with aspects of bitcoin. While in no way exhaustive, modules could ask or include such topics as:
1)Â Â Â Â Â Â Â Â Marketing: How a trillion-dollar asset succeeded without a marketing budget?
2)Â Â Â Â Â Â Â Â Sustainability: How bitcoin mining is transforming renewable energy generation
3)Â Â Â Â Â Â Â Â Finance: Financial engineering of bitcoin treasury companies
4)Â Â Â Â Â Â Â Â Entrepreneurship: Venture capital for bitcoin native firms
5)Â Â Â Â Â Â Â Â Human resources: New models of staff engagement and remuneration
6)Â Â Â Â Â Â Â Â Tourism: Developing bitcoin holiday destinations
7)Â Â Â Â Â Â Â Â Economics: Exploring economies using fixed supply assets in practice
8)Â Â Â Â Â Â Â Â Accounting: Exploring alternative units of account in business
9)Â Â Â Â Â Â Â Â Business Start-up: Exploring bitcoin enabled business start-ups
10)Â Â Operations: Reimagining operational improvement initiatives
Through a process of clearly introducing what bitcoin is, as well as questioning established views and misunderstanding of bitcoin, modules would be able to provide students with opportunities to both learn about bitcoin and then apply it within their subject area. In comparison to the above example of the impact of simply buying bitcoin instead of going to university, the suggested modules would allow students to apply what they had learnt about bitcoin to practical contexts. By taking a step back from the potential to get more dollars or pounds, learning about bitcoin may also allow students to build appreciations of behaviours that are often associated with money that doesnât need to be spent immediately, low time preference. While there would be no obligation, this may also enable students to begin saving in bitcoin during their time at university (rather than spending everything they earn on take out), preparing themselves for some time in the future, with assets they have previously accumulated that have appreciated in value.
However, these benefits are not limited to the students, if members of staff have been sufficiently inquisitive to explore how bitcoin could be integrated into their module or indeed their own research, they may also choose to begin saving in bitcoin. While academic careers are accepted as having potentially lower wages that some private sector jobs, but having this balanced again flexible working and good pensions, in recently years, drops in student numbers and limits on international students have put many institutions under considerable pressure. As a result, lecturers are coming under more pressure to publish more with less time dedicated to research, while also being required to spend more time in classrooms with the associate preparatory and marking burden. Without saving in bitcoin, a major concern for me is that academics are being continually stretched to do more with less, doing their own research in evenings and weekends, forced to remain in academia to collect their âgood pensionâ, which may ultimately get cut. While able to maintain the existing system of students receiving face to face support in the short term, without spare resources to develop new knowledge and refreshing teaching material, the students will ultimately suffer, with staff being stretched ever thinner. Learning about, and then saving in bitcoin may provide staff with a buffer, knowing that they have been able to accumulate sufficient assets so they are not required to continue working 5 days a week into their 50s or 60s. The released time could then be directed towards their own learning, allowing them to make use of newly released slack resources for research and then research informed teaching.
So, to return to the opening question, why do students go to a business school? While it may be to understand elements of a business to help them decide what area of a business they may want to work in, it also needs to be able to provide students with the skills to succeed in which ever part of a business they choose to work in. For this, students need to know why they have gone to university in the first place and then had sufficient time to study and learn. Without this, university may simply be viewed as a very expensive, few gap years, they then spend the next couple of decades paying for. What learning about bitcoin may do during their university journey may do is help them answer more fundamental questions, such as what is money, which if they canât answer, the aims of a business school and the purpose of getting a better paid graduate job must be difficult to articulate. Why spend 3 years accumulating debt, only to spend the following decades paying that debt off, particularly if the money you are earning is losing its value because of inflation? Another topic that integrating bitcoin into a business school would help articulate more clearly, particularly if existing economics modules are based on the work of John Maynard Keynes; no, no, no, inflation is not good, can you give me an example of when theft produced a positive outcome?
For those few (as a portion of population) individuals and businesses that have begun to save in bitcoin, with prices per coin approaching new all time highs, this has likely been a good decision. Bitcoin is good for saving and for businesses looking to be around in the long term, at the very least being able to save in bitcoin, is likely to have a positive impact on the business. To extend this argument to a university, but specifically a Business School, integrating bitcoin could provide students with an introduction to help them save for the future and learn about bitcoinâs relevance to business, while also potentially helping staff spend more time doing what they value. While I would never say that Business Schools should adopt/integrate bitcoin, I would definitely not want to be seen as an educational institution that wasnât sufficiently inquisitive to be actively investigating this emerging strategic reserve asset.
-
@ d64f3475:8e56b3bf
2025-05-14 21:31:13Is it actually called âsummaryâ?
-
@ ed5774ac:45611c5c
2025-04-19 20:29:31April 20, 2020:Â The day I saw my so-called friends expose themselves as gutless, brain-dead sheep.
On that day, I shared a video exposing the damning history of the Bill & Melinda Gates Foundation's vaccine campaigns in Africa and the developing world. As Gates was on every TV screen, shilling COVID jabs that didnât even exist, I called out his blatant financial conflict of interest and pointed out the obvious in my facebook post: "Finally someone is able to explain why Bill Gates runs from TV to TV to promote vaccination. Not surprisingly, it's all about money againâŚ" - referencing his substantial investments in vaccine technology, including BioNTech's mRNA platform that would later produce the COVID vaccines and generate massive profits for his so-called philanthropic foundation.
The conflict of interest was undeniable. I genuinely believed anyone capable of basic critical thinking would at least pause to consider these glaring financial motives. But what followed was a masterclass in human stupidity.
My facebook post from 20 April 2020:
Not only was I branded a 'conspiracy theorist' for daring to question the billionaire who stood to make a fortune off the very vaccines he was shilling, but the brain-dead, logic-free bullshit vomited by the people around me was beyond pathetic. These barely literate morons couldnât spell "Pfizer" without auto-correct, yet they mindlessly swallowed and repeated every lie the media and government force-fed them, branding anything that cracked their fragile reality as "conspiracy theory." Big Pharmaâs rap sheetâfraud, deadly cover-ups, billions in finesâcould fill libraries, yet these obedient sheep didnât bother to open a single book or read a single study before screaming their ignorance, desperate to virtue-signal their obedience. Then, like spineless lab rats, they lined up for an experimental jab rushed to the market in months, too dumb to care that proper vaccine development takes a decade.
The pathetic part is that these idiots spend hours obsessing over reviews for their useless purchases like shoes or socks, but wonât spare 60 seconds to research the experimental cocktail being injected into their veinsâor even glance at the FDAâs own damning safety reports. Those same obedient sheep would read every Yelp review for a fucking coffee shop but won't spend five minutes looking up Pfizer's criminal fraud settlements. They would demand absolute obedience to âThe Scienceâ˘ââwhile being unable to define mRNA, explain lipid nanoparticles, or justify why trials were still running as they queued up like cattle for their jab. If they had two brain cells to rub together or spent 30 minutes actually researching, they'd know, but noâthey'd rather suck down the narrative like good little slaves, too dumb to question, too weak to think.
Worst of all, they became the systemâs attack dogsânot just swallowing the poison, but forcing it down othersâ throats. This wasnât ignorance. It was betrayal. They mutated into medical brownshirts, destroying lives to virtue-signal their obedienceâeven as their own childrenâs hearts swelled with inflammation.
One conversation still haunts me to this dayâa masterclass in wealth-worship delusion. A close friend, as a response to my facebook post, insisted that Gatesâ assumed reading list magically awards him vaccine expertise, while dismissing his billion-dollar investments in the same products as âno conflict of interest.â Worse, he argued that Gatesâs $5â10 billion pandemic windfall was âdeserved.â
This exchange crystallizes civilizationâs intellectual surrender: reason discarded with religious fervor, replaced by blind faith in corporate propaganda.
The comment of a friend on my facebook post that still haunts me to this day:
Walking Away from the Herd
After a period of anger and disillusionment, I made a decision: I would no longer waste energy arguing with people who refused to think for themselves. If my circle couldnât even ask basic questionsâlike why an untested medical intervention was being pushed with unprecedented urgencyâthen I needed a new community.
Fortunately, I already knew where to look. For three years, I had been involved in Bitcoin, a space where skepticism wasnât just toleratedâit was demanded. Here, Iâd met some of the most principled and independent thinkers Iâd ever encountered. These were people who understood the corrupting influence of centralized powerâwhether in money, media, or politicsâand who valued sovereignty, skepticism, and integrity. Instead of blind trust, bitcoiners practiced relentless verification. And instead of empty rhetoric, they lived by a simple creed:Â Donât trust. Verify.
It wasnât just a philosophy. It was a lifeline. So I chose my side and I walked away from the herd.
Finding My Tribe
Over the next four years, I immersed myself in Bitcoin conferences, meetups, and spaces where ideas were tested, not parroted. Here, I encountered extraordinary people: not only did they share my skepticism toward broken systems, but they challenged me to sharpen it.
No longer adrift in a sea of mindless conformity, Iâd found a crew of thinkers who cut through the noise. They saw clearly what most ignoredâthat at the core of societyâs collapse lay broken money, the silent tax on time, freedom, and truth itself. But unlike the complainers Iâd left behind, these people built. They coded. They wrote. They risked careers and reputations to expose the rot. Some faced censorship; others, mockery. All understood the stakes.
These werenât keyboard philosophers. They were modern-day Cassandras, warning of inflationâs theft, the Fedâs lies, and the coming dollar collapseânot for clout, but because they refused to kneel to a dying regime. And in their defiance, I found something rare: a tribe that didnât just believe in a freer future. They were engineering it.
April 20, 2024: No more herd. No more lies. Only proof-of-work.
On April 20, 2024, exactly four years after my last Facebook post, the one that severed my ties to the herd for goodâI stood in front of Warsawâs iconic Palace of Culture and Science, surrounded by 400 bitcoiners who felt like family. We were there to celebrate Bitcoinâs fourth halving, but it was more than a protocol milestone. It was a reunion of sovereign individuals. Some faces Iâd known since the early days; others, Iâd met only hours before. We bonded instantlyâheated debates, roaring laughter, zero filters on truths or on so called conspiracy theories.
As the countdown to the halving began, it hit me: This was the antithesis of the hollow world Iâd left behind. No performative outrage, no coerced consensusâjust a room of unyielding minds whoâd traded the illusion of safety for the grit of truth. Four years prior, Iâd been alone in my resistance. Now, I raised my glass among my people - those who had seen the system's lies and chosen freedom instead. Each had their own story of awakening, their own battles fought, but here we shared the same hard-won truth.
The energy wasnât just electric. It was aliveâthe kind that emerges when free people build rather than beg. For the first time, I didnât just belong. I was home. And in that moment, the halvingâs ticking clock mirrored my own journey: cyclical, predictable in its scarcity, revolutionary in its consequences. Four years had burned away the old world. What remained was stronger.
No Regrets
Leaving the herd wasnât a choiceâit was evolution. My soul shouted: "Iâd rather stand alone than kneel with the masses!". The Bitcoin community became more than family; theyâre living proof that the world still produces warriors, not sheep. Here, among those who forge truth, I found something extinct elsewhere: hope that burns brighter with every halving, every block, every defiant mind that joins the fight.
Change doesnât come from the crowd. It starts when one person stops applauding.
Today, I stand exactly where I always wanted to beâshoulder-to-shoulder with my true family: the rebels, the builders, the ungovernable. Together, weâre building the decentralized future.
-
@ d64f3475:8e56b3bf
2025-05-14 21:08:10A few weeks ago, I ran into an old friend at a coffee shop. We hadnât spoken in years, and within five minutes, she said something Iâve heard countless times:
âI just feel like Iâm so behind.â
Behind who? Behind what?
Thereâs this ideaâquiet, nagging, oddly universalâthat weâre all somehow in a race we didnât sign up for. That weâre supposed to have hit certain milestones by certain ages. That if weâre not married, promoted, rich, settled, happy (and photogenic) by 30 or 40 or pick your poison, then weâve failed some invisible test.
Where did this come from?
Some of itâs cultural, obviously. Social media compresses timelines. Youâre 27, doom-scrolling, and suddenly someone from high school just IPOâd their startup and got engaged in Rome. Another just bought a house with a kitchen island the size of a small country. You wonder if you missed a memo.
But beneath that, thereâs something deeper. A belief that life is linear. That it should look like a staircase: school, job, marriage, house, kids, success. But real life? Itâs a squiggle. A mess. A beautiful disaster.
Hereâs the truth: Youâre not behind. Thereâs no schedule. Thereâs only your path, and the courage it takes to stay on itâeven when it looks wildly different from everyone elseâs.
I say this as someone who has taken the âscenic route.â I changed careers in my 30s. I moved cities on a hunch. I dropped things that looked great on paper because they felt wrong in my gut. Iâve had seasons of momentum and seasons of stuckness. Both were necessary.
âCatching upâ assumes thereâs a fixed destination. But what if there isnât? What if the point isnât arrival, but presence? Progress that feels real, not performative?
If you need a permission slip to stop comparing, let this be it.
Youâre not late. Youâre not early.
Youâre right on time. -
@ bbef5093:71228592
2025-05-14 15:28:13NukleĂĄris politika â 2025. mĂĄjus 14. | Ărta: David Dalton
DĂĄnia fontolgatja a 40 ĂŠve tartĂł atomerĹmĹą-tilalom feloldĂĄsĂĄt
DĂĄnia fontolgatja a 40 ĂŠve ĂŠrvĂŠnyben lĂŠvĹ atomerĹmĹą-tilalom feloldĂĄsĂĄt, hogy javĂtsa energiaellĂĄtĂĄsĂĄnak biztonsĂĄgĂĄt, ĂŠs elkerĂźlje az olyan ĂĄramszĂźneteket, mint amilyenek mĂşlt hĂłnapban SpanyolorszĂĄgot ĂŠs PortugĂĄliĂĄt sĂşjtottĂĄk â kĂśzĂślte az orszĂĄg energiaĂźgyi minisztere.
Lars Aagaard a dĂĄn Politiken napilapnak mĂĄjus 13-ĂĄn elmondta, hogy a koppenhĂĄgai centrista koalĂciĂł egy ĂŠvig elemzi majd az atomenergia ĂşjbĂłli bevezetĂŠsĂŠnek elĹnyeit ĂŠs hĂĄtrĂĄnyait.
âLĂĄthatjuk, hogy fejlĹdĂŠs zajlik az Ăşj atomenergia-technolĂłgiĂĄk, pĂŠldĂĄul a kis modulĂĄris reaktorok terĂŠnâ â mondta Aagaard.
âDe ĂśnmagĂĄban nem elĂŠg, hogy ezekben lehetĹsĂŠg rejlik. Azt is tudnunk kell, mit jelentene a dĂĄn tĂĄrsadalom szĂĄmĂĄra, ha lehetĹvĂŠ tennĂŠnk ezeknek a technolĂłgiĂĄknak a bevezetĂŠsĂŠtâ â tette hozzĂĄ.
MĂĄjus 14-ĂŠn Aagaardnak nyilvĂĄnos meghallgatĂĄson kellett megjelennie a parlamentben, hogy vĂĄlaszoljon az ellenzĂŠki pĂĄrtok kĂŠrdĂŠseire, amelyek tĂĄmogatjĂĄk az atomenergia visszahozatalĂĄt.
Az 1985-Ăśs tilalom feloldĂĄsa DĂĄniĂĄt azon orszĂĄgok nĂśvekvĹ csoportjĂĄba sorolnĂĄ, amelyek az atomenergiĂĄt a megĂşjulĂł energiaforrĂĄsok kiegyensĂşlyozĂĄsĂĄra hasznĂĄljĂĄk az ĂĄramtermelĂŠsben.
A szomszĂŠdos SvĂŠdorszĂĄg jobboldali kormĂĄnya megprĂłbĂĄlja ĂşjjĂĄĂŠleszteni az atomenergiĂĄt az orszĂĄgban, ahol mĂŠg hĂĄrom atomerĹmĹą mĹąkĂśdik, miutĂĄn a Three Mile Island-i (USA) 1979-es baleset Ăłta folyamatosan vitatkoznak a bezĂĄrĂĄsukrĂłl.
NorvĂŠgia ekĂśzben bizottsĂĄgot hozott lĂŠtre az atomenergia lehetĹsĂŠgeinek vizsgĂĄlatĂĄra, ĂŠs olyan cĂŠgek jelentek meg, amelyek kis modulĂĄris reaktorok telepĂtĂŠsĂŠt tervezik.
Anders Fogh Rasmussen, DĂĄnia volt miniszterelnĂśke ĂŠs a NATO egykori fĹtitkĂĄra a brit Financial Timesnak azt mondta, tĂĄmogatja a ânevetsĂŠgesâ tilalom feloldĂĄsĂĄt.
DĂĄn milliĂĄrdos alapja tĂĄmogatja az atomenergiĂĄt
DĂĄnia EurĂłpĂĄban az egyik legmagasabb megĂşjulĂł energia rĂŠszarĂĄnnyal rendelkezik az ĂĄramtermelĂŠsben, kĂśszĂśnhetĹen a partjai mentĂŠn talĂĄlhatĂł hatalmas tengeri szĂŠlerĹmĹąveknek.
DĂĄniĂĄban sosem mĹąkĂśdtek kereskedelmi atomerĹmĹąvek, de hĂĄrom kutatĂłreaktort Ăźzemeltettek 1957 ĂŠs 1960 kĂśzĂśtt. Ezeket mind leĂĄllĂtottĂĄk, jelenleg leszerelik Ĺket.
MĂşlt hĂłnapban Joachim Ante dĂĄn milliĂĄrdos ĂĄltal tĂĄmogatott alap bejelentette, hogy 350 milliĂł eurĂłt kĂvĂĄn ĂśsszegyĹąjteni a fejlett atomenergia-ipar ĂŠs annak ellĂĄtĂĄsi lĂĄncĂĄnak tĂĄmogatĂĄsĂĄra. A 92 Capital az atomenergia ĂşjjĂĄĂŠledĂŠsĂŠre szĂĄmĂt, mivel egyre nagyobb az aggodalom az energiaellĂĄtĂĄs biztonsĂĄga miatt.
Ante, aki a Unity nevĹą videojĂĄtĂŠk-szoftvercĂŠget alapĂtotta, eddig 50 milliĂł eurĂłt fektetett be sajĂĄt vagyonĂĄbĂłl.
Az alap korĂĄbbi vĂĄltozata, a 92 Ventures, befektetett a svĂŠd Blykalla ĂŠs a finn Steady Energy cĂŠgekbe, amelyek mind kis modulĂĄris reaktorok fejlesztĂŠsĂŠn dolgoznak.
A dĂĄn Seaborg Technologies tĂśbb orszĂĄgban vizsgĂĄlja kompakt, olvadt sĂłval mĹąkĂśdĹ, ĂşszĂł âerĹmĹą bĂĄrkaâ technolĂłgiĂĄjĂĄnak telepĂtĂŠsi lehetĹsĂŠgeit.
UrĂĄn ĂŠs Ăźzemanyag â 2025. mĂĄjus 14. | Ărta: David Dalton
Az USA felgyorsĂtja a Utah-i urĂĄnprojektet, mikĂśzben Trump az âenergia-vĂĄlsĂĄgâ megoldĂĄsĂĄra tĂśrekszik
Az amerikai belĂźgyminisztĂŠrium bejelentette, hogy gyorsĂtott kĂśrnyezetvĂŠdelmi engedĂŠlyezĂŠsi eljĂĄrĂĄs alĂĄ vonja az Anfield Energy ĂĄltal javasolt Velvet-Wood urĂĄnbĂĄnya projektet Utah ĂĄllamban, hogy elĹsegĂtse Donald Trump elnĂśk tĂśrekvĂŠsĂŠt a hazai energiatermelĂŠs nĂśvelĂŠsĂŠre.
Ennek eredmĂŠnyekĂŠnt a projekt kĂśrnyezeti felĂźlvizsgĂĄlata mindĂśssze 14 nap alatt lezajlik â kĂśzĂślte a minisztĂŠrium.
Az ilyen vizsgĂĄlatok ĂĄltalĂĄban ĂŠvekig tartanak az urĂĄnbĂĄnyĂĄszat lehetsĂŠges kĂśrnyezeti hatĂĄsai miatt.
A kanadai Anfield Energy szerint a Velvet-Wood az elsĹ urĂĄnprojekt, amelyet az amerikai kormĂĄny gyorsĂtott eljĂĄrĂĄsban kezel Trump energiafĂźggetlensĂŠgi vĂŠszhelyzeti nyilatkozata alapjĂĄn. A cĂŠg szerint ez âhatĂĄrozott elmozdulĂĄs a hazai nukleĂĄris Ăźzemanyag-ellĂĄtĂĄs szĂśvetsĂŠgi tĂĄmogatĂĄsa felĂŠâ.
Doug Burgum belĂźgyminiszter szerint Amerika riasztĂł energiavĂŠszhelyzettel nĂŠz szembe az elĹzĹ kormĂĄnyzat âklĂmaszĂŠlsĹsĂŠgesâ politikĂĄja miatt.
âTrump elnĂśk ĂŠs kormĂĄnya gyorsasĂĄggal ĂŠs erĹvel vĂĄlaszol, hogy megoldja ezt a vĂĄlsĂĄgotâ â mondta.
âA bĂĄnyĂĄszati projekt gyorsĂtott felĂźlvizsgĂĄlata pontosan az a hatĂĄrozott lĂŠpĂŠs, amelyre szĂźksĂŠgĂźnk van energia-jĂśvĹnk biztosĂtĂĄsĂĄhoz.â
Ha jĂłvĂĄhagyjĂĄk, a San Juan megyĂŠben lĂŠvĹ Velvet-Wood bĂĄnya urĂĄnt termelne, amelyet atomerĹmĹąvek ĂźzemanyagakĂŠnt ĂŠs nukleĂĄris fegyverek elĹĂĄllĂtĂĄsĂĄhoz is hasznĂĄlnak, valamint vanĂĄdiumot, amely akkumulĂĄtorokban vagy acĂŠl ĂŠs mĂĄs ĂśtvĂśzetek erĹsĂtĂŠsĂŠre hasznĂĄlhatĂł.
A belĂźgyminisztĂŠrium szerint a projekt egy korĂĄbbi bĂĄnyĂĄszati mĹąvelet helyszĂnĂŠn valĂłsulna meg, ĂŠs csak hĂĄrom hektĂĄrnyi Ăşj felszĂni zavarĂĄs keletkezne.
Az Anfield tulajdonĂĄban van a Shootaring Canyon urĂĄnfeldolgozĂł Ăźzem is Utah-ban, amelyet ĂşjraindĂtani tervez. Ez az Ăźzem az urĂĄnĂŠrcet urĂĄn-koncentrĂĄtummĂĄ alakĂtanĂĄ, amely atomerĹmĹąvek ĂźzemanyagakĂŠnt hasznĂĄlhatĂł.
Az Anfield 2015-ben vĂĄsĂĄrolta meg a Velvet-Wood bĂĄnyĂĄt az Uranium One-tĂłl. 1979 ĂŠs 1984 kĂśzĂśtt az Atlas Minerals mintegy 400 000 tonna ĂŠrcet bĂĄnyĂĄszott ki a Velvet-lelĹhelyen, ĂŠs kĂśrĂźlbelĂźl nĂŠgy milliĂł font triurĂĄn-okt-oxidot (U3O8) nyert ki.
Az U3O8, mĂĄs nĂŠven âsĂĄrga sĂźtemĂŠnyâ, egyfajta urĂĄn-koncentrĂĄtum por, amelyet atomerĹmĹąvek ĂźzemanyagĂĄnak elĹĂĄllĂtĂĄsĂĄra hasznĂĄlnak.
Ăj ĂŠpĂtĂŠs â 2025. mĂĄjus 14. | Ărta: David Dalton
BrĂźsszel âjelentĹs kockĂĄzatotâ lĂĄt a Dukovany atomerĹmĹą projektben a tisztessĂŠgtelen ĂĄllami tĂĄmogatĂĄs miatt
BrĂźsszel âjelentĹsâ kockĂĄzatot lĂĄt abban, hogy a dĂŠl-koreai cĂŠg, amely elnyerte a kĂŠt Ăşj atomerĹmĹą szĂĄllĂtĂĄsĂĄra kiĂrt szerzĹdĂŠst a csehorszĂĄgi Dukovany telephelyĂŠre, tisztessĂŠgtelen ĂĄllami tĂĄmogatĂĄsban rĂŠszesĂźlt.
A Korea Hydro & Nuclear Power (KHNP), az ĂĄllami Kepco leĂĄnyvĂĄllalata, a francia ĂĄllami EDF ĂŠs az amerikai Westinghouse elĹtt nyerte el a szerzĹdĂŠst.
BrĂźsszel azonban arra kĂŠrte a cseh kormĂĄnyt, hogy fĂźggessze fel a szerzĹdĂŠst, amĂg az EU kĂźlfĂśldi tĂĄmogatĂĄsokrĂłl szĂłlĂł rendelete alapjĂĄn dĂśntĂŠs nem szĂźletik, amely az uniĂłs vĂĄllalatokat hivatott vĂŠdeni a jelentĹs ĂĄllami tĂĄmogatĂĄsban rĂŠszesĂźlĹ kĂźlfĂśldi versenytĂĄrsakkal szemben.
StĂŠphane SĂŠjournĂŠ, az EU belsĹ piacĂŠrt felelĹs biztosa mĂĄjus 2-i levelĂŠben azt Ărta, hogy âjelentĹs jelekâ utalnak arra, hogy a KHNP ĂĄllami tĂĄmogatĂĄsban rĂŠszesĂźlt, ami torzĂthatja az uniĂł belsĹ piacĂĄt, ĂŠs tisztessĂŠgtelen elĹnyt adhat az eurĂłpai versenytĂĄrsakkal szemben.
A szĂŠles kĂśrben ismertetett levĂŠl szerint a szerzĹdĂŠs alĂĄĂrĂĄsa veszĂŠlyeztetnĂŠ a bizottsĂĄg vizsgĂĄlati lehetĹsĂŠgĂŠt.
Egy cseh regionĂĄlis bĂrĂłsĂĄg mĂĄjus 6-ĂĄn felfĂźggesztette a szerzĹdĂŠst az EDF fellebbezĂŠse utĂĄn, amely szerint a szerzĹdĂŠs precedenst teremtene, lehetĹvĂŠ tĂŠve a dĂŠl-koreai cĂŠg szĂĄmĂĄra, hogy agresszĂven pĂĄlyĂĄzzon mĂĄs eurĂłpai szerzĹdĂŠsekre.
Egy EU-tisztviselĹ szerint SĂŠjournĂŠ, aki francia, kizĂĄrĂłlag az uniĂłs jog betartatĂĄsa ĂŠrdekĂŠben lĂŠpett kĂśzbe, nem pedig hazĂĄja ĂŠrdekeinek vĂŠdelmĂŠben.
A cseh CTK hĂrĂźgynĂśksĂŠg idĂŠzte Petr Fiala cseh miniszterelnĂśkĂśt, aki szerint a levĂŠl a biztostĂłl szĂĄrmazik, de nem kĂŠpviseli a bizottsĂĄg hivatalos ĂĄllĂĄspontjĂĄt, ĂŠs nincs kĂśtelezĹ ereje.
Az Euractiv szerint egy bizottsĂĄgi szĂłvivĹ mĂĄjus 12-ĂŠn ĂşjsĂĄgĂrĂłknak azt mondta, hogy SĂŠjournĂŠ levele âegyĂĄltalĂĄn nem kĂŠrte a dolgok felfĂźggesztĂŠsĂŠtâ.
A cseh cĂŠg szerint az ĂĄllami tĂĄmogatĂĄs vĂĄdja âspekulĂĄciĂłâ
A reaktorprojektĂŠrt felelĹs cseh cĂŠg, az ElektrĂĄrna Dukovany II (EDU II) kĂśzlemĂŠnyt adott ki, amelyben megvĂŠdte a kivĂĄlasztĂĄsi folyamatot, ĂŠs felszĂłlĂtotta az EDF-et, hogy hozza nyilvĂĄnossĂĄgra a pĂĄlyĂĄzat sorĂĄn benyĂşjtott ajĂĄnlatĂĄt.
Az EDU II, a cseh ĂĄllami kĂśzmĹącĂŠg, a ÄEZ leĂĄnyvĂĄllalata, kĂśzĂślte, hogy âteljes kĂĄrtĂŠrĂtĂŠstâ kĂśvetel, ĂŠs megvĂŠdi a rĂŠszvĂŠnyesi ĂŠrtĂŠket a pereskedĂŠssel szemben.
A kĂśzlemĂŠny szerint az illegĂĄlis tĂĄmogatĂĄs vĂĄdja âa sikertelen pĂĄlyĂĄzĂł spekulĂĄciĂłjaâ.
DĂŠl-Korea ĂŠs CsehorszĂĄg megerĹsĂtette elkĂśtelezettsĂŠgĂŠt az atomerĹmĹą-szerzĹdĂŠs alĂĄĂrĂĄsa mellett, a bĂrĂłsĂĄgi dĂśntĂŠs ellenĂŠre is.
SajtĂłhĂrek szerint a cseh kormĂĄny mĂĄjus 7-i ĂźlĂŠsĂŠn kĂśzĂślte, hogy az EDU II a lehetĹ leghamarabb folytatja a szerzĹdĂŠskĂśtĂŠst a KHNP-vel kĂŠt atomerĹmĹą ĂŠpĂtĂŠsĂŠre.
A kĂŠt Ăşj, nagy kapacitĂĄsĂş APR1400 tĂpusĂş blokkot a KHNP szĂĄllĂtja, ĂŠs a dĂŠl-csehorszĂĄgi Dukovany atomerĹmĹą meglĂŠvĹ telephelyĂŠn ĂŠpĂtik fel, mintegy 50 kilomĂŠterre az osztrĂĄk hatĂĄrtĂłl.
Az eredetileg mĂĄjus 7-re tervezett szerzĹdĂŠskĂśtĂŠst elhalasztottĂĄk, miutĂĄn bĂrĂłsĂĄgi vĂŠgzĂŠst adtak ki az EDF jogi kifogĂĄsa miatt.
KutatĂĄs-fejlesztĂŠs â 2025. mĂĄjus 14. | Ărta: David Dalton
VizsgĂĄlati program bizonyĂtja a szĂĄllĂthatĂł atomerĹmĹąvek robusztussĂĄgĂĄt â ĂĄllĂtja a Prodigy
Egy elsĹkĂŠnt vĂŠgrehajtott vizsgĂĄlati program bizonyĂtja, hogy a szĂĄllĂthatĂł atomerĹmĹąvek kĂŠpesek ellenĂĄllni baleseti ĂŠs veszĂŠlyhelyzeti forgatĂłkĂśnyveknek â ĂŠs kritikus adatokat szolgĂĄltat a kereskedelmi engedĂŠlyezĂŠs tĂĄmogatĂĄsĂĄhoz 2030-ig.
A kanadai Prodigy Clean Energy ĂŠs a Serco kĂśzĂślte, hogy a vizsgĂĄlatokat rĂŠszben a kanadai szĂśvetsĂŠgi kormĂĄny 2,7 milliĂł kanadai dollĂĄros tĂĄmogatĂĄsa finanszĂrozta, amely a kis modulĂĄris reaktorok fejlesztĂŠsĂŠt cĂŠlozza.
A Prodigy szerint szĂĄllĂthatĂł atomerĹmĹąvei tengeri lĂŠtesĂtmĂŠnyben kĂŠszĂźlnek, majd a helyszĂnre szĂĄllĂtjĂĄk Ĺket, Ăgy gyors telepĂtĂŠsi megoldĂĄst kĂnĂĄlnak az Ăşj atomenergia gyors ĂŠs versenykĂŠpes kĂśltsĂŠgĹą bevezetĂŠsĂŠre.
A cĂŠg lĂŠnyegĂŠben âcsomagoljaâ a kis modulĂĄris reaktorokat ĂŠs mikroreaktorokat elĹre gyĂĄrtott, ĂĄthelyezhetĹ erĹmĹąvi szerkezetekbe. Az egysĂŠgek kombinĂĄlhatĂłk, Ăgy 5 megawattĂłl 1000 megawattig terjedĹ kapacitĂĄs ĂŠrhetĹ el.
âA szĂĄllĂthatĂł atomerĹmĹąvek nagyon kis partszakaszt igĂŠnyelnek, ĂŠs testre szabhatĂłk reaktortĂpus ĂŠs mĂŠret szerintâ â kĂśzĂślte a cĂŠg.
Azt is kĂśzĂśltĂŠk, hogy a brit kĂśzpontĂş Serco-val egyĂźttmĹąkĂśdve tesztelik a szĂĄllĂthatĂł atomerĹmĹąvek ellenĂĄllĂĄsĂĄt ĂŠs szerkezeti teljesĂtmĂŠnyĂŠt âa legnehezebb kĂśrĂźlmĂŠnyek kĂśzĂśttâ, beleĂŠrtve a repĂźlĹgĂŠp-becsapĂłdĂĄst ĂŠs hajóßtkĂśzĂŠst; fĂśldrengĂŠst, jeget ĂŠs mĂĄs szĂŠlsĹsĂŠges idĹjĂĄrĂĄsi ĂŠs ĂłceĂĄni esemĂŠnyeket; tĂźzet ĂŠs ĂĄrvizet; valamint a belsĹ rakĂŠtabecsapĂłdĂĄs elleni ellenĂĄllĂĄst.
âA Prodigy elvĂŠgzi a szĂźksĂŠges munkĂĄt, hogy a szĂĄllĂthatĂł atomerĹmĹąvek idĹben piacra kerĂźlhessenek Ăszak-AmerikĂĄbanâ â mondta Mathias Trojer, a cĂŠg elnĂśk-vezĂŠrigazgatĂłja.
HozzĂĄtette, hogy a Prodigy reaktortechnolĂłgiĂĄi mostanra elĂŠrtĂŠk azt a szintet, hogy rĂŠszletes mĂŠrnĂśki egyĂźttmĹąkĂśdĂŠseket indĂthatnak komoly partnerekkel.
A Prodigy szerint szĂĄllĂthatĂł atomerĹmĹąvei szĂŠn-dioxid-mentes alapterhelĂŠst tudnak biztosĂtani tĂĄvoli bĂĄnyĂĄk, kĂśzĂśssĂŠgek, vĂŠdelmi lĂŠtesĂtmĂŠnyek ĂŠs sarkvidĂŠki adatkĂśzpontok szĂĄmĂĄra.
EgyĂŠb hĂrek
-
Szerb atomenergia-tanulmĂĄny jĂşnius vĂŠgĂŠre kĂŠszĂźl el: ElĹzetes tanulmĂĄny kĂŠszĂźl Szerbia atomenergia-hasznĂĄlatĂĄrĂłl, amely a mĂĄsodik negyedĂŠv vĂŠgĂŠre vĂĄrhatĂł. A francia ĂĄllami energiaszolgĂĄltatĂł EDF ĂŠs a francia Egis Industries mĂŠrnĂśki vĂĄllalat nyerte el a tanulmĂĄny elkĂŠszĂtĂŠsĂŠre kiĂrt pĂĄlyĂĄzatot, amely egy lehetsĂŠges nukleĂĄris program ĂźtemtervĂŠt is tartalmazza. SzerbiĂĄban nincs kereskedelmi atomerĹmĹą, de tavaly Ăśt minisztĂŠrium egyĂźttmĹąkĂśdĂŠsi megĂĄllapodĂĄst Ărt alĂĄ hĂşsz tudomĂĄnyos ĂŠs ĂĄllami energetikai intĂŠzmĂŠnnyel az elsĹ atomerĹmĹą telepĂtĂŠsĂŠnek lehetĹsĂŠgĂŠt vizsgĂĄlva.
-
Az U3O8 spot ĂĄrfolyama kissĂŠ emelkedett, de bizonytalansĂĄg marad: Az amerikai TradeTech szerint az U3O8 spot ĂĄrfolyama 70 dollĂĄr fontonkĂŠnt, ami 7,7%-os emelkedĂŠs ĂĄprilishoz kĂŠpest, de ĂŠv eleje Ăłta 7,9%-kal alacsonyabb. A kĂśzĂŠptĂĄvĂş ĂĄr 72 dollĂĄr, a hosszĂş tĂĄvĂş ĂĄr 80 dollĂĄr fontonkĂŠnt. A bizonytalansĂĄg oka tĂśbbek kĂśzĂśtt az USA ĂŠs OroszorszĂĄg kĂśzĂśtti kapcsolatok javĂtĂĄsĂĄnak nehĂŠzsĂŠgei, valamint az amerikai mestersĂŠges intelligencia-fejlesztĂŠsek energiaigĂŠnye, mikĂśzben a kĂnai versenytĂĄrsak hatĂŠkonyabbak.
-
TanulmĂĄny a skĂłt nukleĂĄris leszerelĂŠsi program hosszĂş tĂĄvĂş elĹnyeirĹl: SkĂłcia 25 milliĂĄrd fontos nukleĂĄris leszerelĂŠsi programja jelentĹs hosszĂş tĂĄvĂş gazdasĂĄgi ĂŠs tĂĄrsadalmi elĹnyĂśket hozhat orszĂĄgos ĂŠs helyi szinten a kĂśvetkezĹ 90 ĂŠvben ĂŠs azon tĂşl is. HĂĄrom nukleĂĄris lĂŠtesĂtmĂŠny van SkĂłciĂĄban leszerelĂŠsi fĂĄzisban: Dounreay, Hunterston A ĂŠs Chapelcross. A Hunterston B-t jelenleg Ăźzemanyag-mentesĂtik, a Torness ĂŠs a Vulcan is hamarosan leszerelĂŠsi fĂĄzisba lĂŠp.
-
-
@ a296b972:e5a7a2e8
2025-05-14 15:22:46Es ist nicht anders zu erklären: Wir erleben die VerschwĂśrung fast aller Politiker (jetzt schon die 2. Garde herausragender GeistesgrĂśĂen), Institutionen (NGOs), BehĂśrden (RKI, PEI), Gerichte und die Ăśffentlich-rechtlichen Medien gemeinsam gegen die Wahrheit. Erkennungszeichen: Der in Moral getauchte erhobene Zeigefinger als neuer deutscher GruĂ. Das ist GrĂśĂenwahn!
Dies wird jedoch nur von einem kleinen Teil der Gesellschaft wahrgenommen, weil der weitaus grĂśĂere Teil nach wie vor die Wahrheit nicht hĂśren will.
Aktuelles Beispiel: Das war sicher nur eine Rotzfahne, die Herr Macron, bekannt fßr sein schlechtes Benehmen, auf dem Tisch liegen lassen hat, nachdem er sich geschnäuzt hatte. Und Herr Merz hat mit einer Bßroklammer gespielt, die wie ein Speitel aussah.
Das ist ein psychologisches Ding, und die Frage ist, warum manche immun gegen Propaganda und Manipulation sind und viele leider nicht.
Deutschland macht sich sowohl innen- als auch auĂenpolitisch immer mehr zur Deppen-Insel. Während auĂerhalb FriedensbemĂźhungen stattfinden, droht der Blackrock-Spargel 2. Wahl weiter mit neuen Sanktionen, die in der Vergangenheit schon nicht gewirkt haben. Die Beschlagnahmung russischer Gelder kann dazu fĂźhren, dass europäische Gelder im Ausland ebenso beschlagnahmt werden, und das kĂśnnte das Ende des Euro bedeuten, was an sich nicht das Problem wäre, wenn die Menschen nicht unter einer Finanzkrise zu leiden hätten. âDer kleine Mannâ war ja von je her immer schon der Doofe.
Taurus ist immer noch nicht endgßltig vom Tisch. Es kommt gar nicht darauf an, dass die Lieferung den Kriegsverlauf nicht beeinflussen wßrde, sondern vielmehr darauf, dass sich spätestens hier Wiesbaden, Dßsseldorf-Rheinmetall, Garmisch-Patenkirchen und die Waffenindustrie am Bodensee zu einem legitimen Ziel fßr Russland machen wßrden.
Innenpolitisch kommen die in der Corona-Zeit erprobten, bewährten und loyalen Systemlinge aus den Medien in Sprecherpositionen in die Bundespressekonferenz-Show oder ins Innenministerium. Eine Ex-Ministerin landet sanft im Desinformations-Bekämpfungs-Ausschuss, wo sie aufgrund ihrer eigenen Praxiserfahrung in Desinformieren bestens aufgehoben ist.
Ein anderer Minister wechselt in den Ausschuss fĂźr âPeterchens Mondfahrtâ. Ganz oben auf der Agenda: Rheinländer im Weltall.
Die ehemalige Chef-Diplomatin, die bis heute noch nicht verstanden hat, dass Diplomatie nicht das Ausstellen von Diplomen bedeutet, landet hunderttausende von Kilometern entfernt in Nju JĂśrg, um ein paar Brocken Englisch zu lernen. Der Speck der Hoffnung stirbt zuletzt, mĂśge die Ăbung gelingen.
Alles zusammen erzeugt so viel Unterdruck, der geeignet ist, eine Implosion herbeizufĂźhren.
Der Widerstand kann stolz auf die vielen engagierten Menschen sein, die sich Ăźber Jahre nicht haben brechen lassen und unbeirrt das Schild der Freiheit, der Demokratie, der Meinungsfreiheit, das Grundgesetz, das Recht und die WĂźrde des Menschen hochhalten.
Die staatlichen Schikanen, die spätestens mit Corona ihren Anfang genommen haben, hier aber auf jeden Fall sichtbar geworden sind, haben sowohl das Schlimmste, als auch das Beste im Menschen hervorgerufen. Die Spaltung hat zwangsläufig erfolgen mßssen, weil die Widerständler, im Sinne eines sich gegen das Volk richtenden Systems, immer wieder auf die Ja-Sager zugegangen sind, diese jedoch die Wiederaufnahme eines Dialogs weitgehend abgelehnt haben. Sei es durch aktive Verwehrung, oder durch passives Schweigen und Ignorieren.
All diese Schikanen, die Lßgen, Weglassungen, Verdrehungen haben auch etwas Gutes: Sie haben bei vielen Menschen das Denken geschult und noch einmal ganz bewusst gemacht, wie wichtig die Freiheit ist. Sie haben erkannt, dass sie keine Naturgewalt ist und dass es nÜtig ist, sich fßr sie einzusetzen, wenn Kräfte am Werk sind, die sie abschaffen wollen.
Ja, dem Widerstand geht es um die Freiheit. Die Freiheit im Denken, im FĂźhlen und im Wollen. Und seit Corona auch im freien Atmen.
Denjenigen, die glauben, dass all ihre Schreiben, Berechnungen, Posts, Videos und Kanäle bis heute nichts gebracht haben, denen sei gesagt:
Doch, ihr habt die Aufklärung ßbernommen, die eigentlich von staatlicher Seite her hätte erfolgen mßssen.
Alle Fakten sind sauber recherchiert und liegen auf dem Tisch. Das alles war und ist nicht umsonst.
Da an die Tatsachenverbreitung derjenigen Medien, die zur VerschwÜrung gehÜren, nicht zu denken ist, machen wir es eben selbst. Das dauert vielleicht länger, aber die Wahrheit hat sich am Ende immer durchgesetzt. Nicht verzagen, steter Tropfen hÜhlt den Stein.
Und seien wir doch mal ehrlich: Wßrden wir freiwillig an dem Ast sägen, auf dem wir sitzen, wenn wir in deren misslicher Lage wären? Es kann nur weiter gelogen werden, weil in einigen temperamentvolleren Ländern als Deutschland, die BevÜlkerung kurzen Prozess machen wßrde. Daraus kÜnnte ein Domino-Effekt entstehen, und der ist unter allen Umständen zu verhindern.
Es wäre noch nicht einmal undenkbar, diejenigen weiter in der Matrix leben zu lassen, denen die Realität und Tatsachen zu anstrengend sind, wenn gewährleistet wĂźrde, dass diejenigen, die sich entschieden haben die rote Pille zu schlucken, in Ruhe gelassen wĂźrden. Derzeit hat man eher den Eindruck, es wird mit allen Mitteln versucht, diese Menschen wieder ins System zurĂźcksaugen zu wollen. Sei es mit dem Digital Services Act, Hausdurchsuchungen, KontenkĂźndigungen, Jobverlust, Existenzvernichtung oder anderen MaĂnahmen, die geeignet sind, Exempel zu statuieren, die andere einschĂźchtern sollen, ja nicht auch auf die Idee zu kommen, sich dem System entgegenzustellen und die falschen Fragen laut auszusprechen.
Kein Mensch hat das Recht zu gehorchen!
Wir wollen keine Tyrannei der Mehrheit. Die breite Masse der Gesellschaft ist immer schon mit dem Strom geschwommen, sei es aus Bequemlichkeit, aus UnvermĂśgen oder aus Desinteresse. Kein Wecker kann hier laut genug klingeln, um sie aufzuwecken.
Die Diplomatie in Deutschland wurde abgeschafft. Nicht, weil erkannt wurde, dass sie in der heutigen Zeit nicht mehr funktioniert, sondern weil diejenigen, die es kĂśnnen mĂźssten, mangels fachlicher, sachlicher und menschlicher Qualifikation dazu nicht in der Lage sind. Diplomatisches UnvermĂśgen und eine ordentliche Portion Russenhass scheinen unbedingtes Einstellungskriterium zu sein, um in Verantwortung zu kommen. Wer in Drohen eine Eins hatte, ist ganz vorne dabei.
Es ist ein unverschämter Raub von Lebenszeit der Beklagten, wie z. B. Ballweg, Fßllmich, GuÊrot, der nur dazu dient, Exempel zu statuieren, um zu zeigen, wie das System seine Muskeln spielen lassen kann, wenn man nicht so funktioniert, wie es sich das System wßnscht. Aber auch hier und da gibt es noch Richter, die ihrem Gewissen verpflichtet sind, unterstßtzt von unermßdlichen Anwälten, die sich der Rechtspflege und nicht dem Rechtsverdrehen verpflichtet sehen. Deutschland hat gute Gesetze, wenn sie nur schon wieder vollumfänglich gelten wßrden. Nicht kritische Stimmen delegitimieren den Staat, sondern der sogenannte Staat verbiegt die Rechtsprechung zu seinen Gunsten, auf die wir uns alle geeinigt haben und die fßr uns alle gilt.
Und sogar in der Medizin gibt es noch Ărzte mit Gewissen, denen der Satz âPrimum non nocereâ oberste Pflicht und Berufsehre ist. Deren Aufgabe wäre es, das bei dem kritischen Teil des Volkes nicht mehr vorhandene Vertrauen, nach allen Regeln der Heilkunst wieder herzustellen. Begleitet durch die Forderung der Abschaffung der Fallpauschalen und das Wiederabschaffen der verordneten Gewinnorientierung zugunsten eines mĂśglichst wirtschaftlich arbeitenden Gesundheitsbetriebes. Besonderer Respekt wäre hier der Generation zu zollen, die dieses Land wiederaufgebaut hat, nachdem ein Irrer es wiederholt in Schutt und Asche gelegt hat.
Ein Neuanfang ist schon mit dem ständigen Wachsen der Neuen Medien getan. Wer schaut sich noch den einseitig-selbstherrlichen Dreck im Staatsfunk an oder liest eine Zeitung aus dem Neues-Deutschland-Verlag?
Der tägliche Wahnsinn mit einem schier unerschÜpflichen Potenzial fßr neue Absurditäten zehrt an denjenigen, die der Gehirnwäsche erfolgreich widerstanden haben. Und wenn es auch Tage der Niedergeschlagenheit gibt, am nächsten Tag wird die Krone zurechtgerßckt und weitergemacht, ok? Niemals vergessen: Wir, die wir offensichtlich bei Verstand geblieben sind, kÜnnen jeden Morgen in den Spiegel schauen, wir sind aufrichtig und haben ein Rßckgrat. Wir sind keine wirbellosen Nacktschnecken, die eine klebrige Schleimspur hinter sich herziehen und zu nichts anderem taugen, als anderen auf den Wecker zu gehen und das Leben schwer zu machen.
Wir sind keine egoistischen Speichellecker, die nur darauf bedacht sind, irgendwie mit dem Kopf Ăźber Wasser zu bleiben, weil sie sich eingeredet haben, dass sie davonkommen:
âWird schon gut gehen. Wir sind auf der Seite der Gewinner. Wir sind die Stärkeren. Wir halten zusammen. Gegen uns kommen diese Deppen sowieso nicht an.â
Ich bin der Teil von jener Kraft, die BĂśses will und Gutes schafft.
Wir werden sehen, wer hier die Hosen anhat: Die Wahrheit oder der Wahnsinn.
Dieser Artikel wurde mit dem Pareto-Client geschrieben
*Â *
(Bild von pixabay)
-
@ e39333da:7c66e53a
2025-05-14 15:16:01::youtube{#1JDOzCUinPg}
Digital Happiness has announced DreadOut 3, a third-person horror adventure game, which will be released on PC (Steam).
DreadOut 3 is a third-person horror adventure inspired by Asian - Indonesian urban legend. Follow Lindaâs journey as Keepers of the Dark into an interdimensional rabbit hole to find the source of unseen power threatening the balance of light and darkness. This spine-chilling sequel expands on the cult hit original, making DreadOut 3 another terrifying chapter in the world of the unseen.
They've also released a short playtest gameplay footage of the game in its pre-alpha state.
-
@ e39333da:7c66e53a
2025-05-14 14:50:19::youtube{#UOIg2lFVsJE}
The developers, Hanger 13, along with the publisher, 2K Games, have announced that Mafia: The Old Country, a third-person action adventure game, will be releasing on both PC (Steam) and consoles on the 8th of August 2025, and with it they've released a new gameplay trailer.
::youtube{#lVhXaoX25AE}
They've also release a 7 minute long developer diary that showcases the game in a more in-depth look at it. It's worth noting that the game isn't an open-world game, but rather a linear one.
-
@ d64f3475:8e56b3bf
2025-05-14 21:08:07Thereâs something sacred about morning air â the way it carries just enough chill to remind you youâre alive, without pushing you back inside. Iâve been starting my days on the balcony lately. Not because itâs glamorous (it isnât), or because I have a routine (I donât), but because itâs the only space in my apartment that feels both open and still.
This morning I made coffee with too much cinnamon and curled up with a blanket thatâs seen better days. I watched the city slowly wake up â one barking dog, two joggers, and the clatter of a recycling truck below. Itâs odd how these tiny patterns become a kind of comfort.
I used to think that slowing down meant falling behind. But here, perched on the third floor with my feet on cold concrete and the sky just starting to blush, I feel like Iâm exactly where Iâm supposed to be.
If youâre reading this, maybe you needed that reminder too.
â Natalie
-
@ 6e0ea5d6:0327f353
2025-04-19 15:09:18đЏ
The world wonât stop and wait for you to recover.Do your duty regardless of how you feel. Thatâs the only guarantee youâll end the day alright.
Youâve heard it before: âThe worst workout is the one you didnât do.â Sometimes you donât feel like going to the gym. You start bargaining with laziness: âI didnât sleep well⌠maybe I should skip today.â But then you go anyway, committing only to the bare minimum your energy allows. And once you start, your body outperforms your mindâs assumptionsâit turns out to be one of the best workouts youâve had in a long time. The feeling of following through, of winning a battle you were losing, gives you the confidence to own the rest of your day. You finally feel good.
And that wouldnât have happened if you stayed home waiting to feel better. Guilt wouldâve joined forces with discouragement, and youâd be crushed by melancholy in a victim mindset. That loss would bleed into the rest of your week, conditioning your mind: because you didnât spend your energy on the workout, youâd stay up late, wake up worse, and while waiting to feel âready,â youâd lose a habit that took months of effort to build.
When in doubt, just do your duty. Stick to the plan. Donât negotiate with your feelingsâoutsmart them. âJust one page today,â and youâll end up reading ten. âOnly the easy tasks,â and youâll gain momentum to conquer the hard ones. Laziness is a serpentâyou win when you make no deals with it.
A close friend once told me that when he was at his limit during a second job shift, heâd open a picture on his phoneâof a fridge or a stove he needed to buy for his homeâand that image gave him strength to stay awake. That moment stuck with me forever.
Do you really think the world will have the same mercy on you that you have on yourself? Donât be surprised when it doesnât spare you. Move forward even while stitching your wounds: âIf you wait for perfect conditions, youâll never do anything.â (Ecclesiastes 11:4)
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "đĽ" as a token of appreciation.
A toast to our family!
-
@ 6e0ea5d6:0327f353
2025-04-19 15:02:55My friend, let yourself be deluded for a moment, and reality will see to it that your fantasy is shatteredâlike a hammer crushing marble. The real world grants no mercy; it will relentlessly tear down your aspirations, casting them into the abyss of disillusionment and burying your dreams under the unbearable weight of your own expectations. Itâs an inescapable fateâbut the outcome is still in your hands: perish at the bottom like a wretch or turn the pit into a trench.
