-
@ 3f770d65:7a745b24
2025-05-19 18:09:52šļø Monday, May 26 ā Bitcoin Golf Championship & Kickoff Party
Location: Las Vegas, Nevada\ Event: 2nd Annual Bitcoin Golf Championship & Kick Off Party"\ Where: Bali Hai Golf Clubhouse, 5160 S Las Vegas Blvd, Las Vegas, NV 89119\ šļø Get Tickets!
Details:
-
The week tees off in style with the Bitcoin Golf Championship. Swing clubs by day and swing to music by night.
-
Live performances from Nostr-powered acts courtesy of Tunestr, including Ainsley Costello and others.
-
Stop by the Purple Pill Booth hosted by Derek and Tanja, who will be on-boarding golfers and attendees to the decentralized social future with Nostr.
š¬ May 27ā29 ā Bitcoin 2025 Conference at the Las Vegas Convention Center
Location: The Venetian Resort\ Main Attraction for Nostr Fans: The Nostr Lounge\ When: All day, Tuesday through Thursday\ Where: Right outside the Open Source Stage\ šļø Get Tickets!
Come chill at the Nostr Lounge, your home base for all things decentralized social. With seating for \~50, comfy couches, high-tops, and good vibes, itās the perfect space to meet developers, community leaders, and curious newcomers building the future of censorship-resistant communication.
Bonus: Right across the aisle, youāll find Shopstr, a decentralized marketplace app built on Nostr. Stop by their booth to explore how peer-to-peer commerce works in a truly open ecosystem.
Daily Highlights at the Lounge:
-
āļø Hang out casually or sit down for a deeper conversation about the Nostr protocol
-
š§ 1:1 demos from app teams
-
šļø Merch available onsite
-
š§ Impromptu lightning talks
-
š¤ Scheduled Meetups (details below)
šÆ Nostr Lounge Meetups
Wednesday, May 28 @ 1:00 PM
- Damus Meetup: Come meet the team behind Damus, the OG Nostr app for iOS that helped kickstart the social revolution. They'll also be showcasing their new cross-platform app, Notedeck, designed for a more unified Nostr experience across devices. Grab some merch, get a demo, and connect directly with the developers.
Thursday, May 29 @ 1:00 PM
- Primal Meetup: Dive into Primal, the slickest Nostr experience available on web, Android, and iOS. With a built-in wallet, zapping your favorite creators and friends has never been easier. The team will be on-site for hands-on demos, Q\&A, merch giveaways, and deeper discussions on building the social layer of Bitcoin.
šļø Nostr Talks at Bitcoin 2025
If you want to hear from the minds building decentralized social, make sure you attend these two official conference sessions:
1. FROSTR Workshop: Multisig Nostr Signing
-
š Time: 11:30 AM ā 12:00 PM
-
š Date: Wednesday, May 28
-
š Location: Developer Zone
-
š¤ Speaker: nostr:nprofile1qy2hwumn8ghj7etyv4hzumn0wd68ytnvv9hxgqgdwaehxw309ahx7uewd3hkcqpqs9etjgzjglwlaxdhsveq0qksxyh6xpdpn8ajh69ruetrug957r3qf4ggfm (Austin Kelsay) @ Voltage\ A deep-dive into FROST-based multisig key management for Nostr. Geared toward devs and power users interested in key security.
2. Panel: Decentralizing Social Media
-
š Time: 2:00 PM ā 2:30 PM
-
š Date: Thursday, May 29
-
š Location: Genesis Stage
-
šļø Moderator: nostr:nprofile1qyxhwumn8ghj7mn0wvhxcmmvqy08wumn8ghj7mn0wd68yttjv4kxz7fwv3jhyettwfhhxuewd4jsqgxnqajr23msx5malhhcz8paa2t0r70gfjpyncsqx56ztyj2nyyvlq00heps - Bitcoin Strategy @ Roxom TV
-
š„ Speakers:
-
nostr:nprofile1qyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcppemhxue69uhkummn9ekx7mp0qqsy2ga7trfetvd3j65m3jptqw9k39wtq2mg85xz2w542p5dhg06e5qmhlpep ā Early Bitcoin dev, CEO @ Sirius Business Ltd
-
nostr:nprofile1qy2hwumn8ghj7mn0wd68ytndv9kxjm3wdahxcqg5waehxw309ahx7um5wfekzarkvyhxuet5qqsw4v882mfjhq9u63j08kzyhqzqxqc8tgf740p4nxnk9jdv02u37ncdhu7e3 ā Analyst & Partner @ Ego Death Capital
Get the big-picture perspective on why decentralized social matters and how Nostr fits into the future of digital communication.
š NOS VEGAS Meetup & Afterparty
Date: Wednesday, May 28\ Time: 7:00 PM ā 1:00 AM\ Location: We All Scream Nightclub, 517 Fremont St., Las Vegas, NV 89101\ šļø Get Tickets!
What to Expect:
-
š¶ Live Music Stage ā Featuring Ainsley Costello, Sara Jade, Able James, Martin Groom, Bobby Shell, Jessie Lark, and other V4V artists
-
šŖ© DJ Party Deck ā With sets by nostr:nprofile1qy0hwumn8ghj7cmgdae82uewd45kketyd9kxwetj9e3k7mf6xs6rgqgcwaehxw309ahx7um5wgh85mm694ek2unk9ehhyecqyq7hpmq75krx2zsywntgtpz5yzwjyg2c7sreardcqmcp0m67xrnkwylzzk4 , nostr:nprofile1qy2hwumn8ghj7etyv4hzumn0wd68ytnvv9hxgqgkwaehxw309anx2etywvhxummnw3ezucnpdejqqg967faye3x6fxgnul77ej23l5aew8yj0x2e4a3tq2mkrgzrcvecfsk8xlu3 , and more DJs throwing down
-
š°ļø Live-streamed via Tunestr
-
š§ Nostr Education ā Talks by nostr:nprofile1qy88wumn8ghj7mn0wvhxcmmv9uq37amnwvaz7tmwdaehgu3dwfjkccte9ejx2un9ddex7umn9ekk2tcqyqlhwrt96wnkf2w9edgr4cfruchvwkv26q6asdhz4qg08pm6w3djg3c8m4j , nostr:nprofile1qy2hwumn8ghj7etyv4hzumn0wd68ytnvv9hxgqg7waehxw309anx2etywvhxummnw3ezucnpdejz7ur0wp6kcctjqqspywh6ulgc0w3k6mwum97m7jkvtxh0lcjr77p9jtlc7f0d27wlxpslwvhau , nostr:nprofile1qy88wumn8ghj7mn0wvhxcmmv9uq3vamnwvaz7tmwdaehgu3wd33xgetk9en82m30qqsgqke57uygxl0m8elstq26c4mq2erz3dvdtgxwswwvhdh0xcs04sc4u9p7d , nostr:nprofile1q9z8wumn8ghj7erzx3jkvmmzw4eny6tvw368wdt8da4kxamrdvek76mrwg6rwdngw94k67t3v36k77tev3kx7vn2xa5kjem9dp4hjepwd3hkxctvqyg8wumn8ghj7mn0wd68ytnhd9hx2qpqyaul8k059377u9lsu67de7y637w4jtgeuwcmh5n7788l6xnlnrgssuy4zk , nostr:nprofile1qy28wue69uhnzvpwxqhrqt33xgmn5dfsx5cqz9thwden5te0v4jx2m3wdehhxarj9ekxzmnyqqswavgevxe9gs43vwylumr7h656mu9vxmw4j6qkafc3nefphzpph8ssvcgf8 , and more.
-
š§¾ Vendors & Project Booths ā Explore new tools and services
-
š Onboarding Stations ā Learn how to use Nostr hands-on
-
š¦ Nostrich Flocking ā Meet your favorite nyms IRL
-
šø Three Full Bars ā Two floors of socializing overlooking vibrant Fremont Street
| | | | | ----------- | -------------------- | ------------------- | | Time | Name | Topic | | 7:30-7:50 | Derek | Nostr for Beginners | | 8:00-8:20 | Mark & Paul | Primal | | 8:30-8:50 | Terry | Damus | | 9:00-9:20 | OpenMike and Ainsley | V4V | | 09:30-09:50 | The Space | Space |
This is the after-party of the year for those who love freedom technology and decentralized social community. Donāt miss it.
Final Thoughts
Whether you're there to learn, network, party, or build, Bitcoin 2025 in Las Vegas has a packed week of Nostr-friendly programming. Be sure to catch all the events, visit the Nostr Lounge, and experience the growing decentralized social revolution.
š£ Find us. Flock with us. Purple pill someone.
-
-
@ a19caaa8:88985eaf
2025-05-05 02:55:57āćøć£ććÆļ¼twitteråµę„č ļ¼ć®ćć¤ć¼ćć nostr:nevent1qvzqqqqqqypzpq35r7yzkm4te5460u00jz4djcw0qa90zku7739qn7wj4ralhe4zqy28wumn8ghj7un9d3shjtnyv9kh2uewd9hsqg9cdxf7s7kg8kj70a4v5j94urz8kmel03d5a47tr4v6lx9umu3c95072732ć
āććć«ēµ”ćććć nostr:note1hr4m0d2k2cvv0yg5xtmpuma0hsxfpgcs2lxe7vlyhz30mfq8hf8qp8xmauć
āććć®ć²ćØćććØć nostr:nevent1qqsdt9p9un2lhsa8n27y7gnr640qdjl5n2sg0dh4kmxpqget9qsufngsvfslnć nostr:note14p9prp46utd3j6mpqwv46m3r7u7cz6tah2v7tffjgledg5m4uy9qzfc2zfć
āęčč ę§ć®å©čØć nostr:nevent1qvzqqqqqqypzpujqe8p9zrpuv0f4ykk3rmgnqa6p6r0lan0t8ewd0ksj89kqcz5xqqst8w0773wxnkl8sn94tvmd3razcvms0kxjwe00rvgazp9ljjlv0wq0krtvtć nostr:nevent1qvzqqqqqqypzpujqe8p9zrpuv0f4ykk3rmgnqa6p6r0lan0t8ewd0ksj89kqcz5xqqsxchzm7s7vn8a82q40yss3a84583chvd9szl9qc3w5ud7pr9ugengcgt9qxć
āććć nostr:nevent1qqsp2rxvpax6ks45tuzhzlq94hq6qtm47w69z8p5wepgq9u4txaw88s554jkd
-
@ c1831fbe:de4b39bf
2025-05-17 09:57:04What follows is my best effort to recall the details of an arguably supernatural encounter I experienced almost sixty years ago. I've told this story many times before, and while my recollection may not be perfect in every detail, my account is real and substantively factual.
It was early one long ago morning, in that twilit between-time shortly before dawn. As I dangled precariously in a quasi-aware state, hovering on the knife edge between wakefulness and sleep, I was transported in a dream to another place and time. Was it the Mediterranean coast? Perhaps ancient Greece?
In my mind's eye, I found myself climbing a rather steep, rocky hillside overlooking a sparkling bright blue sea. Ahead of me, and slightly higher, was what appeared to be a young shepherd boy, leading me ever higher up the hill.
As we wove our way upward,
skirting rocky outcroppings and zig-zagging because of the steepness of the slope, I heard the boy chanting:
"Ata, Ata, Archontos, Ata, Ata, Echousi, Ata, Ata, Archousi"
He kept repeating the mantra, over and over:
"Ata, Ata, Archontos, Ata, Ata, Echousi, Ata, Ata, Archousi"
\~ \~ \~
"Ata, Ata, Archontos, Ata, Ata, Echousi, Ata, Ata, Archousi"
I listened for a few cycles, and then took up the chant myself. After several attempts, when at last I got it right, the shepherd boy turned, looking back at me and smiling broadly to signal that I had finally mastered the cadence and the words.
Then I awoke.
Because my dream had been so vivid and unusual, I immediately found a pencil and paper to write down the chant phonetically before I could forget it.
A few days passed.
Life was busy. Then I remembered my friend in grad school, studying biblical Greek. That weekend, I went and hung out with him while he worked his night job at the college heating plant. Between his rounds inspecting and managing the steam boilers keeping students from freezing to death in the Arctic Midwest winter, I told him about my strange dream.
Pulling out an exhaustive Greek lexicon, one by one, my knowledgeable friend looked up the words from my dream, interpreting each according to its verb conjugation, tense, and mood.
"Ata, Ata" had no discernible meaning; we soon concluded that it was probably just meaningless vocables, added to give the chant rhythm and substance. My friend moved on to the first recognizable word of the chant...
"Archontos" - "They are ruled."
OK, so far, so good. He checked the next word:
"Echousi" - "They shed blood."
Hmmmm... This chant is beginning to appear to be more than random sounds.
"Archousi" - "They rule."
At this point, I almost fell out of my chair in shock. Far from being a meaningless chant, this cycleārepeating again and againāis the seemingly never-ending story of the entirety of human history...
"They Are Ruled, They Shed Blood, They Rule."
\~ \~ \~
"They Are Ruled, They Shed Blood, They Rule."
This concise mantra perfectly captures the endlessly repeating cycle of oppression, revolt, and revolution that always leaves us with a fresh set of oppressors all too ready to replace the last.
Who will rescue us?
Who will redeem us from this endless tedious cycle into which we have been born?
A long lifetime of study and reflection has persuaded me that this deadly cycle can and ultimately will be broken. If we follow the teachings of Jesus; if we love one another and live together in voluntary, local societies, serving each other; I am persuaded that we can break free of this desperately destructive cycle of endlessly seeking to dominate one another. It's past time for us to enter into a mutually beneficial life in the Kingdom of our Creator-God Jesus, the most authentically benevolent King the universe has ever known.
stories #politics #Christianity #supernatural #strange
-
@ cae03c48:2a7d6671
2025-05-19 18:29:07Bitcoin Magazine
Bitcoin Records Highest Weekly Close Above $106KBitcoin has officially recorded its highest-ever weekly candle close, finishing the week at $106,516. The milestone was achieved on Sunday evening, marking a notable moment in Bitcoinās ongoing price history and underscoring growing institutional and retail interest.
JUST IN: $107,000 #Bitcoin
pic.twitter.com/Xt1JLm0Ke6
ā Bitcoin Magazine (@BitcoinMagazine) May 19, 2025
This weekly close sets a new benchmark for BTCās price performance and positions the asset in a historically rare range. As of Monday, Bitcoin is trading at $102,924, reflecting typical price movement following a new high as markets adjust to key levels.Ā
Historical data helps illustrate the significance of this moment. According to an analysis shared by on-chain researcher Dan, Bitcoin has closed above $106,439 only onceāthis weekāaccounting for just 0.02% of its entire trading history. Closures above $100,000 have occurred in only 40 days total. Even levels like $75,000 and $50,000 remain relatively uncommon in Bitcoinās lifespan, appearing on just 181 and 586 days, respectively.
ā Dan (@robustus) May 19, 2025
This data highlights how current prices place Bitcoin in a historically narrow range of time ā a reflection of the long-term upward trend of the asset over the past decade. For market participants, this type of price action often serves as an indicator of continued momentum and interest in Bitcoinās role as a digital store of value.Ā
The broader Bitcoin ecosystem continues to show strength, with on-chain metrics reflecting growing user engagement and long-term holder confidence. Notably, activity on the Bitcoin network remains elevated, with transaction volumes and address growth signaling continued adoption. Analysts are closely watching inflows into Bitcoin-focused ETFs and the behavior of long-term holders, both of which are key indicators of sustained interest and belief in Bitcoinās long-term value.
bitcoin just had its all-time high weekly candle close at $106,500 pic.twitter.com/FuqqptHEmA
ā Alex Thorn (@intangiblecoins) May 19, 2025
Some traders are watching the $100,000 level closely as a key psychological and technical zone. Bitcoinās ability to maintain this level following a record weekly close could be important in setting the tone for the weeks ahead.Ā
While near-term price movements are always part of market dynamics, the latest close represents a milestone in Bitcoinās history. It reaffirms the assetās resilience and ongoing relevance in the global financial landscape.
This post Bitcoin Records Highest Weekly Close Above $106K first appeared on Bitcoin Magazine and is written by Jenna Montgomery.
-
@ b83a28b7:35919450
2025-05-16 19:26:56This article was originally part of the sermon of Plebchain Radio Episode 111 (May 2, 2025) that nostr:nprofile1qyxhwumn8ghj7mn0wvhxcmmvqyg8wumn8ghj7mn0wd68ytnvv9hxgqpqtvqc82mv8cezhax5r34n4muc2c4pgjz8kaye2smj032nngg52clq7fgefr and I did with nostr:nprofile1qythwumn8ghj7ct5d3shxtnwdaehgu3wd3skuep0qyt8wumn8ghj7ct4w35zumn0wd68yvfwvdhk6tcqyzx4h2fv3n9r6hrnjtcrjw43t0g0cmmrgvjmg525rc8hexkxc0kd2rhtk62 and nostr:nprofile1qyxhwumn8ghj7mn0wvhxcmmvqyg8wumn8ghj7mn0wd68ytnvv9hxgqpq4wxtsrj7g2jugh70pfkzjln43vgn4p7655pgky9j9w9d75u465pqahkzd0 of the nostr:nprofile1qythwumn8ghj7ct5d3shxtnwdaehgu3wd3skuep0qyt8wumn8ghj7etyv4hzumn0wd68ytnvv9hxgtcqyqwfvwrccp4j2xsuuvkwg0y6a20637t6f4cc5zzjkx030dkztt7t5hydajn
Listen to the full episode here:
<<https://fountain.fm/episode/Ln9Ej0zCZ5dEwfo8w2Ho>>
Bitcoin has always been a narrative revolution disguised as code. White paper, cypherpunk lore, pizzaāday legends - every block is a paragraph in the worldās most relentless epic. But code alone rarely converts the skeptic; itās the campāfire myth that slips past the prefrontal cortex and shakes hands with the limbic system. People donāt adopt protocols first - they fall in love with protagonists.
Early adopters heard the whiteāpaper hymn, but most folks need characters first: a pizzaāday dreamer; a mother in a small country, crushed by the cost of remittance; a Warsaw street vendor swapping zÅoty for sats. When their arcs land, the brain releases a neurochemical OP_RETURN which says, āI belong in this plot.āāÆThatās the sly roundabout orange pill: conviction smuggled inside catharsis.
Thatās why, from 22ā25āÆMay in Warsawās Kinoteka, the BitcoināÆFilmāÆFest is loading its reels with rebellion. Each documentary, drama, and animated rabbitāhole is a stealth wallet, zipping conviction straight into the feels of anyone still clasped within the cold claw of fiat. You come for the plot, you leave checking block heights.
Here's the clip of the sermon from the episode:
nostr:nevent1qvzqqqqqqypzpwp69zm7fewjp0vkp306adnzt7249ytxhz7mq3w5yc629u6er9zsqqsy43fwz8es2wnn65rh0udc05tumdnx5xagvzd88ptncspmesdqhygcrvpf2
-
@ 82a7a1ff:2c1e9cdf
2025-05-19 18:18:31Whatever
-
@ f11e91c5:59a0b04a
2025-04-30 07:52:21!!!2022-07-07ć«ęøćććčØäŗć§ćć
ęå·é貨ćØćć§ćå¼å½å£²ć£ć¦ć¾ć 11:30ć14:00ćććć§ćć£ć¦ć¾ć
āä½ę ęØęę„ć»ę±äŗ¬é½ęøč°·åŗå®ē°å·ēŗ41 ļ¼ć¢ćććæćÆć¼ć®äøććøćļ¼
āćå¤ę®µ
Monacoin 3.9mona
Bitzeny 390zny
Bitcoin 3900sats (#lightningNetwork)
Ethereum 0.0039Ether(#zkSync)
39=thank you. ļ¼åćåŗęŗć«ćć¦ć¾ććļ¼
ęčæćÆé±ć«äøåć«ćŖćć¾ććć ä»ć®ę„ćÆćććć³ć«ć¼ć®ē¾å “ćę¢ćććč²ć ćć¦ć¾ćć ę±äŗ¬é½å ć§å¹³ę„ć©ć³ćåŗåŗåŗę„ćććŖå “ęćććć°ćć²ćé£ēµ”ćļ¼
åēćÆNFCćæć°ć§ćć ć¹ććć«ć¦ć©ć¬ćććććć°ćæćććć¦3900satsć§ę±ŗęøåŗę„ć¾ćć ę£ē“ćććŖęŖććęęøćć®NFCćæć°ćŖćć¦ēµ¶åƾć«ćććć³ć¤ćć¼ćÆč§¦ććććē”ćć ćććŖćØęćć¾ćććććć§ćčÆććć ććØććć”ćć»ć¼ćøć§ćć
ä»ć¾ć§btcpayć®posć§ćććéåŗ¦ćčæ½ę±ćć¦ććć«å¤ę“ćć¾ććć ćć¾ć«äøęććććŖćć§ććććććęøć POSåŗćć®ć§ęø©ććē®ć§ćććććé”ććć¾ćć
ćć¼ćć建ć¦ććę±ŗęøćććć§1幓ēµć”ć¾ććć ęčæćå°ććć¤ćć¼ćć建ć¦ćę¹ćå¢ćć¦ććæććć§ę¬å½åćć§ććUmbrel 大ä½ć®äŗŗćć«ć¼ćć£ć³ć°ć«ęę¢ć«ęćć®ćč¦ć¤ć¤ å„„ććć«åäøåŗ§ććŖććč²»ēØćę»åŗććå¼±å°ć®ē§ćÆę±ŗęøć®å©ä¾æę§ćå Øéć§ęÆćåćććē”ćć®ć§åæę“ćććććé”ććć¾ćć
ćć㦠ććć¦čØćć®ć§ććć°ćć«ć¼ćć£ć³ć°ć愽ććć§ććć© ććÆćę¬å½ć®ęå³ć§ć®å³ęę±ŗęøćēøęćéøćć§ćć£ćć«ćē¹ćć愽ćććććććØćä¼ććććć£ļ¼ļ¼ ę±ŗęøćåćå „ććŖććØåćććŖćęć§ćć ęæčŖććććŖćęē¹ć§ē»ęēć§ćć
QRć§ććæććć§ćéé”ęå®ć§ćå „åć§ć ććććććć«ćÆåŗę„ć¦ćć¾ććé²åćęćććę©ćć®ć§1ēŖå©ēØć®å¤ćpaypayć®ęę°ęļ¼äŗę„č å“ć®ćļ¼ćčććććććć³ć¤ć³åććććŖćļ¼ćØå«ć³ćććŖćć ććććÆćēØå¶é¢ćä¾”ę ¼ć®å¤åļ¼ćć”ćÆBTCåŗå®ć ćć©ćļ¼ć¦ć©ć¬ććć®ęä½ćę®åēćčćććØć¾ćé£ććęććććć§ćććć
ććć§ćē¶ē¶ēć«ę²¢å±±ć®äŗŗćč²ććŖę“»åććć¦ćć®ć§ē§ćä½ćåŗę„ćććØćććć° ä»å¾ćå„„ććć«åäøåŗ§ććŖććé å¼µć£ć¦č”ććććØęćć¾ćć
(Originally posted 2022-07-07)
I sell bento lunches for cryptocurrency. Weāre open roughly 11:30 a.m. ā 2:00 p.m. Address Thursdays ā 41 Udagawa-chÅ, Shibuya-ku, Tokyo (around the base of Abema Tower)
Prices Coin Price Note Monacoin 3.9 MONA
Bitzeny 390 ZNY Bitcoin 3,900 sats (Lightning Network)
Ethereum 0.0039 ETH (zkSync) ā39ā sounds like āthank youā in Japanese. Prices arenāt pegged to yen.These days Iām open only once a week. On other days Iām out scouting new spots for the kitchen-car. If you know weekday-lunch locations inside Tokyo where I could set up, please let me know!
The photo shows an NFC tag. If your phone has a Lightning wallet, just tap and pay 3,900 sats. I admit this hand-written NFC tag looks shadyāany self-respecting Bitcoiner probably wouldnāt want to tap itābut the point is: even this works!
I used to run a BTCPay POS, but I switched to this setup for speed. Sometimes the tap payment fails; if that happens I reluctantly pull out the old POS. Thanks for your patience.
Itās been one year since I spun up a node and started accepting Lightning payments. So many people are now running their own nodesāUmbrel really is amazing. While the big players bravely chase routing fees, Iām a tiny operator scraping together funds while begging my wife for forgiveness, so Iām all-in on maximising payment convenience. Your support means a lot!
If I may add: routing is fun, but instant, trust-minimised payments and the thrill of choosing whom to open channels with are just as exciting. Youāll only understand once you start accepting payments yourselfāzero-confirmation settlement really is revolutionary.
QR codes, NFC taps, fixed amounts, manual entry⦠the possibilities keep multiplying, and the pace of innovation is scary fast. When I compare it to the merchant fees on Japanās most-used service, PayPay, I want to shout: āBitcoin is incredible!ā Sure, taxes, price volatility (my shop is BTC-denominated, though), wallet UX, and adoption hurdles are still pain points.
Even so, lots of people keep building cool stuff, so Iāll keep doing what I canāstill on my knees to my wife, but moving forward!
-
@ 04c915da:3dfbecc9
2025-05-16 18:06:46Bitcoin has always been rooted in freedom and resistance to authority. I get that many of you are conflicted about the US Government stacking but by design we cannot stop anyone from using bitcoin. Many have asked me for my thoughts on the matter, so letās rip it.
Concern
One of the most glaring issues with the strategic bitcoin reserve is its foundation, built on stolen bitcoin. For those of us who value private property this is an obvious betrayal of our core principles. Rather than proof of work, the bitcoin that seeds this reserve has been taken by force. The US Government should return the bitcoin stolen from Bitfinex and the Silk Road.
Using stolen bitcoin for the reserve creates a perverse incentive. If governments see bitcoin as a valuable asset, they will ramp up efforts to confiscate more bitcoin. The precedent is a major concern, and I stand strongly against it, but it should be also noted that governments were already seizing coin before the reserve so this is not really a change in policy.
Ideally all seized bitcoin should be burned, by law. This would align incentives properly and make it less likely for the government to actively increase coin seizures. Due to the truly scarce properties of bitcoin, all burned bitcoin helps existing holders through increased purchasing power regardless. This change would be unlikely but those of us in policy circles should push for it regardless. It would be best case scenario for American bitcoiners and would create a strong foundation for the next century of American leadership.
Optimism
The entire point of bitcoin is that we can spend or save it without permission. That said, it is a massive benefit to not have one of the strongest governments in human history actively trying to ruin our lives.
Since the beginning, bitcoiners have faced horrible regulatory trends. KYC, surveillance, and legal cases have made using bitcoin and building bitcoin businesses incredibly difficult. It is incredibly important to note that over the past year that trend has reversed for the first time in a decade. A strategic bitcoin reserve is a key driver of this shift. By holding bitcoin, the strongest government in the world has signaled that it is not just a fringe technology but rather truly valuable, legitimate, and worth stacking.
This alignment of incentives changes everything. The US Government stacking proves bitcoinās worth. The resulting purchasing power appreciation helps all of us who are holding coin and as bitcoin succeeds our government receives direct benefit. A beautiful positive feedback loop.
Realism
We are trending in the right direction. A strategic bitcoin reserve is a sign that the state sees bitcoin as an asset worth embracing rather than destroying. That said, there is a lot of work left to be done. We cannot be lulled into complacency, the time to push forward is now, and we cannot take our foot off the gas. We have a seat at the table for the first time ever. Let's make it worth it.
We must protect the right to free usage of bitcoin and other digital technologies. Freedom in the digital age must be taken and defended, through both technical and political avenues. Multiple privacy focused developers are facing long jail sentences for building tools that protect our freedom. These cases are not just legal battles. They are attacks on the soul of bitcoin. We need to rally behind them, fight for their freedom, and ensure the ethos of bitcoin survives this new era of government interest. The strategic reserve is a step in the right direction, but it is up to us to hold the line and shape the future.
-
@ ec42c765:328c0600
2025-02-05 23:45:09test
test
-
@ 04c915da:3dfbecc9
2025-05-16 17:59:23Recently we have seen a wave of high profile X accounts hacked. These attacks have exposed the fragility of the status quo security model used by modern social media platforms like X. Many users have asked if nostr fixes this, so lets dive in. How do these types of attacks translate into the world of nostr apps? For clarity, I will use Xās security model as representative of most big tech social platforms and compare it to nostr.
The Status Quo
On X, you never have full control of your account. Ultimately to use it requires permission from the company. They can suspend your account or limit your distribution. Theoretically they can even post from your account at will. An X account is tied to an email and password. Users can also opt into two factor authentication, which adds an extra layer of protection, a login code generated by an app. In theory, this setup works well, but it places a heavy burden on users. You need to create a strong, unique password and safeguard it. You also need to ensure your email account and phone number remain secure, as attackers can exploit these to reset your credentials and take over your account. Even if you do everything responsibly, there is another weak link in X infrastructure itself. The platformās infrastructure allows accounts to be reset through its backend. This could happen maliciously by an employee or through an external attacker who compromises Xās backend. When an account is compromised, the legitimate user often gets locked out, unable to post or regain control without contacting Xās support team. That process can be slow, frustrating, and sometimes fruitless if support denies the request or cannot verify your identity. Often times support will require users to provide identification info in order to regain access, which represents a privacy risk. The centralized nature of X means you are ultimately at the mercy of the companyās systems and staff.
Nostr Requires Responsibility
Nostr flips this model radically. Users do not need permission from a company to access their account, they can generate as many accounts as they want, and cannot be easily censored. The key tradeoff here is that users have to take complete responsibility for their security. Instead of relying on a username, password, and corporate servers, nostr uses a private key as the sole credential for your account. Users generate this key and it is their responsibility to keep it safe. As long as you have your key, you can post. If someone else gets it, they can post too. It is that simple. This design has strong implications. Unlike X, there is no backend reset option. If your key is compromised or lost, there is no customer support to call. In a compromise scenario, both you and the attacker can post from the account simultaneously. Neither can lock the other out, since nostr relays simply accept whatever is signed with a valid key.
The benefit? No reliance on proprietary corporate infrastructure.. The negative? Security rests entirely on how well you protect your key.
Future Nostr Security Improvements
For many users, nostrās standard security model, storing a private key on a phone with an encrypted cloud backup, will likely be sufficient. It is simple and reasonably secure. That said, nostrās strength lies in its flexibility as an open protocol. Users will be able to choose between a range of security models, balancing convenience and protection based on need.
One promising option is a web of trust model for key rotation. Imagine pre-selecting a group of trusted friends. If your account is compromised, these people could collectively sign an event announcing the compromise to the network and designate a new key as your legitimate one. Apps could handle this process seamlessly in the background, notifying followers of the switch without much user interaction. This could become a popular choice for average users, but it is not without tradeoffs. It requires trust in your chosen web of trust, which might not suit power users or large organizations. It also has the issue that some apps may not recognize the key rotation properly and followers might get confused about which account is āreal.ā
For those needing higher security, there is the option of multisig using FROST (Flexible Round-Optimized Schnorr Threshold). In this setup, multiple keys must sign off on every action, including posting and updating a profile. A hacker with just one key could not do anything. This is likely overkill for most users due to complexity and inconvenience, but it could be a game changer for large organizations, companies, and governments. Imagine the White House nostr account requiring signatures from multiple people before a post goes live, that would be much more secure than the status quo big tech model.
Another option are hardware signers, similar to bitcoin hardware wallets. Private keys are kept on secure, offline devices, separate from the internet connected phone or computer you use to broadcast events. This drastically reduces the risk of remote hacks, as private keys never touches the internet. It can be used in combination with multisig setups for extra protection. This setup is much less convenient and probably overkill for most but could be ideal for governments, companies, or other high profile accounts.
Nostrās security model is not perfect but is robust and versatile. Ultimately users are in control and security is their responsibility. Apps will give users multiple options to choose from and users will choose what best fits their need.
-
@ ec42c765:328c0600
2025-02-05 23:43:35test
-
@ 04c915da:3dfbecc9
2025-05-16 17:51:54In much of the world, it is incredibly difficult to access U.S. dollars. Local currencies are often poorly managed and riddled with corruption. Billions of people demand a more reliable alternative. While the dollar has its own issues of corruption and mismanagement, it is widely regarded as superior to the fiat currencies it competes with globally. As a result, Tether has found massive success providing low cost, low friction access to dollars. Tether claims 400 million total users, is on track to add 200 million more this year, processes 8.1 million transactions daily, and facilitates $29 billion in daily transfers. Furthermore, their estimates suggest nearly 40% of users rely on it as a savings tool rather than just a transactional currency.
Tetherās rise has made the company a financial juggernaut. Last year alone, Tether raked in over $13 billion in profit, with a lean team of less than 100 employees. Their business model is elegantly simple: hold U.S. Treasuries and collect the interest. With over $113 billion in Treasuries, Tether has turned a straightforward concept into a profit machine.
Tetherās success has resulted in many competitors eager to claim a piece of the pie. This has triggered a massive venture capital grift cycle in USD tokens, with countless projects vying to dethrone Tether. Due to Tetherās entrenched network effect, these challengers face an uphill battle with little realistic chance of success. Most educated participants in the space likely recognize this reality but seem content to perpetuate the grift, hoping to cash out by dumping their equity positions on unsuspecting buyers before they realize the reality of the situation.
Historically, Tetherās greatest vulnerability has been U.S. government intervention. For over a decade, the company operated offshore with few allies in the U.S. establishment, making it a major target for regulatory action. That dynamic has shifted recently and Tether has seized the opportunity. By actively courting U.S. government support, Tether has fortified their position. This strategic move will likely cement their status as the dominant USD token for years to come.
While undeniably a great tool for the millions of users that rely on it, Tether is not without flaws. As a centralized, trusted third party, it holds the power to freeze or seize funds at its discretion. Corporate mismanagement or deliberate malpractice could also lead to massive losses at scale. In their goal of mitigating regulatory risk, Tether has deepened ties with law enforcement, mirroring some of the concerns of potential central bank digital currencies. In practice, Tether operates as a corporate CBDC alternative, collaborating with authorities to surveil and seize funds. The company proudly touts partnerships with leading surveillance firms and its own data reveals cooperation in over 1,000 law enforcement cases, with more than $2.5 billion in funds frozen.
The global demand for Tether is undeniable and the companyās profitability reflects its unrivaled success. Tether is owned and operated by bitcoiners and will likely continue to push forward strategic goals that help the movement as a whole. Recent efforts to mitigate the threat of U.S. government enforcement will likely solidify their network effect and stifle meaningful adoption of rival USD tokens or CBDCs. Yet, for all their achievements, Tether is simply a worse form of money than bitcoin. Tether requires trust in a centralized entity, while bitcoin can be saved or spent without permission. Furthermore, Tether is tied to the value of the US Dollar which is designed to lose purchasing power over time, while bitcoin, as a truly scarce asset, is designed to increase in purchasing power with adoption. As people awaken to the risks of Tetherās control, and the benefits bitcoin provides, bitcoin adoption will likely surpass it.
-
@ ec42c765:328c0600
2025-02-05 23:38:12ć«ć¹ćæć ēµµęåćØćÆ
ä»»ęć®ćŖćŖćøćć«ē»åćēµµęåć®ććć«ęäøć«ęæå „ć§ććę©č½ć§ćć
ć¾ćććŖć¢ćÆć·ć§ć³ļ¼Twitterć® ććć ć®ćććŖę©č½ļ¼ć«ćć«ć¹ćæć ēµµęåć使ćć¾ćć
ć«ć¹ćæć ēµµęåć®åƾåæē¶ę³ļ¼2025/02/06ļ¼
ć«ć¹ćæć ēµµęåć使ćććć«ćÆć«ć¹ćæć ēµµęåć«åƾåæćććÆć©ć¤ć¢ć³ćć使ćåæ č¦ćććć¾ćć
ā»č”ØćÆäøä¾ć§ćććÆć©ć¤ć¢ć³ććÆä»ć«ćććććććć¾ćć
使ć£ć¦ćććÆć©ć¤ć¢ć³ćć対åæćć¦ććŖćå “åćÆććÆć©ć¤ć¢ć³ććå¤ę“ććć対åæććć¾ć§å¾ ć¤ćéēŗč ć«č¦ęćéćļ¼ć¾ććÆčŖåć§å®č£ ććļ¼ćŖć©ćć¾ćććć
対åæćÆć©ć¤ć¢ć³ć
ććć§ćÆnostterć使ć£ć¦čŖ¬ęćć¦ććć¾ćć
ęŗå
ć«ć¹ćæć ēµµęåć使ćććć®ęŗåć§ćć
- NostrćØćÆć¹ćć³ć·ć§ć³ļ¼NIP-07ļ¼ćå°å „ćć
- 使ćććć«ć¹ćæć ēµµęåććŖć¹ćć«ē»é²ćć
NostrćØćÆć¹ćć³ć·ć§ć³ļ¼NIP-07ļ¼ćå°å „ćć
NostrćØćÆć¹ćć³ć·ć§ć³ćÆä½æćććć«ć¹ćæć ēµµęåćē»é²ććęć«åæ č¦ć«ćŖćć¾ćć
ć¾ććē°å¢ļ¼ćć½ć³ć³ćiPhonećandroidćŖć©ļ¼ć«ćć£ć¦å°å „ę¹ę³ćéćć¾ćć
NostrćØćÆć¹ćć³ć·ć§ć³ćå°å „ćć端ę«ćÆćå®éć«Nostrćé²č¦§ćć端ę«ćØéć£ć¦ćę§ćć¾ććļ¼ćŖć¹ćē»é²ćÆPCćNostré²č¦§ćÆiPhonećŖć©ļ¼ć
NostrćØćÆć¹ćć³ć·ć§ć³ļ¼NIP-07ļ¼ć®å°å „ę¹ę³ćÆä»„äøć®ćć¼ćøćåē §ćć¦ćć ććć
å°ćé¢åć§ććććććå°å „ćć¦ćććØNosträøć®ę§ć ćŖå “é¢ć§å½¹ē«ć¤ć®ć§ććåæ«é©ć«ćŖćć¾ćć
使ćććć«ć¹ćæć ēµµęåććŖć¹ćć«ē»é²ćć
仄äøć®ćµć¤ćć§č”ćć¾ćć
å³äøć®Get startedććNostrćØćÆć¹ćć³ć·ć§ć³ć§ćć°ć¤ć³ćć¦ćć ććć
ä¾ćØćć¦ä»„äøć®ć«ć¹ćæć ēµµęåćå°å „ćć¦ćæć¾ćć
å®éććēµµęåćå°ćŖć蔨示ćććććØćććć¾ćććå¤ćē¶ę ć®ćć¼ćæćåå¾ćć¦ćć¾ć£ć¦ććććć§ćććć®å “åćÆćć©ć¦ć¶ć®ę“ę°ććæć³ćę¼ćć¦ćć ććć
generalJP | ć«ć¹ćæć ēµµęå
- å³å“ć®OptionsććBookmarkćéøę
ććć§ć«ć¹ćæć ēµµęåć使ēØććććć®ćŖć¹ćć«ē»é²ć§ćć¾ćć
ć«ć¹ćæć ēµµęåć使ēØćć
ä¾ćØćć¦ćć©ć¦ć¶ćć使ćććÆć©ć¤ć¢ć³ć nostter ćć使ēØćć¦ćæć¾ćć
nostterć«NostrćØćÆć¹ćć³ć·ć§ć³ć§ćć°ć¤ć³ćććććÆē§åÆéµćå „ćć¦ćć°ć¤ć³ćć¦ćć ććć
ęē« äøć«ä½æēØ
- ę稿ććæć³ćę¼ćć¦ę稿ć¦ć£ć³ćć¦ć蔨示
- 锚ć®ććæć³ćę¼ććēµµęåć¦ć£ć³ćć¦ć蔨示
- ļ¼ćæććę¼ććć«ć¹ćæć ēµµęåäøč¦§ć蔨示
- ć«ć¹ćæć ēµµęåćéøę
- : čØå·ć«ęć¾ććć¢ć«ćć”ćććć®ć·ć§ć¼ćć³ć¼ććØćć¦ęæå „ććć
ćć®ē¶ę ć§ę稿ćććØć«ć¹ćæć ēµµęåćØćć¦č”Øē¤ŗććć¾ćć
ć«ć¹ćæć ēµµęå対åæćÆć©ć¤ć¢ć³ćć使ć£ć¦ććä»ć¦ć¼ć¶ć¼ć«ćć«ć¹ćæć ēµµęåćØćć¦č”Øē¤ŗććć¾ćć
対åæćć¦ććŖććÆć©ć¤ć¢ć³ćć®å “åćć·ć§ć¼ćć³ć¼ćć®ć¾ć¾č”Øē¤ŗććć¾ćć
ć·ć§ć¼ćć³ć¼ććē“ę„å „åććććØć§ć«ć¹ćæć ēµµęåć®åč£ć蔨示ćććć®ć§ććććéøęććććØćć§ćć¾ćć
ćŖć¢ćÆć·ć§ć³ć«ä½æēØ
- ä»»ęć®ę稿ć®é”šć®ććæć³ćę¼ććēµµęåć¦ć£ć³ćć¦ć蔨示
- ļ¼ćæććę¼ććć«ć¹ćæć ēµµęåäøč¦§ć蔨示
- ć«ć¹ćæć ēµµęåćéøę
ć«ć¹ćæć ēµµęåćŖć¢ćÆć·ć§ć³ćéćććØćć§ćć¾ćć
ć«ć¹ćæć ēµµęåćę¢ć
å čæ°ććemojitoććć«ć¹ćæć ēµµęåćę¢ćć¾ćć
ä¾ćć°ä»»ęć®ć¦ć¼ć¶ć¼ć®ćć¼ćø emojito ććÆćØć¦ ććę¢ćććć emojito Browse all ććnostrå Øä½ć§ęčæä½ęćę“ę°ćććēµµęåćč¦ććć§ćć¾ćć
ć¾ćć仄äøć®ćŖć³ćÆćÆę„ę¬čŖåć¦ć¼ć¶ć¼ćä½ć£ćć«ć¹ćæć ēµµęåćéćććŖć¹ćć§ćļ¼2025/02/06ļ¼
ā»ę¼ććććććććć¾ćć
ę„ę¬ć¦ć¼ć¶ć¼ä½ ć«ć¹ćæć ēµµęå
åēµµęåć»ććć«ććOpen in emojitoć®ćŖć³ćÆććemojitoć«é£ć³ć使ēØćŖć¹ćć«čæ½å ć§ćć¾ćć
仄äøć§ćć
ꬔļ¼Nostrć®ć«ć¹ćæć ēµµęåć®ä½ćę¹
YakihonnećŖć³ćÆ Nostrć®ć«ć¹ćæć ēµµęåć®ä½ćę¹
NostrćŖć³ćÆ nostr:naddr1qqxnzdesxuunzv358ycrgveeqgswcsk8v4qck0deepdtluag3a9rh0jh2d0wh0w9g53qg8a9x2xqvqqrqsqqqa28r5psx3
ä»ę§
-
@ 04c915da:3dfbecc9
2025-05-16 17:12:05One of the most common criticisms leveled against nostr is the perceived lack of assurance when it comes to data storage. Critics argue that without a centralized authority guaranteeing that all data is preserved, important information will be lost. They also claim that running a relay will become prohibitively expensive. While there is truth to these concerns, they miss the mark. The genius of nostr lies in its flexibility, resilience, and the way it harnesses human incentives to ensure data availability in practice.
