-
@ c1e9ab3a:9cb56b43
2025-05-27 16:19:06Star Wars is often viewed as a myth of rebellion, freedom, and resistance to tyranny. The iconography—scrappy rebels, totalitarian stormtroopers, lone smugglers—suggests a deep anti-authoritarian ethos. Yet, beneath the surface, the narrative arc of Star Wars consistently affirms the necessity, even sanctity, of central authority. This blog entry introduces the question: Is Star Wars fundamentally a celebration of statism?
Rebellion as Restoration, Not Revolution
The Rebel Alliance’s mission is not to dismantle centralized power, but to restore the Galactic Republic—a bureaucratic, centrally governed institution. Characters like Mon Mothma and Bail Organa are high-ranking senators, not populist revolutionaries. The goal is to remove the corrupt Empire and reinstall a previous central authority, presumed to be just.
- Rebels are loyalists to a prior state structure.
- Power is not questioned, only who wields it.
Jedi as Centralized Moral Elites
The Jedi, often idealized as protectors of peace, are unelected, extra-legal enforcers of moral and military order. Their authority stems from esoteric metaphysical abilities rather than democratic legitimacy.
- They answer only to their internal Council.
- They are deployed by the Senate, but act independently of civil law.
- Their collapse is depicted as tragic not because they were unaccountable, but because they were betrayed.
This positions them as a theocratic elite, not spiritual anarchists.
Chaos and the Frontier: The Case of the Cantina
The Mos Eisley cantina, often viewed as a symbol of frontier freedom, reveals something darker. It is: - Lawless - Violent - Culturally fragmented
Conflict resolution occurs through murder, not mediation. Obi-Wan slices off a limb; Han shoots first—both without legal consequence. There is no evidence of property rights, dispute resolution, or voluntary order.
This is not libertarian pluralism—it’s moral entropy. The message: without centralized governance, barbarism reigns.
The Mythic Arc: Restoration of the Just State
Every trilogy in the saga returns to a single theme: the fall and redemption of legitimate authority.
- Prequels: Republic collapses into tyranny.
- Originals: Rebels fight to restore legitimate order.
- Sequels: Weak governance leads to resurgence of authoritarianism; heroes must reestablish moral centralism.
The story is not anti-state—it’s anti-bad state. The solution is never decentralization; it’s the return of the right ruler or order.
Conclusion: The Hidden Statism of a Rebel Myth
Star Wars wears the costume of rebellion, but tells the story of centralized salvation. It: - Validates elite moral authority (Jedi) - Romanticizes restoration of fallen governments (Republic) - Portrays decentralized zones as corrupt and savage (outer rim worlds)
It is not an anarchist parable, nor a libertarian fable. It is a statist mythology, clothed in the spectacle of rebellion. Its core message is not that power should be abolished, but that power belongs to the virtuous few.
Question to Consider:
If the Star Wars universe consistently affirms the need for centralized moral and political authority, should we continue to see it as a myth of freedom? Or is it time to recognize it as a narrative of benevolent empire? -
@ d360efec:14907b5f
2025-05-27 15:46:26 -
@ bf47c19e:c3d2573b
2025-05-27 14:57:56Srpski prevod knjige "The Little Bitcoin Book"
Zašto je Bitkoin bitan za vašu slobodu, finansije i budućnost?
Verovatno ste čuli za Bitkoin u vestima ili da o njemu raspravljaju vaši prijatelji ili kolege. Kako to da se cena stalno menja? Da li je Bitkoin dobra investicija? Kako to uopšte ima vrednost? Zašto ljudi stalno govore o tome kao da će promeniti svet?
"Mala knjiga o Bitkoinu" govori o tome šta nije u redu sa današnjim novcem i zašto je Bitkoin izmišljen da obezbedi alternativu trenutnom sistemu. Jednostavnim rečima opisuje šta je Bitkoin, kako funkcioniše, zašto je vredan i kako utiče na individualnu slobodu i mogućnosti ljudi svuda - od Nigerije preko Filipina do Venecuele do Sjedinjenih Država. Ova knjiga takođe uključuje odeljak "Pitanja i odgovori" sa nekim od najčešće postavljanih pitanja o Bitkoinu.
Ako želite da saznate više o ovom novom obliku novca koji i dalje izaziva interesovanje i usvajanje širom sveta, onda je ova knjiga za vas.
-
@ 0fab798f:2752acff
2025-05-27 16:43:40In the heart of Africa’s digital uprising, Nigeria stands tall as one of the most crypto-curious nations on the planet. For many of us dreamers, builders, hustlers, crypto isn’t just a buzzword. It’s a lifeline. A path out of unemployment. A rebellion against the old financial system. A shot at freedom.
But here’s the hard truth: freedom without protection is exposure>
The recent $1.5 billion Ethereum heist — orchestrated by North Korea’s notorious Lazarus Group — didn’t just shake the crypto world. It shattered any illusions we might still have that blockchain alone can save us. If a juggernaut like Bybit can fall, what hope does the everyday Nigerian creative or crypto enthusiast have?
Let’s not sugarcoat it. This is war, a cyber war. And we must learn how to defend ourselves.
What the Heist Taught Us
- Security is not optional, it’s foundational.
- If you’re building in Web3, minting NFTs, or trading tokens, you’re a target. Use cold wallets. Enable 2FA. Don’t store your life savings on exchanges. Paranoia might just save your wallet.
- Don’t fall for vibes.
- Read smart contracts. Study tokenomics. If a project looks too clean, dig deeper. In crypto, vibes alone won’t protect your funds.
- Educate before you speculate.
- Everyone wants the bag, but not everyone reads the blueprint. Before you ape in, understand the tech. That’s how you stay alive in the jungle.* * *
For the Builders, the Artists, the Rebels
We’re not just investors. We’re architects of the future, launching NFT marketplaces, building DeFi protocols, designing metaverse spaces that blend culture, identity, and code. But here’s the kicker: even the most beautiful idea can burn if it’s built on shaky security.
What we need now isn’t just innovation,it’s insulation.
Form collectives: Learn together, audit each other’s code, build firewalls around our ideas.
Pressure regulators to evolve: Not to stifle us, but to protect the creative economy rising from the streets of Lagos, Port Harcourt, Enugu, Kano.
Go open-source: The more transparent we build, the harder it is for bad actors to hide.
Yakihonne Fam, Let’s Talk
This is more than a headline!
We can either continue building shiny dApps with no shields, or we can become cyber-aware architects of a truly secure digital future. One where Nigerian youth don’t just participate in Web3 — we define it.
The heist should wake us up, not wipe us out.
So the question is: will we build castles or fortresses?
Let’s choose wisely.
-
@ 9e9085e9:2056af17
2025-05-27 16:36:45Part 1: Introducing Yakihonne and the Nostr Protocol
Yakihonne – Redefining Social Media Through Decentralization
Yakihonne is a decentralized social media platform built on the Nostr protocol (Notes and Other Stuff Transmitted by Relays). Unlike traditional social networks controlled by corporations, Yakihonne puts users in charge—your identity, content, and connections are all yours to own.
What is Nostr? Nostr is an open protocol that uses public/private key pairs to enable secure communication. Posts (called “notes”) are sent to public relays instead of being stored on a central server. This allows Yakihonne to offer:
Censorship resistance
User-owned data
Open developer participation
Yakihonne leverages this technology to create a user-first social experience: chat, share, and connect—all without gatekeepers.
Yakihonne #Yakihonne #Yakihonne #Nostr #Nostr #YoungDfx
-
@ 6a6be47b:3e74e3e1
2025-05-27 16:36:21🔍 Today was one of those days where I dove deeper into the world of Stacker News, exploring how wallets work and all that jazz. If you have any tips or tricks, please send them my way—I’m still figuring it all out!
After my tech adventures, I turned to drawing. Usually, I have a lineup of ideas ready to go, but none of them quite fit my mood today. Then I remembered the butterflies from my upcoming blog entry—can you guess what I’m writing and painting about? 👀
🦋Even though I’ve painted butterflies before here’s one on Instagram, I felt like revisiting them.
This one I posted on Nostr, a while ago
Lately, I’ve been seeing butterflies everywhere on my walks with my dog, and they just felt right for today’s art session. So here’s to butterflies and their beautiful symbolism!
In Celtic mythology, there’s an old Irish saying:
“Butterflies are souls of the dead waiting to pass through Purgatory.” From mindbodygreen.com
It’s no wonder butterflies are often seen as symbols of rebirth. Even Aristotle named the butterfly:
“Psyche,” the Greek word for “soul.” From learnreligions.com
☀️With the weather warming up, days growing longer, and the air full of new scents (and butterfly sightings!🦋), I invite you to really enjoy this season. After drawing today’s butterfly, I realized how freeing it is to just let go and create—no pressure, just fun. Sometimes, taking even a few mindful minutes to do something you love can work wonders—maybe even a little magic.
Hope to catch you on the next one, frens. Godspeed! ✨
Today's butterfly. I drew it on Procreate.
https://stacker.news/items/990470
-
@ 9c9d2765:16f8c2c2
2025-05-27 16:19:12CHAPTER THIRTY
“So this is what it’s come to?” Mark muttered, his voice barely audible beneath the hum of city traffic outside the courtroom. His suit was neatly pressed, but the weariness in his eyes betrayed sleepless nights. Helen stood beside him, silent for once, clutching her handbag like it was the last anchor to reality.