Davvero, everyone must eventually face something that breaks them. It is in devastation that man discovers what he is made of, and in the silence of defeat that he hears the finest advice. Yet the weak would rather embrace the convenient lie of self-pity, blaming life for failures that are, in truth, the result of their own negligence and cowardly choices. If you hide behind excuses because you fear the painful truth, know this: the responsibility has always been yours.
Ascolta bene! Just remain steadfast, even when everything feels like an endless maze. The difficulties you face todayâthose you believe youâll never overcomeâwill one day seem insignificant under the light of time and experience. Tomorrow, youâll look back and laugh at yourself for ever letting these storms seem so overwhelming.
Now, itâs up to you to fight your own battleâfor the evil day spares no one. Donât let yourself be paralyzed by shock or bow before adversity. Be strong and of good courageânot as one who waits for relief, but as one prepared to face the inevitable and turn pain into glory.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "đĽ" as a token of appreciation.
A toast to our family!
-
@ 3ffac3a6:2d656657
2025-04-15 14:49:31đ Como Criar um Badge Ăpico no Nostr com
nak
+ badges.pageRequisitos:
- Ter o
nak
instalado (https://github.com/fiatjaf/nak) - Ter uma chave privada Nostr (
nsec...
) - Acesso ao site https://badges.page
- Um relay ativo (ex:
wss://relay.primal.net
)
đ§ Passo 1 â Criar o badge em badges.page
- Acesse o site https://badges.page
-
Clique em "New Badge" no canto superior direito
-
Preencha os campos:
- Nome (ex:
Teste Ăpico
) - Descrição
-
Imagem e thumbnail
-
ApĂłs criar, vocĂŞ serĂĄ redirecionado para a pĂĄgina do badge.
đ Passo 2 â Copiar o
naddr
do badgeNa barra de endereços, copie o identificador que aparece após
/a/
â este ĂŠ o naddr do seu badge.Exemplo:
nostr:naddr1qq94getnw3jj63tsd93k7q3q8lav8fkgt8424rxamvk8qq4xuy9n8mltjtgztv2w44hc5tt9vetsxpqqqp6njkq3sd0
Copie:
naddr1qq94getnw3jj63tsd93k7q3q8lav8fkgt8424rxamvk8qq4xuy9n8mltjtgztv2w44hc5tt9vetsxpqqqp6njkq3sd0
đ§ Passo 3 â Decodificar o naddr com
nak
Abra seu terminal (ou Cygwin no Windows) e rode:
bash nak decode naddr1qq94getnw3jj63tsd93k7q3q8lav8fkgt8424rxamvk8qq4xuy9n8mltjtgztv2w44hc5tt9vetsxpqqqp6njkq3sd0
VocĂŞ verĂĄ algo assim:
json { "pubkey": "3ffac3a6c859eaaa8cdddb2c7002a6e10b33efeb92d025b14ead6f8a2d656657", "kind": 30009, "identifier": "Teste-Epico" }
Grave o campo
"identifier"
â nesse caso: Teste-Epico
đ°ď¸ Passo 4 â Consultar o evento no relay
Agora vamos pegar o evento do badge no relay:
bash nak req -d "Teste-Epico" wss://relay.primal.net
VocĂŞ verĂĄ o conteĂşdo completo do evento do badge, algo assim:
json { "kind": 30009, "tags": [["d", "Teste-Epico"], ["name", "Teste Ăpico"], ...] }
đĽ Passo 5 â Minerar o evento como "ĂŠpico" (PoW 31)
Agora vem a mĂĄgica: minerar com proof-of-work (PoW 31) para que o badge seja classificado como ĂŠpico!
bash nak req -d "Teste-Epico" wss://relay.primal.net | nak event --pow 31 --sec nsec1SEU_NSEC_AQUI wss://relay.primal.net wss://nos.lol wss://relay.damus.io
Esse comando: - Resgata o evento original - Gera um novo com PoW de dificuldade 31 - Assina com sua chave privada
nsec
- E publica nos relays wss://relay.primal.net, wss://nos.lol e wss://relay.damus.ioâ ď¸ Substitua
nsec1SEU_NSEC_AQUI
pela sua chave privada Nostr.
â Resultado
Se tudo der certo, o badge serĂĄ atualizado com um evento de PoW mais alto e aparecerĂĄ como "Epic" no site!
- Ter o
-
@ e3ba5e1a:5e433365
2025-04-15 11:03:15Prelude
I wrote this post differently than any of my others. It started with a discussion with AI on an OPSec-inspired review of separation of powers, and evolved into quite an exciting debate! I asked Grok to write up a summary in my overall writing style, which it got pretty well. I've decided to post it exactly as-is. Ultimately, I think there are two solid ideas driving my stance here:
- Perfect is the enemy of the good
- Failure is the crucible of success
Beyond that, just some hard-core belief in freedom, separation of powers, and operating from self-interest.
Intro
Alright, buckle up. Iâve been chewing on this idea for a while, and itâs time to spit it out. Letâs look at the U.S. government like Iâd look at a codebase under a cybersecurity auditâOPSEC style, no fluff. Forget the endless debates about what politicians should do. Thatâs noise. I want to talk about what they can do, the raw powers baked into the system, and why we should stop pretending those powers are sacred. If thereâs a hole, either patch it or exploit it. No half-measures. And yeah, Iâm okay if the whole thing crashes a bitâfailureâs a feature, not a bug.
The Filibuster: A Security Rule with No Teeth
You ever see a firewall rule thatâs more theater than protection? Thatâs the Senate filibuster. Everyone acts like itâs this untouchable guardian of democracy, but hereâs the deal: a simple majority can torch it any day. Itâs not a law; itâs a Senate preference, like choosing tabs over spaces. When people call killing it the ânuclear option,â I roll my eyes. Nuclear? Itâs a button labeled âpress me.â If a party wants it gone, theyâll do it. So why the dance?
I say stop playing games. Get rid of the filibuster. If youâre one of those folks who thinks itâs the only thing saving us from tyranny, fineâpush for a constitutional amendment to lock it in. Thatâs a real patch, not a Post-it note. Until then, itâs just a vulnerability begging to be exploited. Every time a party threatens to nuke it, theyâre admitting itâs not essential. So letâs stop pretending and move on.
Supreme Court Packing: Because Nineâs Just a Number
Hereâs another fun one: the Supreme Court. Nine justices, right? Sounds official. Except itâs not. The Constitution doesnât say nineâitâs silent on the number. Congress could pass a law tomorrow to make it 15, 20, or 42 (hitchhikerâs reference, anyone?). Packing the court is always on the table, and both sides know it. Itâs like a root exploit just sitting there, waiting for someone to log in.
So why not call the bluff? If youâre in powerâsay, Trumpâs back in the gameâsay, âIâm packing the court unless we amend the Constitution to fix it at nine.â Force the issue. No more shadowboxing. And honestly? The courtâs got way too much power anyway. Itâs not supposed to be a super-legislature, but here we are, with justicesâ ideologies driving the bus. Thatâs a bug, not a feature. If the court werenât such a kingmaker, packing it wouldnât even matter. Maybe we should be talking about clipping its wings instead of just its size.
The Executive Should Go Full Klingon
Letâs talk presidents. Iâm not saying they should wear Klingon armor and start shouting âQaplaâ!ââthough, letâs be real, thatâd be awesome. Iâm saying the executive should use every scrap of power the Constitution hands them. Enforce the laws you agree with, sideline the ones you donât. If Congress doesnât like it, theyâve got tools: pass new laws, override vetoes, orâhereâs the big oneâcut the budget. Thatâs not chaos; thatâs the system working as designed.
Right now, the real problem isnât the president overreaching; itâs the bureaucracy. Itâs like a daemon running in the background, eating CPU and ignoring the user. The presidentâs supposed to be the one steering, but the administrative stateâs got its own agenda. Let the executive flex, push the limits, and force Congress to check it. Norms? Pfft. The Constitutionâs the spec sheetâstick to it.
Let the System Crash
Hereâs where I get a little spicy: Iâm totally fine if the government grinds to a halt. Deadlock isnât a disaster; itâs a feature. If the branches canât agree, let the president veto, let Congress starve the budget, let enforcement stall. Donât tell me about âessential services.â Nothingâs so critical it canât take a breather. Shutdowns force everyone to the tableâdebate, compromise, or expose whoâs dropping the ball. If the public loses trust? Good. Theyâll vote out the clowns or live with the circus they elected.
Think of it like a server crash. Sometimes you need a hard reboot to clear the cruft. If voters keep picking the same bad admins, well, the country gets what it deserves. Failureâs the best teacherâway better than limping along on autopilot.
States Are the Real MVPs
If the feds fumble, states step up. Right now, states act like junior devs waiting for the lead engineer to sign off. Why? Federal money. Itâs a leash, and itâs tight. Cut that cash, and states will remember theyâre autonomous. Some will shine, others will tankâlooking at you, California. And Iâm okay with that. Let people flee to better-run states. No bailouts, no excuses. States are like competing startups: the good ones thrive, the bad ones pivot or die.
Could it get uneven? Sure. Some states might turn into sci-fi utopias while others look like a post-apocalyptic vidya game. Thatâs the pointâcompetition sorts it out. Citizens can move, markets adjust, and failureâs a signal to fix your act.
Chaos Isnât the Enemy
Yeah, this sounds messy. States ignoring federal law, external threats poking at our seams, maybe even a constitutional crisis. Iâm not scared. The Supreme Courtâs there to referee interstate fights, and Congress sets the rules for state-to-state play. But if it all falls apart? Still cool. States can sort it without a babysitterâitâll be ugly, but freedomâs worth it. External enemies? Theyâll either unify us or break us. If we canât rally, we donât deserve the win.
Centralizing power to avoid this is like rewriting your app in a single thread to prevent race conditionsâsure, itâs simpler, but youâre begging for a deadlock. Decentralized chaos lets states experiment, lets people escape, lets markets breathe. States competing to cut regulations to attract businesses? Thatâs a race to the bottom for red tape, but a race to the top for innovationâworkers might gripe, but theyâll push back, and the tensionâs healthy. Bring itâlet the cage match play out. The Constitutionâs checks are enough if we stop coddling the system.
Why This Matters
Iâm not pitching a utopia. Iâm pitching a stress test. The U.S. isnât a fragile porcelain doll; itâs a rugged piece of hardware built to take some hits. Let it fail a littleâfilibuster, court, feds, whatever. Patch the holes with amendments if you want, or lean into the grind. Either way, stop fearing the crash. Itâs how we debug the republic.
So, whatâs your take? Ready to let the system rumble, or got a better way to secure the code? Hit me upâIâm all ears.
-
@ 8d34bd24:414be32b
2025-05-14 14:31:54In case you havenât noticed, Iâve spent a lot of time reading Revelation lately. Last night, I was reading the letters to the seven churches in Revelation. It got me thinking about the church or churches today.
âTo the angel of the church in Laodicea write:
The Amen, the faithful and true Witness, the Beginning of the creation of God, says this:
âI know your deeds, that you are neither cold nor hot; I wish that you were cold or hot. So because you are lukewarm, and neither hot nor cold, I will spit you out of My mouth. Because you say, âI am rich, and have become wealthy, and have need of nothing,â and you do not know that you are wretched and miserable and poor and blind and naked, I advise you to buy from Me gold refined by fire so that you may become rich, and white garments so that you may clothe yourself, and that the shame of your nakedness will not be revealed; and eye salve to anoint your eyes so that you may see. Those whom I love, I reprove and discipline; therefore be zealous and repent. Behold, I stand at the door and knock; if anyone hears My voice and opens the door, I will come in to him and will dine with him, and he with Me. He who overcomes, I will grant to him to sit down with Me on My throne, as I also overcame and sat down with My Father on His throne. He who has an ear, let him hear what the Spirit says to the churches.âââ (Revelation 3:14-22)
Sadly the church in Revelation, that the majority of American churches most closely resembles, is the church in Laodicea. (FYI, like most large generalizations, there are exceptions, of course)
Last I heard, America still had the most churches, Christian book stores, Christian radio stations, etc., but is America still the most Christian? I strongly have my doubts. Most modern, American churches seem to be more about socialization, entertainment, and making people feel good about themselves, even if what they really need is repentance. I even have doubts that many institutions that call themselves churches are churches (as defined by God) or have any true believers as members.
âI know your tribulation and your poverty (but you are rich), and the blasphemy by those who say they are Jews and are not, but are a synagogue of Satan. (Revelation 2:9)
Although this verse is referring to those who call themselves Jews and are not, I think we are seeing those who say they are Christians and are not, but are a church of Satan. Of course this is definitely not true of all churches.
The most common thing I see, though, is the lukewarm churches, where members show up on Sunday, check that off their list, and then go on living life like everyone else around them. Surveys show that rates of divorce, abortion, and other anti-biblical choices are as common among self-proclaimed Christians as among those who claim no faith.
These churches hear the Bible, but donât hunger for the Word of God. They listen to Godâs commands, but donât live them out in their daily lives. Just like the Pharisees, they have the trappings of religion, but not the spirit of God. Worship is singing along with a rock band rather than falling on their face in awe of their Creator.
Just like what was predicted:
For the time will come when they will not endure sound doctrine; but wanting to have their ears tickled, they will accumulate for themselves teachers in accordance to their own desires, and will turn away their ears from the truth and will turn aside to myths. (2 Timothy 4:3-4) {emphasis mine}
Church services become self-help services. The word of God gets subverted by culture and âscience.â Some church leaders intentionally ignore certain passages and take others out of context, so they will be popular and have growth. Sadly a growth in âbutts in seatsâ is not what matters, if it isnât accompanied by a growth in trust in Jesus and a growth in discipleship. These churches give a lot of people the false hope that they will be going to Heaven when they die. They will be shocked to hear âI never knew you.â
âNot everyone who says to Me, âLord, Lord,â will enter the kingdom of heaven, but he who does the will of My Father who is in heaven will enter. Many will say to Me on that day, âLord, Lord, did we not prophesy in Your name, and in Your name cast out demons, and in Your name perform many miracles?â And then I will declare to them, âI never knew you; depart from Me, you who practice lawlessness.â (Matthew 7:21-23) {emphasis mine}
Like the church in Laodicea, the church in America is rich in material wealth compared to others. Like the church in Laodicea, the American church relies too much on their wealth and freedom instead of putting their faith in God through good times and bad. Like the church in Laodicea, the American church has the trappings of faith without the reality of faith as shown by works (lifestyle). Most unfortunately, like the church in Laodicea, the American church is full of people who will almost certainly hear âI never knew you.â
What does Jesus say the solution is? âBe zealous and repent.â
Nothing in life should be more important to us than our relationship with our Creator and Savior. If weâve relegated Him to the margins, we need to repent. We need to turn back to God and seek Him first.
Do not worry then, saying, âWhat will we eat?â or âWhat will we drink?â or âWhat will we wear for clothing?â For the Gentiles eagerly seek all these things; for your heavenly Father knows that you need all these things. But seek first His kingdom and His righteousness, and all these things will be added to you. (Matthew 6:31-33) {emphasis mine}
Even if we arenât actively doing evil, it is so easy to get distracted by life and not include God in our lives. Instead of God being just someone who we worship for and hour or two on Sunday morning and pray to at meals, He should be our guiding force for all things in our lives. He should be our focus and guiding light. We should long for His word and study the Bible daily. We should seek His guidance in decisions big and small. We should interact with others with the same goals and love as Jesus did when He was living a mortal life on earth. Our lives should look different.
I love what was said about Jesusâs disciples:
Now as they observed the confidence of Peter and John and understood that they were uneducated and untrained men, they were amazed, and began to recognize them as having been with Jesus. (Acts 4:13) {emphasis mine}
I want everyone who meets me to see Jesus in me and recognize that I have been with Jesus. Do you? Or do you want to blend in and look like those around you because that is easier and more comfortable?
Now for this very reason also, applying all diligence, in your faith supply moral excellence, and in your moral excellence, knowledge, and in your knowledge, self-control, and in your self-control, perseverance, and in your perseverance, godliness, and in your godliness, brotherly kindness, and in your brotherly kindness, love. For if these qualities are yours and are increasing, they render you neither useless nor unfruitful in the true knowledge of our Lord Jesus Christ. For he who lacks these qualities is blind or short-sighted, having forgotten his purification from his former sins. Therefore, brethren, be all the more diligent to make certain about His calling and choosing you; for as long as you practice these things, you will never stumble; for in this way the entrance into the eternal kingdom of our Lord and Savior Jesus Christ will be abundantly supplied to you. (2 Peter 1:5-11) {emphasis mine}
Peter gives some good advice on becoming more Christ-like and fruitful. He tells us to apply all diligence in:
-
faith
-
moral excellence
-
perseverance
-
godliness
-
brotherly kindness
-
love
He tells us that lacking these traits is âblind or short-sightedâ and leads to us being unfruitful and useless. I donât know about you, but I do NOT want Jesus to think of me as useless.
May the God of heaven increase your faith, grow your desire to know God through prayer and study of His Word, and help you to live the life you were designed to live. May he help you to avoid worldly distractions and to have the strength to stand firm on the foundation of Jesus especially when this means you have to stand up against the crowd. May you be fruitful and useful all of the days of your life.
Trust Jesus.
-
-
@ d64f3475:8e56b3bf
2025-05-14 21:02:09I will add a picture, a hyperlink and a video. Letâs see if it works.
-
@ 472f440f:5669301e
2025-05-14 13:17:04Marty's Bent
via me
It seems like every other day there's another company announced that is going public with the intent of competing with Strategy by leveraging capital markets to create financial instruments to acquire Bitcoin in a way that is accretive for shareholders. This is certainly a very interesting trend, very bullish for bitcoin in the short-term, and undoubtedly making it so bitcoin is top of mind in the mainstream. I won't pretend to know whether or not these strategies will ultimately be successful or fail in the short, medium or long term. However, one thing I do know is that the themes that interest me, both here at TFTC and in my role as Managing Partner at Ten31, are companies that are building good businesses that are efficient, have product-market-fit, generate revenues and profits and roll those profits into bitcoin.
While it seems pretty clear that Strategy has tapped into an arbitrage that exists in capital markets, it's not really that exciting. From a business perspective, it's actually pretty straightforward and simple; find where potential arbitrage opportunities exists between pools of capital looking for exposure to spot bitcoin or bitcoin's volatility but can't buy the actual asset, and provide them with products that give them access to exposure while simultaneously creating a cult-like retail following. Rinse and repeat. To the extent that this strategy is repeatable is yet to be seen. I imagine it can expand pretty rapidly. Particularly if we have a speculative fervor around companies that do this. But in the long run, I think the signal is falling back to first principles, looking for businesses that are actually providing goods and services to the broader economy - not focused on the hyper-financialized part of the economy - to provide value and create efficiencies that enable higher margins and profitability.
With this in mind, I think it's important to highlight the combined leverage that entrepreneurs have by utilizing bitcoin treasuries and AI tools that are emerging and becoming more advanced by the week. As I said in the tweet above, there's never been a better time to start a business that finds product-market fit and cash flows quickly with a team of two to three people. If you've been reading this rag over the last few weeks, you know that I've been experimenting with these AI tools and using them to make our business processes more efficient here at TFTC. I've also been using them at Ten31 to do deep research and analysis.
It has become abundantly clear to me that any founder or entrepreneur that is not utilizing the AI tools that are emerging is going to get left behind. As it stands today, all anyone has to do to get an idea from a thought in your head to the prototype stage to a minimum viable product is to hop into something like Claude or ChatGPT, have a brief conversation with an AI model that can do deep research about a particular niche that you want to provide a good service to and begin building.
Later this week, I will launch an app called Opportunity Cost in the Chrome and Firefox stores. It took me a few hours of work over the span of a week to ideate and iterate on the concept to the point where I had a working prototype that I handed off to a developer who is solving the last mile problem I have as an "idea guy" of getting the product to market. Only six months ago, accomplishing something like this would have been impossible for me. I've never written a line of code that's actually worked outside of the modded MySpace page I made back in middle school. I've always had a lot of ideas but have never been able to effectively communicate them to developers who can actually build them. With a combination of ChatGPT-03 and Replit, I was able to build an actual product that works. I'm using it in my browser today. It's pretty insane.
There are thousands of people coming to the same realization at the same time right now and going out there and building niche products very cheaply, with small teams, they are getting to market very quickly, and are amassing five figures, six figures, sometimes seven figures of MRR with extremely high profit margins. What most of these entrepreneurs have not really caught on to yet is that they should be cycling a portion - in my opinion, a large portion - of those profits into bitcoin. The combination of building a company utilizing these AI tools, getting it to market, getting revenue and profits, and turning those profits into bitcoin cannot be understated. You're going to begin seeing teams of one to ten people building businesses worth billions of dollars and they're going to need to store the value they create, any money that cannot be debased.
nostr:nprofile1qyx8wumn8ghj7cnjvghxjmcpz4mhxue69uhk2er9dchxummnw3ezumrpdejqqgy8fkmd9kmm8yp4lea2cx0g8fyz27g4ud7572j4edx2v6lz6aa23qmp5dth , one of the co-founders of Ten31, wrote about this in early 2024, bitcoin being the fourth lever of equity value growth for companies.
Bitcoin Treasury - The Fourth Lever to Equity Value Growth
We already see this theme playing out at Ten31 with some of our portfolio companies, most notably nostr:nprofile1qy2hwumn8ghj7etyv4hzumn0wd68ytnvv9hxgqgdwaehxw309ahx7uewd3hkcqpqex7mdykw786qxvmtuls208uyxmn0hse95rfwsarvfde5yg6wy7jqjrm2qp , which recently released some of their financials, highlighting the fact that they're extremely profitable with high margins and a relatively small team (\~75). This is extremely impressive, especially when you consider the fact that they're a global company competing with the likes of Coinbase and Block, which have each thousands of employees.
Even those who are paying attention to the developments in the AI space and how the tools can enable entrepreneurs to build faster aren't really grasping the gravity of what's at play here. Many are simply thinking of consumer apps that can be built and distributed quickly to market, but the ways in which AI can be implemented extend far beyond the digital world. Here's a great example of a company a fellow freak is building with the mindset of keeping the team small, utilizing AI tools to automate processes and quickly push profits into bitcoin.
via Cormac
Again, this is where the exciting things are happening in my mind. People leveraging new tools to solve real problems to drive real value that ultimately produce profits for entrepreneurs. The entrepreneurs who decide to save those profits in bitcoin will find that the equity value growth of their companies accelerates exponentially as they provide more value, gain more traction, and increase their profits while also riding the bitcoin as it continues on its monetization phase. The compounded leverage of building a company that leverages AI tools and sweeps profits into bitcoin is going to be one of the biggest asymmetric plays of the next decade. Personally, I also see it as something that's much more fulfilling than the pure play bitcoin treasury companies that are coming to market because consumers and entrepreneurs are able to recive and provide a ton of value in the real economy.
If you're looking to stay on top of the developments in the AI space and how you can apply the tools to help build your business or create a new business, I highly recommend you follow somebody like Greg Isenberg, whose Startup Ideas Podcast has been incredibly valuable for me as I attempt to get a lay of the land of how to implement AI into my businesses.
America's Two Economies
In my recent podcast with Lyn Alden, she outlined how our trade deficits create a cycle that's reshaping America's economic geography. As Alden explained, US trade deficits pump dollars into international markets, but these dollars don't disappear - they return as investments in US financial assets. This cycle gradually depletes industrial heartlands while enriching financial centers on the coasts, creating what amounts to two separate American economies.
"We're basically constantly taking economic vibrancy out of Michigan and Ohio and rural Pennsylvania where the steel mills were... and stuffing it back into financial assets in New York and Silicon Valley." - nostr:nprofile1qy2hwumn8ghj7mn0wd68ytndv9kxjm3wdahxcqg5waehxw309ahx7um5wfekzarkvyhxuet5qqsw4v882mfjhq9u63j08kzyhqzqxqc8tgf740p4nxnk9jdv02u37ncdhu7e3
This pattern has persisted for over four decades, accelerating significantly since the early 1980s. Alden emphasized that while economists may argue there's still room before reaching a crisis point, the political consequences are already here. The growing divide between these two Americas has fueled populist sentiment as voters who feel left behind seek economic rebalancing, even if they can't articulate the exact mechanisms causing their hardship.
Check out the full podcast here for more on China's manufacturing dominance, Trump's tariff strategy, and the future of Bitcoin as a global reserve asset. All discussed in under 60 minutes.
Headlines of the Day
Trump's Saudi Summit: Peace and Economic Ties - via X
MSTR Edges Closer To S\&P 500 With Just 89 Trading Days Left - via X
Get our new STACK SATS hat - via tftcmerch.io
Individuals Shed 247K Bitcoin As Businesses Gain 157K - via X
Looking for the perfect video to push the smartest person you know from zero to one on bitcoin? Bitcoin, Not Crypto is a three-part master class from Parker Lewis and Dhruv Bansal that cuts through the noiseâcovering why 21 million was the key technical simplification that made bitcoin possible, why blockchains donât create decentralization, and why everything else will be built on bitcoin.
Ten31, the largest bitcoin-focused investor, has deployed 144,229 sats | $150.00M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at ten31.vc/invest.
Final thought...
My boys have started a game in the car where we count how many Waymos we see on the road while driving around town. Pretty crazy how innately stoked they are about that particular car.
Get this newsletter sent to your inbox daily: https://www.tftc.io/bitcoin-brief/
Subscribe to our YouTube channels and follow us on Nostr and X:
-
@ 3f68dede:779bb81d
2025-05-14 11:25:17sdsdsdsd
-
@ d64f3475:8e56b3bf
2025-05-14 21:02:07Is it still working?
-
@ d64f3475:8e56b3bf
2025-05-14 21:02:03Is it actually called âsummaryâ?
-
@ c4b5369a:b812dbd6
2025-04-15 07:26:16Offline transactions with Cashu
Over the past few weeks, I've been busy implementing offline capabilities into nutstash. I think this is one of the key value propositions of ecash, beinga a bearer instrument that can be used without internet access.
It does however come with limitations, which can lead to a bit of confusion. I hope this article will clear some of these questions up for you!
What is ecash/Cashu?
Ecash is the first cryptocurrency ever invented. It was created by David Chaum in 1983. It uses a blind signature scheme, which allows users to prove ownership of a token without revealing a link to its origin. These tokens are what we call ecash. They are bearer instruments, meaning that anyone who possesses a copy of them, is considered the owner.
Cashu is an implementation of ecash, built to tightly interact with Bitcoin, more specifically the Bitcoin lightning network. In the Cashu ecosystem,
Mints
are the gateway to the lightning network. They provide the infrastructure to access the lightning network, pay invoices and receive payments. Instead of relying on a traditional ledger scheme like other custodians do, the mint issues ecash tokens, to represent the value held by the users.How do normal Cashu transactions work?
A Cashu transaction happens when the sender gives a copy of his ecash token to the receiver. This can happen by any means imaginable. You could send the token through email, messenger, or even by pidgeon. One of the common ways to transfer ecash is via QR code.
The transaction is however not finalized just yet! In order to make sure the sender cannot double-spend their copy of the token, the receiver must do what we call a
swap
. A swap is essentially exchanging an ecash token for a new one at the mint, invalidating the old token in the process. This ensures that the sender can no longer use the same token to spend elsewhere, and the value has been transferred to the receiver.What about offline transactions?
Sending offline
Sending offline is very simple. The ecash tokens are stored on your device. Thus, no internet connection is required to access them. You can litteraly just take them, and give them to someone. The most convenient way is usually through a local transmission protocol, like NFC, QR code, Bluetooth, etc.
The one thing to consider when sending offline is that ecash tokens come in form of "coins" or "notes". The technical term we use in Cashu is
Proof
. It "proofs" to the mint that you own a certain amount of value. Since these proofs have a fixed value attached to them, much like UTXOs in Bitcoin do, you would need proofs with a value that matches what you want to send. You can mix and match multiple proofs together to create a token that matches the amount you want to send. But, if you don't have proofs that match the amount, you would need to go online and swap for the needed proofs at the mint.Another limitation is, that you cannot create custom proofs offline. For example, if you would want to lock the ecash to a certain pubkey, or add a timelock to the proof, you would need to go online and create a new custom proof at the mint.
Receiving offline
You might think: well, if I trust the sender, I don't need to be swapping the token right away!
You're absolutely correct. If you trust the sender, you can simply accept their ecash token without needing to swap it immediately.
This is already really useful, since it gives you a way to receive a payment from a friend or close aquaintance without having to worry about connectivity. It's almost just like physical cash!
It does however not work if the sender is untrusted. We have to use a different scheme to be able to receive payments from someone we don't trust.
Receiving offline from an untrusted sender
To be able to receive payments from an untrusted sender, we need the sender to create a custom proof for us. As we've seen before, this requires the sender to go online.
The sender needs to create a token that has the following properties, so that the receciver can verify it offline:
- It must be locked to ONLY the receiver's public key
- It must include an
offline signature proof
(DLEQ proof) - If it contains a timelock & refund clause, it must be set to a time in the future that is acceptable for the receiver
- It cannot contain duplicate proofs (double-spend)
- It cannot contain proofs that the receiver has already received before (double-spend)
If all of these conditions are met, then the receiver can verify the proof offline and accept the payment. This allows us to receive payments from anyone, even if we don't trust them.
At first glance, this scheme seems kinda useless. It requires the sender to go online, which defeats the purpose of having an offline payment system.
I beleive there are a couple of ways this scheme might be useful nonetheless:
-
Offline vending machines: Imagine you have an offline vending machine that accepts payments from anyone. The vending machine could use this scheme to verify payments without needing to go online itself. We can assume that the sender is able to go online and create a valid token, but the receiver doesn't need to be online to verify it.
-
Offline marketplaces: Imagine you have an offline marketplace where buyers and sellers can trade goods and services. Before going to the marketplace the sender already knows where he will be spending the money. The sender could create a valid token before going to the marketplace, using the merchants public key as a lock, and adding a refund clause to redeem any unspent ecash after it expires. In this case, neither the sender nor the receiver needs to go online to complete the transaction.
How to use this
Pretty much all cashu wallets allow you to send tokens offline. This is because all that the wallet needs to do is to look if it can create the desired amount from the proofs stored locally. If yes, it will automatically create the token offline.
Receiving offline tokens is currently only supported by nutstash (experimental).
To create an offline receivable token, the sender needs to lock it to the receiver's public key. Currently there is no refund clause! So be careful that you don't get accidentally locked out of your funds!
The receiver can then inspect the token and decide if it is safe to accept without a swap. If all checks are green, they can accept the token offline without trusting the sender.
The receiver will see the unswapped tokens on the wallet homescreen. They will need to manually swap them later when they are online again.
Later when the receiver is online again, they can swap the token for a fresh one.
Summary
We learned that offline transactions are possible with ecash, but there are some limitations. It either requires trusting the sender, or relying on either the sender or receiver to be online to verify the tokens, or create tokens that can be verified offline by the receiver.
I hope this short article was helpful in understanding how ecash works and its potential for offline transactions.
Cheers,
Gandlaf
-
@ 3f68dede:779bb81d
2025-05-14 11:25:15 -
@ d64f3475:8e56b3bf
2025-05-14 21:02:01A few weeks ago, I ran into an old friend at a coffee shop. We hadnât spoken in years, and within five minutes, she said something Iâve heard countless times:
âI just feel like Iâm so behind.â
Behind who? Behind what?
Thereâs this ideaâquiet, nagging, oddly universalâthat weâre all somehow in a race we didnât sign up for. That weâre supposed to have hit certain milestones by certain ages. That if weâre not married, promoted, rich, settled, happy (and photogenic) by 30 or 40 or pick your poison, then weâve failed some invisible test.
Where did this come from?
Some of itâs cultural, obviously. Social media compresses timelines. Youâre 27, doom-scrolling, and suddenly someone from high school just IPOâd their startup and got engaged in Rome. Another just bought a house with a kitchen island the size of a small country. You wonder if you missed a memo.
But beneath that, thereâs something deeper. A belief that life is linear. That it should look like a staircase: school, job, marriage, house, kids, success. But real life? Itâs a squiggle. A mess. A beautiful disaster.
Hereâs the truth: Youâre not behind. Thereâs no schedule. Thereâs only your path, and the courage it takes to stay on itâeven when it looks wildly different from everyone elseâs.
I say this as someone who has taken the âscenic route.â I changed careers in my 30s. I moved cities on a hunch. I dropped things that looked great on paper because they felt wrong in my gut. Iâve had seasons of momentum and seasons of stuckness. Both were necessary.
âCatching upâ assumes thereâs a fixed destination. But what if there isnât? What if the point isnât arrival, but presence? Progress that feels real, not performative?
If you need a permission slip to stop comparing, let this be it.
Youâre not late. Youâre not early.
Youâre right on time. -
@ d64f3475:8e56b3bf
2025-05-14 21:01:58Thereâs something sacred about morning air â the way it carries just enough chill to remind you youâre alive, without pushing you back inside. Iâve been starting my days on the balcony lately. Not because itâs glamorous (it isnât), or because I have a routine (I donât), but because itâs the only space in my apartment that feels both open and still.
This morning I made coffee with too much cinnamon and curled up with a blanket thatâs seen better days. I watched the city slowly wake up â one barking dog, two joggers, and the clatter of a recycling truck below. Itâs odd how these tiny patterns become a kind of comfort.
I used to think that slowing down meant falling behind. But here, perched on the third floor with my feet on cold concrete and the sky just starting to blush, I feel like Iâm exactly where Iâm supposed to be.
If youâre reading this, maybe you needed that reminder too.
â Natalie
-
@ 266815e0:6cd408a5
2025-04-15 06:58:14Its been a little over a year since NIP-90 was written and merged into the nips repo and its been a communication mess.
Every DVM implementation expects the inputs in slightly different formats, returns the results in mostly the same format and there are very few DVM actually running.
NIP-90 is overloaded
Why does a request for text translation and creating bitcoin OP_RETURNs share the same input
i
tag? and why is there anoutput
tag on requests when only one of them will return an output?Each DVM request kind is for requesting completely different types of compute with diffrent input and output requirements, but they are all using the same spec that has 4 different types of inputs (
text
,url
,event
,job
) and an undefined number ofoutput
types.Let me show a few random DVM requests and responses I found on
wss://relay.damus.io
to demonstrate what I mean:This is a request to translate an event to English
json { "kind": 5002, "content": "", "tags": [ // NIP-90 says there can be multiple inputs, so how would a DVM handle translatting multiple events at once? [ "i", "<event-id>", "event" ], [ "param", "language", "en" ], // What other type of output would text translations be? image/jpeg? [ "output", "text/plain" ], // Do we really need to define relays? cant the DVM respond on the relays it saw the request on? [ "relays", "wss://relay.unknown.cloud/", "wss://nos.lol/" ] ] }
This is a request to generate text using an LLM model
json { "kind": 5050, // Why is the content empty? wouldn't it be better to have the prompt in the content? "content": "", "tags": [ // Why use an indexable tag? are we ever going to lookup prompts? // Also the type "prompt" isn't in NIP-90, this should probably be "text" [ "i", "What is the capital of France?", "prompt" ], [ "p", "c4878054cff877f694f5abecf18c7450f4b6fdf59e3e9cb3e6505a93c4577db2" ], [ "relays", "wss://relay.primal.net" ] ] }
This is a request for content recommendation
json { "kind": 5300, "content": "", "tags": [ // Its fine ignoring this param, but what if the client actually needs exactly 200 "results" [ "param", "max_results", "200" ], // The spec never mentions requesting content for other users. // If a DVM didn't understand this and responded to this request it would provide bad data [ "param", "user", "b22b06b051fd5232966a9344a634d956c3dc33a7f5ecdcad9ed11ddc4120a7f2" ], [ "relays", "wss://relay.primal.net", ], [ "p", "ceb7e7d688e8a704794d5662acb6f18c2455df7481833dd6c384b65252455a95" ] ] }
This is a request to create a OP_RETURN message on bitcoin
json { "kind": 5901, // Again why is the content empty when we are sending human readable text? "content": "", "tags": [ // and again, using an indexable tag on an input that will never need to be looked up ["i", "09/01/24 SEC Chairman on the brink of second ETF approval", "text"] ] }
My point isn't that these event schema's aren't understandable but why are they using the same schema? each use-case is different but are they all required to use the same
i
tag format as input and could support all 4 types of inputs.Lack of libraries
With all these different types of inputs, params, and outputs its verify difficult if not impossible to build libraries for DVMs
If a simple text translation request can have an
event
ortext
as inputs, apayment-required
status at any point in the flow, partial results, or responses from 10+ DVMs whats the best way to build a translation library for other nostr clients to use?And how do I build a DVM framework for the server side that can handle multiple inputs of all four types (
url
,text
,event
,job
) and clients are sending all the requests in slightly differently.Supporting payments is impossible
The way NIP-90 is written there isn't much details about payments. only a
payment-required
status and a genericamount
tagBut the way things are now every DVM is implementing payments differently. some send a bolt11 invoice, some expect the client to NIP-57 zap the request event (or maybe the status event), and some even ask for a subscription. and we haven't even started implementing NIP-61 nut zaps or cashu A few are even formatting the
amount
number wrong or denominating it in sats and not mili-satsBuilding a client or a library that can understand and handle all of these payment methods is very difficult. for the DVM server side its worse. A DVM server presumably needs to support all 4+ types of payments if they want to get the most sats for their services and support the most clients.
All of this is made even more complicated by the fact that a DVM can ask for payment at any point during the job process. this makes sense for some types of compute, but for others like translations or user recommendation / search it just makes things even more complicated.
For example, If a client wanted to implement a timeline page that showed the notes of all the pubkeys on a recommended list. what would they do when the selected DVM asks for payment at the start of the job? or at the end? or worse, only provides half the pubkeys and asks for payment for the other half. building a UI that could handle even just two of these possibilities is complicated.
NIP-89 is being abused
NIP-89 is "Recommended Application Handlers" and the way its describe in the nips repo is
a way to discover applications that can handle unknown event-kinds
Not "a way to discover everything"
If I wanted to build an application discovery app to show all the apps that your contacts use and let you discover new apps then it would have to filter out ALL the DVM advertisement events. and that's not just for making requests from relays
If the app shows the user their list of "recommended applications" then it either has to understand that everything in the 5xxx kind range is a DVM and to show that is its own category or show a bunch of unknown "favorites" in the list which might be confusing for the user.
In conclusion
My point in writing this article isn't that the DVMs implementations so far don't work, but that they will never work well because the spec is too broad. even with only a few DVMs running we have already lost interoperability.
I don't want to be completely negative though because some things have worked. the "DVM feeds" work, although they are limited to a single page of results. text / event translations also work well and kind
5970
Event PoW delegation could be cool. but if we want interoperability, we are going to need to change a few things with NIP-90I don't think we can (or should) abandon NIP-90 entirely but it would be good to break it up into small NIPs or specs. break each "kind" of DVM request out into its own spec with its own definitions for expected inputs, outputs and flow.
Then if we have simple, clean definitions for each kind of compute we want to distribute. we might actually see markets and services being built and used.
-
@ 91bea5cd:1df4451c
2025-04-15 06:27:28BĂĄsico
bash lsblk # Lista todos os diretorios montados.
Para criar o sistema de arquivos:
bash mkfs.btrfs -L "ThePool" -f /dev/sdx
Criando um subvolume:
bash btrfs subvolume create SubVol
Montando Sistema de Arquivos:
bash mount -o compress=zlib,subvol=SubVol,autodefrag /dev/sdx /mnt
Lista os discos formatados no diretĂłrio:
bash btrfs filesystem show /mnt
Adiciona novo disco ao subvolume:
bash btrfs device add -f /dev/sdy /mnt
Lista novamente os discos do subvolume:
bash btrfs filesystem show /mnt
Exibe uso dos discos do subvolume:
bash btrfs filesystem df /mnt
Balancea os dados entre os discos sobre raid1:
bash btrfs filesystem balance start -dconvert=raid1 -mconvert=raid1 /mnt
Scrub ĂŠ uma passagem por todos os dados e metadados do sistema de arquivos e verifica as somas de verificação. Se uma cĂłpia vĂĄlida estiver disponĂvel (perfis de grupo de blocos replicados), a danificada serĂĄ reparada. Todas as cĂłpias dos perfis replicados sĂŁo validadas.
iniciar o processo de depuração :
bash btrfs scrub start /mnt
ver o status do processo de depuração Btrfs em execução:
bash btrfs scrub status /mnt
ver o status do scrub Btrfs para cada um dos dispositivos
bash btrfs scrub status -d / data btrfs scrub cancel / data
Para retomar o processo de depuração do Btrfs que você cancelou ou pausou:
btrfs scrub resume / data
Listando os subvolumes:
bash btrfs subvolume list /Reports
Criando um instantâneo dos subvolumes:
Aqui, estamos criando um instantâneo de leitura e gravação chamado snap de marketing do subvolume de marketing.
bash btrfs subvolume snapshot /Reports/marketing /Reports/marketing-snap
AlÊm disso, você pode criar um instantâneo somente leitura usando o sinalizador -r conforme mostrado. O marketing-rosnap Ê um instantâneo somente leitura do subvolume de marketing
bash btrfs subvolume snapshot -r /Reports/marketing /Reports/marketing-rosnap
Forçar a sincronização do sistema de arquivos usando o utilitårio 'sync'
Para forçar a sincronização do sistema de arquivos, invoque a opção de sincronização conforme mostrado. Observe que o sistema de arquivos jå deve estar montado para que o processo de sincronização continue com sucesso.
bash btrfs filsystem sync /Reports
Para excluir o dispositivo do sistema de arquivos, use o comando device delete conforme mostrado.
bash btrfs device delete /dev/sdc /Reports
Para sondar o status de um scrub, use o comando scrub status com a opção -dR .
bash btrfs scrub status -dR / RelatĂłrios
Para cancelar a execução do scrub, use o comando scrub cancel .
bash $ sudo btrfs scrub cancel / Reports
Para retomar ou continuar com uma depuração interrompida anteriormente, execute o comando de cancelamento de depuração
bash sudo btrfs scrub resume /Reports
mostra o uso do dispositivo de armazenamento:
btrfs filesystem usage /data
Para distribuir os dados, metadados e dados do sistema em todos os dispositivos de armazenamento do RAID (incluindo o dispositivo de armazenamento recĂŠm-adicionado) montados no diretĂłrio /data , execute o seguinte comando:
sudo btrfs balance start --full-balance /data
Pode demorar um pouco para espalhar os dados, metadados e dados do sistema em todos os dispositivos de armazenamento do RAID se ele contiver muitos dados.
Opçþes importantes de montagem Btrfs
Nesta seção, vou explicar algumas das importantes opçþes de montagem do Btrfs. Então vamos começar.
As opçþes de montagem Btrfs mais importantes são:
**1. acl e noacl
**ACL gerencia permissĂľes de usuĂĄrios e grupos para os arquivos/diretĂłrios do sistema de arquivos Btrfs.
A opção de montagem acl Btrfs habilita ACL. Para desabilitar a ACL, você pode usar a opção de montagem noacl .
Por padrão, a ACL estå habilitada. Portanto, o sistema de arquivos Btrfs usa a opção de montagem acl por padrão.
**2. autodefrag e noautodefrag
**Desfragmentar um sistema de arquivos Btrfs melhorarå o desempenho do sistema de arquivos reduzindo a fragmentação de dados.
A opção de montagem autodefrag permite a desfragmentação automåtica do sistema de arquivos Btrfs.
A opção de montagem noautodefrag desativa a desfragmentação automåtica do sistema de arquivos Btrfs.
Por padrão, a desfragmentação automåtica estå desabilitada. Portanto, o sistema de arquivos Btrfs usa a opção de montagem noautodefrag por padrão.
**3. compactar e compactar-forçar
**Controla a compactação de dados no nĂvel do sistema de arquivos do sistema de arquivos Btrfs.
A opção compactar compacta apenas os arquivos que valem a pena compactar (se compactar o arquivo economizar espaço em disco).
A opção compress-force compacta todos os arquivos do sistema de arquivos Btrfs, mesmo que a compactação do arquivo aumente seu tamanho.
O sistema de arquivos Btrfs suporta muitos algoritmos de compactação e cada um dos algoritmos de compactação possui diferentes nĂveis de compactação.
Os algoritmos de compactação suportados pelo Btrfs sĂŁo: lzo , zlib (nĂvel 1 a 9) e zstd (nĂvel 1 a 15).
Você pode especificar qual algoritmo de compactação usar para o sistema de arquivos Btrfs com uma das seguintes opçþes de montagem:
- compress=algoritmo:nĂvel
- compress-force=algoritmo:nĂvel
Para obter mais informaçþes, consulte meu artigo Como habilitar a compactação do sistema de arquivos Btrfs .
**4. subvol e subvolid
**Estas opçþes de montagem sĂŁo usadas para montar separadamente um subvolume especĂfico de um sistema de arquivos Btrfs.
A opção de montagem subvol Ê usada para montar o subvolume de um sistema de arquivos Btrfs usando seu caminho relativo.
A opção de montagem subvolid Ê usada para montar o subvolume de um sistema de arquivos Btrfs usando o ID do subvolume.
Para obter mais informaçþes, consulte meu artigo Como criar e montar subvolumes Btrfs .
**5. dispositivo
A opção de montagem de dispositivo** Ê usada no sistema de arquivos Btrfs de vårios dispositivos ou RAID Btrfs.
Em alguns casos, o sistema operacional pode falhar ao detectar os dispositivos de armazenamento usados em um sistema de arquivos Btrfs de vårios dispositivos ou RAID Btrfs. Nesses casos, você pode usar a opção de montagem do dispositivo para especificar os dispositivos que deseja usar para o sistema de arquivos de vårios dispositivos Btrfs ou RAID.
Você pode usar a opção de montagem de dispositivo vårias vezes para carregar diferentes dispositivos de armazenamento para o sistema de arquivos de vårios dispositivos Btrfs ou RAID.
Você pode usar o nome do dispositivo (ou seja, sdb , sdc ) ou UUID , UUID_SUB ou PARTUUID do dispositivo de armazenamento com a opção de montagem do dispositivo para identificar o dispositivo de armazenamento.
Por exemplo,
- dispositivo=/dev/sdb
- dispositivo=/dev/sdb,dispositivo=/dev/sdc
- dispositivo=UUID_SUB=490a263d-eb9a-4558-931e-998d4d080c5d
- device=UUID_SUB=490a263d-eb9a-4558-931e-998d4d080c5d,device=UUID_SUB=f7ce4875-0874-436a-b47d-3edef66d3424
**6. degraded
A opção de montagem degradada** permite que um RAID Btrfs seja montado com menos dispositivos de armazenamento do que o perfil RAID requer.
Por exemplo, o perfil raid1 requer a presença de 2 dispositivos de armazenamento. Se um dos dispositivos de armazenamento nĂŁo estiver disponĂvel em qualquer caso, vocĂŞ usa a opção de montagem degradada para montar o RAID mesmo que 1 de 2 dispositivos de armazenamento esteja disponĂvel.
**7. commit
A opção commit** mount Ê usada para definir o intervalo (em segundos) dentro do qual os dados serão gravados no dispositivo de armazenamento.
O padrĂŁo ĂŠ definido como 30 segundos.
Para definir o intervalo de confirmação para 15 segundos, você pode usar a opção de montagem commit=15 (digamos).
**8. ssd e nossd
A opção de montagem ssd** informa ao sistema de arquivos Btrfs que o sistema de arquivos estå usando um dispositivo de armazenamento SSD, e o sistema de arquivos Btrfs faz a otimização SSD necessåria.
A opção de montagem nossd desativa a otimização do SSD.
O sistema de arquivos Btrfs detecta automaticamente se um SSD Ê usado para o sistema de arquivos Btrfs. Se um SSD for usado, a opção de montagem de SSD serå habilitada. Caso contrårio, a opção de montagem nossd Ê habilitada.
**9. ssd_spread e nossd_spread
A opção de montagem ssd_spread** tenta alocar grandes blocos contĂnuos de espaço nĂŁo utilizado do SSD. Esse recurso melhora o desempenho de SSDs de baixo custo (baratos).
A opção de montagem nossd_spread desativa o recurso ssd_spread .
O sistema de arquivos Btrfs detecta automaticamente se um SSD Ê usado para o sistema de arquivos Btrfs. Se um SSD for usado, a opção de montagem ssd_spread serå habilitada. Caso contrårio, a opção de montagem nossd_spread Ê habilitada.
**10. descarte e nodiscard
Se vocĂŞ estiver usando um SSD que suporte TRIM enfileirado assĂncrono (SATA rev3.1), a opção de montagem de descarte** permitirĂĄ o descarte de blocos de arquivos liberados. Isso melhorarĂĄ o desempenho do SSD.
Se o SSD nĂŁo suportar TRIM enfileirado assĂncrono, a opção de montagem de descarte prejudicarĂĄ o desempenho do SSD. Nesse caso, a opção de montagem nodiscard deve ser usada.
Por padrão, a opção de montagem nodiscard Ê usada.
**11. norecovery
Se a opção de montagem norecovery** for usada, o sistema de arquivos Btrfs não tentarå executar a operação de recuperação de dados no momento da montagem.
**12. usebackuproot e nousebackuproot
Se a opção de montagem usebackuproot for usada, o sistema de arquivos Btrfs tentarĂĄ recuperar qualquer raiz de ĂĄrvore ruim/corrompida no momento da montagem. O sistema de arquivos Btrfs pode armazenar vĂĄrias raĂzes de ĂĄrvore no sistema de arquivos. A opção de montagem usebackuproot** procurarĂĄ uma boa raiz de ĂĄrvore e usarĂĄ a primeira boa que encontrar.
A opção de montagem nousebackuproot nĂŁo verificarĂĄ ou recuperarĂĄ raĂzes de ĂĄrvore invĂĄlidas/corrompidas no momento da montagem. Este ĂŠ o comportamento padrĂŁo do sistema de arquivos Btrfs.
**13. space_cache, space_cache=version, nospace_cache e clear_cache
A opção de montagem space_cache** Ê usada para controlar o cache de espaço livre. O cache de espaço livre Ê usado para melhorar o desempenho da leitura do espaço livre do grupo de blocos do sistema de arquivos Btrfs na memória (RAM).
O sistema de arquivos Btrfs suporta 2 versþes do cache de espaço livre: v1 (padrão) e v2
O mecanismo de cache de espaço livre v2 melhora o desempenho de sistemas de arquivos grandes (tamanho de vårios terabytes).
Você pode usar a opção de montagem space_cache=v1 para definir a v1 do cache de espaço livre e a opção de montagem space_cache=v2 para definir a v2 do cache de espaço livre.
A opção de montagem clear_cache Ê usada para limpar o cache de espaço livre.
Quando o cache de espaço livre v2 Ê criado, o cache deve ser limpo para criar um cache de espaço livre v1 .
Portanto, para usar o cache de espaço livre v1 após a criação do cache de espaço livre v2 , as opçþes de montagem clear_cache e space_cache=v1 devem ser combinadas: clear_cache,space_cache=v1
A opção de montagem nospace_cache Ê usada para desabilitar o cache de espaço livre.
Para desabilitar o cache de espaço livre após a criação do cache v1 ou v2 , as opçþes de montagem nospace_cache e clear_cache devem ser combinadas: clear_cache,nosapce_cache
**14. skip_balance
Por padrĂŁo, a operação de balanceamento interrompida/pausada de um sistema de arquivos Btrfs de vĂĄrios dispositivos ou RAID Btrfs serĂĄ retomada automaticamente assim que o sistema de arquivos Btrfs for montado. Para desabilitar a retomada automĂĄtica da operação de equilĂbrio interrompido/pausado em um sistema de arquivos Btrfs de vĂĄrios dispositivos ou RAID Btrfs, vocĂŞ pode usar a opção de montagem skip_balance .**
**15. datacow e nodatacow
A opção datacow** mount habilita o recurso Copy-on-Write (CoW) do sistema de arquivos Btrfs. à o comportamento padrão.
Se você deseja desabilitar o recurso Copy-on-Write (CoW) do sistema de arquivos Btrfs para os arquivos recÊm-criados, monte o sistema de arquivos Btrfs com a opção de montagem nodatacow .
**16. datasum e nodatasum
A opção datasum** mount habilita a soma de verificação de dados para arquivos recÊm-criados do sistema de arquivos Btrfs. Este Ê o comportamento padrão.
Se você não quiser que o sistema de arquivos Btrfs faça a soma de verificação dos dados dos arquivos recÊm-criados, monte o sistema de arquivos Btrfs com a opção de montagem nodatasum .
Perfis Btrfs
Um perfil Btrfs ĂŠ usado para informar ao sistema de arquivos Btrfs quantas cĂłpias dos dados/metadados devem ser mantidas e quais nĂveis de RAID devem ser usados para os dados/metadados. O sistema de arquivos Btrfs contĂŠm muitos perfis. EntendĂŞ-los o ajudarĂĄ a configurar um RAID Btrfs da maneira que vocĂŞ deseja.