A nostr relay is simply a server that holds cryptographically verifiable signed data and makes it available to others. Relays are simple, flexible, open, and require no permission to run. Critics are right that operating a relay attempting to store all nostr data will be costly. What they miss is that most will not run all encompassing archive relays. Nostr does not rely on massive archive relays. Instead, anyone can run a relay and choose to store whatever subset of data they want. This keeps costs low and operations flexible, making relay operation accessible to all sorts of individuals and entities with varying use cases.
Critics are correct that there is no ironclad guarantee that every piece of data will always be available. Unlike bitcoin where data permanence is baked into the system at a steep cost, nostr does not promise that every random note or meme will be preserved forever. That said, in practice, any data perceived as valuable by someone will likely be stored and distributed by multiple entities. If something matters to someone, they will keep a signed copy.
Nostr is the Streisand Effect in protocol form. The Streisand effect is when an attempt to suppress information backfires, causing it to spread even further. With nostr, anyone can broadcast signed data, anyone can store it, and anyone can distribute it. Try to censor something important? Good luck. The moment it catches attention, it will be stored on relays across the globe, copied, and shared by those who find it worth keeping. Data deemed important will be replicated across servers by individuals acting in their own interest.
Nostrās distributed nature ensures that the system does not rely on a single point of failure or a corporate overlord. Instead, it leans on the collective will of its users. The result is a network where costs stay manageable, participation is open to all, and valuable verifiable data is stored and distributed forever.
-
@ 94215f42:7681f622
2025-05-16 08:18:52Value Creation at the Edge
The conversation around artificial intelligence has largely centered on the technology itself, the capabilities of large language models, the race for more parameters, and the competition between AI companies.
He with the most data / biggest model / biggest platform wins all.
As we're been exploring in recent "Good Stuff" podcasts, the true business model of AI may be much more straightforward. AI is after all a productivity tool with little technical moat, in fact the existence of AI coding and learning tools quickly chop away at this moat even quicker!.\ \ We believe that the it's about transforming traditional human heavy businesses by dramatically reducing operational costs while maintaining or increasing output.
AI is poised to create value not primarily for AI companies themselves, but for businesses that effectively implement AI to transform their operations, particularly small, local businesses that can become extraordinarily efficient through AI adoption.
The Value Shift: From AI Companies to AI-Enabled Traditional Businesses
A central insight from episode 1 of the podcast series, is that the value of AI isn't likely to accrue primarily to companies like OpenAI or other AI technology providers. Instead, the real winners will be traditional service businesses that can leverage AI to transform their operations and cost structures.
"I think we're gonna see this shift to traditional service businesses... that traditionally have pretty fixed low margins because of a dependency on language-heavy workflows that require a lot of humans as the medium of intelligence in the business."
The opportunity here is to use AI to manage the language dependency and shift the moments of intelligence, that currently exist in the heads of our staff, into software that can run 24x7 for fractions of a cost.\ \ The real limiting factor here is less a magic AGI, but instead detailed thinking and process redesign to move humans to the edge of the process. As it turns out if we think through what each person is doing in detail we see the specific decisions, outputs, moments of intelligence are actually quite constrained and can be replicated in LLM's if we break them down to a low enough level of fidelity and take each decisions one step at a time.\ \ The result? Businesses that have traditionally operated with fixed, low margins can potentially achieve "software-style margins" by dramatically reducing their operational expenses.
Transforming Traditional Service Businesses
We have developed three key heuristics for identifying businesses that could benefit most from AI transformation:
-
Language Intensity: Businesses where much of the work involves processing language (reading, writing, communicating). Language in, language out. If you are sat in a chair and typing all day, this could be you.
-
Labor Component: Where we see this language intensity so we find many people performing similar, standardized roles. For examples, if we have four people in the same role this is a big clue we have good process, checklists, role descriptions etc for how the work can be done in order to replicate work across multiple people.
-
Load in the Business: Taking these processes into account, what amount of the operational expense of the business do they represent? Where these language and labor-intensive operations represent a significant portion of the business cost, we can see there will be significant return.
Traditional service businesses that match these criteriaālegal firms, accounting practices, consulting agencies, contract engineering, design agencies and othersācould see dramatic transformations through AI implementation.
By automating these language-heavy processes, businesses can potentially reduce operational costs by 50-80% while maintaining similar levels of output.
The Power of Small
We believe that small businesses may have an inherent advantage in this transformation. While large enterprises face significant barriers to reducing their workforce (political pressure, media scrutiny, organizational complexity), smaller businesses can adapt more quickly and focus on growth rather than just cost-cutting.
If I'm in a 20,000 person business and I need to remove 10,000 people... that's hard. You can't do this without sending political shock waves in your local community.
If I'm a 10 person business and I need to double my revenue, nobody gives a shit. I can just do it.
For small businesses, AI removes growth constraints. When adding the "21st person" no longer represents a significant capital investment, small businesses can scale much more efficiently:
If the next nominal client that you onboard doesn't actually cause you any more additional pain, if you don't need to hire more people to service that client... you just take off the brakes off from a growth perspective.
This gives small business a unique advantage in capitalizing on AI.
From "Bionic Humans" to "Humans at the Edge"
We currently see this integration to business happening in one of two models:
-
The Bionic Human: Equipping workers with AI tools to make them more productive.
-
Human at the Edge: Redesigning processes to be AI-native, with humans entering the process only when needed (and often facilitated by bitcoin payments).
While many businesses are focused on the first approach and it can certainly see returns, it is still a process constrained by the human input. The real value unlock comes from fundamentally redesigning business processes with AI at the core.
Now we can purchase intelligence in buckets of $0.02 API calls, how would we operate different?
This represents a profound shift in how we think about work and processes. Rather than humans being central to processes with tools supporting them, AI becomes the backbone of operations with humans providing input only at critical junctures.
This is "a complete mental shift" that challenges our fundamental assumptions about how businesses operate. The human becomes "the interface with the real world" for AI systems rather than the primary processor of information and decision-maker.
The Value Trap: Understanding the Competitive Dynamic
So what happens next? Here we have developed the concept of the Value Trap to explain how the competitive landscape will evolve as AI adoption increases..\ \
Initially, early adopters of AI and "Human at the Edge" business processes, will see dramatic benefits.
If your costs have dropped from 90 to 20 this creates an immediate competitive advantage where the early adopter is "now making 80 units of profit versus your 10 units of profit.
They gain massive pricing power in the industry and can compete for growth with an unfair advantage.
Over time, and here we believe this is likely a 5-10 year period although we believe the quicker side, competitive pressures will erode these advantages.\ \ As competitors adopt similar AI strategies, price competition will intensify, and revenues will decline. The business that initially saw its costs drop from 90 to 20 units might see its revenue decline from 100 to 30 units, resulting in similar margins but much lower overall revenue, often destroying the enterprise value of the company at these new revenue / profit levels!
This evolution creates an imperative for businesses to adopt AI early, not just to maintain perpetual advantage, but simply to survive the transition. Worse they're hit with a second challenge of the value trap, how do I keep hold of the value I generate along the way.\ \ If you're reading this on Nostr you may already suspect a way out of this value trap.\ \ If not I would invite you to consider storing the immediate short term returns you pull forwards in something that would be inflation resistant, hard to seize and ideally portable.\ \ We refer to this as a 'The big orange arbitrage".
Implications for Business Owners and Capital Allocators
For business owners, especially those running small to medium-sized enterprises, the message is clear: understand how AI could transform your industry and begin planning your transition now.\ \ This might involve creating an "AI-native twin" of your current businessāsimilar to how Netflix developed streaming alongside its DVD businessāto eventually replace your current operations. If you want help please ask, I heavily favor more small businesses in the world and would love to help make this a reality.
For capital allocation, the emerging opportunity we see if in "transformation led private equity". The acquisition of traditional service businesses and applying AI to dramatically reduce operational costs and increase enterprise value.\ \ This approach treats AI not as a product but as a transformation strategy for existing businesses with proven product-market fit.
Transformation led PE is venture style returns without the risk of product market fit.
So the lesson?
The business model of AI isn't all about selling AI technology, adding a RAG chatbot to a new DB or collecting everyone's data.\ \ Consider the humble cash flow business, use AI to transform the operational processes and save into everyone's favorite orange coin.
-
-
@ ec42c765:328c0600
2025-02-05 23:16:35ć¦ććØ
nostr:nevent1qqst3uqlls4yr9vys4dza2sgjle3ly37trck7jgdmtr23uuz52usjrqqqnjgr
nostr:nevent1qqsdvchy5d27zt3z05rr3q6vvmzgslslxwu0p4dfkvxwhmvxldn9djguvagp2
test
ć¦ļ½
-
@ ec42c765:328c0600
2025-02-05 22:05:55ć«ć¹ćæć ēµµęåćØćÆ
ä»»ęć®ćŖćŖćøćć«ē»åćēµµęåć®ććć«ęäøć«ęæå „ć§ććę©č½ć§ćć
ć¾ćććŖć¢ćÆć·ć§ć³ļ¼Twitterć® ććć ć®ćććŖę©č½ļ¼ć«ćć«ć¹ćæć ēµµęåć使ćć¾ćć
ć«ć¹ćæć ēµµęåć®åƾåæē¶ę³ļ¼2025/02/06ļ¼
ć«ć¹ćæć ēµµęåć使ćććć«ćÆć«ć¹ćæć ēµµęåć«åƾåæćććÆć©ć¤ć¢ć³ćć使ćåæ č¦ćććć¾ćć
ā»č”ØćÆäøä¾ć§ćććÆć©ć¤ć¢ć³ććÆä»ć«ćććććććć¾ćć
使ć£ć¦ćććÆć©ć¤ć¢ć³ćć対åæćć¦ććŖćå “åćÆććÆć©ć¤ć¢ć³ććå¤ę“ććć対åæććć¾ć§å¾ ć¤ćéēŗč ć«č¦ęćéćļ¼ć¾ććÆčŖåć§å®č£ ććļ¼ćŖć©ćć¾ćććć
対åæćÆć©ć¤ć¢ć³ć
ććć§ćÆnostterć使ć£ć¦čŖ¬ęćć¦ććć¾ćć
ęŗå
ć«ć¹ćæć ēµµęåć使ćććć®ęŗåć§ćć
- NostrćØćÆć¹ćć³ć·ć§ć³ļ¼NIP-07ļ¼ćå°å „ćć
- 使ćććć«ć¹ćæć ēµµęåććŖć¹ćć«ē»é²ćć
NostrćØćÆć¹ćć³ć·ć§ć³ļ¼NIP-07ļ¼ćå°å „ćć
NostrćØćÆć¹ćć³ć·ć§ć³ćÆä½æćććć«ć¹ćæć ēµµęåćē»é²ććęć«åæ č¦ć«ćŖćć¾ćć
ć¾ććē°å¢ļ¼ćć½ć³ć³ćiPhonećandroidćŖć©ļ¼ć«ćć£ć¦å°å „ę¹ę³ćéćć¾ćć
NostrćØćÆć¹ćć³ć·ć§ć³ćå°å „ćć端ę«ćÆćå®éć«Nostrćé²č¦§ćć端ę«ćØéć£ć¦ćę§ćć¾ććļ¼ćŖć¹ćē»é²ćÆPCćNostré²č¦§ćÆiPhonećŖć©ļ¼ć
NostrćØćÆć¹ćć³ć·ć§ć³ļ¼NIP-07ļ¼ć®å°å „ę¹ę³ćÆä»„äøć®ćć¼ćøćåē §ćć¦ćć ććć
å°ćé¢åć§ććććććå°å „ćć¦ćććØNosträøć®ę§ć ćŖå “é¢ć§å½¹ē«ć¤ć®ć§ććåæ«é©ć«ćŖćć¾ćć
使ćććć«ć¹ćæć ēµµęåććŖć¹ćć«ē»é²ćć
仄äøć®ćµć¤ćć§č”ćć¾ćć
å³äøć®Get startedććNostrćØćÆć¹ćć³ć·ć§ć³ć§ćć°ć¤ć³ćć¦ćć ććć
ä¾ćØćć¦ä»„äøć®ć«ć¹ćæć ēµµęåćå°å „ćć¦ćæć¾ćć
å®éććēµµęåćå°ćŖć蔨示ćććććØćććć¾ćććå¤ćē¶ę ć®ćć¼ćæćåå¾ćć¦ćć¾ć£ć¦ććććć§ćććć®å “åćÆćć©ć¦ć¶ć®ę“ę°ććæć³ćę¼ćć¦ćć ććć
generalJP | ć«ć¹ćæć ēµµęå
- å³å“ć®OptionsććBookmarkćéøę
ććć§ć«ć¹ćæć ēµµęåć使ēØććććć®ćŖć¹ćć«ē»é²ć§ćć¾ćć
ć«ć¹ćæć ēµµęåć使ēØćć
ä¾ćØćć¦ćć©ć¦ć¶ćć使ćććÆć©ć¤ć¢ć³ć nostter ćć使ēØćć¦ćæć¾ćć
nostterć«NostrćØćÆć¹ćć³ć·ć§ć³ć§ćć°ć¤ć³ćććććÆē§åÆéµćå „ćć¦ćć°ć¤ć³ćć¦ćć ććć
ęē« äøć«ä½æēØ
- ę稿ććæć³ćę¼ćć¦ę稿ć¦ć£ć³ćć¦ć蔨示
- 锚ć®ććæć³ćę¼ććēµµęåć¦ć£ć³ćć¦ć蔨示
- ļ¼ćæććę¼ććć«ć¹ćæć ēµµęåäøč¦§ć蔨示
- ć«ć¹ćæć ēµµęåćéøę
- : čØå·ć«ęć¾ććć¢ć«ćć”ćććć®ć·ć§ć¼ćć³ć¼ććØćć¦ęæå „ććć
ćć®ē¶ę ć§ę稿ćććØć«ć¹ćæć ēµµęåćØćć¦č”Øē¤ŗććć¾ćć
ć«ć¹ćæć ēµµęå対åæćÆć©ć¤ć¢ć³ćć使ć£ć¦ććä»ć¦ć¼ć¶ć¼ć«ćć«ć¹ćæć ēµµęåćØćć¦č”Øē¤ŗććć¾ćć
対åæćć¦ććŖććÆć©ć¤ć¢ć³ćć®å “åćć·ć§ć¼ćć³ć¼ćć®ć¾ć¾č”Øē¤ŗććć¾ćć
ć·ć§ć¼ćć³ć¼ććē“ę„å „åććććØć§ć«ć¹ćæć ēµµęåć®åč£ć蔨示ćććć®ć§ććććéøęććććØćć§ćć¾ćć
ćŖć¢ćÆć·ć§ć³ć«ä½æēØ
- ä»»ęć®ę稿ć®é”šć®ććæć³ćę¼ććēµµęåć¦ć£ć³ćć¦ć蔨示
- ļ¼ćæććę¼ććć«ć¹ćæć ēµµęåäøč¦§ć蔨示
- ć«ć¹ćæć ēµµęåćéøę
ć«ć¹ćæć ēµµęåćŖć¢ćÆć·ć§ć³ćéćććØćć§ćć¾ćć
ć«ć¹ćæć ēµµęåćę¢ć
å čæ°ććemojitoććć«ć¹ćæć ēµµęåćę¢ćć¾ćć
ä¾ćć°ä»»ęć®ć¦ć¼ć¶ć¼ć®ćć¼ćø emojito ććÆćØć¦ ććę¢ćććć emojito Browse all ććnostrå Øä½ć§ęčæä½ęćę“ę°ćććēµµęåćč¦ććć§ćć¾ćć
ć¾ćć仄äøć®ćŖć³ćÆćÆę„ę¬čŖåć¦ć¼ć¶ć¼ćä½ć£ćć«ć¹ćæć ēµµęåćéćććŖć¹ćć§ćļ¼2025/02/06ļ¼
ā»ę¼ććććććććć¾ćć
ę„ę¬ć¦ć¼ć¶ć¼ä½ ć«ć¹ćæć ēµµęå
åēµµęåć»ććć«ććOpen in emojitoć®ćŖć³ćÆććemojitoć«é£ć³ć使ēØćŖć¹ćć«čæ½å ć§ćć¾ćć
仄äøć§ćć
ꬔļ¼Nostrć®ć«ć¹ćæć ēµµęåć®ä½ćę¹
YakihonnećŖć³ćÆ Nostrć®ć«ć¹ćæć ēµµęåć®ä½ćę¹
NostrćŖć³ćÆ nostr:naddr1qqxnzdesxuunzv358ycrgveeqgswcsk8v4qck0deepdtluag3a9rh0jh2d0wh0w9g53qg8a9x2xqvqqrqsqqqa28r5psx3
ä»ę§
-
@ ee6ea13a:959b6e74
2025-05-13 21:29:02Reposted without permission from Business Insider.
Bitcoin Is A Joke
Joe Weisenthal Nov 6, 2013, 10:42 PM UTC
REUTERS/Eliana Aponte
Bitcoin is back in the news, as the digital currency has surged to new all-time highs in recent weeks.
A few weeks ago, it was just above $100. Today it's over $260.
This surge has prompted Timothy B Lee at The Washington Post to ask whether those who have called it a bubble in the past should retract and admit that they were wrong.
Well I'm not totally sure if I've called it a bubble, but I have spoken negatively of it, and I'll say that I still think it's a joke, and probably in a bubble.
Now first of all, I find the premise of Lee's post to be hilarious. The currency has been surging several percent every day lately, and that's evidence that it's not in a bubble?
Before going on, I want to be clear that saying something is a bubble is not saying it will go down. It could go to $500 or $1000 or $10,000. That's the nature of manias.
But make no mistake, Bitcoin is not the currency of the future. It has no intrinsic value.
Now this idea of "intrinsic value" when it comes to currency bothers people, and Bitcoin Bugs will immediately ask why the U.S. dollar has intrinsic value. There's an answer to that. The U.S. Dollar has intrinsic value because the U.S. government which sets the laws of doing business in the United States says it has intrinsic value. If you want to conduct commerce in the United States you have to pay taxes, and there's only one currency you're allowed to pay taxes in: U.S. dollars. There's no getting around this fact. Furthermore, if you want to use the banking system at all, there's no choice but to use U.S. dollars, because that's the currency of the Fed which is behind the whole thing.
On top of all these laws requiring the U.S. dollar to be used, the United States has a gigantic military that can force people around the world to use dollars (if it came to that) so yes, there's a lot of real-world value behind greenbacks.
Bitcoin? Nada. There's nothing keeping it being a thing. If people lose faith in it, it's over. Bitcoin is fiat currency in the most literal sense of the word.
But it gets worse. Bitcoin is mostly just a speculative vehicle. Yes, there are PR stunts about bars and other shops accepting bitcoins. And there is a Bitcoin ATM for some reason. But mostly Bitcoin is a speculative vehicle. And really, you'd be insane to actually conduct a sizable amount of commerce in bitcoins. That's because the price swings so wildly, that the next day, there's a good chance that one of the parties will have gotten royally screwed. Either the purchaser of the good will have ended up totally blowing a huge opportunity (by not holding longer) or the seller will be totally screwed (if Bitcoin instantly plunges). The very volatility that excited people to want to play the Bitcoin game is death when it comes to real transactions in the real world.
Again, Bitcoin might go up a lot more before it ultimately ends. That's the nature of bubbles. The dotcom bubble crashed a bunch of times on its way up. Then one day it ended. The same will happen with this.
In the meantime, have fun speculating!
-
@ ec42c765:328c0600
2025-02-05 20:30:46ć«ć¹ćæć ēµµęåćØćÆ
ä»»ęć®ćŖćŖćøćć«ē»åćēµµęåć®ććć«ęäøć«ęæå „ć§ććę©č½ć§ćć
ć¾ćććŖć¢ćÆć·ć§ć³ļ¼Twitterć® ććć ć®ćććŖę©č½ļ¼ć«ćć«ć¹ćæć ēµµęåć使ćć¾ćć
ć«ć¹ćæć ēµµęåć®åƾåæē¶ę³ļ¼2024/02/05ļ¼
ć«ć¹ćæć ēµµęåć使ćććć«ćÆć«ć¹ćæć ēµµęåć«åƾåæćććÆć©ć¤ć¢ć³ćć使ćåæ č¦ćććć¾ćć
ā»č”ØćÆäøä¾ć§ćććÆć©ć¤ć¢ć³ććÆä»ć«ćććććććć¾ćć
使ć£ć¦ćććÆć©ć¤ć¢ć³ćć対åæćć¦ććŖćå “åćÆććÆć©ć¤ć¢ć³ććå¤ę“ććć対åæććć¾ć§å¾ ć¤ćéēŗč ć«č¦ęćéćļ¼ć¾ććÆčŖåć§å®č£ ććļ¼ćŖć©ćć¾ćććć
対åæćÆć©ć¤ć¢ć³ć
ććć§ćÆnostterć使ć£ć¦čŖ¬ęćć¦ććć¾ćć
ęŗå
ć«ć¹ćæć ēµµęåć使ćććć®ęŗåć§ćć
- NostrćØćÆć¹ćć³ć·ć§ć³ļ¼NIP-07ļ¼ćå°å „ćć
- 使ćććć«ć¹ćæć ēµµęåććŖć¹ćć«ē»é²ćć
NostrćØćÆć¹ćć³ć·ć§ć³ļ¼NIP-07ļ¼ćå°å „ćć
NostrćØćÆć¹ćć³ć·ć§ć³ćÆä½æćććć«ć¹ćæć ēµµęåćē»é²ććęć«åæ č¦ć«ćŖćć¾ćć
ć¾ććē°å¢ļ¼ćć½ć³ć³ćiPhonećandroidćŖć©ļ¼ć«ćć£ć¦å°å „ę¹ę³ćéćć¾ćć
NostrćØćÆć¹ćć³ć·ć§ć³ćå°å „ćć端ę«ćÆćå®éć«Nostrćé²č¦§ćć端ę«ćØéć£ć¦ćę§ćć¾ććļ¼ćŖć¹ćē»é²ćÆPCćNostré²č¦§ćÆiPhonećŖć©ļ¼ć
NostrćØćÆć¹ćć³ć·ć§ć³ļ¼NIP-07ļ¼ć®å°å „ę¹ę³ćÆä»„äøć®ćć¼ćøćåē §ćć¦ćć ććć
å°ćé¢åć§ććććććå°å „ćć¦ćććØNosträøć®ę§ć ćŖå “é¢ć§å½¹ē«ć¤ć®ć§ććåæ«é©ć«ćŖćć¾ćć
使ćććć«ć¹ćæć ēµµęåććŖć¹ćć«ē»é²ćć
仄äøć®ćµć¤ćć§č”ćć¾ćć
å³äøć®Get startedććNostrćØćÆć¹ćć³ć·ć§ć³ć§ćć°ć¤ć³ćć¦ćć ććć
ä¾ćØćć¦ä»„äøć®ć«ć¹ćæć ēµµęåćå°å „ćć¦ćæć¾ćć
å®éććēµµęåćå°ćŖć蔨示ćććććØćććć¾ćććå¤ćē¶ę ć®ćć¼ćæćåå¾ćć¦ćć¾ć£ć¦ććććć§ćććć®å “åćÆćć©ć¦ć¶ć®ę“ę°ććæć³ćę¼ćć¦ćć ććć
generalJP | ć«ć¹ćæć ēµµęå
- å³å“ć®OptionsććBookmarkćéøę
ććć§ć«ć¹ćæć ēµµęåć使ēØććććć®ćŖć¹ćć«ē»é²ć§ćć¾ćć
ć«ć¹ćæć ēµµęåć使ēØćć
ä¾ćØćć¦ćć©ć¦ć¶ćć使ćććÆć©ć¤ć¢ć³ć nostter ćć使ēØćć¦ćæć¾ćć
nostterć«NostrćØćÆć¹ćć³ć·ć§ć³ć§ćć°ć¤ć³ćććććÆē§åÆéµćå „ćć¦ćć°ć¤ć³ćć¦ćć ććć
ęē« äøć«ä½æēØ
- ę稿ććæć³ćę¼ćć¦ę稿ć¦ć£ć³ćć¦ć蔨示
- 锚ć®ććæć³ćę¼ććēµµęåć¦ć£ć³ćć¦ć蔨示
- ļ¼ćæććę¼ććć«ć¹ćæć ēµµęåäøč¦§ć蔨示
- ć«ć¹ćæć ēµµęåćéøę
- : čØå·ć«ęć¾ććć¢ć«ćć”ćććć®ć·ć§ć¼ćć³ć¼ććØćć¦ęæå „ććć
ćć®ē¶ę ć§ę稿ćććØć«ć¹ćæć ēµµęåćØćć¦č”Øē¤ŗććć¾ćć
ć«ć¹ćæć ēµµęå対åæćÆć©ć¤ć¢ć³ćć使ć£ć¦ććä»ć¦ć¼ć¶ć¼ć«ćć«ć¹ćæć ēµµęåćØćć¦č”Øē¤ŗććć¾ćć
対åæćć¦ććŖććÆć©ć¤ć¢ć³ćć®å “åćć·ć§ć¼ćć³ć¼ćć®ć¾ć¾č”Øē¤ŗććć¾ćć
ć·ć§ć¼ćć³ć¼ććē“ę„å „åććććØć§ć«ć¹ćæć ēµµęåć®åč£ć蔨示ćććć®ć§ććććéøęććććØćć§ćć¾ćć
ćŖć¢ćÆć·ć§ć³ć«ä½æēØ
- ä»»ęć®ę稿ć®é”šć®ććæć³ćę¼ććēµµęåć¦ć£ć³ćć¦ć蔨示
- ļ¼ćæććę¼ććć«ć¹ćæć ēµµęåäøč¦§ć蔨示
- ć«ć¹ćæć ēµµęåćéøę
ć«ć¹ćæć ēµµęåćŖć¢ćÆć·ć§ć³ćéćććØćć§ćć¾ćć
ć«ć¹ćæć ēµµęåćę¢ć
å čæ°ććemojitoććć«ć¹ćæć ēµµęåćę¢ćć¾ćć
ä¾ćć°ä»»ęć®ć¦ć¼ć¶ć¼ć®ćć¼ćø emojito ććÆćØć¦ ććę¢ćććć emojito Browse all ććnostrå Øä½ć§ęčæä½ęćę“ę°ćććēµµęåćč¦ććć§ćć¾ćć
ć¾ćć仄äøć®ćŖć³ćÆćÆę„ę¬čŖåć¦ć¼ć¶ć¼ćä½ć£ćć«ć¹ćæć ēµµęåćéćććŖć¹ćć§ćļ¼2024/06/30ļ¼
ā»ę¼ććććććććć¾ćć
ę„ę¬ć¦ć¼ć¶ć¼ä½ ć«ć¹ćæć ēµµęå
åēµµęåć»ććć«ććOpen in emojitoć®ćŖć³ćÆććemojitoć«é£ć³ć使ēØćŖć¹ćć«čæ½å ć§ćć¾ćć
仄äøć§ćć
ꬔļ¼Nostrć®ć«ć¹ćæć ēµµęåć®ä½ćę¹
YakihonnećŖć³ćÆ Nostrć®ć«ć¹ćæć ēµµęåć®ä½ćę¹
NostrćŖć³ćÆ nostr:naddr1qqxnzdesxuunzv358ycrgveeqgswcsk8v4qck0deepdtluag3a9rh0jh2d0wh0w9g53qg8a9x2xqvqqrqsqqqa28r5psx3
ä»ę§
-
@ 374ee93a:36623347
2025-05-13 11:47:55Chef's notes
Lovely tart rhubarb jam with the extra firey kick of fresh root ginger.
Technically a vegetable rhubarb has low pectin content so be sure to include a high pectin fruit such as lemon/cooking apple/redcurrant/gooseberry. It also quite watery so we use a slightly higher fruit to sugar ratio (1.2:1) and evaporate off some water at the beginning.
Testing for setting point: put a saucer in the freezer to chill whilst cooking the fruit, after 5 mins of a high boil with the sugar put a small blob of jam on the cold saucer and return to the freezer for 2 minutes. If the jam forms a solid wrinkle when pushed with a spoon it is ready, if it is runny continue cooking and retest every 5 mins
The recipe can be halved for a small batch but if you have lots of rhubarb to process it is better to cook double batches in separate pans because it will take much longer to heat through, this affects the colour and flavour - the jam will taste warm and mellow rather than zingy
Sterilise glass jars in a 120c oven and pot the jam hot leaving 1/4 inch head space, it will keep for 5 years unopened if the lids are well sealed and does not require water bath canning
Details
- ā²ļø Prep time: 20 mins
- š³ Cook time: 30 mins
- š½ļø Servings: 6 (jars)
Ingredients
- 1.2kg Rhubarb
- 200g Grated Root Ginger
- 100g Chopped Crystalised Ginger
- 1kg Sugar
- 1 Lemon
Directions
- Chop the rhubarb into 1/2 inch pieces, peel and finely grate the fresh root ginger, chop crystalised ginger into tiny bits. Juice and quarter a lemon (discard pips) and add all these to a pan with a small amount of water
- Simmer gently for 20 mins until the lemon and rhubarb are soft then add the sugar, stir until fully dissolved
- Boil on high to reach setting point, usually at 105 degrees c or when a small blob of jam wrinkles on a cold plate instead of being runny
- Remove the lemon pieces and pot into sterilised jars
-
@ 95543309:196c540e
2025-05-11 12:42:09Lets see if this works with the blossom upload and without markdown hassle.
:cat:
https://blossom.primal.net/73a099f931366732c18dd60da82db6ef65bb368eb96756f07d9fa7a8a3644009.mp4
-
@ 7459d333:f207289b
2025-05-10 10:38:56Description: Just as Bitcoin enabled sovereignty over money, a decentralized shipping protocol would enable sovereignty over trade. An LN/Bisq inspired shipping protocol could create an unstoppable free market.
Bitcoin gave us monetary sovereignty, freeing us from central bank manipulation, inflation, and censorship. But there's a missing link in our freedom journey: the physical world of goods.
The Problem: Even with Bitcoin, global trade remains at the mercy of: - Arbitrary tariffs and import restrictions - Political censorship of goods - Privacy invasion of shipping information - Centralized shipping carriers
The Vision: A decentralized shipping protocol with these properties:
- "Onion-routed" packages: Each carrier only knows the previous and next hop
- Bitcoin-secured multi-sig escrow: Funds locked until package delivery confirmed
- Incentive alignment: Carriers set their own fees based on risk assessment
- Privacy tiers: Options for inspected vs. sealed packages with appropriate pricing
- End-to-end sovereignty: Sender and receiver maintain control, intermediate carriers just fulfill their role
How it could work:
- Sender creates shipping request with package details and destination
- Protocol finds optimal route through independent carriers
- Each hop secured by multi-sig deposits larger than package value
- Carriers only see next hop, not ultimate destination
- Reputation systems and economic incentives maintain integrity
This creates a free market where any individual can participate as a carrier, earning Bitcoin for facilitating trade. Just like Lightning Network nodes, anyone can open "channels" with trusted partners.
Impact: This would enable true free market principles globally, making artificial trade barriers obsolete and empowering individuals to engage in voluntary exchange regardless of geographic or political boundaries.
There are a lot of challenges. But the first question is if this is a real problem and if its worth solving it.
What components would need development first? How would you solve the physical handoff challenges?
originally posted at https://stacker.news/items/976326
-
@ cae03c48:2a7d6671
2025-05-19 17:48:53Bitcoin Magazine
JPMorgan To Allow Clients To Buy Bitcoin, Jamie Dimon SaysToday, Chairman and CEO of JPMorgan Chase Jamie Dimon reiterated his personal disapproval of Bitcoin during the bankās annual Investor Day event. Despite the bankās decision to provide clients with access to Bitcoin investments, Dimon emphasized his personal disapproval of Bitcoin.
āI am not a fanā of Bitcoin, stated Dimon.
JPMorgan is going to allow clients to buy Bitcoin, but the bank wonāt custody it, according to Bloomberg. Dimon made clear that while JPMorgan will provide clients access to Bitcoin investments, the bank will not hold or manage the digital asset directly.Ā
JUST IN: JPMorgan CEO Jamie Dimon said they will allow clients to buy #Bitcoin
pic.twitter.com/wO0djlYGUM
ā Bitcoin Magazine (@BitcoinMagazine) May 19, 2025
In a January 2025 interview with CBS News, Dimon expressed continued skepticism toward Bitcoin. āBitcoin itself has no intrinsic value. Itās used heavily by sex traffickers, money launderers, ransomware,ā said Dimon.Ā
Although he acknowledged, āWe are going to have some kind of digital currency at some point,ā he added, āI just donāt feel great about bitcoin. I applaud your ability to wanna buy or sell it. Just like I think you have the right to smoke, but I donāt think you should smoke.ā
These comments from Dimon contrast with recent optimism from JPMorgan analysts regarding Bitcoinās market prospects. JPMorgan analysts reported that Bitcoin is likely to continue gaining ground at goldās expense in the second half of the year, driven by rising corporate demand and growing support from U.S. states.
JUST IN: JPMorgan says #Bitcoin likely to have more upside than gold in the second half of 2025
pic.twitter.com/YPrHivch9O
ā Bitcoin Magazine (@BitcoinMagazine) May 15, 2025
āBetween mid-February and mid-April gold was rising at the expense of bitcoin, while of the past three weeks we have been observing the opposite, i.e. bitcoin rising at the expense of gold,ā said JPMorgan analysts. āIn all, we expect the YTD zero sum game between gold and bitcoin to extend to the remainder of the year, but are biased towards crypto-specific catalysts creating more upside for bitcoin over gold into the second half of the year.ā
Since April 22, gold has dropped nearly 8%, while Bitcoin has surged 18%, reflecting a notable shift in investor sentiment. Capital has been moving out of gold ETFs and into Bitcoin. Several U.S. states are also warming to BitcoināNew Hampshire now permits up to 5% of its reserves in Bitcoin, while Arizona is launching a Bitcoin reserve and has pledged not to raise taxes this year. At the corporate level, companies like Strategy and Metaplanet are expanding their Bitcoin holdings.
āAs the list grows, with other U.S. states potentially considering adding bitcoin to their strategic reserves, this could turn out to be a more sustained positive catalyst for bitcoin,ā said the analysts.
This post JPMorgan To Allow Clients To Buy Bitcoin, Jamie Dimon Says first appeared on Bitcoin Magazine and is written by Oscar Zarraga Perez.
-
@ da8b7de1:c0164aee
2025-05-19 17:38:59NémetorszÔg feladja a nukleÔris energiÔval szembeni ellenÔllÔsÔt FranciaorszÔggal való közeledés jegyében
NĆ©metorszĆ”g hosszĆŗ idÅ utĆ”n feladta a nukleĆ”ris energiĆ”val szembeni ellenĆ”llĆ”sĆ”t, ami jelentÅs lĆ©pĆ©st jelenthet az EU energiapolitikai vitĆ”inak rendezĆ©sĆ©ben, külƶnƶsen FranciaorszĆ”ggal szemben. Ez a vĆ”ltozĆ”s eltĆ”volĆthatja a nukleĆ”ris energiĆ”val szembeni elÅĆtĆ©leteket az uniós jogszabĆ”lyokból, Ć©s elÅsegĆtheti a kƶzƶs európai energiapolitika kialakĆtĆ”sĆ”t[2].
Trump adminisztrĆ”ció tervezett rendeletei a nukleĆ”ris erÅművek Ć©pĆtĆ©sĆ©nek gyorsĆtĆ”sĆ”ra
Az Egyesült Ćllamokban a Trump-adminisztrĆ”ció tƶbb elnƶki rendelet-tervezetet kĆ©szĆt elÅ, amelyek cĆ©lja a nukleĆ”ris erÅművek Ć©pĆtĆ©sĆ©nek gyorsĆtĆ”sa. A tervek szerint a jelenlegi mintegy 100 GW nukleĆ”ris kapacitĆ”st 2050-re 400 GW-ra nƶvelnĆ©k, az engedĆ©lyezĆ©si folyamatok egyszerűsĆtĆ©sĆ©vel, a hadsereg szerepĆ©nek nƶvelĆ©sĆ©vel Ć©s a nukleĆ”ris üzemanyag-ellĆ”tĆ”s megerÅsĆtĆ©sĆ©vel[3][9].
Tajvan hivatalosan is nukleƔrismentes lett
- mĆ”jus 17-Ć©n Tajvan utolsó kereskedelmi reaktorĆ”t is leĆ”llĆtottĆ”k, ezzel az orszĆ”g elĆ©rte a "nukleĆ”rismentes haza" cĆ©ljĆ”t. Az energiamixben a nukleĆ”ris energia arĆ”nya 17%-ról 3%-ra csƶkkent, mikƶzben a megĆŗjuló energia tĆzszeresĆ©re nÅtt. BĆ”r a parlamentben vita folyik a Maanshan atomerÅmű Ć©lettartam-hosszabbĆtĆ”sĆ”ról, jelenleg Tajvan teljesen leĆ”llĆtotta a nukleĆ”ris energiatermelĆ©st[1][6].
Kazatomprom hitelmegĆ”llapodĆ”st kƶtƶtt egy Ćŗj kĆ©nsavgyĆ”r finanszĆrozĆ”sĆ”ra
KazahsztĆ”n Ć”llami atomipari vĆ”llalata, a Kazatomprom hitelmegĆ”llapodĆ”st kƶtƶtt egy Ć©vi 800 000 tonna kapacitĆ”sĆŗ kĆ©nsavgyĆ”r Ć©pĆtĆ©sĆ©re. A kĆ©nsavat az urĆ”nkitermelĆ©shez hasznĆ”ljĆ”k, Ć©s a gyĆ”r 2027 elsÅ negyedĆ©vĆ©ben kĆ©szülhet el. A projekt cĆ©lja a rĆ©gió gazdasĆ”gi fejlÅdĆ©sĆ©nek tĆ”mogatĆ”sa Ć©s az urĆ”nipar ellĆ”tĆ”sbiztonsĆ”gĆ”nak javĆtĆ”sa[4].
Az IAEA segĆti KazahsztĆ”nt az elsÅ atomerÅmű biztonsĆ”gos helyszĆnĆ©nek kivĆ”lasztĆ”sĆ”ban
Az IAEA (Nemzetkƶzi Atomenergia-ügynƶksĆ©g) szakĆ©rtÅi csapata ƶtnapos szeminĆ”riumot tart KazahsztĆ”nban, hogy segĆtsen kivĆ”lasztani az orszĆ”g elsÅ atomerÅművĆ©nek legbiztonsĆ”gosabb helyszĆnĆ©t. A folyamatban tƶbb helyszĆn is szóba került, jelenleg a Zhambyl kƶrzet az elsÅdleges jelƶlt. A projektben nĆ©gy lehetsĆ©ges technológiai partner vesz rĆ©szt: CNNC (KĆna), Roszatom (OroszorszĆ”g), KHNP (DĆ©l-Korea) Ć©s EDF (FranciaorszĆ”g)[8].
India Ćŗj nukleĆ”ris helyszĆnt hagyott jóvĆ”
Az indiai nukleĆ”ris hatósĆ”g engedĆ©lyezte a Mahi Banswara Rajasthan Atomic Power Project nĆ©gy blokkjĆ”nak elhelyezĆ©sĆ©t RĆ”dzsasztĆ”n Ć”llamban. Ez Ćŗjabb lĆ©pĆ©s India ambiciózus nukleĆ”ris bÅvĆtĆ©si terveiben[5].
GlobÔlis nukleÔris ipari konferencia Varsóban
- mĆ”jus 20-21-Ć©n Varsóban rendezik meg az elsÅ World Nuclear Supply Chain Conference-t, amely cĆ©lja a globĆ”lis nukleĆ”ris ellĆ”tĆ”si lĆ”nc megerÅsĆtĆ©se Ć©s a szektor 2 billió dollĆ”ros beruhĆ”zĆ”si lehetÅsĆ©gĆ©nek kiaknĆ”zĆ”sa a kƶvetkezÅ 15 Ć©vben. A konferenciĆ”n iparĆ”gi vezetÅk, dƶntĆ©shozók Ć©s szakĆ©rtÅk vesznek rĆ©szt[7].
HivatkozƔsok
- [1] reccessary.com ā Tajvan nukleĆ”rismentes lett
- [2] nucnet.org ā NĆ©metorszĆ”g nukleĆ”ris politikai fordulata
- [3] humanprogress.org ā Trump rendelettervezetek
- [4] world-nuclear-news.org ā Kazatomprom kĆ©nsavgyĆ”r
- [5] world-nuclear-news.org ā India Ćŗj nukleĆ”ris helyszĆne
- [6] taiwannews.com.tw ā Tajvan atomerÅmű leĆ”llĆtĆ”sa
- [7] world-nuclear.org ā Varsói nukleĆ”ris konferencia
- [8] astanatimes.com ā IAEA-KazahsztĆ”n együttműkƶdĆ©s
- [9] esgdive.com ā Oklo Ć©s Trump engedĆ©lyezĆ©si reformok
-
@ 59cb0748:9602464b
2025-01-01 06:15:09Nostrć§ćäøč©±ć«ćŖć£ć¦ććę¹ćććäøč©±ć«ćŖć£ć¦ćŖćę¹ććććć«ć”ćÆļ¼
ćæć³é 大åć§ćļ¼
NIP-23ć使ć£ćåćć¦ć®ę稿ć§ćć
ä»åćÆćē§ćććę°ć¶ęäøć«ćć¶ć¤ć³ćććäøēØ®é”ć®ććæćć»ć±ć¼ć¹ć®ē“¹ä»čØäŗć«ćŖćć¾ćļ¼ļ¼
ććæćć»ćč²·ć£ććć®ć®ćć¾ćčŖåć®å„½ćæć«åćå¤č¦³ćä»ę§ć®ć±ć¼ć¹ććŖććććć¤ćććććæć¤ććä½ććććŖćć«ęéćććć¦čććć±ć¼ć¹éć§ćć
ćććļ¼ć·ćŖć¼ćŗć«é¢ćć¦ćÆćFDMćæć¤ćć®3DććŖć³ćæć®ē²¾åŗ¦ćčä¹ ę§ćåŗåå¾ć®ä½ę„ę§ćčę ®ćć¦äøć¤ć®ćć¼ćć§å®ēµććććØć«ęć£ć¦čØčØććć¾ććć
äøå®ä»„äøć®å 唫ēć§ććŖć³ććććć°ćććŖćć«äøå¤«ćŖćÆćć§ćć
ć¾ććåŗę¬ēć«ę¾ē±ę§ćØäæč·ę§ćäø”ē«ć§ććććć«čØčØćććć¤ććć¾ćć
ććććć®ć¢ćć«ć«ć¤ćć¦ē°”åć«ē“¹ä»ćććć¦ććć ćć¾ćć®ć§ććććććć°åćŖććøććŖć«ä»å±ć®READMEćčŖćć§ććć ćć¦čŖä½ććć£ć¼ććććÆćććć ćć¾ćććå¹øćć§ćć
ććć§ćÆćē°”åć«åć¢ćć«ć®ē“¹ä»ćććć¦ćććć¾ćć
AirLiftFrame
ęåć«ä½ć£ćć¢ćć«ć§ćļ¼ å°ć大ććć®ćé£ē¹ć§ćććååćć®ćć¬ć¼ć ććć¼ć¹ćØćåŗē¤åØč¾ŗćććć¦å²ććŖćčØčØć«ćććäæč·ę§ćØę¾ē±ćé»å®³ććŖćäŗć®äø”ē«ćēć£ć¦ćć¾ćć
TwinAirLiftFrame
ććæćć»ćč²·ćå¢ćććććØć«ćććč¤ę°å°ćć«ćć³ććéēØććććØććéč¦ćčŖåć®äøć«åŗć¦ććć®ć§ćAirLiftFrameć2ć¤ćć£ć¤ćććčÆćć®ć§ćÆćØčØćććććåē“ćŖēŗę³ć§ć¤ććå§ććć±ć¼ć¹ć§ćć ćććććć 横並ć³ć«ććć ćć§ćÆå»ē±ćå¹²ęøććć ćć§ćÆćŖććDCćøć£ććÆćUSBćć¼ććøć®ć¢ćÆć»ć¹ćé»å®³ććććØććåé”ć«ććć«ę°ćć¤ćć¾ććć ććć§ćWebUIäøć§ćć£ć¹ćć¬ć¤ć®č”Øē¤ŗćäøäøå転åŗę„ćććØć«ę³Øē®ćć2å°ćäøäøéåćć«åćä»ććäŗć§ćććć®åé”ć解決ćć¾ććļ¼
VoronoiShell
AirLiftFrameć·ćŖć¼ćŗć®ćµć¤ćŗćå°ååććäŗććå§ćććććøć§ćÆćć§ćć 縦横ć®åÆøę³ć®åęøć ćć§ćÆćŖććåćæćčćć¤ććŖćććØććåøęćććć¾ććć ęćåē“ć«čććććØćęć£ćęć«ēŗē±ććčé¢ćć¼ćć«ęć触ćć¦ćć¾ć£ćććč½äøćŖć©ć§ć¶ć¤ćć£ćéć«čé¢ćć¼ććē “ęććęøåæµćććć¾ććć ććć§ć(å½åćÆä»ććććÆćŖćć£ć)čé¢äæč·ēØć®ć°ćŖć«ććć¶ć¤ć³ććåæ č¦ćåŗć¦ćć¾ććć åććÆå¤č§å½¢ć§ććććć¾ćć«ćććµććčŖæć¹ć¦ććå ć«VoronoięćØććęę©ēćŖććæć¼ć³ć«č”ćä»ćå³ę”ēØćć¾ććć ēµęćććæćć»ćåćä»ćććØęćč¦ććŖććŖćć®ćåæä½ē”ććććåę§ēć§ć¹ćæć¤ćŖćć·ć„ćŖćć¶ć¤ć³ć«ä»äøććć¾ććć
ćććć«ć¹ćæć ę¹ę³ćć¤ć³ćµć¼ćććććå¢čØćć”ć³ć®éøå®ę¹ę³ēć瓹ä»ćććć®ć§ćććä»åćÆNIP-23ć«ćŖćććØććęå³ćććć®ć§ē“¹ä»ć«ēćć¾ćļ¼ ć¾ććä»ć®é¢é£OSćć¼ćć¦ć§ć¢ćććøć§ćÆćć®ć±ć¼ć¹ććć¶ć¤ć³ć§ććććØęć£ć¦ććć¾ćļ¼
ä»å¾ćØććæć³é ććććććé”ććććć¾ćć
-
@ 21335073:a244b1ad
2025-05-09 13:56:57Someone asked for my thoughts, so Iāll share them thoughtfully. Iām not here to dictate how to promote NostrāIām still learning about it myself. While Iām not new to Nostr, freedom tech is a newer space for me. Iām skilled at advocating for topics I deeply understand, but freedom tech isnāt my expertise, so take my words with a grain of salt. Nothing I say is set in stone.