“Yes,” came a calm voice from behind them. They turned to see James approaching, flanked by Rita and a group of lawyers dressed in solemn black. His presence was poised, commanding, and utterly devoid of fear.
“You both built your legacy on lies,” James continued, his gaze unwavering. “It was only a matter of time before the truth surfaced.”
Helen’s composure cracked as she stepped forward. “You think this is justice, James? You think humiliating us in court will change the past?”
James gave a faint smirk. “No, Helen. But it will make sure no one else suffers because of your greed.”
The courtroom was already brimming with anticipation. Reporters filled the gallery. Spectators whispered rumors with every glance exchanged between lawyers. A judge with decades of experience presided over the case stern and unsympathetic to theatrics.
As the hearing commenced, James’s legal team presented meticulously organized evidence bank statements tracing illicit transactions to offshore accounts, leaked audio recordings of bribe negotiations, falsified media contracts, and forged internal memos. Each document was a nail in the coffin of Helen and Mark’s defense.
Rita testified, her voice calm and articulate, recounting the smear campaign orchestrated by Tracy under their instructions.
“They targeted James not just to discredit him,” she stated, looking the judge directly in the eye, “but to dismantle every ounce of credibility he had built. They used lies as weapons and fear as a shield.”
Tracy, under pressure from investigators, had also turned witness. Her statement confirmed the bribery and named both Helen and Mark as the masterminds.
“I was promised protection. They said James would be out of the picture before he could fight back,” Tracy confessed tearfully. “But I never imagined the damage we were doing.”
Mark buried his face in his hands while Helen’s facade of arrogance disintegrated in front of the press. Her voice trembled as she rose from her seat during cross-examination.
“It wasn’t meant to go this far,” she stammered. “We were just trying to protect our interests.”
The judge’s gavel struck with finality. “This court finds sufficient grounds for a full criminal trial. The charges include corporate fraud, character defamation, and financial manipulation. The accused are to remain in custody pending further proceedings.”
Gasps filled the room. Helen’s knees buckled as officers approached to take her into custody. Mark, pale and visibly shaking, didn’t resist.
As they were led away, James stood watching. Not with triumph but with quiet vindication.
Later that evening, James held a press conference at JP Enterprises. Cameras clicked and lights flashed as he stepped onto the podium.
“Today marks not a victory over enemies,” he said, his voice resonating with calm authority, “but a victory for accountability. For truth. For every hardworking individual who believes that integrity still matters in business.”
The days following the courtroom revelation were nothing short of transformative for James. What once seemed like an unending siege of betrayal and defamation now stood as a monumental testimony of perseverance. His vindication rippled through the business community, not only restoring his honor but elevating his stature to that of a symbol of resilience, truth, and quiet triumph.
The media, which had once been ravenous in its pursuit to scandalize his name, now sought exclusive interviews. Headlines changed overnight: “The President Who Defied the Odds,” “From Disgrace to Glory James’s Unrivaled Comeback,” and “Truth Prevails at JP Enterprises.”
Still, James remained composed. He declined most interview requests, only issuing a single written statement to the press:
“My silence was never a weakness, nor was my patience approved. In a world where deception moves faster than truth, I chose to let integrity do the talking. Let this be a reminder: time may delay justice, but it cannot deny it.”
In the boardroom of JP Enterprises, there was a newfound sense of reverence. Senior executives who once viewed James with reserved acknowledgment now listened with deference. Staff who had wavered in their loyalties found themselves inspired by his unshakable conviction.
Rita, reinstated officially as General Manager, transformed the company’s internal culture. She advocated for transparency, fairness, and accountability, echoing James’s values. Together, they initiated corporate reforms that would safeguard JP Enterprises against future exploitation. Employee welfare programs were improved, mentorship initiatives were introduced, and innovation was rewarded instead of suppressed.
As for Helen and Mark, the criminal proceedings dragged them through every layer of public accountability. Their assets were frozen pending investigation, and the companies they once boasted of began to crumble under the weight of distrust. The Ray family, mortified and shamed, distanced themselves completely. Robert, in particular, approached James privately, full of contrition.
“I misjudged you,” he said quietly, standing across from James in the same office where he once dismissed him. “And I know an apology may not undo what has been done… but I needed to say it.”
James, ever composed, gave a small nod. “Acknowledgment is the first step toward redemption, Robert. What you do with the rest of your journey that’s what will matter.”
Despite all the chaos, James found time to reconnect with himself. On certain evenings, he would return to the very neighborhood where he had once wandered, alone and destitute. He walked its narrow lanes not with bitterness, but gratitude. Every hardship had refined him. Every betrayal had taught him discernment.
On the sixteenth floor of JP Tower, standing before the massive glass window that overlooked the city skyline, James often stood in silence, his reflection merging with the city lights. He knew his story wasn’t merely about power or wealth, it was about transformation.
The days that followed James’s public exoneration ushered in a new chapter not only in his professional journey but also in his personal life. Amidst the rising stature and recognition, there remained unresolved threads that tugged quietly at his conscience chief among them, his estranged wife, Rita.
Though she was back in her rightful position at JP Enterprises, a wall of silence stood between them, built from years of misunderstanding, pride, and pain. Their conversations, though respectful and professional, were void of warmth. Yet, beneath her poised demeanor, James could sense her hesitation, perhaps a longing unspoken, restrained by fear of rejection or guilt over the past.
-
@ 9c9d2765:16f8c2c2
2025-05-27 16:05:22CHAPTER TWENTY NINE In boardrooms, lounges, and even on social media platforms, one question echoed relentlessly: Who is this man who rose from the ashes, not just to lead, but to lead with such bold transparency?
Meanwhile, in a dimly lit office nestled deep within Ray Enterprises, Helen paced restlessly across her carpeted floor. Her heels clicked in rhythm with the tension radiating from her. Mark stood by the window, nervously peeking through the blinds as though paranoia had taken root in his very soul.
“This can’t be happening,” Helen hissed, her voice sharp with frustration. “That press conference flipped everything. Now we’re the ones under scrutiny, and James has flipped the narrative like a magician.”
Mark turned, his voice laced with disbelief. “You saw the financial reports. Investors are pulling out of our side deals. If this continues, Ray Enterprises will collapse under the weight of its own debt.”
Helen clenched her fists, her perfectly manicured nails digging into her palms. “We need leverage. Something from his past. Something real. If the rumors didn’t ruin him, maybe the truth whatever it is will.”
But unknown to them, their every word was being monitored.
Lilian, the sharp cybersecurity expert at JP Enterprises, had tapped into Helen’s office through a corrupted email file disguised as a sponsorship request. Every correspondence, every call, and every document opened since then had been recorded and encrypted. Now, James had everything he needed and more.
At JP Enterprises, James stood in the private archive room, going through printed transcriptions of the recordings. Rita entered quietly, holding another file.
“We’ve compiled a list of shell companies used to launder bribe money into media firms and anonymous accounts,” she said, placing the documents gently before him.
James glanced through the list. Names of journalists, bloggers, and even a few local politicians filled the pages.
“They thought hiding behind faceless transactions would protect them,” he said calmly. “But even shadows betray their source when the light is bright enough.”
He closed the file slowly and looked at Rita.
“Let’s prepare the evidence for the federal board. By the time I’m done, Ray Enterprises will not only owe us 85%… they’ll owe us their very survival.”
The following day, the National Corporate Regulatory Board received a sealed dossier containing proof of bribery, media manipulation, and corporate fraud complete with audio clips, transaction records, and screen captures. An anonymous tip, courtesy of The Integrity Initiative.
As the investigation began to stir, Helen and Mark received a legal summons. Panic set in like a poison. Reporters camped outside Ray Enterprises. Shareholders demanded answers. The once feared and revered duo now found themselves cornered like rats.
In a final, desperate attempt, Helen reached out to James.
She showed up at JP Enterprises’ reception uninvited, her expression soft but insincere. She was dressed in white as if to evoke purity but James saw through the façade like glass.
“James,” she began, her voice low and trembling, “I know we’ve had our differences, but let’s not destroy each other. We can fix this, together. Let’s negotiate.”
James leaned back in his chair, eyes piercing.
“Negotiate?” he echoed, a wry smile touching his lips. “When you smeared my name, tried to sabotage my company, and humiliated me in public?”
Helen faltered but held her composure.
“It was business, James. That’s all. I didn’t mean to”
James cut her off with a raised hand.
“You didn’t mean to destroy my life? Helen, you orchestrated an entire charade. You bribed people to lie. But now the charade is over. And business… has consequences.”
He reached into his drawer, pulled out a copy of the legal complaint already filed against her, and placed it in front of her.
“You have 24 hours to prepare your lawyers.”
Helen’s mask of grace fell instantly. Her hands shook as she picked up the file, her eyes scanning the lines like a woman reading her own obituary.
-
@ bf47c19e:c3d2573b
2025-05-27 14:54:03Originalni tekst na bitcoin-balkan.com.
Pregled sadržaja
- 5 Razloga Zašto je Novac Važan za Vas, Individualno
- 3 Razloga Zašto je Novac Važan za Društvo u Celini
- Zašto ljudi mrze novac?