Os perfis Btrfs disponĂveis sĂŁo os seguintes:
single : Se o perfil único for usado para os dados/metadados, apenas uma cópia dos dados/metadados serå armazenada no sistema de arquivos, mesmo se você adicionar vårios dispositivos de armazenamento ao sistema de arquivos. Assim, 100% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser utilizado.
dup : Se o perfil dup for usado para os dados/metadados, cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos manterå duas cópias dos dados/metadados. Assim, 50% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser utilizado.
raid0 : No perfil raid0 , os dados/metadados serão divididos igualmente em todos os dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, não haverå dados/metadados redundantes (duplicados). Assim, 100% do espaço em disco de cada um dos dispositivos de armazenamento adicionados ao sistema de arquivos pode ser usado. Se, em qualquer caso, um dos dispositivos de armazenamento falhar, todo o sistema de arquivos serå corrompido. Você precisarå de pelo menos dois dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid0 .
raid1 : No perfil raid1 , duas cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a uma falha de unidade. Mas você pode usar apenas 50% do espaço total em disco. Você precisarå de pelo menos dois dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1 .
raid1c3 : No perfil raid1c3 , três cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a duas falhas de unidade, mas você pode usar apenas 33% do espaço total em disco. Você precisarå de pelo menos três dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1c3 .
raid1c4 : No perfil raid1c4 , quatro cópias dos dados/metadados serão armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos. Nesta configuração, a matriz RAID pode sobreviver a três falhas de unidade, mas você pode usar apenas 25% do espaço total em disco. Você precisarå de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid1c4 .
raid10 : No perfil raid10 , duas cĂłpias dos dados/metadados serĂŁo armazenadas nos dispositivos de armazenamento adicionados ao sistema de arquivos, como no perfil raid1 . AlĂŠm disso, os dados/metadados serĂŁo divididos entre os dispositivos de armazenamento, como no perfil raid0 .
O perfil raid10 ĂŠ um hĂbrido dos perfis raid1 e raid0 . Alguns dos dispositivos de armazenamento formam arrays raid1 e alguns desses arrays raid1 sĂŁo usados para formar um array raid0 . Em uma configuração raid10 , o sistema de arquivos pode sobreviver a uma Ăşnica falha de unidade em cada uma das matrizes raid1 .
Você pode usar 50% do espaço total em disco na configuração raid10 . Você precisarå de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid10 .
raid5 : No perfil raid5 , uma cĂłpia dos dados/metadados serĂĄ dividida entre os dispositivos de armazenamento. Uma Ăşnica paridade serĂĄ calculada e distribuĂda entre os dispositivos de armazenamento do array RAID.
Em uma configuração raid5 , o sistema de arquivos pode sobreviver a uma Ăşnica falha de unidade. Se uma unidade falhar, vocĂŞ pode adicionar uma nova unidade ao sistema de arquivos e os dados perdidos serĂŁo calculados a partir da paridade distribuĂda das unidades em execução.
Você pode usar 1 00x(N-1)/N % do total de espaços em disco na configuração raid5 . Aqui, N Ê o número de dispositivos de armazenamento adicionados ao sistema de arquivos. Você precisarå de pelo menos três dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid5 .
raid6 : No perfil raid6 , uma cĂłpia dos dados/metadados serĂĄ dividida entre os dispositivos de armazenamento. Duas paridades serĂŁo calculadas e distribuĂdas entre os dispositivos de armazenamento do array RAID.
Em uma configuração raid6 , o sistema de arquivos pode sobreviver a duas falhas de unidade ao mesmo tempo. Se uma unidade falhar, vocĂŞ poderĂĄ adicionar uma nova unidade ao sistema de arquivos e os dados perdidos serĂŁo calculados a partir das duas paridades distribuĂdas das unidades em execução.
Você pode usar 100x(N-2)/N % do espaço total em disco na configuração raid6 . Aqui, N Ê o número de dispositivos de armazenamento adicionados ao sistema de arquivos. Você precisarå de pelo menos quatro dispositivos de armazenamento para configurar o sistema de arquivos Btrfs no perfil raid6 .
-
@ 9223d2fa:b57e3de7
2025-04-15 02:54:0012,600 steps
-
@ 67e9dd72:b9d59ce7
2025-05-14 20:59:36Thereâs a certain elegance to outliving your enemies. Not the cinematic kind, with poisoned cigars or cunning plots, but the quieter, more refined triumph of still being around when everyone who ever underestimated you has long since retired, expired, or become inexplicably fond of sudoku. Itâs a victory without confetti. You simply keep showing up, well-dressed and unimpressed.

Bob Hope may not be a household name anymore, but for much of the 20th century, he was practically a part of everyoneâs household. Born in 1903, he became the blueprint for the modern entertainer: part comedian, part actor, part relentless emcee of the American psyche.
Man - Bob Hope - in a checkered suit and striped tie smiles in a black and white photo. Blurred foliage in the background.
Before stand-up was a career path and before anyone thought to put jokes on late-night television, Hope was crisscrossing the globe with a microphone in one hand and a golf club in the other, cracking wise for movie stars, eleven presidents, and countless thousands of homesick soldiers. He wasnât just famous - he was a part of the family. Your grandparents didnât need to like comedy to know who Bob Hope was. He was baked into the cultural cake.
But what makes him worthy of this list isnât just his longevity - though making it to 100 with your timing intact is no small feat. Itâs that he stayed Bob Hope the whole time. He managed to remain a household name through every major technological shift from vaudeville to cable. Always with the same self-deprecating grin, the same deadpan delivery, the same tireless drive to entertain, whether on a dusty military base, golf club in hand, or a glitzy awards stage.
A man on stage - Bob Hope - in front of a large crowd of soldiers, some holding "BOB" signs. The mood is lively, with soldiers clapping and smiling.
In a business that burns through personalities like kindling, Hope managed to stay relevant without ever pretending to be something he wasnât. He adapted, yes - but he never shape-shifted. And thatâs no punchline; thatâs staying power.
David Attenborough (Honorable Mention 1926 - )
Sir David Attenborough hasnât just lived for nearly a century - heâs narrated it.
Elderly man in a blue suit - David Attenborough - smiles softly outdoors with blurred green background. He has white hair and wears a white shirt, conveying warmth.
Born in 1926, heâs now pushing the hundred mark with the same quiet intensity and clipped eloquence that made "Planet Earth" a phrase we all say with reverence. For decades, Attenborough has been the voice in our heads while we watch iguanas outrun snakes or bioluminescent squid flash their Morse code in the abyss. But beyond the velvet tones and impeccable suits, thereâs something more enduring: a man who has remained unflinchingly curious in a world that increasingly isnât. While others have shouted into the void, Attenborough has whispered, and when he whispers, we listened.
What makes him extraordinary isnât just the longevity - itâs the fact that heâs never softened his message to suit the moment. In his nineties, when most people are congratulated for remembering their Wi-Fi password, Attenborough was delivering urgent speeches at climate summits and lending gravitas to a collapsing ecosystem. He has aged, yes, but never aged out. His moral clarity, his scientific reverence, and his profound respect for the natural world have never been dulled by time. If anything, they've sharpened.
Elderly man - David Attenborough - seated on a wooden chair with arms crossed, wearing a gray sweater against a dark background. Calm, contemplative expression.
Sir David may be approaching 100, but he's still out there - gently scolding us, brilliantly informing us, and above all, remaining unmistakably, irreplaceably himself.
Fauja Singh (1911 - )
Fauja Singh didnât just reach 100 - he ran there.
Elderly man - Fauja Singh - jogging on a grassy hill, wearing a yellow turban and sportswear. City skyline and lush greenery in the background. Calm mood.
Born in 1911 in British India, he took up competitive marathon running in his 80s, which is roughly the age most people start describing trips to the mailbox as âexercise.â At 100, he completed the Toronto Waterfront Marathon, becoming the first centenarian to do so. He wasnât running for medals or money or anyoneâs approval - he was running because his legs still said yes. In a culture obsessed with youth and speed, Singh offered something quietly radical: the image of an old man moving forward, steadily, joyfully, and entirely on his own terms.
But what truly sets Fauja Singh apart isn't just the records - though those are impressive - but the gentleness with which he carried them. Soft-spoken, devoutly Sikh, and famously modest, he turned down sponsorships that conflicted with his values and credited his endurance to simple living and a vegetarian diet. No drama, no bravado - just resolve in motion.
Elderly man - Fauja Singh - with a long beard and dark turban smiling, outdoors near a track field. Background shows trees and houses, soft sunset lighting.
While the world sprinted around him in search of the next thing, Singh â who is still with us at 114 - kept his pace and kept his faith. He didnât just defy age - he ignored it. And in doing so, he reminds us that time is less an enemy to be conquered than a companion to be outwalked, one calm mile at a time.
Henry Allingham (1896 â 2009)
Henry Allingham lived to be 113, which is remarkable enough - but what makes him truly unforgettable is how he carried those years. Born in 1896, he lived through both World Wars, the sinking of the Titanic, the moon landing, and the invention of sliced bread - literally. A founding member of the Royal Air Force and one of the last surviving veterans of World War I, Allingham wasnât just a man from another time; he was a walking archive of it.
Elderly man - Henry Allingham - smiling with a certificate showing military service details, birth and death dates, and text "The last founding member of the Royal Air Force."
When asked about the secret to his longevity, he famously answered: "Cigarettes, whisky, and wild women." Which may not hold up in a medical journal, but certainly qualifies as staying defiantly oneself.
But beneath the cheeky quotes was someone deeply committed to remembrance. In his later years, Allingham didnât retreat into private comfort - he leaned in. He spent his 100âs traveling, speaking, and bearing witness for those who no longer could. He wore his medals not as decorations, but as responsibilities. There was something dignified yet unsentimental in the way he spoke about war and peace, as if to say: this happened, and it mattered, and Iâm still here to make sure you understand that.
Elderly man - Henry Allingham - saluting, wearing a suit, striped tie, and several medals. Background blurred. Solemn expression.
Henry Allingham didnât just endure time - he honored it, and in doing so, made his century count for more than just numbers.
George Burns (1896 â 1996)
George Burns made it to 100 with a cigar in one hand and a punchline in the other, which is more or less how he lived every year of his life.
Elderly man - comedian George Burns - with glasses in plaid jacket holds cigar, raising hand with a playful expression against a gray background.
Born in 1896, he started in vaudeville, graduated to radio, then television, and eventually film - playing God, no less, in his later years, with the same dry charm he used to dismantle hecklers back in the 1920s. He didnât just age into comedy; he dragged comedy along with him, evolving without ever losing that sly, arched-eyebrow delivery that made it all look effortless. Burns didnât just outlast his peers - he made a habit of burying them with style, then cracking a joke at the funeral.
What made Burns so enduring wasnât just the longevity or the accolades (though he won an Oscar at 80 and was still headlining Vegas in his 90âs). It was the unshakable sense of self. He never rebranded or reimagined - he refined.
Elderly man - comedian George Burns - in a tuxedo holds a lit cigar, standing at a microphone on a dark stage. Smoky atmosphere, calm demeanor.
While the world swirled around him in reinvention and reinventionâs younger cousin, desperation, George Burns stayed exactly who he was: a little irreverent, a little sentimental, and always in on the joke. When he turned 100, it didnât feel like a milestone - it felt like the final beat in a perfectly timed routine.
Irving Berlin (1888 â 1989)
Irving Berlin didnât just live to 101 - he scored most of the 20th century along the way. Born in 1888 in Imperial Russia and arriving in the U.S. as a penniless immigrant, he wrote more than 1,500 songs, including âWhite Christmas,â âGod Bless America,â and âThereâs No Business Like Show Businessâ.
Man in a suit - Irving Berlin - sits in front of a piano, with sheet music behind him. He appears poised and relaxed in a monochromatic setting.
His melodies are so deeply embedded in American culture that they feel almost like public domain, like oxygen, or like awkward family holidays. Yet Berlin never read music and played only in F-sharp, the black keys. He succeeded by sheer force of will, instinct, and an uncanny ability to write songs that people didnât just want to hum - they wanted to live inside.
What makes him truly worthy of this list, though, isnât just his prodigious output or his improbable rise. Itâs that even into his centenarian years, Berlin never stopped being Berlin.
Elderly man in suit - Irving Berlin - plays piano in a dimly lit room, glancing at the camera. Books and a framed picture are seen in the background.
He remained fiercely private, unassuming, and somewhat allergic to praise. He turned down presidential medals and refused to attend tribute concerts in his honor. He didnât care for celebrity; he cared for the work. And when the applause faded, he kept playing - quietly, defiantly, on his beloved black keys. In a century that was loud, fast, and eager to reinvent itself, Irving Berlin stood still and let the world dance to his tune.
Shigeaki Hinohara (1911 - 2017)
Shigeaki Hinohara lived to the age of 105, and if that alone doesnât impress you, consider this: he spent most of that time working.
Elderly person wearing glasses and a white coat - Shigeaki Hinohara - with a stethoscope, smiling warmly. Indoors with wooden background, calm and professional mood.
As one of Japanâs most beloved physicians and a pioneer of preventive medicine, he wrote more than 150 books (some of them after turning 100), saw patients well into his centenarian years, and advocated tirelessly for a lifestyle of purpose, moderation, and fun. He was known to skip lunch, take the stairs, and insist that people shouldnât retire just because a calendar told them to. In a culture that reveres longevity but often equates age with retreat, Hinohara cheerfully subverted the narrative - by refusing to slow down.
What made Hinohara truly remarkable was not just how long he lived, but how completely he inhabited his philosophy. He believed that life should be driven by curiosity, not calories, by engagement, not age. He didnât just dish out wellness advice - he embodied it, always immaculately dressed, sharp-witted, and quietly radical in his refusal to become ornamental.
Elderly man in a brown suit - Shigeaki Hinohara - sits on a stone bench with arms raised, smiling in a grassy park. Plaque visible on the bench.
Even as the world around him grew faster, flashier, more disposable, Hinohara stayed grounded in old-school service and a kind of optimistic realism thatâs now in short supply. He lived the life of a man who had somewhere to be and something to say, right up to the very end. And he never once apologized for being himself.
Ernst Mayr (1904 â 2004)
Ernst Mayr lived to be 100 and managed to spend nearly all of it arguing - politely, rigorously, and with great precision - about the nature of life itself. Born in 1904 in what was then the German Empire, Mayr became one of the most influential evolutionary biologists of the 20th century, helping to unify Darwinian theory with modern genetics in what became known as the âmodern synthesis.â
Black-and-white image of an elderly man in a suit, smiling against a dark background. Text: "NCERT Biology, Ernst Mayr, Darwin of the 20th century."
He wrote or co-authored more than 20 books, described dozens of new species, and spent his final years calmly but insistently reminding the scientific community that speciation was, in fact, his specialty. To say he had staying power is an understatement; the man didnât just contribute to biology - he helped rewrite its central grammar, and then stuck around to make sure no one messed it up. Darwin certainly wouldâve been nodding in approval
What makes Mayr a qualified member of this centenarian pantheon isnât just the duration of his life, but the clarity of his voice within it. Even into his late 90s, he was publishing papers, giving interviews, and confidently dismantling sloppy evolutionary thinking wherever he found it.
Man - Ernst Mayr - smiling beside a portrait of himself in academic robes. Black-and-white setting with framed document visible in background.
He was precise without being precious, critical without being cruel, and never once dulled his intellectual edge for the sake of being agreeable. If anything, he seemed to sharpen with age, like a scalpel left in a glass case: elegant, useful, and just a bit intimidating. Mayr didnât merely witness a century of science - he shaped it, defended it, and remained unmistakably himself every step of the way.
Ernest Badalian (1925 - )
Born in Armenia during the early days of the Soviet experiment, Ernie Badalian came into a world already complicated, already tilting on its axis.
Elderly man - Ernie Badalian - smiling warmly, wearing a blue patterned shirt, and waving. Seated on a patterned chair in a well-lit room.
His father was a landowner â code word at the time, for âenemy of the peopleâ - and the familyâs property was seized by Soviet authorities in a sweeping purge of the bourgeoisie. To avoid a one-way ticket to the gulag, the family fled. They moved west through Europeâs unraveling seams, only to find themselves caught in the gears of World War II. Ernie was eventually interned in a German POW camp, where he remained until American forces liberated it in 1945. Freedom came not with fanfare, but with the quiet, improbable survival of someone who simply refused to be broken.
From there, Ernieâs story veers not into comfort, but resilience reimagined. He made it to America. He reunited with family - every last one of them, which in itself feels almost mythic â in Detroit, Michigan and became an American citizen. In 1952, he landed in Bell, California, bought a poultry ranch, and then - in one of those only-in-America plot twists - pivoted from chickens to check-ins by opening a motel across the street from a brand-new curiosity called Disneyland. That little venture became a family business, a generational stake in the American dream, and at 100, Ernie still lives on-site, quietly keeping tabs on tourists and trendlines like a man who knows full well the cost of standing still.
What makes Ernie a charter member of this list isnât just that he reached the far end of the calendar with his humor and will intact - itâs that he did so by shaping every chapter himself. His life is a testament to persistence without self-pity, adaptation without loss of identity, and the kind of quiet authority that doesnât need reminding whoâs in charge. That he was the inspiration for this post is no coincidence. Heâs not just a part of the list - heâs the reason it exists.
Older man - Ernie Badalian - sits with "100" birthday balloon, smiling, in a restaurant. Another man - Chris Zappia - stands behind him, also smiling. Warm, lively atmosphere.
Maybe the best thing about the people on this list - besides the obvious fact that they absolutely refuse to die on anyone else's schedule - is that they never mistook longevity for the goal. They werenât chasing years like some kind of loyalty program. They were just busy living. Fully. Messily. With style, principle, or just stubbornness, but always on their own terms. Making it to 100 is impressive. Making it to 100 without becoming a museum exhibit or a punchline? Thatâs something else entirely.
Itâs tempting to reduce centenarians to life hacks and headlines. âSecrets to a Long Life Revealed!â followed by kale, crossword puzzles, and something vaguely Scandinavian. But the truth is more slippery and less clickable. These people didnât age gracefully - they aged honestly. Thereâs a difference. They didnât live long because they tried to. They lived long because they kept moving, kept showing up, kept refusing to trade curiosity for comfort. Some ran marathons. Some played God. Some just kept opening their motel door every morning, because, to them, the world was still worth checking in on.
Thereâs no single through-line in this list - no magic pill, no secret sauce, no TED Talk formula. Just people who stayed sharp, stayed weird, or stayed kind long enough to watch the rest of us try to catch up. They kept going. Not because it was easy, but because it never occurred to them to stop. And when the rest of the world started putting up walls - between generations, between truths, between each other - they walked through them like smoke. And maybe thatâs the real lesson here. Not how to live forever, but how to live so well, so completely, that the calendar just becomes background noise. The trick, it seems, isnât to avoid the end. Itâs to make the middle matter so much that the end doesnât get the last word.
So, raise a glass (neat, no ice!) to the centenarians - the defiant, the dignified, the quietly miraculous. Not because they beat the clock, but because they never let it run the show. They remind us, in their beautifully stubborn way, that time is less a thief than a mirror. It reflects what you put into it. And if youâre lucky - and just a little bit ungovernable - it reflects you right back, 100 years later, with a raised eyebrow and a drink in hand.
-
@ 57d1a264:69f1fee1
2025-05-14 09:48:43Just another Ecash nutsnote design is a ew template for brrr.gandlaf.com cashu tocken printing machine and honoring Ecash ideator David Lee Chaum. Despite the turn the initial project took, we would not have Ecash today without his pioneering approach in cryptography and privacy-preserving technologies.
A simple KISS (Keep It Super Simple) Ecash nutsnote delivered as SVG, nothing fancy, designed in PenPot, an open source design tool, for slides, presentations, mockups and interactive prototypes.
Here Just another Nutsnote's current state, together with some snapshots along the process. Your feedback is more than welcome.
https://design.penpot.app/#/view?file-id=749aaa04-8836-81c6-8006-0b29916ec156&page-id=749aaa04-8836-81c6-8006-0b29916ec157§ion=interactions&index=0&share-id=addba4d5-28a4-8022-8006-2ecc4316ebb2
originally posted at https://stacker.news/items/979728
-
@ 2e8970de:63345c7a
2025-05-14 06:51:45https://www.niskanencenter.org/the-bridge-for-workers-act-getting-people-back-into-jobs-fast/
originally posted at https://stacker.news/items/979654
-
@ 6e0ea5d6:0327f353
2025-04-14 15:11:17Ascolta.
We live in times where the average man is measured by the speeches he gives â not by the commitments he keeps. People talk about dreams, goals, promises⌠but what truly remains is whatâs honored in the silence of small gestures, in actions that donât seek applause, in attitudes unseen â yet speak volumes.
Punctuality, for example. Showing up on time isnât about the clock. Itâs about respect. Respect for anotherâs time, yes â but more importantly, respect for oneâs own word. A man who is late without reason is already running late in his values. And the one who excuses his own lateness with sweet justifications slowly gets used to mediocrity.
Keeping your word is more than fulfilling promises. It is sealing, with the mouth, what the body must later uphold. Every time a man commits to something, he creates a moral debt with his own dignity. And to break that commitment is to declare bankruptcy â not in the eyes of others, but in front of himself.
And debts? Even the small ones â or especially the small ones â are precise thermometers of character. A forgotten sum, an unpaid favor, a commitment left behind⌠all of these reveal the structure of the inner building that man resides in. He who neglects the small is merely rehearsing for his future collapse.
Life, contrary to what the reckless say, is not built on grand deeds. It is built with small bricks, laid with almost obsessive precision. The truly great man is the one who respects the details â recognizing in them a code of conduct.
In Sicily, especially in the streets of Palermo, I learned early on that there is more nobility in paying a five-euro debt on time than in flaunting riches gained without word, without honor, without dignity.
As they say in Palermo: Lâuomo si conosce dalle piccole cose.
So, amico mio, Donât talk to me about greatness if you canât show up on time. Donât talk to me about respect if your word is fickle. And above all, donât talk to me about honor if you still owe what you once promised â no matter how small.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "đĽ" as a token of appreciation.
A toast to our family!
-
@ 57d1a264:69f1fee1
2025-05-14 06:48:45Has the architect Greg Chasen considered it when rebuilding the house just one year before the catastrophe? Apparently not! Another of his projects was featured on the Value of Architecture as properties with design integrity.
This is a super interesting subject. The historic character, livability, and modern disaster-resistance is a triangle where you often have to pick just one or two, which leads to some tough decisions that have major impacts on families and communities. Like one of the things he mentions is that the architect completely eliminated plants from the property. That's great for fire resistance, but not so great for other things if the entire town decides to go the same route (which he does bring up later in the video). I don't think there's any objectively right answer, but definitely lots of good (and important) discussion points to be had.
https://www.youtube.com/watch?v=cbl_1qfsFXk
originally posted at https://stacker.news/items/979653
-
@ 6e0ea5d6:0327f353
2025-04-14 15:10:58Ascolta bene.
A manâs collapse never begins on the battlefield.
It begins in the invisible antechamber of his own mind.
Before any public fall, there is an ignored internal whisperâ
a small, quiet, private decision that gradually drags him toward ruin.No empire ever fell without first rotting from within.
The world does not destroy a man who hasnât first surrendered to himself.
The enemy outside only wins when it finds space in the void the man has silently carved.**Non ti sbagliare ** â there are no armies more ruthless than undisciplined thoughts.
There are no blows more fatal than the ones we deal ourselves:
with small concessions, well-crafted excuses,
and the slow deterioration of our integrity.
What people call failure is nothing more than the logical outcome
of a sequence of internal betrayals.Afraid of the world? Sciocchezze.
But a man whoâs already bowed before his own weaknessesâ
he needs no enemies.
He digs his own grave, chooses the epitaph,
and the only thing the world does is toss in some dirt.Capisci?
Strength isnât the absence of falling, but the presence of resistance.
The true battle isnât external.
It takes place withinâwhere thereâs only you, your conscience, and the mirror.
And itâs in that silent courtroom where everything is decided.The discipline to say ânoâ to yourself
is more noble than any public glory.
Self-control is more valuable than any victory over others.In Sicily, we learn early:
âCu sâabbrazza cuâ soâ nemicu, si scorda la faccia di lâamicu.â
He who embraces his enemy forgets the face of his friend.
The most dangerous enemy is the one you feed daily with self-indulgence.
And the most relentless confrontation is the one you avoid in front of the mirror.So donât talk to me about external defeats.
Tell me where inside you the weakness began.
Tell me the exact moment you abandoned what you believed in, in the name of ease.
Because a man only falls before the world⌠after falling before himself.Thank you for reading, my friend!
If this message resonated with you, consider leaving your "đĽ" as a token of appreciation.
A toast to our family!
-
@ c21b1a6c:0cd4d170
2025-04-14 14:41:20đ§ž Progress Report Two
Hey everyone! Iâm back with another progress report for Formstr, a part of the now completed grant from nostr:npub10pensatlcfwktnvjjw2dtem38n6rvw8g6fv73h84cuacxn4c28eqyfn34f . This update covers everything weâve built since the last milestone â including polish, performance, power features, and plenty of bug-squashing.
đď¸ Whatâs New Since Last Time?
This quarter was less about foundational rewrites and more about production hardening and real-world feedback. With users now onboard, our focus shifted to polishing UX, fixing issues, and adding new features that made Formstr easier and more powerful to use.
⨠New Features & UX Improvements
- Edit Existing Forms
- Form Templates
- Drag & Drop Enhancements (especially for mobile)
- New Public Forms UX (card-style layout)
- FAQ & Support Sections
- Relay Modal for Publishing
- Skeleton Loaders and subtle UI Polish
đ Major Bug Fixes
- Fixed broken CSV exports when responses were empty
- Cleaned up mobile rendering issues for public forms
- Resolved blank.ts export issues and global form bugs
- Fixed invalid
npub
strings in the admin flow - Patched response handling for private forms
- Lots of small fixes for titles, drafts, embedded form URLs, etc.
đ Access Control & Privacy
- Made forms private by default
- Fixed multiple issues around form visibility, access control UIs, and anonymous submissions
- Improved detection of pubkey issues in shared forms
đ§ Some Notable In-Progress Features
The following features are actively being developed, and many are nearing completion:
-
Conditional Questions:
This oneâs been tough to crack, but weâre close!
Work in progress bykeraliss
and myself:
đ PR #252 -
Downloadable Forms:
Fully-contained downloadable HTML versions of forms.
Being led bycasyazmon
with initial code by Basanta Goswami
đ PR #274 -
OLLAMA Integration (Self-Hosted LLMs):
Users will be able to create forms using locally hosted LLMs.
PR byashu01304
đ PR #247 -
Sections in Forms:
Work just started on adding section support!
Small PoC PR bykeraliss
:
đ PR #217
đ Huge Thanks to New Contributors
We've had amazing contributors this cycle. Big thanks to:
- Aashutosh Gandhi (ashu01304) â drag-and-drop enhancements, OLLAMA integration
- Amaresh Prasad (devAmaresh) â fixed npub and access bugs
- Biresh Biswas (Billa05) â skeleton loaders
- Shashank Shekhar Singh (Shashankss1205) â bugfixes, co-authored image patches
- Akap Azmon Deh-nji (casyazmon) â CSV fixes, downloadable forms
- Manas Ranjan Dash (mdash3735) â bug fixes
- Basanta Goswami â initial groundwork for downloadable forms
- keraliss â ongoing work on conditional questions and sections
We also registered for the Summer of Bitcoin program and have been receiving contributions from some incredibly bright new applicants.
đ Whatâs Still Coming?
From the wishlist I committed to during the grant, hereâs whatâs still in the oven:
-[x] Upgrade to nip-44 - [x] Access Controlled Forms: A Form will be able to have multiple admins and Editors. - [x] Private Forms and Fixed Participants: Enncrypt a form and only allow certain npubs to fill it. - [x] Edit Past Forms: Being able to edit an existing form. - [x] Edit Past Forms
- [ ] Conditional Rendering (in progress)
- [ ] Sections (just started)
- [ ] Integrations - OLLAMA / AI-based Form Generation (near complete)
- [ ] Paid Surveys
- [ ] NIP-42 Private Relay support
â Whatâs De-Prioritized?
- Nothing is de-prioritized now especially since Ollama Integration got re-prioritized (thanks to Summer Of Bitcoin). We are a little delayed on Private Relays support but it's now becoming a priority and in active development. Zap Surveys will be coming soon too.
đ¸ How Funds Were Used
- Paid individual contributors for their work.
- Living expenses to allow full-time focus on development
đ§ Closing Thoughts
Things feel like theyâre coming together now. Weâre out of "beta hell", starting to see real adoption, and most importantly, gathering feedback from real users. Thatâs helping us make smarter choices and move fast without breaking too much.
Stay tuned for the next big drop â and in the meantime, try creating a form at formstr.app, and let me know what you think!
-
@ 0b118e40:4edc09cb
2025-04-13 02:46:36note - i wrote this before the global trade war, back when tariffs only affected China, Mexico, and Canada. But you will still get the gist of it.
During tough economic times, governments have to decide if they should open markets to global trade or protect local businesses with tariffs. The United States has swung between these two strategies, and history shows that the results are never straightforward
Just days ago, President Donald Trump imposed tariffs on imports from Canada, Mexico, and China. He framed these tariffs (25% on most Canadian goods, 10% on Canadian energy, 25% on Mexican imports, and 10% on Chinese imports) as a way to protect American industries.
But will they actually help, or could they backfire?
A History of U.S. Tariffs
Many have asked if countries will retaliate against the US. They can and they have. Once upon a time, 60 countries were so pissed off at the US, they retaliated at one go and crushed US dominance over trade.
This was during the Great Depression era in the 1930s when the government passed the Smoot-Hawley Tariff Act, placing high taxes on over 20,000 foreign goods. The goal was to protect American jobs, especially American farmers and manufacturers, but it backfired so badly.
Over 60 countries, including Canada, France, and Germany, retaliated by imposing their own tariffs. By 1933, US imports and exports both dropped significantly over 60%, and unemployment rose to 25%.
After President Franklin Roosevelt came to office, he implemented the Reciprocal Trade Agreements Act of 1934 to reverse these policies, calming the world down and reviving trade again.
The economist history of protectionism
The idea of shielding local businesses with tariffs isnât new or recent. It's been around for a few centuries. In the 16th to 18th centuries, mercantilism encouraged countries to limit imports and boost exports.
In the 18th century, Adam Smith, in The Wealth of Nations, argued that free trade allows nations to specialize in what they do best countering protectionism policies. Friedrich List later challenged Smith's view by stating that developing countries need some protection to grow their âinfantâ industries which is a belief that still influences many governments today.
But how often do governments truly support startups and new small businesses in ways that create real growth, rather than allowing funds to trickle down to large corporations instead?
In modern times, John Maynard Keynes supported government intervention during economic downturns, while Milton Friedman championed free trade and minimal state interference.
Paul Krugman argued that limited protectionism can help large industries by providing them unfair advantages to become global market leaders. I have deep reservations about Krugmanâs take, particularly on its impact or lack thereof in globalizing small businesses.
The debate between free trade and protectionism has existed for centuries. Whatâs clear is that there is no one-size-fits-all model to this.
The Political Debate - left vs right
Both the left and right have used tariffs but for different reasons. The right supports tariffs to protect jobs and industries, while the left uses them to prevent multinational corporations from exploiting cheap labor abroad.
Neoliberal policies favor free trade, arguing that competition drives efficiency and growth. In the US this gets a little bit confusing as liberals are tied to the left, and free trade is tied to libertarianism which the rights align closely with, yet at present right wing politicians push for protectionism which crosses the boundaries of free-trade.
There are also institutions like the WTO and IMF who advocate for open markets, but their policies often reflect political alliances and preferential treatment - so it depends on what you define as true 'free tradeâ.
Who Really Benefits from Tariffs?
Most often, tariffs help capital-intensive industries like pharmaceuticals, tech, and defense, while hurting labor-intensive sectors like manufacturing, agriculture, and construction.
This worsens inequality as big corporations will thrive, while small businesses and working-class people struggle with rising costs and fewer job opportunities.
Iâve been reading through international trade economics out of personal interest, I'll share some models below on why this is the case
1. The Disruption of Natural Trade
Tariffs disrupt the natural flow of trade. The Heckscher-Ohlin model explains that countries export goods that match their resources like Canadaâs natural resource energy or Chinaâs labour intensive textile and electronics. When tariffs block this natural exchange, industries suffer.
A clear example was Europeâs energy crisis during the Russia-Ukraine war. By abruptly cutting themselves off from the supply of Russian energy, Europe scrambled to find alternative sources. In the end, it was the people who had to bear the brunt of skyrocketing prices of energy.
2. Who wins and who loses?
The Stolper-Samuelson theorem helps us understand who benefits from tariffs and who loses. The idea behind it is that tariffs benefit capital-intensive industries, while labor-intensive sectors are hurt.
In the US, small manufacturing industries that rely on low-cost imports on intermediary parts from countries like China and Mexico will face rising costs, making their final goods too expensive and less competitive. This is similar to what happened to Argentina, where subsidies and devaluation of pesos contributed to cost-push inflation, making locally produced goods more expensive and less competitive globally.
This also reminded me of the decline of the US Rust Belt during the 1970s and 1980s, where the outsourcing of labour-intensive manufacturing jobs led to economic stagnation in many regions in the Midwest, while capital-intensive sectors flourished on the coasts. It resulted in significantly high income inequality that has not improved over the last 40 years.
Ultimately the cost of economic disruption is disproportionately borne by smaller businesses and low-skilled workers. At the end of the day, the rich get richer and the poor get poorer.
3. Delays in Economic Growth
The Rybczynski theorem suggests that economic growth depends on how efficiently nations reallocate their resources toward capital- or labor-intensive industries. But tariffs can distort this transition and progress.
In the 70s and 80s, the US steel industry had competition from Japan and Germany who modernized their production methods, making their steel more efficient and cost-effective. Instead of prioritizing innovation, many U.S. steel producers relied on tariffs and protectionist measures to shield themselves from foreign competition. This helped for a bit but over time, American steelmakers lost global market share as foreign competitors continued to produce better, cheaper steel. Other factors, such as aging infrastructure, and economic shifts toward a service-based economy, further contributed to the industry's decline.
A similar struggle is seen today with Chinaâs high-tech ambitions. Tariffs on Chinese electronics and technology products limit access to key inputs, such as semiconductors and advanced robotics. While China continues its push for automation and AI-driven manufacturing, these trade barriers increase costs and disrupt supply chains, forcing China to accelerate its decoupling from Western markets. This shift could further strengthen alliances within BRICS, as China seeks alternative trade partnerships to reduce reliance on U.S.-controlled financial and technological ecosystems.
Will the current Tariff imposition backfire and isolate the US like it did a hundred years ago or 50 years ago? Is US risking it's position as a trusted economic leader? Only time would tell
The impact of tariff on innovation - or lack thereof
While the short-term impacts of tariffs often include higher consumer prices and job losses, the long-term effects can be even more damaging, as they discourage innovation by increasing costs and reducing competition.
Some historical examples globally : * Nigeria: Blocking import of rice opened up black market out of desperation to survive. * Brazil: Protectionist car policies led to expensive, outdated vehicles. * Malaysiaâs Proton: Sheltered by tariffs and cronyism and failed to compete globally. * India (before 1991): Over-regulation limited the industries, until economic reforms allowed for growth. * Soviet Union during Cold War : Substandard products and minimal innovation due to the absence of foreign alternatives, yielding to economic stagnation.
On the flip side, Vietnam has significantly reduced protectionism policies by actively pursuing free trade agreements. This enabled it to become a key manufacturing hub. But Vietnam is not stopping there as it is actively pushing forward its capital-intensive growth by funding entrepreneurs.
The Future of U.S. Tariffs
History has shown that tariffs rarely deliver their intended benefits without unintended consequences. While they may provide temporary relief, they often raise prices, shrink job opportunities, and weaken industries in the long run.
Without a clear strategy for innovation and industrial modernization, the U.S. risks repeating past mistakes of isolating itself from global trade rather than strengthening its economy.
At this point, only time will tell whether these tariffs will truly help Americans or will they, once again, make the rich richer and the poor poorer.
-
@ 502ab02a:a2860397
2025-05-14 06:36:13ยŕšŕ¸ŕ¸ŕ¸ŕ¸Ľŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸ ŕšŕ¸Ąŕšŕ¸§ŕšŕ¸˛ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸˛ŕ¸§ŕ¸ŕ¸¸ŕšŕ¸ŕ¸Ťŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸˘ŕ¸šŕšŕ¸Łŕšŕ¸ŕ¸ľŕ¸˘ ŕ¸ŕ¸˛ŕ¸§ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸ŕšŕ¸Ťŕ¸ŕ¸ˇŕ¸ ญรมŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸°ŕšŕ¸Ľŕ¸ŕ¸Łŕ¸˛ŕ¸˘ŕšŕ¸ŕ¸ŕ¸ŕ¸°ŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸ ฼ŕšŕ¸§ŕ¸ŕ¸Ąŕ¸ľŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸ľŕšŕ¸˘ŕ¸§ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸Ąŕ¸§ŕ¸ąŕ¸§ ŕ¸ŕ¸Ąŕ¸ŕ¸˛ŕ¸Ąŕ¸Łŕ¸ľ ŕ¸ŕ¸Ąŕšŕ¸ŕ¸° ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕšŕ¸Ľŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ľŕšŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸˛ŕ¸ŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸Łŕ¸šŕ¸ŕšŕ¸ŕšŕ¸ âŕšŕ¸ŕ¸˘â ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸ŕ¸Şŕ¸ ŕšŕ¸ŕ¸˘ŕ¸Ťŕ¸Ąŕ¸ąŕ¸
ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸˛ŕšŕ¸ŕšŕ¸ŕ¸ľŕšŕ¸Şŕ¸¸ŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ľŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸śŕ¸ ŕ¸ŕ¸ˇŕ¸ âBog Butterâ ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸Łŕšŕšŕ¸Ľŕ¸ŕ¸ŕš ŕšŕ¸Ąŕšŕšŕ¸ŕš blockbuster ŕ¸ŕ¸° ฎาŕšŕšŕš âBog Butterâ ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ľŕšŕ¸ŕ¸šŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸§ŕšŕšŕ¸ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸Łŕ¸¸ (bog) ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸Łŕšŕšŕ¸Ľŕ¸ŕ¸ŕšŕšŕ¸Ľŕ¸°ŕ¸Şŕ¸ŕšŕ¸ŕ¸ŕšŕ¸Ľŕ¸ŕ¸ŕš ลาญ฼ายรŕšŕ¸ŕ¸˘ŕ¸ŕ¸śŕ¸ŕ¸Ťŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľ ŕšŕ¸ŕ¸˘ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸˛ŕšŕ¸Şŕ¸ľŕ¸˘! ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸Łŕ¸¸ŕ¸Ąŕ¸ľŕ¸Şŕ¸ าŕ¸ŕšŕ¸§ŕ¸ŕ¸Ľŕšŕ¸ŕ¸Ąŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸ ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕšŕ¸ŕ¸ ŕšŕ¸Ľŕ¸°ŕšŕ¸˘ŕšŕ¸ ŕ¸ŕ¸śŕ¸ŕšŕ¸ŕšŕ¸ŕ¸Şŕ¸ าวะŕ¸ŕ¸ľŕšŕšŕ¸Ťŕ¸Ąŕ¸˛ŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ŕ¸˛ŕ¸Ťŕ¸˛ŕ¸Łŕšŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸Şŕ¸¸ŕ¸ ŕš
ล฾ญ฼ูŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕšŕ¸ŕ¸ŕ¸ Bog Butter ŕ¸ŕ¸˛ŕ¸˘ŕ¸¸ŕ¸Łŕ¸˛ŕ¸§ 3,000 ŕ¸ŕ¸ľ (ยุŕ¸ŕšŕ¸Ťŕ¸Ľŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸) ŕšŕ¸ŕ¸Ťŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸Łŕšŕšŕ¸Ľŕ¸ŕ¸ŕš ŕšŕ¸ŕšŕ¸ County Offaly, County Cavan ŕšŕ¸Ľŕ¸° County Fermanagh ฼ูŕ¸ŕ¸Šŕ¸ŕ¸°ŕ¸ŕ¸ŕ¸ Bog Butter ŕ¸ŕ¸ľŕšŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ ŕ¸ŕ¸˛ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸˘ŕ¸ąŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕšŕ¸ŕ¸Şŕ¸ าŕ¸ŕ¸ŕ¸ľ ล฾ส฾ŕšŕ¸Ťŕ¸Ľŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ ŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ ŕšŕ¸Ľŕ¸°ŕ¸˘ŕ¸ąŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸Ľŕ¸´ŕšŕ¸ŕ¸ŕ¸Ľŕšŕ¸˛ŕ¸˘ŕ¸ŕ¸ľŕ¸Şŕ¸ŕ¸ľŕšŕ¸Şŕ¸¸ŕ¸ŕ¸Ąŕ¸˛ŕ¸ ๠ภาŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕšŕ¸Şŕšŕšŕ¸ŕ¸˘ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸Ąŕš ŕ¸ŕ¸Ľŕšŕ¸ŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ ญรมŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸Ťŕ¸ŕ¸ąŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸§ŕšŕ¸ŕ¸šŕ¸ŕšŕ¸§ŕšŕšŕ¸ŕšŕ¸ ŕš
ŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸§ŕšŕ¸˛ Bog Butter ŕ¸ŕ¸ˇŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Ąŕ¸Şŕ¸ąŕ¸ŕ¸§ŕš (ŕ¸ŕ¸Ąŕ¸§ŕ¸ąŕ¸§ŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕ¸ŕ¸Ąŕšŕ¸ŕ¸°) ŕ¸ŕ¸ľŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Ťŕ¸Ąŕ¸ąŕ¸ŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕšŕ¸ŕ¸ľŕšŕ¸˘ŕ¸§ŕšŕ¸Ľŕšŕ¸§ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸łŕšŕ¸ŕ¸ŕ¸ąŕ¸ ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Ąŕšŕ¸§ŕšŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸¤ŕ¸ŕ¸šŕ¸Ťŕ¸ŕ¸˛ŕ¸§ŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕšŕ¸ŕ¸ŕ¸ľŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸łŕ¸ŕ¸Ąŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸Ľŕ¸ ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸¤ŕ¸Šŕ¸ŕ¸ľŕ¸ŕšŕšŕ¸Şŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ŕ¸Ąŕ¸ľŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸Ťŕ¸ŕ¸¸ŕ¸ŕ¸Ľŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ľŕ¸ŕ¸Łŕ¸Łŕ¸Ą ญรมŕ¸ŕšŕ¸ŕšŕšŕ¸ŕšŕ¸ âŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸˘ŕšŕ¸Şŕ¸´ŕ¸â ŕ¸ŕ¸ľŕšŕ¸ŕ¸˛ŕ¸ŕšŕ¸§ŕšŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸Şŕ¸ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Ąŕ¸ąŕšŕ¸ŕ¸ŕ¸ąŕšŕ¸
ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸ŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸ŕ¸ľŕšŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕšŕ¸ŕ¸ ŕšŕ¸Ąŕšŕšŕ¸ŕšŕšŕ¸ŕ¸Ľŕ¸ˇŕ¸ ŕšŕ¸Ľŕ¸°ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕšŕ¸łŕšŕ¸ŕšŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľ ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸ŕ¸˛ŕ¸¨ŕ¸ąŕ¸˘ŕ¸Şŕ¸ าŕ¸ŕšŕ¸§ŕ¸ŕ¸Ľŕšŕ¸ŕ¸Ąŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸Şŕ¸¸ŕ¸ ๠มีŕ¸ŕšŕ¸ŕ¸Ąŕ¸šŕ¸Ľŕ¸§ŕšŕ¸˛ŕšŕ¸ŕ¸˛ŕ¸Ąŕ¸ľŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸´ŕ¸Ą Bog Butter ŕ¸ŕ¸ľŕšŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸° ล฾ŕ¸ŕ¸łŕ¸ŕ¸Łŕ¸Łŕ¸˘ŕ¸˛ŕ¸˘ŕšŕ¸§ŕšŕ¸§ŕšŕ¸˛ âลูŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸Ľŕ¸´ŕšŕ¸ŕ¸ŕ¸ľŕ¸Şŕšŕ¸ŕšŕ¸Ąŕ¸ŕšŕ¸ ŕ¸ŕ¸Ľŕ¸´ŕšŕ¸ŕ¸ŕ¸´ŕ¸ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ ŕš ŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸§ŕ¸ąŕ¸ŕ¸´ŕ¸¨ŕ¸˛ŕ¸Şŕ¸ŕ¸Łŕšâ 5555
ŕšŕ¸ŕ¸˘ŕšŕ¸ŕš (butter) ŕ¸ŕšŕ¸ŕ¸ˇŕ¸ŕ¸ŕšŕ¸łŕ¸ŕ¸Ąŕ¸ŕ¸ľŕšŕ¸ŕ¸šŕ¸ŕšŕ¸˘ŕ¸ŕšŕ¸ŕ¸˛ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ľ (churning) ŕšŕ¸ŕ¸˘ŕ¸ŕ¸˛ŕ¸¨ŕ¸ąŕ¸˘ŕšŕ¸Łŕ¸ŕ¸Ąŕ¸ˇŕ¸ŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕšŕ¸Łŕ¸ŕ¸ŕ¸Ľ ŕšŕ¸ŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕ¸ŕ¸°ŕ¸Łŕ¸§ŕ¸Ąŕšŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸Ľŕšŕ¸ ŕš ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕ¸ŕ¸Ąŕšŕ¸Ťŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸§ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸˘ŕšŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˘ ŕšŕ¸Ľŕšŕ¸§ŕšŕ¸˘ŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕšŕ¸łŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕšŕ¸Ąŕ¸´ŕ¸Ľŕ¸ŕšŕ¸ŕ¸ŕ¸ŕšŕ¸ ŕ¸ŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸ˇŕ¸ŕšŕ¸§ŕšŕšŕ¸ŕšŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ľŕšŕ¸Ťŕ¸ŕ¸Ą ลูภŕšŕ¸Ľŕ¸°ŕ¸ŕ¸¸ŕ¸ŕ¸Ąŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸§ŕ¸´ŕ¸ŕ¸˛ŕ¸Ąŕ¸´ŕ¸ A, D, E, K ŕšŕ¸ŕ¸Łŕ¸šŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸šŕ¸ŕ¸ŕ¸śŕ¸Ąŕ¸ŕšŕ¸˛ŕ¸˘ ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸Ľŕ¸°ŕ¸Ľŕ¸˛ŕ¸˘ŕšŕ¸ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸
ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸Ťŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸˘ŕ¸šŕšŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸°ŕ¸Ąŕ¸ľ 3 สŕšŕ¸§ŕ¸ŕšŕ¸Ťŕ¸ŕšŕšŕšŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸Ťŕ¸Ąŕ¸˛ŕ¸Łŕ¸§ŕ¸Ąŕ¸ŕ¸ˇŕ¸
1 ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸Ą/ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕ¸˘ ญรมภbutter oil 2 ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸Ą ญรมภsolid milk 3 สŕšŕ¸§ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸§ŕ¸ŕšŕ¸˛ŕ¸ŕš ญรมภmoisture ŕ¸ŕ¸ˇŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕ¸˛ŕ¸°ŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ŕ¸ŕšŕ¸łŕ¸ŕ¸śŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸Ťŕ¸Ąŕ¸ŕ¸Łŕ¸ąŕ¸ ŕ¸ŕ¸Ąŕ¸Ąŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸ŕ¸˛ŕ¸ŕ¸´ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸Ąŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸Şŕ¸Ąŕ¸Şŕ¸ąŕ¸ŕ¸Şŕšŕ¸§ŕ¸ ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸°ŕ¸Ąŕ¸¸ŕšŕ¸ŕ¸§ŕšŕ¸˛ŕšŕ¸ŕšŕ¸ŕ¸ŕšŕ¸łŕšŕ¸Ľŕ¸˘ŕ¸ŕ¸śŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕšŕ¸Şŕ¸ľŕ¸˘ŕ¸ŕ¸ľŕšŕ¸ŕ¸ľŕ¸˘ŕ¸§ ภาชาŕšŕ¸ŕ¸˘ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸śŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕ¸Ľŕšŕ¸§ŕšŕ¸§ŕšŕ¸˛ŕ¸Şŕšŕ¸§ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸ˇŕšŕ¸ *ŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ľŕ¸Ťŕ¸Ąŕ¸˛ŕ¸˘ŕšŕ¸Ťŕ¸ŕ¸¸ŕšŕ¸§ŕšŕ¸ŕ¸´ŕ¸ŕ¸Ťŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸§ŕšŕ¸˛ ŕšŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ľŕš ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸°ŕšŕ¸ŕ¸ŕ¸ าชาŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸¤ŕ¸Šŕ¸Ťŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸łŕ¸ŕ¸°ŕ¸ŕ¸Łŕ¸ąŕ¸ ŕšŕ¸ŕšŕ¸ butterfat, butter oil, fat milk ŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Ťŕšŕšŕ¸ŕšŕ¸˛ŕšŕ¸ŕšŕ¸§ŕšŕ¸§ŕšŕ¸˛ŕ¸Ąŕ¸ąŕ¸ŕ¸Ťŕ¸Ąŕ¸˛ŕ¸˘ŕ¸ŕ¸śŕ¸ŕ¸Şŕ¸´ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸§ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸Ťŕ¸Ľŕ¸°ŕ¸ŕ¸Łŕ¸ąŕ¸