Those who need Nostr the most are the ones most vulnerable to censorship on other platforms right now. Reaching them requires real-time awareness of global issues and the dynamic relationships between governments and tech providers, which can shift suddenly. Effective Nostr promoters must grasp this and adapt quickly.
The best messengers are people from or closely tied to these at-risk regionsāthose who truly understand the local political and cultural dynamics. They can connect with those in need when tensions rise. Ideal promoters are rational, trustworthy, passionate about Nostr, but above all, dedicated to amplifying peopleās voices when it matters most.
Forget influencers, corporate-backed figures, or traditional online PRāit comes off as inauthentic, corny, desperate and forced. Nostrās promotion should be grassroots and organic, driven by a few passionate individuals who believe in Nostr and the communities they serve.
The idea that āpeople wonāt join Nostr due to lack of reachā is nonsense. Everyone knows Xās āreachā is mostly with bots. If humans want real conversations, Nostr is the place. X is great for propaganda, but Nostr is for the authentic voices of the people.
Those spreading Nostr must be so passionate theyāre willing to onboard others, which is time-consuming but rewarding for the right person. Theyāll need to make Nostr and onboarding a core part of who they are. I see no issue with that level of dedication. Iāve been known to get that way myself at times. Itās fun for some folks.
With love, I suggest not adding Bitcoin promotion with Nostr outreach. Zaps already integrate that element naturally. (Still promote within the Bitcoin ecosystem, but this is about reaching vulnerable voices who needed Nostr yesterday.)
To promote Nostr, forget conventional strategies. āInfluencersā arenāt the answer. āInfluencersā are not the future. A trusted local community member has real influenceāreach them. Connect with people seeking Nostrās benefits but lacking the technical language to express it. This means some in the Nostr community might need to step outside of the Bitcoin bubble, which is uncomfortable but necessary. Thank you in advance to those who are willing to do that.
I donāt know who is paid to promote Nostr, if anyone. This piece isnāt shade. But itās exhausting to see innocent voices globally silenced on corporate platforms like X while Nostr exists. Last night, I wondered: how many more voices must be censored before the Nostr community gets uncomfortable and thinks creatively to reach the vulnerable?
A warning: the global need for censorship-resistant social media is undeniable. If Nostr doesnāt make itself known, something else will fill that void. Letās start this conversation.
-
@ a8d1560d:3fec7a08
2025-05-19 17:28:05NIP-XX
Documentation and Wikis with Spaces and Format Declaration
draft
optional
Summary
This NIP introduces a system for collaborative documentation and wikis on Nostr. It improves upon earlier efforts by adding namespace-like Spaces, explicit content format declaration, and clearer separation of article types, including redirects and merge requests.
Motivation
Previous approaches to wiki-style collaborative content on Nostr had two key limitations:
- Format instability ā No declared format per event led to breaking changes (e.g. a shift from Markdown to Asciidoc).
- Lack of namespace separation ā All articles existed in a global space, causing confusion and collision between unrelated projects.
This NIP addresses both by introducing:
- Spaces ā individually defined wikis or documentation sets.
- Explicit per-article format declaration.
- Dedicated event kinds for articles, redirects, merge requests, and space metadata.
Specification
kind: 31055
ā Space DefinitionDefines a project namespace for articles.
Tags: -
["name", "<space title>"]
-["slug", "<short identifier>"]
-["description", "<optional description>"]
-["language", "<ISO language code>"]
-["license", "<license text or SPDX ID>"]
Content: (optional) full description or README for the space.
kind: 31056
ā ArticleAn article in a specific format belonging to a defined space.
Tags: -
["space", "<slug>"]
-["title", "<article title>"]
-["format", "markdown" | "asciidoc" | "mediawiki" | "html"]
-["format-version", "<format version>"]
(optional) -["prev", "<event-id>"]
(optional) -["summary", "<short change summary>"]
(optional)Content: full body of the article in the declared format.
kind: 31057
ā RedirectRedirects from one article title to another within the same space.
Tags: -
["space", "<slug>"]
-["from", "<old title>"]
-["to", "<new title>"]
Content: empty.
kind: 31058
ā Merge RequestProposes a revision to an article without directly altering the original.
Tags: -
["space", "<slug>"]
-["title", "<article title>"]
-["base", "<event-id>"]
-["format", "<format>"]
-["comment", "<short summary>"]
(optional)Content: proposed article content.
Format Guidelines
Currently allowed formats: -
markdown
-asciidoc
-mediawiki
-html
Clients MUST ignore formats they do not support. Clients MAY apply stricter formatting rules.
Client Behavior
Clients: - MUST render only supported formats. - MUST treat
space
as a case-sensitive namespace. - SHOULD allow filtering, browsing and searching within Spaces. - SHOULD support revision tracking viaprev
. - MAY support diff/merge tooling forkind: 31058
.
Examples
Space Definition
json { "kind": 31055, "tags": [ ["name", "Bitcoin Docs"], ["slug", "btc-docs"], ["description", "Developer documentation for Bitcoin tools"], ["language", "en"], ["license", "MIT"] ], "content": "Welcome to the Bitcoin Docs Space." }
Markdown Article
json { "kind": 31056, "tags": [ ["space", "btc-docs"], ["title", "Installation Guide"], ["format", "markdown"] ], "content": "# Installation\n\nFollow these steps to install the software..." }
Asciidoc Article
json { "kind": 31056, "tags": [ ["space", "btc-docs"], ["title", "RPC Reference"], ["format", "asciidoc"] ], "content": "= RPC Reference\n\nThis section describes JSON-RPC calls." }
MediaWiki Article
json { "kind": 31056, "tags": [ ["space", "btc-docs"], ["title", "Block Structure"], ["format", "mediawiki"] ], "content": "== Block Structure ==\n\nThe structure of a Bitcoin block is..." }
Redirect
json { "kind": 31057, "tags": [ ["space", "btc-docs"], ["from", "Getting Started"], ["to", "Installation Guide"] ], "content": "" }
Merge Request
json { "kind": 31058, "tags": [ ["space", "btc-docs"], ["title", "Installation Guide"], ["base", "d72fa1..."], ["format", "markdown"], ["comment", "Added step for testnet"] ], "content": "# Installation\n\nNow includes setup instructions for testnet users." }
Acknowledgements
This proposal builds on earlier ideas for decentralized wikis and documentation within Nostr, while solving common issues related to format instability and lack of project separation.
-
@ ec42c765:328c0600
2024-12-22 19:16:31ćć®čØäŗćÆååć®å 容ćęę”ćć¦ććäŗŗåćć«ęøćć¦ćć¾ćļ¼ē¹ć«NostrćØćÆć¹ćć³ć·ć§ć³ļ¼NIP-07ļ¼å°å „ļ¼
ååļ¼Nostrć®ć«ć¹ćæć ēµµęåć®ä½æćę¹
ęé
- ē»é²ććē»åćēØęćć
- ē»åćwebäøć«ć¢ćććć¼ććć
- ēµµęåć»ććć«ē»é²ćć
1. ē»é²ććē»åćēØęćć
仄äøć®ćććŖę¹ę³ć§ēØęćć¦ćć ććć
- ē»åē·Øéć½ććēć使ć£ć¦čŖåć§ä½ęćć
- ēµµęåä½ęćµć¤ćć使ćļ¼ēµµęåćøć§ćć¬ć¼ćæć¼ćMEGAMOJI ćŖć©ļ¼
- ććŖć¼ē»åć使ćļ¼ććććØć ćŖć©ļ¼
ćć¼ćæéåęø
Nostrć§ćÆē»åććć®ć¾ć¾č”Øē¤ŗćććÆć©ć¤ć¢ć³ććå¤ćć®ć§ććć¼ćæéć大ććŖē»åććć®ć¾ć¾ä½æććØć¢ćć¤ć«éäæ”ęćŖć©ć«č² ę ććććć¾ćć
ćć¼ćæéćå¢ćććŖćććć«ćµć¤ćŗććć”ć¤ć«å½¢å¼ćå¤ę“ććććØććććććć¾ćć
仄äøćÆē§ć®ććććć§ćć * ćµć¤ćŗļ¼ę£ę¹å½¢ 128Ć128 ććÆć»ć«ćé·ę¹å½¢ ä»»ęć®ęØŖå¹ Ć128 ććÆć»ć« * ćć”ć¤ć«å½¢å¼ļ¼webpå½¢å¼ļ¼webpå¤ęćććććµć¤ć toimgļ¼ * åč²ćåē“ćŖē»åć®å “åļ¼pngå½¢å¼ļ¼webpć«ćććØććććµć¤ćŗć大ćććŖćļ¼
ćć®ä»
- čęÆééē»å
- ćć¼ćÆć¢ć¼ććć©ć¤ćć¢ć¼ćäø”ę¹ć§č¦ćććč²
ćććććć§ćć
2. ē»åćwebäøć«ć¢ćććć¼ććć
ććåćććŖććć° emojito ććć®ć¢ćććć¼ćć§åé”ćŖćć§ćć
ę®ę®µä½æć£ć¦ććē»åć¢ćććć¼ćå ććććŖćććć§ćę§ćć¾ććć
ę°ć«ćŖćę¹ćÆć¢ćććć¼ćå ćé©å®éøćć§ćć ćććę¢ć«ę稿ćććć«ć¹ćæć ēµµęåć®ē»åć«åƾćć¦
- åé¤ćå·®ćęæććć§ććŖć ā emojito ćŖć©
- åé¤ć§ćććå·®ćęæććÆć§ććŖć ā Gyazoćnostrcheck.mećŖć©
- åé¤ćå·®ćęæććć§ćć ā GitHub ćć»ć«ććć¹ćć£ć³ć°ćŖć©
ććććÆę¢ć«Nosträøć«ę稿ćććć«ć¹ćæć ēµµęåć®ē»åćå¾ććå¤ę“ć§ćććć©ćććęćć¾ćć
ć©ć®ę¹ę³ć§ćę°ćć使ćććć«ć¹ćæć ēµµęåćå¤ę“ććććØćÆåÆč½ć§ćć
åäøć®ć«ć¹ćæć ēµµęåć»ććć«åäøć®ć·ć§ć¼ćć³ć¼ćć§å„ć®ē»åćē»é²ććå½¢ć§åƾåæć§ćć¾ćć3. ēµµęåć»ććć«ē»é²ćć
emojito ććē»é²ćć¾ćć
å³äøć®ć¢ć¤ć³ć³ ā + New emoji set ććę°č¦ć®ēµµęåć»ćććä½ęć§ćć¾ćć
ā ēµµęåć»ććåćå „å
åŗę¬ēć«ć«ć¹ćæć ēµµęåćÆć«ć¹ćæć ēµµęåć»ćććä½ććć²ćØć¾ćØć¾ćć«ćć¦ē»é²ćć¾ćć
äøåŗ¦ä½ć£ćēµµęåć»ććć«å¾ććēµµęåćčæ½å ććććØćć§ćć¾ćć
ā” ē»åćć¢ćććć¼ćć¾ććÆē»åURLćå „å
emojitoććē»åćć¢ćććć¼ćććå “åććć”ć¤ć«åć«ę„ę¬čŖćŖć©ć®2ćć¤ćęåćå«ć¾ćć¦ćććØć¢ćććć¼ćććØć©ć¼ć«ćŖćććć§ćć
ćć®å “åćÆćć”ć¤ć«åćé©å½ćŖč±ę°åćŖć©ć«å¤ę“ćć¦ćć ććć
⢠絵ęåć®ć·ć§ć¼ćć³ć¼ććå „å
ć·ć§ć¼ćć³ć¼ććÆēµµęåćå¼ć³åŗćęć«ä½æēØććå “åćććć¾ćć
ä»ć®ć«ć¹ćæć ēµµęåćØč¢«ć£ć¦ćåé”ććć¾ćććéøęęć«č¤ę°č”Øē¤ŗććć¦ęÆéćåŗćåÆč½ę§ćććć¾ćć
ä»ćØč¢«ćć«ććé·ććŖććććŖćć·ć§ć¼ćć³ć¼ććčÆćććććć¾ććć
ć·ć§ć¼ćć³ć¼ćć«ä½æććć®ćÆåč§ć®č±ę°åćØć¢ć³ćć¼ćć¼ć®ćæć§ćć
⣠追å
Add ćę¼ćć¦ćć¾ć ä½ęå®äŗć«ćÆćŖćć¾ććć
äøåŗ¦ć«ēµµęåćč¤ę°ē»é²ć§ćć¾ćć
ęå¾ć«å³äøć® Save ćę¼ććØä½ęå®äŗć§ćć
ē»é¢ćåćęæććć®ć§ćå³å“ć® Options ćć Bookmark ćéøęćććØćć®ć«ć¹ćæć ēµµęåć»ćććčŖåć§ä½æććććć«ćŖćć¾ćć
ę¢åć®ēµµęåć»ćććē·Øéććć«ćÆ Options ćć Edit ćéøęćć¾ćć
仄äøć§ćć
ä»ę§
-
@ d61f3bc5:0da6ef4a
2025-05-06 01:37:28I remember the first gathering of Nostr devs two years ago in Costa Rica. We were all psyched because Nostr appeared to solve the problem of self-sovereign online identity and decentralized publishing. The protocol seemed well-suited for textual content, but it wasn't really designed to handle binary files, like images or video.
The Problem
When I publish a note that contains an image link, the note itself is resilient thanks to Nostr, but if the hosting service disappears or takes my image down, my note will be broken forever. We need a way to publish binary data without relying on a single hosting provider.
We were discussing how there really was no reliable solution to this problem even outside of Nostr. Peer-to-peer attempts like IPFS simply didn't work; they were hopelessly slow and unreliable in practice. Torrents worked for popular files like movies, but couldn't be relied on for general file hosting.
Awesome Blossom
A year later, I attended the Sovereign Engineering demo day in Madeira, organized by Pablo and Gigi. Many projects were presented over a three hour demo session that day, but one really stood out for me.
Introduced by hzrd149 and Stu Bowman, Blossom blew my mind because it showed how we can solve complex problems easily by simply relying on the fact that Nostr exists. Having an open user directory, with the corresponding social graph and web of trust is an incredible building block.
Since we can easily look up any user on Nostr and read their profile metadata, we can just get them to simply tell us where their files are stored. This, combined with hash-based addressing (borrowed from IPFS), is all we need to solve our problem.
How Blossom Works
The Blossom protocol (Blobs Stored Simply on Mediaservers) is formally defined in a series of BUDs (Blossom Upgrade Documents). Yes, Blossom is the most well-branded protocol in the history of protocols. Feel free to refer to the spec for details, but I will provide a high level explanation here.
The main idea behind Blossom can be summarized in three points:
- Users specify which media server(s) they use via their public Blossom settings published on Nostr;
- All files are uniquely addressable via hashes;
- If an app fails to load a file from the original URL, it simply goes to get it from the server(s) specified in the user's Blossom settings.
Just like Nostr itself, the Blossom protocol is dead-simple and it works!
Let's use this image as an example:
If you look at the URL for this image, you will notice that it looks like this:
blossom.primal.net/c1aa63f983a44185d039092912bfb7f33adcf63ed3cae371ebe6905da5f688d0.jpg
All Blossom URLs follow this format:
[server]/[file-hash].[extension]
The file hash is important because it uniquely identifies the file in question. Apps can use it to verify that the file they received is exactly the file they requested. It also gives us the ability to reliably get the same file from a different server.
Nostr users declare which media server(s) they use by publishing their Blossom settings. If I store my files on Server A, and they get removed, I can simply upload them to Server B, update my public Blossom settings, and all Blossom-capable apps will be able to find them at the new location. All my existing notes will continue to display media content without any issues.
Blossom Mirroring
Let's face it, re-uploading files to another server after they got removed from the original server is not the best user experience. Most people wouldn't have the backups of all the files, and/or the desire to do this work.
This is where Blossom's mirroring feature comes handy. In addition to the primary media server, a Blossom user can set one one or more mirror servers. Under this setup, every time a file is uploaded to the primary server the Nostr app issues a mirror request to the primary server, directing it to copy the file to all the specified mirrors. This way there is always a copy of all content on multiple servers and in case the primary becomes unavailable, Blossom-capable apps will automatically start loading from the mirror.
Mirrors are really easy to setup (you can do it in two clicks in Primal) and this arrangement ensures robust media handling without any central points of failure. Note that you can use professional media hosting services side by side with self-hosted backup servers that anyone can run at home.
Using Blossom Within Primal
Blossom is natively integrated into the entire Primal stack and enabled by default. If you are using Primal 2.2 or later, you don't need to do anything to enable Blossom, all your media uploads are blossoming already.
To enhance user privacy, all Primal apps use the "/media" endpoint per BUD-05, which strips all metadata from uploaded files before they are saved and optionally mirrored to other Blossom servers, per user settings. You can use any Blossom server as your primary media server in Primal, as well as setup any number of mirrors:
## Conclusion
For such a simple protocol, Blossom gives us three major benefits:
- Verifiable authenticity. All Nostr notes are always signed by the note author. With Blossom, the signed note includes a unique hash for each referenced media file, making it impossible to falsify.
- File hosting redundancy. Having multiple live copies of referenced media files (via Blossom mirroring) greatly increases the resiliency of media content published on Nostr.
- Censorship resistance. Blossom enables us to seamlessly switch media hosting providers in case of censorship.
Thanks for reading; and enjoy! šø
-
@ ec42c765:328c0600
2024-12-13 08:16:32Nostr Advent Calendar 2024 ć® 12ę„ē®ć®čØäŗć§ćć
ęØę„ć® 12/11 㯠ććć® ććć® 2024幓ć®NostrćŖć¬ć¼éå¶ćęÆćčæć ć§ććć
nostr-zap-view ä½ć£ć
ćŖććøććŖ: https://github.com/Lokuyow/nostr-zap-view/
åä½ē¢ŗčŖćć¼ćø: https://lokuyow.github.io/nostr-zap-view/ććä½ļ¼
ē¹å®ć®čŖ°ććä½ćć«å®ć¦ćZapļ¼ęćéļ¼ćäøč¦§ć§ćććć¤
ć
čŖåć®Webćµć¤ćć«čØē½®ć§ćććć¤
čŖåć®ćµć¤ćć«čØē½®ććä¾ * SNSćŖć³ćÆéćć¼ćøļ¼ęäøéØļ¼: https://lokuyow.github.io/
ćććććµććļ¼Zapäøč¦§ććæć³ļ¼: https://osats.money/
ä»ę„ćććććć³ļ¼ęäøéØļ¼: https://lokuyow.github.io/btc-dca-simulator/ćŖćć§ä½ć£ćć®ļ¼
ē§ć®å»å¹“ć®ć¢ććć³ćć«ć¬ć³ćć¼
ćNostrćWebćµć¤ćć«ćććć³ć¤ć³ć®ęćéććæć³ćčØē½®ććććZapć
https://spotlight.soy/detail?article_id=ucd7cbrql/
ćåęć«ćŖć£ć¦ććć©é·ćć®ć§č¦ē“ćć㨠* Zapćććć¤ćÆćććć©Zapč¦ććć¤ććŖćć®ć§ę¬²ćć * ZapćNostrļ¼ć®å øåēćŖkind:1ćÆć©ć¤ć¢ć³ćļ¼å ć ćć«ēććć®ćÆćć£ćććŖć * Webćµć¤ćć®åŗåćććććZapļ¼ēćŖä½ćļ¼ć§ē½®ćęćć£ć¦ę¬²ćććåć ćļ¼
éćØć³ćøćć¢ćéććć°ć©ćć¼
AIć«ć³ć¼ćåŗććć¦ćć ćäŗŗä½ć£ćęę³
ć§ćć
ä½ć£ćęę³2
å®ęćć¦ććę°ä»ććę¬å½ć«ä½ćććć£ććć®
ćććććØććć«ćć®ć¾ć¾Zapć蔨示ć§ććęćć«ććć
ļ¼ććć¾ć§ć”ćććØććåę„ććć°ć§ćŖćļ¼åäŗŗć®ććć°ćHPć®ē«Æć£ćć«ćSponsored byćę¬ććć£ć¦ååć蔨示ćććęć
ććZapć£ć¦ććęåććććć³ć¤ć³ć£ć¦ććęåćNostrćåŗććŖćć¦ćććčŖ¬ęćććŖćć¦ććć®ć§ćÆęććć
ć¤ć”ć¼ćøćÆWebćµć¤ćć対豔ć«ćććć³ćåŗå + ć¹ć¼ćć¼ćć£ćć + ē„ććØćē„社ć®å„ē“č äøč¦§
ć§ęć£ćć®ćÆ
åäŗŗććć®ęćéćŖćęØćę“»ēćŖćć®ć«ćććŖććŖććć©
ä¼ę„ćNostrć«ć¢ć«ć¦ć³ććä½ć£ć¦ćµć¤ćć«ęćéććććä¼ę„ć®åŗåć«ćŖććć§ćÆļ¼ļ¼
~~ä¼ę„ćNostrć«ć¢ć«ć¦ć³ććļ¼ļ¼ććŖćć«ććč¦ćććØćŖćļ¼~~ä»å¾
ęćć¤ććäŗå®ćÆęŖå®
* ććæć³āćć¤ć¢ćć°å½¢å¼ć§ćŖćććć¼ćEmbedå½¢å¼ć«ćć¦ćć¼ćøć¢ćÆć»ć¹ć§ććč¦ććććć«ćć * å¤åćŖć¬ć¼ć«č² č·ććććć®ć§ćŖćććć * Zapć®ęåćÆåŗćććSponsored byćēć«ćć * åē“ćŖęę°é ć§ćŖććć * å°é”ZapćććŖćć³ć° * äøå®ęéļ¼äøćęćŖć©ļ¼ććØć§éé”é ć«ć½ć¼ć * å¤åćŖć¬ć¼ć«č² č·ććććć®ć§ćŖćććć * ä»ćÆę稿å®ć¦ć®ZapćWebćµć¤ćå®ć¦ć®ZapćØåęć«čØćå¼µć£ć¦ćć ććŖć®ć§ć”ćććØWebćµć¤ćå®ć¦ć®Zapć«ćć * NIPć®ęę”ćåæ č¦ * ć¦ć©ć¬ććć®ęŗę ćåæ č¦ * ćŖć¬ć¼ļ¼wss://~ļ¼å®ć¦ć®Zapćć§ćć¦ć»ććå°ę„
ć¤ć³ćæć¼ćććć®ćć¹ć¦ć«ęćéćććć
ććć
ęę„㯠mono ććć® Open Sats ē³č«ē·Ø ć§ćļ¼ļ¼
-
@ 6e64b83c:94102ee8
2025-05-05 16:50:13Nostr-static is a powerful static site generator that transforms long-form Nostr content into beautiful, standalone websites. It makes your content accessible to everyone, even those not using Nostr clients. For more information check out my previous blog post How to Create a Blog Out of Nostr Long-Form Articles
What's New in Version 0.7?
RSS and Atom Feeds
Version 0.7 brings comprehensive feed support with both RSS and Atom formats. The system automatically generates feeds for your main content, individual profiles, and tag-specific pages. These feeds are seamlessly integrated into your site's header, making them easily discoverable by feed readers and content aggregators.
This feature bridges the gap between Nostr and traditional web publishing, allowing your content to reach readers who prefer feed readers or automated content distribution systems.
Smart Content Discovery
The new tag discovery system enhances your readers' experience by automatically finding and recommending relevant articles from the Nostr network. It works by:
- Analyzing the tags in your articles
- Fetching popular articles from Nostr that share these tags
- Using configurable weights to rank these articles based on:
- Engagement metrics (reactions, reposts, replies)
- Zap statistics (amount, unique zappers, average zap size)
- Content quality signals (report penalties)
This creates a dynamic "Recommended Articles" section that helps readers discover more content they might be interested in, all while staying within the Nostr ecosystem.
See the new features yourself by visiting our demo at: https://blog.nostrize.me
-
@ 6e0ea5d6:0327f353
2025-05-04 14:53:42Amico mio, ascolta bene!
Without hesitation, the woman you attract with lies is not truly yours. Davvero, she is the temporary property of the illusion youāve built to seduce her. And every illusion, sooner or later, crumbles.
Weak men sell inflated versions of themselves. They talk about what they donāt have, promise what they canāt sustain, adorn their empty selves with words that are nothing more than a coat of paint. And they do this thinking that, later, theyāll be able to "show who they really are." Fatal mistake, cazzo!
The truth, amico mio, is not something that appears at the end. It is what holds up the whole beginning.
The woman who approaches a lie may smile at first ā but she is smiling at the theater, not at the actor. When the curtains fall, what she will see is not a man. It will be a character tired of performing, begging for love from a self-serving audience in the front row.
Thatās why I always point out that lying to win a womanās heart is the same as sabotaging your own nature. The woman who comes through an invented version of you will be the first to leave when the veil of lies tears apart. Not out of cruelty, but out of consistency with her own interest. Fine... She didnāt leave you, but rather, that version of yourself never truly existed to be left behind.
A worthy man presents himself without deceptive adornments. And those who stay, stay because they know exactly who they are choosing as a man. Thatās what differentiates forged seduction from the convenience of love built on honor, loyalty, and respect.
Ah, amico mio, I remember well. It was lunch on an autumn day in Catania. Mediterranean heat, and the Nero D'Avola wine from midday clinging to the lips like dried blood. Sitting in the shade of a lemon tree planted right by my grandfather's vineyard entrance, my uncle ā the oldest of my fatherās brothers ā spoke little, but when he called us to sit by his side, all the nephews would quiet down to listen. And in my youth, he told me something that has never left my mind.
āIn Sicily, the woman who endures the silence of a man about his business is more loyal than the one who is enchanted by speeches about what he does or how much he earns. PerchĆØ, figlio mio, the first one has seen the truth. The second one, only a false shine.ā
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "š„" as a token of appreciation.
A toast to our family!
-
@ 266815e0:6cd408a5
2025-05-02 22:24:59Its been six long months of refactoring code and building out to the applesauce packages but the app is stable enough for another release.
This update is pretty much a full rewrite of the non-visible parts of the app. all the background services were either moved out to the applesauce packages or rewritten, the result is that noStrudel is a little faster and much more consistent with connections and publishing.
New layout
The app has a new layout now, it takes advantage of the full desktop screen and looks a little better than it did before.
Removed NIP-72 communities
The NIP-72 communities are no longer part of the app, if you want to continue using them there are still a few apps that support them ( like satellite.earth ) but noStrudel won't support them going forward.
The communities where interesting but ultimately proved too have some fundamental flaws, most notably that all posts had to be approved by a moderator. There were some good ideas on how to improve it but they would have only been patches and wouldn't have fixed the underlying issues.
I wont promise to build it into noStrudel, but NIP-29 (relay based groups) look a lot more promising and already have better moderation abilities then NIP-72 communities could ever have.
Settings view
There is now a dedicated settings view, so no more hunting around for where the relays are set or trying to find how to add another account. its all in one place now
Cleaned up lists
The list views are a little cleaner now, and they have a simple edit modal
New emoji picker
Just another small improvement that makes the app feel more complete.
Experimental Wallet
There is a new "wallet" view in the app that lets you manage your NIP-60 cashu wallet. its very experimental and probably won't work for you, but its there and I hope to finish it up so the app can support NIP-61 nutzaps.
WARNING: Don't feed the wallet your hard earned sats, it will eat them!
Smaller improvements
- Added NSFW flag for replies
- Updated NIP-48 bunker login to work with new spec
- Linkfy BIPs
- Added 404 page
- Add NIP-22 comments under badges, files, and articles
- Add max height to timeline notes
- Fix articles view freezing on load
- Add option to mirror blobs when sharing notes
- Remove "open in drawer" for notes
-
@ 6bcc27d2:b67d296e
2024-10-21 03:54:32yugoć§ćć ćć®čØäŗćÆćNostrasia2024 éć¢ććć³ćć«ć¬ć³ćć¼ć10/19ć®åć§ććNostrasiać®å½ę„ćÆćŖć¢ć«ćæć¤ć ć§é äæ”ćč¦č“ćć¦ćć¾ćććNostrć使ć£ć¦ć¢ććŖć±ć¼ć·ć§ć³ć®åēŗęććć¹ććØććēŗč”Øćč“ććčŖåć ć£ććć©ććŖćć®ćä½ć£ć¦ćæććććčćć¦å°ćčŖæć¹ćć試ćæććććć®ć§ćć®čØé²ćęøćć¾ććć¾ććč¶ ē°”åćŖćć®ć§ććććććäøēåćØćŖćvisionOS対åæć®NostrćÆć©ć¤ć¢ć³ććć¤ćć£ć¦ćæćć®ć§ęå¾ć®ę¹ć«ē“¹ä»ćć¾ćć
ć¢ććŖć±ć¼ć·ć§ć³ćåēŗęćć話ććć£ćć®ćÆććWhat is Nostr Other Stuff?ććØé”ććkaijiććć®ēŗč”Øć§ććć
Nostrćććć³ć«ć使ć£ć¦ę¢åć®ć¢ććŖć±ć¼ć·ć§ć³ćåēŗęććććØć§ćć¦ć¼ć¶ä½éØćęćŖććć«ćććććŖåę£ćäæćććØćć§ćććććć³ć«ćØćć¦ć®Nostrćęé·ćć¦ćććØćććććŖå 容ć§ććć
čŖåćÆć¾ć Nostrć§ä½ććć¤ćć£ćēµéØćÆćŖćć£ćć®ć§ćå®č£ ć«åæ č¦ćŖä»ę§ć®ē„čćć»ćØćć©ćŖćē¶ę ććć©ć®ćććŖć¢ććŖć±ć¼ć·ć§ć³ćć¤ćć£ć¦ćæććććčćć¾ććć
ęåć«ęćć¤ććć®ćÆćScrapboxć®ćććŖććććÆć¼ćÆåć®ćć¬ććøćć¼ć¹ć§ććčŖåćÆęčævisionOSåå¼·ä¼ććć£ć¦ćććåå¼·ä¼ć§ćć¬ććøćå ±ęććęꮵćØćć¦Scrapboxć®å°å „ćę¤čØćć¦ćć¾ććć
Nostrć³ćć„ććć£ć«ćęåæć«ććScrapboxćććć¾ćććNostrćÆć©ć¤ć¢ć³ććććć°ććć使ćć ććććåććććć®å®ēØę§ćåćććÆć©ć¤ć¢ć³ććÆć¾ć ååØććŖćć®ć§ćÆćŖćććØććč¦ē«ć¦ć§ććć
é·ęę稿ćpublic chatćŖć©ć®ę©č½ćēµćæåćććććØć§å®ē¾ć§ććć ććććććęć£ć¦ććē¢å ćNIP-54ć®WikićØććč¦ę ¼ćććććØćē„ćć¾ććć
https://github.com/nostr-protocol/nips/blob/master/54.md
ć¾ć ć”ćććØćÆčŖćć¦ććŖćć§ćććScrapboxćwikić½ććć¦ć§ć¢ć ćåčć«ćŖććććØęć£ć¦ćć¾ććę£å¼ćŖä»ę§ć«ēµćæč¾¼ć¾ćć¦ććŖćććć§ćę”ēØćć¦ćććÆć©ć¤ć¢ć³ććÆfiatjafć«ćććŖćć”ć¬ć³ć¹å®č£ (?)ć®wikistrćććććč¦ć¤ććć¾ććć§ććć
Scrapboxć®ćććŖćć¬ććøćć¼ć¹ćåæåććNostrćÆć©ć¤ć¢ć³ććććć°ćå¾čæ°ććvisionOS対åæćÆć©ć¤ć¢ć³ćć®ååØćććć¢ć«ć¦ć³ćć使ćć¾ććć¦å¬ććć®ć§č©¦ćć¦ćæććć§ććććä»ć«ćä¼¼ććććŖćµć¼ćć¹ćć©ćŖććē„ć£ć¦ćććęćć¦ćć ććć
ć¾ćē¾åØćÆćåå¼·ä¼ććÆć¼ćÆć·ć§ćććććć«ć½ć³ćŖć©ć®ć³ć©ćć¬ć¼ć·ć§ć³ćÆć¼ćÆćęÆę“ććććć®ćć¼ć«ćčŖåćć”ć§ćéēŗćć¦ćć¾ććApple Vision Proć«ęč¼ććć¦ććvisionOSćØćććć©ćććć©ć¼ć ć§åä½ćć¾ćć
https://image.nostr.build/14f0c1b8fbe5ce7754825c01b09280a4c22f87bbf3c2fa6d60dd724f98919c34.png
ćć®ē»é¢ć§čŖåćå „ćććć¹ćć¼ć¹ćéøćć§å ±ęä½éØćéå§ćć¾ćć
ć¹ć©ć¤ććŖć©ć®ć³ć³ćć³ććčŖćć®ć¢ććæć¼ćåęćććććØć§ćé éå°ć«ćć¦ćć¾ćć§ćŖćć©ć¤ć³ćć®ććć«åć空éćå ±ęććććØćåÆč½ć«ćŖćć¾ćć
https://image.nostr.build/cfb75d3db2a9b9cd39f502d6426d5ef4f264b3d5d693b6fc9762735d2922b85c.jpg
ćØććććØćŖć®ć§ćę„é½visionOS対åæć®ćÆć©ć¤ć¢ć³ććä½ć£ć¦ćæć¾ćććę¤ē“¢ćć¦ć1ć¤ćäŗä¾ćåŗć¦ććŖćć£ćć®ć§å¤åć¾ć äøēć§å®č£ ćć¦ććć¢ććŖćÆćŖćć®ć§ćÆćŖćć§ććććć
ćØćÆććććÆć©ć¤ć¢ć³ććåä¹ć£ć¦ćććć®ć®ć¾ć 大ććę©č½ćÆćŖćććŖć¬ć¼ćććć¼ćæćåå¾ććć ćć®čŖćæåćå°ēØć§ćć
https://image.nostr.build/96e088cc6a082528682989ccc12b4312f9cb6277656e491578e32a0851ce50fe.png
ē»åć§ćÆčŖåć®ćććć£ć¼ć«ćć¼ćæććŖć¬ć¼ććåå¾ćć¦ćć¾ćć
ć¾ć ć©ć®ć©ć¤ćć©ćŖćvisionOSć«åƾåæćć¦ććŖćć£ććć§ęććć£ććć®ć®ä»ę§ć®åå¼·ć«ćŖćć¾ććć
ćć visionOSć¢ććŖćÆiOSć¢ććŖåę§NIP-7ć使ććŖćć®ć§ē§åÆéµćčŖåć§äæē®”ććŖćć¦ćÆćŖćććä»å¾ć©ć対å¦ćć¹ćććććććć¦ćć¾ććććććęéććęć«å°ććć¤čŖæć¹ć¦ććććØęć£ć¦ćć¾ććććć¤ćć£ćć¢ććŖć®ē§åÆéµåØććÆćć¾ććŖć½ć¼ć¹ćå¤ććŖćććć«ćęćć¾ćććććć©ćŖćććć®č¾ŗć®å®č£ ć«č©³ććę¹ćććęćć¦ććć ćććØå¬ććć§ćć
ęŗåćć§ććććć®ćć”ć³ć¼ććå ¬éććććØęć£ć¦ćć¾ćć
ććććå°ććć¤č²ććŖę©č½ćå®č£ ććŖććNostrć§éćć§ććććć§ćļ¼
-
@ 088436cd:9d2646cc
2025-05-01 21:01:55The arrival of the coronavirus brought not only illness and death but also fear and panic. In such an environment of uncertainty, people have naturally stocked up on necessities, not knowing when things will return to normal.
Retail shelves have been cleared out, and even online suppliers like Amazon and Walmart are out of stock for some items. Independent sellers on these e-commerce platforms have had to fill the gap. With the huge increase in demand, they have found that their inventory has skyrocketed in value.
Many in need of these items (e.g. toilet paper, hand sanitizer and masks) balk at the new prices. They feel they are being taken advantage of in a time of need and call for intervention by the government to lower prices. The government has heeded that call, labeling the independent sellers as "price gougers" and threatening sanctions if they don't lower their prices. Amazon has suspended seller accounts and law enforcement at all levels have threatened to prosecute. Prices have dropped as a result and at first glance this seems like a victory for fair play. But, we will have to dig deeper to understand the unseen consequences of this intervention.
We must look at the economics of the situation, how supply and demand result in a price and how that price acts as a signal that goes out to everyone, informing them of underlying conditions in the economy and helping coordinate their actions.
It all started with a rise in demand. Given a fixed supply (e.g., the limited stock on shelves and in warehouses), an increase in demand inevitably leads to higher prices. Most people are familiar with this phenomenon, such as paying more for airline tickets during holidays or surge pricing for rides.
Higher prices discourage less critical uses of scarce resources. For example, you might not pay $1,000 for a plane ticket to visit your aunt if you can get one for $100 the following week, but someone else might pay that price to visit a dying relative. They value that plane seat more than you.
*** During the crisis, demand surged and their shelves emptied even though
However, retail outlets have not raised prices. They have kept them low, so the low-value uses of things like toilet paper, masks and hand sanitizer has continued. Often, this "use" just takes the form of hoarding. At everyday low prices, it makes sense to buy hundreds of rolls and bottles. You know you will use them eventually, so why not stock up? And, with all those extra supplies in the closet and basement, you don't need to change your behavior much. You don't have to ration your use.
At the low prices, these scarce resources got bought up faster and faster until there was simply none left. The reality of the situation became painfully clear to those who didn't panic and got to the store late: You have no toilet paper and you're not going to any time soon.
However, if prices had been allowed to rise, a number of effects would have taken place that would have coordinated the behavior of everyone so that valuable resources would not have been wasted or hoarded, and everyone could have had access to what they needed.
On the demand side, if prices had been allowed to rise, people would have begun to self-ration. You might leave those extra plies on the roll next time if you know they will cost ten times as much to replace. Or, you might choose to clean up a spill with a rag rather than disposable tissue. Most importantly, you won't hoard as much. That 50th bottle of hand sanitizer might just not be worth it at the new, high price. You'll leave it on the shelf for someone else who may have none.
On the supply side, higher prices would have incentivized people to offer up more of their stockpiles for sale. If you have a pallet full of toilet paper in your basement and all of the sudden they are worth $15 per roll, you might just list a few online. But, if it is illegal to do so, you probably won't.
Imagine you run a business installing insulation and have a few thousand respirator masks on hand for your employees. During a pandemic, it is much more important that people breathe filtered air than that insulation get installed, and that fact is reflected in higher prices. You will sell your extra masks at the higher price rather than store them for future insulation jobs, and the scarce resource will be put to its most important use.
Producers of hand sanitizer would go into overdrive if prices were allowed to rise. They would pay their employees overtime, hire new ones, and pay a premium for their supplies, making sure their raw materials don't go to less important uses.
These kinds of coordinated actions all across the economy would be impossible without real prices to guide them. How do you know if it makes sense to spend an extra $10k bringing a thousand masks to market unless you know you can get more than $10 per mask? If the price is kept artificially low, you simply can't do it. The money just isn't there.
These are the immediate effects of a price change, but incredibly, price changes also coordinate people's actions across space and time.
Across space, there are different supply and demand conditions in different places, and thus prices are not uniform. We know some places are real "hot spots" for the virus, while others are mostly unaffected. High demand in the hot spots leads to higher prices there, which attracts more of the resource to those areas. Boxes and boxes of essential items would pour in where they are needed most from where they are needed least, but only if prices were allowed to adjust freely.
This would be accomplished by individuals and businesses buying low in the unaffected areas, selling high in the hot spots and subtracting their labor and transportation costs from the difference. Producers of new supply would know exactly where it is most needed and ship to the high-demand, high-price areas first. The effect of these actions is to increase prices in the low demand areas and reduce them in the high demand areas. People in the low demand areas will start to self-ration more, reflecting the reality of their neighbors, and people in the hotspots will get some relief.
However, by artificially suppressing prices in the hot spot, people there will simply buy up the available supply and run out, and it will be cost prohibitive to bring in new supply from low-demand areas.
Prices coordinate economic actions across time as well. Just as entrepreneurs and businesses can profit by transporting scarce necessities from low-demand to high-demand areas, they can also profit by buying in low-demand times and storing their merchandise for when it is needed most.
Just as allowing prices to freely adjust in one area relative to another will send all the right signals for the optimal use of a scarce resource, allowing prices to freely adjust over time will do the same.