Novac vs trenuci – da li oni treba da budu u sukobu? Kakva je uloga novca?
Novac je nepredvidiva zver modernog društva – neki ga veličaju sa stalnom željom da steknu više, dok ga drugi demonizuju i kažu da je pohlepa srž društvenih problema. Tokom mnogih godina svog života, ja sam često prelazio sa jednog na drugo gledište, i naučio mnogo toga upoznajući druge ljude koji žive na oba kraja ovog spektra. Kao i kod mnogih složenih tema, istina leži negde u sredini.
Novac je važan zato što on može da pomogne u uklanjanju materijalnih želja i patnji – omogućavanjem da preuzmete kontrolu nad svojim životom i da brinete o voljenima. Novac podiže životni standard društva omogućavanjem trgovine, a pritom minimalizuje potrebu za poverenjem.
Na novac možemo gledati kao na način da svoj uloženi trud sačuvamo u odredjenom obliku, i da ga vremenom prenesemo, tako da možemo da uživamo u plodovima svog rada. Novac kao alat je jedna od najvažnijih stvari za rast civilizacije. Na nesreću, mnogi su vremenom zlostavljali novac, ali sa dobrim razlogom: način na koji naš novac danas funkcioniše dovodi do duboko podeljenog društva – što ću i objasniti.
5 Razloga Zašto je Novac Važan za Vas, Individualno
Novac je važan za rast bogatstva, što je malo drugačije od toga da imamo veliku platu ili jednostavno zarađivati velike količine novca. Bogatstvo je otklanjanje želja, kako bi mogli da obratimo više pažnje na neke korisnije stvari u životu, od pukog preživljavanja i osnovnih udobnosti.
Bogata osoba je ona koja zaradi više novca nego što potroši, i koja ga čuva – ona čuva svoj rad tokom vremena. Uporedite ovo sa visoko plaćenim lekarom koji živi u velikoj vili sa hipotekom i sa Mercedesom na lizing. Iako ova osoba ima visoke prihode, ona takođe ima velike rashode u vidu obaveze plaćanja te hipoteke i lizinga. Te obaveze sprečavaju ovu osobu da uživa u istinskim blagodetima novca i bogatstva koje one predstavljaju:
1. Sloboda od potrebe za radom
Bez bogatstva, vi morate da radite da biste preživeli. Dostizanjem bogatstva i odredjenom imovinom koja vam donosi novac bez potrebe da vi trošite svoje vreme, vi možete da oslobodite svoj raspored. Više ne zavisite od posla koji mrzite, i nemorate da provodite 40 sati nedeljno odvojeni od porodice, samo da biste se pobrinuli za svoje osnovne potrebe. Dobijanje otkaza u padu ekonomije neće vas dovesti do finansijske propasti ili nečeg goreg.
2. Kontrola nad time kako vi trošite svoje vreme
Kada steknete bogatstvo, vi možete da odlučite kako želite da provodite svoje vreme. Kada se nalazimo u trci pacova i radimo 40+ sati nedeljno, često se naviknemo da novac trošimo onda kada imamo slobodnog vremena. Idemo na lepe večere ili idemo na skupe odmore. Međutim, sa više vremena, a možda čak i sa manje novca, mi možemo da imamo isto ili više uživanja živeći usporenije.
Razmislite o ovome – ukoliko imate samo 1 nedelju slobodno od posla, vi onda morate da kupite onaj mnogo skuplji let u Petak uveče koji se vraća u sledeću Nedelju, kako biste maksimalno iskoristili svoje vreme na nekom egzotičnom mestu za odmor. Međutim, ukoliko ste u mogućnosti da izdržavate sebe bez potrebe da mnogo vremena provodite na poslu, vi onda možete u Utorak da krenete jeftinijim letom i vratite se u sledeću Sredu. Takođe nećete osećati toliki pritisak da se opustite u uživanju tokom vaše nedelje u inostranstvu – možda ćete čak moći i da ostanete duže i da istražujete više, bez plaćanja skupih turističkih agencija i hotela kako bi organizovali vaše kraće putovanje.
3. Sposobnost da pomažete vašim prijateljima i porodici
Onda kada novca imate na pretek, možete poboljšati svoje odnose sa prijateljima i porodicom ne samo kroz dodatno slobodno vreme koje provodite sa njima, već i sa samim novcem. Ako je vašem prijatelju potrebna hitna operacija, vi možete da mu izadjete u susret i pomognete mu da stane na svoje noge. Ukoliko vam je tetka bolesna, vi možete da provedete vreme pored nje, umesto da je pozovete na kratko dok putujete prema kući vraćajući se nakon celog dana provedenog u kancelariji.
4. Smanjen finansijski stres
Stres je sveobuhvatno i opasno stanje modernog doba, sa kojim gotovo svi mi živimo u nekoj odredjenoj meri. Povezan je sa lošim zdravljem, sa preko 43% svih odraslih koji kažu da pate od odredjenih zdravstvenih problema uzrokovanih stresom. Stres zbog posla pogađa 83% zaposlenih.
Pravo bogatstvo – koje znači eliminaciju želja i potreba – može da ukloni ovaj stres i njegove negativne uticaje na druge delove života. Ovo bi čak moglo da ukloni većinu stresa u vašem životu, uzimajući u obzir da je uzrok stresa broj 1 upravo novac.
5. Bolje možete da pomognete vašoj zajednici
Mnogi od nas žele da volontiraju u svojim zajednicama i pomognu onima koja je pomoć preko potrebna, ali nisu u stanju da pronađu slobodnog vremena i energije zbog svog posla, porodice i društvenih aktivnosti koje nas mentalno i fizički čine srećnima, zdravima i hranjenima. Sa bogatstvom, mi možemo da posvetimo vreme koje nam je potrebno za razumevanje i doprinos drugima – a ne samo da sa vremena na vreme pomognemo slanjem humanitarnog SMS-a.
Novac, koji se pametno koristi, je moćno sredstvo za poboljšanje vašeg života i života vaših najmilijih i zajednice. Međutim, novac je takođe moćno sredstvo za poboljšanje društva u celini – ukoliko je dobro strukturiran.
3 Razloga Zašto je Novac Važan za Društvo u Celini
Novac poboljšava sposobnost ljudi da trguju jedni s drugima, što podstiče određene specijalizacije. Ako je imanje vašeg komšije odlično za proizvodnju vina, a vaše je pogodno za žito, obojica možete da profitirate trgovinom. Sad oboje imate i hleb i vino, umesto jednog pijanog vlasnika vinograda i jednog proizvodjača žita kome je dosadno!
Novac poboljšava društvo na nekoliko načina:
1. Omogućava specijalizaciju
Kao u primeru vlasnika vinograda i proizvodjača žita, novac omogućava povećanu specijalizaciju poboljšavajući sposobnost trgovine. Svaka razmena dobara ima problem sa ‘sticajima potreba’ – oba partnera u trgovini moraju da žele ono što druga osoba ima da bi pristala na trgovinu.
Možemo da mislimo o novcu kao o dobru koje žele gotovo svi. Ovo trgovinu čini mnogo jednostavnijom – da biste stekli odredjeno dobro, sve što vam je potrebno je novac, a ne neka slučajna stvar koju prodavac tog dobra takođe želi u tom trenutku. Vremenom je upotreba novca omogućila specijalizaciju, što je povećalo kvalitet i složenost roba i usluga.
Zamislite da sami pokušate da napravite svoj telefon – a bili su potrebni milioni stručnjaka i specijalizovana oprema da bi proizveli taj uređaj. Svi ti stručnjaci i kompanije plaćaju jedni drugima u novcu, omogućavajući složenom plesu globalnih proizvođača i lanaca snabdevanja da taj telefon isporuče na dlan vaše ruke. Čak i nešto tako jednostavno kao flaša za vodu uključuje naftna polja i proizvodne pogone koji su možda hiljadama kilometara od vaše kuće.
Kada ljudi mogu da se specijalizuju, kvalitet robe i usluga može da se poveća.
2. Omogućava korisnu trgovinu uz smanjeno poverenje
Mala društva mogu mirno i produktivno da posluju bez novca koristeći usluge, “dodjem ti” i uzajamno razumevanje. Međutim, kako se društva uvećavaju, svima brzo postaje nemoguće da održavaju lične odnose i isti stepen poverenja sa svima ostalima. Sistem trgovine uslugama i međusobnog poverenja ne funkcioniše previše dobro sa putnikom koji se nalazi na proputovanju kroz grad, i provede samo 15 minuta svog života u vašoj prodavnici.
Novac minimizira poverenje potrebno za trgovinu u većim društvima. Sada više ne moram da verujem da ćete mi pomoći kasnije kada mi zatreba – mogu samo da prihvatim uplatu od vas i da to koristim da bih sebi pomogao kasnije. Jedan od mojih omiljenih mislilaca, Nick Szabo, ovo naziva ‘društvena prilagodljivost’.
3. Smanjuje upotrebu sile
Kada društvo teži upotrebi određenog oblika novca za olakšavanje trgovine, može u velikoj meri da smanji nasilje u tom društvu. Kako to može biti tako? Zar ljudi ne bi i dalje želeli da kradu jedni od drugih ili da se svete?