สิŕšŕ¸ŕ¸Şŕ¸łŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸łŕšŕ¸ŕ¸˘ŕ¸ŕ¸ˇŕ¸ ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Ąŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸ŕ¸ ŕ¸ŕ¸Ąŕ¸Şŕšŕ¸§ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸Şŕ¸šŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸Łŕ¸˛ŕšŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕ¸§ŕšŕ¸˛ ŕ¸ŕ¸Łŕ¸ľŕ¸Ą ŕ¸ŕ¸śŕ¸ŕ¸ าŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸šŕ¸ŕ¸ŕšŕ¸˛ŕ¸˘ŕšŕšŕ¸ŕšŕ¸§ŕšŕ¸˛ ŕšŕ¸Łŕ¸˛ŕ¸ŕšŕ¸ŕ¸ŕšŕšŕ¸ŕ¸˛ŕšŕ¸ŕ¸ŕ¸˛ŕ¸°ŕ¸Şŕšŕ¸§ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸° ŕšŕ¸Ľŕšŕ¸§ŕšŕ¸ŕ¸˛ŕ¸Ąŕ¸˛ŕ¸ŕ¸łŕ¸Ąŕ¸˛ŕ¸ŕ¸łŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ ŕ¸ŕ¸Ľŕšŕ¸ŕ¸˘ŕ¸ŕ¸´ŕšŕ¸ŕ¸Şŕšŕ¸§ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ŕ¸ľŕšŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕ¸˛ŕšŕ¸§ŕšŕ¸ŕ¸łŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ˇŕšŕ¸ (ลูŕ¸ŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸Ąŕ¸ŕ¸Łŕšŕ¸ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕ¸˘ ŕ¸ŕ¸¸ŕšŕ¸ŕ¸Ąŕ¸° ŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸´ŕ¸ŕšŕšŕ¸ŕšŕ¸˛ŕšŕ¸Ąŕšŕšŕ¸ŕšŕšŕ¸ŕ¸˛ŕ¸Şŕšŕ¸§ŕ¸ŕ¸ŕ¸ľŕšŕ¸Ąŕ¸˛ŕ¸ŕ¸˛ŕ¸˘ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Ąŕšŕ¸Ťŕšŕšŕ¸Łŕ¸˛ŕ¸Ťŕ¸Łŕ¸ŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸Łŕ¸ąŕ¸ ŕšŕ¸Łŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸Ľŕ¸°ŕšŕ¸Łŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸Ľŕ¸ŕšŕ¸ŕ¸Ľŕ¸´ŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸Şŕ¸´ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸ľŕšŕ¸ŕ¸ľŕ¸ŕ¸ľŕšŕ¸Şŕ¸¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸§ŕšŕ¸ŕ¸´ŕ¸ ŕ¸ŕ¸°ŕšŕ¸Ąŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕšŕ¸˛ŕ¸˘ŕšŕ¸ŕ¸˛ŕšŕ¸¨ŕ¸Šŕšŕ¸ŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸łŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸˘ŕšŕ¸Ťŕšŕšŕ¸Łŕ¸˛)
ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸Łŕ¸ľŕ¸˘ŕ¸Ąŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸°ŕšŕ¸ŕšŕ¸˛ŕ¸Şŕ¸šŕšŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸Ľŕ¸´ŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕšŕ¸ŕ¸°ŕ¸Ąŕ¸ľŕ¸Ťŕ¸Ľŕ¸˛ŕ¸ŕ¸Ťŕ¸Ľŕ¸˛ŕ¸˘ŕ¸Łŕ¸šŕ¸ŕšŕ¸ŕ¸ŕ¸˘ŕ¸ŕ¸ŕ¸ąŕ¸§ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸
-Sour cream butter ญรมภCultured butter ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸˛ŕ¸Şŕšŕ¸ŕ¸ŕšŕ¸Łŕ¸Şŕš(ŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸ˇŕšŕ¸) ŕšŕ¸Ľŕšŕ¸§ŕ¸Ťŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸¸ŕ¸Ľŕ¸´ŕ¸ŕ¸ŕ¸Łŕ¸ľŕ¸˘ŕšŕšŕ¸Ľŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕšŕ¸Ąŕšŕ¸ŕšŕšŕ¸Ľŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸Ľŕ¸ąŕ¸Ş ŕ¸ŕ¸łŕšŕ¸Ťŕšŕ¸Ąŕ¸ľŕ¸ŕ¸Ľŕ¸´ŕšŕ¸ŕšŕ¸Ľŕ¸°ŕ¸Łŕ¸Şŕ¸ŕ¸ľŕšŕ¸ŕ¸ľ -Neutralized sour cream butter ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕ¸ŕ¸ľŕšŕ¸Ťŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸¸ŕ¸Ľŕ¸´ŕ¸ŕ¸ŕ¸Łŕ¸ľŕ¸˘ŕšŕšŕ¸Ľŕšŕ¸§ŕšŕ¸ŕ¸˛ŕšŕ¸ŕ¸ŕ¸łŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸Ąŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕšŕ¸ŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸Ąŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ ŕšŕ¸ŕ¸Ľŕšŕ¸ŕ¸ľŕ¸˘ŕ¸Ąŕšŕ¸Žŕ¸ŕ¸Łŕ¸ŕ¸ŕšŕ¸ŕ¸ŕš รวลŕ¸ŕ¸ąŕ¸ ŕšŕ¸Ąŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ľŕ¸˘ŕ¸Ąŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕš ญรมภŕšŕ¸Ąŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ľŕ¸˘ŕ¸Ąŕšŕ¸Žŕ¸ŕ¸Łŕ¸ŕ¸ŕšŕ¸ŕ¸ŕš -Sweet cream butter ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ľŕšŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸˛ŕ¸Şŕšŕ¸ŕ¸ŕšŕ¸Łŕ¸Şŕš(ŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸ˇŕšŕ¸) ŕšŕ¸ŕšŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸˛ŕ¸Łŕ¸Ťŕ¸Ąŕ¸ąŕ¸ŕ¸ŕšŕ¸Ą ŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸łŕšŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸łŕšŕ¸ŕ¸˘ŕšŕ¸Ľŕ¸˘ ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸°ŕ¸Ąŕ¸ľŕ¸ŕ¸Ľŕ¸´ŕšŕ¸ŕ¸ŕ¸Ľŕšŕ¸˛ŕ¸˘ŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕ¸ŕšŕ¸˛ŕ¸˘ŕ¸ľŕšŕ¸Ťŕšŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕšŕšŕ¸Ąŕšŕšŕ¸ŕšŕšŕ¸ŕ¸´ŕ¸Ąŕ¸ŕ¸Ľŕ¸´ŕšŕ¸ŕ¸Ľŕ¸ŕšŕ¸ŕšŕ¸ŕ¸´ŕšŕ¸Ąŕ¸ŕ¸°ŕ¸ŕ¸Łŕ¸ąŕ¸ รสŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸ŕ¸°ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸Ťŕ¸§ŕ¸˛ŕ¸ŕ¸ŕ¸´ŕ¸ŕš ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸Ąŕ¸ľŕ¸ŕšŕ¸łŕ¸ŕ¸˛ŕ¸Ľŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸ŕ¸˛ŕ¸ŕ¸´ŕšŕ¸ŕ¸ŕ¸Ąŕ¸ŕ¸˘ŕ¸šŕšŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Ťŕ¸Ąŕ¸ąŕ¸ ŕšŕ¸ŕšŕšŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸§ŕ¸Ľŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕšŕ¸Ąŕšŕ¸ŕ¸śŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸Ťŕ¸§ŕ¸˛ŕ¸ŕšŕ¸§ŕ¸ŕ¸Łŕš ลูŕ¸ŕ¸ŕ¸°ŕšŕ¸ŕšŕ¸Ťŕ¸§ŕ¸˛ŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ŕ¸´ŕ¸ Cultured butter ŕšŕ¸ŕšŕ¸ŕ¸ąŕšŕ¸ -Semi-culture butter ญรมภEuropean-style butter ญรมภFresh cream butter ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕ¸ŕ¸ľŕšŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Ťŕ¸Ąŕ¸ąŕ¸ ŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸łŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸§ŕ¸ŕ¸ąŕ¸ Sweet cream butter ŕšŕ¸ŕšŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Şŕ¸¸ŕ¸ŕ¸ŕšŕ¸˛ŕ¸˘ŕ¸Ąŕ¸ľŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸´ŕ¸Ąŕ¸ŕ¸Ľŕ¸´ŕšŕ¸ŕ¸Łŕ¸Şŕšŕ¸Ľŕ¸°ŕ¸ŕ¸Łŕ¸ŕšŕ¸Ľŕ¸ŕ¸ŕ¸´ŕ¸ ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Ąŕ¸Ťŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸¸ŕ¸Ľŕ¸´ŕ¸ŕ¸ŕ¸Łŕ¸ľŕ¸˘ŕšŕšŕ¸Ľŕšŕ¸§ŕšŕ¸ŕ¸˛ŕšŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸˛ŕ¸Ł ŕ¸ŕ¸ąŕ¸Ľŕ¸ŕ¸Łŕšŕ¸˛ŕ¸ŕ¸´ŕ¸Ľŕšŕ¸ŕ¸Łŕ¸ŕ¸ąŕ¸ (Ultrafiltration) ŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸Ťŕšŕšŕ¸ŕšŕ¸Ąŕ¸ŕšŕ¸ŕ¸ŕ¸śŕšŕ¸ -Raw butter cream ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ľŕšŕ¸ŕ¸Ľŕ¸´ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕšŕ¸łŕ¸ŕ¸Ąŕ¸ŕ¸´ŕ¸ ŕšŕ¸Ąŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸˛ŕ¸Şŕšŕ¸ŕ¸ŕšŕ¸Łŕ¸Şŕš(ŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸ˇŕšŕ¸) ŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕ¸´ŕ¸ŕšŕšŕ¸Ľŕ¸˘ ŕ¸ŕ¸Ąŕ¸ŕ¸´ŕ¸ŕ¸Şŕ¸ŕšŕ¸Ąŕ¸˛ŕšŕ¸˘ŕ¸ŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕšŕ¸Ľŕšŕ¸§ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸łŕšŕ¸ŕ¸˘ŕšŕ¸Ľŕ¸˘ŕšŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸´ŕ¸Ąŕ¸ŕ¸°ŕšŕ¸Łŕ¸ŕ¸ąŕšŕ¸ŕ¸Şŕ¸´ŕšŕ¸ ŕ¸ŕ¸¸ŕ¸ŕ¸ าŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸°ŕšŕ¸ŕ¸Łŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸Ąŕ¸ŕ¸¸ŕ¸ŕ¸ าŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸łŕ¸ŕ¸Ąŕ¸ŕ¸´ŕ¸ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕ¸ľŕšŕ¸˘ŕ¸§ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸šŕšŕ¸ŕ¸ľŕšŕ¸ŕ¸Ľŕ¸´ŕ¸ŕšŕ¸ŕ¸˘ ŕ¸ŕ¸˛ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸°ŕ¸Şŕ¸ąŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸°ŕ¸Ąŕ¸˛ŕ¸ 7-10วูŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸Şŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸ŕš
ŕšŕ¸Ťŕšŕ¸ŕšŕ¸Ťŕ¸Ąŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸§ŕšŕ¸˛ ŕšŕ¸ŕ¸˘ŕšŕ¸ŕšŕ¸Ľŕ¸°ŕ¸˘ŕ¸ľŕšŕ¸Ťŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸°ŕ¸Ąŕ¸ľŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸§ŕ¸´ŕ¸ŕ¸ľŕ¸ŕ¸Ľŕ¸´ŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸Łŕ¸šŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸ ŕšŕ¸ŕ¸˘ŕ¸ŕšŕ¸Ąŕ¸ŕšŕ¸ŕ¸°ŕ¸Ąŕ¸ľŕ¸ŕ¸Ľŕ¸´ŕšŕ¸ŕ¸Ťŕ¸ŕ¸Ąŕ¸Łŕ¸Şŕ¸ŕ¸ľŕšŕ¸Ťŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸Ąŕ¸˛ŕ¸ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸§ŕšŕ¸˛ŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸ sweet cream สŕšŕ¸§ŕ¸ŕšŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸˘ sweet cream ŕšŕ¸ŕ¸ŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Şŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕ¸Łŕ¸ ŕ¸ŕ¸Ľŕ¸´ŕšŕ¸ŕšŕ¸ŕ¸˛ŕšŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕšŕ¸Ąŕ¸ľŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Ťŕ¸§ŕ¸˛ŕ¸ŕ¸Ťŕ¸Ľŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸ˇŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕšŕ¸Ľŕ¸°ŕ¸Ąŕ¸ľŕ¸Łŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸šŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ สŕšŕ¸§ŕ¸ŕ¸ŕ¸ąŕ¸§ raw butter ŕ¸ŕšŕ¸ŕ¸°ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸˛ŕ¸ŕ¸ŕš ŕ¸ŕ¸Ľŕ¸˛ŕ¸Şŕ¸Şŕ¸´ŕ¸
ŕšŕ¸ŕ¸˘ Home made ŕ¸ŕ¸łŕ¸˘ŕ¸ąŕ¸ŕšŕ¸ ŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸˛ŕ¸ŕ¸łŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕšŕšŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕšŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ sweet cream butter ญรมภŕšŕ¸ŕ¸˘ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕ¸Şŕ¸ŕšŕ¸Ąŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Ťŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸°ŕšŕ¸Łŕšŕ¸Ľŕ¸˘ ŕšŕ¸§ŕšŕ¸ŕšŕ¸ŕšŕšŕ¸ŕ¸´ŕ¸Ąŕšŕ¸ŕ¸Ľŕ¸ˇŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸Ťŕšŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸ŕšŕ¸Ą (ŕ¸ŕ¸Łŕ¸´ŕ¸ŕšŕšŕ¸ŕ¸´ŕ¸Ąŕšŕ¸ŕ¸Ľŕ¸ˇŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸˘ŕ¸ˇŕ¸ŕ¸ŕ¸˛ŕ¸˘ŕ¸¸ŕšŕ¸ŕ¸˘ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸ŕ¸Łŕ¸°ŕ¸˘ŕ¸°ŕ¸Ťŕ¸ŕ¸śŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸° ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸) ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸§ŕ¸´ŕ¸ŕ¸ľŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸łŕšŕ¸ŕ¸˘ ŕšŕ¸ŕ¸˛ŕ¸ŕ¸°ŕšŕ¸ŕ¸˛ŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕšŕ¸ ŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸Ťŕšŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸˘ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸ŕšŕ¸ grain (ŕšŕ¸ŕ¸˛ŕšŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕ¸§ŕšŕ¸˛ butter granule/butter curds) ŕ¸ŕ¸ąŕ¸ ญาŕ¸ŕšŕ¸ŕ¸˘ (butter milk) ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸§ŕ¸ŕ¸ľŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸Ąŕšŕ¸Ąŕšŕ¸Łŕ¸§ŕ¸Ąŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸Ľŕšŕ¸§ŕ¸ŕšŕ¸ŕšŕ¸ł ŕšŕ¸Ľŕšŕ¸§ŕšŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸°ŕšŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ľŕšŕšŕ¸Ťŕ¸Ľŕ¸°ŕšŕ¸ŕ¸Ľŕšŕ¸˛ŕ¸ŕ¸ŕšŕ¸łŕšŕ¸˘ŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸Ľŕ¸´ŕšŕ¸ŕ¸Ťŕ¸ˇŕ¸ŕšŕšŕ¸Ľŕ¸°ŕ¸Łŕ¸Şŕ¸ŕ¸Łŕ¸°ŕ¸Ťŕ¸Ľŕ¸˛ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕšŕ¸ ŕ¸ŕ¸łŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸Ľŕšŕ¸§ŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ľŕšŕ¸ŕ¸ŕšŕ¸ŕ¸śŕšŕ¸ŕ¸Łŕ¸šŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕšŕ¸ŕšŕ¸
ŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸°ŕšŕ¸Ťŕšŕšŕ¸Ťŕšŕ¸ŕ¸ าŕ¸ŕ¸ŕ¸śŕšŕ¸ ŕšŕ¸ŕ¸Łŕ¸ŕ¸łŕ¸ŕ¸ŕ¸Ąŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸šŕšŕ¸ŕ¸ľ ŕšŕ¸§ŕ¸Ľŕ¸˛ŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸˛ŕ¸ŕ¸ľŕ¸§ŕ¸´ŕ¸ŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕ¸Ąŕ¸˛ŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕšŕ¸ ลูŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸Ľŕ¸°ŕšŕ¸˘ŕ¸ŕ¸ŕ¸ąŕšŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ąŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸§ŕš ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ˇŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸ŕ¸˘ ŕšŕ¸ŕšŕšŕ¸Ťŕ¸Ľŕ¸§ŕšŕ¸ŕšŕ¸ŕ¸ˇŕ¸ butter milk
ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ł ŕšŕ¸ŕ¸˘ŕ¸Şŕ¸ homemade fresh butter ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸ŕšŕ¸Łŕ¸˛ŕ¸ŕšŕ¸ŕ¸łŕšŕ¸ŕšŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸łŕ¸Ľŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕšŕ¸ŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕ¸ŕ¸ŕ¸Ą ŕ¸ŕ¸°ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕ¸Ąŕ¸ˇŕ¸ŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸ąŕ¸ ญรมŕ¸ŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸°ŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸ŕ¸ŕšŕšŕ¸ŕ¸˛ŕšŕ¸Şŕšŕ¸ŕ¸§ŕ¸ŕ¸ŕšŕ¸łŕšŕ¸Ľŕšŕ¸§ŕšŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕšŕ¸ŕšŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸Łŕ¸ąŕ¸ ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕ¸ŕ¸śŕ¸ŕ¸Łŕ¸°ŕ¸˘ŕ¸°ŕšŕ¸§ŕ¸Ľŕ¸˛ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸Łŕ¸ľŕ¸Ąŕ¸ŕšŕ¸ŕ¸°ŕšŕ¸˘ŕ¸ŕ¸ŕ¸ąŕ¸§ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ ŕ¸ŕ¸ąŕ¸ butter milk
฼ŕ¸ŕ¸ŕ¸ŕ¸šŕ¸ŕ¸ľŕšŕ¸ŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸ŕ¸łŕšŕ¸§ŕšŕšŕ¸ŕ¸ŕ¸Ľŕ¸´ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸ąŕ¸ https://youtu.be/bzo7V9n2cxc?si=0ZvcAT1H-6h1ZmUh
ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸Ąŕ¸ľŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕšŕ¸¨ŕ¸Šŕ¸ŕ¸ľŕšŕšŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸šŕ¸ŕ¸ŕ¸šŕ¸ŕ¸ŕ¸śŕ¸ŕšŕ¸ŕšŕ¸˛ŕšŕ¸Łŕ¸ŕ¸ąŕ¸ ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸Łŕ¸ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸Şŕ¸˛ŕ¸˘ŕ¸Şŕ¸ąŕšŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ butyric acid ŕ¸ŕ¸śŕšŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸ˇŕšŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸łŕ¸§ŕšŕ¸˛ âbutterâ ŕšŕ¸Ľŕ¸˘ ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸Ąŕ¸ąŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸Ľŕ¸łŕšŕ¸Şŕš ŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸ŕ¸˛ŕ¸°ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Ťŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸Ľŕ¸Ľŕšŕšŕ¸˘ŕ¸ˇŕšŕ¸ŕ¸ŕ¸¸ŕ¸Ľŕ¸łŕšŕ¸Şŕšŕšŕ¸Ťŕ¸ŕš ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸Ľŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ąŕ¸ŕšŕ¸Şŕ¸ŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˛ŕ¸Ťŕ¸˛ŕ¸Ł
สูŕ¸ŕ¸Şŕšŕ¸§ŕ¸ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸Şŕšŕ¸§ŕ¸ŕšŕ¸Ťŕ¸ŕšŕ¸ŕ¸°ŕšŕ¸ŕšŕ¸ ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸´ŕšŕ¸Ąŕ¸ŕ¸ąŕ¸§ (SFA) ราว 50-65%, ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸´ŕšŕ¸Ąŕ¸ŕ¸ąŕ¸§ŕšŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸ľŕšŕ¸˘ŕ¸§ (MUFA) ŕ¸ŕ¸Łŕ¸°ŕ¸Ąŕ¸˛ŕ¸ 25-30% ŕšŕ¸Ľŕ¸°ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸´ŕšŕ¸Ąŕ¸ŕ¸ąŕ¸§ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕšŕ¸ŕ¸ (PUFA) ราว 2-5% ŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ąŕšŕ¸ ŕšŕ¸ŕšŕšŕ¸ŕ¸Şŕšŕ¸§ŕ¸ŕ¸ŕ¸ŕ¸ PUFA ŕ¸ŕ¸ąŕšŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸´ŕšŕ¸¨ŕ¸Šŕšŕ¸Ľŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˘ ŕ¸ŕ¸ľŕšŕ¸ŕ¸°ŕ¸ŕ¸¸ŕ¸˘ŕšŕ¸ŕ¸ŕšŕ¸łŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸§ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸
ŕšŕ¸ŕšŕ¸Ľŕ¸ŕ¸ŕ¸°ŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸ŕ¸˛ŕ¸°ŕ¸ŕ¸Łŕ¸ąŕšŕ¸ŕšŕ¸¨ŕ¸Ş ŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸Ľŕ¸ľ ŕšŕ¸Ľŕ¸°ŕ¸˘ŕ¸¸ŕšŕ¸Łŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸Ťŕ¸ŕ¸ˇŕ¸ ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸Łŕ¸°ŕšŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸łŕ¸Ťŕšŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸§ ŕšŕ¸ŕšŕ¸ŕ¸ąŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Ąŕ¸ŕ¸ąŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸šŕšŕ¸ŕ¸ąŕ¸ŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸ traditional food ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸Şŕ¸˛ŕ¸Ťŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸ŕ¸ľŕšŕ¸ŕ¸Ľŕ¸ąŕ¸ŕšŕ¸Ťŕšŕšŕ¸ŕ¸˘ŕšŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸ŕ¸Ąŕ¸¸ŕ¸Ą ŕšŕ¸Ľŕšŕ¸§ŕšŕ¸ŕ¸˛ margarine ญรมภshortening ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕ¸Łŕ¸Łŕ¸šŕ¸ŕ¸Ąŕ¸˛ŕšŕ¸ŕ¸ ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸Šŕ¸ŕ¸˛ŕšŕ¸ŕ¸ fiat food ŕ¸ŕ¸Ľŕšŕ¸˛ŕ¸˘ŕ¸ŕ¸ąŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Žŕ¸ľŕ¸˘ŕšŕ¸ŕ¸˘ŕ¸ŕ¸šŕ¸ŕ¸ŕšŕ¸ŕ¸˘ ŕš ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸°
ŕšŕ¸ŕ¸ŕ¸Łŕ¸°ŕšŕ¸ŕ¸¨ŕšŕ¸ŕ¸˘ŕšŕ¸Łŕ¸˛ŕšŕ¸ŕ¸ŕ¸ŕšŕ¸Ąŕ¸ľŕšŕ¸ŕ¸˘ŕ¸§ŕ¸ąŕ¸§ŕšŕ¸ŕšŕšŕ¸ŕ¸ŕ¸˛ŕ¸Ťŕ¸˛ŕ¸Łŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ ŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸ŕ¸˛ŕ¸°ŕ¸ŕ¸ŕ¸Ąŕ¸ŕ¸ ŕ¸ŕ¸ŕ¸Ąŕ¸ŕ¸Łŕ¸ąŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸ ญรมŕ¸ŕ¸ŕ¸ŕ¸Ąŕšŕ¸ŕ¸˘ŕ¸Şŕ¸ŕ¸Şŕšŕ¸ŕ¸Ľŕšŕ¸˘ŕ¸¸ŕšŕ¸Łŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸˛ŕ¸Ąŕ¸˛ŕ¸Şŕ¸Ąŕ¸ąŕ¸˘ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸Ľŕ¸ŕ¸ľŕš 5 ŕšŕ¸ŕšŕšŕ¸ŕ¸˘ŕ¸Łŕ¸§ŕ¸Ąŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸Ąŕšŕ¸ŕ¸¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸§ŕ¸Łŕšŕ¸ŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸ŕ¸ąŕ¸ ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸ŕ¸˛ŕ¸Ťŕ¸˛ŕ¸Łŕšŕ¸Łŕ¸˛ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸ŕšŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸§ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸´ŕšŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ ŕšŕ¸ŕšŕ¸ ŕ¸ŕšŕ¸łŕ¸Ąŕ¸ąŕ¸ŕ¸Ťŕ¸Ąŕ¸š ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸§ŕ¸ąŕ¸§ ญรมŕ¸ŕ¸ŕšŕ¸łŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕšŕšŕ¸Ľŕ¸°ŕšŕ¸ŕšŕ¸
ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕšŕ¸ŕ¸˘ŕ¸ŕ¸śŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Şŕ¸ˇŕšŕ¸ŕ¸Şŕ¸˛ŕ¸Łŕ¸ŕšŕ¸˛ŕ¸Ąŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸Ą ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕ¸ŕšŕ¸˛ŕ¸˘ŕ¸ŕ¸ľŕšŕšŕ¸Ľŕšŕ¸˛ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸šŕšŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ŕ¸¸ŕ¸Šŕ¸˘ŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸ŕ¸˛ŕ¸ŕ¸´ŕšŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸Ľŕ¸śŕ¸ŕ¸ŕ¸śŕšŕ¸ ยิŕšŕ¸ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸Ľŕ¸ąŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸śŕ¸ŕ¸ บลิŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕšŕ¸ŕ¸´ŕ¸Ą ŕš ŕ¸ŕšŕ¸ŕ¸°ŕšŕ¸Ťŕšŕ¸ŕ¸§ŕšŕ¸˛ ŕšŕ¸ŕ¸˘ŕšŕ¸Ąŕšŕšŕ¸ŕšŕšŕ¸ŕšŕšŕ¸Ťŕšŕ¸ŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ ŕšŕ¸ŕšŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸ˇŕ¸ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸˛ŕ¸ŕ¸¸ŕ¸ŕ¸ŕšŕ¸˛ŕ¸Şŕ¸˛ŕ¸Łŕ¸ŕ¸˛ŕ¸Ťŕ¸˛ŕ¸Łŕ¸ŕ¸śŕ¸Ąŕ¸Ľŕ¸śŕ¸ŕšŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸¸ŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸˘ŕ¸ˇŕšŕ¸ ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸˛ŕšŕ¸Łŕ¸˛ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Ľŕ¸ąŕ¸ŕšŕ¸ŕ¸Şŕ¸šŕšŕ¸§ŕ¸´ŕ¸ŕ¸ľŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Ťŕ¸˛ŕ¸Łŕ¸ŕ¸Łŕ¸´ŕ¸ (real food) ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸Şŕ¸ŕšŕ¸˛ŕ¸ŕ¸˛ŕ¸Ąŕšŕ¸Ľŕ¸˘ŕ¸Ľŕšŕ¸°
ลาŕ¸ŕ¸śŕ¸ŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸ľŕšŕ¸Şŕ¸˛ŕ¸Ąŕ¸˛ŕ¸Łŕ¸ŕ¸Şŕ¸Łŕ¸¸ŕ¸ŕ¸ŕšŕ¸˛ŕ¸˘ŕšŕ¸ŕ¸ŕšŕ¸Ťŕšŕ¸ŕ¸ าŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕ¸Ťŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸Ľŕšŕ¸§ŕšŕ¸ŕšŕšŕ¸Ťŕ¸Ąŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸§ŕšŕ¸˛ ŕšŕ¸ŕ¸˘ = ŕšŕ¸ŕ¸Ąŕ¸ąŕ¸ butter oil + ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕ¸Ą solid milk + ŕ¸ŕ¸ŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸§ŕ¸ŕ¸ˇŕšŕ¸ŕš
ญ฼ูŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸˛ŕ¸ŕ¸°ŕ¸Ąŕ¸˛ŕ¸ŕ¸¸ŕ¸˘ŕ¸ŕ¸ľŕ¸ŕ¸ŕ¸Ľŕ¸ŕ¸Ľŕ¸´ŕ¸ŕ¸ŕ¸śŕ¸ ŕ¸ŕ¸ľŕšŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸Łŕ¸ąŕ¸ ŕ¸ŕ¸łŕ¸Şŕ¸Ąŕ¸ŕ¸˛ŕ¸Łŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ŕšŕ¸§ŕšŕšŕ¸Ťŕšŕ¸ŕ¸ľŕ¸ŕ¸Łŕ¸ąŕ¸
สำญรูŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸´ŕšŕ¸ŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕšŕ¸ŕšŕ¸˛ŕ¸§ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸˘ ŕ¸ŕ¸ąŕ¸§ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ starter ŕ¸ŕ¸ľŕšŕ¸ŕ¸ľŕ¸ŕ¸Łŕ¸ąŕ¸ วูวŕ¸ŕ¸´ŕ¸ŕ¸Ťŕ¸ŕšŕ¸˛ https://s.shopee.co.th/30bQI86d1Q
#pirateketo #ŕ¸ŕ¸šŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸šŕšŕ¸Ąŕ¸ąŕšŕ¸˘ #ลŕšŕ¸§ŕ¸ŕ¸Ťŕ¸˛ŕ¸ŕ¸Şŕ¸´ŕ¸Ľŕ¸šŕ¸ #siamstr
-
@ 57d1a264:69f1fee1
2025-05-14 06:12:19We asked members of the design community to choose an artifact that embodies craftâsomething that speaks to their understanding of what it means to make with intention. Hereâs what they shared.
A vintage puzzle box, a perfectly tuned guitar, an AI-powered poetry camera. A daiquiri mixed with precision. A spreadsheet that still haunts muscle memory. Each artifact tells a story: not just about the thing itself, but about the choices of the creator behind it. What to refine, what to leave raw. When to push forward, when to let go. Whether built to last for generations or designed to delight in a fleeting moment, the common thread is that great craft doesnât happen by accident. Itâs made.
On the application of craft
Even the most experienced makers can benefit from building structure and intention into their practice. From sharpening your storytelling to designing quality products, these pieces offer practical ways to uplevel your craft.
Read more at https://www.figma.com/blog/craft-artifacts/
originally posted at https://stacker.news/items/979644
-
@ 3b3a42d3:d192e325
2025-04-10 08:57:51Atomic Signature Swaps (ASS) over Nostr is a protocol for atomically exchanging Schnorr signatures using Nostr events for orchestration. This new primitive enables multiple interesting applications like:
- Getting paid to publish specific Nostr events
- Issuing automatic payment receipts
- Contract signing in exchange for payment
- P2P asset exchanges
- Trading and enforcement of asset option contracts
- Payment in exchange for Nostr-based credentials or access tokens
- Exchanging GMs đ
It only requires that (i) the involved signatures be Schnorr signatures using the secp256k1 curve and that (ii) at least one of those signatures be accessible to both parties. These requirements are naturally met by Nostr events (published to relays), Taproot transactions (published to the mempool and later to the blockchain), and Cashu payments (using mints that support NUT-07, allowing any pair of these signatures to be swapped atomically.
How the Cryptographic Magic Works đŞ
This is a Schnorr signature
(Zâ, s)
:s = z + H(Zâ || P || m)â k
If you haven't seen it before, don't worry, neither did I until three weeks ago.
The signature scalar s is the the value a signer with private key
k
(and public keyP = kâ G
) must calculate to prove his commitment over the messagem
given a randomly generated noncez
(Zâ
is just the x-coordinate of the public pointZ = zâ G
).H
is a hash function (sha256 with the tag "BIP0340/challenge" when dealing with BIP340),||
just means to concatenate andG
is the generator point of the elliptic curve, used to derive public values from private ones.Now that you understand what this equation means, let's just rename
z = r + t
. We can do that,z
is just a randomly generated number that can be represented as the sum of two other numbers. It also follows thatzâ G = râ G + tâ G â Z = R + T
. Putting it all back into the definition of a Schnorr signature we get:s = (r + t) + H((R + T)â || P || m)â k
Which is the same as:
s = sâ + t
wheresâ = r + H((R + T)â || P || m)â k
sâ
is what we call the adaptor signature scalar) and t is the secret.((R + T)â, sâ)
is an incomplete signature that just becomes valid by add the secret t to thesâ
:s = sâ + t
What is also important for our purposes is that by getting access to the valid signature s, one can also extract t from it by just subtracting
sâ
:t = s - sâ
The specific value of
t
depends on our choice of the public pointT
, sinceR
is just a public point derived from a randomly generated noncer
.So how do we choose
T
so that it requires the secret t to be the signature over a specific messagem'
by an specific public keyP'
? (without knowing the value oft
)Let's start with the definition of t as a valid Schnorr signature by P' over m':
t = r' + H(R'â || P' || m')â k' â tâ G = r'â G + H(R'â || P' || m')â k'â G
That is the same as:
T = R' + H(R'â || P' || m')â P'
Notice that in order to calculate the appropriate
T
that requirest
to be an specific signature scalar, we only need to know the public nonceR'
used to generate that signature.In summary: in order to atomically swap Schnorr signatures, one party
P'
must provide a public nonceR'
, while the other partyP
must provide an adaptor signature using that nonce:sâ = r + H((R + T)â || P || m)â k
whereT = R' + H(R'â || P' || m')â P'
P'
(the nonce provider) can then add his own signature t to the adaptor signaturesâ
in order to get a valid signature byP
, i.e.s = sâ + t
. When he publishes this signature (as a Nostr event, Cashu transaction or Taproot transaction), it becomes accessible toP
that can now extract the signaturet
byP'
and also make use of it.Important considerations
A signature may not be useful at the end of the swap if it unlocks funds that have already been spent, or that are vulnerable to fee bidding wars.
When a swap involves a Taproot UTXO, it must always use a 2-of-2 multisig timelock to avoid those issues.
Cashu tokens do not require this measure when its signature is revealed first, because the mint won't reveal the other signature if they can't be successfully claimed, but they also require a 2-of-2 multisig timelock when its signature is only revealed last (what is unavoidable in cashu for cashu swaps).
For Nostr events, whoever receives the signature first needs to publish it to at least one relay that is accessible by the other party. This is a reasonable expectation in most cases, but may be an issue if the event kind involved is meant to be used privately.
How to Orchestrate the Swap over Nostr?
Before going into the specific event kinds, it is important to recognize what are the requirements they must meet and what are the concerns they must address. There are mainly three requirements:
- Both parties must agree on the messages they are going to sign
- One party must provide a public nonce
- The other party must provide an adaptor signature using that nonce
There is also a fundamental asymmetry in the roles of both parties, resulting in the following significant downsides for the party that generates the adaptor signature:
- NIP-07 and remote signers do not currently support the generation of adaptor signatures, so he must either insert his nsec in the client or use a fork of another signer
- There is an overhead of retrieving the completed signature containing the secret, either from the blockchain, mint endpoint or finding the appropriate relay
- There is risk he may not get his side of the deal if the other party only uses his signature privately, as I have already mentioned
- There is risk of losing funds by not extracting or using the signature before its timelock expires. The other party has no risk since his own signature won't be exposed by just not using the signature he received.
The protocol must meet all those requirements, allowing for some kind of role negotiation and while trying to reduce the necessary hops needed to complete the swap.
Swap Proposal Event (kind:455)
This event enables a proposer and his counterparty to agree on the specific messages whose signatures they intend to exchange. The
content
field is the following stringified JSON:{ Â Â Â Â "give": <signature spec (required)>, Â Â Â Â "take": <signature spec (required)>, Â Â Â Â "exp": <expiration timestamp (optional)>, Â Â Â Â "role": "<adaptor | nonce (optional)>", Â Â Â Â "description": "<Info about the proposal (optional)>", Â Â Â Â "nonce": "<Signature public nonce (optional)>", Â Â Â Â "enc_s": "<Encrypted signature scalar (optional)>" }
The field
role
indicates what the proposer will provide during the swap, either the nonce or the adaptor. When this optional field is not provided, the counterparty may decide whether he will send a nonce back in a Swap Nonce event or a Swap Adaptor event using thenonce
(optionally) provided by in the Swap Proposal in order to avoid one hop of interaction.The
enc_s
field may be used to store the encrypted scalar of the signature associated with thenonce
, since this information is necessary later when completing the adaptor signature received from the other party.A
signature spec
specifies thetype
and all necessary information for producing and verifying a given signature. In the case of signatures for Nostr events, it contain a template with all the fields, exceptpubkey
,id
andsig
:{ "type": "nostr", "template": { "kind": "<kind>"       "content": "<content>"       "tags": [ ⌠],       "created_at": "<created_at>" } }
In the case of Cashu payments, a simplified
signature spec
just needs to specify the payment amount and an array of mints trusted by the proposer:{   "type": "cashu",   "amount": "<amount>",   "mint": ["<acceptable mint_url>", âŚ] }
This works when the payer provides the adaptor signature, but it still needs to be extended to also work when the payer is the one receiving the adaptor signature. In the later case, the
signature spec
must also include atimelock
and the derived public keysY
of each Cashu Proof, but for now let's just ignore this situation. It should be mentioned that the mint must be trusted by both parties and also support Token state check (NUT-07) for revealing the completed adaptor signature and P2PK spending conditions (NUT-11) for the cryptographic scheme to work.The
tags
are:"p"
, the proposal counterparty's public key (required)"a"
, akind:30455
Swap Listing event or an application specific version of it (optional)
Forget about this Swap Listing event for now, I will get to it later...
Swap Nonce Event (kind:456) - Optional
This is an optional event for the Swap Proposal receiver to provide the public nonce of his signature when the proposal does not include a nonce or when he does not want to provide the adaptor signature due to the downsides previously mentioned. The
content
field is the following stringified JSON:{ Â Â Â Â "nonce": "<Signature public nonce>", Â Â Â Â "enc_s": "<Encrypted signature scalar (optional)>" }
And the
tags
must contain:"e"
, akind:455
Swap Proposal Event (required)"p"
, the counterparty's public key (required)
Swap Adaptor Event (kind:457)
The
content
field is the following stringified JSON:{ "adaptors": [ {         "sa": "<Adaptor signature scalar>",         "R": "<Signer's public nonce (including parity byte)>",         "T": "<Adaptor point (including parity byte)>",         "Y": "<Cashu proof derived public key (if applicable)>",     }, âŚ],     "cashu": "<Cashu V4 token (if applicable)>" }
And the
tags
must contain:"e"
, akind:455
Swap Proposal Event (required)"p"
, the counterparty's public key (required)
Discoverability
The Swap Listing event previously mentioned as an optional tag in the Swap Proposal may be used to find an appropriate counterparty for a swap. It allows a user to announce what he wants to accomplish, what his requirements are and what is still open for negotiation.
Swap Listing Event (kind:30455)
The
content
field is the following stringified JSON:{ "description": "<Information about the listing (required)>", "give": <partial signature spec (optional)>, "take": <partial signature spec (optional)>, "examples: [<take signature spec>], // optional "exp": <expiration timestamp (optional)>, "role": "<adaptor | nonce (optional)>" }
The
description
field describes the restrictions on counterparties and signatures the user is willing to accept.A
partial signature spec
is an incompletesignature spec
used in Swap Proposal eventskind:455
where omitting fields signals that they are still open for negotiation.The
examples
field is an array ofsignature specs
the user would be willing totake
.The
tags
are:"d"
, a unique listing id (required)"s"
, the status of the listingdraft | open | closed
(required)"t"
, topics related to this listing (optional)"p"
, public keys to notify about the proposal (optional)
Application Specific Swap Listings
Since Swap Listings are still fairly generic, it is expected that specific use cases define new event kinds based on the generic listing. Those application specific swap listing would be easier to filter by clients and may impose restrictions and add new fields and/or tags. The following are some examples under development:
Sponsored Events
This listing is designed for users looking to promote content on the Nostr network, as well as for those who want to monetize their accounts by sharing curated sponsored content with their existing audiences.
It follows the same format as the generic Swap Listing event, but uses the
kind:30456
instead.The following new tags are included:
"k"
, event kind being sponsored (required)"title"
, campaign title (optional)
It is required that at least one
signature spec
(give
and/ortake
) must have"type": "nostr"
and also contain the following tag["sponsor", "<pubkey>", "<attestation>"]
with the sponsor's public key and his signature over the signature spec without the sponsor tag as his attestation. This last requirement enables clients to disclose and/or filter sponsored events.Asset Swaps
This listing is designed for users looking for counterparties to swap different assets that can be transferred using Schnorr signatures, like any unit of Cashu tokens, Bitcoin or other asset IOUs issued using Taproot.
It follows the same format as the generic Swap Listing event, but uses the
kind:30457
instead.It requires the following additional tags:
"t"
, asset pair to be swapped (e.g."btcusd"
)"t"
, asset being offered (e.g."btc"
)"t"
, accepted payment method (e.g."cashu"
,"taproot"
)
Swap Negotiation
From finding an appropriate Swap Listing to publishing a Swap Proposal, there may be some kind of negotiation between the involved parties, e.g. agreeing on the amount to be paid by one of the parties or the exact content of a Nostr event signed by the other party. There are many ways to accomplish that and clients may implement it as they see fit for their specific goals. Some suggestions are:
- Adding
kind:1111
Comments to the Swap Listing or an existing Swap Proposal - Exchanging tentative Swap Proposals back and forth until an agreement is reached
- Simple exchanges of DMs
- Out of band communication (e.g. Signal)
Work to be done
I've been refining this specification as I develop some proof-of-concept clients to experience its flaws and trade-offs in practice. I left the signature spec for Taproot signatures out of the current document as I still have to experiment with it. I will probably find some important orchestration issues related to dealing with
2-of-2 multisig timelocks
, which also affects Cashu transactions when spent last, that may require further adjustments to what was presented here.The main goal of this article is to find other people interested in this concept and willing to provide valuable feedback before a PR is opened in the NIPs repository for broader discussions.
References
- GM Swap- Nostr client for atomically exchanging GM notes. Live demo available here.
- Sig4Sats Script - A Typescript script demonstrating the swap of a Cashu payment for a signed Nostr event.
- Loudr- Nostr client under development for sponsoring the publication of Nostr events. Live demo available at loudr.me.
- Poelstra, A. (2017). Scriptless Scripts. Blockstream Research. https://github.com/BlockstreamResearch/scriptless-scripts
-
@ d64f3475:8e56b3bf
2025-05-14 20:58:06And this is the regular text.
-
@ d64f3475:8e56b3bf
2025-05-14 20:58:03I will add a picture, a hyperlink and a video. Letâs see if it works.
-
@ 66675158:1b644430
2025-03-23 11:39:41I don't believe in "vibe coding" â it's just the newest Silicon Valley fad trying to give meaning to their latest favorite technology, LLMs. We've seen this pattern before with blockchain, when suddenly Non Fungible Tokens appeared, followed by Web3 startups promising to revolutionize everything from social media to supply chains. VCs couldn't throw money fast enough at anything with "decentralized" (in name only) in the pitch deck. Andreessen Horowitz launched billion-dollar crypto funds, while Y Combinator batches filled with blockchain startups promising to be "Uber for X, but on the blockchain."
The metaverse mania followed, with Meta betting its future on digital worlds where we'd supposedly hang out as legless avatars. Decentralized (in name only) autonomous organizations emerged as the next big thing â supposedly democratic internet communities that ended up being the next scam for quick money.
Then came the inevitable collapse. The FTX implosion in late 2022 revealed fraud, Luna/Terra's death spiral wiped out billions (including my ten thousand dollars), while Celsius and BlockFi froze customer assets before bankruptcy.
By 2023, crypto winter had fully set in. The SEC started aggressive enforcement actions, while users realized that blockchain technology had delivered almost no practical value despite a decade of promises.
Blockchain's promises tapped into fundamental human desires â decentralization resonated with a generation disillusioned by traditional institutions. Evangelists presented a utopian vision of freedom from centralized control. Perhaps most significantly, crypto offered a sense of meaning in an increasingly abstract world, making the clear signs of scams harder to notice.
The technology itself had failed to solve any real-world problems at scale. By 2024, the once-mighty crypto ecosystem had become a cautionary tale. Venture firms quietly scrubbed blockchain references from their websites while founders pivoted to AI and large language models.
Most reading this are likely fellow bitcoiners and nostr users who understand that Bitcoin is blockchain's only valid use case. But I shared that painful history because I believe the AI-hype cycle will follow the same trajectory.
Just like with blockchain, we're now seeing VCs who once couldn't stop talking about "Web3" falling over themselves to fund anything with "AI" in the pitch deck. The buzzwords have simply changed from "decentralized" to "intelligent."
"Vibe coding" is the perfect example â a trendy name for what is essentially just fuzzy instructions to LLMs. Developers who've spent years honing programming skills are now supposed to believe that "vibing" with an AI is somehow a legitimate methodology.
This might be controversial to some, but obvious to others:
Formal, context-free grammar will always remain essential for building precise systems, regardless of how advanced natural language technology becomes
The mathematical precision of programming languages provides a foundation that human language's ambiguity can never replace. Programming requires precision â languages, compilers, and processors operate on explicit instructions, not vibes. What "vibe coding" advocates miss is that beneath every AI-generated snippet lies the same deterministic rules that have always governed computation.
LLMs don't understand code in any meaningful senseâthey've just ingested enormous datasets of human-written code and can predict patterns. When they "work," it's because they've seen similar patterns before, not because they comprehend the underlying logic.
This creates a dangerous dependency. Junior developers "vibing" with LLMs might get working code without understanding the fundamental principles. When something breaks in production, they'll lack the knowledge to fix it.
Even experienced developers can find themselves in treacherous territory when relying too heavily on LLM-generated code. What starts as a productivity boost can transform into a dependency crutch.
The real danger isn't just technical limitations, but the false confidence it instills. Developers begin to believe they understand systems they've merely instructed an AI to generate â fundamentally different from understanding code you've written yourself.
We're already seeing the warning signs: projects cobbled together with LLM-generated code that work initially but become maintenance nightmares when requirements change or edge cases emerge.
The venture capital money is flowing exactly as it did with blockchain. Anthropic raised billions, OpenAI is valued astronomically despite minimal revenue, and countless others are competing to build ever-larger models with vague promises. Every startup now claims to be "AI-powered" regardless of whether it makes sense.
Don't get me wrongâthere's genuine innovation happening in AI research. But "vibe coding" isn't it. It's a marketing term designed to make fuzzy prompting sound revolutionary.
Cursor perfectly embodies this AI hype cycle. It's an AI-enhanced code editor built on VS Code that promises to revolutionize programming by letting you "chat with your codebase." Just like blockchain startups promised to "revolutionize" industries, Cursor promises to transform development by adding LLM capabilities.
Yes, Cursor can be genuinely helpful. It can explain unfamiliar code, suggest completions, and help debug simple issues. After trying it for just an hour, I found the autocomplete to be MAGICAL for simple refactoring and basic functionality.
But the marketing goes far beyond reality. The suggestion that you can simply describe what you want and get production-ready code is dangerously misleading. What you get are approximations with:
- Security vulnerabilities the model doesn't understand
- Edge cases it hasn't considered
- Performance implications it can't reason about
- Dependency conflicts it has no way to foresee
The most concerning aspect is how such tools are marketed to beginners as shortcuts around learning fundamentals. "Why spend years learning to code when you can just tell AI what you want?" This is reminiscent of how crypto was sold as a get-rich-quick scheme requiring no actual understanding.
When you "vibe code" with an AI, you're not eliminating complexityâyou're outsourcing understanding to a black box. This creates developers who can prompt but not program, who can generate but not comprehend.
The real utility of LLMs in development is in augmenting existing workflows:
- Explaining unfamiliar codebases
- Generating boilerplate for well-understood patterns
- Suggesting implementations that a developer evaluates critically
- Assisting with documentation and testing
These uses involve the model as a subordinate assistant to a knowledgeable developer, not as a replacement for expertise. This is where the technology adds valueâas a sophisticated tool in skilled hands.
Cursor is just a better hammer, not a replacement for understanding what you're building. The actual value emerges when used by developers who understand what happens beneath the abstractions. They can recognize when AI suggestions make sense and when they don't because they have the fundamental knowledge to evaluate output critically.
This is precisely where the "vibe coding" narrative falls apart.
-
@ d64f3475:8e56b3bf
2025-05-14 20:58:02Is it still working?
-
@ eac63075:b4988b48
2025-01-04 19:41:34Since its creation in 2009, Bitcoin has symbolized innovation and resilience. However, from time to time, alarmist narratives arise about emerging technologies that could "break" its security. Among these, quantum computing stands out as one of the most recurrent. But does quantum computing truly threaten Bitcoin? And more importantly, what is the community doing to ensure the protocol remains invulnerable?
The answer, contrary to sensationalist headlines, is reassuring: Bitcoin is secure, and the community is already preparing for a future where quantum computing becomes a practical reality. Letâs dive into this topic to understand why the concerns are exaggerated and how the development of BIP-360 demonstrates that Bitcoin is one step ahead.
What Is Quantum Computing, and Why Is Bitcoin Not Threatened?
Quantum computing leverages principles of quantum mechanics to perform calculations that, in theory, could exponentially surpass classical computersâand it has nothing to do with what so-called âquantum coachesâ teach to scam the uninformed. One of the concerns is that this technology could compromise two key aspects of Bitcoinâs security:
- Wallets: These use elliptic curve algorithms (ECDSA) to protect private keys. A sufficiently powerful quantum computer could deduce a private key from its public key.
- Mining: This is based on the SHA-256 algorithm, which secures the consensus process. A quantum attack could, in theory, compromise the proof-of-work mechanism.
Understanding Quantum Computingâs Attack Priorities
While quantum computing is often presented as a threat to Bitcoin, not all parts of the network are equally vulnerable. Theoretical attacks would be prioritized based on two main factors: ease of execution and potential reward. This creates two categories of attacks:
1. Attacks on Wallets
Bitcoin wallets, secured by elliptic curve algorithms, would be the initial targets due to the relative vulnerability of their public keys, especially those already exposed on the blockchain. Two attack scenarios stand out:
-
Short-term attacks: These occur during the interval between sending a transaction and its inclusion in a block (approximately 10 minutes). A quantum computer could intercept the exposed public key and derive the corresponding private key to redirect funds by creating a transaction with higher fees.
-
Long-term attacks: These focus on old wallets whose public keys are permanently exposed. Wallets associated with Satoshi Nakamoto, for example, are especially vulnerable because they were created before the practice of using hashes to mask public keys.
We can infer a priority order for how such attacks might occur based on urgency and importance.
Bitcoin Quantum Attack: Prioritization Matrix (Urgency vs. Importance)
2. Attacks on Mining
Targeting the SHA-256 algorithm, which secures the mining process, would be the next objective. However, this is far more complex and requires a level of quantum computational power that is currently non-existent and far from realization. A successful attack would allow for the recalculation of all possible hashes to dominate the consensus process and potentially "mine" it instantly.
Satoshi Nakamoto in 2010 on Quantum Computing and Bitcoin Attacks
Recently, Narcelio asked me about a statement I made on Tubacast:
https://x.com/eddieoz/status/1868371296683511969
If an attack became a reality before Bitcoin was prepared, it would be necessary to define the last block prior to the attack and proceed from there using a new hashing algorithm. The solution would resemble the response to the infamous 2013 bug. Itâs a fact that this would cause market panic, and Bitcoin's price would drop significantly, creating a potential opportunity for the well-informed.
Preferably, if developers could anticipate the threat and had time to work on a solution and build consensus before an attack, they would simply decide on a future block for the fork, which would then adopt the new algorithm. It might even rehash previous blocks (reaching consensus on them) to avoid potential reorganization through the re-mining of blocks using the old hash. (I often use the term "shielding" old transactions).
How Can Users Protect Themselves?
While quantum computing is still far from being a practical threat, some simple measures can already protect users against hypothetical scenarios:
- Avoid using exposed public keys: Ensure funds sent to old wallets are transferred to new ones that use public key hashes. This reduces the risk of long-term attacks.
- Use modern wallets: Opt for wallets compatible with SegWit or Taproot, which implement better security practices.
- Monitor security updates: Stay informed about updates from the Bitcoin community, such as the implementation of BIP-360, which will introduce quantum-resistant addresses.
- Do not reuse addresses: Every transaction should be associated with a new address to minimize the risk of repeated exposure of the same public key.
- Adopt secure backup practices: Create offline backups of private keys and seeds in secure locations, protected from unauthorized access.
BIP-360 and Bitcoinâs Preparation for the Future
Even though quantum computing is still beyond practical reach, the Bitcoin community is not standing still. A concrete example is BIP-360, a proposal that establishes the technical framework to make wallets resistant to quantum attacks.
BIP-360 addresses three main pillars:
- Introduction of quantum-resistant addresses: A new address format starting with "BC1R" will be used. These addresses will be compatible with post-quantum algorithms, ensuring that stored funds are protected from future attacks.
- Compatibility with the current ecosystem: The proposal allows users to transfer funds from old addresses to new ones without requiring drastic changes to the network infrastructure.
- Flexibility for future updates: BIP-360 does not limit the choice of specific algorithms. Instead, it serves as a foundation for implementing new post-quantum algorithms as technology evolves.
This proposal demonstrates how Bitcoin can adapt to emerging threats without compromising its decentralized structure.
Post-Quantum Algorithms: The Future of Bitcoin Cryptography
The community is exploring various algorithms to protect Bitcoin from quantum attacks. Among the most discussed are:
- Falcon: A solution combining smaller public keys with compact digital signatures. Although it has been tested in limited scenarios, it still faces scalability and performance challenges.
- Sphincs: Hash-based, this algorithm is renowned for its resilience, but its signatures can be extremely large, making it less efficient for networks like Bitcoinâs blockchain.
- Lamport: Created in 1977, itâs considered one of the earliest post-quantum security solutions. Despite its reliability, its gigantic public keys (16,000 bytes) make it impractical and costly for Bitcoin.
Two technologies show great promise and are well-regarded by the community:
- Lattice-Based Cryptography: Considered one of the most promising, it uses complex mathematical structures to create systems nearly immune to quantum computing. Its implementation is still in its early stages, but the community is optimistic.
- Supersingular Elliptic Curve Isogeny: These are very recent digital signature algorithms and require extensive study and testing before being ready for practical market use.
The final choice of algorithm will depend on factors such as efficiency, cost, and integration capability with the current system. Additionally, it is preferable that these algorithms are standardized before implementation, a process that may take up to 10 years.
Why Quantum Computing Is Far from Being a Threat
The alarmist narrative about quantum computing overlooks the technical and practical challenges that still need to be overcome. Among them:
- Insufficient number of qubits: Current quantum computers have only a few hundred qubits, whereas successful attacks would require millions.
- High error rate: Quantum stability remains a barrier to reliable large-scale operations.
- High costs: Building and operating large-scale quantum computers requires massive investments, limiting their use to scientific or specific applications.
Moreover, even if quantum computers make significant advancements, Bitcoin is already adapting to ensure its infrastructure is prepared to respond.
Conclusion: Bitcoinâs Secure Future
Despite advancements in quantum computing, the reality is that Bitcoin is far from being threatened. Its security is ensured not only by its robust architecture but also by the communityâs constant efforts to anticipate and mitigate challenges.
The implementation of BIP-360 and the pursuit of post-quantum algorithms demonstrate that Bitcoin is not only resilient but also proactive. By adopting practical measures, such as using modern wallets and migrating to quantum-resistant addresses, users can further protect themselves against potential threats.
Bitcoinâs future is not at riskâit is being carefully shaped to withstand any emerging technology, including quantum computing.
-
@ d64f3475:8e56b3bf
2025-05-14 20:58:00Is it actually called âsummaryâ?
-
@ 2fb77d26:c47a6ee1
2025-05-14 05:57:34Europäischer Tunnelblick
In unseren Breiten sprach man schon seit jeher gerne davon, dass ÂťAmerika den Europäern immer vorausÂŤ ist. Dass Âťder alte KontinentÂŤ stets zehn Jahre im Hintertreffen ist. In der Finanzbranche attestierte man auch gerne mal einen RĂźckstand von Âť20 JahrenÂŤ. Bemängelt wurde im Rahmen solcher Analysen zumeist die mangelnde Innovationskraft europäischer Unternehmen, die gemäà einschlägiger Experten vor allem auf die Regulierungswut der hiesigen BĂźrokratie zurĂźckzufĂźhren ist. Langwierige Genehmigungsprozesse, kompliziertes Steuerrecht, zu kleine Kapitalmärkte und komplexe Datenschutzanforderungen schrecken GrĂźnder und Investoren ab. ÂťBĂźrokraten regulieren Europa zu TodeÂŤ, bringt es der Ăkonom und Unternehmer Dirk Specht am 29. November 2024 auf den Punkt. Aus Sicht des Entrepreneurs eine durchaus nachvollziehbare Einordnung.