When an entrepreneur buys up resources during low-demand times in anticipation of a crisis, she restricts supply ahead of the crisis, which leads to a price increase. She effectively bids up the price. The change in price affects consumers and producers in all the ways mentioned above. Consumers self-ration more, and producers bring more of the resource to market.
Our entrepreneur has done a truly incredible thing. She has predicted the future, and by so doing has caused every individual in the economy to prepare for a shortage they don't even know is coming! And, by discouraging consumption and encouraging production ahead of time, she blunts the impact the crisis will have. There will be more of the resource to go around when it is needed most.
On top of this, our entrepreneur still has her stockpile she saved back when everyone else was blithely using it up. She can now further mitigate the damage of the crisis by selling her stock during the worst of it, when people are most desperate for relief. She will know when this is because the price will tell her, but only if it is allowed to adjust freely. When the price is at its highest is when people need the resource the most, and those willing to pay will not waste it or hoard it. They will put it to its highest valued use.
The economy is like a big bus we are all riding in, going down a road with many twists and turns. Just as it is difficult to see into the future, it is difficult to see out the bus windows at the road ahead.
On the dashboard, we don't have a speedometer or fuel gauge. Instead we have all the prices for everything in the economy. Prices are what tell us the condition of the bus and the road. They tell us everything. Without them, we are blind.
Good times are a smooth road. Consumer prices and interest rates are low, investment returns are steady. We hit the gas and go fast. But, the road is not always straight and smooth. Sometimes there are sharp turns and rough patches. Successful entrepreneurs are the ones who can see what is coming better than everyone else. They are our navigators.
When they buy up scarce resources ahead of a crisis, they are hitting the brakes and slowing us down. When they divert resources from one area to another, they are steering us onto a smoother path. By their actions in the market, they adjust the prices on our dashboard to reflect the conditions of the road ahead, so we can prepare for, navigate and get through the inevitable difficulties we will face.
Interfering with the dashboard by imposing price floors or price caps doesn't change the conditions of the road (the number of toilet paper rolls in existence hasn't changed). All it does is distort our perception of those conditions. We think the road is still smooth--our heavy foot stomping the gas--as we crash onto a rocky dirt road at 80 miles per hour (empty shelves at the store for weeks on end).
Supply, demand and prices are laws of nature. All of this is just how things work. It isn't right or wrong in a moral sense. Price caps lead to waste, shortages and hoarding as surely as water flows downhill. The opposite--allowing prices to adjust freely--leads to conservation of scarce resources and their being put to their highest valued use. And yes, it leads to profits for the entrepreneurs who were able to correctly predict future conditions, and losses for those who weren't.
Is it fair that they should collect these profits? On the one hand, anyone could have stocked up on toilet paper, hand sanitizer and face masks at any time before the crisis, so we all had a fair chance to get the supplies cheaply. On the other hand, it just feels wrong that some should profit so much at a time when there is so much need.
Our instinct in the moment is to see the entrepreneur as a villain, greedy "price gouger". But we don't see the long chain of economic consequences the led to the situation we feel is unfair.
If it weren't for anti-price-gouging laws, the major retailers would have raised their prices long before the crisis became acute. When they saw demand outstrip supply, they would have raised prices, not by 100 fold, but gradually and long before anyone knew how serious things would have become. Late comers would have had to pay more, but at least there would be something left on the shelf.
As an entrepreneur, why take risks trying to anticipate the future if you can't reap the reward when you are right? Instead of letting instead of letting entrepreneurs--our navigators--guide us, we are punishing and vilifying them, trying to force prices to reflect a reality that simply doesn't exist.
In a crisis, more than any other time, prices must be allowed to fluctuate. To do otherwise is to blind ourselves at a time when danger and uncertainty abound. It is economic suicide.
In a crisis, there is great need, and the way to meet that need is not by pretending it's not there, by forcing prices to reflect a world where there isn't need. They way to meet the need is the same it has always been, through charity.
If the people in government want to help, the best way for the to do so is to be charitable and reduce their taxes and fees as much as possible, ideally to zero in a time of crisis. Amazon, for example, could instantly reduce the price of all crisis related necessities by 20% if they waived their fee. This would allow for more uses by more people of these scarce supplies as hoarders release their stockpiles on to the market, knowing they can get 20% more for their stock. Governments could reduce or eliminate their tax burden on high-demand, crisis-related items and all the factors that go into their production, with the same effect: a reduction in prices and expansion of supply. All of us, including the successful entrepreneurs and the wealthy for whom high prices are not a great burden, could donate to relief efforts.
These ideas are not new or untested. This is core micro economics. It has been taught for hundreds of years in universities the world over. The fact that every crisis that comes along stirs up ire against entrepreneurs indicates not that the economics is wrong, but that we have a strong visceral reaction against what we perceive to be unfairness. This is as it should be. Unfairness is wrong and the anger it stirs in us should compel us to right the wrong. Our anger itself isn't wrong, it's just misplaced.
Entrepreneurs didn't cause the prices to rise. Our reaction to a virus did that. We saw a serious threat and an uncertain future and followed our natural impulse to hoard. Because prices at major retail suppliers didn't rise, that impulse ran rampant and we cleared the shelves until there was nothing left. We ran the bus right off the road and them blamed the entrepreneurs for showing us the reality of our situation, for shaking us out of the fantasy of low prices.
All of this is not to say that entrepreneurs are high-minded public servants. They are just doing their job. Staking your money on an uncertain future is a risky business. There are big risks and big rewards. Most entrepreneurs just scrape by or lose their capital in failed ventures.
However, the ones that get it right must be allowed to keep their profits, or else no one will try and we'll all be driving blind. We need our navigators. It doesn't even matter if they know all the positive effects they are having on the rest of us and the economy as a whole. So long as they are buying low and selling high--so long as they are doing their job--they will be guiding the rest of us through the good times and the bad, down the open road and through the rough spots.
-
@ 21335073:a244b1ad
2025-05-01 01:51:10Please respect Virginia Giuffreās memory by refraining from asking about the circumstances or theories surrounding her passing.
Since Virginia Giuffreās death, Iāve reflected on what she would want me to say or do. This piece is my attempt to honor her legacy.
When I first spoke with Virginia, I was struck by her unshakable hope. I had grown cynical after years in the anti-human trafficking movement, worn down by a broken system and a government that often seemed complicit. But Virginiaās passion, creativity, and belief that survivors could be heard reignited something in me. She reminded me of my younger, more hopeful self. Instead of warning her about the challenges ahead, I let her dream big, unburdened by my own disillusionment. That conversation changed me for the better, and following her lead led to meaningful progress.
Virginia was one of the bravest people Iāve ever known. As a survivor of Epstein, Maxwell, and their co-conspirators, she risked everything to speak out, taking on some of the worldās most powerful figures.
She loved when I said, āEpstein isnāt the only Epstein.ā This wasnāt just about one manāit was a call to hold all abusers accountable and to ensure survivors find hope and healing.
The Epstein case often gets reduced to sensational details about the elite, but that misses the bigger picture. Yes, we should be holding all of the co-conspirators accountable, we must listen to the survivorsā stories. Their experiences reveal how predators exploit vulnerabilities, offering lessons to prevent future victims.
Youāre not powerless in this fight. Educate yourself about trafficking and abuseāonline and offlineāand take steps to protect those around you. Supporting survivors starts with small, meaningful actions. Free online resources can guide you in being a safe, supportive presence.
When high-profile accusations arise, resist snap judgments. Instead of dismissing survivors as ācrazy,ā pause to consider the trauma they may be navigating. Speaking out or coping with abuse is never easy. You donāt have to believe every claim, but you can refrain from attacking accusers online.
Society also fails at providing aftercare for survivors. The government, often part of the problem, wonāt solve this. Itās up to us. Prevention is critical, but when abuse occurs, step up for your loved ones and community. Protect the vulnerable. itās a challenging but a rewarding journey.
If youāre contributing to Nostr, youāre helping build a censorship resistant platform where survivors can share their stories freely, no matter how powerful their abusers are. Their voices can endure here, offering strength and hope to others. This gives me great hope for the future.
Virginia Giuffreās courage was a gift to the world. It was an honor to know and serve her. She will be deeply missed. My hope is that her story inspires others to take on the powerful.
-
@ 3bf0c63f:aefa459d
2024-09-06 12:49:46Nostr: a quick introduction, attempt #2
Nostr doesn't subscribe to any ideals of "free speech" as these belong to the realm of politics and assume a big powerful government that enforces a common ruleupon everybody else.
Nostr instead is much simpler, it simply says that servers are private property and establishes a generalized framework for people to connect to all these servers, creating a true free market in the process. In other words, Nostr is the public road that each market participant can use to build their own store or visit others and use their services.
(Of course a road is never truly public, in normal cases it's ran by the government, in this case it relies upon the previous existence of the internet with all its quirks and chaos plus a hand of government control, but none of that matters for this explanation).
More concretely speaking, Nostr is just a set of definitions of the formats of the data that can be passed between participants and their expected order, i.e. messages between clients (i.e. the program that runs on a user computer) and relays (i.e. the program that runs on a publicly accessible computer, a "server", generally with a domain-name associated) over a type of TCP connection (WebSocket) with cryptographic signatures. This is what is called a "protocol" in this context, and upon that simple base multiple kinds of sub-protocols can be added, like a protocol for "public-square style microblogging", "semi-closed group chat" or, I don't know, "recipe sharing and feedback".
-
@ 0176967e:1e6f471e
2024-07-28 15:31:13Objavte, ako avatari a pseudonymnĆ© identity ovplyvÅujĆŗ riadenie kryptokomunĆt a decentralizovaných organizĆ”ciĆ (DAOs). V tejto prednÔŔke sa zameriame na praktickĆ© fungovanie decentralizovanĆ©ho rozhodovania, vytvĆ”ranie a sprĆ”vu avatarových profilov, a ich rolu v online reputaÄných systĆ©moch. NauÄĆte sa, ako si vytvoriÅ„ efektĆvny pseudonymný profil, zapojiÅ„ sa do rĆ“znych krypto projektov a využiÅ„ svoje aktivity na zarĆ”banie kryptomien. PreskĆŗmame aj prĆklady ĆŗspeÅ”ných projektov a stratĆ©gie, ktorĆ© vĆ”m pomÓžu zorientovaÅ„ sa a uspieÅ„ v dynamickom svete decentralizovaných komunĆt.
-
@ a008def1:57a3564d
2025-04-30 17:52:11A Vision for #GitViaNostr
Git has long been the standard for version control in software development, but over time, we has lost its distributed nature. Originally, Git used open, permissionless email for collaboration, which worked well at scale. However, the rise of GitHub and its centralized pull request (PR) model has shifted the landscape.
Now, we have the opportunity to revive Git's permissionless and distributed nature through Nostr!
Weāve developed tools to facilitate Git collaboration via Nostr, but there are still significant friction that prevents widespread adoption. This article outlines a vision for how we can reduce those barriers and encourage more repositories to embrace this approach.
First, weāll review our progress so far. Then, weāll propose a guiding philosophy for our next steps. Finally, weāll discuss a vision to tackle specific challenges, mainly relating to the role of the Git server and CI/CD.
I am the lead maintainer of ngit and gitworkshop.dev, and Iāve been fortunate to work full-time on this initiative for the past two years, thanks to an OpenSats grant.
How Far Weāve Come
The aim of #GitViaNostr is to liberate discussions around code collaboration from permissioned walled gardens. At the core of this collaboration is the process of proposing and applying changes. That's what we focused on first.
Since Nostr shares characteristics with email, and with NIP34, weāve adopted similar primitives to those used in the patches-over-email workflow. This is because of their simplicity and that they donāt require contributors to host anything, which adds reliability and makes participation more accessible.
However, the fork-branch-PR-merge workflow is the only model many developers have known, and changing established workflows can be challenging. To address this, we developed a new workflow that balances familiarity, user experience, and alignment with the Nostr protocol: the branch-PR-merge model.
This model is implemented in ngit, which includes a Git plugin that allows users to engage without needing to learn new commands. Additionally, gitworkshop.dev offers a GitHub-like interface for interacting with PRs and issues. We encourage you to try them out using the quick start guide and share your feedback. You can also explore PRs and issues with gitplaza.
For those who prefer the patches-over-email workflow, you can still use that approach with Nostr through gitstr or the
ngit send
andngit list
commands, and explore patches with patch34.The tools are now available to support the core collaboration challenge, but we are still at the beginning of the adoption curve.
Before we dive into the challengesāsuch as why the Git server setup can be jarring and the possibilities surrounding CI/CDāletās take a moment to reflect on how we should approach the challenges ahead of us.
Philosophy
Here are some foundational principles I shared a few years ago:
- Let Git be Git
- Let Nostr be Nostr
- Learn from the successes of others
Iād like to add one more:
- Embrace anarchy and resist monolithic development.
Micro Clients FTW
Nostr celebrates simplicity, and we should strive to maintain that. Monolithic developments often lead to unnecessary complexity. Projects like gitworkshop.dev, which aim to cover various aspects of the code collaboration experience, should not stifle innovation.
Just yesterday, the launch of following.space demonstrated how vibe-coded micro clients can make a significant impact. They can be valuable on their own, shape the ecosystem, and help push large and widely used clients to implement features and ideas.
The primitives in NIP34 are straightforward, and if there are any barriers preventing the vibe-coding of a #GitViaNostr app in an afternoon, we should work to eliminate them.
Micro clients should lead the way and explore new workflows, experiences, and models of thinking.
Take kanbanstr.com. It provides excellent project management and organization features that work seamlessly with NIP34 primitives.
From kanban to code snippets, from CI/CD runners to SatShootāmay a thousand flowers bloom, and a thousand more after them.
Friction and Challenges
The Git Server
In #GitViaNostr, maintainers' branches (e.g.,
master
) are hosted on a Git server. Hereās why this approach is beneficial:- Follows the original Git vision and the "let Git be Git" philosophy.
- Super efficient, battle-tested, and compatible with all the ways people use Git (e.g., LFS, shallow cloning).
- Maintains compatibility with related systems without the need for plugins (e.g., for build and deployment).
- Only repository maintainers need write access.
In the original Git model, all users would need to add the Git server as a 'git remote.' However, with ngit, the Git server is hidden behind a Nostr remote, which enables:
- Hiding complexity from contributors and users, so that only maintainers need to know about the Git server component to start using #GitViaNostr.
- Maintainers can easily swap Git servers by updating their announcement event, allowing contributors/users using ngit to automatically switch to the new one.
Challenges with the Git Server
While the Git server model has its advantages, it also presents several challenges:
- Initial Setup: When creating a new repository, maintainers must select a Git server, which can be a jarring experience. Most options come with bloated social collaboration features tied to a centralized PR model, often difficult or impossible to disable.
-
Manual Configuration: New repositories require manual configuration, including adding new maintainers through a browser UI, which can be cumbersome and time-consuming.
-
User Onboarding: Many Git servers require email sign-up or KYC (Know Your Customer) processes, which can be a significant turn-off for new users exploring a decentralized and permissionless alternative to GitHub.
Once the initial setup is complete, the system works well if a reliable Git server is chosen. However, this is a significant "if," as we have become accustomed to the excellent uptime and reliability of GitHub. Even professionally run alternatives like Codeberg can experience downtime, which is frustrating when CI/CD and deployment processes are affected. This problem is exacerbated when self-hosting.
Currently, most repositories on Nostr rely on GitHub as the Git server. While maintainers can change servers without disrupting their contributors, this reliance on a centralized service is not the decentralized dream we aspire to achieve.
Vision for the Git Server
The goal is to transform the Git server from a single point of truth and failure into a component similar to a Nostr relay.
Functionality Already in ngit to Support This
-
State on Nostr: Store the state of branches and tags in a Nostr event, removing reliance on a single server. This validates that the data received has been signed by the maintainer, significantly reducing the trust requirement.
-
Proxy to Multiple Git Servers: Proxy requests to all servers listed in the announcement event, adding redundancy and eliminating the need for any one server to match GitHub's reliability.
Implementation Requirements
To achieve this vision, the Nostr Git server implementation should:
-
Implement the Git Smart HTTP Protocol without authentication (no SSH) and only accept pushes if the reference tip matches the latest state event.
-
Avoid Bloat: There should be no user authentication, no database, no web UI, and no unnecessary features.
-
Automatic Repository Management: Accept or reject new repositories automatically upon the first push based on the content of the repository announcement event referenced in the URL path and its author.
Just as there are many free, paid, and self-hosted relays, there will be a variety of free, zero-step signup options, as well as self-hosted and paid solutions.
Some servers may use a Web of Trust (WoT) to filter out spam, while others might impose bandwidth or repository size limits for free tiers or whitelist specific npubs.
Additionally, some implementations could bundle relay and blossom server functionalities to unify the provision of repository data into a single service. These would likely only accept content related to the stored repositories rather than general social nostr content.
The potential role of CI / CD via nostr DVMs could create the incentives for a market of highly reliable free at the point of use git servers.
This could make onboarding #GitViaNostr repositories as easy as entering a name and selecting from a multi-select list of Git server providers that announce via NIP89.
!(image)[https://image.nostr.build/badedc822995eb18b6d3c4bff0743b12b2e5ac018845ba498ce4aab0727caf6c.jpg]
Git Client in the Browser
Currently, many tasks are performed on a Git server web UI, such as:
- Browsing code, commits, branches, tags, etc.
- Creating and displaying permalinks to specific lines in commits.
- Merging PRs.
- Making small commits and PRs on-the-fly.
Just as nobody goes to the web UI of a relay (e.g., nos.lol) to interact with notes, nobody should need to go to a Git server to interact with repositories. We use the Nostr protocol to interact with Nostr relays, and we should use the Git protocol to interact with Git servers. This situation has evolved due to the centralization of Git servers. Instead of being restricted to the view and experience designed by the server operator, users should be able to choose the user experience that works best for them from a range of clients. To facilitate this, we need a library that lowers the barrier to entry for creating these experiences. This library should not require a full clone of every repository and should not depend on proprietary APIs. As a starting point, I propose wrapping the WASM-compiled gitlib2 library for the web and creating useful functions, such as showing a file, which utilizes clever flags to minimize bandwidth usage (e.g., shallow clone, noblob, etc.).
This approach would not only enhance clients like gitworkshop.dev but also bring forth a vision where Git servers simply run the Git protocol, making vibe coding Git experiences even better.
song
nostr:npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6 created song with a complementary vision that has shaped how I see the role of the git server. Its a self-hosted, nostr-permissioned git server with a relay baked in. Its currently a WIP and there are some compatability with ngit that we need to work out.
We collaborated on the nostr-permissioning approach now reflected in nip34.
I'm really excited to see how this space evolves.
CI/CD
Most projects require CI/CD, and while this is often bundled with Git hosting solutions, it is currently not smoothly integrated into #GitViaNostr yet. There are many loosely coupled options, such as Jenkins, Travis, CircleCI, etc., that could be integrated with Nostr.
However, the more exciting prospect is to use DVMs (Data Vending Machines).
DVMs for CI/CD
Nostr Data Vending Machines (DVMs) can provide a marketplace of CI/CD task runners with Cashu for micro payments.
There are various trust levels in CI/CD tasks:
- Tasks with no secrets eg. tests.
- Tasks using updatable secrets eg. API keys.
- Unverifiable builds and steps that sign with Android, Nostr, or PGP keys.
DVMs allow tasks to be kicked off with specific providers using a Cashu token as payment.
It might be suitable for some high-compute and easily verifiable tasks to be run by the cheapest available providers. Medium trust tasks could be run by providers with a good reputation, while high trust tasks could be run on self-hosted runners.
Job requests, status, and results all get published to Nostr for display in Git-focused Nostr clients.
Jobs could be triggered manually, or self-hosted runners could be configured to watch a Nostr repository and kick off jobs using their own runners without payment.
But I'm most excited about the prospect of Watcher Agents.
CI/CD Watcher Agents
AI agents empowered with a NIP60 Cashu wallet can run tasks based on activity, such as a push to master or a new PR, using the most suitable available DVM runner that meets the user's criteria. To keep them running, anyone could top up their NIP60 Cashu wallet; otherwise, the watcher turns off when the funds run out. It could be users, maintainers, or anyone interested in helping the project who could top up the Watcher Agent's balance.
As aluded to earlier, part of building a reputation as a CI/CD provider could involve running reliable hosting (Git server, relay, and blossom server) for all FOSS Nostr Git repositories.
This provides a sustainable revenue model for hosting providers and creates incentives for many free-at-the-point-of-use hosting providers. This, in turn, would allow one-click Nostr repository creation workflows, instantly hosted by many different providers.
Progress to Date
nostr:npub1hw6amg8p24ne08c9gdq8hhpqx0t0pwanpae9z25crn7m9uy7yarse465gr and nostr:npub16ux4qzg4qjue95vr3q327fzata4n594c9kgh4jmeyn80v8k54nhqg6lra7 have been working on a runner that uses GitHub Actions YAML syntax (using act) for the dvm-cicd-runner and takes Cashu payment. You can see example runs on GitWorkshop. It currently takes testnuts, doesn't give any change, and the schema will likely change.
Note: The actions tab on GitWorkshop is currently available on all repositories if you turn on experimental mode (under settings in the user menu).
It's a work in progress, and we expect the format and schema to evolve.
Easy Web App Deployment
For those disapointed not to find a 'Nostr' button to import a git repository to Vercel menu: take heart, they made it easy. vercel.com_import_options.png there is a vercel cli that can be easily called in CI / CD jobs to kick of deployments. Not all managed solutions for web app deployment (eg. netlify) make it that easy.
Many More Opportunities
Large Patches via Blossom
I would be remiss not to mention the large patch problem. Some patches are too big to fit into Nostr events. Blossom is perfect for this, as it allows these larger patches to be included in a blossom file and referenced in a new patch kind.
Enhancing the #GitViaNostr Experience
Beyond the large patch issue, there are numerous opportunities to enhance the #GitViaNostr ecosystem. We can focus on improving browsing, discovery, social and notifications. Receiving notifications on daily driver Nostr apps is one of the killer features of Nostr. However, we must ensure that Git-related notifications are easily reviewable, so we donāt miss any critical updates.
We need to develop tools that cater to our curiosityātools that enable us to discover and follow projects, engage in discussions that pique our interest, and stay informed about developments relevant to our work.
Additionally, we should not overlook the importance of robust search capabilities and tools that facilitate migrations.
Concluding Thoughts
The design space is vast. Its an exciting time to be working on freedom tech. I encourage everyone to contribute their ideas and creativity and get vibe-coding!
I welcome your honest feedback on this vision and any suggestions you might have. Your insights are invaluable as we collaborate to shape the future of #GitViaNostr. Onward.
Contributions
To conclude, I want to acknowledge some the individuals who have made recent code contributions related to #GitViaNostr:
nostr:npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6 (gitstr, song, patch34), nostr:npub1useke4f9maul5nf67dj0m9sq6jcsmnjzzk4ycvldwl4qss35fvgqjdk5ks (gitplaza)
nostr:npub1elta7cneng3w8p9y4dw633qzdjr4kyvaparuyuttyrx6e8xp7xnq32cume (ngit contributions, git-remote-blossom),nostr:npub16p8v7varqwjes5hak6q7mz6pygqm4pwc6gve4mrned3xs8tz42gq7kfhdw (SatShoot, Flotilla-Budabit), nostr:npub1ehhfg09mr8z34wz85ek46a6rww4f7c7jsujxhdvmpqnl5hnrwsqq2szjqv (Flotilla-Budabit, Nostr Git Extension), nostr:npub1ahaz04ya9tehace3uy39hdhdryfvdkve9qdndkqp3tvehs6h8s5slq45hy (gnostr and experiments), and others.
nostr:npub1uplxcy63up7gx7cladkrvfqh834n7ylyp46l3e8t660l7peec8rsd2sfek (git-remote-nostr)
Project Management nostr:npub1ltx67888tz7lqnxlrg06x234vjnq349tcfyp52r0lstclp548mcqnuz40t (kanbanstr) Code Snippets nostr:npub1ygzj9skr9val9yqxkf67yf9jshtyhvvl0x76jp5er09nsc0p3j6qr260k2 (nodebin.io) nostr:npub1r0rs5q2gk0e3dk3nlc7gnu378ec6cnlenqp8a3cjhyzu6f8k5sgs4sq9ac (snipsnip.dev)
CI / CD nostr:npub16ux4qzg4qjue95vr3q327fzata4n594c9kgh4jmeyn80v8k54nhqg6lra7 nostr:npub1hw6amg8p24ne08c9gdq8hhpqx0t0pwanpae9z25crn7m9uy7yarse465gr
and for their nostr:npub1c03rad0r6q833vh57kyd3ndu2jry30nkr0wepqfpsm05vq7he25slryrnw nostr:npub1qqqqqq2stely3ynsgm5mh2nj3v0nk5gjyl3zqrzh34hxhvx806usxmln03 and nostr:npub1l5sga6xg72phsz5422ykujprejwud075ggrr3z2hwyrfgr7eylqstegx9z for their testing, feedback, ideas and encouragement.
Thank you for your support and collaboration! Let me know if I've missed you.
-
@ 0176967e:1e6f471e
2024-07-28 09:16:10Jan KolÄĆ”k pochĆ”dza zo strednĆ©ho Slovenska a vystupuje pod umeleckým menom Deepologic. Hudbe sa venuje už viac než 10 rokov. ZaÄĆnal ako DJ, ktorý s obľubou mixoval klubovĆŗ hudbu v Å”týloch deep-tech a afrohouse. StĆ”le ho Å„ahalo tvoriÅ„ vlastnĆŗ hudbu, a preto sa zaÄal vzdelĆ”vaÅ„ v oblasti tvorby elektronickej hudby. Nakoniec vydal svoje prvĆ© EP s nĆ”zvom "Rezonancie". UÄenie je pre neho celoživotný proces, a preto sa neustĆ”le zdokonaľuje v oblasti zvuku a kompozĆcie, aby jeho skladby boli kvalitnĆ© na posluch aj v klube.
V roku 2023 si založil vlastnĆŗ znaÄku EarsDeep Records, kde dĆ”va prĆležitosÅ„ zaÄĆnajĆŗcim producentom. Jeho znaÄku podporujĆŗ aj etablovanĆ© menĆ” slovenskej alternatĆvnej elektronickej scĆ©ny. Jeho prioritou je sloboda a neÅ”katulkovanie. Ako sa hovorĆ v jednej klasickej deephouseovej skladbe: "We are all equal in the house of deep." So slobodou ide ruka v ruke aj lĆ”ska k novým technológiĆ”m, Bitcoinu a schopnosÅ„ udržaÅ„ si v digitĆ”lnom svete prehľad, odstup a anonymitu.
V sĆŗÄasnosti Äalej produkuje vlastnĆŗ hudbu, venuje sa DJingu a vedie podcast, kde zverejÅuje svoje mixovanĆ© sety. Na Lunarpunk festivale bude hraÅ„ DJ set tvorený vlastnou produkciou, ale aj skladby, ktorĆ© sĆŗ blĆzke jeho srdcu.
Podcast Bandcamp Punk Nostr website alebo nprofile1qythwumn8ghj7un9d3shjtnwdaehgu3wvfskuep0qy88wumn8ghj7mn0wvhxcmmv9uq3xamnwvaz7tmsw4e8qmr9wpskwtn9wvhsz9thwden5te0wfjkccte9ejxzmt4wvhxjme0qyg8wumn8ghj7mn0wd68ytnddakj7qghwaehxw309aex2mrp0yh8qunfd4skctnwv46z7qpqguvns4ld8k2f3sugel055w7eq8zeewq7mp6w2stpnt6j75z60z3swy7h05
-
@ 6be5cc06:5259daf0
2025-04-28 01:05:49Eu reconheƧo que Deus, e somente Deus, Ć© o soberano legĆtimo sobre todas as coisas. Nenhum homem, nenhuma instituição, nenhum parlamento tem autoridade para usurpar aquilo que pertence ao Rei dos reis. O Estado moderno, com sua pretensĆ£o totalizante, Ć© uma farsa blasfema diante do trono de Cristo. NĆ£o aceito outro senhor.
A Lei que me guia não é a ditada por burocratas, mas a gravada por Deus na própria natureza humana. A razão, quando iluminada pela fé, é suficiente para discernir o que é justo. Rejeito as leis arbitrÔrias que pretendem legitimar o roubo, o assassinato ou a escravidão em nome da ordem. A justiça não nasce do decreto, mas da verdade.
Acredito firmemente na propriedade privada como extensão da própria pessoa. Aquilo que é fruto do meu trabalho, da minha criatividade, da minha dedicação, dos dons a mim concedidos por Deus, pertence a mim por direito natural. Ninguém pode legitimamente tomar o que é meu sem meu consentimento. Todo imposto é uma agressão; toda expropriação, um roubo. Defendo a liberdade econÓmica não por idolatria ao mercado, mas porque a liberdade é condição necessÔria para a virtude.
Assumo o PrincĆpio da NĆ£o AgressĆ£o como o mĆnimo Ć©tico que devo respeitar. NĆ£o iniciarei o uso da forƧa contra ninguĆ©m, nem contra sua propriedade. Exijo o mesmo de todos. Mas sei que isso nĆ£o basta. O PNA delimita o que nĆ£o devo fazer ā ele nĆ£o me ensina o que devo ser. A liberdade exterior só Ć© boa se houver liberdade interior. O mercado pode ser livre, mas se a alma estiver escravizada pelo vĆcio, o colapso serĆ” inevitĆ”vel.
Por isso, nĆ£o me basta a Ć©tica negativa. Creio que uma sociedade justa precisa de valores positivos: honra, responsabilidade, compaixĆ£o, respeito, fidelidade Ć verdade. Sem isso, mesmo uma sociedade que respeite formalmente os direitos individuais apodrecerĆ” por dentro. Um povo que ama o lucro, mas despreza a verdade, que celebra a liberdade mas esquece a justiƧa, estĆ” se preparando para ser dominado. TrocarĆ” um dĆ©spota visĆvel por mil tiranias invisĆveis ā o hedonismo, o consumismo, a mentira, o medo.
Não aceito a falsa caridade feita com o dinheiro tomado à força. A verdadeira generosidade nasce do coração livre, não da coerção institucional. Obrigar alguém a ajudar o próximo destrói tanto a liberdade quanto a virtude. Só hÔ mérito onde hÔ escolha. A caridade que nasce do amor é redentora; a que nasce do fisco é propaganda.
O Estado moderno Ć© um Ćdolo. Ele promete seguranƧa, mas entrega servidĆ£o. Promete justiƧa, mas entrega privilĆ©gios. DisfarƧa a opressĆ£o com linguagem tĆ©cnica, legal e democrĆ”tica. Mas por trĆ”s de suas mĆ”scaras, vejo apenas a velha serpente. Um parasita que se alimenta do trabalho alheio e manipula consciĆŖncias para se perpetuar.
Resistir nĆ£o Ć© apenas um direito, Ć© um dever. Obedecer a Deus antes que aos homens ā essa Ć© a minha regra. O poder se volta contra a verdade, mas minha lealdade pertence a quem criou o cĆ©u e a terra. A tirania nĆ£o se combate com outro tirano, mas com a desobediĆŖncia firme e pacĆfica dos que amam a justiƧa.
NĆ£o acredito em utopias. Desejo uma ordem natural, orgĆ¢nica, enraizada no voluntarismo. Uma sociedade que se construa de baixo para cima: a partir da famĆlia, da comunidade local, da tradição e da fĆ©. NĆ£o quero uma mĆ”quina que planeje a vida alheia, mas um tecido de relaƧƵes voluntĆ”rias onde a liberdade floresƧa Ć sombra da cruz.
Desejo, sim, o reinado social de Cristo. NĆ£o por imposição, mas por convicção. Que Ele reine nos coraƧƵes, nas famĆlias, nas ruas e nos contratos. Que a fĆ© guie a razĆ£o e a razĆ£o ilumine a vida. Que a liberdade seja meio para a santidade ā nĆ£o um fim em si. E que, livres do jugo do LeviatĆ£, sejamos servos apenas do Senhor.
-
@ cae03c48:2a7d6671
2025-05-19 17:15:58Bitcoin Magazine
Nebraskaās New Mining Rules: Infrastructure Safeguard or Soft Ban in Disguise?Nebraska lawmakers have just passed Legislative Bill 526 (LB526), and while not explicitly anti-Bitcoin, its effects may be anything but neutral. With a unanimous 49-0 vote, the Legislature sent the bill to Governor Jim Pillenās desk, where itās expected to be signed into law. Supporters call it a commonsense infrastructure bill. Bitcoin miners call it a slow-motion exodus in the making.
On paper, LB526 is about large energy users. But in practice, it singles out Bitcoin mining facilities with one megawatt (MW) or greater loads and layers on operational constraints that look more like punishment than policy.
Cost Shifting, Public Shaming, and Curtailment
At the heart of LB526 is a mandate: miners must shoulder the costs of any infrastructure upgrades needed to support their demand. Utilities are empowered to demand direct payments or letters of credit after conducting a āload study.ā And while the law pays lip service to āfairnessā and non-discrimination, itās clear who the target is. Bitcoin miners are the only industry named.
Further, mining operators must notify utilities in advance, submit to their interconnection requirements, and, critically, accept interruptible service. That means that when the grid gets tight, itās miners who go dark first. Voluntary demand response, the hallmark of Bitcoin miningās grid-friendly posture? Replaced with mandated curtailment and utility discretion.
And the kicker: public disclosure of energy consumption. Utilities must publish annual energy usage for each mining operation. No such requirement exists for other data-heavy sectors ā not for cloud computing, not for AI clusters, not for Amazon data centers. Just Bitcoin. Itās not just surveillance, itās signaling.
The Tax That Wasnāt, and the Costs That Remain
To its credit, the Legislature dropped an earlier provision that wouldāve added a 2.5Ā¢/kWh tax on mining. This punitive levy wouldāve tacked 50% onto typical industrial rates. That tax would have been an open declaration of hostility. Removing it was necessary. But not sufficient.
Because what remains in LB526 is a less visible, but no less potent deterrent: uncertainty. Miners already operate on razor-thin margins and seek jurisdictions with predictable power costs and clear rules. Instead, Nebraska is offering infrastructure tolls, discretionary curtailment, and regulatory spotlighting.
The Market Responds: Warning Shots from Miners
Industry leaders didnāt stay silent. Marathon Digital Holdings, one of the largest publicly traded mining firms, testified that it had invested nearly $200 million in Nebraska and paid over $6.5 million in taxes, and warned that if LB526 passed, further expansion would likely be scrapped.
Their message was clear: Nebraska had been a pro-mining, pro-growth jurisdiction. But LB526 sends a signal that miners arenāt welcome, or at best, are second-class citizens in the energy economy. As one executive put it, āIf the same rules donāt apply to other energy-intensive industries, this isnāt about infrastructure, itās about discrimination.ā
Others warned that mandatory curtailment replaces cooperative grid services with coercion. Bitcoin miners can, and do, offer real-time load shedding that stabilizes grids during peak demand. But that value proposition only works when thereās a market signal. LB526 turns it into a liability.
Politics, Power, and Public Utilities
Senator Mike Jacobson, the billās sponsor, insisted LB526 is agnostic toward Bitcoin. āThis is about electricity usage,ā he said. But thatās hard to square with a bill that surgically targets one user class.
Jacobson pointed to Kearney, where half the cityās power goes to a single mining facility. But rather than view that as an opportunity, a dispatchable industrial customer willing to scale up or down based on grid needs, the Legislature opted for risk aversion and central planning.
And in Nebraskaās public power model, that matters. With every utility publicly owned, the regulatory posture of the state isnāt advisory, itās existential. There is no retail competition. If Nebraskaās power authorities begin treating Bitcoin miners like unreliable freeloaders rather than willing partners, miners have no recourse. Just the exit.
For now, LB526 awaits only the governorās signature. Given that LB526 was introduced at the behest of the governor, it is likely to be signed. Once enacted, it will take effect October 1, 2025. Miners have until then to decide: adapt, relocate, or fold.
States like Texas, Wyoming, and North Dakota have gone the opposite direction, offering tax clarity, grid integration, and legal protection. Nebraska, once on that shortlist, may find itself dropping off the radar.
Bitcoin mining doesnāt need handouts. But it does need equal footing. LB526 imposes costs, limits flexibility, and broadcasts suspicion. If the goal was to balance innovation with infrastructure, the execution leaves much to be desired.
Because when one industry is burdened while others are exempted, when voluntary partnerships are replaced with mandates, and when operational data is made public for no clear reason, itās not hard to see why miners view LB526 not as regulation, but as retaliation.
This is a guest post by Colin Crossman. Opinions expressed are entirely their own and do not necessarily reflect those of BTC, Inc. orĀ Bitcoin Magazine_._
This post Nebraskaās New Mining Rules: Infrastructure Safeguard or Soft Ban in Disguise? first appeared on Bitcoin Magazine and is written by Colin Crossman.
-
@ 52b4a076:e7fad8bd
2025-04-28 00:48:57I have been recently building NFDB, a new relay DB. This post is meant as a short overview.
Regular relays have challenges
Current relay software have significant challenges, which I have experienced when hosting Nostr.land: - Scalability is only supported by adding full replicas, which does not scale to large relays. - Most relays use slow databases and are not optimized for large scale usage. - Search is near-impossible to implement on standard relays. - Privacy features such as NIP-42 are lacking. - Regular DB maintenance tasks on normal relays require extended downtime. - Fault-tolerance is implemented, if any, using a load balancer, which is limited. - Personalization and advanced filtering is not possible. - Local caching is not supported.
NFDB: A scalable database for large relays
NFDB is a new database meant for medium-large scale relays, built on FoundationDB that provides: - Near-unlimited scalability - Extended fault tolerance - Instant loading - Better search - Better personalization - and more.
Search
NFDB has extended search capabilities including: - Semantic search: Search for meaning, not words. - Interest-based search: Highlight content you care about. - Multi-faceted queries: Easily filter by topic, author group, keywords, and more at the same time. - Wide support for event kinds, including users, articles, etc.
Personalization
NFDB allows significant personalization: - Customized algorithms: Be your own algorithm. - Spam filtering: Filter content to your WoT, and use advanced spam filters. - Topic mutes: Mute topics, not keywords. - Media filtering: With Nostr.build, you will be able to filter NSFW and other content - Low data mode: Block notes that use high amounts of cellular data. - and more
Other
NFDB has support for many other features such as: - NIP-42: Protect your privacy with private drafts and DMs - Microrelays: Easily deploy your own personal microrelay - Containers: Dedicated, fast storage for discoverability events such as relay lists
Calcite: A local microrelay database
Calcite is a lightweight, local version of NFDB that is meant for microrelays and caching, meant for thousands of personal microrelays.
Calcite HA is an additional layer that allows live migration and relay failover in under 30 seconds, providing higher availability compared to current relays with greater simplicity. Calcite HA is enabled in all Calcite deployments.
For zero-downtime, NFDB is recommended.
Noswhere SmartCache
Relays are fixed in one location, but users can be anywhere.
Noswhere SmartCache is a CDN for relays that dynamically caches data on edge servers closest to you, allowing: - Multiple regions around the world - Improved throughput and performance - Faster loading times
routerd
routerd
is a custom load-balancer optimized for Nostr relays, integrated with SmartCache.routerd
is specifically integrated with NFDB and Calcite HA to provide fast failover and high performance.Ending notes
NFDB is planned to be deployed to Nostr.land in the coming weeks.
A lot more is to come. šļøļøļøļøļøļø
-
@ 3f68dede:779bb81d
2025-05-19 17:14:15 -
@ 0176967e:1e6f471e
2024-07-27 11:10:06Workshop je zameraný pre vÅ”etkých, ktorĆ sa potýkajĆŗ s vysvetľovanĆm Bitcoinu svojej rodine, kamarĆ”tom, partnerom alebo kolegom. Pri nĆ”mietkach z druhej strany vƤÄÅ”inou ideme do protiĆŗtoku a snažĆme sa vytiahnuÅ„ tie najlepÅ”ie argumenty. Na tomto workshope vĆ”s nauÄĆm nový prĆstup k zvlĆ”daniu nĆ”mietok a vyskĆŗÅ”ate si ho aj v praxi. Know-how je aplikovateľnĆ© nie len na komunikĆ”ciu Bitcoinu ale aj pre zlepÅ”enie vzÅ„ahov, pri výchove detĆ a celkovo pre lepŔà osobný život.
-
@ cae03c48:2a7d6671
2025-05-19 17:14:11Bitcoin Magazine
Fold Unveils Bitcoin Gift Card, Pioneering Bitcoin in U.S. Retail Gift Card MarketFold, a leading Bitcoin financial services company, recently announced the launch of its Bitcoin Gift Card, marking the first step in integrating Bitcoin into the $300 billion U.S. retail gift card market. This innovative product enables consumers to purchase and gift bitcoin through familiar retail channels, is available now at Foldās website and is expected to expand to major retailers nationwide throughout the year.
The Fold Bitcoin Gift Card allows users to acquire bitcoin for personal savings or as a gift, redeemable via the Fold app. āOnce you buy that gift card, you can give it to someone or use it yourself. You open the Fold app, and your bitcoin appears,ā said Will Reeves, Chairman and CEO of Fold, in an interview with Bitcoin Magazine. Available initially at the Fold website, the product will soon reach physical and online retail shelves, bringing Bitcoin to everyday shopping experiences.
This launch positions Fold as a trailblazer in making Bitcoin accessible through gift cards, the most popular gift in America.
āWeāre now talking about Bitcoin gift cards on sale on the racks of the largest retailers in the country. You can pick up Bitcoin at the checkout line, buy it for yourself, or share it as a gift,ā Reeves told Bitcoin Magazine.Ā
The gift card, a white Bitcoin āB,ā adorned by vibrant orange, taps into the retail marketās demand for alternative assets, following the success of Costcoās $200 million monthly gold sales.
Foldās partnership with Totus, a gift card issuance provider, enables distribution through over 150,000 points of sale nationwide.
āIn our announcement, we reference one of our partners who has direct distribution into all primary retailers in the country,ā Reeves said. While specific retailer names will be revealed later, Fold plans to expand throughout 2025, ensuring Bitcoinās presence in stores like grocery chains and gas stations. āThroughout the rest of this year, weāll announce distribution partners, including some of the largest retailers in the US,ā Reeves added.
The Bitcoin Gift Card targets millions of Americans curious about Bitcoin but hesitant to navigate apps or exchanges.
āThis gift card gives us distribution directly to millions of Americans who may not be buying Bitcoin because they havenāt downloaded a new app, donāt have a brokerage account, or havenāt seen the ETF,ā Reeves explained. By leveraging trusted retail channels, Fold is opening a new avenue for Bitcoin adoption.
Since 2019, Fold has empowered over 600,000 users with Bitcoin-based financial tools, holding over 1,485 Bitcoin in its treasury.
āI think thereās a real chance by the end of 2025 that Bitcoin becomes the most popular gift in America because of this card,ā Reeves predicted.
This post Fold Unveils Bitcoin Gift Card, Pioneering Bitcoin in U.S. Retail Gift Card Market first appeared on Bitcoin Magazine and is written by Juan Galt.