Ukoliko razmišljamo van uobičajnih okvira, možemo da počnemo da razumemo kako novac može da smanji nasilje. Ako ti i ja živimo u susednim zemljama i želimo nešto što druga zemlja ima, imamo dva načina da to dobijemo: uzimanjem na silu ili menjanjem nečeg našeg za to. Kao što je ranije rečeno, novac znatno olakšava trgovinu – pa ćemo postojanjem zajedničkog monetarnog sistema verovatnije radje izvršiti trgovinu nego napad na zemlju. Zašto bismo rizikovali svoje živote kad možemo samo mirno da trgujemo jedni sa drugima?
Zašto ljudi mrze novac?
Pa ako novac ima toliko koristi za nas lično i za društvo u celini, zašto toliko ljudi mrzi novac? Zašto je demonizovan, zajedno sa onima koji ga imaju puno?
Za deo ovoga može biti okrivljen problem u jednakosti mogućnosti – to da je nekima teže da izadju iz nemaštine i postanu bogati. Bez sumnje, neki mali deo potiče od ljudi koji jednostavno ne žele da se trude ili preduzmu neophodne rizike da bi postali bogati.
Međutim, oba ova problema imaju više veze sa problemima kako naš novac danas funkcioniše, nego sa bilo kojim problemom u samom konceptu novca. Novčani sistem treba da nagrađuje ljude koji proizvode vredne stvari i trguju njima sa drugima. Verujem da većina ljudi danas misli da novac tako funkcioniše, i to ne bi smelo da bude daleko od istine.
Naš trenutni monetarni sistem, na žalost, nagrađuje ’finansijalizaciju’ – pretvarajući sve u imovinu, čija vrednost može da se napumpava ili spušta stvaranjem dobre priče i navođenjem drugih da veruju u nju. Razuzdani dug pogonjen stalnim omalovažavanjem svih glavnih valuta dodat je ovom blatu finansijalizacije. Sada je isplativije podići ogroman kredit i koristiti ga za brzo okretanje imovine radi zarade nego izgraditi posao koji društvu nudi korisne robe i usluge.
Tradicionalni monetarni sistem dodatno nagradjuje predatore, partnere u zločinu i neradnike.
Propast našeg novca razvila se tokom proteklih pola veka, počevši od toga kada su naše valute postale ništa više od parčeta papira, podržanog sa verom i kreditima naših vlada. Da biste bolje razumeli ovu promenu, pogledajte moj post o svrsi i istoriji novca.
Ako vam se sviđa moj rad, molim vas da ga podelite sa svojim prijateljima i porodicom. Cilj mi je da svima pružim pogled u ekonomiju i na to kako ona utiče na njihov život.
-
@ da8b7de1:c0164aee
2025-05-27 15:09:54Globális nukleáris reneszánsz és új kapacitások
A 2025-ös év a globális nukleáris energiaipar újabb lendületét hozza, amit a Nemzetközi Energiaügynökség (IEA) is megerősít: rekordtermelés várható, jelenleg több mint 70 GW új nukleáris kapacitás épül világszerte, és több mint 40 ország tervezi a nukleáris energia szerepének növelését az energiamixében. A világ számos pontján – Kínában, az Egyesült Államokban, Indiában, az Egyesült Arab Emírségekben és Franciaországban – új blokkok csatlakoznak a hálózatra, miközben nyolc új egység építése is elindult. A cél, hogy 2050-re a jelenlegi 416 GW globális nukleáris kapacitás meghaladja az 1000 GW-ot, ami elengedhetetlen a klímavédelmi és energiabiztonsági célok teljesítéséhez[vg.hu][paks2.hu].
SMR-ek: technológiai áttörés és globális terjeszkedés
A kis moduláris reaktorok (SMR) forradalmasíthatják az iparágat: ezek a kompakt, előregyártott, gyorsan telepíthető egységek különösen alkalmasak távoli területek energiaellátására, ipari hőtermelésre vagy akár tengervíz sótalanítására is. Az SMR-ek fejlesztése világszerte zajlik, az USA, Kína, Oroszország és Európa élen jár, de már több mint 17 országban terveznek ilyen létesítményeket. 2025 májusában Oroszország és Üzbegisztán történelmi megállapodást kötött hat RITM-200N típusú SMR építéséről, amely az első ilyen egység lesz Közép-Ázsiában. Az Egyesült Arab Emírségekben és az USA-ban is új SMR-projektek indulnak, például a Tennessee Valley Authority hivatalosan is engedélyt kért egy BWRX-300 típusú SMR-re a Clinch River telephelyen[makronom.eu][world-nuclear-news.org][nucnet.org].
Nukleáris üzemanyag-ellátás és ellátásbiztonság
Az orosz-ukrán háború és az ellátásbiztonsági kockázatok miatt Európában is felgyorsult az alternatív nukleáris üzemanyag-beszállítók keresése. Franciaországban az EDF, az Orano és az amerikai Westinghouse tárgyalásokat folytat egy új, nyugat-európai üzemanyag-feldolgozó létesítmény létrehozásáról, hogy csökkentsék az orosz függőséget. Az Európai Bizottság részletes útmutatót adott ki az orosz nukleáris technológiákról való leválásról, de a tagállamok jelentős készleteket halmoztak fel orosz üzemanyagból, mivel az azonnali leválás az energiabiztonságot veszélyeztetné[pakspress.hu][nucnet.org].
Technológiai innovációk és üzemanyagciklus-zárás
A gyorsneutronos reaktorok és a MOX-üzemanyag alkalmazása új távlatokat nyit a nukleáris hulladék mennyiségének és veszélyességének csökkentésében, valamint a földi uránkészletek hatékonyabb felhasználásában. Az orosz BN–800 gyorsreaktor már kizárólag kevert, urán-plutónium MOX-üzemanyagot használ, és folyamatban van a BN–1200 típusú egység fejlesztése is. Ezek a fejlesztések a zárt üzemanyagciklus megvalósítását célozzák, amely jelentősen csökkentheti a végleges elhelyezésre kerülő sugárzó hulladék mennyiségét és kezelési költségeit[vg.hu].
Nukleáris energia és digitális infrastruktúra
Az adatközpontok növekvő energiaigénye miatt egyre több technológiai vállalat fordul az atomenergia felé. Az amerikai Oklo és az RPower, valamint a Deep Fission és az Endeavour együttműködése révén föld alatti SMR-eket telepítenek adatközpontok energiaellátására. Ezek a projektek kiemelik a nukleáris energia szerepét a digitális infrastruktúra fenntartható működtetésében[nucnet.org].
Piaci kilátások és geopolitikai kihívások
A Cameco vezérigazgatója szerint a globális nukleáris keresletet nem befolyásolják jelentősen a kereskedelmi vagy geopolitikai feszültségek, mivel a reaktorokra világszerte szükség van, még magasabb költségek vagy vámok mellett is. A magántőke beáramlása, az új szabályozási reformok (pl. az USA-ban az ADVANCE törvény), valamint a nemzetközi együttműködések mind hozzájárulnak az iparág hosszú távú stabilitásához és bővüléséhez[world-nuclear-news.org][nucnet.org].
Források:
world-nuclear-news.org
nucnet.org
vg.hu
makronom.eu
paks2.hu
pakspress.hu -
@ 45d6c2bf:56915a25
2025-05-27 14:23:39published without nostr installed
-
@ e844b39d:adafb6a2
2025-05-27 14:31:02This was not planned, but last evening I realized that I should at least test the Sony A900 and Minolta gear that I had, which was bought for real estate photography around a decade ago.
Look at everything out here!
Our two white kittens are almost identical, but they come from two different mothers, Charcoal and Tiger!
I sometimes wonder if they have realized that they look the same, they tend to stick together most of the day.
I know you're there!
This ended up being perfect scenes for the 20/2.8 wide open!
Outside the gate
Several of our cats have been digging a hole outside, sniffing for something, we have no idea what that is all about...
Playing around
They often stay in the slot for the gate, I guess its a little less hot there.
Happy cat?
This sort of scene is perfect for the Beercan, Minolta 70-210/4, its a legendary piece of optics for sure. One of the reasons I got into the system back then.
Scouting
They spent some time hunting each others in the "jungle" of course!
Hunting mode!
They were moving too rapidly for any gear really, so the slow AF was not a real hindrance.
I look good, yes?
Sometimes when I process images of them the fur gets messy and kinda dirty looking, but this went the opposite way!
It was a good day in the garden, and a very useful test.
That's it for today!
-
@ 43baaf0c:d193e34c
2025-05-27 14:08:02During the incredible Bitcoin Filmfest, I attended a community session where a discussion emerged about zapping and why I believe zaps are important. The person leading the Nostr session who is also developing an app that’s partially connected to Nostr mentioned they wouldn’t be implementing the zap mechanism directly. This sparked a brief but meaningful debate, which is why I’d like to share my perspective as an artist and content creator on why zaps truly matter.
Let me start by saying that I see everything from the perspective of an artist and creator, not so much from a developer’s point of view. In 2023, I started using Nostr after spending a few years exploring the world of ‘shitcoins’ and NFTs, beginning in 2018. Even though I became a Bitcoin maximalist around 2023, those earlier years taught me an important lesson: it is possible to earn money with my art.