Denn selbst wenn die HĂźrden der UnternehmensgrĂźndung einmal Ăźberwunden sind, machen BĂźrokratiekosten selbst in kleinen Firmen knapp drei Prozent vom Umsatz aus. Im industriellen Mittelstand Ăźbersteigen sie nicht selten die jährliche Bruttoumsatzrendite von durchschnittlich fĂźnfeinhalb Prozent. Von den arbeitsrechtlichen Rahmenbedingungen â siehe KĂźndigungsschutz, Urlaubsanspruch und Lohnfortzahlung im Krankheitsfall â gar nicht erst anzufangen. In puncto Flexibilität ist Europa fĂźr Unternehmer also tatsächlich nur bedingt attraktiv.
Ganz anders die USA. Deregulierung, Seed-Capital en Masse und ein Arbeitsrecht, das den Slogan ÂťHire and fireÂŤ weltberĂźhmt machte â gemäĂ Tagesschau vom 11. Februar 2025 Ăźbrigens ein Modell, das dank Microsoft, Meta und SAP langsam auch in Deutschland Einzug hält. Diese unternehmerische Freiheit â oder ZĂźgellosigkeit â machte Amerika zum Start-up-Inkubator. Zum GrĂźnderparadies. Wall Street, Motorcity, Silicon Valley, Hollywood, et cetera. Ein Mekka fĂźr Investoren. Und ein Alptraum fĂźr Arbeitnehmer.
Alles richtig. Oberflächlich betrachtet. Dass bei dieser sehr kurzsichtigen Analyse stets auĂer Acht gelassen wird, welchen Anteil die beiden Weltkriege, angloamerikanische Finanzdynastien, halbseidene NGO-Netzwerke und vor allem Ăźber ein Dutzend Geheimdienste an Amerikas Wirtschaftswachstum der vergangenen 100 Jahre haben, trĂźbt den Blick der europäischen Unternehmergarde allerdings nachhaltig. Denn er negiert den historischen Kontext. Vermutlich läuft Roger KĂśppels Editorial fĂźr DIE WELTWOCHE vom 01. Mai 2025 deshalb immer noch ungeniert unter dem Titel ÂťHoffnungsträger TrumpÂŤ.
Ich habe täglich Kontakt mit Geschäftspartnern in den USA â und bei denen ist von Hoffnung nicht (mehr) viel zu spĂźren. Begriffe wie Planungsprobleme, Stornierung, Unsicherheit oder Lieferengpass fallen dagegen immer häufiger. Investorâs Business Daily nannte den Zustand vor wenigen Stunden Âťein ErdbebenÂŤ, weil Trumps ÂťHandelskrieg-TsunamiÂŤ nun auch die Häfen der Vereinigten Staaten erreicht hat. Die laufen langsam leer. Frachter und Tanker mit Importwaren lĂśschen ihre Ladung nicht. Oder kommen gar nicht mehr an. Die auf Basis von StrafzĂśllen zu erwartenden Lieferengpässe ÂťkĂśnnten die Folgen der Covid-Krise ĂźbertreffenÂŤ, konstatiert das Investment-Magazin.
Was also passiert gerade in den Vereinigten Staaten? Sollte Europa tatsächlich neidisch auf die vermeintlichen Wettbewerbsvorteile Amerikas sein â oder gar auf die aktuellen politischen Entwicklungen? Auf Effizienzsteigerung der Marke DOGE? Nein, keinesfalls. Denn zum einen sorgen die turbokapitalistischen Exzesse im ÂťLand der unbegrenzten MĂśglichkeitenÂŤ dafĂźr, dass Arbeitnehmer endgĂźltig zu Lohnsklaven degradiert werden, die den Launen von Märkten und Unternehmen relativ schutzlos ausgeliefert sind. Zum anderen beruht der Erfolg amerikanischer Konzerne keineswegs auf deren Innovationskraft, einem laxen Arbeitsrecht oder genialem Unternehmertum, sondern primär auf tiefenstaatlichem Interventionismus. Das gilt seit dem Jahrtausendwechsel vor allem fĂźr die Tech-Branche. Denn die USA sind nicht einfach eine Wirtschaftsmacht, sondern der militärische Arm des angloamerikanischen Empire.
Das zeigen die ÂťGlorreichen SiebenÂŤ â Google, Microsoft, Apple, Amazon, Alphabet, Meta, Tesla und Nvidia â die allesamt erst durch Startfinanzierung seitens Militär und Geheimdiensten wurden, was sie heute sind: Die Speerspitze des technokratischen Totalitarismus. Nachdem selbst The Economist am 10. Dezember 2024 feststellte, dass mit der Wiederwahl von Donald Trump nun Âťdie PayPal-Mafia die US-Regierung ĂźbernimmtÂŤ, sollte man in unseren Bereiten also eventuell etwas kritischer begutachten, was die entsprechenden Konzerne dort treiben. Denn es ist angesichts von Agenda 2030, aktuellen EU-Programmen, EZB-Planungen und einer Kriegswirtschaft kolportierenden Bundesregierung unter BlackRock-Merz nicht davon auszugehen, dass es dieses Mal zehn oder zwanzig Jahre dauert, bis diese Entwicklungen auch bei uns ankommen.
Palantir & DOGE
Das bezieht sich insbesondere auf Elon Musks DOGE â das ÂťDepartment of Government EfficiencyÂŤ â eine neu geschaffene BehĂśrde, die sich auf Effizienzsteigerung in Sachen Regierungsgeschäfte konzentrieren soll. Dies selbstredend unter flächendeckender Zuhilfenahme von KI (KĂźnstlicher Intelligenz), die wiederum auf entsprechende Datenpools angewiesen ist. Um solche kurzfristig zur VerfĂźgung zu stellen, durchforstet, hackt und kapert Musks DOGE-Team die IT-Abteilungen, Server und Netzwerke von Ministerien und BundesbehĂśrden. Vor allem auf Finanzdaten hat man es abgesehen. An geltendes Recht hält sich DOGE dabei nicht. DatenschĂźtzer sind alarmiert. Und Whistleblower werden von Musks Team bedroht. All das passiert in enger Zusammenarbeit mit Oracle, einem weiteren von der CIA startfinanzierten IT-Riesen â und natĂźrlich Palantir, dem von Peter Thiel gegrĂźndeten Spionage- und Killerkonzern.
So berichtete Reuters am 6. Mai 2025 beispielsweise Ăźber ein neues Gemeinschaftsprojekt von Elon Musks xAI und Palantir, das die Nutzung der jeweiligen KI-LĂśsungen im Finanzsektor vorantreiben will â dies, nachdem xAI, BlackRock und Microsoft bereits im März ein neues Konsortium zur Erweiterung von KI-Infrastruktur ins Leben riefen. Im Department of Homeland Security (DHS) ist DOGE aktuell damit beschäftigt, das IDENT-System des ÂťOffice of Biometric Identity ManagementÂŤ (OBIM) zu Ăźbernehmen â die weltweit grĂśĂte Datenbank fĂźr biometrische Informationen, die von praktisch allen US-BehĂśrden aber auch internationalen Partnern genutzt wird. ZusammengefĂźhrt werden sollen die von DOGE gekaperten Daten in HART (Homeland Advanced Recognition Technology System), einem neuen, mit Ăźber sechs Milliarden US-Dollar budgetierten Ăberwachungssystem des DHS, das in Kollaboration mit Palantir-Programmen die flächendeckende Ăberwachung der BevĂślkerung analog zu China ermĂśglichen wird.
Palantir wurde 2003 gegrĂźndet und arbeitet seither, das belegt eine 2013 geleakte Kundenliste, fĂźr mindestens 12 US-Regierungseinrichtungen: CIA, DHS, NSA, FBI, CDC, Special Operations Command, et cetera. Schon vor knapp zehn Jahren häuften sich Berichte â wie zum Beispiel von WIRED am 9. August 2017 â die belegten, dass Palantir die vermeintlich vertraulichen Daten, die zum Beispiel Polizisten in Los Angeles seit 2009 in Datenbanken des Konzerns erfassen, kopiert, verkauft und zweckentfremdet. Dass Palantir das rechtsextreme, zionistische Regime von Benjamin Netanjahu bei seinem Genozid in Gaza unterstĂźtzt, ist ebenfalls kein Geheimnis mehr. Die strategische Partnerschaft zwischen Thiels TĂśtungsmaschine und den IDF wurde nach Berichten von Bloomberg vom 12. Januar 2024 gar ausgeweitet. Gideon Levy bescheinigt seinem Land in einem Beitrag der Haaretz vom 19. Januar 2025, in Gaza den Âťersten faschistischen KriegÂŤ seiner Geschichte zu fĂźhren. Womit wir wieder bei Palantir und den Vereinigten Staaten wären.
Denn wie ich bereits in meinem Artikel Ăźber Thiel vom 22. September 2024 in Aussicht gestellt hatte, kommt dem gebĂźrtigen Frankfurter eine ganz besondere Rolle in Trumps neuer Regierung zu. Vom ÂťPatenÂŤ der PayPal-Mafia und Geheimdienst-Frontmann zum Palantir-Boss und Bilderberg-Leitungsmitglied â und nun einflussreichsten Mann hinter der US-Regierung. Ohne Peter Thiels finanzielle UnterstĂźtzung wäre JD Vance weder Geschäftsmann noch Senator in Ohio oder US-Vizepräsident geworden. So verwundert es kaum, dass Palantir bereits 100 Tage nach Donald Trumps Amtsantritt Zugriff auf sämtliche Steuer-, Gesundheits- und Bewegungsdaten der US-BevĂślkerung hat und diese in einer Datenbank zusammenfĂźhrt, um seine KI darauf anzusetzen. Selbst die Speicher von Smartwatches und Fitness-Armbändern werden angezapft. Kein Datensatz ist mehr tabu.
Wie diese Daten kĂźnftig verwendet werden â und zwar gegen alles und jeden â zeigt eine von Palantir entwickelte Software namens ÂťImmigrationOSÂŤ. Ein System, das der US-Regierung hilft, das Leben von Migranten zu durchleuchten und permanent zu Ăźberwachen. Inklusive biografischer, biometrischer und Geolokationsdaten. Die auf Basis dieser Daten entwickelten Empfehlungen nutzt das ICE (Immigration and Customs Enforcement), um Menschen in die an Massentierhaltung erinnernden Supermax-Gefängnisse von El Salvador abzuschieben. FĂźr Deportationen ohne Beweise, AnhĂśrung, Gerichtsverhandlung und Rechtsgrundlage. Eine in dieser Form fraglos verfassungsfeindliche Ausweitung des ÂťCatch and RevokeÂŤ Programms, dem anstelle illegaler Einwanderer nun auch Doktoranden, Studenten oder unbescholtene Arbeitnehmer zum Opfer fallen â siehe der Fall Kilmar Abrego Garcia â vor allem solche, die den VĂślkermord in Gaza kritisieren.
Es dßrfte derweil nur eine Frage der Zeit sein, bis das zugrundliegende, am 30. April 2025 verabschiedete Antisemitismus-Gesetz auf weitere unliebsame Personenkreise angewendet wird. Der Bundesstaat Alabama lässt sich bereits von der fragwßrdigen Deportationspraxis Washingtons inspirieren und kßndigte in Person des Republikaners Chris Sells am 1. Mai 2025 an, selbst ein Gesetz erlassen zu wollen, das die Abschiebung verurteilter Personen ins Ausland ermÜglicht. Gemäà Sells wolle man mit dem Gesetzesvorschlag nur ein Zeichen setzen. Mit einer Verabschiedung rechne man nicht. Trump verkßndete unterdes, neben Migranten kßnftig auch US-Bßrger und Ureinwohner nach El Salvador verfrachten zu wollen. Verfassungsrechtlich ein absolutes Tabu. Bisher.
The Atlantic nennt diese Entwicklungen am 27. April 2025 ein Âťamerikanisches PanoptikumÂŤ. Zu Recht. Denn Palantirs zentralisierter Datenpool wird sich zum mächtigsten UnterdrĂźckungsinstrument der Zivilisationsgeschichte auswachsen â und in nicht allzu ferner Zukunft auch gegen jene MAGA-Anhänger eingesetzt werden, die solch faschistoide Vorgänge derzeit noch bejubeln. Gegen das, was da auf uns zukommt, waren Corona-Tracking und 2G-Segregation geradezu harmlos.
Entsprechend hellhĂśrig sollte es machen, dass die NATO Palantirs KI-LĂśsungen â genauer: die ÂťMaven AIÂŤ â kĂźnftig fĂźr militärische Planungszwecke einsetzt, wie eine Presseerklärung des ÂťVerteidigungsbĂźndnissesÂŤ vom 14. April 2025 ausfĂźhrt. Denn ÂťProject MavenÂŤ ist auf ein Memorandum des US-Verteidigungsministeriums vom 26. April 2017 zurĂźckzufĂźhren und hatte zum Ziel, ein ÂťfunktionsĂźbergreifendes Team fĂźr algorithmische KriegsfĂźhrungÂŤ zu schaffen. UnterstĂźtzt wurde das US-Militär dabei zunächst von Google. Also dem Unternehmen, das einst unter dem Motto Donât be evilÂŤ â Sei nicht bĂśse! â angetreten war. Begleitet wurde Googles Engagement fĂźr Project Maven von einem massiven Aufruhr in der Belegschaft und ArtikelĂźberschriften wie ÂťHey Google, wen soll die US-Regierung heute tĂśten?ÂŤ. Offene Briefe an Google-Chef Sundar Pichai forderten 2018, der IT-Konzern solle die Partnerschaft mit dem Pentagon unverzĂźglich beenden. Und das tat Google auch.
Project Maven lief natĂźrlich trotzdem weiter. Wie Breaking Defense am 27. April 2022 ausfĂźhrte, wurde das Vorhaben nach Googles RĂźckzug der NGA (National Geospatial Intelligence Agency) unterstellt und gemäà Informationen des Forbes Magazine fortan von Eric Schmidt (Google, Bilderberg), Peter Thiel und James Murdoch, dem jĂźngeren Sohn von Rupert Murdoch finanziert. Maven AI ist das KI-Flaggschiff des US-Militärs â und wird jetzt als Palantir-Produkt weltweit ausgerollt. Vorboten sind in Hessen, Bayern und Nordrhein-Westfalen bereits im Einsatz und dĂźrften angesichts der Iden des Merz wohl bald bundesweit Verwendung finden. Es ist also keineswegs Ăźbertrieben, wenn der US-Journalist Derrick Broze am 24. April 2025 von der ÂťPalantir World OrderÂŤÂ spricht â einem Ăźberstaatlichen Herrschaftssystem, das zuvorderst aufgrund seiner auf zwielichtigen bis illegalen Akkumulationsprozessen basierenden Deutungs- und Interventionshoheit in puncto Big Data fuĂt. Getreu dem Palantir-Slogan: ÂťDie Software ist das WaffensystemÂŤ. Selbst eine in der ARD-Mediathek abrufbare Doku des NDR Ăźber Palantir von 10. Juni 2024 läuft unter dem eindeutigen Titel ÂťEine Software, die tĂśten kannÂŤ.
Ja, das Geschäft mit dem industriell-digitalisierten Auftragsmord boomt. Denn internationale Konflikte nehmen zu und die ObservationsĂśkonomie erlebt einen Quantensprung. Entsprechend profitabel fiel das erste Quartal 2025 fĂźr Thiels Unternehmen aus. Stolze 884 Millionen US-Dollar stellte man Kunden in Rechnung. Ein Wachstum von 39 Prozent gegenĂźber dem Vorjahr und 21,7 Millionen mehr als prognostiziert. Am 5. Mai 2025 gab die Palantir Aktie zwar um 15 Prozent nach â laut Analysten kĂśnnte die Aktie aber auch um 70 Prozent fallen und wäre immer noch die teuerste Marke unter Softwareanbietern in diesem Segment.
Das sollte zu denken geben. Denn die USA durchlaufen eine Metamorphose â weg von demokratischen Strukturen und hin zur ÂťAlgokratieÂŤ. Die PayPal-Mafia hat das WeiĂe Haus gekapert und demonstriert dem Wertewesten, was er im Zuge der vierten industriellen Revolution zu erwarten hat: Tech-Feudalismus, dessen Oligarchen sich aufgrund vermeintlicher Sachzwänge schamlos Ăźber Recht und Gesetz hinwegsetzen. Nicht von ungefähr hat Donald Trump in seinen ersten 100 Amtstagen bereits 141 Exekutive OrdersÂŤ unterzeichnet. Ohne dabei auch nur einmal das Repräsentantenhaus einzubeziehen oder demokratische Prozesse zu respektieren. In diesem Lichte betrachtet erscheint das Cover des TIME Magazine vom Juni 2018, auf dem ÂťThe DonaldÂŤ als KĂśnig abgebildet war â Titel: ÂťKing meÂŤ â heute zeitgemäĂer denn je.
Dunkle Aufklärung
Und das ist kein Zufall. Wirft man nämlich einen Blick auf die philosophischen Konzepte, die Menschen wie Peter Thiel, JD Vance oder Elon Musk inspirieren, zeigt sich, dass die entsprechenden Pamphlete genau das fordern: Eine postmoderne Version von Monarchie. Einen CEO, der das Land fĂźhrt wie einen GroĂkonzern. Mittels KI â und auf Basis des amerikanischen Arbeitsrechts natĂźrlich. Vielsagend, dass Donald Trump am 19. April 2025 auf Twitter ankĂźndigte, exakt das tun zu wollen:
ÂťDas ist gesunder Menschenverstand und wird ermĂśglichen, dass die Bundesregierung endlich âwie ein Unternehmen gefĂźhrt wirdâ.ÂŤ
Dass Trump den letzten Teil des Satzes in Anfßhrungszeichen setzt, impliziert, dass er jemanden zitiert. Von wem die Phrase stammt, lässt er allerdings offen. Der US-Präsident scheint jedenfalls den Ratschlägen seines Vize JD Vance zu folgen, der bereits am 17. September 2021 in einem Interview mit dem Jack Murphy Podcast sagte:
ÂťWas Trump tun sollte, wenn ich ihm einen Ratschlag geben dĂźrfte: Feuere jeden einzelnen BĂźrokraten der mittleren Leitungsebene, jeden Beamten in der Verwaltung, und ersetze ihn mit unseren Leuten. Und wenn man dich dafĂźr verklagt, wenn dich die Gerichte aufhalten wollen â denn man wird dich dafĂźr verklagen â stell dich vor das Land, so wie Andrew Jackson, und sag den Menschen, dass der oberste Entscheidungsträger sein Urteil bereits gefällt hat. Jetzt lasst es ihn auch umsetzen.ÂŤ
Und so geschah es. Denn als der Oberste Gerichtshof der Vereinigten Staaten am 19. April 2025 entschied, dass die juristisch fragwßrdigen Deportationen zu stoppen sind, schrieb Donald Trump auf Twitter:
Ich wurde unter anderem gewählt, um schlechte Menschen aus den Vereinigten Staaten zu entfernen. Ich muss meine Arbeit tun dßrfen.
Damit stellt sich Trump offen gegen die hĂśchste juristische Instanz des Landes und fordert, trotz eines geltenden Urteils weitermachen zu kĂśnnen. FĂźr dieses Vorgehen sucht er RĂźckhalt in der BevĂślkerung. Er will die Gerichte unter Druck zu setzen, um regieren zu kĂśnnen wie ein Monarch. So, wie es die Vordenker der Neoreaktionären BewegungÂŤ (NRx) â zumeist ÂťDunkle AufklärungÂŤ genannt â vorschlagen. Bei dieser politischen Philosophie handelt es sich selbst laut Wikipedia um ein Âťantidemokratisches, antiegalitäres, reaktionäres und neofeudales KonzeptÂŤ. Geprägt wurde es von einem etwas kauzig anmutenden Blogger namens Curtis Yarvin, der auf seiner Webseite Unqualified ReservationsÂŤ ab 2007 und unter dem Pseudonym Mencius Moldbug Texte Ăźber das Versagen der Demokratie und Theorien zu alternativen Herrschaftsformen publizierte.
Weiterentwickelt wurden diese Konzepte unter anderem von Nick Land, einem britischen Schriftsteller, der als Vater des ÂťAkzelerationismusÂŤ gilt und mit einem Blog-Beitrag aus dem Jahr 2013 auch den Begriff ÂťDunkle AufklärungÂŤ fĂźr Yarvins Theorien aufbrachte. In seinen späteren Texten redete der Brite einem Âťwissenschaftlichen RassismusÂŤ, der Eugenik und dem von ihm geprägten Begriff ÂťHyperrassismusÂŤ das Wort. Bei der rechtsnationalistischen bis rechtsextremen Alt-Right-Bewegung stieĂ er damit auf offene Ohren. Die deutsche Publikation Âťnd â Journalismus von LinksÂŤ findet diesen ÂťPhilosophen der digitalen EntgrenzungÂŤ in einem Beitrag vom 21. Mai 2023 aber trotzdem ÂťinteressantÂŤ. Dass Nick Land gerne Amphetamin konsumiert und eine Weile im Haus des 1947 verstorbenen Satanisten Aleister Crowley lebte, scheint nd-Autor Konstantin Jahn eher Bewunderung abzuringen. Seinem ehemaligen Arbeitgeber, The New Center for Research & Practice, allerdings nicht â der setzte Land am 29. März 2017 wegen rassistischer Umtriebe vor die TĂźr.
Von Curtis Yarvin war nach der Einstellung seines Blogs im Jahr 2016 unterdes nicht mehr viel zu hĂśren. Bis jetzt. Denn anno 2025 schreibt plĂśtzlich die Financial Times ßber Âťdie Philosophie hinter Trumps Dunkler AufklärungÂŤ. Ebenso die New York Times, die Yarvin im Januar 2025 zum groĂen Interview fĂźr eine Titelstory bat. Selbst der Bayrische Rundfunk schrieb am 23. März 2025 Ăźber den einst nur Insidern bekannten Blogger. Und natĂźrlich Politico, wo am 30. Januar 2025 ein Artikel Ăźber Yarvin erschien. Aufmacher: ÂťCurtis Yarvins Ideen waren Randerscheinungen. Jetzt verbreiten sie sich in Trumps WashingtonÂŤ. Im Zuge seines Textes beschreibt Autor Ian Ward, wie Yarvin nach Washington reiste, um auf Einladung des Trump-Teams an der pompĂśsen Inaugurationsfeier teilzunehmen, wo er unter anderem mit dem ehemaligen Thiel-Angestellten JD Vance sprach, der die politischen Theorien von Yarvin mehrfach bei Ăśffentlichen Auftritten lobte, zitierte und als wichtigen Einfluss auf sein Denken nannte. Im Gespräch mit Ward fĂźhrte Yarvin aus, dass er Trump gegenĂźber zunächst skeptisch gewesen sei, weil er sich nicht sicher war, ob Trump den von ihm empfohlenen Regimewechsel Ăźberhaupt durchziehen kĂśnne.
Zwischenzeitlich habe sich jedoch Optimismus eingestellt, so Yarvin, denn man kĂśnne in Trumps Kabinett eine Âťneugewonnene Selbstsicherheit und AggressivitätÂŤ spĂźren. Kein Wunder, besteht es doch in weiten Teilen aus ProtegĂŠs, Kollegen, Geschäftspartnern und Freunden von Peter Thiel â zu letzteren gehĂśrt nach Aussage von Thiel Ăźbrigens auch der neue Chef der NIH (National Institutes of Health), Jay Bhattacharya, der zuvor unter anderem bei der Hoover Institution sowie der RAND Corporation tätig war. Aufgabenbereich: Demographie und Ăkonomie von Gesundheit und Altern mit Schwerpunkt auf Regierungsprogrammen und biomedizinischer Innovation.
Wer sich mit Thiel beschäftigt hat, wird kaum Ăźberrascht sein, dass der in Frankfurt geborene Milliardär Anhänger der ÂťDunklen AufklärungÂŤ ist. Schon im Mai 2016 schrieb Curtis Yarvin eine E-Mail an einen Bekannten und erklärte: ÂťIch coache ThielÂŤ. Der brauche aber deutlich weniger politische Orientierungshilfe als gedacht, so Yarvin. ÂťIch habe die Wahlen in seinem Haus angeschaut. Ich glaube, mein Hangover dauerte bis Dienstag. Er (Thiel) ist vĂśllig aufgeklärt, geht aber sehr vorsichtig vorÂŤ, konstatiert Yarvin in seiner Mail. Zu diesem Zeitpunkt stand der dunkle Aufklärer auch in Kontakt mit dem technischen Redakteur von Breitbart News, dem seinerzeit wichtigsten Sprachrohr von Trumps ehemaligem Chefstrategen Steve Bannon, Âťdem Medien-Baron der Alt-Right-BewegungÂŤ, der sich ebenfalls an Yarvins Konzepten orientierte, dessen BĂźcher Ăśffentlich empfahl und maĂgeblich dazu beitrug, dass Donald Trump die Wahl gegen Hillary ÂťBody CountÂŤ Clinton gewann.
Nach Angaben von BuzzFeed News stand auch Peter Thiel 2016 in Kontakt mit besagtem Breitbart-Redakteur. In einem Podcast auftreten, wollte er allerdings nicht. Lass uns einfach Kaffee holen und dann schauen, was wir machen, antwortete der Palantir-Grßnder im Mai auf eine Interview-Einladung von Breitbart. Und im Juni lud Thiel den Breitbart-Mitarbeiter zum Abendessen in sein Haus in den Hollywood Hills ein. Man darf davon ausgehen, dass es bei diesen Gesprächen um finanzielle Unterstßtzung von Breitbart News, beziehungsweise der Alt-Right-Bewegung ging. Sprich, um Stimmungsmache fßr Trump.
Im Wahlkampf 2024 war Thiel weniger zurßckhaltend. JD Vance hatte seinen GÜnner ja auch bereits im August 2024 via Forbes Magazine dazu aufgerufen, die Seitenlinie zu verlassen und fßr Trump zu spenden. Kurz darauf ßberwies der Exil-Deutsche mindestens 1,25 Millionen Dollar. Die Betonung liegt auf mindestens. Denn als JD Vance 2022 fßr den Senat kandidierte, spendete Thiel ganze 15 Millionen US-Dollar fßr dessen Kampagne. Fßr manch einen vorausschauenden Journalisten war deshalb schon im Sommer 2024 klar: Donald Trump ist Peter Thiels erfolgreichstes Investment.
ÂťLetztes Jahr verĂśffentlichte der Journalist Max Chafkin eine Biografie Ăźber Thiel (âŚ), in der er Yarvin als den politischen Philosophen (âŚ) fĂźr ein Netzwerk bezeichnete, das man als Thiel-Verse kennt. Das Buch erklärt, wie Thiel sowohl Cruz als auch Josh Hawley auf ihrem Weg in den Senat half. Es endet mit einem dĂźsteren Bild des Milliardärs, der versucht, seinen politischen Einfluss immer offener auszuweiten (âŚ). Masters und Vance unterscheiden sich von Hawley und Cruz, schreibt Chafkin â erstere sind verlängerte Arme von ThielÂŤ.
Das konnte man in der Vanity Fair am 20. April 2022 Ăźber Thiels BemĂźhungen lesen, sich politischen Einfluss fĂźr Trumps zweite Amtsperiode zu sichern. Unter der Ăberschrift ÂťIm Inneren der Neuen Rechten â wo Peter Thiel seine grĂśĂten Einsätze platziertÂŤ erklärt das Blatt: ÂťSie sind nicht MAGA. Sie sind nicht QAnon. Curtis Yarvin und die aufstrebende Rechte entwickeln eine andere Form konservativer PolitikÂŤ.
So stellt sich an dieser Stelle unweigerlich die Frage: Was fßr eine Politik soll das sein? Warum verkßnden Thiel-Weggefährten wie Elon Musk stolz, nicht nur MAGA, sondern Dark MAGA zu sein?  Was fordern Akzelerationismus und Dunkle Aufklärung? Wie sieht der von Yarvin, Land, Thiel, Vance, Trump, Musk und Co. avisierte Soll-Zustand aus?
Auf den Punkt bringt das ein Akronym, das Curtis Yarvin seit 2012 benutzt: RAGE. Es steht fĂźr ÂťRetire All Government EmployeesÂŤ, Ăźbersetzt also dafĂźr, alle Regierungsmitarbeiter zu entlassen. Auch der von Thiel finanzierte Republikaner Blake Masters nutzte das Akronym schon Ăśffentlich. Nur so kĂśnne man das amerikanische ÂťRegimeÂŤ stĂźrzen. ÂťWas wir brauchenÂŤ, so Yarvin, Âťist ein nationaler CEO â oder das, was man einen Diktator nenntÂŤ. Die Amerikaner mĂźssten ihre ÂťDiktatoren-PhobieÂŤ Ăźberwinden, damit das Land Âťwie ein Start-up gefĂźhrt werden kannÂŤ. Nach Ansicht von The Brooklyn Rail ist das mittlerweile der Fall. Denn am 30. Januar 2025 verĂśffentlichte das Medienportal einen Artikel, in dem Autor David Levi Strauss erklärt, die US-BevĂślkerung akzeptiere nun endlich Âťdie Idee, dass das Land von einem CEO und wie ein Konzern oder eine Diktatur gefĂźhrt werden mĂźsse, weil sie â wie Peter Thiel schon 2009 erklärte â nicht mehr daran glauben, dass Freiheit und Demokratie kompatibel sindÂŤ.
Ob Akzelerationismus, Neoreaktionäre Bewegung oder Dunkle Aufklärung, sie alle plädieren fĂźr eine RĂźckkehr zu traditionellen gesellschaftlichen Konstrukten und Regierungsformen, inklusive des absoluten Monarchismus. DafĂźr soll der Staat in eine private Aktiengesellschaft umgewandelt werden, in welcher dem GeschäftsfĂźhrer absolute Macht zukommt. Gleichheit lehnen alle drei StrĂśmungen als politisches Ziel ab. Stattdessen verfolgt man rationalistische oder utilaristische Konzepte sozialer Schichtung, die auf Erbmerkmalen oder Leistungsprinzipien beruhen â sprich, auf den Grundgedanken der Eugenik.
Diese neue Regierungsform, ÂťGov-CorpÂŤ, wie der britische Journalist Iain Davis das Modell in seinen betreffenden Artikeln und einem lesenswerten Zweiteiler betitelt, wird aufgrund der ihr zur VerfĂźgung stehenden Technologie eine nie gekannte MachtfĂźlle besitzen â eine MachtfĂźlle, die sich aufgrund genau dieser Technologie mit Leichtigkeit als liberale Marktwirtschaft vermarkten lässt. Als rationales, effizientes und individuelle Freiheit suggerierendes Modell zur Steuerung von Staat, Wirtschaft und Gesellschaft. Obwohl man als BĂźrger â oder sagt man besser Kunde, Mitarbeiter oder Bilanzposition? â vertraglich verpflichtet wird, seine Rechte an die herrschende Konzernstruktur zu Ăźbertragen. Analog zu den Bewohnern von Peter Thiels ÂťStart-up CityÂŤÂ PrĂłspera â die derzeit versucht, ihr Gastland Honduras mit einer erfolgsversprechenden Klage im Wert von 10,7 Milliarden US-Dollar in den Staatsbankrott zu treiben.
Universelle Menschenrechte sind im Gov-Corp-Modell jedenfalls nicht vorgesehen. Wenn neoreaktionäre Theoretiker wie Curtis Yarvin von Exit sprechen, also vom Verlassen demokratischer Strukturen, stellen sie gleichzeitig eine Opt-in-Society in Aussicht. Was vordergrßndig erst einmal gut klingt, soll man sich die Serviceangebote des Staates doch nach eigenen Bedßrfnissen konfigurieren dßrfen, entpuppt sich schnell als totalitäres wie inhumanes Konstrukt. Als Tech-Feudalismus. Denn fßr diejenigen, die in der sozialen Schichtung untere Ränge bekleiden, sich die Serviceangebote von Gov-Corp nicht leisten kÜnnen oder den Chef kritisieren, wird es rasch ungemßtlich. Siehe Supermax-Gefängnisse.
Dementsprechend zurĂźckhaltend sollte man sein, wenn verheiĂungsvolle Begriffe wie Freedom Cities, Charter Cities, Start-up Cities oder ÂťNetwork StateÂŤ fallen. Denn gerade letzterer steht fĂźr nichts anderes als die finale Ausbaustufe von Gov-Corp. FĂźr ein Netzwerk autonomer Städte, die jeweils von einem eigenen CEO mit absolutistischer Macht gefĂźhrt werden. Sprich, fĂźr einen Zusammenschluss kleiner KĂśnigreiche â oder Niederlassungen â eines Konzerns namens Regierung. Das Konzept Netzwerk-Staat ist in dieser Form Balaji Srinivasan zuzuschreiben, dem ehemaligen CTO von Coinbase und Partner von Andreessen Horowitz. Sein im Juli 2022 verĂśffentlichtes Buch ÂťThe Network StateÂŤ beschreibt auf fast 500 Seiten, wie Âťder Nachfolger des NationalstaatsÂŤ aussehen soll. Eine unausgegorene Spinnerei ist das Ganze also nicht mehr. Im Gegenteil. Srinivasan grĂźndete extra einen Fond, um das Konzept Netzwerk-Staat voranzutreiben und wird dabei von diversen Tech-Milliardären unterstĂźtzt.
Vor diesem Hintergrund verwundert es nicht, dass Netscape-GrĂźnder Marc Andreessen bereits Anfang Oktober 2013 prognostizierte, dass Âťes in den kommenden Jahren doppelt so viele, oder drei oder vier Mal so viele Länder geben wirdÂŤ. Andreessens ÂťTechno-Optimist ManifestoÂŤ vom 16. Oktober 2023 erwähnt zwar weder Yarvin noch Land oder Srinivasan, aber es outet den Verfasser als eingefleischten Akzelerationisten â und als Fan des Transhumanisten Ray Kurzweil.
FĂźr AuĂenstehende mag Srinivasans Konzept abseitig anmuten. Aber es zog Kreise. Selbst die New York Times berichtete am 28. Oktober 2013 Ăźber eine Rede des bekennenden Staatsfeinds bei der Silicon Valley ÂťStartup SchoolÂŤ. Der entsprechende Artikel erĂśffnet mit dem Worten: ÂťSilicon Valley aufgeschreckt von Sezessionsruf. Erst die Sklavenhalter im SĂźden, jetzt das. Versucht Silicon Valley, sich von Amerika abzuspalten?ÂŤ. Während das Nachrichtenportal TechCrunch die ÂťDunkle AufklärungÂŤ Ende 2013 noch als Bewegung von Nerds abtat, die eine Monarchie fordern, sprach man beim britischen Telegraph im Januar 2014 bereits von Âťanspruchsvollem Neo-FaschismusÂŤ.
Die Granden der Big-Tech-Branche wissen seit Ăźber einem Jahrzehnt, dass ihr digital-finanzieller Komplex die Welt beherrscht und sie mittels Disruption jede andere Industrie zum Handlanger degradiert haben. Dementsprechend selbstbewusst treten ihre Vordenker, Theoretiker und Philosophen auf. Nicht umsonst teilt auch Patri Friedman, Enkel des Nobelpreisträgers Milton Friedman, neoreaktionäre Positionen â auch wenn er sich 2009 mit Yarvin Ăźberwarf, seither Âťeine politisch korrektere dunkle AufklärungÂŤÂ fordert und nun eigene Freedom Cities auf schwimmenden Plattformen in internationalen Gewässern schaffen will. DafĂźr grĂźndete er 2019 Pronomos Capital, ein Unternehmen, das Ăźber 13 Millionen US-Dollar von Thiel, Srinivasan und Andreessen erhielt, PrĂłspera finanziert und ähnliche Projekte in Afrika, SĂźdostasien und Palau im Portfolio hat.
Die omnipräsente Konstante: Peter Thiel â der nicht nur in Firmen von Yarvin, Srinivasan oder Friedman investiert, sondern Donald Trump auch bei der Auswahl von Kabinettsmitgliedern beriet. So kam es, dass Thiels Kumpel Srinivasan sogar im Gespräch fĂźr den Chefposten der FDA (Food and Drug Administration) war. Eine hochrangige Position im Staatsapparat. Erstaunlich, erinnert man sich an dessen staatsfeindliche Rede bei der ÂťStartup SchoolÂŤ. Die Japan Times findet am 19. Juni 2024 passende Worte fĂźr diese Vorgänge:
ÂťEs wird immer deutlicher: FĂźhrende Techno-Libertäre (âŚ) sind nur insoweit gegen den Staat, als er sie nicht persĂśnlich bereichert. Angesichts der Aussicht, dass die Regierung zu einem GroĂkunden wird, lĂśst sich der einst prinzipielle Widerstand gegen die Staatsmacht auf. Dieser Wandel lässt sich auch bei Thiel selbst beobachten. 2009 erklärte er, dass die groĂe Aufgabe fĂźr Libertäre darin bestehe, Politik in all ihren Formen zu entkommen. Doch 2016 engagierte sich Thiel voll und ganz fĂźr Parteipolitik und hielt eine Rede auf dem Parteitag der Republikaner. Inzwischen ist Palantir, das von ihm mitgegrĂźndete Datenanalyseunternehmen, zu einem Giganten herangewachsen und profitiert von riesigen Regierungsaufträgen. Fast die Hälfte seiner Einnahmen stammt mittlerweile aus Ăśffentlichen Mitteln.ÂŤ
Keine Frage: Peter Thiel ist Dreh- und Angelpunkt hinter der neuen US-Regierung. Der Pate der PayPal-Mafia ist der mächtigste Mann in Washington und Palantir die treibende Kraft hinter dem digitalen Panoptikum, das sich dort derzeit formiert. Und was Elon Musk als DOGE verkauft, erinnert im Kern an RAGE. Selbst das TIME Magazine stellt anhand der bislang 30.000 gefeuerten Regierungsmitarbeiter fest, dass die Vorgehensweise von Trump und Co. keineswegs Zufall ist, sondern exakt der Programmatik von Yarvins ÂťDunkler AufklärungÂŤ folgt. Nur in unseren Breiten tut man sich immer noch schwer damit, das zu erkennen â oder einräumen zu wollen.
DafĂźr gibt es zwei GrĂźnde. Erstens: Bis dato hat kein deutschsprachiger Journalist ausfĂźhrlich Ăźber diese Zusammenhänge berichtet und den notwendigen Kontext hergestellt. Zweitens: Ist man vom herrschenden System enttäuscht und stĂśĂt bei der Suche nach Alternativen auf die Analysen von Yarvin oder Srinivasan, wirken diese wie Balsam in den Ohren, geht man als Kritiker des Ăźbermächtigen und -griffigen Staates doch in weiten Teilen mit deren Einordnung aktueller Probleme konform. Selbst die LĂśsungsvorschläge der dunklen Aufklärer wirken plausibel. Zumindest theoretisch. Mehr Autonomie, Dezentralität, Effizienz, Prosperität â und viel weniger Staat. Klingt attraktiv. Vor allem im Vergleich mit dem kollektivistischen Wohlfahrtspaternalismus der vergangenen Dekaden.
Die Rattenfänger aus dem Silicon Valley erzählen dem enttäuschten und von Politik angewiderten Demos, was er hĂśren will. Im Bereich Neuro-Linguistisches Programmieren (NLP) nennt man das die Echo-Technik. Sie sorgt dafĂźr, dass sich das GegenĂźber wahr- und ernstgenommen fĂźhlt. Dass es sich Ăśffnet. Das funktioniert erstaunlich gut. Bis man sich anschaut, woher das Geld kommt und wohin die Daten flieĂen. Bis man erkennt, dass solch ein System, die Algokratie, fĂźr deutlich mehr Zentralisierung steht â fĂźr mehr Staat, fĂźr Datenzentren von Tech-Despoten und interoperable Blockchain-Plattformen von Finanzkartellen. FĂźr einen digitalen Gulag und Gewalt gegen Andersdenkende. FĂźr die Abschaffung universeller Menschenrechte.
Sicher. Man weiĂ nicht, ob die ÂťDunkle AufklärungÂŤ, ob Akzelerationismus und ein Netzwerk-Staat mit CEO â oder ÂťDiktatorÂŤ â nicht vielleicht besser funktionieren als Demokratie. Manch einer denkt, man kĂśnne es ja mal versuchen. Das wollte auch der Anarcho-Kapitalist Jeff Berwick, alias The Dollar Vigilante. Im März 2025 reiste er nach Honduras, um sich PrĂłspera anzuschauen und anschlieĂend fĂźr das Freedom-City-Projekt zu werben. Doch ein paar Tage vor der mit der Stadtverwaltung abgestimmten Visite und FĂźhrung erhielt er eine E-Mail vom Rechtsanwalt des Unternehmens, der ihm zu seiner Ăberraschung mitteilte, er dĂźrfe nun doch nicht anreisen â und hätte ab sofort generelles Zutrittsverbot fĂźr das Gelände der ÂťSonderentwicklungszoneÂŤ. Wahrscheinlich fand die Presseabteilung von PrĂłspera bei der vorbereitenden ĂberprĂźfung seiner Person heraus, dass Jeff Berwick von Technokratie, Zionismus, Krieg, Trump, Vance und auch der PayPal-Mafia nicht allzu viel hält. Er bezeichnet sich nämlich als ÂťVerschwĂśrungsrealistÂŤ â und war auf der Suche nach Freiheit. Die ist aber offenbar auch in PrĂłspera Mangelware.
-
@ d64f3475:8e56b3bf
2025-05-14 20:57:58A few weeks ago, I ran into an old friend at a coffee shop. We hadnât spoken in years, and within five minutes, she said something Iâve heard countless times:
âI just feel like Iâm so behind.â
Behind who? Behind what?
Thereâs this ideaâquiet, nagging, oddly universalâthat weâre all somehow in a race we didnât sign up for. That weâre supposed to have hit certain milestones by certain ages. That if weâre not married, promoted, rich, settled, happy (and photogenic) by 30 or 40 or pick your poison, then weâve failed some invisible test.
Where did this come from?
Some of itâs cultural, obviously. Social media compresses timelines. Youâre 27, doom-scrolling, and suddenly someone from high school just IPOâd their startup and got engaged in Rome. Another just bought a house with a kitchen island the size of a small country. You wonder if you missed a memo.
But beneath that, thereâs something deeper. A belief that life is linear. That it should look like a staircase: school, job, marriage, house, kids, success. But real life? Itâs a squiggle. A mess. A beautiful disaster.
Hereâs the truth: Youâre not behind. Thereâs no schedule. Thereâs only your path, and the courage it takes to stay on itâeven when it looks wildly different from everyone elseâs.
I say this as someone who has taken the âscenic route.â I changed careers in my 30s. I moved cities on a hunch. I dropped things that looked great on paper because they felt wrong in my gut. Iâve had seasons of momentum and seasons of stuckness. Both were necessary.
âCatching upâ assumes thereâs a fixed destination. But what if there isnât? What if the point isnât arrival, but presence? Progress that feels real, not performative?
If you need a permission slip to stop comparing, let this be it.
Youâre not late. Youâre not early.
Youâre right on time. -
@ 57d1a264:69f1fee1
2025-05-14 05:56:15Shanghai: Bus Stops Here
A new crowd-sourced transit platform allows riders to propose, vote on, and activate new bus lines in as little as three days.
From early-morning school drop-offs to seniors booking rides to the hospital, from suburban commuters seeking a faster link to the metro to families visiting ancestral graves, Shanghai is rolling out a new kind of public bus â one thatâs designed by commuters, and launched only when enough riders request it.
Branded âDZâ for dingzhi, or âcustomized,â the system invites residents to submit proposed routes through a city-run platform. Others with similar travel needs can opt in or vote, and if demand meets the threshold â typically 15 to 20 passengers per trip â the route goes live.
More than 220 DZ routes have already launched across all 16 city districts. Through an online platform opened May 8, users enter start and end points, preferred times, and trip frequency. If approved, routes can begin running in as little as three days.
Continue reading at https://www.sixthtone.com/news/1017072
originally posted at https://stacker.news/items/979637
-
@ d64f3475:8e56b3bf
2025-05-14 20:57:56Thereâs something sacred about morning air â the way it carries just enough chill to remind you youâre alive, without pushing you back inside. Iâve been starting my days on the balcony lately. Not because itâs glamorous (it isnât), or because I have a routine (I donât), but because itâs the only space in my apartment that feels both open and still.
This morning I made coffee with too much cinnamon and curled up with a blanket thatâs seen better days. I watched the city slowly wake up â one barking dog, two joggers, and the clatter of a recycling truck below. Itâs odd how these tiny patterns become a kind of comfort.
I used to think that slowing down meant falling behind. But here, perched on the third floor with my feet on cold concrete and the sky just starting to blush, I feel like Iâm exactly where Iâm supposed to be.
If youâre reading this, maybe you needed that reminder too.