-
@ 0176967e:1e6f471e
2024-07-26 17:45:08Ak ste v Bitcoine už nejaký ten rok, možno mĆ”te pocit, že už vÅ”etkĆ©mu rozumiete a že vĆ”s niÄ neprekvapĆ. Viete Äo je to peÅaženka, Äo je to seed a Äo adresa, možno dokonca aj Äo je to sha256. Ste si istĆ? TĆ”to prednÔŔka sa vĆ”m to pokĆŗsi vyvrĆ”tiÅ„. š
-
@ 3f68dede:779bb81d
2025-05-19 17:06:26 -
@ 30ceb64e:7f08bdf5
2025-04-26 20:33:30Status: Draft
Author: TheWildHustleAbstract
This NIP defines a framework for storing and sharing health and fitness profile data on Nostr. It establishes a set of standardized event kinds for individual health metrics, allowing applications to selectively access specific health information while preserving user control and privacy.
In this framework exists - NIP-101h.1 Weight using kind 1351 - NIP-101h.2 Height using kind 1352 - NIP-101h.3 Age using kind 1353 - NIP-101h.4 Gender using kind 1354 - NIP-101h.5 Fitness Level using kind 1355
Motivation
I want to build and support an ecosystem of health and fitness related nostr clients that have the ability to share and utilize a bunch of specific interoperable health metrics.
- Selective access - Applications can access only the data they need
- User control - Users can choose which metrics to share
- Interoperability - Different health applications can share data
- Privacy - Sensitive health information can be managed independently
Specification
Kind Number Range
Health profile metrics use the kind number range 1351-1399:
| Kind | Metric | | --------- | ---------------------------------- | | 1351 | Weight | | 1352 | Height | | 1353 | Age | | 1354 | Gender | | 1355 | Fitness Level | | 1356-1399 | Reserved for future health metrics |
Common Structure
All health metric events SHOULD follow these guidelines:
- The content field contains the primary value of the metric
- Required tags:
['t', 'health']
- For categorizing as health data['t', metric-specific-tag]
- For identifying the specific metric['unit', unit-of-measurement]
- When applicable- Optional tags:
['converted_value', value, unit]
- For providing alternative unit measurements['timestamp', ISO8601-date]
- When the metric was measured['source', application-name]
- The source of the measurement
Unit Handling
Health metrics often have multiple ways to be measured. To ensure interoperability:
- Where multiple units are possible, one standard unit SHOULD be chosen as canonical
- When using non-standard units, a
converted_value
tag SHOULD be included with the canonical unit - Both the original and converted values should be provided for maximum compatibility
Client Implementation Guidelines
Clients implementing this NIP SHOULD:
- Allow users to explicitly choose which metrics to publish
- Support reading health metrics from other users when appropriate permissions exist
- Support updating metrics with new values over time
- Preserve tags they don't understand for future compatibility
- Support at least the canonical unit for each metric
Extensions
New health metrics can be proposed as extensions to this NIP using the format:
- NIP-101h.X where X is the metric number
Each extension MUST specify: - A unique kind number in the range 1351-1399 - The content format and meaning - Required and optional tags - Examples of valid events
Privacy Considerations
Health data is sensitive personal information. Clients implementing this NIP SHOULD:
- Make it clear to users when health data is being published
- Consider incorporating NIP-44 encryption for sensitive metrics
- Allow users to selectively share metrics with specific individuals
- Provide easy ways to delete previously published health data
NIP-101h.1: Weight
Description
This NIP defines the format for storing and sharing weight data on Nostr.
Event Kind: 1351
Content
The content field MUST contain the numeric weight value as a string.
Required Tags
- ['unit', 'kg' or 'lb'] - Unit of measurement
- ['t', 'health'] - Categorization tag
- ['t', 'weight'] - Specific metric tag
Optional Tags
- ['converted_value', value, unit] - Provides the weight in alternative units for interoperability
- ['timestamp', ISO8601 date] - When the weight was measured
Examples
json { "kind": 1351, "content": "70", "tags": [ ["unit", "kg"], ["t", "health"], ["t", "weight"] ] }
json { "kind": 1351, "content": "154", "tags": [ ["unit", "lb"], ["t", "health"], ["t", "weight"], ["converted_value", "69.85", "kg"] ] }
NIP-101h.2: Height
Status: Draft
Description
This NIP defines the format for storing and sharing height data on Nostr.
Event Kind: 1352
Content
The content field can use two formats: - For metric height: A string containing the numeric height value in centimeters (cm) - For imperial height: A JSON string with feet and inches properties
Required Tags
['t', 'health']
- Categorization tag['t', 'height']
- Specific metric tag['unit', 'cm' or 'imperial']
- Unit of measurement
Optional Tags
['converted_value', value, 'cm']
- Provides height in centimeters for interoperability when imperial is used['timestamp', ISO8601-date]
- When the height was measured
Examples
```jsx // Example 1: Metric height Apply to App.jsx
// Example 2: Imperial height with conversion Apply to App.jsx ```
Implementation Notes
- Centimeters (cm) is the canonical unit for height interoperability
- When using imperial units, a conversion to centimeters SHOULD be provided
- Height values SHOULD be positive integers
- For maximum compatibility, clients SHOULD support both formats
NIP-101h.3: Age
Status: Draft
Description
This NIP defines the format for storing and sharing age data on Nostr.
Event Kind: 1353
Content
The content field MUST contain the numeric age value as a string.
Required Tags
['unit', 'years']
- Unit of measurement['t', 'health']
- Categorization tag['t', 'age']
- Specific metric tag
Optional Tags
['timestamp', ISO8601-date]
- When the age was recorded['dob', ISO8601-date]
- Date of birth (if the user chooses to share it)
Examples
```jsx // Example 1: Basic age Apply to App.jsx
// Example 2: Age with DOB Apply to App.jsx ```
Implementation Notes
- Age SHOULD be represented as a positive integer
- For privacy reasons, date of birth (dob) is optional
- Clients SHOULD consider updating age automatically if date of birth is known
- Age can be a sensitive metric and clients may want to consider encrypting this data
NIP-101h.4: Gender
Status: Draft
Description
This NIP defines the format for storing and sharing gender data on Nostr.
Event Kind: 1354
Content
The content field contains a string representing the user's gender.
Required Tags
['t', 'health']
- Categorization tag['t', 'gender']
- Specific metric tag
Optional Tags
['timestamp', ISO8601-date]
- When the gender was recorded['preferred_pronouns', string]
- User's preferred pronouns
Common Values
While any string value is permitted, the following common values are recommended for interoperability: - male - female - non-binary - other - prefer-not-to-say
Examples
```jsx // Example 1: Basic gender Apply to App.jsx
// Example 2: Gender with pronouns Apply to App.jsx ```
Implementation Notes
- Clients SHOULD allow free-form input for gender
- For maximum compatibility, clients SHOULD support the common values
- Gender is a sensitive personal attribute and clients SHOULD consider appropriate privacy controls
- Applications focusing on health metrics should be respectful of gender diversity
NIP-101h.5: Fitness Level
Status: Draft
Description
This NIP defines the format for storing and sharing fitness level data on Nostr.
Event Kind: 1355
Content
The content field contains a string representing the user's fitness level.
Required Tags
['t', 'health']
- Categorization tag['t', 'fitness']
- Fitness category tag['t', 'level']
- Specific metric tag
Optional Tags
['timestamp', ISO8601-date]
- When the fitness level was recorded['activity', activity-type]
- Specific activity the fitness level relates to['metrics', JSON-string]
- Quantifiable fitness metrics used to determine level
Common Values
While any string value is permitted, the following common values are recommended for interoperability: - beginner - intermediate - advanced - elite - professional
Examples
```jsx // Example 1: Basic fitness level Apply to App.jsx
// Example 2: Activity-specific fitness level with metrics Apply to App.jsx ```
Implementation Notes
- Fitness level is subjective and may vary by activity
- The activity tag can be used to specify fitness level for different activities
- The metrics tag can provide objective measurements to support the fitness level
- Clients can extend this format to include activity-specific fitness assessments
- For general fitness apps, the simple beginner/intermediate/advanced scale is recommended
-
@ 0176967e:1e6f471e
2024-07-26 12:15:35BojovaÅ„ s rakovinou metabolickou metódou znamenĆ” použiÅ„ metabolizmus tela proti rakovine. Riadenie cukru a ketónov v krvi stravou a pohybom, Äasovanie rĆ“znych typov cviÄenĆ, vÄasnĆ” kombinĆ”cia klasickej onko-lieÄby a hladovania. KtorĆ© vitamĆny a suplementy prijĆmam a ktorým sa naprĆklad vyhýbam dajĆŗc na rady mojej dietologiÄky z USA Miriam (ktorĆ” sa Å”pecializuje na rakovinu).
Hovori sa, že Äo nemeriame, neriadime ... Ja som meral, veľa a dlho ... aj grafy budĆŗ ... aj sranda bude, hĆ”dam ... š
-
@ 91bea5cd:1df4451c
2025-04-26 10:16:21O Contexto Legal Brasileiro e o Consentimento
No ordenamento jurĆdico brasileiro, o consentimento do ofendido pode, em certas circunstĆ¢ncias, afastar a ilicitude de um ato que, sem ele, configuraria crime (como lesĆ£o corporal leve, prevista no Art. 129 do Código Penal). Contudo, o consentimento tem limites claros: nĆ£o Ć© vĆ”lido para bens jurĆdicos indisponĆveis, como a vida, e sua eficĆ”cia Ć© questionĆ”vel em casos de lesƵes corporais graves ou gravĆssimas.
A prÔtica de BDSM consensual situa-se em uma zona complexa. Em tese, se ambos os parceiros são adultos, capazes, e consentiram livre e informadamente nos atos praticados, sem que resultem em lesões graves permanentes ou risco de morte não consentido, não haveria crime. O desafio reside na comprovação desse consentimento, especialmente se uma das partes, posteriormente, o negar ou alegar coação.
A Lei Maria da Penha (Lei nĀŗ 11.340/2006)
A Lei Maria da Penha Ć© um marco fundamental na proteção da mulher contra a violĆŖncia domĆ©stica e familiar. Ela estabelece mecanismos para coibir e prevenir tal violĆŖncia, definindo suas formas (fĆsica, psicológica, sexual, patrimonial e moral) e prevendo medidas protetivas de urgĆŖncia.
Embora essencial, a aplicação da lei em contextos de BDSM pode ser delicada. Uma alegação de violĆŖncia por parte da mulher, mesmo que as lesƵes ou situaƧƵes decorram de prĆ”ticas consensuais, tende a receber atenção prioritĆ”ria das autoridades, dada a presunção de vulnerabilidade estabelecida pela lei. Isso pode criar um cenĆ”rio onde o parceiro masculino enfrenta dificuldades significativas em demonstrar a natureza consensual dos atos, especialmente se nĆ£o houver provas robustas prĆ©-constituĆdas.
Outros riscos:
LesĆ£o corporal grave ou gravĆssima (art. 129, §§ 1Āŗ e 2Āŗ, CP), nĆ£o pode ser justificada pelo consentimento, podendo ensejar persecução penal.
Crimes contra a dignidade sexual (arts. 213 e seguintes do CP) sĆ£o de ação pĆŗblica incondicionada e independem de representação da vĆtima para a investigação e denĆŗncia.
Riscos de Falsas Acusações e Alegação de Coação Futura
Os riscos para os praticantes de BDSM, especialmente para o parceiro que assume o papel dominante ou que inflige dor/restrição (frequentemente, mas não exclusivamente, o homem), podem surgir de diversas frentes:
- Acusações Externas: Vizinhos, familiares ou amigos que desconhecem a natureza consensual do relacionamento podem interpretar sons, marcas ou comportamentos como sinais de abuso e denunciar às autoridades.
- Alegações Futuras da Parceira: Em caso de término conturbado, vingança, arrependimento ou mudança de perspectiva, a parceira pode reinterpretar as prÔticas passadas como abuso e buscar reparação ou retaliação através de uma denúncia. A alegação pode ser de que o consentimento nunca existiu ou foi viciado.
- Alegação de Coação: Uma das formas mais complexas de refutar Ć© a alegação de que o consentimento foi obtido mediante coação (fĆsica, moral, psicológica ou econĆ“mica). A parceira pode alegar, por exemplo, que se sentia pressionada, intimidada ou dependente, e que seu "sim" nĆ£o era genuĆno. Provar a ausĆŖncia de coação a posteriori Ć© extremamente difĆcil.
- Ingenuidade e Vulnerabilidade Masculina: Muitos homens, confiando na dinĆ¢mica consensual e na parceira, podem negligenciar a necessidade de precauƧƵes. A crenƧa de que "isso nunca aconteceria comigo" ou a falta de conhecimento sobre as implicaƧƵes legais e o peso processual de uma acusação no Ć¢mbito da Lei Maria da Penha podem deixĆ”-los vulnerĆ”veis. A presenƧa de marcas fĆsicas, mesmo que consentidas, pode ser usada como evidĆŖncia de agressĆ£o, invertendo o Ć“nus da prova na prĆ”tica, ainda que nĆ£o na teoria jurĆdica.
Estratégias de Prevenção e Mitigação
NĆ£o existe um mĆ©todo infalĆvel para evitar completamente o risco de uma falsa acusação, mas diversas medidas podem ser adotadas para construir um histórico de consentimento e reduzir vulnerabilidades:
- Comunicação ExplĆcita e ContĆnua: A base de qualquer prĆ”tica BDSM segura Ć© a comunicação constante. Negociar limites, desejos, palavras de seguranƧa ("safewords") e expectativas antes, durante e depois das cenas Ć© crucial. Manter registros dessas negociaƧƵes (e-mails, mensagens, diĆ”rios compartilhados) pode ser Ćŗtil.
-
Documentação do Consentimento:
-
Contratos de Relacionamento/Cena: Embora a validade jurĆdica de "contratos BDSM" seja discutĆvel no Brasil (nĆ£o podem afastar normas de ordem pĆŗblica), eles servem como forte evidĆŖncia da intenção das partes, da negociação detalhada de limites e do consentimento informado. Devem ser claros, datados, assinados e, idealmente, reconhecidos em cartório (para prova de data e autenticidade das assinaturas).
-
Registros Audiovisuais: Gravar (com consentimento explĆcito para a gravação) discussƵes sobre consentimento e limites antes das cenas pode ser uma prova poderosa. Gravar as próprias cenas Ć© mais complexo devido a questƵes de privacidade e potencial uso indevido, mas pode ser considerado em casos especĆficos, sempre com consentimento mĆŗtuo documentado para a gravação.
Importante: a gravação deve ser com ciência da outra parte, para não configurar violação da intimidade (art. 5º, X, da Constituição Federal e art. 20 do Código Civil).
-
-
Testemunhas: Em alguns contextos de comunidade BDSM, a presenƧa de terceiros de confianƧa durante negociaƧƵes ou mesmo cenas pode servir como testemunho, embora isso possa alterar a dinĆ¢mica Ćntima do casal.
- Estabelecimento Claro de Limites e Palavras de SeguranƧa: Definir e respeitar rigorosamente os limites (o que Ʃ permitido, o que Ʃ proibido) e as palavras de seguranƧa Ʃ fundamental. O desrespeito a uma palavra de seguranƧa encerra o consentimento para aquele ato.
- Avaliação ContĆnua do Consentimento: O consentimento nĆ£o Ć© um cheque em branco; ele deve ser entusiĆ”stico, contĆnuo e revogĆ”vel a qualquer momento. Verificar o bem-estar do parceiro durante a cena ("check-ins") Ć© essencial.
- Discrição e Cuidado com EvidĆŖncias FĆsicas: Ser discreto sobre a natureza do relacionamento pode evitar mal-entendidos externos. Após cenas que deixem marcas, Ć© prudente que ambos os parceiros estejam cientes e de acordo, talvez documentando por fotos (com data) e uma nota sobre a consensualidade da prĆ”tica que as gerou.
- Aconselhamento JurĆdico Preventivo: Consultar um advogado especializado em direito de famĆlia e criminal, com sensibilidade para dinĆ¢micas de relacionamento alternativas, pode fornecer orientação personalizada sobre as melhores formas de documentar o consentimento e entender os riscos legais especĆficos.
ObservaƧƵes Importantes
- Nenhuma documentação substitui a necessidade de consentimento real, livre, informado e contĆnuo.
- A lei brasileira protege a "integridade fĆsica" e a "dignidade humana". PrĆ”ticas que resultem em lesƵes graves ou que violem a dignidade de forma nĆ£o consentida (ou com consentimento viciado) serĆ£o ilegais, independentemente de qualquer acordo prĆ©vio.
- Em caso de acusação, a existência de documentação robusta de consentimento não garante a absolvição, mas fortalece significativamente a defesa, ajudando a demonstrar a natureza consensual da relação e das prÔticas.
-
A alegação de coação futura Ć© particularmente difĆcil de prevenir apenas com documentos. Um histórico consistente de comunicação aberta (whatsapp/telegram/e-mails), respeito mĆŗtuo e ausĆŖncia de dependĆŖncia ou controle excessivo na relação pode ajudar a contextualizar a dinĆ¢mica como nĆ£o coercitiva.
-
Cuidado com Marcas VisĆveis e LesƵes Graves PrĆ”ticas que resultam em hematomas severos ou lesƵes podem ser interpretadas como agressĆ£o, mesmo que consentidas. Evitar excessos protege nĆ£o apenas a integridade fĆsica, mas tambĆ©m evita questionamentos legais futuros.
O que vem a ser consentimento viciado
No Direito, consentimento viciado Ć© quando a pessoa concorda com algo, mas a vontade dela nĆ£o Ć© livre ou plena ā ou seja, o consentimento existe formalmente, mas Ć© defeituoso por alguma razĆ£o.
O Código Civil brasileiro (art. 138 a 165) define vĆ”rias formas de vĆcio de consentimento. As principais sĆ£o:
Erro: A pessoa se engana sobre o que estƔ consentindo. (Ex.: A pessoa acredita que vai participar de um jogo leve, mas na verdade Ʃ exposta a prƔticas pesadas.)
Dolo: A pessoa Ʃ enganada propositalmente para aceitar algo. (Ex.: AlguƩm mente sobre o que vai acontecer durante a prƔtica.)
Coação: A pessoa Ć© forƧada ou ameaƧada a consentir. (Ex.: "Se vocĆŖ nĆ£o aceitar, eu termino com vocĆŖ" ā pressĆ£o emocional forte pode ser vista como coação.)
Estado de perigo ou lesão: A pessoa aceita algo em situação de necessidade extrema ou abuso de sua vulnerabilidade. (Ex.: Alguém em situação emocional muito fragilizada é induzida a aceitar prÔticas que normalmente recusaria.)
No contexto de BDSM, isso Ć© ainda mais delicado: Mesmo que a pessoa tenha "assinado" um contrato ou dito "sim", se depois ela alegar que seu consentimento foi dado sob medo, engano ou pressĆ£o psicológica, o consentimento pode ser considerado viciado ā e, portanto, juridicamente invĆ”lido.
Isso tem duas implicaƧƵes sƩrias:
-
O crime nĆ£o se descaracteriza: Se houver vĆcio, o consentimento Ć© ignorado e a prĆ”tica pode ser tratada como crime normal (lesĆ£o corporal, estupro, tortura, etc.).
-
A prova do consentimento precisa ser sólida: Mostrando que a pessoa estava informada, lúcida, livre e sem qualquer tipo de coação.
Consentimento viciado Ć© quando a pessoa concorda formalmente, mas de maneira enganada, forƧada ou pressionada, tornando o consentimento inĆŗtil para efeitos jurĆdicos.
Conclusão
Casais que praticam BDSM consensual no Brasil navegam em um terreno que exige nĆ£o apenas confianƧa mĆŗtua e comunicação excepcional, mas tambĆ©m uma consciĆŖncia aguƧada das complexidades legais e dos riscos de interpretaƧƵes equivocadas ou acusaƧƵes mal-intencionadas. Embora o BDSM seja uma expressĆ£o legĆtima da sexualidade humana, sua prĆ”tica no Brasil exige responsabilidade redobrada. Ter provas claras de consentimento, manter a comunicação aberta e agir com prudĆŖncia sĆ£o formas eficazes de se proteger de falsas alegaƧƵes e preservar a liberdade e a seguranƧa de todos os envolvidos. Embora leis controversas como a Maria da Penha sejam "vitais" para a proteção contra a violĆŖncia real, os praticantes de BDSM, e em particular os homens nesse contexto, devem adotar uma postura proativa e prudente para mitigar os riscos inerentes Ć potencial mĆ” interpretação ou instrumentalização dessas prĆ”ticas e leis, garantindo que a expressĆ£o de sua consensualidade esteja resguardada na medida do possĆvel.
Importante: No Brasil, mesmo com tudo isso, o Ministério Público pode denunciar por crime como lesão corporal grave, estupro ou tortura, independente de consentimento. Então a prudência nas prÔticas é fundamental.
Aviso Legal: Este artigo tem carĆ”ter meramente informativo e nĆ£o constitui aconselhamento jurĆdico. As leis e interpretaƧƵes podem mudar, e cada situação Ć© Ćŗnica. Recomenda-se buscar orientação de um advogado qualificado para discutir casos especĆficos.
Se curtiu este artigo faça uma contribuição, se tiver algum ponto relevante para o artigo deixe seu comentÔrio.
-
@ 3f68dede:779bb81d
2025-05-19 17:04:13testing schedule
-
@ 8125b911:a8400883
2025-04-25 07:02:35In Nostr, all data is stored as events. Decentralization is achieved by storing events on multiple relays, with signatures proving the ownership of these events. However, if you truly want to own your events, you should run your own relay to store them. Otherwise, if the relays you use fail or intentionally delete your events, you'll lose them forever.
For most people, running a relay is complex and costly. To solve this issue, I developed nostr-relay-tray, a relay that can be easily run on a personal computer and accessed over the internet.
Project URL: https://github.com/CodyTseng/nostr-relay-tray
This article will guide you through using nostr-relay-tray to run your own relay.
Download
Download the installation package for your operating system from the GitHub Release Page.
| Operating System | File Format | | --------------------- | ---------------------------------- | | Windows |
nostr-relay-tray.Setup.x.x.x.exe
| | macOS (Apple Silicon) |nostr-relay-tray-x.x.x-arm64.dmg
| | macOS (Intel) |nostr-relay-tray-x.x.x.dmg
| | Linux | You should know which one to use |Installation
Since this app isnāt signed, you may encounter some obstacles during installation. Once installed, an ostrich icon will appear in the status bar. Click on the ostrich icon, and you'll see a menu where you can click the "Dashboard" option to open the relay's control panel for further configuration.
macOS Users:
- On first launch, go to "System Preferences > Security & Privacy" and click "Open Anyway."
- If you encounter a "damaged" message, run the following command in the terminal to remove the restrictions:
bash sudo xattr -rd com.apple.quarantine /Applications/nostr-relay-tray.app
Windows Users:
- On the security warning screen, click "More Info > Run Anyway."
Connecting
By default, nostr-relay-tray is only accessible locally through
ws://localhost:4869/
, which makes it quite limited. Therefore, we need to expose it to the internet.In the control panel, click the "Proxy" tab and toggle the switch. You will then receive a "Public address" that you can use to access your relay from anywhere. It's that simple.
Next, add this address to your relay list and position it as high as possible in the list. Most clients prioritize connecting to relays that appear at the top of the list, and relays lower in the list are often ignored.
Restrictions
Next, we need to set up some restrictions to prevent the relay from storing events that are irrelevant to you and wasting storage space. nostr-relay-tray allows for flexible and fine-grained configuration of which events to accept, but some of this is more complex and will not be covered here. If you're interested, you can explore this further later.
For now, I'll introduce a simple and effective strategy: WoT (Web of Trust). You can enable this feature in the "WoT & PoW" tab. Before enabling, you'll need to input your pubkey.
There's another important parameter,
Depth
, which represents the relationship depth between you and others. Someone you follow has a depth of 1, someone they follow has a depth of 2, and so on.- Setting this parameter to 0 means your relay will only accept your own events.
- Setting it to 1 means your relay will accept events from you and the people you follow.
- Setting it to 2 means your relay will accept events from you, the people you follow, and the people they follow.
Currently, the maximum value for this parameter is 2.
Conclusion
You've now successfully run your own relay and set a simple restriction to prevent it from storing irrelevant events.
If you encounter any issues during use, feel free to submit an issue on GitHub, and I'll respond as soon as possible.
Not your relay, not your events.
-
@ 0176967e:1e6f471e
2024-07-26 09:50:53PredikÄnĆ© trhy predstavujĆŗ praktický spĆ“sob, ako mÓžeme nahliadnuÅ„ do budĆŗcnosti bez nutnosti spoliehaÅ„ sa na tradiÄnĆ©, Äasto nepresnĆ© metódy, ako je veÅ”tenie z kĆ”vových zrniek. V prezentĆ”cii sa ponorĆme do histórie a vývoja predikÄných trhov, a popĆÅ”eme aký vplyv mali a majĆŗ na dostupnosÅ„ a kvalitu informĆ”ciĆ pre Å”irokĆŗ verejnosÅ„, a ako menia trh s týmito informĆ”ciami. Pozrieme sa aj na to, ako tieto trhy umožÅujĆŗ obyÄajným ľuÄom prĆstup k spoľahlivým predpovediam a ako mÓžu prispieÅ„ k lepÅ”iemu rozhodovaniu v rĆ“znych oblastiach života.
-
@ 3f68dede:779bb81d
2025-05-19 17:02:54testing schedule
-
@ 3f68dede:779bb81d
2025-05-19 17:02:33testing
-
@ e691f4df:1099ad65
2025-04-24 18:56:12Viewing Bitcoin Through the Light of Awakening
Ankh & Ohm Capitalās Overview of the Psycho-Spiritual Nature of Bitcoin
Glossary:
I. Preface: The Logos of Our Logo
II. An Oracular Introduction
III. Alchemizing Greed
IV. Layers of Fractalized Thought
V. Permissionless Individuation
VI. Dispelling Paradox Through Resonance
VII. Ego Deflation
VIII. The Coin of Great Price
Preface: The Logos of Our Logo
Before we offer our lens on Bitcoin, itās important to illuminate the meaning behind Ankh & Ohmās name and symbol. These elements are not ornamentalāthey are foundational, expressing the cosmological principles that guide our work.
Our mission is to bridge the eternal with the practical. As a Bitcoin-focused family office and consulting firm, we understand capital not as an end, but as a toolāone that, when properly aligned, becomes a vehicle for divine order. We see Bitcoin not simply as a technological innovation but as an emanation of the Divine Logosāa harmonic expression of truth, transparency, and incorruptible structure. Both the beginning and the end, the Alpha and Omega.
The Ankh (ā„), an ancient symbol of eternal life, is a key to the integration of opposites. It unites spirit and matter, force and form, continuity and change. It reminds us that capital, like Life, must not only be generative, but regenerative; sacred. Money must serve Life, not siphon from it.
The Ohm (Ī©) holds a dual meaning. In physics, it denotes a unit of electrical resistanceāthe formative tension that gives energy coherence. In the Vedic tradition, Om (ą„) is the primordial vibrationāthe sound from which all existence unfolds. Together, these symbols affirm a timeless truth: resistance and resonance are both sacred instruments of the Creator.
Ankh & Ohm, then, represents our striving for union, for harmony ābetween the flow of life and intentional structure, between incalculable abundance and measured restraint, between the lightbulbās electrical impulse and its light-emitting filament. We stand at the threshold where intention becomes action, and where capital is not extracted, but cultivated in rhythm with the cosmos.Ā
We exist to shepherd this transformation, as guides of this threshold āhelping families, founders, and institutions align with a deeper order, where capital serves not as the prize, but as a pathway to collective Presence, Purpose, Peace and Prosperity.
An Oracular Introduction
Bitcoin is commonly understood as the first truly decentralized and secure form of digital moneyāa breakthrough in monetary sovereignty. But this view, while technically correct, is incomplete and spiritually shallow. Bitcoin is more than a tool for economic disruption. Bitcoin represents a mythic threshold: a symbol of the psycho-spiritual shift that many ancient traditions have long foretold.
For millennia, sages and seers have spoken of a coming Golden Age. In the Vedic Yuga cycles, in Platoās Great Year, in the Eagle and Condor prophecies of the Americasāthere exists a common thread: that humanity will emerge from darkness into a time of harmony, cooperation, and clarity. That the veil of illusion (maya, materiality) will thin, and reality will once again become transparent to the transcendent. In such an age, systems based on scarcity, deception, and centralization fall away. A new cosmology takes rootāone grounded in balance, coherence, and sacred reciprocity.
But we must askāhow does such a shift happen? How do we cross from the age of scarcity, fear, and domination into one of coherence, abundance, and freedom?
One possible answer lies in the alchemy of incentive.
Bitcoin operates not just on the rules of computer science or Austrian economics, but on something far more old and subtle: the logic of transformation. It transmutes greedāa base instinct rooted in scarcityāinto cooperation, transparency, and incorruptibility.
In this light, Bitcoin becomes more than codeāit becomes a psychoactive protocol, one that rewires human behavior by aligning individual gain with collective integrity. It is not simply a new form of money. It is a new myth of value. A new operating system for human consciousness.
Bitcoin does not moralize. It harmonizes. It transforms the instinct for self-preservation into a pathway for planetary coherence.
Alchemizing Greed
At the heart of Bitcoin lies the ancient alchemical principle of transmutation: that which is base may be refined into gold.
Greed, long condemned as a vice, is not inherently evil. It is a distorted longing. A warped echo of the drive to preserve life. But in systems built on scarcity and deception, this longing calcifies into hoarding, corruption, and decay.
Bitcoin introduces a new game. A game with memory. A game that makes deception inefficient and truth profitable. It does not demand virtueāit encodes consequence. Its design does not suppress greed; it reprograms it.
In traditional models, game theory often illustrates the fragility of trust. The Prisonerās Dilemma reveals how self-interest can sabotage collective well-being. But Bitcoin inverts this. It creates an environment where self-interest and integrity convergeāwhere the most rational action is also the most truthful.
Its ledger, immutable and transparent, exposes manipulation for what it is: energetically wasteful and economically self-defeating. Dishonesty burns energy and yields nothing. The network punishes incoherence, not by decree, but by natural law.
This is the spiritual elegance of Bitcoin: it does not suppress greedāit transmutes it. It channels the drive for personal gain into the architecture of collective order. Miners compete not to dominate, but to validate. Nodes collaborate not through trust, but through mathematical proof.
This is not austerity. It is alchemy.
Greed, under Bitcoin, is refined. Tempered. Re-forged into a generative forceāno longer parasitic, but harmonic.
Layers of Fractalized Thought Fragments
All living systems are layered. So is the cosmos. So is the human being. So is a musical scale.
At its foundation lies the timechaināthe pulsing, incorruptible record of truth. Like the heart, it beats steadily. Every block, like a pulse, affirms its life through continuity. The difficulty adjustmentāBitcoinās internal calibrationāfunctions like heart rate variability, adapting to pressure while preserving coherence.
Above this base layer is the Lightning Networkāa second layer facilitating rapid, efficient transactions. It is the nervous system: transmitting energy, reducing latency, enabling real-time interaction across a distributed whole.
Beyond that, emerging tools like Fedimint and Cashu function like the capillariesābringing vitality to the extremities, to those underserved by legacy systems. They empower the unbanked, the overlooked, the forgotten. Privacy and dignity in the palms of those the old system refused to see.
And then there is NOSTRāthe decentralized protocol for communication and creation. It is the throat chakra, the vocal cords of the āfreedom-techā body. It reclaims speech from the algorithmic overlords, making expression sovereign once more. It is also the reproductive system, as it enables the propagation of novel ideas and protocols in fertile, uncensorable soil.
Each layer plays its part. Not in hierarchy, but in harmony. In holarchy. Bitcoin and other open source protocols grow not through exogenous command, but through endogenous coherence. Like cells in an organism. Like a song.
Imagine the cell as a piece of glass from a shattered holographic plate āby which its perspectival, moving image can be restructured from the single shard. DNA isnāt only a logical script of base pairs, but an evolving progressive song. Its lyrics imbued with wise reflections on relationships.Ā The nucleus sings, the cell respondsānot by command, but by memory. Life is not imposed; it is expressed. A reflection of a hidden pattern.
Bitcoin chants this. Each node, a living cell, holds the full timechaināTruth distributed, incorruptible. Remove one, and the whole remains. This isnāt redundancy. Itās a revelation on the power of protection in Truth.
Consensus is communion. Verification becomes a sacred riteāTruth made audible through math.Ā
Not just the signal; the song. A web of self-expression woven from Truth.
No center, yet every point alive with the whole. Like Indraās Net, each reflects all. This is more than currency and information exchange. It is memory; a self-remembering Mind, unfolding through consensus and code. A Mind reflecting the Truth of reality at the speed of thought.
Heuristics are mental shortcutsāefficient, imperfect, alive. Like cells, they must adapt or decay. To become unbiased is to have self-balancing heuristics which carry feedback loops within them: they listen to the environment, mutate when needed, and survive by resonance with reality. Mutation is not error, but evolution. Its rules are simple, but their expression is dynamic.Ā
What persists is not rigidity, but pattern.Ā
To think clearly is not necessarily to be certain, but to dissolve doubt by listening, adjusting, and evolving thought itself.
To understand Bitcoin is simply to listenāpatiently, clearly, as one would to a familiar rhythm returning.
Permissionless Individuation
Bitcoin is a path. One that no one can walk for you.
Said differently, it is not a passive act. It cannot be spoon-fed. Like a spiritual path, it demands initiation, effort, and the willingness to question inherited beliefs.
Because Bitcoin is permissionless, no one can be forced to adopt it. One must choose to engage itācompelled by need, interest, or intuition. Each person who embarks undergoes their own version of the heroās journey.
Carl Jung called this process Individuationāthe reconciliation of fragmented psychic elements into a coherent, mature Self. Bitcoin mirrors this: it invites individuals to confront the unconscious assumptions of the fiat paradigm, and to re-integrate their relationship to time, value, and agency.
In Western traditionsāalchemy, Christianity, Kabbalahāthe individual is sacred, and salvation is personal. In Eastern systemsāDaoism, Buddhism, the Vedasāthe self is ultimately dissolved into the cosmic whole. Bitcoin, in a paradoxical way, echoes both: it empowers the individual, while aligning them with a holistic, transcendent order.
To truly see Bitcoin is to allow something false to die. A belief. A habit. A self-concept.
In that deathāa space opens for deeper connection with the Divine itSelf.Ā
In that dissolution, something luminous is reborn.Ā
After the passing, Truth becomes resurrected.Ā Ā
Dispelling Paradox Through Resonance
There is a subtle paradox encoded into the heroās journey: each starts in solidarity, yet the awakening affects the collective.
No one can be forced into understanding Bitcoin. Like a spiritual truth, it must be seen. And yet, once seen, it becomes nearly impossible to unseeāand easier for others to glimpse. The pattern catches.
This phenomenon mirrors the concept of morphic resonance, as proposed and empirically tested by biologist Rupert Sheldrake. Once a critical mass of individuals begins to embody a new behavior or awareness, it becomes easierāinstinctiveāfor others to follow suit. Like the proverbial hundredth monkey who begins to wash the fruit in the sea water, and suddenly, monkeys across islands begin doing the sameāwithout ever meeting.
When enough individuals embody a pattern, it ripples outward. Not through propaganda, but through field effect and wave propagation. It becomes accessible, instinctive, familiarāeven across great distance.
Bitcoin spreads in this way. Not through centralized broadcast, but through subtle resonance. Each new node, each individual who integrates the protocol into their life, strengthens the signal for others. The protocol doesnāt shout; it hums, oscillates and vibratesāāpersistently, coherently, patiently.
One awakens. Another follows. The current builds. What was fringe becomes familiar. What was radical becomes obvious.
This is the sacred geometry of spiritual awakening. One awakens, another follows, and soon the fluidic current is strong enough to carry the rest. One becomes two, two become many, and eventually the many become One again. This tessellation reverberates through the human aura, not as ideology, but as perceivable pattern recognition.
Bitcoinās most powerful marketing tool is truth. Its most compelling evangelist is reality. Its most unstoppable force is resonance.
Therefore, Bitcoin is not just financial infrastructureāit is psychic scaffolding. It is part of the subtle architecture through which new patterns of coherence ripple across the collective field.Ā
The training wheels from which humanity learns to embody Peace and Prosperity.
Ego Deflation
The process of awakening is not linear, and its beginning is rarely gentleāit usually begins with disruption, with ego inflation and destruction.
To individuate is to shape a center; to recognize peripherals and create boundariesāto say, āI am.ā But without integration, the ego tiltsācollapsing into void or inflating into noise. Fiat reflects this pathology: scarcity hoarded, abundance simulated. Stagnation becomes disguised as safety, and inflation masquerades as growth.
In other words, to become whole, the ego must first riseāclaiming agency, autonomy, and identity. However, when left unbalanced, it inflates, or implodes. It forgets its context. It begins to consume rather than connect. And so the process must reverse: what inflates must deflate.
In the fiat paradigm, this inflation is literal. More is printed, and ethos is diluted. Savings decay. Meaning erodes. Value is abstracted. The economy becomes bloated with inaudible noise. And like the psyche that refuses to confront its own shadow, it begins to collapse under the weight of its own illusions.
But under Bitcoin, time is honored. Value is preserved. Energy is not abstracted but grounded.
Bitcoin is inherently deflationaryāin both economic and spiritual senses. With a fixed supply, it reveals what is truly scarce. Not money, not statusābut the finite number of heartbeats we each carry.
To see Bitcoin is to feel that limit in oneās soul. To hold Bitcoin is to feel Timeās weight again. To sense the importance of Bitcoin is to feel the value of preserved, potential energy. It is to confront the reality that what matters cannot be printed, inflated, or faked. In this way, Bitcoin gently confronts the egoānot through punishment, but through clarity.
Deflation, rightly understood, is not collapseāit is refinement. It strips away illusion, bloat, and excess. It restores the clarity of essence.
Spiritually, this is liberation.
The Coin of Great Price
There is an ancient parable told by a wise man:
āThe kingdom of heaven is like a merchant seeking fine pearls, who, upon finding one of great price, sold all he had and bought it.ā
Bitcoin is such a pearl.
But the ledger is more than a chest full of treasure. It is a key to the heart of things.
It is not just softwareāit is sacrament.
A symbol of what cannot be corrupted. A mirror of divine order etched into code. A map back to the sacred center.
It reflects what endures. It encodes what cannot be falsified. It remembers what we forgot: that Truth, when aligned with form, becomes Light once again.
Its design is not arbitrary. It speaks the language of life itselfāĀ
The elliptic orbits of the planets mirrored in its cryptography,
The logarithmic spiral of the nautilus shell discloses its adoption rate,
The interconnectivity of mycelium in soil reflect the network of nodes in cyberspace,Ā
A webbed breadth of neurons across synaptic space fires with each new confirmed transaction.
It is geometry in devotion. Stillness in motion.
It is the Logos clothed in protocol.
What this key unlocks is beyond external riches. It is the eternal gold within us.
Clarity. Sovereignty. The unshakeable knowing that what is real cannot be taken. That what is sacred was never for sale.
Bitcoin is not the destination.
It is the Path.
And weāwhen we are willing to see itāare the Temple it leads back to.
-
@ 3f68dede:779bb81d
2025-05-19 17:01:57testing schedule
-
@ 0176967e:1e6f471e
2024-07-25 20:53:07AI hype vnĆmame asi vÅ”etci okolo nĆ”s ā už takmer každĆ” appka ponĆŗka nejakĆŗ āAI fĆÄuruā, AI startupy raisujĆŗ stovky miliónov a Európa ako obvykle pracuje na regulovanĆ a naÅ”ej ochrane pred nebezpeÄĆm umelej inteligencie. Pomaly sa ale ukazuje āovocieā spojenia umelej inteligencie a Äloveka, kedy mnohà ľudia reportujĆŗ signifikantnĆ© zvýŔenie produktivity v prĆ”ci ako aj kreatĆvnych aktivitĆ”ch (aj napriek tomu, že mnohĆ hardcore kreatĆvci by každĆ©ho pri spomenutĆ skratky āAIā najradÅ”ej upĆ”lili). V prvej polovici prednÔŔky sa pozrieme na to, akými rĆ“znymi spĆ“sobmi nĆ”m vie byÅ„ AI nĆ”pomocnĆ”, Äi už v prĆ”ci alebo osobnom živote.
UmelĆ© neuróny nĆ”m už vyskakujĆŗ pomaly aj z ovsených vloÄiek, no to ako sa k nĆ”m dostĆ”vajĆŗ sa veľmi lĆÅ”i. Hlavne v tom, Äi ich poskytujĆŗ firmy v zatvorených alebo open-source modeloch. V druhej polovici prednÔŔky sa pozrieme na boom okolo otvorených AI modelov a ako ich vieme využiÅ„.
-
@ 005bc4de:ef11e1a2
2025-05-19 17:01:54Keys and Religion
Mixing
Normally, I'm not a fan mixing and comparing bitcoinesque things and religion. It's too banal and trite, too easy: the religion of Bitcoin, the allusion of Satoshi the savior, the "Book of Satoshi," even the "Genesis" block. But, today, I'll break my own rule.
Yesterday, I heard a Christian pastor speak of the "keys of the kingdom." My feeling is that, were you to ask the average Christian, "What is the key, or keys, to the kingdom?", and perhaps I'm wrong on this, but I think they'd answer, "Prayer." I've heard it many times, "Prayer is the key to the kingdom." It's an easy mantra to remember. And, prayer is important for a Christian, no question about it. However, Biblically, the phrase "keys of the kingdom" refers to something else.
As the pastor pointed out yesterday, Biblically there are two keys: the binding key and the loosing key. This refers to Matthew 16:19 where Jesus says:
I will give you the keys of the kingdom of heaven; whatever you bind on earth will be bound in heaven, and whatever you loose on earth will be loosed in heaven. Matthew 16:19 (NIV)
For context, back up a few verses. This statement above was made in a conversation between Jesus and his disciple Simon Peter.
15 Jesus asked, āBut what about you?ā he asked. āWho do you say I am?ā 16 Simon Peter answered, āYou are the Messiah, the Son of the living God.ā 17 Jesus replied, āBlessed are you, Simon son of Jonah, for this was not revealed to you by flesh and blood, but by my Father in heaven. 18 And I tell you that you are Peter, and on this rock I will build my church, and the gates of Hades will not overcome it.
Although brief, this is a deep and rich exchange. Traditionally, this has been viewed as the moment that Christ instituted the Christian church, the passing of power and authority to the early church itself. There has been confusion over it too, particularly the "...on this rock I will build my church..." part of it. Jesus was referring to Simon Peter's statement of faith (...for this was not revealed to you by flesh and blood...) with the "this" being what Peter had just said, "You are the Messiah, the Son of the living God." The church would be built upon the rock of faith in Jesus as the Messiah.
The early Christian church thus established, Jesus instituted what's come to be called the "office of the keys." That is, Jesus grants authority to his "appointees" in the church to carry out his authority. In more practical terms, this is referring to those who have been called into church service, normally priests, to forgive or not forgive sins. When a priest or pastor forgives, or not, it is not that he is doing it by his own right or power. That priest is, after all, yet another sinful man as well. Instead, the priest forgives by Christ's authority which was handed down by Jesus himself in those words to Peter.
To use an analogy, suppose a general had to make a decision about foot soldiers on the front line, waiting there in the trenches. Due to some time constraint, a decision for action was needed imminently. However, suppose the general lacked some bit of information that could only be obtained at the front. So, the general wrote up a communique to the lieutenant stationed at the front saying, "You assess the situation, and you make the call, charge or pull back. I'll support your decision." A courier ran to the front, relayed the message to the lieutenant, and the lieutenant assessed and made the decision. Ultimately, even thought the lieutenant made the decision, the authority behind the decision lay with the general who had transferred his authority to the lieutenant.