Whether you love or hate them, NFTs opened my eyes to the idea that I could finally take my art to the next level. Before that, for over 15 years, I ran a travel stock video content company called @traveltelly. You can read the full story about my journey in travel and content here: https://yakihonne.com/article/traveltelly@primal.net/vZc1c8aXrc-3hniN6IMdK
When I truly understood what Bitcoin meant to me, I left all other coins behind. Some would call that becoming a Bitcoin maximalist.
The first time I used Nostr, I discovered the magic of zapping. It amazed me that someone who appreciates your art or content could reward you—not just with a like, but with real value: Bitcoin, the hardest money on earth. Zaps are small amounts of Bitcoin sent as a sign of support or appreciation. (Each Bitcoin is divisible into 100 million units called Satoshis, or Sats for short—making a Satoshi the smallest unit of Bitcoin recorded on the blockchain.)
The Energy of Zaps
If you’re building an app on Nostr—or even just connecting to it—but choose not to include zaps, why should artists and content creators share their work there? Why would they leave platforms like Instagram or Facebook, which already benefit from massive network effects?
Yes, the ability to own your own data is one of Nostr’s greatest strengths. That alone is a powerful reason to embrace the protocol. No one can ban you. You control your content. And the ability to post once and have it appear across multiple Nostr clients is an amazing feature.
But for creators, energy matters. Engagement isn’t just about numbers—it’s about value. Zaps create a feedback loop powered by real appreciation and real value, in the form of Bitcoin. They’re a signal that your content matters. And that energy is what makes creating on Nostr so special.
But beyond those key elements, I also look at this from a commercial perspective. The truth is, we still can’t pay for groceries with kisses :)—we still need money as a medium of exchange. Being financially rewarded for sharing your content gives creators a real incentive to keep creating and sharing. That’s where zaps come in—they add economic value to engagement.
A Protocol for Emerging Artists and Creators
I believe Nostr offers a great starting point for emerging artists and content creators. If you’re just beginning and don’t already have a large following on traditional social media platforms, Nostr provides a space where your work can be appreciated and directly supported with Bitcoin, even by a small but engaged community.
On the other hand, creators who already have a big audience and steady income on platforms like Instagram or YouTube may not feel the urgency to switch. This is similar to how wealthier countries are often slower to understand or adopt Bitcoin—because they don’t need it yet. In contrast, people in unbanked regions or countries facing high inflation are more motivated to learn how money really works.
In the same way, emerging creators—those still finding their audience and looking for sustainable ways to grow—are often more open to exploring new ecosystems like Nostr, where innovation and financial empowerment go hand in hand.
The same goes for Nostr. After using it for the past two years, I can honestly say: without Nostr, I wouldn’t be the artist I am today.
Nostr motivates me to create and share every single day. A like is nice but receiving a zap, even just 21 sats, is something entirely different. Once you truly understand that someone is willing to pay you for what you share, it’s no longer about the amount. It’s about the magic behind it. That simple gesture creates a powerful, positive energy that keeps you going.
Even with Nostr’s still relatively small user base, I’ve already been able to create projects that simply wouldn’t have been possible elsewhere.
Zaps do more than just reward—they inspire. They encourage you to keep building your community. That inspiration often leads to new projects. Sometimes, the people who zap you become directly involved in your work, or even ask you to create something specifically for them.
That’s the real value of zaps: not just micro-payments, but micro-connections sparks that lead to creativity, collaboration, and growth.
Proof of Work (PoW)
Over the past two years, I’ve experienced firsthand how small zaps can evolve into full art projects and even lead to real sales. Here are two examples that started with zaps and turned into something much bigger:
Halving 2024 Artwork
When I started the Halving 2024 project, I invited people on Nostr to be part of it. 70 people zapped me 2,100 sats each, and in return, I included their Npubs in the final artwork. That piece was later auctioned and sold to Jurjen de Vries for 225,128 Sats.
Magic Internet Money
For the Magic Internet Money artwork, I again invited people to zap 2,100 sats to be included. Fifty people participated, and their contributions became part of the final art frame. The completed piece was eventually sold to Filip for 480,000 sats.
These examples show the power of zaps: a simple, small act of appreciation can turn into larger engagement, deeper connection, and even the sale of original art. Zaps aren’t just tips—they’re a form of collaboration and support that fuel creative energy.
I hope this article gives developers a glimpse into the perspective of an artist using Nostr. Of course, this is just one artist’s view, and it doesn’t claim to speak for everyone. But I felt it was important to share my Proof of Work and perspective.
For me, Zaps matter.
Thank you to all the developers who are building these amazing apps on Nostr. Your work empowers artists like me to share, grow, and be supported through the value-for-value model.
-
@ c1e9ab3a:9cb56b43
2025-05-27 13:19:53I. Introduction: Money as a Function of Efficiency and Preference
Money is not defined by law, but by power over productivity. In any open economy, the most economically efficient actors—those who control the most valuable goods, services, and knowledge—ultimately dictate the medium of exchange. Their preferences signal to the broader market what form of money is required to access the highest-value goods, from durable commodities to intangibles like intellectual property and skilled labor.
Whatever money these actors prefer becomes the de facto unit of account and store of value, regardless of its legal status. This emergent behavior is natural and reflects a hierarchy of monetary utility.
II. Classical Gresham’s Law: A Product of Market Distortion
Gresham’s Law, famously stated as:
"Bad money drives out good"
is only valid under coercive monetary conditions, specifically: - Legal tender laws that force the acceptance of inferior money at par with superior money. - Fixed exchange rates imposed by decree, not market valuation. - Governments or central banks backing elastic fiduciary media with promises of redemption. - Institutional structures that mandate debt and tax payments in the favored currency.
Under these conditions, superior money (hard money) is hoarded, while inferior money (soft, elastic, inflationary) circulates. This is not an expression of free market behavior—it is the result of suppressed price discovery and legal coercion.
Gresham’s Law, therefore, is not a natural law of money, but a law of distortion under forced parity and artificial elasticity.
III. The Collapse of Coercion: Inversion of Gresham’s Law
When coercive structures weaken or are bypassed—through technological exit, jurisdictional arbitrage, monetary breakdown, or political disintegration—Gresham’s Law inverts:
Good money drives out bad.
This occurs because: - Market actors regain the freedom to select money based on utility, scarcity, and credibility. - Legal parity collapses, exposing the true economic hierarchy of monetary forms. - Trustless systems (e.g., Bitcoin) or superior digital instruments (e.g., stablecoins) offer better settlement, security, and durability. - Elastic fiduciary media become undesirable as counterparty risk and inflation rise.
The inversion marks a return to monetary natural selection—not a breakdown of Gresham’s Law, but the collapse of its preconditions.
IV. Elasticity and Control
Elastic fiduciary media (like fiat currency) are not intrinsically evil. They are tools of state finance and debt management, enabling rapid expansion of credit and liquidity. However, when their issuance is unconstrained, and legal tender laws force their use, they become weapons of economic coercion.
Banks issue credit unconstrained by real savings, and governments enforce the use of inflated media through taxation and courts. This distorts capital allocation, devalues productive labor, and ultimately hollows out monetary confidence.
V. Monetary Reversion: The Return of Hard Money
When the coercion ends—whether gradually or suddenly—the monetary system reverts. The preferences of the productive and wealthy reassert themselves:
- Superior money is not just saved—it begins to circulate.
- Weaker currencies are rejected not just for savings, but for daily exchange.
- The hoarded form becomes the traded form, and Gresham’s Law inverts completely.
Bitcoin, gold, and even highly credible stable instruments begin to function as true money, not just stores of value. The natural monetary order returns, and the State becomes a late participant, not the originator of monetary reality.
VI. Conclusion
Gresham’s Law operates only under distortion. Its inversion is not an anomaly—it is a signal of the collapse of coercion. The monetary system then reorganizes around productive preference, technological efficiency, and economic sovereignty.
The most efficient market will always dictate the form of hard money. The State can delay this reckoning through legal force, but it cannot prevent it indefinitely. Once free choice returns, bad money dies, and good money lives again.
-
@ a0e937b7:50db609a
2025-05-27 13:06:38Because we are not merely addicted to #Narrativium: It is our drive, imbued into our very essence. And it is so much easier to absorb our daily dose from the billions of trickles provided by everyone else as a substitute drug #Gossipium, or temporarily saturate our unquenchable thirst by just giving in to the temptation by the incessable stream of Movies and Series providing #Fictionium than it is to find a properly satisfying Source Of Narrativium (acronymize that 😉), let alone create our own Narrativium that might even be worthy of sharing. And yet, there is so much more fulfilment possible by letting one's creativity work instead of merely using a "share" button - which briefly seems to trick the human brain into believing that one has actually participated in providing one's peers with proper Narrativium, possibly as part of an implicit social contract: "I give you all some Narrativium I found, now give me more in return". It is such a trivial action to take, even more effortless than gossiping. But let's be honest, it often just feels hollow. And even when we write something, it is again tempting to just create #Rantium instead of something actually useful.