â Natalie
-
@ 83279ad2:bd49240d
2025-05-14 03:58:40test nostr:nevent1qvzqqqqqqypzpqe8ntfgamz8sh3p88w99x5k2r7mksjrvm2xghju9qj00j75jfqdqyxhwumn8ghj77tpvf6jumt9qyghwumn8ghj7u3wddhk56tjvyhxjmcpr3mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmqpzemhxue69uhhyetvv9ujumn0wvh8xmmrd9skcqg5waehxw309aex2mrp0yhxgctdw4eju6t0qy28wumn8ghj7mn0wd68ytn00p68ytnyv4mqzrmhwden5te0dehhxarj9ekk7mgpp4mhxue69uhkummn9ekx7mqqyqknwtnxd4422ya9nh0qrcwfy6q3hhruyqaukvh2fpcu94es3tvu20tf7nt nostr:nevent1qvzqqqqqqypzpqe8ntfgamz8sh3p88w99x5k2r7mksjrvm2xghju9qj00j75jfqdqyxhwumn8ghj77tpvf6jumt9qyghwumn8ghj7u3wddhk56tjvyhxjmcpr3mhxue69uhkummnw3ezucnfw33k76twv4ezuum0vd5kzmqpzemhxue69uhhyetvv9ujumn0wvh8xmmrd9skcqg5waehxw309aex2mrp0yhxgctdw4eju6t0qy28wumn8ghj7mn0wd68ytn00p68ytnyv4mqzrmhwden5te0dehhxarj9ekk7mgpp4mhxue69uhkummn9ekx7mqqyqknwtnxd4422ya9nh0qrcwfy6q3hhruyqaukvh2fpcu94es3tvu20tf7nt
-
@ d41bf82f:ed90d888
2025-05-14 03:06:03สิŕšŕ¸ŕ¸Şŕ¸łŕ¸ŕ¸ąŕ¸ŕšŕ¸Ťŕ¸ŕ¸ˇŕ¸ŕ¸Şŕ¸´ŕšŕ¸ŕšŕ¸âŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Şŕ¸łŕšŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸Şŕ¸ŕ¸ŕ¸Łŕ¸˛ŕ¸Ąŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Ąŕ¸ľŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸˘ŕšŕ¸Ąŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸Ťŕ¸˛ŕšŕ¸ŕšŕ¸ŕ¸¸ŕ¸ŕ¸Şŕ¸´ŕšŕ¸ŕ¸ŕ¸ľŕšŕ¸ ารŕ¸ŕ¸´ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕšŕ¸Ąŕš â ŕšŕ¸Łŕšŕ¸ŕ¸´ŕ¸Łŕšŕ¸ ŕšŕ¸ŕ¸ ŕ¸ŕ¸ąŕ¸Ľŕ¸ŕ¸ąŕ¸, ŕ¸.ศ. 1502
ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕ¸ŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸˘ŕ¸§ŕšŕ¸˛ŕšŕ¸ŕšŕ¸Ľŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕšŕ¸Ťŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸¸ŕ¸ŕšŕ¸Łŕ¸ ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸§ŕšŕ¸˛ŕ¸ŕ¸ąŕ¸˘ŕšŕ¸ŕ¸Şŕ¸ŕ¸ŕ¸Łŕ¸˛ŕ¸Ąŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸Ąŕ¸ŕ¸˛ŕ¸Łŕ¸ŕšŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ąŕšŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸ľŕšŕ¸ŕ¸˛ŕ¸Łŕ¸Łŕ¸°ŕ¸ŕ¸Ąŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸Łŕšŕ¸ŕšŕ¸Ąŕ¸˛ŕ¸ŕ¸ŕ¸ ŕ¸ŕ¸śŕšŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸Şŕ¸Ąŕ¸ąŕ¸˘ŕšŕ¸Ťŕ¸Ąŕšŕ¸ŕ¸ˇŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸Łŕ¸°ŕ¸Şŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Şŕ¸łŕšŕ¸Łŕšŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕ¸Şŕ¸¸ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸§ŕ¸ąŕ¸ŕ¸´ŕ¸¨ŕ¸˛ŕ¸Şŕ¸ŕ¸Łŕšŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸śŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸Łŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Ąŕ¸˛ŕ¸Şŕ¸ŕ¸ąŕ¸ŕ¸Şŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸Łŕ¸¸ŕ¸ŕšŕ¸Łŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸
ŕ¸ŕ¸šŕšŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕšŕ¸ŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸Şŕ¸ŕ¸ŕšŕ¸Ťŕ¸ŕ¸¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕšŕ¸Şŕ¸łŕ¸ŕ¸ąŕ¸ ŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸łŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸łŕšŕ¸ŕ¸ŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸´ŕšŕ¸ŕ¸§ŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ŕ¸ľ 1495 ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸łŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕšŕ¸Ľŕ¸´ŕ¸ŕšŕ¸ŕ¸ŕ¸ľ 1989 ŕšŕ¸ŕ¸˘ŕšŕ¸Ťŕ¸ŕ¸¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕšŕšŕ¸Łŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸¸ŕ¸ŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕšŕ¸Ťŕšŕ¸ŕ¸ŕ¸Ľŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸Şŕ¸šŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸¸ŕ¸ŕšŕ¸Łŕ¸ (Gunpowder Revolution) สŕšŕ¸§ŕ¸ŕšŕ¸Ťŕ¸ŕ¸¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸ˇŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸Ľŕ¸ąŕ¸ŕ¸Šŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Şŕ¸´ŕšŕ¸ŕ¸Şŕ¸¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸Şŕ¸˛ŕ¸Ťŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕšŕ¸Ľŕ¸°ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸Şŕ¸˛ŕ¸Łŕ¸Şŕ¸ŕšŕ¸ŕ¸¨ŕ¸ŕ¸ľŕšŕ¸ŕ¸Ľŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸¸ŕ¸ŕšŕ¸Łŕ¸ŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕ¸Ľŕ¸ŕ¸Ľŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸Ťŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ąŕ¸
ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸Şŕ¸łŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Şŕ¸ŕ¸ŕ¸ŕ¸łŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸ˇŕ¸ ŕ¸ŕ¸łŕšŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸´ŕšŕ¸ŕ¸§ŕ¸˛ŕ¸ŕ¸ŕ¸ľŕ¸ŕ¸šŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ ูยŕ¸ŕ¸˛ŕ¸ŕ¸ ายŕ¸ŕ¸ŕ¸ ŕ¸ŕ¸ŕ¸°ŕ¸ŕ¸ľŕšŕ¸ŕ¸łŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕšŕ¸Ľŕ¸´ŕ¸ŕ¸ŕ¸šŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸Ąŕšŕšŕ¸Ťŕšŕ¸ŕ¸šŕšŕ¸ŕ¸ŕ¸ ายŕšŕ¸ŕ¸Ťŕ¸Ľŕ¸ŕ¸Ťŕ¸ŕ¸ľŕ¸ŕ¸ŕ¸ŕšŕ¸âสะŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸śŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸¸ŕ¸Ąŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸Ąŕ¸ŕ¸§ŕ¸ŕšŕ¸Ľŕ¸°ŕ¸Ąŕ¸ľŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸Ľŕšŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸ˇŕ¸
ŕšŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸Şŕ¸˛ŕ¸Łŕ¸Şŕ¸ŕšŕ¸ŕ¸¨ ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕ¸ŕ¸Ľŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸¸ŕ¸ŕšŕ¸Łŕ¸ŕ¸Ľŕ¸ŕ¸Ľŕ¸ รูŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸ŕšŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕ¸ŕ¸šŕ¸ŕ¸Ąŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸ľŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸Łŕ¸ľŕ¸ŕšŕ¸ŕ¸Ąŕ¸˛ŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ŕ¸ŕ¸°ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸šŕšŕ¸ŕ¸¸ŕšŕ¸Ąŕ¸ŕ¸Łŕ¸ŕ¸ ŕ¸ŕ¸šŕšŕ¸Ąŕ¸ľŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸šŕšŕšŕ¸Ľŕ¸°ŕ¸ŕ¸šŕšŕ¸Ąŕ¸ąŕšŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸°ŕ¸Ťŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸Ťŕ¸Ľŕ¸ŕ¸Ťŕ¸ŕ¸ľŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸¸ŕ¸Ąŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸ ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸§ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸Ľŕ¸ŕ¸˘ŕ¸˛ŕ¸˘ŕ¸˛ŕ¸Ąŕ¸Şŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Ťŕ¸Ľŕ¸ŕ¸Ťŕ¸ŕ¸ľŕ¸ŕ¸ŕ¸ŕ¸ŕ¸¸ŕ¸ ŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕšŕ¸˘ŕ¸ŕ¸˛ŕ¸˘ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ ภาช฾ŕ¸ŕ¸˛ŕ¸Łŕ¸Şŕ¸Ľŕ¸°ŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸´ ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ľŕ¸ŕ¸Ľŕ¸´ŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕ¸ľ 1995 ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ąŕ¸ âŕ¸ŕ¸łŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕšŕ¸Ľŕ¸´ŕ¸ŕ¸Şŕ¸łŕ¸Ťŕ¸Łŕ¸ąŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸¸ŕ¸â
ŕ¸ŕ¸šŕšŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸ľŕšŕ¸§ŕšŕ¸˛ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸ าช฾สบŕ¸ŕšŕ¸ŕ¸ŕ¸Ľŕ¸¸ŕšŕ¸Ąŕ¸ŕ¸Łŕ¸°ŕšŕ¸ŕ¸¨ OECD(The Organization for Economic Co-operation and Development) ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸Ąŕšŕ¸ŕ¸°ŕšŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕšŕ¸łŕ¸ŕ¸¸ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸Şŕ¸§ŕ¸ąŕ¸Şŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸Ł ŕšŕ¸ŕšŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸Łŕ¸´ŕ¸ ŕ¸ŕ¸ŕ¸Łŕ¸§ŕ¸˘ŕ¸Ąŕ¸ąŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸Ľŕ¸ŕ¸Łŕ¸°ŕšŕ¸˘ŕ¸ŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸Şŕ¸§ŕ¸ąŕ¸Şŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸Şŕ¸ąŕ¸ŕ¸Şŕšŕ¸§ŕ¸ŕ¸ŕ¸ľŕšŕ¸Şŕ¸Ąŕšŕ¸Ťŕ¸ŕ¸¸ŕ¸Şŕ¸Ąŕ¸ŕ¸Ľŕ¸ŕ¸ąŕ¸ŕ¸ าช฾ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸˘ŕšŕ¸ ŕšŕ¸Ľŕ¸°ŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸Şŕ¸˛ŕ¸Łŕ¸Şŕ¸ŕšŕ¸ŕ¸¨ ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ าช฾ŕ¸ŕ¸šŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸°ŕ¸˘ŕ¸´ŕšŕ¸ŕ¸ŕ¸łŕšŕ¸ŕšŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ľ
ŕ¸ŕ¸šŕšŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸§ŕ¸´ŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸Ťŕšŕ¸ŕ¸˛ŕ¸˘ŕ¸¸ŕ¸ŕ¸ąŕ¸˘ŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸´ ŕšŕ¸ŕ¸˘ŕ¸Łŕ¸°ŕ¸ŕ¸¸ŕ¸§ŕšŕ¸˛ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸ŕšŕ¸§ŕ¸ŕšŕ¸§ŕ¸Ľŕ¸˛ŕ¸Łŕ¸˛ŕ¸§ 200 ŕ¸ŕ¸ľ ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸´ŕ¸§ŕ¸ąŕ¸ŕ¸´ŕ¸ŕ¸Łŕ¸ąŕšŕ¸ŕšŕ¸¨ŕ¸Şŕšŕ¸ŕ¸ŕ¸ľ 1789 ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Ľŕšŕ¸Ąŕ¸Şŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸łŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕšŕ¸Ľŕ¸´ŕ¸ŕšŕ¸ŕ¸ŕ¸ľ 1989 ŕ¸ŕšŕ¸ŕ¸ŕ¸Ťŕ¸ŕšŕ¸˛ŕ¸ŕ¸ąŕšŕ¸ ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕšŕ¸Ąŕšŕšŕ¸ŕšŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ สŕšŕ¸§ŕ¸ŕšŕ¸Ťŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸ŕ¸ŕ¸°ŕ¸§ŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸¸ŕ¸Ąŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸Ľŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸´ŕ¸§ŕ¸ąŕ¸ŕ¸´ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸łŕšŕ¸Ťŕšŕ¸Łŕ¸ąŕ¸ŕ¸Şŕ¸˛ŕ¸Ąŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸¸ŕ¸Ąŕšŕ¸Ľŕ¸°ŕ¸ŕ¸˘ŕ¸˛ŕ¸˘ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕ¸ŕ¸Ľŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕš รูŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸Ťŕ¸ŕšŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ľŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸Łŕ¸Ąŕ¸˛ŕ¸ŕ¸ŕ¸°ŕšŕ¸ŕšŕšŕ¸ŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸łŕ¸Şŕ¸ŕ¸ŕ¸Łŕ¸˛ŕ¸Ąŕ¸Ąŕ¸˛ŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ľŕ¸ŕ¸Łŕ¸°ŕ¸Şŕ¸´ŕ¸ŕ¸ŕ¸´ŕ¸ าŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸Ľŕ¸´ŕ¸ŕšŕ¸ŕšŕ¸Ąŕ¸ľŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸Ľŕšŕ¸ สŕ¸ŕ¸ŕ¸Łŕ¸˛ŕ¸Ąŕšŕ¸˘ŕšŕ¸ŕ¸ŕ¸śŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸Łŕ¸ŕšŕ¸ŕ¸Şŕ¸šŕšŕ¸Łŕ¸°ŕ¸Ťŕ¸§ŕšŕ¸˛ŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸Ąŕ¸ŕ¸˛ŕ¸Łŕ¸ŕš ŕšŕ¸ŕšŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸Ťŕ¸ŕšŕ¸˛ŕ¸Łŕ¸°ŕ¸Ťŕ¸§ŕšŕ¸˛ŕ¸ŕ¸Şŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸Şŕ¸˛ŕ¸Ąŕ¸˛ŕ¸Łŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸Ąŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸ŕ¸ľŕšŕ¸Şŕ¸¸ŕ¸ŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸Şŕ¸˛ŕ¸Ťŕ¸ŕ¸Łŕ¸Łŕ¸Ą ŕšŕ¸ŕšŕšŕ¸ŕš ŕ¸ŕ¸ŕ¸Ąŕ¸Ąŕ¸´ŕ¸§ŕ¸ŕ¸´ŕ¸Şŕ¸ŕšŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸¸ŕ¸Ąŕ¸ŕ¸˛ŕ¸ŕ¸¨ŕ¸šŕ¸ŕ¸˘ŕšŕ¸ŕ¸Ľŕ¸˛ŕ¸ ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸Şŕ¸§ŕ¸ąŕ¸Şŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸ŕ¸´ŕ¸˘ŕ¸Ąŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸Ąŕ¸ˇŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕšŕ¸Łŕ¸ŕ¸ŕ¸šŕ¸ŕšŕ¸ŕšŕ¸Ťŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˘ŕ¸´ŕ¸ŕ¸˘ŕ¸ŕ¸Ąŕšŕ¸Ťŕšŕ¸Łŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸Łŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸łŕ¸Şŕ¸ŕ¸ŕ¸Łŕ¸˛ŕ¸Ą
ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸śŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Ťŕšŕšŕ¸Ťŕšŕ¸ŕ¸§ŕšŕ¸˛ ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸Ąŕ¸´ŕ¸§ŕ¸ŕ¸´ŕ¸Şŕ¸ŕšŕšŕ¸Ľŕ¸°ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸˛ŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸¸ŕ¸ŕ¸Ąŕ¸ŕ¸˛ŕ¸Łŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸ŕšŕ¸˛ŕ¸Ąŕ¸ŕ¸ąŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸Ľŕ¸ąŕ¸ŕ¸Ąŕ¸ľŕšŕ¸ŕ¸Łŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Łŕ¸°ŕ¸ŕ¸Ąŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸Łŕ¸ŕ¸ľŕšŕ¸ŕ¸Ľŕšŕ¸˛ŕ¸˘ŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ ยุŕ¸ŕ¸ŕ¸¨ŕ¸˛ŕ¸Şŕ¸ŕ¸Łŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸Ł ŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ľŕ¸ŕ¸Łŕ¸°ŕ¸Şŕ¸´ŕ¸ŕ¸ŕ¸´ŕ¸ าŕ¸ŕ¸Şŕ¸šŕ¸ŕ¸Şŕ¸¸ŕ¸ŕšŕ¸ŕšŕ¸Ľŕ¸ŕšŕ¸Ťŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸¸ŕ¸ŕšŕ¸Łŕ¸ ŕšŕ¸ŕšŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕšŕ¸Ťŕ¸Ąŕšŕ¸ŕ¸ľŕšŕ¸ŕ¸Ľŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸¸ŕ¸ŕšŕ¸Łŕ¸ŕ¸Ľŕ¸ŕ¸Ľŕ¸ ระŕ¸ŕ¸ŕšŕ¸Ťŕ¸Ľŕšŕ¸˛ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸Şŕ¸šŕšŕ¸ŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ąŕ¸
สาลารŕ¸ŕšŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˛ŕ¸Ąŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸Ťŕ¸˛ŕšŕ¸ŕ¸ short vdo ŕ¸ŕ¸ľŕšŕ¸Şŕ¸Łŕ¸¸ŕ¸ŕ¸ŕ¸Łŕ¸°ŕšŕ¸ŕšŕ¸ŕ¸Şŕ¸łŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸ ŕ¸ŕ¸Łŕšŕ¸ŕ¸Ąŕ¸ŕ¸Łŕ¸˛ŕ¸ŕ¸´ŕ¸ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸łŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸˘ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ąŕ¸ ŕšŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸ŕšŕ¸˛ŕ¸˘ ŕšŕ¸ŕšŕ¸ŕ¸ľŕš TikTok ŕ¸ŕšŕ¸ŕ¸ https://www.tiktok.com/@moneyment1971
-
@ eac63075:b4988b48
2024-11-09 17:57:27Based on a recent paper that included collaboration from renowned experts such as Lynn Alden, Steve Lee, and Ren Crypto Fish, we discuss in depth how Bitcoin's consensus is built, the main risks, and the complex dynamics of protocol upgrades.
Podcast https://www.fountain.fm/episode/wbjD6ntQuvX5u2G5BccC
Presentation https://gamma.app/docs/Analyzing-Bitcoin-Consensus-Risks-in-Protocol-Upgrades-p66axxjwaa37ksn
1. Introduction to Consensus in Bitcoin
Consensus in Bitcoin is the foundation that keeps the network secure and functional, allowing users worldwide to perform transactions in a decentralized manner without the need for intermediaries. Since its launch in 2009, Bitcoin is often described as an "immutable" system designed to resist changes, and it is precisely this resistance that ensures its security and stability.
The central idea behind consensus in Bitcoin is to create a set of acceptance rules for blocks and transactions, ensuring that all network participants agree on the transaction history. This prevents "double-spending," where the same bitcoin could be used in two simultaneous transactions, something that would compromise trust in the network.
Evolution of Consensus in Bitcoin
Over the years, consensus in Bitcoin has undergone several adaptations, and the way participants agree on changes remains a delicate process. Unlike traditional systems, where changes can be imposed from the top down, Bitcoin operates in a decentralized model where any significant change needs the support of various groups of stakeholders, including miners, developers, users, and large node operators.
Moreover, the update process is extremely cautious, as hasty changes can compromise the network's security. As a result, the philosophy of "don't fix what isn't broken" prevails, with improvements happening incrementally and only after broad consensus among those involved. This model can make progress seem slow but ensures that Bitcoin remains faithful to the principles of security and decentralization.
2. Technical Components of Consensus
Bitcoin's consensus is supported by a set of technical rules that determine what is considered a valid transaction and a valid block on the network. These technical aspects ensure that all nodesâthe computers that participate in the Bitcoin networkâagree on the current state of the blockchain. Below are the main technical components that form the basis of the consensus.
Validation of Blocks and Transactions
The validation of blocks and transactions is the central point of consensus in Bitcoin. A block is only considered valid if it meets certain criteria, such as maximum size, transaction structure, and the solving of the "Proof of Work" problem. The proof of work, required for a block to be included in the blockchain, is a computational process that ensures the block contains significant computational effortâprotecting the network against manipulation attempts.
Transactions, in turn, need to follow specific input and output rules. Each transaction includes cryptographic signatures that prove the ownership of the bitcoins sent, as well as validation scripts that verify if the transaction conditions are met. This validation system is essential for network nodes to autonomously confirm that each transaction follows the rules.
Chain Selection
Another fundamental technical issue for Bitcoin's consensus is chain selection, which becomes especially important in cases where multiple versions of the blockchain coexist, such as after a network split (fork). To decide which chain is the "true" one and should be followed, the network adopts the criterion of the highest accumulated proof of work. In other words, the chain with the highest number of valid blocks, built with the greatest computational effort, is chosen by the network as the official one.
This criterion avoids permanent splits because it encourages all nodes to follow the same main chain, reinforcing consensus.
Soft Forks vs. Hard Forks
In the consensus process, protocol changes can happen in two ways: through soft forks or hard forks. These variations affect not only the protocol update but also the implications for network users:
-
Soft Forks: These are changes that are backward compatible. Only nodes that adopt the new update will follow the new rules, but old nodes will still recognize the blocks produced with these rules as valid. This compatibility makes soft forks a safer option for updates, as it minimizes the risk of network division.
-
Hard Forks: These are updates that are not backward compatible, requiring all nodes to update to the new version or risk being separated from the main chain. Hard forks can result in the creation of a new coin, as occurred with the split between Bitcoin and Bitcoin Cash in 2017. While hard forks allow for deeper changes, they also bring significant risks of network fragmentation.
These technical components form the base of Bitcoin's security and resilience, allowing the system to remain functional and immutable without losing the necessary flexibility to evolve over time.
3. Stakeholders in Bitcoin's Consensus
Consensus in Bitcoin is not decided centrally. On the contrary, it depends on the interaction between different groups of stakeholders, each with their motivations, interests, and levels of influence. These groups play fundamental roles in how changes are implemented or rejected on the network. Below, we explore the six main stakeholders in Bitcoin's consensus.
1. Economic Nodes
Economic nodes, usually operated by exchanges, custody providers, and large companies that accept Bitcoin, exert significant influence over consensus. Because they handle large volumes of transactions and act as a connection point between the Bitcoin ecosystem and the traditional financial system, these nodes have the power to validate or reject blocks and to define which version of the software to follow in case of a fork.
Their influence is proportional to the volume of transactions they handle, and they can directly affect which chain will be seen as the main one. Their incentive is to maintain the network's stability and security to preserve its functionality and meet regulatory requirements.
2. Investors
Investors, including large institutional funds and individual Bitcoin holders, influence consensus indirectly through their impact on the asset's price. Their buying and selling actions can affect Bitcoin's value, which in turn influences the motivation of miners and other stakeholders to continue investing in the network's security and development.
Some institutional investors have agreements with custodians that may limit their ability to act in network split situations. Thus, the impact of each investor on consensus can vary based on their ownership structure and how quickly they can react to a network change.
3. Media Influencers
Media influencers, including journalists, analysts, and popular personalities on social media, have a powerful role in shaping public opinion about Bitcoin and possible updates. These influencers can help educate the public, promote debates, and bring transparency to the consensus process.
On the other hand, the impact of influencers can be double-edged: while they can clarify complex topics, they can also distort perceptions by amplifying or minimizing change proposals. This makes them a force both of support and resistance to consensus.
4. Miners
Miners are responsible for validating transactions and including blocks in the blockchain. Through computational power (hashrate), they also exert significant influence over consensus decisions. In update processes, miners often signal their support for a proposal, indicating that the new version is safe to use. However, this signaling is not always definitive, and miners can change their position if they deem it necessary.
Their incentive is to maximize returns from block rewards and transaction fees, as well as to maintain the value of investments in their specialized equipment, which are only profitable if the network remains stable.
5. Protocol Developers
Protocol developers, often called "Core Developers," are responsible for writing and maintaining Bitcoin's code. Although they do not have direct power over consensus, they possess an informal veto power since they decide which changes are included in the main client (Bitcoin Core). This group also serves as an important source of technical knowledge, helping guide decisions and inform other stakeholders.
Their incentive lies in the continuous improvement of the network, ensuring security and decentralization. Many developers are funded by grants and sponsorships, but their motivations generally include a strong ideological commitment to Bitcoin's principles.
6. Users and Application Developers
This group includes people who use Bitcoin in their daily transactions and developers who build solutions based on the network, such as wallets, exchanges, and payment platforms. Although their power in consensus is less than that of miners or economic nodes, they play an important role because they are responsible for popularizing Bitcoin's use and expanding the ecosystem.
If application developers decide not to adopt an update, this can affect compatibility and widespread acceptance. Thus, they indirectly influence consensus by deciding which version of the protocol to follow in their applications.
These stakeholders are vital to the consensus process, and each group exerts influence according to their involvement, incentives, and ability to act in situations of change. Understanding the role of each makes it clearer how consensus is formed and why it is so difficult to make significant changes to Bitcoin.
4. Mechanisms for Activating Updates in Bitcoin
For Bitcoin to evolve without compromising security and consensus, different mechanisms for activating updates have been developed over the years. These mechanisms help coordinate changes among network nodes to minimize the risk of fragmentation and ensure that updates are implemented in an orderly manner. Here, we explore some of the main methods used in Bitcoin, their advantages and disadvantages, as well as historical examples of significant updates.
Flag Day
The Flag Day mechanism is one of the simplest forms of activating changes. In it, a specific date or block is determined as the activation moment, and all nodes must be updated by that point. This method does not involve prior signaling; participants simply need to update to the new software version by the established day or block.
-
Advantages: Simplicity and predictability are the main benefits of Flag Day, as everyone knows the exact activation date.
-
Disadvantages: Inflexibility can be a problem because there is no way to adjust the schedule if a significant part of the network has not updated. This can result in network splits if a significant number of nodes are not ready for the update.
An example of Flag Day was the Pay to Script Hash (P2SH) update in 2012, which required all nodes to adopt the change to avoid compatibility issues.
BIP34 and BIP9
BIP34 introduced a more dynamic process, in which miners increase the version number in block headers to signal the update. When a predetermined percentage of the last blocks is mined with this new version, the update is automatically activated. This model later evolved with BIP9, which allowed multiple updates to be signaled simultaneously through "version bits," each corresponding to a specific change.
-
Advantages: Allows the network to activate updates gradually, giving more time for participants to adapt.
-
Disadvantages: These methods rely heavily on miner support, which means that if a sufficient number of miners do not signal the update, it can be delayed or not implemented.
BIP9 was used in the activation of SegWit (BIP141) but faced challenges because some miners did not signal their intent to activate, leading to the development of new mechanisms.
User Activated Soft Forks (UASF) and User Resisted Soft Forks (URSF)
To increase the decision-making power of ordinary users, the concept of User Activated Soft Fork (UASF) was introduced, allowing node operators, not just miners, to determine consensus for a change. In this model, nodes set a date to start rejecting blocks that are not in compliance with the new update, forcing miners to adapt or risk having their blocks rejected by the network.
URSF, in turn, is a model where nodes reject blocks that attempt to adopt a specific update, functioning as resistance against proposed changes.
-
Advantages: UASF returns decision-making power to node operators, ensuring that changes do not depend solely on miners.
-
Disadvantages: Both UASF and URSF can generate network splits, especially in cases of strong opposition among different stakeholders.
An example of UASF was the activation of SegWit in 2017, where users supported activation independently of miner signaling, which ended up forcing its adoption.
BIP8 (LOT=True)
BIP8 is an evolution of BIP9, designed to prevent miners from indefinitely blocking a change desired by the majority of users and developers. BIP8 allows setting a parameter called "lockinontimeout" (LOT) as true, which means that if the update has not been fully signaled by a certain point, it is automatically activated.
-
Advantages: Ensures that changes with broad support among users are not blocked by miners who wish to maintain the status quo.
-
Disadvantages: Can lead to network splits if miners or other important stakeholders do not support the update.
Although BIP8 with LOT=True has not yet been used in Bitcoin, it is a proposal that can be applied in future updates if necessary.
These activation mechanisms have been essential for Bitcoin's development, allowing updates that keep the network secure and functional. Each method brings its own advantages and challenges, but all share the goal of preserving consensus and network cohesion.
5. Risks and Considerations in Consensus Updates
Consensus updates in Bitcoin are complex processes that involve not only technical aspects but also political, economic, and social considerations. Due to the network's decentralized nature, each change brings with it a set of risks that need to be carefully assessed. Below, we explore some of the main challenges and future scenarios, as well as the possible impacts on stakeholders.
Network Fragility with Alternative Implementations
One of the main risks associated with consensus updates is the possibility of network fragmentation when there are alternative software implementations. If an update is implemented by a significant group of nodes but rejected by others, a network split (fork) can occur. This creates two competing chains, each with a different version of the transaction history, leading to unpredictable consequences for users and investors.
Such fragmentation weakens Bitcoin because, by dividing hashing power (computing) and coin value, it reduces network security and investor confidence. A notable example of this risk was the fork that gave rise to Bitcoin Cash in 2017 when disagreements over block size resulted in a new chain and a new asset.
Chain Splits and Impact on Stakeholders
Chain splits are a significant risk in update processes, especially in hard forks. During a hard fork, the network is split into two separate chains, each with its own set of rules. This results in the creation of a new coin and leaves users with duplicated assets on both chains. While this may seem advantageous, in the long run, these splits weaken the network and create uncertainties for investors.
Each group of stakeholders reacts differently to a chain split:
-
Institutional Investors and ETFs: Face regulatory and compliance challenges because many of these assets are managed under strict regulations. The creation of a new coin requires decisions to be made quickly to avoid potential losses, which may be hampered by regulatory constraints.
-
Miners: May be incentivized to shift their computing power to the chain that offers higher profitability, which can weaken one of the networks.
-
Economic Nodes: Such as major exchanges and custody providers, have to quickly choose which chain to support, influencing the perceived value of each network.
Such divisions can generate uncertainties and loss of value, especially for institutional investors and those who use Bitcoin as a store of value.
Regulatory Impacts and Institutional Investors
With the growing presence of institutional investors in Bitcoin, consensus changes face new compliance challenges. Bitcoin ETFs, for example, are required to follow strict rules about which assets they can include and how chain split events should be handled. The creation of a new asset or migration to a new chain can complicate these processes, creating pressure for large financial players to quickly choose a chain, affecting the stability of consensus.
Moreover, decisions regarding forks can influence the Bitcoin futures and derivatives market, affecting perception and adoption by new investors. Therefore, the need to avoid splits and maintain cohesion is crucial to attract and preserve the confidence of these investors.
Security Considerations in Soft Forks and Hard Forks
While soft forks are generally preferred in Bitcoin for their backward compatibility, they are not without risks. Soft forks can create different classes of nodes on the network (updated and non-updated), which increases operational complexity and can ultimately weaken consensus cohesion. In a network scenario with fragmentation of node classes, Bitcoin's security can be affected, as some nodes may lose part of the visibility over updated transactions or rules.
In hard forks, the security risk is even more evident because all nodes need to adopt the new update to avoid network division. Experience shows that abrupt changes can create temporary vulnerabilities, in which malicious agents try to exploit the transition to attack the network.
Bounty Claim Risks and Attack Scenarios
Another risk in consensus updates are so-called "bounty claims"âaccumulated rewards that can be obtained if an attacker manages to split or deceive a part of the network. In a conflict scenario, a group of miners or nodes could be incentivized to support a new update or create an alternative version of the software to benefit from these rewards.
These risks require stakeholders to carefully assess each update and the potential vulnerabilities it may introduce. The possibility of "bounty claims" adds a layer of complexity to consensus because each interest group may see a financial opportunity in a change that, in the long term, may harm network stability.
The risks discussed above show the complexity of consensus in Bitcoin and the importance of approaching it gradually and deliberately. Updates need to consider not only technical aspects but also economic and social implications, in order to preserve Bitcoin's integrity and maintain trust among stakeholders.
6. Recommendations for the Consensus Process in Bitcoin
To ensure that protocol changes in Bitcoin are implemented safely and with broad support, it is essential that all stakeholders adopt a careful and coordinated approach. Here are strategic recommendations for evaluating, supporting, or rejecting consensus updates, considering the risks and challenges discussed earlier, along with best practices for successful implementation.
1. Careful Evaluation of Proposal Maturity
Stakeholders should rigorously assess the maturity level of a proposal before supporting its implementation. Updates that are still experimental or lack a robust technical foundation can expose the network to unnecessary risks. Ideally, change proposals should go through an extensive testing phase, have security audits, and receive review and feedback from various developers and experts.
2. Extensive Testing in Secure and Compatible Networks
Before an update is activated on the mainnet, it is essential to test it on networks like testnet and signet, and whenever possible, on other compatible networks that offer a safe and controlled environment to identify potential issues. Testing on networks like Litecoin was fundamental for the safe launch of innovations like SegWit and the Lightning Network, allowing functionalities to be validated on a lower-impact network before being implemented on Bitcoin.
The Liquid Network, developed by Blockstream, also plays an important role as an experimental network for new proposals, such as OP_CAT. By adopting these testing environments, stakeholders can mitigate risks and ensure that the update is reliable and secure before being adopted by the main network.
3. Importance of Stakeholder Engagement
The success of a consensus update strongly depends on the active participation of all stakeholders. This includes economic nodes, miners, protocol developers, investors, and end users. Lack of participation can lead to inadequate decisions or even future network splits, which would compromise Bitcoin's security and stability.
4. Key Questions for Evaluating Consensus Proposals
To assist in decision-making, each group of stakeholders should consider some key questions before supporting a consensus change:
- Does the proposal offer tangible benefits for Bitcoin's security, scalability, or usability?
- Does it maintain backward compatibility or introduce the risk of network split?
- Are the implementation requirements clear and feasible for each group involved?
- Are there clear and aligned incentives for all stakeholder groups to accept the change?
5. Coordination and Timing in Implementations
Timing is crucial. Updates with short activation windows can force a split because not all nodes and miners can update simultaneously. Changes should be planned with ample deadlines to allow all stakeholders to adjust their systems, avoiding surprises that could lead to fragmentation.
Mechanisms like soft forks are generally preferable to hard forks because they allow a smoother transition. Opting for backward-compatible updates when possible facilitates the process and ensures that nodes and miners can adapt without pressure.
6. Continuous Monitoring and Re-evaluation
After an update, it's essential to monitor the network to identify problems or side effects. This continuous process helps ensure cohesion and trust among all participants, keeping Bitcoin as a secure and robust network.
These recommendations, including the use of secure networks for extensive testing, promote a collaborative and secure environment for Bitcoin's consensus process. By adopting a deliberate and strategic approach, stakeholders can preserve Bitcoin's value as a decentralized and censorship-resistant network.
7. Conclusion
Consensus in Bitcoin is more than a set of rules; it's the foundation that sustains the network as a decentralized, secure, and reliable system. Unlike centralized systems, where decisions can be made quickly, Bitcoin requires a much more deliberate and cooperative approach, where the interests of miners, economic nodes, developers, investors, and users must be considered and harmonized. This governance model may seem slow, but it is fundamental to preserving the resilience and trust that make Bitcoin a global store of value and censorship-resistant.
Consensus updates in Bitcoin must balance the need for innovation with the preservation of the network's core principles. The development process of a proposal needs to be detailed and rigorous, going through several testing stages, such as in testnet, signet, and compatible networks like Litecoin and Liquid Network. These networks offer safe environments for proposals to be analyzed and improved before being launched on the main network.
Each proposed change must be carefully evaluated regarding its maturity, impact, backward compatibility, and support among stakeholders. The recommended key questions and appropriate timing are critical to ensure that an update is adopted without compromising network cohesion. It's also essential that the implementation process is continuously monitored and re-evaluated, allowing adjustments as necessary and minimizing the risk of instability.
By following these guidelines, Bitcoin's stakeholders can ensure that the network continues to evolve safely and robustly, maintaining user trust and further solidifying its role as one of the most resilient and innovative digital assets in the world. Ultimately, consensus in Bitcoin is not just a technical issue but a reflection of its community and the values it represents: security, decentralization, and resilience.
8. Links
Whitepaper: https://github.com/bitcoin-cap/bcap
Youtube (pt-br): https://www.youtube.com/watch?v=rARycAibl9o&list=PL-qnhF0qlSPkfhorqsREuIu4UTbF0h4zb
-
-
@ 56cd780f:cbde8b29
2025-05-14 19:34:00Jo, blomster kommer i alle farger og fasonger. Her har du to eksempler:
-
@ eac63075:b4988b48
2024-10-26 22:14:19The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also addressing her Bill No. 3,341/2024, which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
What is a CBDC?
Before discussing the specifics of DREX, itâs important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their programmability. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
Practical Example: The Case of DREX During the Pandemic
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco ItaĂş. He suggested that, if DREX had existed during the COVID-19 pandemic, the government could have restricted the currencyâs use to a 5-kilometer radius around a personâs residence, limiting their economic mobility. Another proposed use by the executive related to the Bolsa FamĂlia welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the countryâs Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
How Does China's Social Credit System Work?
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, including financial behavior, criminal record, social interactions, and even online activities. This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC â or âdigital yuanâ â the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. Chinaâs CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods, or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System âblacklistsâ have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizensâ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
DREX and Bill No. 3,341/2024
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy (Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, Julia drafted her bill, PL No. 3,341/2024, which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
âThe more I read about DREX, the less I want its implementation,â says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizenâs transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, âfreeze balances or even delete funds directly from user accounts.â
Risks and Individual Freedom
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. âToday we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,â he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked â those without regular access to banking services â were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
The Relationship Between DREX and Pix
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizenâs choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. âHow many more rules will banks create to profit from us?â asks Julia, noting that DREX could further enhance control over personal finances.
International Precedents and Resistance to CBDC
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Juliaâs: in a digitalized system, âwith one click, your money could disappear.â She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREXâs advance even more concerning.
Bill No. 3,341/2024 and Popular Pressure
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. âIf the future means control, I prefer to live in the past,â Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. âI am only one deputy, and we need the publicâs support to raise the projectâs visibility,â she explains, encouraging the public to press other parliamentarians and ask them to âpay attention to PL 3341 and the project that prohibits the end of physical money.â The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Braziliansâ financial freedom.
Whatâs at Stake?
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bankâs CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and itâs up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. âThis agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.â Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
A Call to Action
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanattaâs concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. âMy fear is that this project will pass, and people wonât even understand what is happening.â Therefore, may every citizen at least have the chance to understand whatâs at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ d41bf82f:ed90d888
2025-05-14 02:59:50âŕ¸ŕ¸ąŕ¸ŕ¸˘ŕ¸ąŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸Ľŕ¸°ŕ¸Ťŕ¸§ŕ¸ąŕ¸ŕ¸§ŕšŕ¸˛ สูŕ¸ŕ¸§ŕ¸ąŕ¸ŕ¸Ťŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕšŕ¸Ľŕ¸°ŕšŕ¸¨ŕ¸Łŕ¸Šŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸°ŕ¸Ľŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸Ľŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Şŕ¸łŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸˘ŕ¸Ąŕ¸ľŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕ¸ วูŕ¸ŕ¸Ťŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸°ŕ¸Ąŕ¸˛ŕ¸ŕ¸śŕ¸ วูŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸Ťŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸˛ŕ¸Ąŕ¸ľŕ¸ŕ¸˘ŕ¸šŕšŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸ľŕšŕ¸˘ŕ¸§ŕ¸ŕ¸ąŕ¸ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕšŕ¸Ťŕ¸Ľŕšŕ¸˛ŕ¸ŕ¸ľŕš ŕ¸ŕ¸°ŕ¸ŕ¸šŕšŕ¸Ľŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕšŕ¸Łŕšŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Ťŕ¸Ąŕ¸˛ŕ¸˘ ŕšŕ¸Ąŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕšŕ¸˘ŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸§ŕ¸§ŕ¸´ŕ¸ŕ¸˘ŕ¸˛ŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸ ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕšŕ¸Ťŕ¸Ľŕ¸Ąŕ¸ŕ¸ľŕšŕ¸Şŕ¸¸ŕ¸ŕ¸ŕšŕ¸˘ŕ¸ąŕ¸ŕ¸ŕ¸¸ŕšŕ¸Ąŕšŕ¸ŕšŕ¸Łŕ¸ŕ¸ŕ¸˛ŕ¸˘ŕšŕ¸Łŕ¸ŕšŕ¸ŕšŕ¸Ťŕšŕ¸ŕ¸ąŕ¸ŕ¸Ąŕ¸ąŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸Łŕšŕ¸ŕ¸Łŕ¸°ŕšŕ¸˘ŕ¸ŕ¸ŕšâ
â ŕ¸ŕ¸˛ŕ¸Łŕšŕšŕ¸ŕ¸ŕ¸Łŕš ŕ¸ŕ¸ľ. ŕ¸ŕ¸Ľŕ¸˛ŕ¸Łŕšŕ¸
ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Ľŕšŕ¸Ąŕ¸Şŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸Şŕ¸ˇŕšŕ¸ŕ¸Ąŕ¸ŕ¸ŕ¸˘ŕ¸ŕ¸ŕ¸ŕ¸¨ŕ¸˛ŕ¸Şŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸Łŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸ ŕ¸ŕ¸šŕšŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕšŕ¸ŕ¸Şŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸Şŕ¸Ąŕ¸ąŕ¸˘ŕšŕ¸Ťŕ¸Ąŕšâŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸°ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸Ąŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸˘ŕšŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸Łŕ¸ąŕ¸ŕšŕ¸Ľŕ¸°ŕšŕ¸Ťŕšŕšŕ¸Ťŕ¸ŕ¸¸ŕ¸ŕ¸Ľŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸âŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸Şŕ¸´ŕšŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸´ŕ¸Šŕ¸ŕšŕ¸ŕ¸ąŕšŕ¸§ŕ¸ŕ¸Łŕ¸˛ŕ¸§ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸ŕšŕ¸§ŕ¸Ľŕ¸˛ŕ¸ŕ¸ľŕšŕ¸ŕ¸Ľŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸¸ŕ¸Ąŕ¸Łŕ¸ąŕ¸ŕ¸Ąŕ¸ľŕ¸Şŕ¸šŕ¸ ŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸ŕ¸˛ŕ¸°ŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸ŕ¸Ťŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸´ŕ¸§ŕ¸ąŕ¸ŕ¸´ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ˇŕ¸ ŕ¸ŕ¸śŕšŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸Ťŕ¸ŕ¸¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕšŕ¸Şŕ¸łŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸Ľŕ¸ľŕšŕ¸˘ŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸ŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸¸ŕ¸ŕšŕ¸Łŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸Łŕ¸¸ŕ¸ŕšŕ¸Łŕ¸
ŕ¸ŕšŕ¸ŕ¸ŕ¸Ťŕ¸ŕšŕ¸˛ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸´ŕ¸§ŕ¸ąŕ¸ŕ¸´ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ˇŕ¸ ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸Ťŕ¸˛ŕ¸Łŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸˘ŕ¸ŕ¸˘ŕ¸šŕšŕšŕ¸ŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸Şŕ¸šŕ¸ŕ¸ŕ¸˛ŕ¸Ąŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸¨ŕ¸ąŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸˛ ŕ¸ŕ¸ąŕ¸¨ŕ¸§ŕ¸´ŕ¸ŕ¸Ąŕšŕ¸˛ŕ¸Ťŕ¸¸ŕšŕ¸Ąŕšŕ¸ŕ¸Łŕ¸˛ŕ¸°ŕ¸ŕ¸ˇŕ¸ŕ¸¨ŕ¸šŕ¸ŕ¸˘ŕšŕ¸ŕ¸Ľŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸¸ŕ¸Ąŕšŕ¸ŕšŕ¸˘ŕ¸˛ŕ¸ŕšŕ¸Ľŕ¸°ŕ¸Ąŕ¸ľŕ¸ŕšŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸Şŕ¸šŕ¸ ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ˇŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸Ąŕ¸˛ŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕš ลูŕ¸ŕ¸ŕ¸łŕšŕ¸Ťŕšŕ¸Łŕ¸ąŕ¸ŕ¸Şŕ¸˛ŕ¸Ąŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸§ŕ¸Łŕ¸ŕ¸ľŕšŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸¸ŕ¸Ąŕ¸ŕ¸˛ŕ¸ŕ¸Şŕšŕ¸§ŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸Ąŕ¸ľŕ¸ŕ¸Łŕ¸°ŕ¸Şŕ¸´ŕ¸ŕ¸ŕ¸´ŕ¸ าภŕ¸ŕšŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕšŕ¸ŕ¸Ťŕ¸ŕšŕ¸§ŕ¸˘ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸¸ŕ¸ŕšŕ¸Łŕ¸ŕ¸Ľŕ¸ŕ¸Ľŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸łŕ¸Ľŕ¸˛ŕ¸˘ŕ¸Ľŕšŕ¸˛ŕ¸ŕ¸ŕ¸Ľŕ¸ąŕ¸ŕšŕ¸ŕ¸´ŕšŕ¸Ąŕ¸ŕ¸śŕšŕ¸ ŕ¸ŕ¸łŕšŕ¸Ťŕšŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸šŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕšŕ¸ŕ¸˘ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸˘ŕšŕ¸ŕšŕ¸ŕ¸Şŕ¸´ŕšŕ¸ âŕ¸ŕ¸¸ŕšŕ¸Ąŕ¸ŕ¸¸ŕ¸â ŕšŕ¸Ľŕ¸°ŕ¸Şŕšŕ¸ŕšŕ¸Şŕ¸Łŕ¸´ŕ¸Ąŕšŕ¸Ťŕšŕšŕ¸ŕ¸´ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸Şŕ¸Ąŕ¸ąŕ¸˘ŕšŕ¸Ťŕ¸Ąŕšŕ¸ŕ¸ľŕšŕ¸Ąŕ¸ľŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸ าช฾ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ ล฾ระŕ¸ŕ¸ŕ¸Łŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Ł ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸Ł
ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Ťŕ¸Ąŕ¸˛ŕ¸˘ŕšŕ¸Ťŕ¸Ąŕšŕ¸ŕ¸śŕ¸ŕ¸ŕ¸ˇŕ¸ŕ¸ŕ¸łŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸˘ŕšŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸Łŕšŕ¸Ľŕ¸°ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸Ľŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ˇŕ¸ ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Şŕ¸łŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸Ą âŕšŕ¸ŕ¸Łŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸¸ŕ¸Ąŕ¸Łŕ¸ąŕ¸?â ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸˘ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸ąŕ¸ŕšŕ¸˘ŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸Ľŕ¸ŕ¸ 500 ŕ¸ŕ¸ľŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸Ąŕ¸˛ ŕšŕ¸ŕ¸Ąŕ¸¸ŕ¸Ąŕ¸Ąŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸šŕšŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕšŕ¸Ąŕšŕšŕ¸ŕšŕšŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸łŕ¸Łŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕ¸ŕ¸ŕ¸ŕ¸Ąŕ¸ŕ¸¸ŕ¸Šŕ¸˘ŕš ŕšŕ¸ŕšŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Ľŕ¸ŕ¸Ľŕ¸ŕ¸˘ŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕšŕ¸Ľŕ¸˘ŕ¸ľŕšŕ¸Ľŕ¸°ŕ¸ บลิสูŕ¸ŕ¸ŕ¸Ąŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸ŕšŕ¸§ŕ¸Ľŕ¸˛ŕ¸Ťŕ¸ŕ¸śŕšŕ¸ ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕ¸Ťŕ¸Ąŕ¸ŕ¸Şŕ¸ าŕ¸ŕšŕ¸ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕšŕ¸˛ŕš ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸Ľŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸´ŕ¸§ŕ¸ąŕ¸ŕ¸´ŕ¸Şŕ¸˛ŕ¸Łŕ¸Şŕ¸ŕšŕ¸ŕ¸¨ ŕšŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸§ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸¨ŕ¸ąŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸˛ŕšŕ¸ŕ¸˘ŕ¸Şŕ¸´ŕšŕ¸ŕ¸Şŕ¸¸ŕ¸ŕ¸Ľŕ¸ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕ¸Şŕ¸´ŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸
ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕ¸Şŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸Ťŕ¸ŕšŕ¸˛ŕ¸˘ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Şŕ¸ˇŕšŕ¸ŕ¸Ąŕ¸¨ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ľŕšŕ¸ŕ¸šŕšŕ¸ŕ¸ŕ¸Ąŕ¸ľŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕšŕ¸§ŕšŕ¸Ľŕ¸ ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸Ąŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸¸ŕ¸ŕ¸Łŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸šŕšŕ¸ŕ¸ł ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Ľŕšŕ¸Ąŕšŕ¸Ťŕ¸Ľŕ¸§ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸Łŕ¸´ŕ¸Ťŕ¸˛ŕ¸Ł ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸Łŕšŕ¸ŕ¸Łŕ¸°ŕ¸Şŕ¸´ŕ¸ŕ¸ŕ¸´ŕ¸ าŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸´ สะŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Ťŕ¸Ąŕ¸ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸´ŕ¸Ąŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸Ľŕ¸śŕ¸ ŕšŕ¸Ąŕšŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸šŕšŕ¸ŕ¸ŕ¸˘ŕ¸ąŕ¸ŕšŕ¸Ąŕšŕ¸Şŕ¸˛ŕ¸Ąŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸śŕ¸ŕ¸ŕ¸ľŕ¸§ŕ¸´ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸Łŕ¸˛ŕ¸¨ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸Şŕ¸´ŕšŕ¸ŕšŕ¸ŕ¸´ŕ¸ ŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸°ŕšŕ¸Şŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸Şŕ¸ˇŕšŕ¸ŕ¸Ąŕ¸ŕ¸ŕ¸˘ŕšŕ¸ŕšŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕ¸ŕ¸śŕšŕ¸ŕšŕ¸Ľŕšŕ¸§ ŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸šŕšŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸ŕ¸˘ŕ¸ąŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸¨ŕ¸˛ŕ¸Şŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸Ł ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸ľŕšŕ¸¨ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ľŕšŕšŕ¸ŕšŕ¸ŕ¸Łŕ¸´ŕ¸ŕšŕ¸ŕšŕšŕ¸Şŕ¸ˇŕšŕ¸ŕ¸Ąŕ¸Şŕ¸Ľŕ¸˛ŕ¸˘ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕ¸Ťŕ¸ŕšŕ¸˛ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸˛ŕ¸
ŕ¸ŕ¸šŕšŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕšŕ¸ŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Ľŕšŕ¸Ąŕ¸Şŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸Şŕ¸Ąŕ¸ąŕ¸˘ŕšŕ¸Ťŕ¸Ąŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸Ľŕšŕ¸Ąŕ¸Şŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸¨ŕ¸˛ŕ¸Şŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸Łŕšŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸Łŕ¸´ŕ¸Şŕ¸ŕšŕ¸¨ŕ¸ŕ¸§ŕ¸Łŕ¸Łŕ¸Šŕ¸ŕ¸ľŕš 15 ŕšŕ¸ŕ¸˘ŕšŕ¸Ťŕšŕšŕ¸Ťŕ¸ŕ¸¸ŕ¸ŕ¸Ľŕ¸§ŕšŕ¸˛ ŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸šŕšŕ¸ŕ¸ŕšŕ¸Łŕ¸´ŕšŕ¸Ąŕ¸Ťŕ¸Ąŕ¸ŕ¸¨ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸§ŕ¸ ŕ¸ŕ¸ąŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸Şŕ¸šŕ¸ŕšŕ¸Ľŕ¸°ŕ¸Łŕ¸°ŕ¸ŕ¸ąŕ¸ŕ¸Ľŕšŕ¸˛ŕ¸ ล฾ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸Ľŕšŕ¸˛ŕ¸§ŕ¸Ťŕ¸˛ŕ¸§ŕšŕ¸˛ŕ¸Ťŕ¸´ŕ¸§ŕšŕ¸ŕ¸´ŕ¸ ŕ¸ŕ¸˛ŕ¸§ŕšŕ¸Ľŕ¸ŕ¸ľŕ¸˘ŕš ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸˛ŕ¸˘ŕ¸ŕ¸˛ŕ¸ ŕ¸ŕ¸šŕšŕ¸ŕ¸ŕ¸˘ŕ¸ąŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕšŕ¸ŕ¸¨ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ ายŕ¸ŕ¸ŕ¸ ŕšŕ¸ŕšŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸ สŕ¸ŕ¸˛ŕ¸ŕ¸ąŕ¸ŕ¸¨ŕ¸˛ŕ¸Şŕ¸ŕ¸˛ŕ¸ŕ¸Ľŕ¸ąŕ¸ŕšŕ¸Łŕšŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸¸ŕ¸Ąŕ¸Şŕ¸ąŕ¸ŕ¸ŕ¸Ą ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕ¸Łŕ¸ľŕ¸˘ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸łŕšŕ¸ŕ¸Şŕ¸šŕšŕ¸ŕšŕ¸ŕšŕ¸Şŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕšŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˛ŕ¸Ąŕšŕ¸Şŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸§ŕ¸ŕ¸ąŕ¸ ŕ¸ŕ¸ˇŕ¸ŕ¸Ťŕ¸Ąŕ¸ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸Ľŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕšŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ąŕ¸ŕ¸´ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸Łŕ¸Ą ŕšŕ¸ŕšŕ¸Ľŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸Şŕ¸˛ŕ¸Łŕ¸Şŕ¸ŕšŕ¸ŕ¸¨ ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸§ŕ¸ŕ¸ŕ¸¸ŕ¸Ąŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸Ąŕ¸ľŕ¸ŕšŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸Şŕ¸šŕ¸ŕ¸ŕ¸śŕšŕ¸ ŕšŕ¸ŕ¸ŕšŕ¸ŕšŕ¸Ľŕ¸˘ŕ¸ľŕ¸ŕ¸łŕšŕ¸Ťŕšŕ¸ŕ¸šŕšŕ¸ŕ¸ŕ¸Ťŕ¸Ľŕ¸ľŕ¸ŕšŕ¸Ľŕ¸ľŕšŕ¸˘ŕ¸ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸Łŕ¸ąŕ¸ŕšŕ¸ŕšŕ¸Ąŕ¸˛ŕ¸ŕ¸ŕ¸śŕšŕ¸ รูŕ¸ŕšŕ¸Ąŕšŕ¸Şŕ¸˛ŕ¸Ąŕ¸˛ŕ¸Łŕ¸ŕ¸ŕ¸šŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸Łŕ¸¸ŕ¸ŕšŕ¸Łŕ¸ŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸ าช฾ŕšŕ¸ŕšŕ¸ŕšŕ¸˛ŕ¸˘ŕšŕ¸Ťŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕšŕ¸ŕ¸´ŕ¸Ą รูŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸°ŕ¸ŕšŕ¸ŕ¸˘ ŕš ŕ¸ŕ¸šŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸§ŕ¸˘ŕ¸Łŕ¸šŕ¸ŕšŕ¸ŕ¸ŕšŕ¸Ťŕ¸Ąŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸˘ ŕšŕ¸ŕšŕ¸ ŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸´ŕ¸Şŕ¸Łŕ¸°ŕ¸Ťŕ¸Łŕ¸ˇŕ¸ŕ¸Şŕ¸˛ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸˛ ŕ¸ŕ¸śŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸Şŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸´ŕ¸Šŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ ŕ¸ŕ¸´ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸Łŕ¸´ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸˛ŕ¸Ąŕ¸ŕ¸¸ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕ¸ľŕšŕšŕ¸Ťŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸Ľŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ ŕ¸ŕ¸šŕšŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕ¸˘ŕ¸ąŕ¸ŕ¸§ŕ¸´ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕšŕ¸Ąŕ¸˛ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ ŕš ŕ¸ŕ¸ľŕšŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕšŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸ŕ¸§ŕ¸˛ŕ¸Ąŕ¸ŕ¸Łŕ¸´ŕ¸ŕ¸ŕ¸ŕ¸ŕšŕ¸ŕ¸Łŕ¸ŕ¸Şŕ¸Łŕšŕ¸˛ŕ¸ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ ŕšŕ¸ŕšŕ¸ ลายาŕ¸ŕ¸ŕ¸´ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸¨ŕ¸§ŕ¸´ŕ¸ŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸Ľŕ¸˛ŕ¸ ญรมŕ¸ŕ¸Ąŕ¸˛ŕ¸˘ŕ¸˛ŕ¸ŕ¸ŕ¸´ŕšŕ¸Łŕ¸ˇŕšŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸˘ŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ąŕ¸ ŕ¸ŕ¸ąŕšŕ¸ŕ¸Şŕ¸ŕ¸ŕ¸ŕšŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸ŕ¸ าŕ¸ŕ¸Ľŕ¸§ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕ¸šŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸Ľŕšŕ¸ŕšŕ¸˛ŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕ¸Łŕ¸ąŕ¸ŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸Ąŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸˘ŕ¸˛ŕ¸ŕ¸Łŕšŕ¸Ľŕ¸°ŕšŕ¸Łŕ¸ŕ¸ŕ¸˛ŕ¸ ŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸ŕšŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸ŕšŕ¸ŕ¸łŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕ¸Ľŕ¸ľŕšŕ¸˘ŕ¸ŕšŕ¸ ŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ąŕšŕ¸ŕ¸ŕ¸ąŕ¸¨ŕ¸§ŕ¸´ŕ¸ŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸¨ŕ¸ąŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸˛ ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸Ľŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕšŕ¸ŕ¸˘ŕ¸¸ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕ¸ŕšŕ¸ŕ¸˘ ŕ¸ŕšŕ¸ŕ¸°ŕšŕ¸Şŕ¸ˇŕšŕ¸ŕ¸Ąŕ¸Ľŕ¸ŕ¸ŕ¸˛ŕ¸Ąŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸˘
ŕ¸ŕ¸Ľŕšŕ¸˛ŕ¸§ŕšŕ¸ŕ¸˘ŕ¸Şŕ¸Łŕ¸¸ŕ¸ ŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Şŕ¸ŕ¸ŕ¸§ŕšŕ¸˛ŕšŕ¸Łŕ¸˛ŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸˘ŕ¸šŕšŕšŕ¸ŕ¸ŕšŕ¸§ŕ¸ŕ¸Ťŕ¸ąŕ¸§ŕšŕ¸Ľŕ¸ľŕšŕ¸˘ŕ¸§ŕ¸Ťŕ¸ąŕ¸§ŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸Łŕ¸°ŕ¸§ŕ¸ąŕ¸ŕ¸´ŕ¸¨ŕ¸˛ŕ¸Şŕ¸ŕ¸Łŕš ŕšŕ¸Ąŕ¸ˇŕšŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ŕ¸Łŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕ¸´ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸ŕšŕ¸ŕ¸Łŕ¸šŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸˛ŕ¸ŕ¸¸ŕšŕ¸ŕšŕ¸ŕ¸˘ŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸śŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸ ŕšŕ¸ŕ¸ŕšŕ¸ŕšŕ¸Ľŕ¸˘ŕ¸ľŕ¸Şŕ¸˛ŕ¸Łŕ¸Şŕ¸ŕšŕ¸ŕ¸¨ŕ¸ŕ¸°ŕ¸ŕ¸Ľŕ¸ŕ¸Ľŕšŕ¸ŕ¸ŕ¸ŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ŕ¸ąŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸¸ŕ¸ŕ¸ŕ¸Ľŕšŕ¸Ťŕšŕ¸Ąŕ¸ľŕ¸ŕ¸˛ŕ¸ŕšŕ¸Ľŕ¸ˇŕ¸ŕ¸ŕ¸ŕ¸ľŕšŕ¸Ťŕ¸Ľŕ¸˛ŕ¸ŕ¸Ťŕ¸Ľŕ¸˛ŕ¸˘ŕ¸ŕ¸§ŕšŕ¸˛ŕ¸ŕ¸˛ŕ¸Łŕ¸ŕ¸˘ŕ¸šŕšŕ¸ ายŕšŕ¸ŕšŕ¸Łŕ¸ąŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸ŕšŕ¸ŕ¸ŕšŕ¸ŕ¸ľŕ¸˘ŕ¸§ ŕšŕ¸Ľŕ¸°ŕšŕ¸Ľŕ¸ŕšŕ¸Ťŕ¸Ąŕšŕ¸ŕ¸ľŕšŕ¸ŕ¸łŕ¸Ľŕ¸ąŕ¸ŕ¸ŕ¸°ŕ¸Ąŕ¸˛ŕ¸ŕ¸˛ŕ¸ŕšŕ¸Ąŕšŕ¸ŕšŕ¸ŕ¸ŕ¸ŕ¸˛ŕ¸Ł âŕ¸ŕ¸˛ŕ¸Łŕšŕ¸Ąŕ¸ˇŕ¸ŕ¸â ŕ¸ŕ¸˘ŕšŕ¸˛ŕ¸ŕ¸ŕ¸ľŕšŕšŕ¸Łŕ¸˛ŕšŕ¸ŕ¸˘ŕ¸Łŕ¸šŕšŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸ľŕ¸ŕ¸ŕšŕ¸ŕšŕ¸...