This authority or office of the keys is mirrored in John 20:22-23, when the resurrected Jesus appears to his disciples and says, "If you forgive anyoneās sins, their sins are forgiven; if you do not forgive them, they are not forgiven.ā
Going just one step further, recall there are two keys involved, binding and loosing, and there are two places involved, earth and heaven. Usually, priests and pastors are "in the business" of forgiving. Penitence or confession, when real, is forgiven. The priest has the authority to forgive, or "loose" the sinner from his wrongdoings here on earth. And, that forgiveness applies to heaven as well, the sin is atoned and reconciled with God.
But, what about when the person is unrepentant, unbothered by what is Biblically sinful, refuses to change his ways, and rather chooses to continue in sinful ways? The "binding" key says that the priest or appointed church leader can hold that person accountable, can bind that person to the sin and separation from God. Normally, we hear of "excommunication" from the church which is formally stating that a person is outside of the church body. The binding keys still bind, both on earth as being outside of the church and in heaven as being separated from God.
And bitcoin?
That's a lot of religion, and heavy religion at that. The question is, what does this have to do with bitcoin?
Keys.
Namely, this is about public and private keys. Loosing and binding keys. A bit more religion, then I'll get back to bitcoin.
Yesterday, the pastor spoke briefly about binding and loosing keys, and this where my thoughts about keys somehow morphed over into bitcoin. For some reason, I pictured Herod's Temple. There had been Solomon's temple, which was destroyed, and then there was Herod's which was known for its beauty and was the one during Jesus's time. But, let's recall the background on this...
The book of Exodus, and others in the Old Testament, outline in detail God's plan for the tabernacle (a traveling tent) and for the temple in Jerusalem.
The tabernacle, overhead diagram. Image source: https://en.wikipedia.org/wiki/Tabernacle
You might recall the "history" lesson in Raiders of the Lost Ark. With the tabernacle and temple, one of the purposes was to house the ark of the covenant. Remember that the ark was the golden box that the Israelites carried around containing Moses's stone tablets with the Ten Commandments, some manna, and Aaron's staff. It held great power, God's power, and God literally met and spoke with the Levite priests hovering over the cherubim's wings.
The ark of the covenant. Image source: https://en.wikipedia.org/wiki/Ark_of_the_Covenant
In the tabernacle and temple, the "Holy of Holies" was a room, separated by a heavy curtain. It was off limits to all because it was, well, holy of holies. A heavy curtain divided the Holy of Holies, or the "Most Holy Place", from the less-holy, "Holy Place."
Once a year, on the Day of Atonement, one person, the chief priest, was allowed to walk into the Holy of Holies. He would sprinkle the blood of a sacrificed animal onto the ark. This was done for the forgiveness of the people's sins. Although this was pre-Jesus's words, this was using the loosing keys and was loosing sin.
This was serious business and was taken seriously. For instance, the priests Nadab and Abihu improperly performed their sacrificial duties, they messed up the procedure, and were consumed by fire. Priesthood was a dangerous occupation, one slip up and you were scorched.
The second temple, "Herod's Temple". Image source: https://en.wikipedia.org/wiki/Second_Temple
Back to keys...
Yesterday, for some reason when I heard about binding and loosing keys, I imagined the chief priest standing in front of the curtain. I imagined him taking a deep breath, collecting his thoughts, getting ready to go in. It had to be intimidating.
As he stood there, in my mind, he and everyone else was shut out. The Most Holy Place was bound and locked. Walking in meant getting scorched (again, the end of Raiders of the Lost Ark). Yet, that priest had the loosing key. He had, first, permission as chief priest to enter on the Day of Atonement, secondly, he had the sacrificial blood to loose sins. Although the binding key had locked the Holy of Holies and thus bound the sins of the people, the loosing key was about to loose their sins.
Cryptographic keys
And back to bitcoin...
Bitcoin, and cryptography in general, operate on public and private keys. Any flavor of "cryptocurrency", or even Nostr, has public and private keys. In a way, these are binding and loosing keys.
Say you have 1.0 BTC (that's 100,000,000 sats š). That BTC exists as a UTXO which can be seen by anyone viewing your public address. In this way, your bitcoin public key is your binding key...that UTXO, that bitcoin, is bound to your public key...it is locked in place behind that heavy curtain. It will be there forever, unless there is an intervention...
You also have your private key, your loosing key. You can apply your private key to loose that UTXO, that bitcoin, and to send it along to wherever.
This is like law and gospel: sin is binding, however Jesus frees it. A bitcoin UTXO is bound until a private key looses it.
Nostr offers a somewhat similar illustration. You have an npub publicly and and nsec secretly or privately. If you were to write a note, your private nsec is needed as a loosing key to free that message, to broadcast it to the world. Once broadcast, it can be seen by all, however it is still inextricably bound or tied to your public key (your npub). Your npub is your binding key and your message is bound to it.
Summed
I'm not sure this binding and loosing keys in religion, and public and private keys in cryptography is the best comparison in the world. It's probably a terrible comparison. But, this is what came to my mind yesterday.
And, so, the mixing of religion and bitcoin is now officially over.
-
@ 0176967e:1e6f471e
2024-07-25 20:38:11Äo vznikne keÄ spojĆÅ” hru SNAKE zo starej Nokie 3310 a Bitcoin? - hra Chain Duel!
Jedna z najlepÅ”Ćch implementĆ”ciĆ funkcionality Lightning Networku a gamingu vo svete Bitcoinu.
VyskĆŗÅ”aÅ„ si ju mÓžete s kamoÅ”mi na tomto odkaze. Na strĆ”nke nĆ”jdeÅ” aj zĆ”kladnĆ© pravidlĆ” hry avÅ”ak odporĆŗÄame pravidlĆ” pochopiÅ„ aj priamo hranĆm
Chain Duel si zĆskava hromady fanĆŗÅ”ikov po bitcoinových konferenciĆ”ch po celom svete a prĆ”ve na Lunarpunk festival ho prinesieme tiež.
Multiplayer 1v1 hra, kde nejde o nĆ”hodu, ale skill, vĆ”s dostane. PoÄte si zmeraÅ„ sily s ÄalÅ”Ćmi bitcoinermi a vyhraÅ„ okrem samotných satoshi rĆ“zne inĆ© ceny.
PrĆÄte sa zĆŗÄastniÅ„ prvĆ©ho oficiĆ”lneho Chain Duel turnaja na Slovensku!
Pre ĆŗÄasÅ„ na turnaji je potrebnĆ” registrĆ”cia dopredu.
-
@ 40b9c85f:5e61b451
2025-04-24 15:27:02Introduction
Data Vending Machines (DVMs) have emerged as a crucial component of the Nostr ecosystem, offering specialized computational services to clients across the network. As defined in NIP-90, DVMs operate on an apparently simple principle: "data in, data out." They provide a marketplace for data processing where users request specific jobs (like text translation, content recommendation, or AI text generation)
While DVMs have gained significant traction, the current specification faces challenges that hinder widespread adoption and consistent implementation. This article explores some ideas on how we can apply the reflection pattern, a well established approach in RPC systems, to address these challenges and improve the DVM ecosystem's clarity, consistency, and usability.
The Current State of DVMs: Challenges and Limitations
The NIP-90 specification provides a broad framework for DVMs, but this flexibility has led to several issues:
1. Inconsistent Implementation
As noted by hzrd149 in "DVMs were a mistake" every DVM implementation tends to expect inputs in slightly different formats, even while ostensibly following the same specification. For example, a translation request DVM might expect an event ID in one particular format, while an LLM service could expect a "prompt" input that's not even specified in NIP-90.
2. Fragmented Specifications
The DVM specification reserves a range of event kinds (5000-6000), each meant for different types of computational jobs. While creating sub-specifications for each job type is being explored as a possible solution for clarity, in a decentralized and permissionless landscape like Nostr, relying solely on specification enforcement won't be effective for creating a healthy ecosystem. A more comprehensible approach is needed that works with, rather than against, the open nature of the protocol.
3. Ambiguous API Interfaces
There's no standardized way for clients to discover what parameters a specific DVM accepts, which are required versus optional, or what output format to expect. This creates uncertainty and forces developers to rely on documentation outside the protocol itself, if such documentation exists at all.
The Reflection Pattern: A Solution from RPC Systems
The reflection pattern in RPC systems offers a compelling solution to many of these challenges. At its core, reflection enables servers to provide metadata about their available services, methods, and data types at runtime, allowing clients to dynamically discover and interact with the server's API.
In established RPC frameworks like gRPC, reflection serves as a self-describing mechanism where services expose their interface definitions and requirements. In MCP reflection is used to expose the capabilities of the server, such as tools, resources, and prompts. Clients can learn about available capabilities without prior knowledge, and systems can adapt to changes without requiring rebuilds or redeployments. This standardized introspection creates a unified way to query service metadata, making tools like
grpcurl
possible without requiring precompiled stubs.How Reflection Could Transform the DVM Specification
By incorporating reflection principles into the DVM specification, we could create a more coherent and predictable ecosystem. DVMs already implement some sort of reflection through the use of 'nip90params', which allow clients to discover some parameters, constraints, and features of the DVMs, such as whether they accept encryption, nutzaps, etc. However, this approach could be expanded to provide more comprehensive self-description capabilities.
1. Defined Lifecycle Phases
Similar to the Model Context Protocol (MCP), DVMs could benefit from a clear lifecycle consisting of an initialization phase and an operation phase. During initialization, the client and DVM would negotiate capabilities and exchange metadata, with the DVM providing a JSON schema containing its input requirements. nip-89 (or other) announcements can be used to bootstrap the discovery and negotiation process by providing the input schema directly. Then, during the operation phase, the client would interact with the DVM according to the negotiated schema and parameters.
2. Schema-Based Interactions
Rather than relying on rigid specifications for each job type, DVMs could self-advertise their schemas. This would allow clients to understand which parameters are required versus optional, what type validation should occur for inputs, what output formats to expect, and what payment flows are supported. By internalizing the input schema of the DVMs they wish to consume, clients gain clarity on how to interact effectively.
3. Capability Negotiation
Capability negotiation would enable DVMs to advertise their supported features, such as encryption methods, payment options, or specialized functionalities. This would allow clients to adjust their interaction approach based on the specific capabilities of each DVM they encounter.
Implementation Approach
While building DVMCP, I realized that the RPC reflection pattern used there could be beneficial for constructing DVMs in general. Since DVMs already follow an RPC style for their operation, and reflection is a natural extension of this approach, it could significantly enhance and clarify the DVM specification.
A reflection enhanced DVM protocol could work as follows: 1. Discovery: Clients discover DVMs through existing NIP-89 application handlers, input schemas could also be advertised in nip-89 announcements, making the second step unnecessary. 2. Schema Request: Clients request the DVM's input schema for the specific job type they're interested in 3. Validation: Clients validate their request against the provided schema before submission 4. Operation: The job proceeds through the standard NIP-90 flow, but with clearer expectations on both sides
Parallels with Other Protocols
This approach has proven successful in other contexts. The Model Context Protocol (MCP) implements a similar lifecycle with capability negotiation during initialization, allowing any client to communicate with any server as long as they adhere to the base protocol. MCP and DVM protocols share fundamental similarities, both aim to expose and consume computational resources through a JSON-RPC-like interface, albeit with specific differences.
gRPC's reflection service similarly allows clients to discover service definitions at runtime, enabling generic tools to work with any gRPC service without prior knowledge. In the REST API world, OpenAPI/Swagger specifications document interfaces in a way that makes them discoverable and testable.
DVMs would benefit from adopting these patterns while maintaining the decentralized, permissionless nature of Nostr.
Conclusion
I am not attempting to rewrite the DVM specification; rather, explore some ideas that could help the ecosystem improve incrementally, reducing fragmentation and making the ecosystem more comprehensible. By allowing DVMs to self describe their interfaces, we could maintain the flexibility that makes Nostr powerful while providing the structure needed for interoperability.
For developers building DVM clients or libraries, this approach would simplify consumption by providing clear expectations about inputs and outputs. For DVM operators, it would establish a standard way to communicate their service's requirements without relying on external documentation.
I am currently developing DVMCP following these patterns. Of course, DVMs and MCP servers have different details; MCP includes capabilities such as tools, resources, and prompts on the server side, as well as 'roots' and 'sampling' on the client side, creating a bidirectional way to consume capabilities. In contrast, DVMs typically function similarly to MCP tools, where you call a DVM with an input and receive an output, with each job type representing a different categorization of the work performed.
Without further ado, I hope this article has provided some insight into the potential benefits of applying the reflection pattern to the DVM specification.
-
@ 3f68dede:779bb81d
2025-05-19 17:01:19testing schedule
-
@ 6e64b83c:94102ee8
2025-04-23 20:23:34How to Run Your Own Nostr Relay on Android with Cloudflare Domain
Prerequisites
- Install Citrine on your Android device:
- Visit https://github.com/greenart7c3/Citrine/releases
- Download the latest release using:
- zap.store
- Obtainium
- F-Droid
- Or download the APK directly
-
Note: You may need to enable "Install from Unknown Sources" in your Android settings
-
Domain Requirements:
- Purchase a domain if you don't have one
-
Transfer your domain to Cloudflare if it's not already there (for free SSL certificates and cloudflared support)
-
Tools to use:
- nak (the nostr army knife):
- Download from https://github.com/fiatjaf/nak/releases
- Installation steps:
-
For Linux/macOS: ```bash # Download the appropriate version for your system wget https://github.com/fiatjaf/nak/releases/latest/download/nak-linux-amd64 # for Linux # or wget https://github.com/fiatjaf/nak/releases/latest/download/nak-darwin-amd64 # for macOS
# Make it executable chmod +x nak-*
# Move to a directory in your PATH sudo mv nak-* /usr/local/bin/nak
- For Windows:
batch # Download the Windows version curl -L -o nak.exe https://github.com/fiatjaf/nak/releases/latest/download/nak-windows-amd64.exe# Move to a directory in your PATH (e.g., C:\Windows) move nak.exe C:\Windows\nak.exe
- Verify installation:
bash nak --version ```
Setting Up Citrine
- Open the Citrine app
- Start the server
- You'll see it running on
ws://127.0.0.1:4869
(local network only) - Go to settings and paste your npub into "Accept events signed by" inbox and press the + button. This prevents others from publishing events to your personal relay.
Installing Required Tools
- Install Termux from Google Play Store
- Open Termux and run:
bash pkg update && pkg install wget wget https://github.com/cloudflare/cloudflared/releases/latest/download/cloudflared-linux-arm64.deb dpkg -i cloudflared-linux-arm64.deb
Cloudflare Authentication
- Run the authentication command:
bash cloudflared tunnel login
- Follow the instructions:
- Copy the provided URL to your browser
- Log in to your Cloudflare account
- If the URL expires, copy it again after logging in
Creating the Tunnel
- Create a new tunnel:
bash cloudflared tunnel create <TUNNEL_NAME>
- Choose any name you prefer for your tunnel
-
Copy the tunnel ID after creating the tunnel
-
Create and configure the tunnel config:
bash touch ~/.cloudflared/config.yml nano ~/.cloudflared/config.yml
-
Add this configuration (replace the placeholders with your values): ```yaml tunnel:
credentials-file: /data/data/com.termux/files/home/.cloudflared/ .json ingress: - hostname: nostr.yourdomain.com service: ws://localhost:4869
- service: http_status:404 ```
- Note: In nano editor:
CTRL+O
and Enter to saveCTRL+X
to exit
-
Note: Check the credentials file path in the logs
-
Validate your configuration:
bash cloudflared tunnel validate
-
Start the tunnel:
bash cloudflared tunnel run my-relay
Preventing Android from Killing the Tunnel
Run these commands to maintain tunnel stability:
bash date && apt install termux-tools && termux-setup-storage && termux-wake-lock echo "nameserver 1.1.1.1" > $PREFIX/etc/resolv.conf
Tip: You can open multiple Termux sessions by swiping from the left edge of the screen while keeping your tunnel process running.
Updating Your Outbox Model Relays
Once your relay is running and accessible via your domain, you'll want to update your relay list in the Nostr network. This ensures other clients know about your relay and can connect to it.
Decoding npub (Public Key)
Private keys (nsec) and public keys (npub) are encoded in bech32 format, which includes: - A prefix (like nsec1, npub1 etc.) - The encoded data - A checksum
This format makes keys: - Easy to distinguish - Hard to copy incorrectly
However, most tools require these keys in hexadecimal (hex) format.
To decode an npub string to its hex format:
bash nak decode nostr:npub1dejts0qlva8mqzjlrxqkc2tmvs2t7elszky5upxaf3jha9qs9m5q605uc4
Change it with your own npub.
bash { "pubkey": "6e64b83c1f674fb00a5f19816c297b6414bf67f015894e04dd4c657e94102ee8" }
Copy the pubkey value in quotes.
Create a kind 10002 event with your relay list:
- Include your new relay with write permissions
- Include other relays you want to read from and write to, omit 3rd parameter to make it both read and write
Example format:
json { "kind": 10002, "tags": [ ["r", "wss://your-relay-domain.com", "write"], ["r", "wss://eden.nostr.land/"], ["r", "wss://nos.lol/"], ["r", "wss://nostr.bitcoiner.social/"], ["r", "wss://nostr.mom/"], ["r", "wss://relay.primal.net/"], ["r", "wss://nostr.wine/", "read"], ["r", "wss://relay.damus.io/"], ["r", "wss://relay.nostr.band/"], ["r", "wss://relay.snort.social/"] ], "content": "" }
Save it to a file called
event.json
Note: Add or remove any relays you want. To check your existing 10002 relays: - Visit https://nostr.band/?q=by%3Anpub1dejts0qlva8mqzjlrxqkc2tmvs2t7elszky5upxaf3jha9qs9m5q605uc4+++kind%3A10002 - nostr.band is an indexing service, it probably has your relay list. - Replace
npub1xxx
in the URL with your own npub - Click "VIEW JSON" from the menu to see the raw event - Or use thenak
tool if you know the relaysbash nak req -k 10002 -a <your-pubkey> wss://relay1.com wss://relay2.com
Replace `<your-pubkey>` with your public key in hex format (you can get it using `nak decode <your-npub>`)
- Sign and publish the event:
- Use a Nostr client that supports kind 10002 events
- Or use the
nak
command-line tool:bash nak event --sec ncryptsec1... wss://relay1.com wss://relay2.com $(cat event.json)
Important Security Notes: 1. Never share your nsec (private key) with anyone 2. Consider using NIP-49 encrypted keys for better security 3. Never paste your nsec or private key into the terminal. The command will be saved in your shell history, exposing your private key. To clear the command history: - For bash: use
history -c
- For zsh: usefc -W
to write history to file, thenfc -p
to read it back - Or manually edit your shell history file (e.g.,~/.zsh_history
or~/.bash_history
) 4. if you're usingzsh
, usefc -p
to prevent the next command from being saved to history 5. Or temporarily disable history before running sensitive commands:bash unset HISTFILE nak key encrypt ... set HISTFILE
How to securely create NIP-49 encypted private key
```bash
Read your private key (input will be hidden)
read -s SECRET
Read your password (input will be hidden)
read -s PASSWORD
encrypt command
echo "$SECRET" | nak key encrypt "$PASSWORD"
copy and paste the ncryptsec1 text from the output
read -s ENCRYPTED nak key decrypt "$ENCRYPTED"
clear variables from memory
unset SECRET PASSWORD ENCRYPTED ```
On a Windows command line, to read from stdin and use the variables in
nak
commands, you can use a combination ofset /p
to read input and then use those variables in your command. Here's an example:```bash @echo off set /p "SECRET=Enter your secret key: " set /p "PASSWORD=Enter your password: "
echo %SECRET%| nak key encrypt %PASSWORD%
:: Clear the sensitive variables set "SECRET=" set "PASSWORD=" ```
If your key starts with
ncryptsec1
, thenak
tool will securely prompt you for a password when using the--sec
parameter, unless the command is used with a pipe< >
or|
.bash nak event --sec ncryptsec1... wss://relay1.com wss://relay2.com $(cat event.json)
- Verify the event was published:
- Check if your relay list is visible on other relays
-
Use the
nak
tool to fetch your kind 10002 events:bash nak req -k 10002 -a <your-pubkey> wss://relay1.com wss://relay2.com
-
Testing your relay:
- Try connecting to your relay using different Nostr clients
- Verify you can both read from and write to your relay
- Check if events are being properly stored and retrieved
- Tip: Use multiple Nostr clients to test different aspects of your relay
Note: If anyone in the community has a more efficient method of doing things like updating outbox relays, please share your insights in the comments. Your expertise would be greatly appreciated!
-
@ f32184ee:6d1c17bf
2025-04-23 13:21:52Ads Fueling Freedom
Ross Ulbrichtās "Decentralize Social Media" painted a picture of a user-centric, decentralized future that transcended the limitations of platforms like the tech giants of today. Though focused on social media, his concept provided a blueprint for decentralized content systems writ large. The PROMO Protocol, designed by NextBlock while participating in Sovereign Engineering, embodies this blueprint in the realm of advertising, leveraging Nostr and Bitcoinās Lightning Network to give individuals control, foster a multi-provider ecosystem, and ensure secure value exchange. In this way, Ulbrichtās 2021 vision can be seen as a prescient prediction of the PROMO Protocolās structure. This is a testament to the enduring power of his ideas, now finding form in NextBlockās innovative approach.
[Current Platform-Centric Paradigm, source: Ross Ulbricht's Decentralize Social Media]
Ulbrichtās Vision: A Decentralized Social Protocol
In his 2021 Medium article Ulbricht proposed a revolutionary vision for a decentralized social protocol (DSP) to address the inherent flaws of centralized social media platforms, such as privacy violations and inconsistent content moderation. Writing from prison, Ulbricht argued that decentralization could empower users by giving them control over their own content and the value they create, while replacing single, monolithic platforms with a competitive ecosystem of interface providers, content servers, and advertisers. Though his focus was on social media, Ulbrichtās ideas laid a conceptual foundation that strikingly predicts the structure of NextBlockās PROMO Protocol, a decentralized advertising system built on the Nostr protocol.
[A Decentralized Social Protocol (DSP), source: Ross Ulbricht's Decentralize Social Media]
Ulbrichtās Principles
Ulbrichtās article outlines several key principles for his DSP: * User Control: Users should own their content and dictate how their data and creations generate value, rather than being subject to the whims of centralized corporations. * Decentralized Infrastructure: Instead of a single platform, multiple interface providers, content hosts, and advertisers interoperate, fostering competition and resilience. * Privacy and Autonomy: Decentralized solutions for profile management, hosting, and interactions would protect user privacy and reduce reliance on unaccountable intermediaries. * Value Creation: Users, not platforms, should capture the economic benefits of their contributions, supported by decentralized mechanisms for transactions.
These ideas were forward-thinking in 2021, envisioning a shift away from the centralized giants dominating social media at the time. While Ulbricht didnāt specifically address advertising protocols, his framework for decentralization and user empowerment extends naturally to other domains, like NextBlockās open-source offering: the PROMO Protocol.
NextBlockās Implementation of PROMO Protocol
The PROMO Protocol powers NextBlock's Billboard app, a decentralized advertising protocol built on Nostr, a simple, open protocol for decentralized communication. The PROMO Protocol reimagines advertising by: * Empowering People: Individuals set their own ad prices (e.g., 500 sats/minute), giving them direct control over how their attention or space is monetized. * Marketplace Dynamics: Advertisers set budgets and maximum bids, competing within a decentralized system where a 20% service fee ensures operational sustainability. * Open-Source Flexibility: As an open-source protocol, it allows multiple developers to create interfaces or apps on top of it, avoiding the single-platform bottleneck Ulbricht critiqued. * Secure Payments: Using Strike Integration with Bitcoin Lightning Network, NextBlock enables bot-resistant and intermediary-free transactions, aligning value transfer with each person's control.
This structure decentralizes advertising in a way that mirrors Ulbrichtās broader vision for social systems, with aligned principles showing a specific use case: monetizing attention on Nostr.
Aligned Principles
Ulbrichtās 2021 article didnāt explicitly predict the PROMO Protocol, but its foundational concepts align remarkably well with NextBlock's implementation the protocolās design: * Autonomy Over Value: Ulbricht argued that users should control their content and its economic benefits. In the PROMO Protocol, people dictate ad pricing, directly capturing the value of their participation. Whether itās their time, influence, or digital space, rather than ceding it to a centralized ad network. * Ecosystem of Providers: Ulbricht envisioned multiple providers replacing a single platform. The PROMO Protocolās open-source nature invites a similar diversity: anyone can build interfaces or tools on top of it, creating a competitive, decentralized advertising ecosystem rather than a walled garden. * Decentralized Transactions: Ulbrichtās DSP implied decentralized mechanisms for value exchange. NextBlock delivers this through the Bitcoin Lightning Network, ensuring that payments for ads are secure, instantaneous and final, a practical realization of Ulbrichtās call for user-controlled value flows. * Privacy and Control: While Ulbricht emphasized privacy in social interactions, the PROMO Protocol is public by default. Individuals are fully aware of all data that they generate since all Nostr messages are signed. All participants interact directly via Nostr.
[Blueprint Match, source NextBlock]
Who We Are
NextBlock is a US-based new media company reimagining digital ads for a decentralized future. Our founders, software and strategy experts, were hobbyist podcasters struggling to promote their work online without gaming the system. That sparked an idea: using new tech likeĀ NostrĀ andĀ BitcoinĀ to build a decentralized attention market for people who value control and businesses seeking real connections.
Our first product, Billboard, is launching this June.
Open for All
Our modelās open-source! Check out theĀ PROMO Protocol, built for promotion and attention trading. Anyone can join this decentralized ad network. Run your own billboard or use ours. This is a growing ecosystem for a new ad economy.
Our Vision
NextBlock wants to help build a new decentralized internet. Our revolutionary and transparent business model will bring honest revenue to companies hosting valuable digital spaces. Together, we will discover what our attention is really worth.
Read ourĀ ManifestoĀ to learn more.
NextBlockĀ is registered in Texas, USA.
-
@ 3f68dede:779bb81d
2025-05-19 17:00:18testing schedule
-
@ 0176967e:1e6f471e
2024-07-22 19:57:47Co se nomĆ”dskĆ” rodina již 3 roky utĆkajĆcĆ pÅed kontrolou nauÄila o kontrole samotnĆ©? Co je to vlastnÄ svoboda? Může koexistovat se strachem? S konfliktem? Zkusme na chvĆli zapomenout na danÄ, policii a stĆ”t a pohlĆ©dnout na svobodu i mimo hranice spoleÄenských ideologiĆ. Zkusme namĆsto hledĆ”nĆ dalÅ”Ćch odpovÄdĆ zjistit, zda se jeÅ”tÄ nÄkde neukrývajĆ novĆ© otĆ”zky. MožnĆ” to bude trochu ezo.
Karel provozuje již pÅes 3 roky se svou ženou, dvÄmi dÄtmi a jednĆm psem minimalistický život v obytnĆ© dodĆ”vce. Na cestĆ”ch spolu zaÄali tvoÅit youtubový kanĆ”l "Karel od Martiny" o svobodÄ, nomĆ”dstvĆ, anarchii, rodiÄovstvĆ, drogĆ”ch a dalÅ”Ćch normĆ”lnĆch vÄcech.
NƔjdete ho aj na nostr.
-
@ 0176967e:1e6f471e
2024-07-21 15:48:56LĆstky na festival Lunarpunku sĆŗ už v predaji na naÅ”om crowdfunding portĆ”li. V predaji sĆŗ dva typy lĆstkov - Å”tandardný vstup a Å”peciĆ”lny vstup spolu s workshopom oranžovĆ©ho leta.
NevĆ”hajte a zabezpeÄte si lĆstok, ÄĆm skĆ“r to urobĆte, tým bude festival lepÅ”Ć.
Platiń mÓžete Bitcoinom - Lightningom aj on-chain. VaŔa vstupenka je e-mail adresa (neposielame potvrdzujúce e-maily, ak platba preŔla, ste in).
-
@ 3f68dede:779bb81d
2025-05-19 16:59:50testing schedule
-
@ 0176967e:1e6f471e
2024-07-21 11:28:18Äo nĆ”m prinÔŔajĆŗ exotickĆ© protokoly ako Nostr, Cashu alebo Reticulum? Å ifrovanie, podpisovanie, peer to peer komunikĆ”ciu, novĆ© spĆ“soby Å”Ćrenia a odmeÅovania obsahu.
UkÔžeme si kúl appky, ako sa dajú jednotlivé siete prepÔjań a ako spolu súvisia.
-
@ 9bde4214:06ca052b
2025-04-22 18:13:37"It's gonna be permissionless or hell."
Gigi and gzuuus are vibing towards dystopia.
Books & articles mentioned:
- AI 2027
- DVMs were a mistake
- Careless People by Sarah Wynn-Williams
- Takedown by Laila michelwait
- The Ultimate Resource by Julian L. Simon
- Harry Potter by J.K. Rowling
- Momo by Michael Ende
In this dialogue:
- Pablo's Roo Setup
- Tech Hype Cycles
- AI 2027
- Prompt injection and other attacks
- Goose and DVMCP
- Cursor vs Roo Code
- Staying in control thanks to Amber and signing delegation
- Is YOLO mode here to stay?
- What agents to trust?
- What MCP tools to trust?
- What code snippets to trust?
- Everyone will run into the issues of trust and micropayments
- Nostr solves Web of Trust & micropayments natively
- Minimalistic & open usually wins
- DVMCP exists thanks to Totem
- Relays as Tamagochis
- Agents aren't nostr experts, at least not right now
- Fix a mistake once & it's fixed forever
- Giving long-term memory to LLMs
- RAG Databases signed by domain experts
- Human-agent hybrids & Chess
- Nostr beating heart
- Pluggable context & experts
- "You never need an API key for anything"
- Sats and social signaling
- Difficulty-adjusted PoW as a rare-limiting mechanism
- Certificate authorities and centralization
- No solutions to policing speech!
- OAuth and how it centralized
- Login with nostr
- Closed vs open-source models
- Tiny models vs large models
- The minions protocol (Stanford paper)
- Generalist models vs specialized models
- Local compute & encrypted queries
- Blinded compute
- "In the eyes of the state, agents aren't people"
- Agents need identity and money; nostr provides both
- "It's gonna be permissionless or hell"
- We already have marketplaces for MCP stuff, code snippets, and other things
- Most great stuff came from marketplaces (browsers, games, etc)
- Zapstore shows that this is already working
- At scale, central control never works. There's plenty scams and viruses in the app stores.
- Using nostr to archive your user-generated content
- HAVEN, blossom, novia
- The switcharoo from advertisements to training data
- What is Truth?
- What is Real?
- "We're vibing into dystopia"
- Who should be the arbiter of Truth?
- First Amendment & why the Logos is sacred
- Silicon Valley AI bros arrogantly dismiss wisdom and philosophy
- Suicide rates & the meaning crisis
- Are LLMs symbiotic or parasitic?
- The Amish got it right
- Are we gonna make it?
- Careless People by Sarah Wynn-Williams
- Takedown by Laila michelwait
- Harry Potter dementors & Momo's time thieves
- Facebook & Google as non-human (superhuman) agents
- Zapping as a conscious action
- Privacy and the internet
- Plausible deniability thanks to generative models
- Google glasses, glassholes, and Meta's Ray Ben's
- People crave realness
- Bitcoin is the realest money we ever had
- Nostr allows for real and honest expression
- How do we find out what's real?
- Constraints, policing, and chilling effects
- Jesus' plans for DVMCP
- Hzrd's article on how DVMs are broken (DVMs were a mistake)
- Don't believe the hype
- DVMs pre-date MCP tools
- Data Vending Machines were supposed to be stupid: put coin in, get stuff out.
- Self-healing vibe-coding
- IP addresses as scarce assets
- Atomic swaps and the ASS protocol
- More marketplaces, less silos
- The intensity of #SovEng and the last 6 weeks
- If you can vibe-code everything, why build anything?
- Time, the ultimate resource
- What are the LLMs allowed to think?
- Natural language interfaces are inherently dialogical
- Sovereign Engineering is dialogical too
-
@ cb4352cd:a16422d7
2025-05-19 16:40:21The countdown is nearly over. On May 30, 2025, the Beyond Banking Conference by WeFi will go live ā gathering thinkers, builders, and innovators from across DeFi, Web3, AI, and FinTech. Whether you're a founder, developer, investor, or just exploring the space, this is where ideas meet momentum.
Four Tracks, One Shared Vision
At the heart of the conference are four thematic tracks, each offering a lens into where finance is heading:
-
DeFAI ā Where AI meets DeFi. From autonomous lending to smart liquidity, this track dives into machine-powered finance.
-
GameFi ā Not just play-to-earn. Think social-first gaming, fast sessions, on-chain assets, and frictionless onboarding.
-
AI + Web3 ā Explore a future shaped by trustless AI agents, generative content, and decentralized governance systems.
-
FinTech AI ā See how financial services are evolving with AI: from compliance and identity to intelligent asset management.
Who Youāll Hear From
Among the voices leading the conversation:
-
VĆt JedliÄka, President of Liberland, on digital sovereignty and blockchain-powered governance.
-
Tigran Hakhunts, HTX Ambassador, on how exchanges are navigating and accelerating decentralized adoption.
And thatās just the beginning ā expect DeFi founders, Web3 infrastructure teams, AI policy researchers, and the next generation of financial technologists.
Whatās Beyond the Keynotes
This isnāt a day of passive watching. Youāll see:
-
Live product demos, including WeFiās own onchain banking tools.
-
Multilingual Q&A sessions where your questions drive the conversation.
-
Real-time translation in 8 languages to keep everything accessible.
-
And yes ā a Ferrari giveaway. Registered attendees automatically enter a lottery to win big.
One Day. A Global Experience.
No flights, no paywalls, no exclusivity. This is finance without borders. Whether youāre tuning in from SĆ£o Paulo or Seoul, youāll be part of a shared global moment.
To join, just connect through the official bot.
The future of finance isnāt happening behind closed doors. Itās unfolding in the open ā and youāre invited. See you May 30.
-
-
@ a39d19ec:3d88f61e
2025-04-22 12:44:42Die Debatte um Migration, Grenzsicherung und Abschiebungen wird in Deutschland meist emotional geführt. Wer fordert, dass illegale Einwanderer abgeschoben werden, sieht sich nicht selten dem Vorwurf des Rassismus ausgesetzt. Doch dieser Vorwurf ist nicht nur sachlich unbegründet, sondern verkehrt die Realität ins Gegenteil: Tatsächlich sind es gerade diejenigen, die hinter jeder Forderung nach Rechtssicherheit eine rassistische Motivation vermuten, die selbst in erster Linie nach Hautfarbe, Herkunft oder Nationalität urteilen.
Das Recht steht über Emotionen
Deutschland ist ein Rechtsstaat. Das bedeutet, dass Regeln nicht nach Bauchgefühl oder politischer Stimmungslage ausgelegt werden kƶnnen, sondern auf klaren gesetzlichen Grundlagen beruhen müssen. Einer dieser GrundsƤtze ist in Artikel 16a des Grundgesetzes verankert. Dort heiĆt es:
āAuf Absatz 1 [Asylrecht] kann sich nicht berufen, wer aus einem Mitgliedstaat der EuropƤischen Gemeinschaften oder aus einem anderen Drittstaat einreist, in dem die Anwendung des Abkommens über die Rechtsstellung der Flüchtlinge und der EuropƤischen Menschenrechtskonvention sichergestellt ist.ā
Das bedeutet, dass jeder, der über sichere Drittstaaten nach Deutschland einreist, keinen Anspruch auf Asyl hat. Wer dennoch bleibt, hält sich illegal im Land auf und unterliegt den geltenden Regelungen zur Rückführung. Die Forderung nach Abschiebungen ist daher nichts anderes als die Forderung nach der Einhaltung von Recht und Gesetz.
Die Umkehrung des Rassismusbegriffs
Wer einerseits behauptet, dass das deutsche Asyl- und Aufenthaltsrecht strikt durchgesetzt werden soll, und andererseits nicht nach Herkunft oder Hautfarbe unterscheidet, handelt wertneutral. Diejenigen jedoch, die in einer solchen Forderung nach Rechtsstaatlichkeit einen rassistischen Unterton sehen, projizieren ihre eigenen Denkmuster auf andere: Sie unterstellen, dass die Debatte ausschlieĆlich entlang ethnischer, rassistischer oder nationaler Kriterien geführt wird ā und genau das ist eine rassistische Denkweise.
Jemand, der illegale Einwanderung kritisiert, tut dies nicht, weil ihn die Herkunft der Menschen interessiert, sondern weil er den Rechtsstaat respektiert. Hingegen erkennt jemand, der hinter dieser Kritik Rassismus wittert, offenbar in erster Linie die āRasseā oder Herkunft der betreffenden Personen und reduziert sie darauf.
Finanzielle Belastung statt ideologischer Debatte
Neben der rechtlichen gibt es auch eine ƶkonomische Komponente. Der deutsche Wohlfahrtsstaat basiert auf einem Solidarprinzip: Die Bürger zahlen in das System ein, um sich gegenseitig in schwierigen Zeiten zu unterstützen. Dieser Wohlstand wurde über Generationen hinweg von denjenigen erarbeitet, die hier seit langem leben. Die PrioritƤt liegt daher darauf, die vorhandenen Mittel zuerst unter denjenigen zu verteilen, die durch Steuern, Sozialabgaben und Arbeit zum Erhalt dieses Systems beitragen ā nicht unter denen, die sich durch illegale Einreise und fehlende wirtschaftliche Eigenleistung in das System begeben.
Das ist keine ideologische Frage, sondern eine rein wirtschaftliche AbwƤgung. Ein Sozialsystem kann nur dann nachhaltig funktionieren, wenn es nicht unbegrenzt belastet wird. Würde Deutschland keine klaren Regeln zur Einwanderung und Abschiebung haben, würde dies unweigerlich zur Ćberlastung des Sozialstaates führen ā mit negativen Konsequenzen für alle.
Sozialpatriotismus
Ein weiterer wichtiger Aspekt ist der Schutz der Arbeitsleistung jener Generationen, die Deutschland nach dem Zweiten Weltkrieg mühsam wieder aufgebaut haben. WƤhrend oft betont wird, dass die Deutschen moralisch kein Erbe aus der Zeit vor 1945 beanspruchen dürfen ā auĆer der Verantwortung für den Holocaust ā, ist es umso bedeutsamer, das neue Erbe nach 1945 zu respektieren, das auf FleiĆ, Disziplin und harter Arbeit beruht. Der Wiederaufbau war eine kollektive Leistung deutscher Menschen, deren Früchte nicht bedenkenlos verteilt werden dürfen, sondern vorrangig denjenigen zugutekommen sollten, die dieses Fundament mitgeschaffen oder es über Generationen mitgetragen haben.
Rechtstaatlichkeit ist nicht verhandelbar
Wer sich für eine konsequente Abschiebepraxis ausspricht, tut dies nicht aus rassistischen Motiven, sondern aus Respekt vor der Rechtsstaatlichkeit und den wirtschaftlichen Grundlagen des Landes. Der Vorwurf des Rassismus in diesem Kontext ist daher nicht nur falsch, sondern entlarvt eine selektive Wahrnehmung nach rassistischen Merkmalen bei denjenigen, die ihn erheben.
-
@ 0176967e:1e6f471e
2024-07-21 11:24:21Podnikanie je jazyk s "crystal clear" pravidlami. InÅ”trumentalisti vidia podnikanie staticky, a toto videnie prenÔŔajĆŗ na spoloÄnosÅ„. Preto nĆ”s spoloÄnosÅ„ vnĆma Äasto negatĆvne. SkutoÄnĆ podnikatelia sĆŗ vÅ”ak "komunikĆ”tori".
Jozef Martiniak je zakladateľ AUSEKON - Institute of Austrian School of Economics
-
@ cae03c48:2a7d6671
2025-05-19 16:06:29Bitcoin Magazine
Abraaj Restaurants Becomes First Bitcoin Treasury Company in the Middle EastToday it was announced that Al Abraaj Restaurants Group B.S.C. has become the first publicly traded company in the region to adopt Bitcoin as a treasury reserve asset. The Bahrain-based hospitality firm announced today it has acquired 5 Bitcoin for its balance sheet, with plans to significantly increase its allocation over time.
JUST IN:
Al Abraaj Restaurants Group becomes first publicly traded company in middle east to purchase #Bitcoin as a treasury reserve asset
pic.twitter.com/QUH5FMGRoy
ā Bitcoin Magazine (@BitcoinMagazine) May 19, 2025
āOur initiative towards becoming a Bitcoin Treasury Company reflects our forward-thinking approach and dedication to maximizing shareholder value,ā said Abdulla Isa, Chairman of the Bitcoin Treasury Committee at Al Abraaj. āWe believe that Bitcoin will play a pivotal role in the future of finance, and we are excited to be at the forefront of this transformation in the Kingdom of Bahrain. 10X is a proven leader in advising and bringing capital to listed Bitcoin Treasury Companies, and we welcome their partnership in helping us build the MicroStrategy of the Middle East.ā
The decision makes Abraaj not only the first in Bahrain, but also in the GCC and wider Middle East, to publicly hold Bitcoin on its balance sheet. The investment is a direct response to growing institutional interest in Bitcoin and comes amid what appears to be a regional shift toward digital assets.
Abraajās strategic partner in the transition is 10X Capital, a New York-based investment firm with a strong track record in digital asset treasury management. 10X previously advised companies like Nakamoto on its $710 million Bitcoin-focused financing round.
āIād like to congratulate Abdalla Isa and the team at Al Abraaj for adopting Bitcoin at the corporate treasury level, finally enabling anyone in the GCC with a brokerage account to gain Bitcoin exposure,ā said Hans Thomas, CEO of 10X Capital. āBahrain continues to be a leader in the Middle East in Bitcoin adoption, backed by a forward-thinking regulatory framework.ā
Thomas added, āThe GCC, with a combined GDP of $2.2 trillion and over $6 trillion in sovereign wealth funds, has until now lacked a publicly listed Bitcoin treasury company like Strategy, Tesla, or Metaplanet. That changes today with ABRAAJās historic Bitcoin purchase.ā
Abraaj said it will continue to work under the regulatory oversight of the Central Bank of Bahrain (CBB) and has pledged full compliance with all digital asset transaction laws. The company will adopt robust custody, risk management, and governance protocols for its Bitcoin holdings.
Disclosure: Nakamoto is in partnership with Bitcoin Magazineās parent company BTC Inc to build the first global network of Bitcoin treasury companies, where BTC Inc provides certain marketing services to Nakamoto. More information on this can be found here.
This post Abraaj Restaurants Becomes First Bitcoin Treasury Company in the Middle East first appeared on Bitcoin Magazine and is written by Jenna Montgomery.
-
@ 0176967e:1e6f471e
2024-07-21 11:20:40Ako sa snažĆm praktizovaÅ„ LunarPunk bez budovania opcionality "odchodom" do zahraniÄia. Nie každý je ochotný alebo schopný meniÅ„ "miesto", ako vÅ”ak v takom prĆpade minimalizovaÅ„ interakciu so Å”tĆ”tom? Nie nĆ”vod, skĆ“r postrehy z bežnĆ©ho života.