Gossypium herbaceum, the cotton plant (Photo by H. Zell from Wikipedia)
Originally I merely wanted to post a witty quote from https://wiki.lspace.org/mediawiki/Narrativium about Narrativium on Facebook:
"Humans add narrativium to their world. They insist on interpreting the universe as if it's telling a story. This leads them to focus on facts that fit the story, while ignoring those that don't." - T. Pratchett, I. Steward, J. Cohen, The Science of Discworld I
Maybe even subtly allude to how that might explain quite a lot about the everyday insanity that seems to surround us, especially these days.
"We are not Homo sapiens, Wise Man. We are the third chimpanzee. [...] We are Pan narrans, the storytelling ape. [...] if you understand the power of story, and learn to detect abuses of it, you might actually deserve the appellation Homo sapiens." - T. Pratchett, I. Steward, J. Cohen, The Science of Discworld II
Really. I was just going to quote a bit and go on about my day with some meaningless procrastination. Why already bother with housework when I can delay that until tomorrow or the day after and just watch some series in the Arrowverse now? But after ten minutes of a Legends of Tomorrow episode called "Lucha de Apuestas", curiosity got the better of me. What is it with Luchadores and their masks, I mockingly wondered. So I read Wikipedia on it. Lots of culture, history and, most importantly to me, Narrativium. I probably couldn't care less for to guys bumping fists on a stage, I don't really care about watching any sports either. But there's a certain fascination to stories, isn't there? So I felt like sharing about Narrativium, and here we are.
—
That's it for now, I might keep writing on this. One day. Just as I keep continuing writing everything else I start. Not. Well, motivate me.
-
@ cae03c48:2a7d6671
2025-05-27 14:00:49Bitcoin Magazine
What to expect from the BTCfi & L2s companies at the Bitcoin Conference in VegasThe annual Bitcoin Conference in Las Vegas is a pivotal event for the Bitcoin ecosystem, where companies unveil breakthroughs, announce partnerships, and deliver speeches that shape the narrative of digital assets. For many, the sheer volume of information can be overwhelming. Having attended several conferences and being familiar with the attending companies through my work at UTXO, I’ve highlighted key panels and expected developments for 2025, focusing on Bitcoin’s Layer 2 (L2) and BTCfi ecosystems.
The full agenda is available using this link: https://b.tc/conference/2025/agenda
Here’s a breakdown of anticipated announcements and panels, categorized by key themes:
BitVM2 Announcements
Since BitVM’s introduction in 2023, top Bitcoin development teams have been working tirelessly to transform centralized sidechain designs into true Bitcoin rollups and permissionless L2s. At the 2025 conference, expect these teams to unveil the first versions of BitVM2 bridges, providing critical details on their mechanics. Once live, BitVM2 bridges could unlock a wide range of decentralized BTC use cases, accessible to all Bitcoin holders. May 2025 might mark a turning point, potentially signaling the decline of centralized “crypto” and DeFi projects in favor of a Bitcoin-native economy. As the saying goes, on a long enough timeline, everything comes back to Bitcoin.
L2 Partnerships
Bitcoin L2s face a steep challenge: competing with established crypto players while earning the trust of Bitcoiners. The conference is likely to feature major partnership announcements, particularly at the infrastructure level, addressing long-standing barriers to BTCfi adoption. These collaborations could bolster the credibility and functionality of L2 solutions, paving the way for broader acceptance.
Lightning and Taproot Assets Innovation
The recent announcement that Tether (USDT) will return to Bitcoin by issuing its stablecoin on Lightning rails via Taproot Assets has sparked significant excitement. Expect major updates from companies in this space, particularly regarding Taproot Assets and stablecoin integration. The Lightning Network is poised for dominance, and 2025 could be the year it breaks into the mainstream.
Opcodes and Governance Discussions
With growing support for covenant activation on Bitcoin and recent debates over mempool policy on social media, governance discussions will be a focal point. These panels promise to be intellectually stimulating, offering deep insights into Bitcoin’s core mechanics and potential fireworks for those following the debates. Attending these sessions will likely be the most rewarding experience of the week for anyone seeking to understand Bitcoin’s future.
Must-Attend Panels
Below is a curated list of panels aligned with the above categories, along with my expectations for each. (Note: These predictions reflect my personal perspective and are not definitive. This list is not exhaustive but highlights high-signal sessions for attendees with limited time.)
Panels and Keynote with the highest probability of a major announcement related to Bitcoin L2s and BTCfi products: in other words, this is where major alpha will be dropped
Governance Discussions
*Bitcoin L2s and BTCfi products*
L2 and Lightning discussions
This post What to expect from the BTCfi & L2s companies at the Bitcoin Conference in Vegas first appeared on Bitcoin Magazine and is written by Guillaume Girard.
-
@ cae03c48:2a7d6671
2025-05-27 14:00:46Bitcoin Magazine
Trump Media Group Seeks $3 Billion War Chest to Buy Bitcoin and Crypto Assets: FTTrump Media and Technology Group (TMTG), the company behind Truth Social and controlled by the Trump family, is preparing to raise a staggering $3 billion to invest in cryptocurrencies such as Bitcoin, according to the Financial Times.
JUST IN:
Trump Media Group to raise $3 billion to buy Bitcoin and crypto — Financial Times pic.twitter.com/VEyvy5vpGZ
— Bitcoin Magazine (@BitcoinMagazine) May 26, 2025
The media venture plans to secure $2 billion in fresh equity and another $1 billion through a convertible bond offering, those familiar with the matter told the Financial Times. The capital raise could be formally announced ahead of The Bitcoin 2025 Conference in Las Vegas this week, where Vice President JD Vance, Donald Trump Jr., Eric Trump, and Trump’s crypto advisor David Sachs are expected to speak.
The secondary equity offering will be carried out on an at-the-market basis, meaning shares are expected to be priced near the most recent closing price of $25.72, giving TMTG a current valuation of nearly $6 billion.
TMTG’s push comes amid a wider cryptocurrency resurgence. Bitcoin hit a new record of $111,999 last week, and investor interest in crypto-related plays has surged. The strategy echoes that of Strategy, which used a similar blend of debt and equity financing to buy tens of billions of dollars in Bitcoin—catapulting its market cap to over $100 billion.
Although the news is still yet to be confirmed by TMTG, a comment they made to the Financial Times may give some doubt to the validity of the story:
“Apparently the Financial Times has dumb writers listening to even dumber sources”, reportedly said TMTG. A White House spokesperson also declined to weigh in. Representatives for Donald Trump Jr. did not respond to requests for comment and Reuters also did not immediately receive a request for comment.
TMTG’s deepening crypto pivot has included a slew of ventures: an NFT trading card series, two memecoins, investments in crypto miner American Bitcoin and stablecoin platform World Liberty Financial, and an upcoming crypto ETF.
After returning to the White House last year, Trump transferred his 53% stake in TMTG—worth roughly $3 billion—to a revocable trust controlled by Donald Trump Jr., who holds full investment and voting authority.
This is a developing story and will be updated as needed.
This post Trump Media Group Seeks $3 Billion War Chest to Buy Bitcoin and Crypto Assets: FT first appeared on Bitcoin Magazine and is written by Jenna Montgomery.
-
@ cae03c48:2a7d6671
2025-05-27 14:00:44Bitcoin Magazine
Jippi Launches Pokémon GO-Style AR Bitcoin Education Game at Vegas’s Bitcoin 2025Jippi, a mobile augmented reality (AR) game developer, will debut its Bitcoin education game at the Bitcoin Conference 2025, held at The Venetian Resort in Las Vegas from May 27-29. Inspired by Pokémon GO, the game blends location-based gameplay with financial literacy, aiming to engage over 30,000 attendees by making Bitcoin education fun and accessible.
Using the app, players can explore The Venetian’s grounds to hunt digital “Bitcoin Beasts,” answering Bitcoin-related trivia to capture them and earn 1000 satoshis (sats) per catch. The game is designed to deliver concise lessons on sound money principles, targeting younger audiences, with Jippi’s research showing 90% of Gen Z play mobile games. This approach aims to make learning about Bitcoin intuitive and engaging.
“We’re excited to turn Bitcoin education into an adventure,” said Oliver Porter, Jippi’s Founder and CEO. “Our game meets players where they are, making complex concepts approachable.”
Jippi partnered with six Bitcoin companies—Bitcoin Well, Beyond The Checkout, Bitcoin Trading Cards, Geyser, SHAmory, and 21M Communications—to sponsor unique Beasts. Each is tied to a specific location, offering tailored trivia that highlights the sponsor’s mission. For instance, Bitcoin Well’s Beast teaches wallet security, while SHAmory’s content suits all ages. “Jippi’s game is a fresh way to onboard new users,” said Adam O’Brien, CEO of Bitcoin Well.
The game stems from over a year of development, including university testing and on-site surveys. Jippi’s efforts earned it the top prize at PlebLab’s Top Builder competition in March 2025, a hackathon for Bitcoin startups, cementing its role in gamifying education.
With 30,000 attendees expected, the conference is an ideal stage for Jippi to showcase AR’s potential in Bitcoin adoption. The game promises to transform The Venetian into a dynamic learning hub, encouraging players to explore while grasping Bitcoin’s real-world applications. Jippi aims to expand the game post-conference, adding more educational content.
This post Jippi Launches Pokémon GO-Style AR Bitcoin Education Game at Vegas’s Bitcoin 2025 first appeared on Bitcoin Magazine and is written by Juan Galt.