สาลารŕ¸ŕšŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸ŕ¸˛ŕ¸Ąŕšŕ¸ŕ¸ˇŕšŕ¸ŕ¸Ťŕ¸˛ŕšŕ¸ŕ¸ short vdo ŕ¸ŕ¸ľŕšŕ¸Şŕ¸Łŕ¸¸ŕ¸ŕ¸ŕ¸Łŕ¸°ŕšŕ¸ŕšŕ¸ŕ¸Şŕ¸łŕ¸ŕ¸ąŕ¸ŕ¸ŕ¸˛ŕ¸ŕšŕ¸ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸ ŕ¸ŕ¸Łŕšŕ¸ŕ¸Ąŕ¸ŕ¸Łŕ¸˛ŕ¸ŕ¸´ŕ¸ŕšŕ¸Ľŕ¸°ŕ¸ŕ¸łŕ¸ŕ¸ŕ¸´ŕ¸ŕ¸˛ŕ¸˘ŕ¸ŕ¸Łŕ¸°ŕ¸ŕ¸ąŕ¸ ŕšŕ¸ŕšŕ¸˛ŕšŕ¸ŕ¸ŕšŕ¸˛ŕ¸˘ ŕšŕ¸ŕšŕ¸ŕ¸ľŕš TikTok ŕ¸ŕšŕ¸ŕ¸ https://www.tiktok.com/@moneyment1971
-
@ 45c41f21:c5446b7a
2025-05-14 01:53:11Pocket Wallet is a experimental nostr-based wallet on CKB blockchain built for pocket change and casual, low-stakes transactions. It uses CKB Light Client to sync the blockchain right in your browser without relying on any centralized RPC service. By integrating Nostr with Nip46 and more, Pocket Wallet hopes to provide a fully verifiable wallet experience in the methodology of client-side-validation and POW verifications. The software is also open-source, right now it only supports testnet, any feedback is welcome.
This is also an self attempt to build a Web5 product from zero and explore the design and implementation of a Web5 idealism. The things i find interesting along side building this demo are quite a few, just pick some to share:
- I think users and developers all want something that can last without requiring extra hardship, approval or permissions in the future.
- For developers, what i mean by that is when building Web5 products, we should think about the maintain problem. to make a product works in the longer future, you want it relies on fewer dependencies.
- Server is bad because it relies on other peopleâs computer. Client side validation is good because the computer is in your own control.
- That is why light client and POW matters to blockchain since they give you the power to verify by yourself instead of trusting others. Donât trust, verify is not just a slogan, it is also a practical strategy if you look at it in the long term. Centralized service always feels great at the beginning and then it mess you up in the future.
- If you really have to rely on some sort of service, choose the simple and open protocol one instead of the proprietary software. One example in Pocket wallet is the usage of Nip46 to manage the Nostr account. The great thing about Nip46 is that it is dead simple and you can easily host your own if all the Nip46 service providers are down or kicking you out.
- In fact, I think all service/products in Nostr ecosystem are easily switchable, replaceable and can be self-hosting since it is a very simple open protocol. Thatâs why it is chosen in Pocket Wallet as a kind of Web2 User interface connecting with the blockchain web3 stuff(which together builds up the Web5, yes!)
- For users, there are power users and weak users. power users can take care of their own but they just donât have the tools that allows them to do the job. The reason is that power users are considered the minorities in almost all the marketplace. We need more web5 products that move the power and also the responsibility from developers to power users.
- For weak users, they can take care of their own but they just keep being told that they canât and they fall for it. Being able to verify and control the software one is using is a key difference. One simple example is that do you allow a Nostr account manager (either it is Nip46 or Nip07) to automatically approve signing most events for you or do you check every operation by yourself with a high security policy? Automatically signing are always dangerous when comes to manage crypto funds.
- Web5 implements different level of trust and opens access to different level of verifiable tools and resource. Only in this way power users can fulfill their wants while weak users have a chance to realize the lies of custody. We need web5 to bring individual sovereign.
-
@ 56cd780f:cbde8b29
2025-05-14 19:33:58Skjønner du? Bare tekst.
-
@ 60392a22:1cae32da
2025-05-14 01:42:49Why are emojis called emojis?
The word "emoji" comes from Japan because emojis were first created and popularized there. The term "emoji" (çľľćĺ) is made up of two Japanese words: "e" (çľľ), meaning "picture," and "moji" (ćĺ), meaning "character."
The first set of emojis was developed in 1999 by Shigetaka Kurita, a designer working for NTT DoCoMo, a major Japanese mobile phone company. Kurita designed a set of 176 12Ă12 pixel images for a messaging service called i-mode, which was a precursor to what we now recognize as text messaging. The aim was to help people convey emotions, actions, or objects more easily in their digital communication, especially since sending lengthy texts wasnât as practical on early mobile phones.
The simplicity and ease of emojis made them incredibly popular, and over time, they spread beyond Japan to the rest of the world. Today, emojis are used globally in texting, social media, and digital communication.
So, while emojis were created in Japan, theyâve become a universal part of modern communication!
I did not know it. I want to share it. so now I tweet.
-
@ eac63075:b4988b48
2024-10-21 08:11:11Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
Sections:
- Introduction
- What Is Chat Control?
- Why Is the EU Pushing for Chat Control?
- The Privacy Concerns and Risks
- The Technical Debate: Encryption and Backdoors
- Global Reactions and the Debate in Europe
- Possible Consequences for Messaging Services
- What Happens Next? The Future of Chat Control
- Conclusion
What Is Chat Control?
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messagesâeven those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
Origins of the Proposal
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
How Messaging Services Work
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
Key Elements of Chat Control
- Automated Content Scanning: Service providers would use algorithms to scan messages for illegal content.
- Circumvention of Encryption: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- Mandatory Reporting: If illegal content is detected, providers would be required to report it to authorities.
- Broad Applicability: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
Why It Matters
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
Why Is the EU Pushing for Chat Control?
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
Protecting Children and Preventing Crime
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
Legal Context and Legislative Drivers
The push for Chat Control is rooted in several legislative initiatives:
-
ePrivacy Directive: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
-
Temporary Derogation: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
-
Regulation Proposals: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
Balancing Security and Privacy
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
-
Targeted Scanning: Focusing on specific threats rather than broad, indiscriminate monitoring.
-
Judicial Oversight: Requiring court orders or oversight for accessing private communications.
-
Data Protection Safeguards: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
The Urgency Behind the Push
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
Criticism and Controversy
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
The Privacy Concerns and Risks
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
Infringement on Privacy Rights
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
Erosion of End-to-End Encryption
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
Concerns from Privacy Advocates
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- Security Risks: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- Global Implications: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- Ineffectiveness Against Crime: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
Potential for Government Overreach
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
Real-World Implications for Users
- False Positives: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- Chilling Effect: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- Data Misuse: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
Legal and Ethical Concerns
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- Violation of Fundamental Rights: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- Questionable Effectiveness: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
Opposition from Member States and Organizations
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
The Technical Debate: Encryption and Backdoors
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
What Is End-to-End Encryption (E2EE)?
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- Security Assurance: E2EE ensures that sensitive informationâbe it personal messages, financial details, or confidential business communicationsâremains private.
- Widespread Use: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
How Chat Control Affects Encryption
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- Introduce Backdoors: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- Client-Side Scanning: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
The Risks of Weakening Encryption
1. Compromised Security for All Users
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- Exploitable Gaps: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- Universal Impact: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
2. Undermining Trust in Digital Services
- User Confidence: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- Business Implications: Companies relying on secure communications might face increased risks, affecting economic activities.
3. Ineffectiveness Against Skilled Adversaries
- Alternative Methods: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- False Sense of Security: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
Signalâs Response and Stance
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- Refusal to Weaken Encryption: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- Advocacy for Privacy: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
Understanding Backdoors
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- Security Vulnerabilities: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- Ethical Concerns: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
The Slippery Slope Argument
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- Expanded Surveillance: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- Erosion of Rights: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
Potential Technological Alternatives
Some suggest that it's possible to fight illegal content without undermining encryption:
- Metadata Analysis: Focusing on patterns of communication rather than content.
- Enhanced Reporting Mechanisms: Encouraging users to report illegal content voluntarily.
- Investing in Law Enforcement Capabilities: Strengthening traditional investigative methods without compromising digital security.
The technical community largely agrees that weakening encryption is not the solution:
- Consensus on Security: Strong encryption is essential for the safety and privacy of all internet users.
- Call for Dialogue: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
Global Reactions and the Debate in Europe
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
Support for Chat Control
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- Enhanced Security: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- Responsibility of Service Providers: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- Public Safety Priorities: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
Opposition within the EU
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
Germany
- Stance: Germany has been one of the most vocal opponents of the proposed measures.
- Reasons:
- Constitutional Concerns: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- Security Risks: Weakening encryption is seen as a threat to cybersecurity.
- Legal Challenges: Potential conflicts with national laws protecting personal data and communication secrecy.
Netherlands
- Recent Developments: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- Arguments:
- Effectiveness Doubts: Skepticism about the actual effectiveness of the measures in combating crime.
- Negative Impact on Privacy: Concerns about mass surveillance and the infringement of citizens' rights.
Table reference: Patrick Breyer - Chat Control in 23 September 2024
Privacy Advocacy Groups
European Digital Rights (EDRi)
- Role: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- Position:
- Strong Opposition: EDRi argues that Chat Control is incompatible with fundamental rights.
- Awareness Campaigns: Engaging in public campaigns to inform citizens about the potential risks.
- Policy Engagement: Lobbying policymakers to consider alternative approaches that respect privacy.
Politicians and Activists
Patrick Breyer
- Background: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- Actions:
- Advocacy: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- Public Outreach: Using social media and public events to raise awareness.
- Legal Expertise: Highlighting the legal inconsistencies and potential violations of EU law.
Global Reactions
International Organizations
- Human Rights Watch and Amnesty International: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
Technology Companies
- Global Tech Firms: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- Industry Associations: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
The Broader Debate
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- Legal Precedents: How the EU's decision might influence laws and regulations in other countries.
- Digital Sovereignty: The desire of nations to control digital spaces within their borders.
- Civil Liberties: The importance of protecting freedoms in the face of technological advancements.
Public Opinion
- Diverse Views: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- Awareness Levels: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
Possible Consequences for Messaging Services
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
Impact on Encrypted Messaging Services
Signal and Similar Platforms
-
Compliance Challenges: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
-
Operational Decisions: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
Potential Blocking or Limiting of Services
-
Regulatory Enforcement: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
-
Access Restrictions: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
Effects on Smaller Providers
-
Resource Constraints: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
-
Innovation Stifling: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
User Experience and Trust
-
Privacy Concerns: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
-
Migration to Unregulated Platforms: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
Technical and Security Implications
-
Increased Vulnerabilities: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
-
Global Security Risks: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
Impact on Businesses and Professional Communications
-
Confidentiality Issues: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
-
Compliance Complexity: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
Economic Consequences
-
Market Fragmentation: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
-
Loss of Revenue: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
Responses from Service Providers
-
Legal Challenges: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
-
Policy Advocacy: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
Possible Adaptations
-
Technological Innovation: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
-
Transparency Measures: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
What Happens Next? The Future of Chat Control
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
Current Status of Legislation
-
Ongoing Negotiations: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
-
Timeline: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
Key Influencing Factors
1. Legal Challenges and Compliance with EU Law
-
Fundamental Rights Assessment: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
-
Court Scrutiny: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
2. Technological Feasibility
-
Development of Privacy-Preserving Technologies: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
-
Implementation Challenges: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
3. Political Dynamics
-
Member State Positions: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
-
Public Opinion and Advocacy: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
4. Industry Responses
-
Negotiations with Service Providers: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
-
Potential for Self-Regulation: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
Possible Scenarios
Optimistic Outcome:
- Balanced Regulation: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
Pessimistic Outcome:
- Adoption of Strict Measures: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
Middle Ground:
- Incremental Implementation: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
How to Stay Informed and Protect Your Privacy
-
Follow Reputable Sources: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
-
Engage in the Dialogue: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
-
Utilize Secure Practices: Regardless of legislative outcomes, adopting good digital hygieneâsuch as using strong passwords and being cautious with personal informationâcan enhance your online security.
The Global Perspective
-
International Implications: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
-
Collaboration Opportunities: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
Looking Ahead
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
Conclusion
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- Erosion of Trust: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- Security Vulnerabilities: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- Stifling Innovation: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- Global Implications: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters
-
@ 56cd780f:cbde8b29
2025-05-14 19:30:03Skjønner du? Bare tekst.
-
@ 60392a22:1cae32da
2025-05-14 01:42:43When I am asked "where password and ID?" by my friends, I will say it. âďźgenerated by chatgptďź
1. Nostr is decentralized
- No central authority: Unlike platforms like Facebook or Twitter, Nostr doesnât rely on a single company or server. This means nobody can block your account or censor your posts. You control your own data and connections.
- Distributed network: Instead of all your data being stored in one place (which can be hacked), itâs spread across multiple independent servers.
2. No passwords or centralized logins
- No passwords to steal: Instead of using a traditional username and password, Nostr uses a private key system. This means your login is much more secure, and thereâs no need for you to remember passwords or risk them getting hacked.
- Easy login with Passkeys or security keys: On Nostr, you donât need a passwordâyou can use secure login methods like Passkeys (via your phone, for example), which is faster and much more secure than a traditional password.
3. You control your identity
- No account lockouts: Since your identity is stored on your own device and not on a companyâs server, you canât be locked out of your account unless you lose your private key. You can always recover access if you have your private key.
- Pseudonymous: You donât need to reveal your real name. You can choose an identity that doesnât tie to your personal info.
4. Privacy & Security
- Your data is yours: On traditional platforms, companies own your data and can sell it. With Nostr, you keep control over your informationâno company has access to your messages, posts, or activity.
- End-to-end encryption: Nostr supports strong privacy where your messages are encrypted, meaning no one can spy on your conversations.
5. Open-source and community-driven
- No profit motive: Since Nostr is open-source, thereâs no central company profiting from your data. Itâs built by a community that values freedom of speech and privacy.
- Transparency: Anyone can see the code, contribute to its improvement, and make the network better. It's not controlled by one company or government.
Simple Example:
You could say something like this: "Think of Nostr like having your own personal email system, where only you control your account. Thereâs no one to block you or take down your content. You donât need a password to log inâjust a secure key on your phone. Your posts are private, and you can be anonymous if you want. No one owns your data. Itâs freedom, security, and privacy."
What You Can Say if They Ask, âBut there are IDs and keys, right?â
- Yes, but the IDs are not like usernames: In Nostr, your identity is linked to your private key, not a password. This key is yours and you control it. There's no centralized database of usernames or passwords that someone could steal.
- It's safer: Itâs like having a secure personal locker that only you can open with your phoneâs biometrics or security key, rather than trying to remember a password or relying on a service to keep it safe for you.
-
@ 5af07946:98fca8c4
2025-05-14 17:18:15The Genesis of Being: An Exposition on the Tri-Guna System and the Manifestation of the Eightfold Material Nature I. Introduction: The Gunas as a Generative Cosmic System The ancient philosophical traditions of India, particularly the Samkhya and Vedanta schools, offer profound and intricate cosmologies to explain the nature of existence and the process of universal manifestation. Central to these explanations is the concept of the three Guášas â Sattva (purity, illumination), Rajas (passion, activity), and Tamas (inertia, darkness). This report explores the proposition that these three Guášas function not merely as disparate qualities but as an interconnected, dynamic system responsible for the generation of what can be termed the "eightfold material nature." This eightfold constitution comprises the five great elements (PaĂąca MahÄbhĹŤtas): ÄkÄĹa (Ether/Space), VÄyu (Air), Agni (Fire), Jala (Water), and PášthvÄŤ (Earth), along with the internal instruments of Manas (mind), Buddhi (intellect), and AhaáškÄra (ego). These eight represent key stages or categories in the unfolding of empirical reality, from its most subtle psychic origins to its grossest physical forms. Â
The framework of the Guášas and their evolutes (Tattvas) is foundational to Samkhya philosophy and has been significantly adapted and reinterpreted within the various schools of Vedanta, most notably Advaita Vedanta. These systems provide a comprehensive model of cosmogenesis (SášášŁáši) and the psycho-physical constitution of beings. This exposition will systematically examine how the interplay and varying preponderances of Sattva, Rajas, and Tamas drive this evolutionary process, imbuing each of the eight specified Tattvas with their distinct characteristics and functions. Â
The very notion of the Guášas operating as a "system" implies an inherent order and profound interconnectedness in their cosmic function, rather than a chaotic or arbitrary emergence of the universe. The evolutionary sequence detailed in Samkhya and Vedanta, from the unmanifest Prakášti (in Samkhya) or MÄyÄ (in Vedanta) to the tangible gross elements, is a structured, hierarchical unfolding. This structured process suggests that the Guášas are the underlying mechanics of an ordered cosmic generation. The "eightfold material nature" is not merely a list of components but represents distinct stages or levels within this systemic output. Furthermore, this eightfold nature can be understood as a spectrum, ranging from the most subtle and causal principles, such as Buddhi (cosmic intellect) and AhaáškÄra (the principle of individuation), to the increasingly gross manifestations of Manas (the processing mind), the subtle sensory potentials (TanmÄtras), and finally the five MahÄbhĹŤtas or gross elements. The Guášas, through their shifting balances and relative dominance, modulate the density, dynamism, and qualitative expression at each successive level of this cosmic unfolding. Â
II. The Primordial Triad: Sattva, Rajas, and Tamas â The Building Blocks of Prakriti At the root of all phenomenal existence, according to Samkhya philosophy, lies Prakášti, the unmanifest, primordial material cause of the universe. In its foundational state, Prakášti is conceived as a condition of perfect equilibrium of the three Guášas: Sattva, Rajas, and Tamas. In this quiescent state, Prakášti is unconscious, infinite, and inactive, yet holds within itself the potential for all subsequent cosmic manifestation. Advaita Vedanta employs the concept of MÄyÄ to describe the power that veils the ultimate reality of Brahman and projects the appearance of the manifold world. MÄyÄ, like Prakášti, is understood to be constituted by the three Guášas but, crucially, is not considered an independent reality co-eternal with Brahman. Instead, MÄyÄ is a dependent power, inscrutable and beginningless, through which the non-dual Brahman appears as the diverse universe. Â
The Guášas themselves are not merely abstract qualities but are described as the very "strands" or "fibers" (the literal meaning of guáša being thread or rope) that constitute the fabric of Prakášti or MÄyÄ. They are in a state of constant interplay, mutual suppression, and support, forming a dynamic, tensional balance even in the unmanifest state. This equilibrium is not an empty void but a pregnant state, containing all future possibilities. Â
Sattva (Goodness, Purity, Illumination): Derived from the root 'sat' meaning 'being' or 'truth', Sattva is characterized by lightness, clarity, harmony, balance, knowledge, happiness, peace, and virtue. Its primary function in the cosmic process is to promote illumination, understanding, and constructive activity. Sattva is the principle that most faithfully reflects the light of pure consciousness (Puruᚣa in Samkhya, Ätman/Brahman in Vedanta). Â
Rajas (Passion, Activity, Dynamism): Etymologically linked to 'coloring' or 'agitation', Rajas embodies energy, motion, passion, desire, ambition, and restlessness. It can be both creative and disruptive. Its crucial role is to drive all activity, change, and evolution. Rajas overcomes the inertia of Tamas and can either support the clarity of Sattva or obscure it, depending on its direction and intensity. It is the indispensable kinetic force behind all manifestation. Â
Tamas (Inertia, Darkness, Obstruction): Associated with darkness and heaviness, Tamas is characterized by ignorance, delusion, laziness, confusion, and resistance to change or movement. Its function is to veil consciousness, cause inertia, and obstruct both activity and illumination. However, Tamas also provides stability, form, and the very substance that is shaped by the other two Guášas. Â
The dynamic interplay of these three Guášas is the engine of all cosmic and psychological processes. Rajas acts as the crucial catalyst; while Sattva represents the potential for luminous manifestation and Tamas provides the substance and resistance necessary for form, it is Rajas that supplies the kinetic energy to disturb the primordial equilibrium and drive the subsequent evolution of the Tattvas. Without the activating force of Rajas, Prakášti or MÄyÄ would remain in its unmanifest, potential state. Sattva, though inherently illuminating, requires Rajas to actualize that illumination into diverse forms, and Tamas, though obstructive, needs Rajas to be molded and shaped into the manifold objects of the universe. Â
Table 1: The Three Gunas â Core Attributes and Manifestations
Guáša Etymological Hint Essential Nature Key Psychological Manifestations Primary Cosmic Function Sattva Sat (being, truth, reality) Illumination, Purity, Balance Joy, Clarity, Peace, Knowledge, Virtue Revelation, Harmony, Construction Rajas Raj (to color, to be agitated, passion) Activity, Passion, Dynamism Desire, Restlessness, Ambition, Pain (associated with attachment) Motion, Transformation, Creation Tamas Tam (darkness, inertia) Inertia, Obscuration, Heaviness Dullness, Lethargy, Ignorance, Delusion, Fear Veiling, Stabilization, Obstruction
Export to Sheets III. The Unfolding of Material Nature: Cosmic Evolution (Srishti) from the Gunas The transition from the unmanifest state of Prakášti (or MÄyÄ) to the manifest universe is a sequential process, known as SášášŁáši (creation or emanation), driven by the dynamic interplay of the three Guášas. This unfolding is not arbitrary but follows a specific cosmological order, leading to the emergence of the various categories of existence, including the eightfold material nature.
A. The Initial Disturbance and Emergence of Cosmic Intellect and Individuation The impetus for creation arises from a disturbance in the equilibrium of the Guášas within Prakášti or MÄyÄ.
The Role of Puruᚣa (Samkhya) / Brahman-MÄyÄ (Vedanta): In Samkhya philosophy, Prakášti, though inherently possessing the potential for activity due to the Guášas, remains in a state of equilibrium until its proximity to Puruᚣa (pure, inactive consciousness). This "contact" or "presence" is not an active intervention by Puruᚣa, which remains a passive witness, but is sufficient to trigger the disequilibrium of the Guášas, thereby initiating the evolutionary cascade. In Advaita Vedanta, the ultimate reality is the non-dual Brahman. The appearance of the manifold universe is attributed to MÄyÄ, Brahman's inscrutable power, which itself is constituted by the three Guášas. ÄŞĹvara (Saguna Brahman, or Brahman with attributes) is often described as the Lord who presides over this process of cosmic projection, utilizing MÄyÄ as the creative matrix. Â
Mahat (Cosmic Intellect / Buddhi): The very first evolute to emerge from the disturbed Prakášti/MÄyÄ is Mahat, often translated as the "Great One" or Cosmic Intellect. Mahat represents the principle of cosmic intelligence, self-awareness, and the faculty of determination. It is predominantly SÄttvika in nature, reflecting clarity and luminosity, with Rajas providing the necessary impetus for its manifestation from the unmanifest. Mahat serves as the cosmic counterpart and basis for the individual intellect (Buddhi) in beings. Â
AhaáškÄra (Ego / "I-maker"): From Mahat evolves AhaáškÄra, the principle of individuation or ego-sense. AhaáškÄra is responsible for the fundamental sense of "I" and "mine," creating the distinction between self and non-self, and the feeling of being a distinct, separate entity. This AhaáškÄra is a crucial juncture in the creative process, as it further differentiates based on the predominance of the Guášas, giving rise to distinct streams of evolution: Â
VaikÄrika AhaáškÄra (also known as SÄttvika AhaáškÄra): Predominantly influenced by Sattva, this aspect of ego is characterized by purity and luminosity. It is the source from which the mind (Manas) and the ten subtle sensory and action capacities (Indriyas) emerge. Â Taijasa AhaáškÄra (also known as RÄjasika AhaáškÄra): Predominantly influenced by Rajas, this aspect is characterized by activity and energy. Crucially, Taijasa AhaáškÄra does not merely produce its own line of evolutes but provides the necessary kinetic force or impetus for both VaikÄrika and BhĹŤtÄdi AhaáškÄra to manifest their respective products. This underscores the role of Rajas as the universal energizing principle in the process of manifestation. Â BhĹŤtÄdi AhaáškÄra (also known as TÄmasika AhaáškÄra): Predominantly influenced by Tamas, this aspect is characterized by inertia and mass. It is the source from which the five subtle elements (TanmÄtras) emerge, which are the precursors to the gross physical world. Â This tripartite differentiation of AhaáškÄra is a pivotal node in the cosmic creative process. It acts as a channeling mechanism, directing the unmanifest potential of the Guášas into specific streams that will give rise to the subtle psychological apparatus (mind and senses) on one hand, and the subtle material constituents (TanmÄtras) of the physical universe on the other. The role of RÄjasika AhaáškÄra as an energizer for both SÄttvika and TÄmasika evolutions is a significant detail, illustrating that Rajas is not confined to a single product line but is the indispensable active principle that enables all forms of differentiation and manifestation from the ego-principle onwards.
B. Differentiation from Ahamkara: The Subtle and Gross Manifestations Following the tripartite division of AhaáškÄra, the evolutionary process continues, giving rise to the subtle internal instruments, the sensory capacities, and the rudimentary forms of matter.
From SÄttvika AhaáškÄra (energized by RÄjasika AhaáškÄra): This stream of evolution, characterized by the luminosity and purity of Sattva and activated by the energy of Rajas, gives rise to the subjective instruments of experience:
Manas (Mind): The internal organ (antaḼkaraáša) responsible for receiving and processing sensory data, generating thoughts, experiencing doubt and volition, and coordinating with Buddhi and AhaáškÄra. Manas is often described as the "eleventh indriya," acting as a central coordinator for both sensory input and motor output.  Five JĂąÄnendriyas (Subtle Sense Capacities): These are the subtle capacities for perception, not the gross physical organs themselves. They are: Ĺrotra (capacity for hearing), Tvak (capacity for touching), Cakᚣus (capacity for seeing), RasanÄ (capacity for tasting), and GhrÄáša (capacity for smelling).  Five Karmendriyas (Subtle Action Capacities): These are the subtle capacities for action: VÄk (capacity for speech, associated with the mouth), PÄáši (capacity for grasping, associated with the hands), PÄda (capacity for locomotion, associated with the feet), PÄyu (capacity for excretion, associated with the anus), and Upastha (capacity for procreation, associated with the genitals).  From TÄmasika AhaáškÄra (energized by RÄjasika AhaáškÄra): This stream, characterized by the inertia and mass of Tamas and activated by Rajas, gives rise to the objective, material constituents of the universe:
Five TanmÄtras (Subtle Elements): These are the pure, undifferentiated, subtle essences of sensory experience, the archetypal forms of sensible matter. They are imperceptible in their pure state but form the basis for the gross elements. The TanmÄtras evolve sequentially: Â Ĺabda TanmÄtra (Sound-as-such): The subtle essence of sound. SparĹa TanmÄtra (Touch-as-such): The subtle essence of touch, evolving from Ĺabda TanmÄtra with the addition of its own specific potential. RĹŤpa TanmÄtra (Form/Color-as-such): The subtle essence of form or sight, evolving from SparĹa TanmÄtra with its specific potential. Rasa TanmÄtra (Taste-as-such): The subtle essence of taste, evolving from RĹŤpa TanmÄtra with its specific potential. Gandha TanmÄtra (Smell-as-such): The subtle essence of smell, evolving from Rasa TanmÄtra with its specific potential. From the TanmÄtras (through successive evolution or quintuplication): The five TanmÄtras further evolve to produce the five PaĂąca MahÄbhĹŤtas or gross physical elements. This process involves a principle of accretion or successive inheritance of qualities, where each subsequent gross element carries the qualities of the preceding ones, plus its own specific defining quality, leading to increasing complexity and grossness. This systematic layering is key to the diversification of material properties. Â
ÄkÄĹa (Ether/Space): Evolves from Ĺabda TanmÄtra. Its defining quality is sound. VÄyu (Air): Evolves from SparĹa TanmÄtra, inheriting the quality of sound from ÄkÄĹa and possessing its own defining quality of touch. Agni (Fire/Light): Evolves from RĹŤpa TanmÄtra, inheriting sound and touch, and possessing its own defining quality of form/sight. Jala (Water/Ap): Evolves from Rasa TanmÄtra, inheriting sound, touch, and form, and possessing its own defining quality of taste. PášthvÄŤ (Earth): Evolves from Gandha TanmÄtra, inheriting sound, touch, form, and taste, and possessing its own defining quality of smell. Â The "eightfold material nature" as specified in the queryâthe five elements, mind, intellect, and egoâare thus not a haphazard collection but represent distinct ontological categories arising systematically from a unified, Guáša-driven process. Mahat (intellect) and AhaáškÄra (ego) are cosmic principles that precede and give rise to the individual mind (Manas) and the fundamental building blocks of the physical world (the five elements). This structured lineage underscores the coherence of the Samkhya-Vedanta cosmological model.
Table 2: Evolutionary Sequence of Tattvas from Prakášti/MÄyÄ
Tattva (Evolute) Cosmic Principle (Samkhya/Vedanta) Individual Manifestation Predominant Guáša(s) in Emergence Key Function/Characteristic Prakášti / MÄyÄ Primordial Matter / Illusory Power Unmanifest Ground of Being Sattva, Rajas, Tamas in Equilibrium Potential for all manifestation Mahat Cosmic Intellect Individual Buddhi (Intellect) Sattva (activated by Rajas) Ascertainment, determination, cosmic intelligence AhaáškÄra Cosmic Ego-sense Individual Ego ("I-maker") Rajas (predominant initially, then differentiating into Sattva, Rajas, Tamas aspects) Individuation, self-identity, sense of agency Manas Cosmic Mind-principle Individual Manas (Mind) Sattva (from SÄttvika AhaáškÄra, activated by Rajas) Processing sensory input, thinking, doubting, willing JĂąÄnendriyas (5) Subtle Sense Capacities Individual Capacities of Perception (Hearing, Touch, Sight, Taste, Smell) Sattva (from SÄttvika AhaáškÄra, activated by Rajas) Perception of sensory objects Karmendriyas (5) Subtle Action Capacities Individual Capacities of Action (Speech, Grasping, Locomotion, Excretion, Procreation) Sattva (from SÄttvika AhaáškÄra, activated by Rajas) Execution of actions TanmÄtras (5) Subtle Elements Potential for Gross Elements (Sound, Touch, Form, Taste, Smell -as-such) Tamas (from TÄmasika AhaáškÄra, activated by Rajas) Subtle essences of sensory experience; precursors to gross elements PaĂąca MahÄbhĹŤtas (5) Gross Elements Physical Elements (Ether, Air, Fire, Water, Earth) Increasing Tamas predominance from ÄkÄĹa to PášthvÄŤ (with Sattva and Rajas also present) Constitute the perceptible physical universe; possess qualities of sound, touch, form, taste, smell respectively and cumulatively
Export to Sheets IV. The Eightfold Material Nature: Gunic Imprints and Characteristics The three Guášas not only drive the evolutionary process but also imbue each of the manifested Tattvas with their specific qualities and functional tendencies. Understanding this Gunic influence is crucial for comprehending the nature of both the internal psychic instruments and the external physical elements.
A. The Internal Instruments (AntaḼkaraáša) The antaḼkaraáša, or inner instrument, comprises Manas, Buddhi, and AhaáškÄra. The Gunic composition of these subtle faculties directly shapes an individual's perception of reality, their decision-making processes, their emotional responses, and their fundamental sense of self. An imbalance of the Guášas at this subtle level has profound and far-reaching effects on an individual's behavior, experience, and spiritual progress.
Manas (Mind): As the recipient and initial processor of sensory impressions, Manas is highly susceptible to the influence of the Guášas. Â
A predominance of Sattva in Manas leads to clarity of thought, calmness, focus, joy, and an inclination towards knowledge and peace. Such a mind processes sensory data without significant distortion, leading to more accurate understanding and balanced emotional responses. Â When Rajas dominates Manas, it manifests as restlessness, a continuous stream of desire-driven thoughts, agitation, attachment, and difficulty in maintaining concentration. A RÄjasika mind is easily distracted, prone to emotional fluctuations, and constantly seeks external stimulation. Â A Manas under the sway of Tamas exhibits dullness, lethargy, ignorance, delusion, an inability to process information effectively, and a tendency towards inertia or excessive sleep. A TÄmasika mind is clouded, resistant to new knowledge or change, and may be prone to negative thought patterns. Â Buddhi (Intellect): As the determinative faculty responsible for discrimination and judgment, the Gunic nature of Buddhi is critical. Â
A SÄttvika Buddhi is characterized by sharp discrimination (viveka), wisdom, correct judgment, decisiveness, and the capacity for profound understanding. It is considered to reflect pure consciousness most clearly, leading to ethical decisions and spiritual insight. Â A RÄjasika Buddhi often leads to ambitious but self-centered decision-making. The intellect may be sharp but can be clouded by passion and desire, leading to argumentation or a focus on worldly pursuits, often lacking deeper, holistic wisdom. Â A TÄmasika Buddhi results in clouded judgment, an inability to discriminate right from wrong, intellectual dullness, indecisiveness, and misapprehension. This leads to erroneous understanding and often inaction or inappropriate action. Â AhaáškÄra (Ego): The "I-maker" is fundamentally shaped by the Guášas, determining the nature of one's self-identification. Â
A SÄttvika AhaáškÄra manifests as a sense of "I-ness" that is calm, not overly attached, capable of self-reflection, and aligned with dharma (righteousness). It is associated with humility and an understanding of one's role without false pride. Â A RÄjasika AhaáškÄra presents as a strong sense of agency ("I am the doer"), often accompanied by pride, ambition, competitiveness, and self-centeredness. It is driven by desires and passions, leading to active and assertive behavior, which can also result in conflict and attachment. Â A TÄmasika AhaáškÄra is rooted in ignorance and delusion regarding one's true identity. It may involve strong identification with the gross body, leading to lethargy in self-assertion or, conversely, a stubbornness born of misapprehension. This type of ego is often characterized by a sense of helplessness or false identifications. Â B. The Five Great Elements (PaĂąca MahÄbhĹŤtas) The Gunic influence on the MahÄbhĹŤtas is generally understood in terms of predominant influence, as all three Guášas are ubiquitously present in all manifestations of Prakášti/MÄyÄ. The specific proportion of the Guášas dictates the primary characteristics of each element, allowing for the vast diversity observed even within a single elemental category. There is a discernible correlation between the subtlety or grossness of the MahÄbhĹŤtas and their predominant Gunic composition, indicating a systematic Gunic structuring of the material world from the finest to the coarsest states. Â
ÄkÄĹa (Ether/Space):
Predominant Guáša: Primarily Sattva. Rajas facilitates its manifestation from the Ĺabda TanmÄtra. Â Resulting Properties: ÄkÄĹa is characterized by subtlety, all-pervasiveness, and the quality of being non-obstructive. It provides the very space in which all other elements and objects exist and is the medium for its specific sensory quality, sound (Ĺabda). Its predominantly SÄttvika nature accounts for its capacity to be the ground for all subsequent manifestations and its frequent association with consciousness or Brahman in certain Vedantic interpretations, highlighting its fundamental and subtle reality. The SÄttvika nature imparts clarity and lightness, allowing it to be the most subtle of the elements. Â VÄyu (Air):
Predominant Guáša: Primarily Rajas. Sattva contributes to its subtle nature and capacity to carry sound, while Tamas allows for its tangible quality of touch. Â Resulting Properties: VÄyu is defined by mobility, dynamism, dryness, lightness, and coolness. It is the medium for the sensation of touch (SparĹa) and also serves as a carrier of sound (inherited from ÄkÄĹa). Its predominantly RÄjasika nature is evident in its inherent and constant movement, its capacity to impel motion in other things, and its association with the vital life-force (prÄáša). Â Agni (Fire):
Predominant Guáša: A combination of Sattva and Rajas. Sattva accounts for its properties of illumination and light, while Rajas is responsible for its heat, transformative power, and characteristic upward movement. Tamas contributes to its capacity to consume and provide form. Â Resulting Properties: Agni embodies transformation, heat, light, penetration, and upward motion. It is the medium for the sensation of form or sight (RĹŤpa). Its combined Sattva-RÄjasika nature is clearly demonstrated in its luminosity, its active and often intense transformative capabilities (e.g., in digestion and metabolism), and its inherent dynamism. Â Jala (Water):
Predominant Guáša: A combination of Sattva and Tamas. Sattva contributes to its clarity, life-sustaining properties, and purity. Tamas is responsible for its cohesiveness, coolness, density, and tendency for downward flow. Rajas allows for its fluidity and movement. Â Resulting Properties: Jala is characterized by cohesion, coolness, fluidity, downward movement, and softness. It is the medium for the sensation of taste (Rasa). Its Sattva-TÄmasika nature is evident in its capacity to bind and cohere, its inherent coolness, and its relative density compared to air and fire. It sustains life (Sattva) and provides form and substance (Tamas). Â PášthvÄŤ (Earth):
Predominant Guáša: Primarily Tamas. Rajas provides the energy for its formation from the Gandha TanmÄtra, and Sattva contributes to its capacity to support life and provide stability. Â Resulting Properties: PášthvÄŤ is defined by solidity, stability, density, hardness, obstruction, and the capacity to provide support. It is the medium for the sensation of smell (Gandha). Its predominantly TÄmasika nature is evident in its grossness, inertia, resistance to movement, and its role as the most concrete and stable of the elements. Â Table 3: Gunic Influence on the PaĂąca MahÄbhĹŤtas
MahÄbhĹŤta Predominant Guáša(s) (Rationale) Associated TanmÄtra Key Sensory Property Key Physical/Energetic Characteristics (derived from Gunic influence) ÄkÄĹa Sattva (subtlety, pervasiveness, medium for consciousness/sound) Ĺabda (Sound) Sound Subtlety, all-pervasiveness, non-obstruction, lightness, clarity; provides space for all other elements. Its SÄttvika nature makes it the finest element, a conduit for vibration and subtle energies. VÄyu Rajas (mobility, dynamism, kinetic energy) SparĹa (Touch) Touch Mobility, activity, dryness, lightness, coolness, subtleness, constant motion; responsible for movement, breath, and nerve impulses. Its RÄjasika nature is evident in its inherent dynamism and capacity to instigate movement. Agni Sattva & Rajas (illumination, heat, transformation) RĹŤpa (Form/Sight) Form/Sight Heat, light, penetration, transformation, upward movement, sharpness; responsible for digestion, metabolism, perception of form, and intelligence (as inner fire). Sattva provides luminosity, Rajas provides active transformative energy. Jala Sattva & Tamas (clarity, cohesion, coolness, density) Rasa (Taste) Taste Cohesion, fluidity, coolness, downward movement, softness, moisture, nourishment; responsible for bodily fluids, lubrication, and taste. Sattva imparts purity and life-sustaining qualities, Tamas provides density, form, and coolness. Rajas enables its flow. PášthvÄŤ Tamas (solidity, stability, inertia, grossness) Gandha (Smell) Smell Solidity, stability, density, hardness, obstruction, support, roughness; forms the structural basis of the physical world. Its TÄmasika nature is evident in its grossness, inertia, and resistance, providing a stable foundation for all manifest forms. Sattva allows it to support life.
Export to Sheets V. Comparative Cosmologies: Samkhya and Advaita Vedanta Perspectives While both Samkhya and Advaita Vedanta utilize the framework of the three Guášas and a sequential evolution of Tattvas (principles or categories of reality) to explain the manifested universe, they differ significantly in their metaphysical presuppositions, particularly concerning the nature of ultimate reality, the ontological status of the Guášas and the created world, and the role of a divine creator.
A. Samkhya Philosophy Prakášti and Guášas: In the classical Samkhya system, as articulated in texts like ÄŞĹvarakášášŁáša's SÄáš khya KÄrikÄ, Prakášti is an independent, eternal, and objectively real primordial substance. It is the uncaused material cause of the universe. The three Guášas â Sattva, Rajas, and Tamas â are not mere qualities of Prakášti but are its very constituents, existing in a state of equilibrium in the unmanifest state. These Guášas are considered real and substantial in their own right, forming the very fabric of Prakášti. Â
Evolution (PariášÄma): The universe evolves through a process of real transformation (PariášÄma) of Prakášti. This evolution is triggered when the equilibrium of the Guášas is disturbed by the mere proximity or presence of Puruᚣa (pure consciousness, which is itself inactive and distinct from Prakášti). The evolutionary sequence unfolds with the emergence of twenty-three Tattvas: Mahat (cosmic intellect), AhaáškÄra (ego), Manas (mind), the five JĂąÄnendriyas (sense capacities), the five Karmendriyas (action capacities), the five TanmÄtras (subtle elements), and finally the five MahÄbhĹŤtas (gross elements). The eightfold material nature specified in the query (five elements, mind, intellect, ego) are all part of these real evolutes of Prakášti. Â
Ontological Status: In Samkhya, both Prakášti (with its constituent Guášas) and its twenty-three evolutes, including the eightfold material nature, are considered objectively real (sat). They are not illusory but constitute the actual, albeit changing, fabric of the phenomenal world. The reality of the universe is undeniable, and its cause (Prakášti) must therefore also be real, based on the Samkhya doctrine of SatkÄryavÄda (the theory that the effect pre-exists in its cause). Â
Role of ÄŞĹvara (God): Classical Samkhya is notably atheistic or, more precisely, non-theistic. There is no creator God (ÄŞĹvara) involved in the initial disturbance of Prakášti's equilibrium or in guiding the subsequent evolutionary process. The mere presence of the numerous, eternal Puruᚣas is deemed sufficient to initiate the unfolding of Prakášti for the sake of their experience and eventual liberation (kaivalya). Some later commentators, such as VijĂąÄnabhikᚣu in the 16th century, attempted to integrate theistic elements into Samkhya, equating Prakášti with MÄyÄ and suggesting a chief Puruᚣa or God, but this represents a departure from the classical formulation. Â
B. Advaita Vedanta Philosophy Brahman and MÄyÄ: Advaita Vedanta, particularly as systematized by Ĺaáš karÄcÄrya, posits Brahman as the sole, non-dual (Advaita) Ultimate Reality. Brahman is described as Sat-Cit-Änanda (Existence-Consciousness-Bliss absolute), eternal, unchanging, and without attributes (Nirguáša Brahman). The phenomenal world, with its multiplicity and change, is explained through the concept of MÄyÄ, which is Brahman's inscrutable and beginningless creative power or principle of illusion. MÄyÄ, like Prakášti, is understood to be constituted by the three Guášas. However, unlike the Samkhyan Prakášti, MÄyÄ is not an independent reality co-eternal with Brahman; it is entirely dependent on Brahman for its apparent existence and operation. Â
Manifestation (Vivarta): The universe, including the eightfold material nature, is an apparent manifestation or superimposition (Vivarta) on Brahman due to the functioning of MÄyÄ. This is not a real transformation (PariášÄma) of Brahman, which remains eternally unchanged, but an illusory appearance, famously likened to mistaking a rope for a snake in the dim light. The three Guášas, as inherent aspects of MÄyÄ, are instrumental in this projection of the diverse world. The evolutionary sequence of Tattvas (such as Mahat, AhaáškÄra, Manas, elements, etc.), similar to the Samkhyan schema, is accepted by Advaita Vedanta at the empirical or transactional level of reality (VyÄvahÄrika satya), but this entire sequence is understood as part of this apparent, MÄyic manifestation. Â
Ontological Status: From the standpoint of Advaita Vedanta, the Guášas and the entire manifested world (including the eightfold material nature) possess an empirical or transactional reality (VyÄvahÄrika satya). They are experienced and function within the realm of MÄyÄ. However, from the ultimate or absolute standpoint (PÄramÄrthika satya), only Brahman is truly real. The manifested world is MithyÄ â a term indicating that which is neither absolutely real (since it is sublatable by the knowledge of Brahman) nor absolutely unreal (since it is experienced), but an appearance whose reality is contingent and ultimately illusory. Â
Role of ÄŞĹvara: In Advaita Vedanta, ÄŞĹvara (often translated as the Lord or God) is Saguna Brahman â Brahman associated with MÄyÄ and its creative power. ÄŞĹvara is the efficient and material cause (in an apparent sense, as MÄyÄ is His power) of the universe, presiding over the cosmic processes of creation, sustenance, and dissolution. ÄŞĹvara is the highest reality conceivable from the empirical standpoint but is also, like the world, ultimately an appearance of the attributeless Nirguáša Brahman when viewed from the absolute perspective. Â
C. Synthesizing the Views: Key Distinctions and Convergences The fundamental divergence between Samkhya and Advaita Vedanta regarding cosmology stems from their differing ontological commitments. Samkhya's dualism posits Prakášti (and its constituent Guášas) as an independent, objectively real entity alongside Puruᚣa. Consequently, its evolutes, the Tattvas forming the eightfold material nature, are also objectively real. In contrast, Advaita's non-dualism asserts Brahman as the sole ultimate reality, with MÄyÄ (and its Guášas) being a dependent power that projects an empirically real but transcendentally unreal (MithyÄ) world. This core difference in the status of the material cause (independent Prakášti vs. dependent MÄyÄ) dictates all subsequent variations in their cosmological explanations, including the role of ÄŞĹvara (absent in classical Samkhya, present as Saguna Brahman in Advaita) and the ultimate reality of the manifested world. Â
Despite these profound metaphysical differences, a significant convergence lies in their shared acceptance of the three Guášas as the fundamental forces or qualities that explain the diversity and functioning of the phenomenal world. Both systems also describe a broadly similar hierarchical sequence of evolution for the Tattvas at the empirical level, from subtle cosmic principles like intellect and ego to the mind, senses, and gross elements. Advaita Vedanta's adoption of this Samkhyan-like evolutionary schema for the VyÄvahÄrika (empirical) realm demonstrates a pragmatic approach. It does not deny the observed order and functioning of the world but recontextualizes its ultimate reality within a non-dual framework. This philosophical integration allows Advaita to provide a coherent explanation of phenomenal experience while maintaining its core tenet of Brahman as the sole, non-dual reality. The Samkhyan model of Tattvic evolution, driven by the Gunas, thus serves as a powerful descriptive framework for the empirical world, even within the ultimate monism of Advaita Vedanta. Â
Table 4: Comparative Overview of Samkhya and Advaita Vedanta Cosmology
Philosophical Aspect Samkhya Perspective Advaita Vedanta Perspective Ultimate Reality Dualistic: Puruᚣa (Consciousness, multiple) and Prakášti (Primordial Matter, singular) are two independent, eternal realities. Non-dualistic: Brahman (Sat-Cit-Änanda) is the sole, ultimate, attributeless reality. Nature of Prakášti/MÄyÄ Prakášti is an independent, uncaused, objectively real material cause of the universe, composed of the three Guášas in equilibrium. MÄyÄ is the inscrutable power of Brahman, dependent on Brahman, and the apparent cause of the universe. It is also constituted by the three Guášas but is not independently real. Nature of Guášas Real, substantial constituents of the independent Prakášti. Aspects or modes of MÄyÄ; empirically real but not ultimately real independent of Brahman. Status of Manifest World (Tattvas, including eightfold nature) Objectively real evolutes (pariášÄma) of Prakášti. Empirically real (VyÄvahÄrika satya) but transcendentally unreal (MithyÄ); an apparent manifestation (vivarta) of Brahman through MÄyÄ. Process of Creation (SášášŁáši) Real evolution (PariášÄma) of Prakášti into 23 Tattvas upon disturbance of Guáša equilibrium by proximity to Puruᚣa. Apparent manifestation (Vivarta) of names and forms from Brahman through MÄyÄ and the interplay of Guášas. The Tattvic schema is accepted empirically. Role of Puruᚣa Passive witness; its proximity disturbs Prakášti's equilibrium, initiating evolution for its experience and liberation. Ätman (individual self) is identical to Brahman (Universal Self/Consciousness). The appearance of individual Puruᚣa-like entities (JÄŤvas) is due to MÄyÄ. Role of ÄŞĹvara (God) Classical Samkhya is non-theistic; no creator God is posited. ÄŞĹvara (Saguna Brahman) is Brahman associated with MÄyÄ, acting as the Lord and Creator of the universe from an empirical standpoint. Path to Liberation Discriminative knowledge (viveka) of the distinction between Puruᚣa and Prakášti, leading to Kaivalya (isolation of Puruᚣa). Realization (jĂąÄna) of the identity of Ätman with Brahman, dispelling AvidyÄ (ignorance) and MÄyÄ, leading to Mokᚣa (liberation).  VI. The Gunas: A Unified System Generating Cosmic Diversity The conceptualization of Sattva, Rajas, and Tamas transcends their individual definitions; they form a deeply interconnected and interdependent system. Their ceaseless interaction, involving mutual suppression, support, and transformation, is the fundamental dynamism that propels all cosmic processes and generates the rich tapestry of the phenomenal world. This Gunic system operates seamlessly across all levels of manifestation, from the most subtle psychological strata influencing Buddhi, AhaáškÄra, and Manas, to the grossest material stratum determining the inherent properties of the MahÄbhĹŤtas. The evolution of the Tattvas, as outlined, demonstrates a coherent continuity, entirely underpinned and orchestrated by these Gunic dynamics. Â
Consequently, the "eightfold material nature"âcomprising cosmic intellect (Buddhi/Mahat), ego (AhaáškÄra), mind (Manas), the five subtle sensory potentials (TanmÄtras, which then give rise to the five MahÄbhĹŤtas)âcan be comprehensively understood as a set of primary manifestations arising from this single, unified Gunic system. Each evolute within this eightfold structure represents a specific configuration or preponderance of the Guášas, a unique crystallization of their interplay.
This generative system is not conceived as purposeless. In Samkhya philosophy, the entire evolutionary dance of Prakášti and its Guášas is inherently teleological, aimed at providing experiences for the Puruᚣa and, ultimately, facilitating its liberation (Kaivalya) through discriminative knowledge. Similarly, in Vedanta, the manifestation of the universe through MÄyÄ (and its Guášas) serves as the experiential field for the JÄŤva (individual soul), enabling its journey through saášsÄra (the cycle of birth and death) and eventual realization of its fundamental identity with Brahman, leading to Mokᚣa (liberation). Thus, the Gunic system, as the engine of manifestation, is instrumental to this ultimate soteriological purpose in both philosophical streams. It is not merely a mechanical process but one imbued with a spiritual telos. Â
Furthermore, the balance of the Guášas is of paramount importance. While Rajas is the impetus for creation and activity, and Tamas provides the substance and stability for form, an excess of either, without the harmonizing influence of Sattva, leads to bondage, suffering, delusion, or chaos. The cultivation of Sattva is consistently emphasized in yogic and Vedantic practices as a means to achieve clarity, tranquility, and the necessary discernment for spiritual progress, even though Sattva itself, as a Guáša, must ultimately be transcended to attain the state beyond all qualities (GuášÄtÄŤta). This implies that the Gunic system, while initiated by imbalance, possesses an inherent directionality towards equilibrium and lucidity, which, when consciously cultivated, facilitates the journey towards liberation. Â
VII. Conclusion: The Enduring Significance of the Guna-Based Cosmology The intricate cosmological framework presented by the Samkhya and Vedanta philosophies, centered on the dynamic interplay of the three Guášas â Sattva, Rajas, and Tamas â offers a profound and systematic explanation for the genesis of the "eightfold material nature." This eightfold constitution, encompassing the cosmic intellect (Buddhi/Mahat), the principle of individuation (AhaáškÄra), the processing mind (Manas), and the five great elements (PaĂąca MahÄbhĹŤtas), emerges through a structured, hierarchical process driven by the varying preponderances and interactions of these fundamental cosmic forces.
The Guáša theory provides a sophisticated and unifying lens through which to understand the deep interconnectedness of the psychological and physical realms. It demonstrates how the same underlying principlesâillumination and purity (Sattva), activity and passion (Rajas), and inertia and form (Tamas)âshape both the subtle landscape of our inner experiences (thoughts, emotions, intellect, ego) and the tangible characteristics of the outer material world (the properties of space, air, fire, water, and earth). Each of the eight Tattvas is not an isolated entity but a specific Gunic configuration, a unique expression of this tripartite systemic activity.
The philosophical implications of this Guna-based cosmology are far-reaching. It offers critical insights into the perceived nature of reality, the complex constitution of the individual being, the root causes of existential suffering and bondage (often attributed to the misidentification of consciousness with these Gunic manifestations), and consequently, the pathways to liberation. In Samkhya, liberation (Kaivalya) involves the discriminative knowledge that separates Puruᚣa (consciousness) from Prakášti (the Gunic matrix and its evolutes). In Advaita Vedanta, Mokᚣa is the realization of the non-dual identity of the Ätman (individual self) with Brahman (ultimate reality), recognizing the Gunic world of MÄyÄ as an apparent superimposition.