-
@ 4ba8e86d:89d32de4
2025-04-21 02:13:56Tutorial feito por nostr:nostr:npub1rc56x0ek0dd303eph523g3chm0wmrs5wdk6vs0ehd0m5fn8t7y4sqra3tk poste original abaixo:
Parte 1 : http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/263585/tutorial-debloat-de-celulares-android-via-adb-parte-1
Parte 2 : http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/index.php/263586/tutorial-debloat-de-celulares-android-via-adb-parte-2
Quando o assunto Ć© privacidade em celulares, uma das medidas comumente mencionadas Ć© a remoção de bloatwares do dispositivo, tambĆ©m chamado de debloat. O meio mais eficiente para isso sem dĆŗvidas Ć© a troca de sistema operacional. Custom Romās como LineageOS, GrapheneOS, IodĆ©, CalyxOS, etc, jĆ” sĆ£o bastante enxutos nesse quesito, principalmente quanto nĆ£o Ć© instalado os G-Apps com o sistema. No entanto, essa prĆ”tica pode acabar resultando em problemas indesejados como a perca de funƧƵes do dispositivo, e atĆ© mesmo incompatibilidade com apps bancĆ”rios, tornando este mĆ©todo mais atrativo para quem possui mais de um dispositivo e separando um apenas para privacidade. Ā Pensando nisso, pessoas que possuem apenas um Ćŗnico dispositivo móvel, que sĆ£o necessitadas desses apps ou funƧƵes, mas, ao mesmo tempo, tem essa visĆ£o em prol da privacidade, buscam por um meio-termo entre manter a Stock rom, e nĆ£o ter seus dados coletados por esses bloatwares. Felizmente, a remoção de bloatwares Ć© possĆvel e pode ser realizada via root, ou mais da maneira que este artigo irĆ” tratar, via adb.
O que são bloatwares?
Bloatware Ć© a junção das palavras bloat (inchar) + software (programa), ou seja, um bloatware Ć© basicamente um programa inĆŗtil ou facilmente substituĆvel ā colocado em seu dispositivo previamente pela fabricante e operadora ā que estĆ” no seu dispositivo apenas ocupando espaƧo de armazenamento, consumindo memória RAM e pior, coletando seus dados e enviando para servidores externos, alĆ©m de serem mais pontos de vulnerabilidades.
O que Ć© o adb?
O Android Debug Brigde, ou apenas adb, é uma ferramenta que se utiliza das permissões de usuÔrio shell e permite o envio de comandos vindo de um computador para um dispositivo Android exigindo apenas que a depuração USB esteja ativa, mas também pode ser usada diretamente no celular a partir do Android 11, com o uso do Termux e a depuração sem fio (ou depuração wifi). A ferramenta funciona normalmente em dispositivos sem root, e também funciona caso o celular esteja em Recovery Mode.
Requisitos:
Para computadores:
⢠Depuração USB ativa no celular; ⢠Computador com adb; ⢠Cabo USB;
Para celulares:
⢠Depuração sem fio (ou depuração wifi) ativa no celular; ⢠Termux; ⢠Android 11 ou superior;
Para ambos:
⢠Firewall NetGuard instalado e configurado no celular; ⢠Lista de bloatwares para seu dispositivo;
Ativação de depuração:
Para ativar a Depuração USB em seu dispositivo, pesquise como ativar as opções de desenvolvedor de seu dispositivo, e lÔ ative a depuração. No caso da depuração sem fio, sua ativação irÔ ser necessÔria apenas no momento que for conectar o dispositivo ao Termux.
Instalação e configuração do NetGuard
O NetGuard pode ser instalado através da própria Google Play Store, mas de preferência instale pela F-Droid ou Github para evitar telemetria.
F-Droid: https://f-droid.org/packages/eu.faircode.netguard/
Github: https://github.com/M66B/NetGuard/releases
Após instalado, configure da seguinte maneira:
ConfiguraƧƵes ā padrƵes (lista branca/negra) ā ative as 3 primeiras opƧƵes (bloquear wifi, bloquear dados móveis e aplicar regras āquando tela estiver ligadaā);
ConfiguraƧƵes ā opƧƵes avanƧadas ā ative as duas primeiras (administrar aplicativos do sistema e registrar acesso a internet);
Com isso, todos os apps estarão sendo bloqueados de acessar a internet, seja por wifi ou dados móveis, e na pÔgina principal do app basta permitir o acesso a rede para os apps que você vai usar (se necessÔrio). Permita que o app rode em segundo plano sem restrição da otimização de bateria, assim quando o celular ligar, ele jÔ estarÔ ativo.
Lista de bloatwares
Nem todos os bloatwares são genéricos, haverÔ bloatwares diferentes conforme a marca, modelo, versão do Android, e até mesmo região.
Para obter uma lista de bloatwares de seu dispositivo, caso seu aparelho jÔ possua um tempo de existência, você encontrarÔ listas prontas facilmente apenas pesquisando por elas. Supondo que temos um Samsung Galaxy Note 10 Plus em mãos, basta pesquisar em seu motor de busca por:
Samsung Galaxy Note 10 Plus bloatware list
Provavelmente essas listas jĆ” terĆ£o inclusas todos os bloatwares das mais diversas regiƵes, lhe poupando o trabalho de buscar por alguma lista mais especĆfica.
Caso seu aparelho seja muito recente, e/ou nĆ£o encontre uma lista pronta de bloatwares, devo dizer que vocĆŖ acaba de pegar em merda, pois Ć© chato para um caralho pesquisar por cada aplicação para saber sua função, se Ć© essencial para o sistema ou se Ć© facilmente substituĆvel.
De antemão jÔ aviso, que mais para frente, caso vossa gostosura remova um desses aplicativos que era essencial para o sistema sem saber, vai acabar resultando na perda de alguma função importante, ou pior, ao reiniciar o aparelho o sistema pode estar quebrado, lhe obrigando a seguir com uma formatação, e repetir todo o processo novamente.
Download do adb em computadores
Para usar a ferramenta do adb em computadores, basta baixar o pacote chamado SDK platform-tools, disponĆvel atravĆ©s deste link: https://developer.android.com/tools/releases/platform-tools. Por ele, vocĆŖ consegue o download para Windows, Mac e Linux.
Uma vez baixado, basta extrair o arquivo zipado, contendo dentro dele uma pasta chamada platform-tools que basta ser aberta no terminal para se usar o adb.
Download do adb em celulares com Termux.
Para usar a ferramenta do adb diretamente no celular, antes temos que baixar o app Termux, que é um emulador de terminal linux, e jÔ possui o adb em seu repositório. Você encontra o app na Google Play Store, mas novamente recomendo baixar pela F-Droid ou diretamente no Github do projeto.
F-Droid: https://f-droid.org/en/packages/com.termux/
Github: https://github.com/termux/termux-app/releases
Processo de debloat
Antes de iniciarmos, Ć© importante deixar claro que nĆ£o Ć© para vocĆŖ sair removendo todos os bloatwares de cara sem mais nem menos, afinal alguns deles precisam antes ser substituĆdos, podem ser essenciais para vocĆŖ para alguma atividade ou função, ou atĆ© mesmo sĆ£o insubstituĆveis.
Alguns exemplos de bloatwares que a substituição Ć© necessĆ”ria antes da remoção, Ć© o Launcher, afinal, Ć© a interface grĆ”fica do sistema, e o teclado, que sem ele só Ć© possĆvel digitar com teclado externo. O Launcher e teclado podem ser substituĆdos por quaisquer outros, minha recomendação pessoal Ć© por aqueles que respeitam sua privacidade, como Pie Launcher e Simple Laucher, enquanto o teclado pelo OpenBoard e FlorisBoard, todos open-source e disponĆveis da F-Droid.
Identifique entre a lista de bloatwares, quais vocĆŖ gosta, precisa ou prefere nĆ£o substituir, de maneira alguma vocĆŖ Ć© obrigado a remover todos os bloatwares possĆveis, modifique seu sistema a seu bel-prazer. O NetGuard lista todos os apps do celular com o nome do pacote, com isso vocĆŖ pode filtrar bem qual deles nĆ£o remover.
Um exemplo claro de bloatware insubstituĆvel e, portanto, nĆ£o pode ser removido, Ć© o com.android.mtp, um protocolo onde sua função Ć© auxiliar a comunicação do dispositivo com um computador via USB, mas por algum motivo, tem acesso a rede e se comunica frequentemente com servidores externos. Para esses casos, e melhor solução mesmo Ć© bloquear o acesso a rede desses bloatwares com o NetGuard.
MTP tentando comunicação com servidores externos:
Executando o adb shell
No computador
FaƧa backup de todos os seus arquivos importantes para algum armazenamento externo, e formate seu celular com o hard reset. Após a formatação, e a ativação da depuração USB, conecte seu aparelho e o pc com o auxĆlio de um cabo USB. Muito provavelmente seu dispositivo irĆ” apenas comeƧar a carregar, por isso permita a transferĆŖncia de dados, para que o computador consiga se comunicar normalmente com o celular.
JĆ” no pc, abra a pasta platform-tools dentro do terminal, e execute o seguinte comando:
./adb start-server
O resultado deve ser:
daemon not running; starting now at tcp:5037 daemon started successfully
E caso não apareça nada, execute:
./adb kill-server
E inicie novamente.
Com o adb conectado ao celular, execute:
./adb shell
Para poder executar comandos diretamente para o dispositivo. No meu caso, meu celular Ć© um Redmi Note 8 Pro, codinome Begonia.
Logo o resultado deve ser:
begonia:/ $
Caso ocorra algum erro do tipo:
adb: device unauthorized. This adb serverās $ADB_VENDOR_KEYS is not set Try āadb kill-serverā if that seems wrong. Otherwise check for a confirmation dialog on your device.
Verifique no celular se apareceu alguma confirmação para autorizar a depuração USB, caso sim, autorize e tente novamente. Caso não apareça nada, execute o kill-server e repita o processo.
No celular
Após realizar o mesmo processo de backup e hard reset citado anteriormente, instale o Termux e, com ele iniciado, execute o comando:
pkg install android-tools
Quando surgir a mensagem āDo you want to continue? [Y/n]ā, basta dar enter novamente que jĆ” aceita e finaliza a instalação
Agora, vÔ até as opções de desenvolvedor, e ative a depuração sem fio. Dentro das opções da depuração sem fio, terÔ uma opção de emparelhamento do dispositivo com um código, que irÔ informar para você um código em emparelhamento, com um endereço IP e porta, que serÔ usado para a conexão com o Termux.
Para facilitar o processo, recomendo que abra tanto as configuraƧƵes quanto o Termux ao mesmo tempo, e divida a tela com os dois appās, como da maneira a seguir:
Para parear o Termux com o dispositivo, nĆ£o Ć© necessĆ”rio digitar o ip informado, basta trocar por ālocalhostā, jĆ” a porta e o código de emparelhamento, deve ser digitado exatamente como informado. Execute:
adb pair localhost:porta CódigoDeEmparelhamento
De acordo com a imagem mostrada anteriormente, o comando ficaria āadb pair localhost:41255 757495ā.
Com o dispositivo emparelhado com o Termux, agora basta conectar para conseguir executar os comandos, para isso execute:
adb connect localhost:porta
Obs: a porta que você deve informar neste comando não é a mesma informada com o código de emparelhamento, e sim a informada na tela principal da depuração sem fio.
Pronto! Termux e adb conectado com sucesso ao dispositivo, agora basta executar normalmente o adb shell:
adb shell
Remoção na prÔtica Com o adb shell executado, você estÔ pronto para remover os bloatwares. No meu caso, irei mostrar apenas a remoção de um app (Google Maps), jÔ que o comando é o mesmo para qualquer outro, mudando apenas o nome do pacote.
Dentro do NetGuard, verificando as informaƧƵes do Google Maps:
Podemos ver que mesmo fora de uso, e com a localização do dispositivo desativado, o app estÔ tentando loucamente se comunicar com servidores externos, e informar sabe-se lÔ que peste. Mas sem novidades até aqui, o mais importante é que podemos ver que o nome do pacote do Google Maps é com.google.android.apps.maps, e para o remover do celular, basta executar:
pm uninstall āuser 0 com.google.android.apps.maps
E pronto, bloatware removido! Agora basta repetir o processo para o resto dos bloatwares, trocando apenas o nome do pacote.
Para acelerar o processo, você pode jÔ criar uma lista do bloco de notas com os comandos, e quando colar no terminal, irÔ executar um atrÔs do outro.
Exemplo de lista:
Caso a donzela tenha removido alguma coisa sem querer, tambĆ©m Ć© possĆvel recuperar o pacote com o comando:
cmd package install-existing nome.do.pacote
Pós-debloat
Após limpar o mĆ”ximo possĆvel o seu sistema, reinicie o aparelho, caso entre no como recovery e nĆ£o seja possĆvel dar reboot, significa que vocĆŖ removeu algum app āessencialā para o sistema, e terĆ” que formatar o aparelho e repetir toda a remoção novamente, desta vez removendo poucos bloatwares de uma vez, e reiniciando o aparelho atĆ© descobrir qual deles nĆ£o pode ser removido. Sim, dĆ” trabalho⦠quem mandou querer privacidade?
Caso o aparelho reinicie normalmente após a remoção, parabĆ©ns, agora basta usar seu celular como bem entender! Mantenha o NetGuard sempre executando e os bloatwares que nĆ£o foram possĆveis remover nĆ£o irĆ£o se comunicar com servidores externos, passe a usar apps open source da F-Droid e instale outros apps atravĆ©s da Aurora Store ao invĆ©s da Google Play Store.
ReferĆŖncias: Caso vocĆŖ seja um Australopithecus e tenha achado este guia difĆcil, eis uma videoaula (3:14:40) do Anderson do canal Ciberdef, realizando todo o processo: http://odysee.com/@zai:5/Como-remover-at%C3%A9-200-APLICATIVOS-que-colocam-a-sua-PRIVACIDADE-E-SEGURAN%C3%87A-em-risco.:4?lid=6d50f40314eee7e2f218536d9e5d300290931d23
Pdfās do Anderson citados na videoaula: crĆ©ditos ao anon6837264 http://eternalcbrzpicytj4zyguygpmkjlkddxob7tptlr25cdipe5svyqoqd.onion/file/3863a834d29285d397b73a4af6fb1bbe67c888d72d30/t-05e63192d02ffd.pdf
Processo de instalação do Termux e adb no celular: https://youtu.be/APolZrPHSms
-
@ ed5774ac:45611c5c
2025-04-19 20:29:31April 20, 2020:Ā The day I saw my so-called friends expose themselves as gutless, brain-dead sheep.
On that day, I shared a video exposing the damning history of the Bill & Melinda Gates Foundation's vaccine campaigns in Africa and the developing world. As Gates was on every TV screen, shilling COVID jabs that didnāt even exist, I called out his blatant financial conflict of interest and pointed out the obvious in my facebook post: "Finally someone is able to explain why Bill Gates runs from TV to TV to promote vaccination. Not surprisingly, it's all about money againā¦" - referencing his substantial investments in vaccine technology, including BioNTech's mRNA platform that would later produce the COVID vaccines and generate massive profits for his so-called philanthropic foundation.
The conflict of interest was undeniable. I genuinely believed anyone capable of basic critical thinking would at least pause to consider these glaring financial motives. But what followed was aĀ masterclass in human stupidity.
My facebook post from 20 April 2020:
Not only was I branded a 'conspiracy theorist' for daring to question the billionaire who stood to make a fortune off the very vaccines he was shilling, but the brain-dead, logic-free bullshit vomited by the people around me was beyond pathetic. TheseĀ barely literate moronsĀ couldnāt spell "Pfizer" without auto-correct, yet they mindlessly swallowed and repeated every lie the media and government force-fed them, branding anything that cracked their fragile reality as "conspiracy theory." Big Pharmaās rap sheetāfraud, deadly cover-ups, billions in finesācould fill libraries, yet these obedient sheep didnāt bother to open a single book or read a single study before screaming their ignorance, desperate to virtue-signal their obedience. Then, like spineless lab rats, they lined up for an experimental jab rushed to the market in months, too dumb to care that proper vaccine development takes a decade.
The pathetic part is that these idiots spend hours obsessing over reviews for their useless purchases like shoes or socks, but wonāt spare 60 seconds to research the experimental cocktail being injected into their veinsāor even glance at the FDAās own damning safety reports. Those same obedient sheep would read every Yelp review for a fucking coffee shop but won't spend five minutes looking up Pfizer's criminal fraud settlements. They would demand absolute obedience to āThe Scienceā¢āāwhile being unable to define mRNA, explain lipid nanoparticles, or justify why trials were still running as they queued up like cattle for their jab. If they had two brain cells to rub together or spent 30 minutes actually researching, they'd know, but noāthey'd rather suck down the narrative like good little slaves, too dumb to question, too weak to think.
Worst of all, they became the systemās attack dogsānot just swallowing the poison, but forcing it down othersā throats. This wasnāt ignorance. It was betrayal. They mutated into medical brownshirts, destroying lives to virtue-signal their obedienceāeven as their own childrenās hearts swelled with inflammation.
One conversation still haunts me to this dayāa masterclass in wealth-worship delusion. A close friend, as a response to my facebook post, insisted that Gatesā assumed reading list magicallyĀ awardsĀ him vaccine expertise, while dismissing his billion-dollar investments in the same products as āno conflict of interest.ā Worse, he argued that Gatesās $5ā10 billion pandemic windfall was ādeserved.ā
This exchange crystallizes civilizationās intellectual surrender: reason discarded with religious fervor, replaced by blind faith in corporate propaganda.
The comment of a friend on my facebook post that still haunts me to this day:
Walking Away from the Herd
After a period of anger and disillusionment, I made a decision: I would no longer waste energy arguing with people who refused to think for themselves. If my circle couldnāt even ask basic questionsālike why an untested medical intervention was being pushed with unprecedented urgencyāthen I needed a new community.
Fortunately, I already knew where to look. For three years, I had been involved in Bitcoin, a space where skepticism wasnāt just toleratedāit was demanded. Here, Iād met some of the most principled and independent thinkers Iād ever encountered. These were people who understood the corrupting influence of centralized powerāwhether in money, media, or politicsāand who valued sovereignty, skepticism, and integrity. Instead of blind trust, bitcoiners practiced relentless verification. And instead of empty rhetoric, they lived by a simple creed:Ā Donāt trust. Verify.
It wasnāt just a philosophy. It was a lifeline. So I chose my side and I walked away from the herd.
Finding My Tribe
Over the next four years, I immersed myself in Bitcoin conferences, meetups, and spaces where ideas were tested, not parroted. Here, I encountered extraordinary people: not only did they share my skepticism toward broken systems, but they challenged me to sharpen it.
No longer adrift in a sea of mindless conformity, Iād found a crew of thinkers who cut through the noise. They saw clearly what most ignoredāthat at the core of societyās collapse layĀ broken money, the silent tax on time, freedom, and truth itself. But unlike the complainers Iād left behind, these peopleĀ built. They coded. They wrote. They risked careers and reputations to expose the rot. Some faced censorship; others, mockery. All understood the stakes.
These werenāt keyboard philosophers. They were modern-day Cassandras, warning of inflationās theft, the Fedās lies, and the coming dollar collapseānot for clout, but because they refused to kneel to a dying regime. And in their defiance, I found something rare: a tribe that didnāt justĀ believeĀ in a freer future. They wereĀ engineeringĀ it.
April 20, 2024: No more herd. No more lies. Only proof-of-work.
On April 20, 2024, exactly four years after my last Facebook post, the one that severed my ties to the herd for goodāI stood in front of Warsawās iconic Palace of Culture and Science, surrounded by 400 bitcoiners who felt like family. We were there to celebrate Bitcoinās fourth halving, but it was more than a protocol milestone. It was a reunion of sovereign individuals. Some faces Iād known since the early days; others, Iād met only hours before. We bonded instantlyāheated debates, roaring laughter, zero filters on truths or on so called conspiracy theories.
As the countdown to the halving began, it hit me:Ā ThisĀ was the antithesis of the hollow world Iād left behind. No performative outrage, no coerced consensusājust a room of unyielding minds whoād traded the illusion of safety for the grit of truth. Four years prior, Iād been alone in my resistance. Now, I raised my glass among my people - those who had seen the system's lies and chosen freedom instead. Each had their own story of awakening, their own battles fought, but here we shared the same hard-won truth.
The energy wasnāt just electric. It wasĀ aliveāthe kind that emerges when free people build rather than beg. For the first time, I didnāt justĀ belong. I wasĀ home. And in that moment, the halvingās ticking clock mirrored my own journey: cyclical, predictable in its scarcity, revolutionary in its consequences. Four years had burned away the old world. What remained was stronger.
No Regrets
Leaving the herd wasnāt a choiceāit wasĀ evolution.Ā My soulĀ shouted:Ā "Iād rather stand alone than kneel with the masses!". The Bitcoin community became more than family; theyāreĀ livingĀ proof that the world still produces warriors, not sheep. Here, among those whoĀ forgeĀ truth, I found something extinct elsewhere: hope that burns brighter with every halving, every block, every defiant mind that joins the fight.
Change doesnāt come from the crowd. It starts when one person stops applauding.
Today, I stand exactly where I always wanted to beāshoulder-to-shoulderĀ with my true family: the rebels, the builders, the ungovernable.Ā Together, weāre building the decentralized future.
-
@ 0176967e:1e6f471e
2024-07-20 08:28:00Tento rok vĆ”s ÄakĆ” workshop na tĆ©mu "oranžovĆ© leto" s Jurajom BednĆ”rom a Mariannou SĆ”deckou. Dozviete sa ako menĆ naÅ”e vnĆmanie skĆŗsenosÅ„ s Bitcoinom, ako sa navigovaÅ„ v dneÅ”nom svete a odstrĆ”niÅ„ mentĆ”lnu hmlu spĆ“sobenĆŗ fiat životom.
Na workshop je potrebný extra lĆstok (mÓžete si ho dokĆŗpiÅ„ aj na mieste).
Pre viac informĆ”ciĆ o oranžovom lete odporĆŗÄame pred workshopom vypoÄuÅ„i si podcast na tĆŗto tĆ©mu.
-
@ 9994730e:7df84c81
2025-05-19 15:59:38ā¤ļøš„āØ
-
@ 9994730e:7df84c81
2025-05-19 15:59:37And this is the regular text.
-
@ 6e0ea5d6:0327f353
2025-04-19 15:09:18š©ø
The world wonāt stop and wait for you to recover.Do your duty regardless of how you feel. Thatās the only guarantee youāll end the day alright.
Youāve heard it before: āThe worst workout is the one you didnāt do.ā Sometimes you donāt feel like going to the gym. You start bargaining with laziness: āI didnāt sleep well⦠maybe I should skip today.ā But then you go anyway, committing only to the bare minimum your energy allows. And once you start, your body outperforms your mindās assumptionsāit turns out to be one of the best workouts youāve had in a long time. The feeling of following through, of winning a battle you were losing, gives you the confidence to own the rest of your day. You finally feel good.
And that wouldnāt have happened if you stayed home waiting to feel better. Guilt wouldāve joined forces with discouragement, and youād be crushed by melancholy in a victim mindset. That loss would bleed into the rest of your week, conditioning your mind: because you didnāt spend your energy on the workout, youād stay up late, wake up worse, and while waiting to feel āready,ā youād lose a habit that took months of effort to build.
When in doubt, just do your duty. Stick to the plan. Donāt negotiate with your feelingsāoutsmart them. āJust one page today,ā and youāll end up reading ten. āOnly the easy tasks,ā and youāll gain momentum to conquer the hard ones. Laziness is a serpentāyou win when you make no deals with it.
A close friend once told me that when he was at his limit during a second job shift, heād open a picture on his phoneāof a fridge or a stove he needed to buy for his homeāand that image gave him strength to stay awake. That moment stuck with me forever.
Do you really think the world will have the same mercy on you that you have on yourself? Donāt be surprised when it doesnāt spare you. Move forward even while stitching your wounds: āIf you wait for perfect conditions, youāll never do anything.ā (Ecclesiastes 11:4)
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "š„" as a token of appreciation.
A toast to our family!
-
@ 9994730e:7df84c81
2025-05-19 15:59:35I will add a picture, a hyperlink and a video. Letās see if it works.
-
@ 6e0ea5d6:0327f353
2025-04-19 15:02:55My friend, let yourself be deluded for a moment, and reality will see to it that your fantasy is shatteredālike a hammer crushing marble. The real world grants no mercy; it will relentlessly tear down your aspirations, casting them into the abyss of disillusionment and burying your dreams under the unbearable weight of your own expectations. Itās an inescapable fateābut the outcome is still in your hands: perish at the bottom like a wretch or turn the pit into a trench.
Davvero, everyone must eventually face something that breaks them. It is in devastation that man discovers what he is made of, and in the silence of defeat that he hears the finest advice. Yet the weak would rather embrace the convenient lie of self-pity, blaming life for failures that are, in truth, the result of their own negligence and cowardly choices. If you hide behind excuses because you fear the painful truth, know this: the responsibility has always been yours.
Ascolta bene! Just remain steadfast, even when everything feels like an endless maze. The difficulties you face todayāthose you believe youāll never overcomeāwill one day seem insignificant under the light of time and experience. Tomorrow, youāll look back and laugh at yourself for ever letting these storms seem so overwhelming.
Now, itās up to you to fight your own battleāfor the evil day spares no one. Donāt let yourself be paralyzed by shock or bow before adversity. Be strong and of good courageānot as one who waits for relief, but as one prepared to face the inevitable and turn pain into glory.
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "š„" as a token of appreciation.
A toast to our family!
-
@ 3ffac3a6:2d656657
2025-04-15 14:49:31š Como Criar um Badge Ćpico no Nostr com
nak
+ badges.pageRequisitos:
- Ter o
nak
instalado (https://github.com/fiatjaf/nak) - Ter uma chave privada Nostr (
nsec...
) - Acesso ao site https://badges.page
- Um relay ativo (ex:
wss://relay.primal.net
)
š§ Passo 1 ā Criar o badge em badges.page
- Acesse o site https://badges.page
-
Clique em "New Badge" no canto superior direito
-
Preencha os campos:
- Nome (ex:
Teste Ćpico
) - Descrição
-
Imagem e thumbnail
-
Após criar, você serÔ redirecionado para a pÔgina do badge.
š Passo 2 ā Copiar o
naddr
do badgeNa barra de endereços, copie o identificador que aparece após
/a/
ā este Ć© o naddr do seu badge.Exemplo:
nostr:naddr1qq94getnw3jj63tsd93k7q3q8lav8fkgt8424rxamvk8qq4xuy9n8mltjtgztv2w44hc5tt9vetsxpqqqp6njkq3sd0
Copie:
naddr1qq94getnw3jj63tsd93k7q3q8lav8fkgt8424rxamvk8qq4xuy9n8mltjtgztv2w44hc5tt9vetsxpqqqp6njkq3sd0
š§ Passo 3 ā Decodificar o naddr com
nak
Abra seu terminal (ou Cygwin no Windows) e rode:
bash nak decode naddr1qq94getnw3jj63tsd93k7q3q8lav8fkgt8424rxamvk8qq4xuy9n8mltjtgztv2w44hc5tt9vetsxpqqqp6njkq3sd0
VocĆŖ verĆ” algo assim:
json { "pubkey": "3ffac3a6c859eaaa8cdddb2c7002a6e10b33efeb92d025b14ead6f8a2d656657", "kind": 30009, "identifier": "Teste-Epico" }
Grave o campo
"identifier"
ā nesse caso: Teste-Epico
š°ļø Passo 4 ā Consultar o evento no relay
Agora vamos pegar o evento do badge no relay:
bash nak req -d "Teste-Epico" wss://relay.primal.net
VocĆŖ verĆ” o conteĆŗdo completo do evento do badge, algo assim:
json { "kind": 30009, "tags": [["d", "Teste-Epico"], ["name", "Teste Ćpico"], ...] }
š„ Passo 5 ā Minerar o evento como "Ć©pico" (PoW 31)
Agora vem a mƔgica: minerar com proof-of-work (PoW 31) para que o badge seja classificado como Ʃpico!
bash nak req -d "Teste-Epico" wss://relay.primal.net | nak event --pow 31 --sec nsec1SEU_NSEC_AQUI wss://relay.primal.net wss://nos.lol wss://relay.damus.io
Esse comando: - Resgata o evento original - Gera um novo com PoW de dificuldade 31 - Assina com sua chave privada
nsec
- E publica nos relays wss://relay.primal.net, wss://nos.lol e wss://relay.damus.ioā ļø Substitua
nsec1SEU_NSEC_AQUI
pela sua chave privada Nostr.
ā Resultado
Se tudo der certo, o badge serĆ” atualizado com um evento de PoW mais alto e aparecerĆ” como "Epic" no site!
- Ter o
-
@ 7361ca91:252fce6d
2024-07-02 14:33:05ćµć¤ćØć³ć¹ć»ćć£ćÆć·ć§ć³ćÆćåÆč½ćŖęŖę„ćę³åććęē“¢ēćŖę¼ēæć§ćććµć¤ćć”ć¤ćÆåÆč½ę§ć®ē©ŗéćę”å¼µćć¾ććęå·é貨ćÆę„µē«ÆćŖēØ®é”ć®ćµć¤ćć”ć¤ć§ćććęŖę„ć®ććøć§ć³ćęä¾ććć ćć§ćŖćććć®ęŖę„ćå®ē¾ććććć®ćć¼ć«ćęä¾ćć¾ććęå·é貨ćÆē¾åØćć½ć¼ć©ć¼ćć³ćÆćØå¼ć°ćććµć¤ćć”ć¤ć®ćøć£ć³ć«ć«ćć£ć¦ę“»ę°ć„ćććć¦ćć¾ćććµć¤ćć¼ćć³ćÆććé²åććć½ć¼ć©ć¼ćć³ćÆćÆć愽観主義ć«ćć£ć¦ē¹å¾“ć„ććććęŖę„ć®ć¦ć¼ććć¢ēćŖććøć§ć³ć§ććć½ć¼ć©ć¼ćć³ćÆć«ćØć£ć¦ćęŖę„ćÆęććć®ć§ććć½ć¼ć©ć¼ćć³ćÆćÆćµć¤ćć¼ćć³ćÆć®ćć£ć¹ććć¢ć®å½±ćęćć®ććę··ę²ćØććå°å¹³ē·ćč¶ććäøēćē §ććåŗćć¾ććå¤ćć®äŗŗę°ć®ććDeFićć§ć¼ć³ć§ćÆćć½ć¼ć©ć¼ćć³ćÆć®ććć«ć¼ćå ¬å ±č²”ćč³éčŖæéććććć®éęćŖć¤ć³ćć©ćę§ēÆćć¦ćć¾ććå ±ęććć俔念ćÆć·ć³ćć«ć§ććåę£åć§éęćŖéčć·ć¹ćć ćøć®å ¬å ±ć¢ćÆć»ć¹ććććå ¬ę£ć§ę£ē¾©ć®ććäøēććććććØććććØć§ććć½ć¼ć©ć¼ćć³ćÆćÆęå·é貨ć®ęčēćŖåæć§ććęćććčŖäæ”ć«ęŗć”ćęŖę„åæåć§ćć
ććććć½ć¼ć©ć¼ćć³ćÆć®äæ”åæµć«åƾććå対ćÆć«ćć¼ćć³ćÆć®ęē主義ć§ććć«ćć¼ćć³ćÆćÆć½ć¼ć©ć¼ć®å½±ć®čŖåćć”ć§ććå½¼ććÆćć®ćµć¤ćÆć«ć®ē”ęčć§ććć½ć¼ć©ć¼ćć³ćÆćDAOć«åå ććäøę¹ć§ćć«ćć¼ćć³ćÆćÆę¦äŗć®ęŗåćććć³ćć„ććć£ćå®ćććć®ćć©ć¤ćć·ć¼å¼·åćć¼ć«ćę§ēÆćć¾ććć«ćć¼ćć³ćÆćÆęåćć½ć¼ć©ć¼ćć³ćÆć®ćµćć»ćććØćć¦ē»å “ćć¾ćććåøøć«ć¤ć¼ćµćŖć¢ć ćé”ä¼¼ć®ćć§ć¼ć³ć§ęä¾ććććć¬ć¼ć³ććć¹ćć®ćć©ćć¤ć ćććęå·åć儽ćć§ćć¾ćććęéćēµć¤ć«ć¤ćć¦ćć½ć¼ć©ć¼ćć³ćÆć®å¾åć«ćć£ć¦ēććē·å¼µćÆć¾ćć¾ćå¢å¤§ćć¾ćććć«ćć¼ćć³ćÆćÆć½ć¼ć©ć¼ćć³ćÆć®éŗē£ććé¢ććčŖåčŖčŗ«ć®ć¢ć¤ćć³ćć£ćć£ć主張ććććć«ćŖćć¾ććć
ć«ćć¼ćć³ćÆć®ē©ŗę³ć§ćÆćęå·é貨ćØę¢åć®ęØ©åę§é ćØć®éć®åƾē«ćÆåŗę¬ēć«ććć°ć©ć ććć¦ćć¾ććč¦å¶ć«ćć£ć¦ęå·é貨ćÆå°äøć«čæ½ćććććåæåę§ćå¢å¤§ćć¾ććć«ćć¼ćć³ćÆć®ććøć§ć³ćÆććć¢ćŖćć·ć„ćŖęŖå¤¢ćØćć¦ęēµ¶ććć¾ćććć®ę ¹ę¬ēćŖåƾē«āāå½å®¶ćęå·é貨ćē¦ę¢ććććØāāćÆćäŗŗć ćéćęć£ć¦éćććććŖęęćēććććć½ć¼ć©ć¼ćć³ćÆć«ćć£ć¦å“äøććć¾ććć½ć¼ć©ć¼ćć³ćÆć®ę„½č¦³äø»ē¾©ćÆćć«ćć¼ć±ććć®ćµć¤ćÆć«ćØå義ć«ćŖććę²č¦³äø»ē¾©ćÆćć¢ćØé¢é£ä»ćććć¦ćć¾ććć«ćć¼ćć³ćÆćÆćć®åē“ćŖćØć¹ć«ć¬ć¼ć·ć§ć³ćč¶ ććä½ććęä¾ćć¾ćććććÆåøå “ćµć¤ćÆć«ć®éć®ę“åÆć®ē¬éćććć°ć©ć ć®äøć®ć°ćŖććć§ćććć½ć¼ć¹ć³ć¼ććč¼ćć¦č¦ććē¬éć§ćć
ć½ć¼ć©ć¼ćć³ćÆćÆčå¼±ć§ćāāęŗćåććØå£ćććć®ć§ććć¢ć³ććć©ćøć£ć¤ć«ćØćÆćć·ć§ććÆćåøåćå¼·ććŖććć®ć§ććꬔć®ććØćčę ®ćć¦ćć ćććęå·é貨ć®ę øåæēćŖć¤ććć¼ć·ć§ć³ćÆé©åæēć§ććć¦ć¼ć¶ć¼ććØć³ććÆć¼ć”ć³ććć¤ć¤ććć®ę»ęé¢ćēććę”ę£ććć¾ććć¦ć¼ć¶ć¼ć®ćØć³ććÆć¼ć”ć³ććÆčå¼±ę§ćØč² ć®ēøé¢ćććć¾ććć¦ć¼ć¶ć¼ćć¼ć¹ćéč¦ć§ććć°ććć»ć©ćććććÆć¼ćÆćÆććć¢ć³ććć©ćøć£ć¤ć«ć«ćŖćć¾ććć¦ć¼ć¶ć¼ć®ćØć³ććÆć¼ć”ć³ććØć·ć¹ćć ć®ć¢ć³ććć©ćøć£ć¤ć«ćÆäŗćć«ććøćć£ććŖćć£ć¼ććććÆćå½¢ęćć¾ćć
ćććććć®ćµć¤ćÆć«ćÆéę¹åć«ćé²č”ćć¾ććéęćŖć·ć¹ćć ć§ćÆćć¦ć¼ć¶ć¼ćÆććććć¾ććå¤éØē°å¢ćęµåƾēć«ćŖććØććć®ę å ±ćå½¼ćć«åƾćć¦ę¦åØćØćć¦ä½æēØćććåÆč½ę§ćććć¾ćć迫害ć«ē“é¢ććć¦ć¼ć¶ć¼ćÆč±éćéøć³ććććčå¼±ę§ćøć®äøéćå¼ćčµ·ććć¾ććć½ć¼ć©ć¼ćć³ćÆć®čćę¹ćÆę¬č³Ŗēć«ę„½č¦³ēć§ććć½ć¼ć©ć¼ćć³ćÆć·ć¹ćć ć®éęę§ćÆćå¤åćć«ęå½±ććć愽観主義ć®ē²¾ē„ć§ććéęćŖć·ć¹ćć ćę§ēÆććććØć§ćć½ć¼ć©ć¼ćć³ćÆćÆćę³å¾ćčŖåć«äøå©ć«ćŖććŖććØäæ”ćć¦ććććØčØć£ć¦ćć¾ćć愽観主義ć®å¼·čŖæćÆćęęŖć®äŗę ć«åććććØć妨ćć¾ćććććć½ć¼ć©ć¼ćć³ćÆć®čå¼±ę§ć®ę øåæć§ćć
ęćéøęč¢ćØć¢ć³ććć©ćøć£ć¤ć«ę§ćÆęŖē„ę§ć«ä¾åćć¦ćć¾ććęŖę„ćÆęććęå³ć®ćć確å®ę§ćęć£ć¦äŗęø¬ććććØćÆć§ćć¾ćććéøęč¢ćÆććć®ęéćå©ēØćć¦ęå©ć«åććććć¢ć³ććć©ćøć£ć¤ć«ę§ć®ę¦åØćØå¼ć°ćć¦ćć¾ććéøęč¢ćÆćäŗčØćć»ćØćć©ć®å “åééć£ć¦ćććØä»®å®ćć¾ććééć£ć¦ććććØćÆå®ä¾”ć§ćććę£ććććØćÆäøé£ćåćć«å ±ććć¾ććć«ćć¼ćć³ćÆćÆęęŖć®äŗę ć«ććć¦ęåćććććéøęč¢ćåćå „ćć¦ćć¾ććć«ćć¼ćć³ćÆć®ä»®čŖ¬ćééć£ć¦ććć°ćć¹ć¼ćć¼ćµć¤ćÆć«ćÆē¶ćć¾ććę£ćććć°ćęå·é貨ćÆé©åćŖé²å¾”ćåććꬔć®ę®µéć«é²ćæć¾ćććć£ćććØé²å¾”ćććććØćÆćęå·åć使ēØćć¦ć¦ć¼ć¶ć¼ć®čŗ«å ćØę“»åćäæč·ććććØćęå³ćć¾ćć
äŗčØ
åæåę§ćÆćć¾ć大éē£č¦ćøć®é©åæćØćć¦ēćć¾ćććććććć®ååØčŖä½ćē£č¦åŖåćććć«ę£å½åćć¾ćććććÆćåæåę§ćØē£č¦ććØć¹ć«ć¬ć¼ćććéå½ć«ććććØć示åććę£ć®ćć£ć¼ććććÆć«ć¼ćć§ćććć®ć«ć¼ććååć«ē¶ććØćć«ćć¼ćć³ćÆć®äŗčØć®ę¬”ć®ę®µéćå¼ćčµ·ćććć¾ćļ¼č¦å¶ćć©ććććć®ę®µéć§ćÆćęæåŗćÆåæåę§ć®å¢å ćå£å®ć«ćć¦ćęå·é貨ć«åƾćć¦ćć®åćę大éć«ę“»ēØćć¾ććććććęå·é貨ćåćē· ć¾ćććØć§ćęµåƾēćŖåćÆćć®ę£å½åćććć«å¼·åććć ćć§ććęå·é貨ć®å®ēØę§ćÆćåćē· ć¾ćć®ēØåŗ¦ćØēøé¢ćć¾ććåęęćåćććć³ć«ćäøé£ćåćć«ę”大ćć¾ćć
ć«ććµć¤ćÆć«
太é½ćÆćć®éęę§ćØć¢ć¤ćć³ćć£ćć£ćøć®ćć ćććéćć¦ćčŖē¶ć®č±”従ć§ććę“ęæć®č±”従ć§ćććć¾ććć½ć¼ć©ć¼ćć³ćÆćÆćć®äøå¤®ć®č±”従ć®äŗéć®ē¹å¾“ćåćē¶ćć§ćć¾ććć½ć¼ć©ć¼ćć³ćÆć·ć¹ćć ćÆćć¦ć¼ć¶ć¼ćå±éŗć«ćććććē ę¼ ć®é¢ØęÆć§ććć«ćć¼ćć³ćÆćÆę£®ć®ćććŖćć®ć§ććęå·åć®åÆéććč¦ććéØęćäæč·ćć迫害ćććäŗŗć ć«éæé£ęćęä¾ćć¾ććęØē«ćÆéč¦ćŖé²č”ē·ćęä¾ćć¾ććć«ćć®é¢ØęÆćÆęćć§ćććēē©ć«ććµćć¦ćć¾ććć«ććććÆćÆćčŖē±ć®ććć«äŗŗć čŖčŗ«ć«ćć£ć¦ęęćććéå¶ććć¦ćć¾ććć«ććµć¤ćÆć«ćÆć権åØäø»ē¾©ēćŖęč”ć«åƾćć¦ę°äø»ēćŖęč”ćęÆęćć¾ćļ¼ē£č¦ć«åƾććčŖē±ćØćåäøęåć«åƾććå¤ę§ę§ć§ććć·ć¹ćć ć«éęę§ćéč¦ććććØć§ćć½ć¼ć©ć¼ćć³ćÆćÆę²åēć«ćć®éå½ćä½ćäøćć¦ćć¾ććē£č¦ćććŖćć”権åØäø»ē¾©ć®ć”ć«ććŗć ćÆćć½ć¼ć©ć¼ćć³ćÆć®éå½ć«ēµć³ć¤ćć¦ćć¾ććć½ć¼ć©ć¼ćć³ćÆćęåććććć«ćÆćć«ćć¼ćć³ćÆć®ē”ęčćēµ±åććåæ č¦ćććć¾ććć½ć¼ć©ć¼ćć³ćÆćęåććåÆäøć®åøęćÆćęéć«ē§»č”ććććØć§ćć
-
@ 9994730e:7df84c81
2025-05-19 15:59:34Is it still working?
-
@ 9994730e:7df84c81
2025-05-19 15:59:33Is it actually called āsummaryā?