-
@ 5d4b6c8d:8a1c1ee3
2025-05-27 13:34:45Is the housing market going to crash for real this time?
https://primal.net/e/nevent1qvzqqqqqqypzp6dtxy5uz5yu5vzxdtcv7du9qm9574u5kqcqha58efshkkwz6zmdqqs8dqr35dc0npsc8cuulqm4m7gxrgqq3ytphtja9nx534a592gztzsuzsrja
https://stacker.news/items/990316
-
@ 6146ad04:a0937b0b
2025-05-27 13:25:11The cryptocurrency market has evolved from a fringe innovation to a mainstream financial ecosystem in just over a decade. What began with Bitcoin's launch in 2009 has grown into a global market with thousands of digital assets, decentralized finance (DeFi) protocols, and billions of dollars in daily trading volume.
Current Landscape
As of 2025, the cryptocurrency market remains dynamic, with Bitcoin and Ethereum continuing to dominate in terms of market capitalization and influence. However, other assets like Solana, Cardano, and newer entrants are gaining traction, offering innovative features such as faster transaction times, lower fees, and more energy-efficient consensus mechanisms.
The rise of stablecoins, like USDT and USDC, has also played a crucial role in bridging the gap between traditional finance and the digital asset economy. These assets provide a stable store of value in a notoriously volatile market and are widely used in trading, lending, and remittance applications.
Key Trends
-
Regulation and Compliance: Governments and regulatory bodies worldwide are increasingly focused on creating frameworks for crypto oversight. This push aims to protect consumers, combat illicit activities, and integrate digital assets into existing financial systems.
-
Institutional Adoption: Major financial institutions, hedge funds, and publicly traded companies are increasingly incorporating cryptocurrencies into their portfolios. Bitcoin ETFs and crypto custody solutions have helped legitimize the market.
-
Decentralized Finance (DeFi): DeFi platforms offer lending, borrowing, and trading without intermediaries. This sector continues to grow, although it faces regulatory scrutiny and security challenges.
-
Non-Fungible Tokens (NFTs) and Web3: The integration of blockchain with gaming, digital art, and metaverse projects is expanding the use case of cryptocurrencies beyond just financial applications.
Challenges
Volatility: Cryptocurrencies remain highly volatile, posing risks for investors and hindering their use as stable stores of value.
Security: Hacks and scams persist, especially within DeFi ecosystems. Ensuring smart contract security and better user education are critical.
Environmental Concerns: Although the industry is moving toward greener solutions like Proof of Stake (PoS), energy usage remains a concern for some networks.
The Future Outlook
Despite its ups and downs, the cryptocurrency market shows long-term promise. Innovations in blockchain scalability, privacy, and interoperability are likely to shape the next wave of adoption. As regulation matures and institutional trust deepens, cryptocurrencies could become a standard part of the global financial system.
For investors and enthusiasts, staying informed and cautious is key in this rapidly changing space.
-
-
@ 9cb3545c:2ff47bca
2025-05-27 12:58:56Introduction
Public companies that hold Bitcoin on behalf of investors (often issuing securities backed by those Bitcoin holdings) have faced growing pressure to demonstrate proof of reserves – evidence that they genuinely hold the cryptocurrency they claim. One approach is to publish the company’s Bitcoin wallet addresses so that anyone can verify the balances on the blockchain. This practice gained momentum after high-profile crypto collapses (e.g. FTX in 2022) eroded trust, leading major exchanges and fund issuers like Binance, Kraken, OKX, and Bitwise to publicize wallet addresses as proof of assets . The goal is transparency and reassurance for investors. However, making wallet addresses public comes with significant security and privacy risks. This report examines those risks – from cybersecurity threats and blockchain tracing to regulatory and reputational implications – and weighs them against the transparency benefits of on-chain proof of reserves.
Proof of Reserves via Public Wallet Addresses
In the cryptocurrency ethos of “don’t trust – verify,” on-chain proof of reserves is seen as a powerful tool. By disclosing wallet addresses (or cryptographic attestations of balances), a company lets investors and analysts independently verify that the Bitcoin reserves exist on-chain. For example, some firms have dashboards showing their addresses and balances in real time . In theory, this transparency builds trust by proving assets are not being misreported or misused. Shareholders gain confidence that the company’s Bitcoin holdings are intact, potentially preventing fraud or mismanagement.
Yet this approach essentially sacrifices the pseudonymity of blockchain transactions. Publishing a wallet address ties a large, known institution to specific on-chain funds. While Bitcoin addresses are public by design, most companies treat their specific addresses as sensitive information. Public proof-of-reserve disclosures break that anonymity, raising several concerns as detailed below.
Cybersecurity Threats from Visible Wallet Balances
Revealing a wallet address with a large balance can make a company a prime target for hackers and cybercriminals. Knowing exactly where significant reserves are held gives attackers a clear blueprint. As Bitcoin advocate (and MicroStrategy Executive Chairman) Michael Saylor warned in 2025, “publicly known wallet addresses become prime targets for malicious actors. Knowing where significant reserves are held provides hackers with a clear target, potentially increasing the risk of sophisticated attacks” . In other words, publishing the address increases the attack surface – attackers might intensify phishing campaigns, malware deployment, or insider bribery aimed at obtaining the keys or access to those wallets.
Even if the wallets are secured in cold storage, a public address advertisement may encourage attempts to penetrate the organization’s security. Custodians and partners could also be targeted. Saylor noted that this exposure isn’t just risky for the company holding the Bitcoin; it can indirectly put their custodial providers and related exchanges at risk as well . For instance, if a third-party custodian manages the wallets, hackers might attempt to breach that custodian knowing the reward (the company’s Bitcoin) is great.
Companies themselves have acknowledged these dangers. Grayscale Investments, which runs the large Grayscale Bitcoin Trust (GBTC), pointedly refused to publish its wallet addresses in late 2022, citing “security concerns” and complex custody arrangements that have “kept our investors’ assets safe for years” . Grayscale implied that revealing on-chain addresses could undermine those security measures, and it chose not to “circumvent complex security arrangements” just to appease public demand . This highlights a key point: corporate treasury security protocols often assume wallet details remain confidential. Publicizing them could invalidate certain assumptions (for example, if an address was meant to be operationally secret, it can no longer serve that role once exposed).
Additionally, a publicly known trove of cryptocurrency might invite physical security threats. While not a purely “cyber” issue, if criminals know a particular company or facility controls a wallet with, say, thousands of Bitcoin, it could lead to threats against personnel (extortion or coercion to obtain keys). This is a less common scenario for large institutions (which typically have robust physical security), but smaller companies or key individuals could face elevated personal risk by being associated with huge visible crypto reserves.
In summary, cybersecurity experts consider public proof-of-reserve addresses a double-edged sword: transparency comes at the cost of advertising exactly where a fortune is held. As Saylor bluntly put it, “the conventional way of issuing proof of reserves today is actually insecure… This method undermines the security of the issuer, the custodian, the exchanges and the investors. This is not a good idea”  . From a pure security standpoint, broadcasting your wallets is akin to drawing a bullseye on them.
Privacy Risks: Address Clustering and Blockchain Tracing
Blockchain data is public, so publishing addresses opens the door to unwanted analytics and loss of privacy for the business. Even without knowing the private keys, analysts can scrutinize every transaction in and out of those addresses. This enables address clustering – linking together addresses that interact – and other forms of blockchain forensics that can reveal sensitive information about the company’s activities.
One immediate risk is that observers can track the company’s transaction patterns. For example, if the company moves Bitcoin from its reserve address to an exchange or to another address, that move is visible in real time. Competitors, investors, or even attackers could deduce strategic information: perhaps the company is planning to sell (if coins go to an exchange wallet) or is reallocating funds. A known institution’s on-chain movements can thus “reveal strategic movements or holdings”, eroding the company’s operational privacy . In a volatile market, advance knowledge of a large buy or sell by a major player could even be exploited by others (front-running the market, etc.).
Publishing one or a few static addresses also violates a basic privacy principle of Bitcoin: address reuse. Best practice in Bitcoin is to use a fresh address for each transaction to avoid linking them  . If a company continuously uses the same “proof of reserve” address, all counterparties sending funds to or receiving funds from that address become visible. Observers could map out the company’s business relationships or vendors by analyzing counterparties. A Reddit user commenting on an ETF that published a single address noted that “reusing a single address for this makes me question their risk management… There are much better and more privacy-preserving ways to prove reserves… without throwing everything in a single public address” . In other words, a naive implementation of proof-of-reserve (one big address) maximizes privacy leakage.
Even if multiple addresses are used, if they are all disclosed, one can perform clustering analysis to find connections. This happened in the Grayscale case: although Grayscale would not confirm any addresses, community analysts traced and identified 432 addresses likely belonging to GBTC’s custodial holdings by following on-chain traces from known intermediary accounts . They managed to attribute roughly 317,705 BTC (about half of GBTC’s holdings) to those addresses . This demonstrates that even partial information can enable clustering – and if the company directly published addresses, the task becomes even easier to map the entirety of its on-chain asset base.