The entire eightfold manifestation, driven by the Guášas, can be understood as a progressive "veiling" of the underlying, pure consciousness (Puruᚣa in Samkhya, Ätman/Brahman in Vedanta). Each successive evolute, from the subtlest intellect to the grossest element, while a product of this generative system, also adds layers of complexity and potential for misidentification, thereby obscuring the original, simple, and unified reality. The journey towards liberation, therefore, is often described as a process of "unveiling," of discriminating the immutable Seer from the mutable seen, a process that necessitates understanding the mechanics of the Guášas. Â
The enduring relevance of this ancient cosmological model lies not only in its comprehensive explanatory power, which bridges metaphysics, cosmology, and psychology within a remarkably coherent conceptual structure, but also in its practical applications. The understanding of the Guášas and their influence on the mind, body, and environment forms a cornerstone of applied Indian sciences such as Yoga and Ayurveda. These disciplines utilize the knowledge of Gunic balance and imbalance to diagnose conditions, prescribe lifestyle modifications, and guide practices aimed at fostering physical health, mental clarity, emotional equilibrium, and spiritual growth. The "system" of the Guášas is thus not merely an abstract philosophical construct but a lived reality, the dynamics of which can be consciously observed, understood, and influenced, paving the way for holistic well-being and the ultimate attainment of spiritual freedom. Â
Sources used in the report
swamij.com Coordinating the Four Functions of Mind - SwamiJ.com Opens in a new window
isha.sadhguru.org The Four Parts of Mind in Yoga - Buddhi, Manas, Ahankara and Chitta Opens in a new window
en.wikipedia.org Prakášti - Wikipedia Opens in a new window
en.wikipedia.org Pancha Bhuta - Wikipedia Opens in a new window
theyogasanctuary.biz The Maha Bhutas: Exploring the Five Great Elements - The Yoga Sanctuary Opens in a new window
en.wikipedia.org Guáša - Wikipedia Opens in a new window
library.fiveable.me The three gunas: sattva, rajas, and tamas | Intro to Hinduism Class Notes - Fiveable Opens in a new window
visionaryyoga.com Samkhya Philosophy: The Foundation of Yoga and Ayurveda Opens in a new window
britannica.com Indian philosophy - Samkhya, Dualism, Yoga | Britannica Opens in a new window
jkyog.in 26- The Creation of Mahattattva, Ahankar, Five Tanmatras, and Five Great Elements Opens in a new window
en.wikipedia.org Mahat-tattva - Wikipedia Opens in a new window
en.wikipedia.org Samkhya - Wikipedia Opens in a new window
sivanandaonline.org Vedanta and the Phenomenal World - Sivanandaonline.org Opens in a new window
quora.com According to Samkhya philosophy, Purusha (consciousness) and Prakriti (Nature) were different (parallel) at first and then when they starts to interacting, this universe is created. Does that mean that our universe is conscious according to samkhya? - Quora Opens in a new window
religion.uga.edu SAMKHYA AND YOGA: TWO CLASSICAL HINDU "PATHS OF INSIGHT" - Department of Religion Opens in a new window
quora.com How do the gunas relate to the concept of Prakriti? - Quora Opens in a new window
jahm.co.in Understanding the genesis of Panchamahabhutas with special reference to Ayurvedic Srushtyutpatti Siddhant. Jour. of Ayurveda Opens in a new window
bhagavadgitausa.com Bhagavad-Gita Opens in a new window
auromere.wordpress.com Pancha-mahabhutas: the five subtle constituents of matter Opens in a new window
en.wikipedia.org Tanmatras - Wikipedia Opens in a new window
poojn.in Tanmatras: A Deep Dive into the Subtle Elements - India's Biggest Dashakarma Bhandar Opens in a new window
en.wikipedia.org Tanmatras - Wikipedia Opens in a new window
ayurgamaya.com Three Gunas of Nature Decoded â Sattva, Rajas, and Tamas - Ayurgamaya Opens in a new window
wisdomlib.org Eightfold nature: Significance and symbolism Opens in a new window
britannica.com Indian philosophy - Yoga Sutras, Samkhya, Vedanta - Britannica Opens in a new window
pmc.ncbi.nlm.nih.gov Understanding personality from Ayurvedic perspective for psychological assessment: A case Opens in a new window
vivechan.learngeeta.com Understanding the Deep Influence of Sattva, Rajas, and Tamas: A ... Opens in a new window
shahzadpurfarmyoga.com Sattva Rajas, Tamas Gunas | Their Role, Nature of in Yoga Opens in a new window
maulikjournal.com Sattva, Rajas, and Tamas as tools for understanding psychological disorders - Journal of Ayurvedic Maulik Siddhant Opens in a new window
yogainternational.com Cultivating Wisdom Through Sattvic Qualities - Yoga International Opens in a new window
wisdomlib.org Three Gunas: Significance and symbolism Opens in a new window
iskcondesiretree.com The modes of material nature - Blog - ISKCON Desire Tree | IDT Opens in a new window
quora.com What is the difference between Samkhya and Advaita philosophies ... Opens in a new window
reddit.com A doubt regarding Advaita vs Sankhya : r/AdvaitaVedanta - Reddit Opens in a new window
dnaofhinduism.com Ego (Ahamkara) - DNA Of Hinduism Opens in a new window
traditionalmedicines.org Ego - Traditional Medicine Opens in a new window
beatayogadhyan.com 5 Elements of Nature Panchamahabhuta & Tridosha Opens in a new window
ijrap.net triguna-tridosha relationship - Review Article Opens in a new window
easyayurveda.com Panchamahabhuta: Application, Areas of Utility in Ayurveda treatment Opens in a new window
easyayurveda.com Gurvadi Gunas â 20 Qualities Of Substances - Classification, Benefits - Easy Ayurveda Opens in a new window
pmc.ncbi.nlm.nih.gov Importance of Manas Tattva: A searchlight in Yoga Darshana - PMC Opens in a new window
wisdomlib.org 2. Samkhya-Vedanta view of Cosmology and Ayurveda Opens in a new window
sreenivasaraos.com Samkhya : Part Six : Samkhya â Buddhism â Vedanta - sreenivasarao's blogs Opens in a new window
britannica.com Samkhya, Yoga, Dualism - Indian philosophy - Britannica Opens in a new window
goldcoasthindu.wordpress.com Gunas from Samkhya and Its Relation to Food - Gold Coast Hindu - WordPress.com Opens in a new window
tripurashakti.com Gunas in Yoga Meditation - Tripurashakti Opens in a new window
library.fiveable.me Samkhya: Dualistic philosophy | Intro to Hinduism Class Notes - Fiveable Opens in a new window
yogainternational.com The Gunas: Nature's Three Fundamental Forces - Yoga International Opens in a new window
vivechan.learngeeta.com JĂąÄna-chakᚣhu help differentiate between Kᚣhetra and KᚣhetrajĂąa necessary to attain the Supreme Destination - ािाŕĽŕ¤ŕ¤¨ सञरञŕ¤ŕ¤ś | [2025-01-11] 13th Adhyay (3/3) - by SAU VANDANA WARNEKAR JI Opens in a new window
sanskritdocuments.org The mind, according to advaita Vedanta-1 - Sanskrit Documents Opens in a new window
mast.queensu.ca Samkhya and Yoga Opens in a new window
vibrationalayurveda.com Philosophy, Sattva-Rajas-Tamas - Vibrational Ayurveda Opens in a new window
hridaya-yoga.com The Three GunasâSattva, Rajas, and Tamas - Hridaya Yoga Opens in a new window
clararobertsoss.com Samkhya Philosophy Quick Start Guide Opens in a new window
indianphilosophy.50webs.com The Basic Concepts of Advaita Vedanta - Indian Philosophy Opens in a new window
advaita-vedanta.org unit 14 - Advaita-Vedanta.org Opens in a new window
researchgate.net (PDF) Rajas Guna - ResearchGate Opens in a new window
ramakrishnavivekananda.info Sankhya and Vedanta Opens in a new window
hinduculturehub.com Journey of Understanding: Sankhya vs Vedanta Philosophical Teachings Opens in a new window
quora.com What is the difference between Sankhya and Vedanta? Which philosophy is more realistic? Opens in a new window
reddit.com Samkhya explained, and its relation to Advaita : r/hinduism - Reddit Opens in a new window
reddit.com Advaita Vedanta Cosmology : r/hinduism - Reddit Opens in a new window
en.wikipedia.org Hindu cosmology - Wikipedia Opens in a new window
vivechan.learngeeta.com The three gunas Sattva, Rajas and Tamas, are born of Prakášti or Nature - ŕ¤ŕĽŕ¤¤ŕ¤ž ािाŕĽŕ¤ŕ¤¨ Opens in a new window
en.wikipedia.org Prakášti - Wikipedia Opens in a new window
dharmawheel.net Non-Duality in Dzogchen vs Advaita Vedanta - Page 4 - Dharma Wheel Opens in a new window
en.wikipedia.org Ishvara - Wikipedia Opens in a new window
ijims.com Indian Philosophical Schools and the Foundations of Science - International Journal of Interdisciplinary and Multidisciplinary Studies (IJIMS) Opens in a new window
resource.download.wjec.co.uk Theme 4B: Philosophical understanding of the nature of reality and religious experience found in Samkhya Yoga and Advaita Vedanta - WJEC Opens in a new window
clararobertsoss.com Exploration of the 3 Gunas to Enhance Your Understanding Opens in a new window
easyayurveda.com Understanding Agni: Concept, Definition, Functions, Types - Easy Ayurveda Opens in a new window
fiveable.me Brahman, Atman, and their relationship in Advaita Vedanta | Indian Philosophy Class Notes Opens in a new window
reddit.com Help me understand Maya and Brahman. : r/AdvaitaVedanta - Reddit Opens in a new window
noblesciencepress.org CHAPTER-01 Opens in a new window
carakasamhitaonline.com Jala mahabhuta - Charak Samhita Opens in a new window
bhaktimarga.ie The Essence of Life: The Five Elements of Sankhya - Bhakti Marga Ireland Opens in a new window
yogananda.com.au ether â akasha - Paramahansa Yogananda Opens in a new window
philosophy.institute Prakrti: The Unmanifested Cosmic Energy in Samkhya - Philosophy Institute Opens in a new window
blog.siddhesh.me Srushti Utappati - Formation of the Universe - Siddhesh's Blog Opens in a new window
wisdomlib.org CHAPTER II AYURVEDA AND OTHER SYSTEMS OF INDIAN PHILOSOPHY - AN OVERVIEW Opens in a new window
ayurvedacollege.com The Five Elements: Air in Ayurveda Opens in a new window
advaita-vedanta.org The Advaita Vedânta Home Page - Theories of Creation and Causality Opens in a new window
journalgrid.com Evolution of GURVADI GUNAâ understanding and application: A review - JournalGRID Opens in a new window
en.wikipedia.org Samkhyakarika - Wikipedia Opens in a new window
iamj.in Meghana Navada et al: Role of panchamahabhuta in the formation of garbha - International Ayurvedic Medical Journal Opens in a new window
wisdomlib.org Understanding Panchamahabhuta: Pharmacological Foundations in Ayurveda Opens in a new window
wisdomlib.org An overview on hypothyroidism in ayurveda Opens in a new window
yogastlouis.us Samkhya Cosmogeny in Asana - Yoga St. Louis Opens in a new window
swamij.com Yoga Sutras of Patanjali 4.13-4.14: Objects and the 3 gunas - SwamiJ.com Opens in a new window
swami-krishnananda.org The Play of the Gunas - The Study and Practice of Yoga - Chapter 29 - Swami Krishnananda Opens in a new window
carakasamhitaonline.com Tamas - Charak Samhita Opens in a new window
pmc.ncbi.nlm.nih.gov Building bridges between Ayurveda and Modern Science - PMC Opens in a new window
wisdomlib.org Concept of triguna and its utility in defining different personalities Opens in a new window
pmc.ncbi.nlm.nih.gov Concept of personality: Indian perspective - PMC Opens in a new window
anandamyogaschool.com What are the Three Gunas in Yoga? | Anandam Yoga School Opens in a new window
wjpmr.com importance of triguna and its significance in affecting mental health: a review study from in - WJPMR Opens in a new window
reddit.com What is the role of Ishwara in Advaita? : r/AdvaitaVedanta - Reddit Opens in a new window
yesvedanta.com Comparing Major Schools of Philosophies: A Critical Analysis - Yes Vedanta Opens in a new window
quora.com What is the concept of tattvas in Vaishnavism philosophy? - Quora Opens in a new window
egyankosh.ac.in Unit 3 SAMKHYA PHILOSOPHY - eGyanKosh Opens in a new window
theukayurvediccentre.com Samkhya Philosophy of Creation - The UK Ayurvedic Centre Opens in a new window
wisdomlib.org 3. Physical properties of Vayu Opens in a new window
quora.com What is the difference between Samkhya Yoga and Advaita Vedanta philosophies? - Quora Opens in a new window
groups.google.com Ishwara has no real authorship, kartrutvam, in the creation of the world - Srimad Bhagavatam Opens in a new window
poojn.in Samkhya and Other Indian Philosophical Schools: A Comparative Analysis - India's Biggest Dashakarma Bhandar | Poojn.in Opens in a new window
shivayashiva.wordpress.com Tattva Bodha [ Reality or True Nature of Self ] by Sri Shankaracharya â II | ShiVaYaShiVa Opens in a new window
iep.utm.edu Advaita Vedanta - Internet Encyclopedia of Philosophy Opens in a new window
en.wikipedia.org Advaita Vedanta - Wikipedia Opens in a new window
wisdomlib.org Essence of agni: Significance and symbolism Opens in a new window
wisdomlib.org Qualities of gunas: Significance and symbolism Opens in a new window
wisdomlib.org Vayu (air): Significance and symbolism Opens in a new window
wisdomlib.org Akasha: Significance and symbolism Opens in a new window
asischaudhuri.wordpress.com SÄmkhya: The Indian Philosophy - Cooking Cosmos Opens in a new window
en.wikipedia.org Akasha - Wikipedia Opens in a new window
savitri.in XLâSix Systems of Indian Philosophy (Samkhya) by Sanjeev Nayyar Feb 21 2010 - Savitri | Library Opens in a new window
pmc.ncbi.nlm.nih.gov Application of Satkaryavada based on theory of Karya-Karana Vada - PMC Opens in a new window
yogajala.com Understanding The Three Gunas: Tamas, Rajas & Sattva - Yogajala Opens in a new window
quora.com What are the features of Sankhya philosophy? - Quora Opens in a new window
ebsco.com The Crest Jewel of Wisdom by Sankaracharya | EBSCO Research Starters Opens in a new window
researchgate.net (PDF) SHANKAR'S PERSPECTIVE ABOUT THE CONCEPT OF MAYA AND BRAHMA. Opens in a new window
brettlarkin.com What Are The Gunas In Yoga? A Complete Overview - Brett Larkin Opens in a new window
indianyoga.org SÄáškhya And VedÄnta: A Comparative Analysis - International Journal of Yoga and Allied Sciences Opens in a new window
academyofvedicvidya.com The Five Elements (Pancha Mahabhutas) in Vedic Science Opens in a new window
universityofpatanjali.com MA in Yoga Science - University Of Patanjali Opens in a new window
sportsjournal.in Balancing Trigunas with yogic practices - International Journal of Yoga, Physiotherapy and Physical Education Opens in a new window
iep.utm.edu Sankhya | Internet Encyclopedia of Philosophy Opens in a new window
core.ac.uk theory of gunas in samkhya philosophy - CORE Opens in a new window
umassd.edu Akasha (Space) and Shabda (Sound): Vedic and Acoustical perspectives Opens in a new window
wisdomlib.org 2. The Samkhya system Opens in a new window
rishiprasad.org Composition of the Tanmatras of the Five Mahabhutas and their functions - Rishi Prasad Opens in a new window
irjmets.com THE ROLE OF THE GUNAS IN SANKHYA PHILOSOPHY: A PHILOSOPHICAL ANALYSIS - IRJMETS Opens in a new window
unbrokenself.com The Three Gunas: A Revolutionary Model for Mastering Your Mind and Life - Unbroken Self Opens in a new window
sanatanbrahmand.com Triguna - SANATANBRAHMAND Opens in a new window
utppublishing.com The Ultimate Reality and Meaning of Samkhya - University of Toronto Press Opens in a new window
sreenivasaraos.com Samkhya-Karika | sreenivasarao's blogs Opens in a new window
Sources read but not used in the report Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window Opens in a new window
Thoughts Understanding Fundamental Concepts I'm beginning to explore the idea of how the three fundamental qualities, known as Sattva, Rajas, and Tamas, could be the basis for the eightfold material world. This material world is described as consisting of five basic elements, along with the mind, intellect, and ego. My initial step is to clearly define each of these components and understand their individual characteristics within this philosophical framework. Next Steps in the Exploration My next line of inquiry will focus on the process through which these three Gunas are believed to interact and transform to give rise to this eightfold structure. I'll be looking for information on the specific mechanisms and stages involved in this manifestation, as described in the relevant philosophical traditions.
Researching websites
swamij.com Coordinating the Four Functions of Mind - SwamiJ.com
isha.sadhguru.org The Four Parts of Mind in Yoga - Buddhi, Manas, Ahankara and Chitta
en.wikipedia.org Prakášti - Wikipedia
en.wikipedia.org Pancha Bhuta - Wikipedia
wisdomlib.org Prakriti and Purusha: Significance and symbolism
theyogasanctuary.biz The Maha Bhutas: Exploring the Five Great Elements - The Yoga Sanctuary
en.wikipedia.org Guáša - Wikipedia
library.fiveable.me The three gunas: sattva, rajas, and tamas | Intro to Hinduism Class Notes - Fiveable Gunas and Material Nature I've found that the three Gunas â Sattva (goodness, harmony), Rajas (passion, activity), and Tamas (ignorance, inertia) â are fundamental qualities present in everything. These aren't separate but exist in different proportions. The concept of Prakriti is also key; it's described as the original, unmanifest state where these three Gunas exist in equilibrium, forming the basis of all reality, including our mental and physical aspects. Components of the Eightfold World My research indicates that the eightfold material nature comprises the five basic elements: Akasha (ether/space), Vayu (air), Agni (fire), Jala (water), and Prithvi (earth). Additionally, it includes Manas (mind, which processes sensory information), Buddhi (intellect, responsible for knowing and deciding), and Ahamkara (ego, the sense of 'I-am-ness'). Exploring the Manifestation Process I will now delve deeper into understanding how the initial disturbance in the equilibrium of the Gunas within Prakriti leads to the emergence of Mahat (the great intellect) and then Ahamkara (ego). This seems to be a crucial step in understanding the creation of the eightfold material nature from the three primary Gunas.
Researching websites
visionaryyoga.com Revolutionize Your Universe With Samkhya Philosophy - Visionary Yoga
britannica.com Indian philosophy - Samkhya, Dualism, Yoga | Britannica
jkyog.in 26- The Creation of Mahattattva, Ahankar, Five Tanmatras, and Five Great Elements
en.wikipedia.org Mahat-tattva - Wikipedia
en.wikipedia.org Samkhya - Wikipedia
sivanandaonline.org Vedanta and the Phenomenal World - Sivanandaonline.org
en.wikipedia.org Pancha Bhuta - Wikipedia
en.wikipedia.org Guáša - Wikipedia
swamij.com Coordinating the Four Functions of Mind - SwamiJ.com Gunas and Their Roles I've learned that the three Gunas are not just abstract qualities but active forces that influence everything. Sattva brings balance and harmony, Rajas drives action and passion, and Tamas represents inertia and ignorance. These Gunas are always present, but their varying proportions shape the characteristics of individuals and objects. Prakriti as the Foundation The concept of Prakriti is central to this idea. It's described as the primordial substance where the three Gunas exist in a state of balance. This isn't just inert matter; it encompasses all aspects of reality, including cognitive and psychological functions. The five basic elements are considered to be derived from this fundamental Prakriti. Next Steps: Cosmic Manifestation I will now focus on understanding how the initial imbalance in the Gunas within Prakriti triggers the process of cosmic manifestation. Specifically, I'll be looking into the emergence of Mahat, often described as the cosmic intellect, and how Ahamkara, the ego or sense of self, arises from it. This should provide more clarity on the transition from the three Gunas to the eightfold material nature.
Researching websites
quora.com According to Samkhya philosophy, Purusha (consciousness) and Prakriti (Nature) were different (parallel) at first and then when they starts to interacting, this universe is created. Does that mean that our universe is conscious according to samkhya? - Quora
religion.uga.edu SAMKHYA AND YOGA: TWO CLASSICAL HINDU "PATHS OF INSIGHT" - Department of Religion
en.wikipedia.org Samkhya - Wikipedia
quora.com How do the gunas relate to the concept of Prakriti? - Quora
en.wikipedia.org Mahat-tattva - Wikipedia
britannica.com Indian philosophy - Samkhya, Dualism, Yoga | Britannica
jkyog.in Wisdom - 26- The Creation of Mahattattva, Ahankar ... - JKYog India
visionaryyoga.com Samkhya Philosophy: The Foundation of Yoga and Ayurveda
sivanandaonline.org Vedanta and the Phenomenal World - Sivanandaonline.org Understanding the Initial Stages I've gained a clearer understanding of the initial steps in the manifestation process. It appears that the equilibrium of the three Gunas (Sattva, Rajas, Tamas) in Prakriti is disturbed by Purusha (consciousness), leading to the emergence of Mahat, which is often referred to as the great intellect or cosmic intelligence. Following this, Ahamkara, or the ego, arises from Mahat. Ahamkara's Role in Differentiation Interestingly, I've found that Ahamkara itself isn't uniform. It seems to differentiate further based on the influence of the three Gunas. Specifically, Vaikarik or Sattvic Ahamkara is associated with the creation of the mind, Taijas or Rajasic Ahamkara with the senses, and Tamasic Ahamkara is linked to the origin of the five subtle elements known as Tanmatras (sound, touch, form, taste, smell). Further Exploration Needed My next step is to investigate how these Tanmatras, which are subtle elements, then give rise to the five gross elements or Mahabhutas (ether, air, fire, water, earth) that constitute the physical world as we perceive it. I will also look for more detailed explanations on how Ahamkara, influenced by the different Gunas, leads to the development of the mind and senses.
Researching websites
jkyog.in Wisdom - 26- The Creation of Mahattattva, Ahankar ... - JKYog India
scribd.com Vipaka | PDF | Hindu Mythology | Indian Religions - Scribd
jahm.co.in Understanding the genesis of Panchamahabhutas with special reference to Ayurvedic Srushtyutpatti Siddhant. Jour. of Ayurveda
en.wikipedia.org Samkhya - Wikipedia
bhagavadgitausa.com Bhagavad-Gita
auromere.wordpress.com Pancha-mahabhutas: the five subtle constituents of matter
en.wikipedia.org Tanmatras - Wikipedia
poojn.in Tanmatras: A Deep Dive into the Subtle Elements - India's Biggest Dashakarma Bhandar
sivanandaonline.org Vedanta and the Phenomenal World - Sivanandaonline.org
en.wikipedia.org Tanmatras - Wikipedia Ahamkara's Three Forms I've discovered that the ego, or Ahamkara, isn't a single entity but manifests in three different forms depending on which of the Gunas (Sattva, Rajas, Tamas) is dominant. This differentiation is key to understanding how the mind, senses, and subtle elements arise. From Subtle to Gross Elements My research indicates that the five subtle elements, known as Tanmatras (sound, touch, form, taste, smell), emerge from Tamasic Ahamkara. These Tanmatras then further evolve to create the five gross elements or Mahabhutas (ether, air, fire, water, earth) that make up the physical world we experience. Next Steps: Gunas' Influence I now need to delve deeper into how each of the three Gunas specifically influences the characteristics and functions of each of the eight components of material nature: the five elements, mind, intellect, and ego. I also plan to explore if different philosophical schools, like Vedanta, offer alternative perspectives on this process of cosmic evolution and the role of the Gunas.
Researching websites
ayurgamaya.com Three Gunas of Nature Decoded â Sattva, Rajas, and Tamas - Ayurgamaya
wisdomlib.org Eightfold nature: Significance and symbolism
britannica.com Indian philosophy - Yoga Sutras, Samkhya, Vedanta - Britannica
pmc.ncbi.nlm.nih.gov Understanding personality from Ayurvedic perspective for psychological assessment: A case
vivechan.learngeeta.com Understanding the Deep Influence of Sattva, Rajas, and Tamas: A Journey from Bondage to Supreme Freedom - ŕ¤ŕĽŕ¤¤ŕ¤ž ािाŕĽŕ¤ŕ¤¨
shahzadpurfarmyoga.com Sattva Rajas, Tamas Gunas | Their Role, Nature of in Yoga
maulikjournal.com Sattva, Rajas, and Tamas as tools for understanding psychological disorders - Journal of Ayurvedic Maulik Siddhant
yogainternational.com Cultivating Wisdom Through Sattvic Qualities - Yoga International
wisdomlib.org Three Gunas: Significance and symbolism
iskcondesiretree.com The modes of material nature - Blog - ISKCON Desire Tree | IDT
quora.com What is the difference between Samkhya and Advaita philosophies in Hinduism? - Quora
reddit.com A doubt regarding Advaita vs Sankhya : r/AdvaitaVedanta - Reddit
dnaofhinduism.com Ego (Ahamkara) - DNA Of Hinduism
en.wikipedia.org Guáša - Wikipedia
traditionalmedicines.org Ego - Traditional Medicine
en.wikipedia.org Samkhya - Wikipedia
yogapedia.com What is Guna? - Definition from Yogapedia Guna Influence on Elements I've found some information about how the Gunas influence the five elements. Sattva is associated with the more subtle aspects like the sound of ether, while Rajas governs movement and energy in air and fire. Tamas is linked to the stability and form of earth and the fluidity of water. However, I still need to find more detailed explanations for each element. Mind, Intellect, and Ego Regarding the mind (Manas), intellect (Buddhi), and ego (Ahamkara), I've gathered that Sattva promotes clarity and wisdom in the intellect, Rajas fuels the ego's sense of individuality and the mind's active engagement with the world, and Tamas can lead to delusion and inertia in all three. I will continue to refine my understanding of these connections. Samkhya and Vedanta I've confirmed that Samkhya philosophy is central to the concept of the three Gunas giving rise to the eightfold material nature. Vedanta also incorporates these ideas, but I need to investigate further to understand any key differences in their explanations of this generative process. Further Research on Guna Interactions To get a more complete picture, I will now try to find more specific details on how Sattva, Rajas, and Tamas individually and collectively shape each of the five elements, as well as the mind, intellect, and ego. I will also continue to explore the perspectives of different philosophical schools to identify any variations in their understanding of this process.
Researching websites
beatayogadhyan.com 5 Elements of Nature Panchamahabhuta & Tridosha
ijrap.net triguna-tridosha relationship - Review Article
easyayurveda.com Panchamahabhuta: Application, Areas of Utility in Ayurveda treatment
easyayurveda.com Gurvadi Gunas â 20 Qualities Of Substances - Classification, Benefits - Easy Ayurveda
isha.sadhguru.org The Four Parts of Mind in Yoga - Buddhi, Manas, Ahankara and Chitta
pmc.ncbi.nlm.nih.gov Importance of Manas Tattva: A searchlight in Yoga Darshana - PMC
wisdomlib.org 2. Samkhya-Vedanta view of Cosmology and Ayurveda
sreenivasaraos.com Samkhya : Part Six : Samkhya â Buddhism â Vedanta - sreenivasarao's blogs
britannica.com Indian philosophy - Yoga Sutras, Samkhya, Vedanta - Britannica
britannica.com Samkhya, Yoga, Dualism - Indian philosophy - Britannica
goldcoasthindu.wordpress.com
tripurashakti.com Gunas in Yoga Meditation - Tripurashakti
library.fiveable.me Samkhya: Dualistic philosophy | Intro to Hinduism Class Notes - Fiveable
yogainternational.com The Gunas: Nature's Three Fundamental Forces - Yoga International
en.wikipedia.org Samkhya - Wikipedia
en.wikipedia.org Guáša - Wikipedia
quora.com What is the difference between Samkhya and Advaita philosophies ...
traditionalmedicines.org Ego - Traditional Medicine
vivechan.learngeeta.com Understanding the Deep Influence of Sattva, Rajas, and Tamas: A ...
shahzadpurfarmyoga.com Sattva Rajas, Tamas Gunas | Their Role, Nature of in Yoga Guna Influence on Elements I've gained further insights into how the three Gunas relate to the five basic elements. For instance, Sattva is often associated with the sensory aspects of the elements, like the sound of ether. Rajas is linked to the dynamic properties such as the movement of air and the heat of fire. Tamas, on the other hand, is connected to the more stable and gross characteristics, like the form of earth and the fluidity of water. I'm still looking for even more specific connections. Mind, Intellect, and Ego My understanding of the mind, intellect, and ego in relation to the Gunas has also improved. Sattva seems to foster clarity and wisdom within the intellect. Rajas drives the ego's sense of self and the mind's active engagement with the external world. Tamas can unfortunately lead to states of confusion and inactivity in these mental faculties. Comparing Philosophical Views While Samkhya philosophy provides a detailed framework for how the three Gunas lead to the eightfold material nature, I've started to look into how other schools, particularly Advaita Vedanta, approach this topic. It seems there might be variations in how they explain the role of the Gunas in the creation of these specific components. Next Steps: Refining Understanding My next steps involve trying to find more precise explanations of how each Guna contributes to the unique properties of each of the five elements. Additionally, I want to delve deeper into the specific differences between Samkhya and Advaita Vedanta's perspectives on the creation of the eightfold material nature through the influence of the Gunas.
Researching websites
vivechan.learngeeta.com JĂąÄna-chakᚣhu help differentiate between Kᚣhetra and KᚣhetrajĂąa necessary to attain the Supreme Destination - ािाŕĽŕ¤ŕ¤¨ सञरञŕ¤ŕ¤ś | [2025-01-11] 13th Adhyay (3/3) - by SAU VANDANA WARNEKAR JI
en.wikipedia.org Samkhya - Wikipedia
wisdomlib.org Universe Creation: Sat Raj Tam in Sankhya Yog and the Three Bodies.
sanskritdocuments.org The mind, according to advaita Vedanta-1 - Sanskrit Documents
mast.queensu.ca Samkhya and Yoga
vibrationalayurveda.com Philosophy, Sattva-Rajas-Tamas - Vibrational Ayurveda
hridaya-yoga.com The Three GunasâSattva, Rajas, and Tamas - Hridaya Yoga
clararobertsoss.com Samkhya Philosophy Quick Start Guide
indianphilosophy.50webs.com
ijrap.net triguna-tridosha relationship - Review Article
advaita-vedanta.org unit 14 - Advaita-Vedanta.org
researchgate.net (PDF) Rajas Guna - ResearchGate
ramakrishnavivekananda.info
hinduculturehub.com Journey of Understanding: Sankhya vs Vedanta Philosophical Teachings
quora.com What is the difference between Sankhya and Vedanta? Which philosophy is more realistic?
reddit.com Samkhya explained, and its relation to Advaita : r/hinduism - Reddit
reddit.com Advaita Vedanta Cosmology : r/hinduism - Reddit
en.wikipedia.org Hindu cosmology - Wikipedia
library.fiveable.me Samkhya: Dualistic philosophy | Intro to Hinduism Class Notes - Fiveable
vivechan.learngeeta.com The three gunas Sattva, Rajas and Tamas, are born of Prakášti or Nature - ŕ¤ŕĽŕ¤¤ŕ¤ž ािाŕĽŕ¤ŕ¤¨
wisdomlib.org Tamas, Rajas, and Sattva: Significance and symbolism
en.wikipedia.org Prakášti - Wikipedia
sivanandaonline.org Who are Fit to be My Disciples - Sivanandaonline.org Specific Guna Characteristics I've been refining my understanding of how each Guna influences the fundamental elements. Sattva is associated with qualities like luminosity and purity, Rajas with activity and dynamism, and Tamas with inertia and stability. These qualities manifest differently in each of the five elements, contributing to their unique characteristics. Mental Faculties and Gunas My research suggests that the three Gunas also play a significant role in shaping the mind, intellect, and ego. Sattva promotes clarity and wisdom in the intellect, Rajas fuels the ego's sense of self and the mind's engagement with the world, while Tamas can lead to confusion and attachment. Contrasting Philosophical Views I'm now focusing on understanding the nuances between Samkhya and Vedanta philosophies regarding the creation process. While both acknowledge the importance of the three Gunas, their perspectives on the ultimate reality (Prakriti vs. Brahman) and the nature of creation seem to differ, which likely affects how they view the role of the Gunas.
Researching websites
dharmawheel.net Non-Duality in Dzogchen vs Advaita Vedanta - Page 4 - Dharma Wheel
en.wikipedia.org Ishvara - Wikipedia
en.wikipedia.org Samkhya - Wikipedia
ijims.com Indian Philosophical Schools and the Foundations of Science - International Journal of Interdisciplinary and Multidisciplinary Studies (IJIMS)
resource.download.wjec.co.uk
hinduculturehub.com Journey of Understanding: Sankhya vs Vedanta Philosophical Teachings
clararobertsoss.com Exploration of the 3 Gunas to Enhance Your Understanding
easyayurveda.com Understanding Agni: Concept, Definition, Functions, Types - Easy Ayurveda
fiveable.me Brahman, Atman, and their relationship in Advaita Vedanta | Indian Philosophy Class Notes
reddit.com Help me understand Maya and Brahman. : r/AdvaitaVedanta - Reddit
library.fiveable.me Samkhya: Dualistic philosophy | Intro to Hinduism Class Notes - Fiveable
noblesciencepress.org CHAPTER-01
carakasamhitaonline.com Jala mahabhuta - Charak Samhita
en.wikipedia.org Prakášti - Wikipedia
bhaktimarga.ie The Essence of Life: The Five Elements of Sankhya - Bhakti Marga Ireland
yogananda.com.au ether â akasha - Paramahansa Yogananda
philosophy.institute Prakrti: The Unmanifested Cosmic Energy in Samkhya - Philosophy Institute
blog.siddhesh.me Srushti Utappati - Formation of the Universe - Siddhesh's Blog
wisdomlib.org CHAPTER II AYURVEDA AND OTHER SYSTEMS OF INDIAN PHILOSOPHY - AN OVERVIEW
ayurvedacollege.com The Five Elements: Air in Ayurveda
advaita-vedanta.org The Advaita Vedânta Home Page - Theories of Creation and Causality Guna Properties in Elements I've been able to gather more specific details on how the Gunas manifest in the five elements. Sattva contributes subtle qualities like the sound of ether, Rajas is responsible for the movement of air and the heat of fire, and Tamas provides the stability of earth and the fluidity of water. These are still general associations, and I'm looking for more in-depth explanations. Mental Aspects and Gunas My understanding of how the Gunas influence the mind, intellect, and ego has been further refined. Sattva is linked to clarity and wisdom in the intellect, Rajas to the ego's sense of self and the mind's activity, and Tamas to inertia and delusion. These connections help explain the different modes of mental functioning.
Researching websites
journalgrid.com Evolution of GURVADI GUNAâ understanding and application: A review - JournalGRID
hathajoga.lt Yoga Sutras of Patanjali with the Exposition of Vyasa - Hatha joga
en.wikipedia.org Samkhyakarika - Wikipedia
iamj.in Meghana Navada et al: Role of panchamahabhuta in the formation of garbha - International Ayurvedic Medical Journal
wisdomlib.org Understanding Panchamahabhuta: Pharmacological Foundations in Ayurveda
mysticknowledge.org THE YOGA SUTRAS - Mystic Knowledge
wisdomlib.org An overview on hypothyroidism in ayurveda
yogastlouis.us Samkhya Cosmogeny in Asana - Yoga St. Louis
swamij.com Yoga Sutras of Patanjali 4.13-4.14: Objects and the 3 gunas - SwamiJ.com
swami-krishnananda.org The Play of the Gunas - The Study and Practice of Yoga - Chapter 29 - Swami Krishnananda
wisdomlib.org CHAPTER II AYURVEDA AND OTHER SYSTEMS OF INDIAN PHILOSOPHY - AN OVERVIEW
carakasamhitaonline.com Tamas - Charak Samhita
pmc.ncbi.nlm.nih.gov Building bridges between Ayurveda and Modern Science - PMC
wisdomlib.org Concept of triguna and its utility in defining different personalities
pmc.ncbi.nlm.nih.gov Concept of personality: Indian perspective - PMC
anandamyogaschool.com What are the Three Gunas in Yoga? | Anandam Yoga School
wjpmr.com importance of triguna and its significance in affecting mental health: a review study from in - WJPMR
en.wikipedia.org Tanmatras - Wikipedia
clararobertsoss.com Samkhya Philosophy Quick Start Guide
hridaya-yoga.com The Three GunasâSattva, Rajas, and Tamas - Hridaya Yoga
en.wikipedia.org Ishvara - Wikipedia
reddit.com What is the role of Ishwara in Advaita? : r/AdvaitaVedanta - Reddit
en.wikipedia.org Samkhya - Wikipedia
jkyog.in 26- The Creation of Mahattattva, Ahankar, Five Tanmatras, and Five Great Elements
yesvedanta.com Comparing Major Schools of Philosophies: A Critical Analysis - Yes Vedanta
quora.com What is the concept of tattvas in Vaishnavism philosophy? - Quora Guna Characteristics I've been able to identify some key characteristics associated with each of the three Gunas. Sattva is linked to purity and luminosity, Rajas to activity and dynamism, and Tamas to inertia and stability. These fundamental qualities are believed to permeate all aspects of existence. Mental Faculties and Influence My research indicates that these Gunas also exert influence over our mental capacities. Sattva is associated with clarity and wisdom in the intellect, Rajas with the ego's sense of self and the mind's active engagement, and Tamas with states of confusion and attachment. Next Steps: Deeper Dive I'm now going to try and find more specific details about how each of these Gunas uniquely contributes to the characteristics of the five basic elements (ether, air, fire, water, earth). I also want to explore the differences in how Samkhya and Advaita Vedanta philosophies explain this process of manifestation from the Gunas.
Researching websites
egyankosh.ac.in Unit 3 SAMKHYA PHILOSOPHY - eGyanKosh
theukayurvediccentre.com Samkhya Philosophy of Creation - The UK Ayurvedic Centre
wisdomlib.org 3. Physical properties of Vayu
quora.com What is the difference between Samkhya Yoga and Advaita Vedanta philosophies? - Quora
en.wikipedia.org Prakášti - Wikipedia
britannica.com Indian philosophy - Samkhya, Dualism, Yoga | Britannica
clararobertsoss.com Samkhya Philosophy Quick Start Guide
anandamyogaschool.com What are the Three Gunas in Yoga? | Anandam Yoga School
groups.google.com Ishwara has no real authorship, kartrutvam, in the creation of the world - Srimad Bhagavatam
poojn.in Samkhya and Other Indian Philosophical Schools: A Comparative Analysis - India's Biggest Dashakarma Bhandar | Poojn.in
shivayashiva.wordpress.com
vivechan.learngeeta.com The three gunas Sattva, Rajas and Tamas, are born of Prakášti or Nature - ŕ¤ŕĽŕ¤¤ŕ¤ž ािाŕĽŕ¤ŕ¤¨
yesvedanta.com Comparing Major Schools of Philosophies: A Critical Analysis - Yes Vedanta
iep.utm.edu Advaita Vedanta - Internet Encyclopedia of Philosophy
en.wikipedia.org Advaita Vedanta - Wikipedia
wisdomlib.org Essence of agni: Significance and symbolism
wisdomlib.org Three Gunas: Significance and symbolism
wisdomlib.org Qualities of gunas: Significance and symbolism
en.wikipedia.org Samkhya - Wikipedia
wisdomlib.org Vayu (air): Significance and symbolism
en.wikipedia.org Guáša - Wikipedia
wisdomlib.org Akasha: Significance and symbolism
asischaudhuri.wordpress.com
en.wikipedia.org Akasha - Wikipedia
savitri.in XLâSix Systems of Indian Philosophy (Samkhya) by Sanjeev Nayyar Feb 21 2010 - Savitri | Library
pmc.ncbi.nlm.nih.gov Application of Satkaryavada based on theory of Karya-Karana Vada - PMC
yogajala.com Understanding The Three Gunas: Tamas, Rajas & Sattva - Yogajala Guna Properties in Elements I've found some general associations of the Gunas with the elements. Sattva is linked to the sensory aspects, Rajas to movement and energy, and Tamas to stability and gross form. However, I'm still aiming to find more specific philosophical explanations for how each Guna uniquely contributes to the inherent nature of each of the five elements. Mental Aspects and Gunas My understanding of the relationship between the Gunas and the mind, intellect, and ego continues to develop. Sattva appears to promote clarity in the intellect, Rajas fuels the ego and the mind's activity, and Tamas can lead to inertia and delusion. These connections provide a framework for understanding different aspects of our mental functioning. Further Research Needed I will now focus on finding more detailed information about the specific influence of each Guna on each of the five elements. Additionally, I plan to investigate the variations in how Samkhya and Advaita Vedanta philosophies explain the emergence of the eightfold material nature from the three Gunas, particularly focusing on the Advaita Vedanta perspective and comparing it with the Samkhya model.
Researching websites
clararobertsoss.com Samkhya Philosophy Quick Start Guide
quora.com What are the features of Sankhya philosophy? - Quora
ebsco.com The Crest Jewel of Wisdom by Sankaracharya | EBSCO Research Starters
researchgate.net (PDF) SHANKAR'S PERSPECTIVE ABOUT THE CONCEPT OF MAYA AND BRAHMA.
en.wikipedia.org Samkhya - Wikipedia
brettlarkin.com What Are The Gunas In Yoga? A Complete Overview - Brett Larkin
dharmawheel.net Non-Duality in Dzogchen vs Advaita Vedanta - Page 4 - Dharma Wheel
reddit.com What is the role of Ishwara in Advaita? : r/AdvaitaVedanta - Reddit
britannica.com Samkhya, Yoga, Dualism - Indian philosophy - Britannica
indianyoga.org SÄáškhya And VedÄnta: A Comparative Analysis - International Journal of Yoga and Allied Sciences
library.fiveable.me Samkhya: Dualistic philosophy | Intro to Hinduism Class Notes - Fiveable
savitri.in XLâSix Systems of Indian Philosophy (Samkhya) by Sanjeev Nayyar Feb 21 2010 - Savitri | Library
academyofvedicvidya.com The Five Elements (Pancha Mahabhutas) in Vedic Science
universityofpatanjali.com MA in Yoga Science - University Of Patanjali
iep.utm.edu Advaita Vedanta - Internet Encyclopedia of Philosophy
jkyog.in 26- The Creation of Mahattattva, Ahankar, Five Tanmatras, and Five Great Elements
sportsjournal.in Balancing Trigunas with yogic practices - International Journal of Yoga, Physiotherapy and Physical Education
wisdomlib.org CHAPTER II AYURVEDA AND OTHER SYSTEMS OF INDIAN PHILOSOPHY - AN OVERVIEW
iep.utm.edu Sankhya | Internet Encyclopedia of Philosophy
core.ac.uk theory of gunas in samkhya philosophy - CORE Guna Characteristics I've identified that Sattva is associated with balance and harmony, Rajas with passion and activity, and Tamas with inertia and ignorance. These three fundamental qualities, or Gunas, are understood to be present in varying degrees in everything. Prakriti and Manifestation The concept of Prakriti is central, representing the primordial substance where these Gunas exist in equilibrium. The disturbance of this balance is believed to initiate the manifestation of the material world, including the five elements (ether, air, fire, water, earth) and the mental faculties (mind, intellect, ego). Next Steps: Specific Influences I will now concentrate on finding more specific details about how each of these Gunas uniquely contributes to the characteristics of the five basic elements. Additionally, I aim to further explore the differences in how Samkhya and Advaita Vedanta philosophies explain this process of manifestation from the Gunas.
Researching websites
advaita-vedanta.org The Advaita Vedânta Home Page - Advaita-Vedanta.org
hridaya-yoga.com The Three GunasâSattva, Rajas, and Tamas - Hridaya Yoga
wisdomlib.org Three Gunas: Significance and symbolism
umassd.edu Akasha (Space) and Shabda (Sound): Vedic and Acoustical perspectives
en.wikipedia.org Samkhya - Wikipedia
wisdomlib.org 2. The Samkhya system
dasarpai.com Introduction to Upanishads | dasarpAI
rishiprasad.org Composition of the Tanmatras of the Five Mahabhutas and their functions - Rishi Prasad
swami-krishnananda.org An Analysis of the Brahma Sutra - Swami Krishnananda
en.wikipedia.org Ishvara - Wikipedia
resource.download.wjec.co.uk
irjmets.com THE ROLE OF THE GUNAS IN SANKHYA PHILOSOPHY: A PHILOSOPHICAL ANALYSIS - IRJMETS
yesvedanta.com Comparing Major Schools of Philosophies: A Critical Analysis - Yes Vedanta
en.wikipedia.org Advaita Vedanta - Wikipedia
jkyog.in 26- The Creation of Mahattattva, Ahankar, Five Tanmatras, and Five Great Elements
easyayurveda.com Panchamahabhuta: Application, Areas of Utility in Ayurveda treatment
unbrokenself.com The Three Gunas: A Revolutionary Model for Mastering Your Mind and Life - Unbroken Self
sanatanbrahmand.com Triguna - SANATANBRAHMAND
en.wikipedia.org Prakášti - Wikipedia
core.ac.uk theory of gunas in samkhya philosophy - CORE
clararobertsoss.com Samkhya Philosophy Quick Start Guide
utppublishing.com The Ultimate Reality and Meaning of Samkhya - University of Toronto Press
pmc.ncbi.nlm.nih.gov Concept of personality: Indian perspective - PMC
easyayurveda.com Understanding Agni: Concept, Definition, Functions, Types - Easy Ayurveda
sreenivasaraos.com Samkhya-Karika | sreenivasarao's blogs Guna Properties I've been able to gather that the three Gunas â Sattva, Rajas, and Tamas â represent fundamental qualities. Sattva embodies goodness and harmony, Rajas signifies passion and activity, and Tamas represents inertia and ignorance. These qualities are not separate but are present in varying proportions in all things. Prakriti and Creation My research indicates that Prakriti is the primordial substance where these three Gunas exist in a state of equilibrium. The imbalance of these Gunas is considered the starting point for the manifestation of the material universe, which includes the five basic elements as well as the mind, intellect, and ego.
-
@ 472f440f:5669301e
2025-05-14 01:15:12Marty's Bent
via Kevin McKernan
There's been a lot of discussion this week about Casey Means being nominated for Surgeon General of the United States and a broader overarching conversation about the effectiveness of MAHA since the inauguration and how effective it may or may not be moving forward. Many would say that President Trump won re-election due to Robert F. Kennedy Jr. and Nicole Shanahan deciding to reach across the aisle and join the Trump ticket, bringing with them the MAHA Moms, who are very focused on reorienting the healthcare system in the United States with a strong focus on the childhood vaccine schedule.
I'm not going to lie, this is something I'm passionate about as well, particularly after having many conversations over the years with doctors like Kevin McKernan, Dr. Jack Kruse, Dr. Mary Talley Bowden, Dr. Brooke Miller, Dr. Peter McCullough and others about the dangers of the COVID mRNA vaccines. As it stands today, I think this is the biggest elephant in the room in the world of healthcare. If you look at the data, particularly disability claims, life insurance claims, life expectancy, miscarriage rates, fertility issues and rates of turbo cancer around the world since the COVID vaccine was introduced in 2021, it seems pretty clear that there is harm being done to many of the people who have taken them.
The risk-reward ratio of the vaccines seems to be incredibly skewed towards risk over reward and children - who have proven to be least susceptible to COVID - are expected to get three COVID shots in the first year of their life if their parents follow the vaccine schedule. For some reason or another it seems that Robert F. Kennedy Jr. has shied away from this topic after becoming the head of Health and Human Services within the Trump administration. This is after a multi-year campaign during which getting the vaccines removed from the market war a core part of his platform messaging.
I'm still holding out hope that sanity will prevail. The COVID mRNA vaccines will be taken off the market in a serious conversation about the crimes against humanity that unfolded during the COVID years will take place. However, we cannot depend on that outcome. We must build with the assumption in mind that that outcome may never materialize. This leads to identifying where the incentives within the system are misconstrued. One area where I think it's pretty safe to say that the incentives are misaligned is the fact that 95% of doctors work for and answer to a corporation driven by their bottom line. Instead of listening to their patients and truly caring about the outcome of each individual, doctors forced to think about the monetary outcome of the corporation they work for first.
The most pernicious way in which these misaligned incentives emerge is the way in which the hospital systems and physicians are monetarily incentivized by big pharma companies to push the COVID vaccine and other vaccines on their patients. It is important to acknowledge that we cannot be dependent on a system designed in this way to change from within. Instead, we must build a new incentive system and market structure. And obviously, if you're reading this newsletter, you know that I believe that bitcoin will play a pivotal role in realigning incentives across every industry. Healthcare just being one of them.
Bitcoiners who have identified the need to become sovereign in our monetary matters, it probably makes sense to become sovereign when it comes to our healthcare as well. This means finding doctors who operate outside the corporate controlled system and are able to offer services that align incentives with the end patient. My family utilizes a combination of CrowdHealth and a private care physician to align incentives. We've even utilized a private care physician who allowed us to pay in Bitcoin for her services for a number of years. I think this is the model. Doctors accepting hard censorship resistant money for the healthcare and advice they provide. Instead of working for a corporation looking to push pharmaceutical products on their patients so they can bolster their bottom line, work directly with patients who will pay in bitcoin, which will appreciate in value over time.
I had a lengthy discussion with Dr. Jack Kruse on the podcast earlier today discussing these topic and more. It will be released on Thursday and I highly recommend you freaks check it out once it is published. Make sure you subscribe so you don't miss it.
How the "Exorbitant Privilege" of the Dollar is Undermining Our Manufacturing Base
In my conversation with Lyn Alden, we explored America's fundamental economic contradiction. As Lyn expertly explained, maintaining the dollar's reserve currency status while attempting to reshore manufacturing presents a near-impossible challenge - what economists call Triffin's Dilemma. The world's appetite for dollars gives Americans tremendous purchasing power but simultaneously hollows out our industrial base. The overvalued dollar makes our exports less competitive, especially for lower-margin manufacturing, while our imports remain artificially strong.
"Having the reserve currency does come with a bunch of benefits, historically called an exorbitant privilege, but then it has certain costs to maintain it." - Lyn Alden
This dilemma forces America to run persistent trade deficits, as this is how dollars flow to the world. For over four decades, these deficits have accumulated, creating massive economic imbalances that can't be quickly reversed. The Trump administration's attempts to address this through tariffs showcase how difficult rebalancing has become. As Lyn warned, even if we successfully pivot toward reshoring manufacturing, we'll face difficult trade-offs: potentially giving up some reserve currency benefits to rebuild our industrial foundation. This isn't just economic theory - it's the restructuring challenge that will define America's economic future.
Check out the full podcast here for more on China's manufacturing dominance, the role of Bitcoin in monetary transitions, and energy production as the foundation for future industrial power.
Headlines of the Day
Coinbase to replace Discover in S\&P 500 on May 19 - via X
Mallers promises no rehypothecation in Strike Bitcoin loans - via X
Get our new STACK SATS hat - via tftcmerch.io
Missouri passes HB 594, eliminates Bitcoin capital gains tax - via X
The 2025 Bitcoin Policy Summit is set for June 25thâand it couldnât come at a more important time. The Bitcoin industry is at a pivotal moment in Washington, with initiatives like the Strategic Bitcoin Reserve gaining rapid traction. Whether youâre a builder, advocate, academic, or policymakerâwe want you at the table. Join us in DC to help define the future of freedom, money & innovation in the 21st century.
Ten31, the largest bitcoin-focused investor, has deployed 144,264 sats | $150.00M across 30+ companies through three funds. I am a Managing Partner at Ten31 and am very proud of the work we are doing. Learn more at ten31.vc/invest.
Final thought...
The 100+ degree days have returned to Austin, TX. Not mad about it... yet.
Get this newsletter sent to your inbox daily: https://www.tftc.io/bitcoin-brief/
Subscribe to our YouTube channels and follow us on Nostr and X:
-
@ b99efe77:f3de3616
2025-05-14 16:25:37Def template
1
petrinet ;start () -> greenLight1 redLight2 ;toRed1 greenLight1 -> queue redLight1 ;toGreen2 redLight2 queue -> greenLight2 ;toGreen1 queue redLight1 -> greenLight1 ;toRed2 greenLight2 -> redLight2 queue ;stop redLight1 queue redLight2 -> ()