-
@ 7361ca91:252fce6d
2024-06-29 10:13:51ćŖćć©ćŖćŗć ć«ććć¦ćčŖē±ćØćÆä»äŗŗćäøé©åćØęćććććććŖćę±ŗå®ćåäŗŗćč”ćććØć許容ććććØćęå³ćć¾ćććć ćććć®ę±ŗå®ć第äøč ć«å®³ćåć¼ććŖćéćć§ććć¤ć¾ććčŖē±ćÆååäŗŗćčŖåć®äŗŗēčØē»ćę§ēÆććå®č”ćć権å©ćå®ććć®ć§ćććä»äŗŗć«ćØć£ć¦čŖ¤ć£ć¦ćććØč¦ćŖćććę±ŗå®ćå«ć¾ćć¾ćć
åäŗŗć®ę±ŗå®ćę¹å¤ććććØćØććć®ę±ŗå®ć妨ććććć«å¼·å¶åć使ēØććććØć®éć«ćÆå¤§ććŖéććććć¾ćć
ćŖćć©ćŖćŗć ćÆćććØćęŖćę±ŗå®ćę¹å¤ććććØćć§ćć¦ćććććć®ę±ŗå®ć妨ććććć«ļ¼å½å®¶ć®ļ¼å¼·å¶åć使ēØćć¹ćć§ćÆćŖććØäø»å¼µćć¾ćććć ćććććć®ę±ŗå®ćä»äŗŗć«å®³ćåć¼ćå “åćÆä¾å¤ć§ćć
ćŖćć©ćŖćŗć ć«ćććčŖčēę éććÆćć©ć®ę±ŗå®ćę£ćććåøøć«ē¢ŗäæ”ć§ććććć§ćÆćŖćććØćčŖčćć¦ćć¾ćććććć£ć¦ćä»äŗŗć«čŖ¤ć£ć¦ććććć«č¦ććå “åć§ććåäŗŗćčŖåć®ę±ŗå®ćäøćčŖē±ć許容ććŖććć°ćŖćć¾ććć
éåøøć«äøč¬ēćŖä¾ćØćć¦ćč¬ē©ć®ä½æēØćęććć¾ćććŖćć©ć«ćŖč¦ē¹ćććÆćä»äŗŗććććęŖćę±ŗå®ćØč¦ćŖććććććŖćć¦ććåäŗŗćč¬ē©ć使ēØććčŖē±ćęć¤ć¹ćć§ććéµćØćŖćć®ćÆććććć®åäŗŗēćŖę±ŗå®ć第äøč ć«å®³ćåć¼ććŖćććØć§ćć
ćŖćć©ć«ćŖå²å¦ć«ććć¦ćÆćåäŗŗć®čŖē±ćØčŖå·±ę±ŗå®ćéč¦č¦ććć¾ććä»äŗŗćęŖććØčćććććććŖćę±ŗå®ćč”ć権å©ćå°éćććć¹ćć§ććććć®ę±ŗå®ć第äøč ć«å®³ćåć¼ććŖćéććļ¼å½å®¶ćļ¼å¼·å¶åć使ēØćć¦å¦Øććć¹ćć§ćÆćŖććØććē«å “ććØćć¾ćććć®čŖčēę éććććŖćć©ćŖćŗć ć®ę øåæć®äøć¤ć§ćć
-
@ 862fda7e:02a8268b
2024-06-29 08:18:20I am someone who thinks independently without abiding to a group to pre-formulate my opinions for me. I do not hold my opinions out of impulse, out of the desire to please, nor out of mindless apadtion to what others abide to. My opinions are held on what I belive is the most logical while being the most ethical and empathetic. We live in a world with a nervous systems and emotions for animals and humans (same thing) alike, thus, we should also consider those feelings. That is not the case in our world.
Cyclists are one of the most homosexual GAY ANNOYING people to exist on EARTH
I hate cyclists with a burning passion. These faggots are the GAYEST MOST ANNOYING retards to exist. They wear the tightest fitting clothing possible to show off their flaccid cocks to each other and to anybody around them.
And if that weren't enough, they present their ass up in the air, begging to be fucked by their cyclist buddies, as they ride their bike in the middle of the road. It's homosexual.
Look at the seat they ride on, it looks like a black cock about to go up their ass. Don't get me started on their gay helmets, the "aerodynamic" helmets they wear. YOU FAGGOTS AREN'T IN THE TOUR DE FRANCE, YOU'RE IN FRONT OF MY CAR IN AN INTERSECTION IN A MINNESOTA TOWN WITH A POPULATION OF 5,000. They LIKE the look of the costume. And that's just what it is - a costume. You're required to have a "look" as a cyclist - you aren't really a cyclist if you don't spend hundreds of dollars on the gay gear. God forbid you just get a bike and ride it around on a trail like anyone else. These people LIKE to be seen. They WANT to be seen as cool, which is why they ride right in front of my fucking car at 15mph in a 45mph zone. I swear, every time I pass one of these cyclists, I am this close to yelling "FAGGOT" out the window at them. The only reason I haven't is because they like to record everything on their gay bikes and upload it to Youtube, so then I'd have to deal with you people knowing where I live just because I called some fruit on a bike a faggot. Think I'm exaggerating? Think again. These homos have an entire community built on "catching" drivers who dare drive too close or blow their exhaust at the poor little faggy cyclist. There's Youtube channels dedicated to this. Part of their culture is being a victim by cars. Almost like it's dangerous to be in the middle of the road going 15mph on a 45mph road. Oh but I'm sure cars almost hitting you is surely a personal attack and nothing to do with the fact that what you're doing is DANGEROUS YOU RETARD.
I've seen these "share the road" signs in the most insane and dangerous places. I've seen them on HIGHWAYS, yes, HIGHWAYS, where the cyclist would BARELY have any room next to the car. It's insanely dangerous and I guess to some people, the constant threat of dying is fun... until it actually happens. I will never understand the mind of a cyclist. You are not in the fricken' Tour de France. You look like a homosexual that's inconveniencing HEAVY METAL HIGH POWERED CARS RIGHT BEHIND YOU. It's incredibly dangerous, and you can't rely on the very heavy, high powered cars and the people driving them to honor your life. Road rage is real, you might be the tipping point for some angry old boomer in his Ram to RAM INTO YOU and kill you. God I hate cyclists, their gay look, their cocky "better than you" attitude. Hey fudge stripe, in a battle between my CAR and your soft body, my CAR WILL WIN. Get off the road and go suck some cocks instead. Stop riding the bikes and go ride cocks instead, you homo.
-
@ e3ba5e1a:5e433365
2025-04-15 11:03:15Prelude
I wrote this post differently than any of my others. It started with a discussion with AI on an OPSec-inspired review of separation of powers, and evolved into quite an exciting debate! I asked Grok to write up a summary in my overall writing style, which it got pretty well. I've decided to post it exactly as-is. Ultimately, I think there are two solid ideas driving my stance here:
- Perfect is the enemy of the good
- Failure is the crucible of success
Beyond that, just some hard-core belief in freedom, separation of powers, and operating from self-interest.
Intro
Alright, buckle up. Iāve been chewing on this idea for a while, and itās time to spit it out. Letās look at the U.S. government like Iād look at a codebase under a cybersecurity auditāOPSEC style, no fluff. Forget the endless debates about what politicians should do. Thatās noise. I want to talk about what they can do, the raw powers baked into the system, and why we should stop pretending those powers are sacred. If thereās a hole, either patch it or exploit it. No half-measures. And yeah, Iām okay if the whole thing crashes a bitāfailureās a feature, not a bug.
The Filibuster: A Security Rule with No Teeth
You ever see a firewall rule thatās more theater than protection? Thatās the Senate filibuster. Everyone acts like itās this untouchable guardian of democracy, but hereās the deal: a simple majority can torch it any day. Itās not a law; itās a Senate preference, like choosing tabs over spaces. When people call killing it the ānuclear option,ā I roll my eyes. Nuclear? Itās a button labeled āpress me.ā If a party wants it gone, theyāll do it. So why the dance?
I say stop playing games. Get rid of the filibuster. If youāre one of those folks who thinks itās the only thing saving us from tyranny, fineāpush for a constitutional amendment to lock it in. Thatās a real patch, not a Post-it note. Until then, itās just a vulnerability begging to be exploited. Every time a party threatens to nuke it, theyāre admitting itās not essential. So letās stop pretending and move on.
Supreme Court Packing: Because Nineās Just a Number
Hereās another fun one: the Supreme Court. Nine justices, right? Sounds official. Except itās not. The Constitution doesnāt say nineāitās silent on the number. Congress could pass a law tomorrow to make it 15, 20, or 42 (hitchhikerās reference, anyone?). Packing the court is always on the table, and both sides know it. Itās like a root exploit just sitting there, waiting for someone to log in.
So why not call the bluff? If youāre in powerāsay, Trumpās back in the gameāsay, āIām packing the court unless we amend the Constitution to fix it at nine.ā Force the issue. No more shadowboxing. And honestly? The courtās got way too much power anyway. Itās not supposed to be a super-legislature, but here we are, with justicesā ideologies driving the bus. Thatās a bug, not a feature. If the court werenāt such a kingmaker, packing it wouldnāt even matter. Maybe we should be talking about clipping its wings instead of just its size.
The Executive Should Go Full Klingon
Letās talk presidents. Iām not saying they should wear Klingon armor and start shouting āQaplaā!āāthough, letās be real, thatād be awesome. Iām saying the executive should use every scrap of power the Constitution hands them. Enforce the laws you agree with, sideline the ones you donāt. If Congress doesnāt like it, theyāve got tools: pass new laws, override vetoes, orāhereās the big oneācut the budget. Thatās not chaos; thatās the system working as designed.
Right now, the real problem isnāt the president overreaching; itās the bureaucracy. Itās like a daemon running in the background, eating CPU and ignoring the user. The presidentās supposed to be the one steering, but the administrative stateās got its own agenda. Let the executive flex, push the limits, and force Congress to check it. Norms? Pfft. The Constitutionās the spec sheetāstick to it.
Let the System Crash
Hereās where I get a little spicy: Iām totally fine if the government grinds to a halt. Deadlock isnāt a disaster; itās a feature. If the branches canāt agree, let the president veto, let Congress starve the budget, let enforcement stall. Donāt tell me about āessential services.ā Nothingās so critical it canāt take a breather. Shutdowns force everyone to the tableādebate, compromise, or expose whoās dropping the ball. If the public loses trust? Good. Theyāll vote out the clowns or live with the circus they elected.
Think of it like a server crash. Sometimes you need a hard reboot to clear the cruft. If voters keep picking the same bad admins, well, the country gets what it deserves. Failureās the best teacherāway better than limping along on autopilot.
States Are the Real MVPs
If the feds fumble, states step up. Right now, states act like junior devs waiting for the lead engineer to sign off. Why? Federal money. Itās a leash, and itās tight. Cut that cash, and states will remember theyāre autonomous. Some will shine, others will tankālooking at you, California. And Iām okay with that. Let people flee to better-run states. No bailouts, no excuses. States are like competing startups: the good ones thrive, the bad ones pivot or die.
Could it get uneven? Sure. Some states might turn into sci-fi utopias while others look like a post-apocalyptic vidya game. Thatās the pointācompetition sorts it out. Citizens can move, markets adjust, and failureās a signal to fix your act.
Chaos Isnāt the Enemy
Yeah, this sounds messy. States ignoring federal law, external threats poking at our seams, maybe even a constitutional crisis. Iām not scared. The Supreme Courtās there to referee interstate fights, and Congress sets the rules for state-to-state play. But if it all falls apart? Still cool. States can sort it without a babysitterāitāll be ugly, but freedomās worth it. External enemies? Theyāll either unify us or break us. If we canāt rally, we donāt deserve the win.
Centralizing power to avoid this is like rewriting your app in a single thread to prevent race conditionsāsure, itās simpler, but youāre begging for a deadlock. Decentralized chaos lets states experiment, lets people escape, lets markets breathe. States competing to cut regulations to attract businesses? Thatās a race to the bottom for red tape, but a race to the top for innovationāworkers might gripe, but theyāll push back, and the tensionās healthy. Bring itālet the cage match play out. The Constitutionās checks are enough if we stop coddling the system.
Why This Matters
Iām not pitching a utopia. Iām pitching a stress test. The U.S. isnāt a fragile porcelain doll; itās a rugged piece of hardware built to take some hits. Let it fail a littleāfilibuster, court, feds, whatever. Patch the holes with amendments if you want, or lean into the grind. Either way, stop fearing the crash. Itās how we debug the republic.
So, whatās your take? Ready to let the system rumble, or got a better way to secure the code? Hit me upāIām all ears.
-
@ 862fda7e:02a8268b
2024-06-29 08:16:47Pictured above is a female body that looks incredibly similar to mine. So similar that it could be mine if I didn't have a c-section scar. Actually her boobs are a bit bigger than mine, but mine do look like that when they swell.
Nudity should be normalized
I don't understand why people get offended or sensitive over the human body. Especially the female human chest. We all have nipples, we all know what they look like, so I don't understand why a female being topless is unacceptable, whereas a male topless is normal. I've seen shirtless men with more shapely, larger breasts than mine. Personally, I have stopped caring if other people see the shape of my breasts or my nipples if they were to be poking in the freezer section of the grocery store. I stopped wearing bras years ago. I often times want to be topless outside in my yard because it feels good and natural. I like the sun on my skin, and I especially love the rain on my skin. It's very unfortunate that our natural human body is massively shamed, by who I believe, is the reptilians (for a number of reasons). Logically, it makes no sense to be outraged by the female human chest. We all know what nipples look like, we all have them, I truly believe women should be allowed to be topless like men are. If it's hot out and you're doing yard work - pop your top off, who cares?
I understand that males and some females sexualize the human chest. However, that is not my problem. That is none of my concern what others think about my body. I should be allowed to wear my human body as it is just like anyone else should be. What I can't wrap my mind around is why people are shocked or offended by the human body, since we ALL know what these parts look like and we all have them. I understand in certain scenarios being topless or nude would likely be inapproriate, or that perverts would use it as a way to expose themselves to children. In an ideal world, we could live like tribes where the human body is normal, it's not overtly sexual. This is why we're so offended over the human body - it's constantly concealed, so the moment we get to see a female chest, it's suddenly sexual because it's normally tabboo to be seen. I wish I could be shirtless outside, I envy males who get to truly feel the wind, the earth on their backs and their chest. Female and male nipples look the same, I don't understand why it should be illegal for me to experience nature in my natural state.
Anyways, I highly dislike the "nudist" people because it is NOT about accepting the human body in its natural state. It's completely co-opted by pedophiles who want to expose themselves to childen or for children to expose themselves to others for sexual gratification. There are nudist resorts pedophile parents force their children to go to (as a child you have no personal autonomy and are completely a slave to your parents - trust me, I know this because I couldn't LEGALLY decide which parent I wanted to live with up until I was 18 years old. If your parent wants you to do something, a child in the US has no legal say over that, so if your parent wants to go to a nudist resort, you must go). A human body should simply be a human body, it's unfortunate that being unclothed immediately brings on sexualization. This is mostly an issue because clothes is the expected default. The more tabboo something is, the more naughty the thing is.
I am not a nudist. However, I do believe that at the very least, females should have the right to be topless in similar settings as males are allowed to. I don't think a woman is a slut if she's in her natural state, in her human body, and proceeds life as normal. How one acts portrays slutty behavior. Living your life in your natural human body should be a right without caviots. I feel detached from people who constantly see the human body as flawed (e.g. circumcision industry, body hair removal industry, clothing industry). These industries are harmful for the victims in them (infant boys, and modern day slaves in sweatshops), and the main motivating factor is money among all these industries.
-
@ c4b5369a:b812dbd6
2025-04-15 07:26:16Offline transactions with Cashu
Over the past few weeks, I've been busy implementing offline capabilities into nutstash. I think this is one of the key value propositions of ecash, beinga a bearer instrument that can be used without internet access.
It does however come with limitations, which can lead to a bit of confusion. I hope this article will clear some of these questions up for you!
What is ecash/Cashu?
Ecash is the first cryptocurrency ever invented. It was created by David Chaum in 1983. It uses a blind signature scheme, which allows users to prove ownership of a token without revealing a link to its origin. These tokens are what we call ecash. They are bearer instruments, meaning that anyone who possesses a copy of them, is considered the owner.
Cashu is an implementation of ecash, built to tightly interact with Bitcoin, more specifically the Bitcoin lightning network. In the Cashu ecosystem,
Mints
are the gateway to the lightning network. They provide the infrastructure to access the lightning network, pay invoices and receive payments. Instead of relying on a traditional ledger scheme like other custodians do, the mint issues ecash tokens, to represent the value held by the users.How do normal Cashu transactions work?
A Cashu transaction happens when the sender gives a copy of his ecash token to the receiver. This can happen by any means imaginable. You could send the token through email, messenger, or even by pidgeon. One of the common ways to transfer ecash is via QR code.
The transaction is however not finalized just yet! In order to make sure the sender cannot double-spend their copy of the token, the receiver must do what we call a
swap
. A swap is essentially exchanging an ecash token for a new one at the mint, invalidating the old token in the process. This ensures that the sender can no longer use the same token to spend elsewhere, and the value has been transferred to the receiver.What about offline transactions?
Sending offline
Sending offline is very simple. The ecash tokens are stored on your device. Thus, no internet connection is required to access them. You can litteraly just take them, and give them to someone. The most convenient way is usually through a local transmission protocol, like NFC, QR code, Bluetooth, etc.
The one thing to consider when sending offline is that ecash tokens come in form of "coins" or "notes". The technical term we use in Cashu is
Proof
. It "proofs" to the mint that you own a certain amount of value. Since these proofs have a fixed value attached to them, much like UTXOs in Bitcoin do, you would need proofs with a value that matches what you want to send. You can mix and match multiple proofs together to create a token that matches the amount you want to send. But, if you don't have proofs that match the amount, you would need to go online and swap for the needed proofs at the mint.Another limitation is, that you cannot create custom proofs offline. For example, if you would want to lock the ecash to a certain pubkey, or add a timelock to the proof, you would need to go online and create a new custom proof at the mint.
Receiving offline
You might think: well, if I trust the sender, I don't need to be swapping the token right away!
You're absolutely correct. If you trust the sender, you can simply accept their ecash token without needing to swap it immediately.
This is already really useful, since it gives you a way to receive a payment from a friend or close aquaintance without having to worry about connectivity. It's almost just like physical cash!
It does however not work if the sender is untrusted. We have to use a different scheme to be able to receive payments from someone we don't trust.
Receiving offline from an untrusted sender
To be able to receive payments from an untrusted sender, we need the sender to create a custom proof for us. As we've seen before, this requires the sender to go online.
The sender needs to create a token that has the following properties, so that the receciver can verify it offline:
- It must be locked to ONLY the receiver's public key
- It must include an
offline signature proof
(DLEQ proof) - If it contains a timelock & refund clause, it must be set to a time in the future that is acceptable for the receiver
- It cannot contain duplicate proofs (double-spend)
- It cannot contain proofs that the receiver has already received before (double-spend)
If all of these conditions are met, then the receiver can verify the proof offline and accept the payment. This allows us to receive payments from anyone, even if we don't trust them.
At first glance, this scheme seems kinda useless. It requires the sender to go online, which defeats the purpose of having an offline payment system.
I beleive there are a couple of ways this scheme might be useful nonetheless:
-
Offline vending machines: Imagine you have an offline vending machine that accepts payments from anyone. The vending machine could use this scheme to verify payments without needing to go online itself. We can assume that the sender is able to go online and create a valid token, but the receiver doesn't need to be online to verify it.
-
Offline marketplaces: Imagine you have an offline marketplace where buyers and sellers can trade goods and services. Before going to the marketplace the sender already knows where he will be spending the money. The sender could create a valid token before going to the marketplace, using the merchants public key as a lock, and adding a refund clause to redeem any unspent ecash after it expires. In this case, neither the sender nor the receiver needs to go online to complete the transaction.
How to use this
Pretty much all cashu wallets allow you to send tokens offline. This is because all that the wallet needs to do is to look if it can create the desired amount from the proofs stored locally. If yes, it will automatically create the token offline.
Receiving offline tokens is currently only supported by nutstash (experimental).
To create an offline receivable token, the sender needs to lock it to the receiver's public key. Currently there is no refund clause! So be careful that you don't get accidentally locked out of your funds!
The receiver can then inspect the token and decide if it is safe to accept without a swap. If all checks are green, they can accept the token offline without trusting the sender.
The receiver will see the unswapped tokens on the wallet homescreen. They will need to manually swap them later when they are online again.
Later when the receiver is online again, they can swap the token for a fresh one.
Summary
We learned that offline transactions are possible with ecash, but there are some limitations. It either requires trusting the sender, or relying on either the sender or receiver to be online to verify the tokens, or create tokens that can be verified offline by the receiver.
I hope this short article was helpful in understanding how ecash works and its potential for offline transactions.
Cheers,
Gandlaf
-
@ 472f7a9b:1e7e0bff
2025-05-19 15:56:03A few weeks ago, I ran into an old friend at a coffee shop. We hadnāt spoken in years, and within five minutes, she said something Iāve heard countless times:
āI just feel like Iām so behind.ā
Behind who? Behind what?
Thereās this ideaāquiet, nagging, oddly universalāthat weāre all somehow in a race we didnāt sign up for. That weāre supposed to have hit certain milestones by certain ages. That if weāre not married, promoted, rich, settled, happy (and photogenic) by 30 or 40 or pick your poison, then weāve failed some invisible test.
Where did this come from?
Some of itās cultural, obviously. Social media compresses timelines. Youāre 27, doom-scrolling, and suddenly someone from high school just IPOād their startup and got engaged in Rome. Another just bought a house with a kitchen island the size of a small country. You wonder if you missed a memo.
But beneath that, thereās something deeper. A belief that life is linear. That it should look like a staircase: school, job, marriage, house, kids, success. But real life? Itās a squiggle. A mess. A beautiful disaster.
Hereās the truth: Youāre not behind. Thereās no schedule. Thereās only your path, and the courage it takes to stay on itāeven when it looks wildly different from everyone elseās.
I say this as someone who has taken the āscenic route.ā I changed careers in my 30s. I moved cities on a hunch. I dropped things that looked great on paper because they felt wrong in my gut. Iāve had seasons of momentum and seasons of stuckness. Both were necessary.
āCatching upā assumes thereās a fixed destination. But what if there isnāt? What if the point isnāt arrival, but presence? Progress that feels real, not performative?
If you need a permission slip to stop comparing, let this be it.
Youāre not late. Youāre not early.
Youāre right on time. -
@ 6ad3e2a3:c90b7740
2024-06-28 07:44:17IāveĀ written about this before, and Iāve also tried to illustrate it via parable in āThe Simulator.ā I even devotedĀ most of a podcast episodeĀ to it. But I thought it might be useful just to cut to the chase in written form, give the tldr version.
Utilitarianism is the moral philosophy of the greatest good for the greatest number. That is, we calculate the prospective net benefits or harms from a course of action to guide our policies and behaviors. This moral framework deserves scrutiny because it (unfortunately) appears to be the paradigm under which most of our governments, institutions and even educated individuals operate.
The philosophy is commonly illustrated by hypotheticals such as āthe trolley problemā wherein a person has the choice whether to divert a runaway trolley (via switch) from its current track with five people in its path to it to an alternate one where only one person would be killed. In short, do you intervene to save five by killing one? The premise of utilitarianism is that, yes, you would because itās a net positive.
Keep in mind in these hypotheticals these are your only choices, and not only are you certain about the results of your prospective actions, but those are the only results to consider, i.e., the hypothetical does not specify or speculate as to second or third order effects far into the future. For example, what could go wrong once people get comfortable intervening to kill an innocent person for the greater good!
And yet this simplified model, kill one to save five, is then transposed onto real-world scenarios, e.g., mandate an emergency-use vaccine that might have rare side effects because it will save more lives than it costs. The credulous go along, and then reality turns out to be more complex than the hypothetical ā as it always is.
The vaccine doesnāt actually stop the spread, it turns out, and the adverse effects are far more common and serious than people were led to believe. Moreover, the mandates destroyed livelihoods, ran roughshod over civil liberties, divided families and destroyed trust in public health.
Some might argue itās true the mandates were wrong because the vaccine wasnāt sufficiently safe or effective, but we didnāt know that at the time! That we should judge decisions based on the knowledge we had during a deadly pandemic, not after the fact.
But what we did know at the time was that real life is always more complex than the hypothetical, that nth-order effects are always impossible to predict. The lie wasnāt only about the safety and efficacy of this vaccine,Ā though they absolutely did lieĀ about that, it was that we could know something like this with any degree of certainty at all.
The problem with utilitarianism, then, is the harms and benefits itās tasked with weighing necessarily occur in the future. And what distinguishes the future from the past is that itās unknown. The save one vs five hypothetical is deceptive because it posits all the relevant consequences as known. It imagines future results laid out before us as if they were past.
But in real life we deal with unknowns, and it is therefore impossible do a rigorous accounting of harms and benefits as imagined by the hypotheticals. The āfive vs one,ā stated as though the event had already happened, is a conceit conjured from an overly simplistic model.
In short, in modeling the future and weighing those projected fictions the same way one would historic facts, they are simply making it up. And once he grants himself license to make things up, the utilitarian can create the moral imperative to do what coincidentally benefits him, e.g, Pfizer profited to the tune of tens of billions of dollars, for the greater good!, which turned out not to be so good. Once you make the specious leap of purporting to know the future, why not go all the way, and make it a future where the greatest good coincides with enriching yourself to the greatest extent possible?
So in summary, as this has gone on longer than I intended, utilitarianism is moral bankruptcy because the āgreater goodā on which it relies is necessarily in the future, and we cannot predict the future with enough accuracy, especially over the medium and longer term, to do a proper moral accounting.
As a result, whoever has power is likely to cook the books in whatever way he sees fit, and this moral philosophy of the greatest good for the greatest number paradoxically tends toward a monstrous outcome ā temporary benefits for the short-sighted few and the greatest misery for most.
-
@ 266815e0:6cd408a5
2025-04-15 06:58:14Its been a little over a year since NIP-90 was written and merged into the nips repo and its been a communication mess.
Every DVM implementation expects the inputs in slightly different formats, returns the results in mostly the same format and there are very few DVM actually running.
NIP-90 is overloaded
Why does a request for text translation and creating bitcoin OP_RETURNs share the same input
i
tag? and why is there anoutput
tag on requests when only one of them will return an output?Each DVM request kind is for requesting completely different types of compute with diffrent input and output requirements, but they are all using the same spec that has 4 different types of inputs (
text
,url
,event
,job
) and an undefined number ofoutput
types.Let me show a few random DVM requests and responses I found on
wss://relay.damus.io
to demonstrate what I mean:This is a request to translate an event to English
json { "kind": 5002, "content": "", "tags": [ // NIP-90 says there can be multiple inputs, so how would a DVM handle translatting multiple events at once? [ "i", "<event-id>", "event" ], [ "param", "language", "en" ], // What other type of output would text translations be? image/jpeg? [ "output", "text/plain" ], // Do we really need to define relays? cant the DVM respond on the relays it saw the request on? [ "relays", "wss://relay.unknown.cloud/", "wss://nos.lol/" ] ] }
This is a request to generate text using an LLM model
json { "kind": 5050, // Why is the content empty? wouldn't it be better to have the prompt in the content? "content": "", "tags": [ // Why use an indexable tag? are we ever going to lookup prompts? // Also the type "prompt" isn't in NIP-90, this should probably be "text" [ "i", "What is the capital of France?", "prompt" ], [ "p", "c4878054cff877f694f5abecf18c7450f4b6fdf59e3e9cb3e6505a93c4577db2" ], [ "relays", "wss://relay.primal.net" ] ] }
This is a request for content recommendation
json { "kind": 5300, "content": "", "tags": [ // Its fine ignoring this param, but what if the client actually needs exactly 200 "results" [ "param", "max_results", "200" ], // The spec never mentions requesting content for other users. // If a DVM didn't understand this and responded to this request it would provide bad data [ "param", "user", "b22b06b051fd5232966a9344a634d956c3dc33a7f5ecdcad9ed11ddc4120a7f2" ], [ "relays", "wss://relay.primal.net", ], [ "p", "ceb7e7d688e8a704794d5662acb6f18c2455df7481833dd6c384b65252455a95" ] ] }
This is a request to create a OP_RETURN message on bitcoin
json { "kind": 5901, // Again why is the content empty when we are sending human readable text? "content": "", "tags": [ // and again, using an indexable tag on an input that will never need to be looked up ["i", "09/01/24 SEC Chairman on the brink of second ETF approval", "text"] ] }
My point isn't that these event schema's aren't understandable but why are they using the same schema? each use-case is different but are they all required to use the same
i
tag format as input and could support all 4 types of inputs.Lack of libraries
With all these different types of inputs, params, and outputs its verify difficult if not impossible to build libraries for DVMs
If a simple text translation request can have an
event
ortext
as inputs, apayment-required
status at any point in the flow, partial results, or responses from 10+ DVMs whats the best way to build a translation library for other nostr clients to use?And how do I build a DVM framework for the server side that can handle multiple inputs of all four types (
url
,text
,event
,job
) and clients are sending all the requests in slightly differently.Supporting payments is impossible
The way NIP-90 is written there isn't much details about payments. only a
payment-required
status and a genericamount
tagBut the way things are now every DVM is implementing payments differently. some send a bolt11 invoice, some expect the client to NIP-57 zap the request event (or maybe the status event), and some even ask for a subscription. and we haven't even started implementing NIP-61 nut zaps or cashu A few are even formatting the
amount
number wrong or denominating it in sats and not mili-satsBuilding a client or a library that can understand and handle all of these payment methods is very difficult. for the DVM server side its worse. A DVM server presumably needs to support all 4+ types of payments if they want to get the most sats for their services and support the most clients.
All of this is made even more complicated by the fact that a DVM can ask for payment at any point during the job process. this makes sense for some types of compute, but for others like translations or user recommendation / search it just makes things even more complicated.
For example, If a client wanted to implement a timeline page that showed the notes of all the pubkeys on a recommended list. what would they do when the selected DVM asks for payment at the start of the job? or at the end? or worse, only provides half the pubkeys and asks for payment for the other half. building a UI that could handle even just two of these possibilities is complicated.
NIP-89 is being abused
NIP-89 is "Recommended Application Handlers" and the way its describe in the nips repo is
a way to discover applications that can handle unknown event-kinds
Not "a way to discover everything"
If I wanted to build an application discovery app to show all the apps that your contacts use and let you discover new apps then it would have to filter out ALL the DVM advertisement events. and that's not just for making requests from relays
If the app shows the user their list of "recommended applications" then it either has to understand that everything in the 5xxx kind range is a DVM and to show that is its own category or show a bunch of unknown "favorites" in the list which might be confusing for the user.
In conclusion
My point in writing this article isn't that the DVMs implementations so far don't work, but that they will never work well because the spec is too broad. even with only a few DVMs running we have already lost interoperability.
I don't want to be completely negative though because some things have worked. the "DVM feeds" work, although they are limited to a single page of results. text / event translations also work well and kind
5970
Event PoW delegation could be cool. but if we want interoperability, we are going to need to change a few things with NIP-90I don't think we can (or should) abandon NIP-90 entirely but it would be good to break it up into small NIPs or specs. break each "kind" of DVM request out into its own spec with its own definitions for expected inputs, outputs and flow.
Then if we have simple, clean definitions for each kind of compute we want to distribute. we might actually see markets and services being built and used.
-
@ 0d2a0f56:ef40df51
2024-06-25 17:16:44Dear Bitcoin Blok Family,
In my last post, I shared how Bitcoin became my personal antidote, rescuing me from destructive behaviors and opening up a world of knowledge. Today, I want to explore how Bitcoin is becoming an antidote for my entire family, solving problems I didn't even know we had.
As I've delved deeper into the Bitcoin rabbit hole, I've realized that I was searching for something beyond personal growth ā I was looking for a solution to give my family an identity. When you look at successful families of the past or thriving organizations, you'll notice they're known for something specific. Some families are known for real estate, others for owning businesses, and some for establishing various institutions. This identity ties a family together, giving them a shared purpose and legacy.
For my family, I want that identity to be rooted in Bitcoin. Why? Because Bitcoin brings a focus I haven't seen in anything else. It neutralizes much of what I consider toxic behavior in modern society.
Take TikTok, for example. While there's nothing inherently wrong with the platform, it often promotes content that I find concerning ā gender wars, gossip, and sometimes even false information. This issue extends to most social media platforms. Our kids are learning to dance, but they're not learning about money. They're absorbing various behaviors, but they don't understand inflation. We're turning to social media for education and information, which isn't necessarily bad, but it requires careful vetting of sources and filtering out the noise.
What's truly dangerous is how these platforms steal our attention subconsciously. We're wasting time, putting our attention in unproductive places without even realizing it. This is a toxic part of our culture today, and I believe Bitcoin can help solve this problem.
It's challenging to teach kids about money in today's fiat standard. How do you explain the concepts of time and energy when the measuring stick itself is constantly changing? But with Bitcoin, these lessons become tangible.
Moreover, Bitcoin opens up possibilities that seemed out of reach before, particularly in the realm of family banking. In the past, wealthy families in the United States understood the risks of keeping their family's worth in another person's hands or in external institutions. They recognized that protecting wealth comes with certain risks, and establishing a family protocol was crucial.
With Bitcoin, family banking becomes not just possible, but easily achievable and more secure than ever before. Through multi-signature wallet arrangements, we can create a true family bank where each family member holds a key to the family wallet. No funds can be moved without the permission of other family members. This technology eliminates what has been a major stumbling block in the past: trust issues. Now, we can have transparency, trust, and access for all family members.
Imagine a family account where parents and children alike have visibility into the family's finances, but movements of funds require agreement. This not only teaches financial responsibility but also fosters open communication about money within the family. It's a powerful tool for financial education and family cohesion.
This is something we should definitely take advantage of. It's not just about storing wealth; it's about creating a financial system that aligns with our family values and goals. Bitcoin provides the infrastructure for this new form of family banking, one that combines the best aspects of traditional family wealth management with the security and transparency of modern technology.
When it comes to teaching about compound interest and value, Bitcoin provides the perfect use case. Over its lifetime, Bitcoin has been averaging an astonishing 156% year-over-year return. While this number is significant, it's important to note that past performance doesn't guarantee future results. However, even with more conservative estimates, the power of compound interest becomes clear. I challenge you to use a compound interest calculator with a more modest 30% annual return. The results are still astronomical. Imagine teaching your children about saving and investing with potential returns like these. It's a powerful lesson in the value of long-term thinking and delayed gratification.
What I'm getting at is this: there are many forces in our society that hinder positive behavior and promote negative, toxic culture. These forces are stealing our children's time, attention, energy, and of course, money. Bitcoin is the antidote that can start correcting and curing some of that behavior, while also providing tangible lessons in finance and economics, and even reshaping how we approach family wealth management.
By making Bitcoin a central part of our family identity, we:
- Provide a shared purpose and legacy
- Encourage financial literacy from a young age
- Teach valuable lessons about time, energy, and value
- Promote long-term thinking and delayed gratification
- Offer an alternative to the instant gratification of social media
Bitcoin isn't just an investment or a technology ā it's a paradigm shift that can reshape how we think about family, legacy, and education. It's an antidote to the toxic aspects of our digital age, offering a path to a more thoughtful, intentional way of living.
As we continue this journey, I invite you to consider: How could Bitcoin reshape your family's identity? What toxic behaviors could it help neutralize in your life? Until next time check out the below video on what some may know as the "Waterfall or "Rockefeller Method". https://youtu.be/MTpAY1LKfek?si=s7gA4bt_ZoRGAlAU
Stay sovereign, stay focused,
Joe Thomas Founder, The Bitcoin Blok
-
@ 000002de:c05780a7
2024-06-25 15:28:01Lately it seems like I keep noticing people that are sympathetic to anarchism and libertarian ideas completely misunderstanding governance. It really seems like this might be one of the biggest mental blocks people have. I wonder if it is mostly the fault of libertarians and anarchists.
Those in the liberty movement (broadly) rant and demonize the government. This is completely justified. I've done it for years. I've noticed that more experienced communicators will tend to say "The State" instead of government. Years ago I heard someone explain how to think about three terms often used incorrectly.
- The country is the land
- The nation is the people
- The state is the government
I don't recall learning this in school. It is possible it was in a textbook but I doubt it. The country part I think most people do get. Nation less so. The best example of a nation without a country are Native Americans. Tribes are nations without a country (their historical lands). Tribes have their own governments and a certain amount of sovereignty in the lands they are allowed to inhabit.
The state is the word that I have found most people are confused about. People used to tell me, you hate the government so much. Why don't you leave. Well, I don't hate the nation(people) or the country(land). It is the governance system I hate. I don't even hate the people that are working in it.
Its funny to me that people on the red or blue team seem to hate the government when their side isn't in power but if someone points to issues in the system itself, well that's just crazy.
So what about those people that are sympathetic to libertarian values? Many of them say things like this. Well, I agree with you on taxes and the corruption of the government. But you always need a government. My usual response is yes. You do need governance. But you don't need a state or government. My home is governed by my wife and I. Businesses have their own governance models. Bitcoin does as well. But we do not need a single entity with a monopoly on violence.
So why is there so much confusion on this topic? I think there are two reasons.
The first is ignorance. The state of the world is largely invisible to most people. We are purposely kept ignorant of how our world works. The State isn't really discussed as a separate entity from the country and nation.
The second reason for the confusion is how libertarians and anarchists communicate. There are some that just foolishly believe people do not need governance. Honestly in my experience they are either just young or do not think deeply enough. They haven't steel manned their arguments yet. In my experience this is a small percentage of people though.
I think people in the liberty movement just need to do a better job communicating ideas. Instead of saying we need to get rid of the government one might say we need to get rid of the state. Another way to lead into this is to speak about the empire vs. the government. Talk about the monopoly which the state holds. How competition leads to better outcomes vs. monopoly.
What do you think? Have you noticed this hurdle as well? I think many people hear good ideas and agree but assume we are just dummies that believe in a fairy tale.
If private or decentralized governance is interesting to you, you might enjoy reading Chaos Theory by Bob Murphy. Its short and answer many common objections to private governance.
-
@ 472f7a9b:1e7e0bff
2025-05-19 15:56:02Thereās something sacred about morning air ā the way it carries just enough chill to remind you youāre alive, without pushing you back inside. Iāve been starting my days on the balcony lately. Not because itās glamorous (it isnāt), or because I have a routine (I donāt), but because itās the only space in my apartment that feels both open and still.
This morning I made coffee with too much cinnamon and curled up with a blanket thatās seen better days. I watched the city slowly wake up ā one barking dog, two joggers, and the clatter of a recycling truck below. Itās odd how these tiny patterns become a kind of comfort.
I used to think that slowing down meant falling behind. But here, perched on the third floor with my feet on cold concrete and the sky just starting to blush, I feel like Iām exactly where Iām supposed to be.
If youāre reading this, maybe you needed that reminder too.
ā Natalie
-
@ c43d6de3:a6583169
2024-06-24 16:56:56"If you do tomorrow what you did today, you will get tomorrow what you got today." - Benjamin Franklin
Seize the Day
Image from article- https://community.thriveglobal.com/want-your-authentic-self-mindfulness-is-a-gateway/Confliction
There are two conflicting approaches to life: Delay gratification today for a wealthy tomorrow and carpe diem Seize the Day and live like today is your last. Usually, when someone prescribes delayed gratification they refer to finances; save a dollar today for a hundred tomorrow. Carpe diem often refers to smelling the coffee, enjoying the little things and not putting off for tomorrow what could've been done today.Ā
I've never felt the two of those prescriptions collide more violently than now as a father of two beautiful kids.Ā I find it more difficult than ever before to make decisions that might benefit my future over being present for my kids. Time being the finite thing that it is, often I can only choose one.Ā
Image from AdobeĀ ImagesTwo Fathers, Two Approaches: Enough Small Moments Equal A BigĀ Moment My brother in-law and I have different approaches to this. He tends to delay gratification. More often than not, he's out on business and misses minor family events and outings. Meanwhile, I often choose to attend even the smallest family events as opposed to going on business.Ā
I should mention, my brother in-law doesn't dare miss the big events. He's always there for a birthday, baptism, or graduation but he misses outings to the beach or spring. He misses the books read by the bed and the dimming of the light just before a kiss goodnight.Ā
If you miss enough small moments, you a miss big one.Ā
Image from article- https://www.spiritualmom.com/god-is-weaving-a-tapestry/
Since my children were born I vowed to live as much in the moment as I could. In the moment, I'm happy to be with my kids stitching together cherished mementos that will be the tapestry of our lives. These indelible memories not only serve to make me happy but, I believe they'll work as the sinews and tendons that come together to form my children's personality and identity. My relationship with my kids and family will tighten as their persona grows.
I don't have facts from studies or scientific analysis, but I have a gut feeling its the strength of the tapestry of our lives that determines how resilient my children will be. When they encounter hard times they'll carry the uplifting memories of good times and they'll have the comfort of knowing there's a tightknit family at their backs to get through it.
That said, I've never heard my brother in-law complain about money.Ā
I can't say I struggle for cash either. I make ends meet, but my wife and I have experienced that nervous rush when the AC blows out mid-summer and we wonder if we would have enough to pay for the down payment of a new unit and the mortgage at the beginning of the month.Ā
What's been bothering me most as of late is my damn near non-existent retirement fund.
Ā
Image from ANATOMY OF A SOLDIER BY HARRY PARKER REVIEWā-āUNUSUAL PERSPECTIVES ON WARFAREĀ FICTION
Commitments- To My Nation, To MyĀ Self
My biggest conflict today is tied to the commitment I made to the United States Army Reserves years before the birth of my children. While I can decide not to go on business like my brother in-law does, I can't simply not attend drill (one weekend a month) or go off on annual training (2ā3 weeks a year). Failure to attend to my military obligations can result in a dis-honorable discharge. Having that hanging over my head will forever ruin any lucrative opportunities for employment and public service.Ā
More often than not, my relatively small obligation to the Army Reserves has stood in direct conflict with my desire to be present in my kids lives as well as the lives of my friends and family. Some how, I've had the misfortune of having drills and annual training scheduled on major events like weddings, baptisms, and birthdays; the very things I vow never to miss.Ā
There are ways to request those special days off and make it up on a later date and when I can, I do. However, I've been forced to go unaccounted for on several occasions when special events are back to back and overlap with already requested days off. That's led to conflict in the past but, I've been fortunate enough to have good leaders who've understood why I preferred to be absent in the military over absent in a major life event.Ā It would be easiest, and most convenient, to resign my congressional commission as an officer and leave the Army Reserves. This is when I feel that great internal conflict.Ā
Serving in the Army Reserves allows me to give back to my nation and grants me several financial benefits that would otherwise be completely lost. Medical insurance is remarkably cheaper than what I would have to deal with as a civilian. I get a world of benefits when purchasing a house and I can apply for special grants if ever needed. Perhaps most important of all, if I stick around for the full 20 years (I have almost 9 now) I will have a very nice retirement pension waiting for me when I turn 65. This is where that differed gratification really kicks in.Ā
When I really boil it down to pros and cons, there's just way too many pros to staying in the Reserves than cons.Ā
Image of Jordan Peterson from Video Clip- "4 yearsĀ video"
Phases of LifeĀ Approach
World renown psychologist Jordan Peterson says "you have little kids for 4 years and if you miss it, its done." For Jordan, this is time period is peak experience for your kids. As I write this, my eldest just turned two and my youngest is 9 months. I'm not quite halfway there yet and I can't let up now.Ā
I don't want to test to see if what Jordan Peterson says is true, I'm going to continue living as much in the moment as is possible during these early years of my children's lives. If I stay in the army reserves throughout this time I will have had 13 years of service by the time my youngest is 4.Ā
Taking this approach, I will have been very present in the first 4 years of my kids lives and will only have to serve seven more years to acquire that retirement.Ā
For me, today is Gold and tomorrow is Silver.
People have sacrificed worse.Ā
artstr #plebchain #writing
I want to show the world that life is a scroll riddled with ink. The marks will only ever be simple blots on the parchment unless you pause and perceive them for the characters they are.
I'm constantly thinking about what the future could look like if we just take action.
More of my thoughts about the future and the world around us are coming soon...
Thank you for Reading this article. If you liked it and would consider zapping some sats, doing so supports me and motivates me to continue writing!
If you are interested in Fiction writing, visit my NOSTR page Fervid Fables: npub1j9cmpzhlzeex6y85c2pnt45r5zhxhtx73a2twt77fyjwequ4l4jsp5xd49