Another threat vector is “dusting” attacks, which become more feasible when an address is publicly known. In a dusting attack, an adversary sends a tiny amount of cryptocurrency (dust) to a target address. The dust itself is harmless, but if the target address ever spends that dust together with other funds, it can cryptographically link the target address to other addresses in the same wallet. Blockchain security researchers note that “with UTXO-based assets, an attacker could distribute dust to an address to reveal the owner’s other addresses by tracking the dust’s movement… If the owner unknowingly combines this dust with their funds in a transaction, the attacker can… link multiple addresses to a single owner”, compromising privacy . A company that publishes a list of reserve addresses could be systematically dusted by malicious actors attempting to map out all addresses under the company’s control. This could unmask cold wallet addresses that the company never intended to publicize, further eroding its privacy and security.
Investor confidentiality is another subtle concern. If the business model involves individual investor accounts or contributions (for instance, a trust where investors can deposit or withdraw Bitcoin), public addresses might expose those movements. An outside observer might not know which investor corresponds to a transaction, but unusual inflows/outflows could signal actions by big clients. In extreme cases, if an investor’s own wallet is known (say a large investor announces their involvement), one might link that to transactions in the company’s reserve addresses. This could inadvertently reveal an investor’s activities or holdings, breaching expectations of confidentiality. Even absent direct identification, some investors might simply be uncomfortable with their transactions being part of a publicly traceable ledger tied to the company.
In summary, publishing reserve addresses facilitates blockchain tracing that can pierce the veil of business privacy. It hands analysts the keys to observe how funds move, potentially exposing operational strategies, counterparties, and internal processes. As one industry publication noted, linking a large known institution to specific addresses can compromise privacy and reveal more than intended . Companies must consider whether they are ready for that level of transparency into their every on-chain move.
Regulatory and Compliance Implications
From a regulatory perspective, wallet address disclosure lies in uncharted territory, but it raises several flags. First and foremost is the issue of incomplete information: A wallet address only shows assets, not the company’s liabilities or other obligations. Regulators worry that touting on-chain holdings could give a false sense of security. The U.S. Securities and Exchange Commission (SEC) has cautioned investors to “not place too much confidence in the mere fact a company says it’s got a proof-of-reserves”, noting that such reports “lack sufficient information” for stakeholders to ascertain if liabilities can be met . In other words, a public company might show a big Bitcoin address balance, but if it has debts or customer liabilities of equal or greater value, the proof-of-reserve alone is “not necessarily an indicator that the company is in a good financial position” .
This regulatory stance implies that address disclosure, if done, must be paired with proper context. A public company would likely need to clarify in its financial statements or investor communications that on-chain reserves are unencumbered (not pledged as loan collateral, not already sold forward, etc.) and that total liabilities are accounted for. Otherwise, there’s a risk of misleading investors, which could have legal consequences. For example, if investors interpret the on-chain balance as proof of solvency but the company actually had leveraged those bitcoins for loans, lawsuits or regulatory enforcement could follow for misrepresentation.
There’s also a compliance burden associated with revealing addresses. Once an address is known to be the company’s, that company effectively must monitor all transactions related to it. If someone sends funds to that address (even without permission), the company might receive tainted coins (from hacked sources or sanctioned entities). This could trigger anti-money laundering (AML) red flags. Normally, compliance teams can ignore random deposits to unknown wallets, but they cannot ignore something sent into their publicly identified corporate wallet. Even a tiny dust amount sent from a blacklisted address could complicate compliance – for instance, the company would need to prove it has no relation to the sender and perhaps even avoid moving those tainted outputs. Being in the open increases such exposure. Threat actors might even exploit this by “poisoning” a company’s address with unwanted transactions, just to create regulatory headaches or reputational smears.
Another consideration is that custodial agreements and internal risk controls might forbid public disclosure of addresses. Many public companies use third-party custodians for their Bitcoin (for example, Coinbase Custody, BitGo, etc.). These custodians often treat wallet details as confidential for security. Grayscale noted that its Bitcoin are custodied on Coinbase and implied that revealing on-chain info would interfere with security arrangements  . It’s possible that some custodians would object to their clients broadcasting addresses, or might require additional assurances. A company going against such advice might be seen as negligent if something went wrong.
Regulators have so far not mandated on-chain proofs for public companies – in fact, recent laws have exempted public companies from proof-of-reserve mandates on the assumption they are already subject to rigorous SEC reporting. For example, a Texas bill in 2023 required crypto exchanges and custodians to provide quarterly proof-of-reserves to the state, but it “specifically carved out public reporting companies” since they already file audited financials with the SEC . The rationale was that between SEC filings and audits, public companies have oversight that private crypto firms lack . However, this also highlights a gap: even audited financials might not verify 100% of crypto assets (auditors often sample balances). Some observers noted that standard audits “may not ever include the 100% custodial asset testing contemplated by proof of reserves”, especially since quarterly SEC filings (10-Q) are often not audited . This puts public companies in a nuanced position – they are trusted to use traditional audits and internal controls, but the onus is on them if they choose to add extra transparency like on-chain proofs.
Finally, securities regulators focus on fair disclosure and accuracy. If a company publicly posts addresses, those essentially become investor disclosures subject to anti-fraud rules. The firm must keep them up to date and accurate. Any mistake (such as publishing a wrong address or failing to mention that some coins are locked up or lent out) could attract regulatory scrutiny for being misleading. In contrast, a formal audit or certification from a third-party comes with standards and disclaimers that are better understood by regulators. A self-published wallet list is an unprecedented form of disclosure that regulators haven’t fully vetted – meaning the company bears the risk if something is misinterpreted.
In summary, wallet address disclosure as proof-of-reserve must be handled very carefully to avoid regulatory pitfalls. The SEC and others have warned that on-chain assets alone don’t tell the whole story . Public companies would need to integrate such proofs with their official reporting in a responsible way – otherwise they risk confusion or even regulatory backlash for giving a false sense of security.
Reputational and Operational Risks
While transparency is meant to enhance reputation, in practice public wallet disclosures can create new reputational vulnerabilities. Once an address is public, a company’s every on-chain action is under the microscope of the crypto community and media. Any anomaly or perceived misstep can snowball into public relations problems.
One vivid example occurred with Crypto.com in late 2022. After the exchange published its cold wallet addresses to prove reserves (a move prompted by the FTX collapse), on-chain analysts quickly noticed a “suspicious transfer of 320,000 ETH” – about 82% of Crypto.com’s Ether reserves – moving from their cold wallet to another exchange (Gate.io)  . This large, unexpected transfer sparked immediate panic and FUD (fear, uncertainty, and doubt) on social media. Observers speculated that Crypto.com might be insolvent or was manipulating snapshots of reserves by borrowing funds. The CEO had to publicly respond, admitting it was an operational error – the ETH was supposed to go to a new cold storage address but ended up at a whitelisted external address by mistake . The funds were eventually returned, but not before reputational damage was done: the incident made headlines about mishandled funds and rattled user confidence  . This case illustrates how full public visibility can turn an internal slip-up into a highly public crisis. If the addresses had not been public, the mistake might have been quietly corrected; with on-chain transparency, there was nowhere to hide and no way to control the narrative before the public drew worst-case conclusions.
Even routine operations can be misinterpreted. Blockchain data lacks context – analysts may jump to conclusions that hurt a company’s reputation even if nothing is actually wrong. For instance, Binance (the world’s largest crypto exchange) encountered scrutiny when on-chain observers noted that one of its reserve wallets (labeled “Binance 8”) contained far more assets than it should have. This wallet was meant to hold collateral for Binance’s issued tokens, but held an excess balance, suggesting possible commingling of customer funds with collateral  . Bloomberg and others reported a ~$12.7 billion discrepancy visible on-chain . Binance had to acknowledge the issue as a “clerical error” and quickly separate the funds, all under the glare of public attention  . While Binance maintained that user assets were fully backed and the mistake was purely operational, the episode raised public concern over Binance’s practices, feeding a narrative that even the largest exchange had internal control lapses. The key point is that public proof-of-reserves made the lapse obvious to everyone, forcing a reactive explanation. The reputational hit (even if temporary) was an operational risk of being so transparent.
Additionally, strategic confidentiality is lost. If a company holding Bitcoin as a reserve asset decides to make a major move (say, reallocating to a different wallet, or using some Bitcoin for a strategic investment or loan), doing so with known addresses broadcasts that strategy. Competitors or market analysts can infer things like “Company X is moving 10% of its BTC — why? Are they selling? Hedging? Using it as collateral?” This can erode any competitive advantage of keeping financial strategies discreet. It might even affect the company’s stock price if investors interpret moves negatively. For example, if a blockchain analysis shows the company’s reserves dropping, shareholders might fear the company sold Bitcoin (perhaps due to financial distress), even if the reality is benign (like moving funds to a new custodian). The company would be forced into continuous public explanation of on-chain actions to prevent misunderstanding.
There’s also a risk of exposing business partnerships. Suppose the company uses certain exchanges or OTC desks to rebalance its holdings – transactions with those service providers will be visible and could link the company to them. If one of those partners has issues (say a hacked exchange or a sanctioned entity inadvertently), the company could be reputationally contaminated by association through the blockchain trail.
Finally, not all publicity is good publicity in the crypto world. A public proof-of-reserve might invite armchair auditors to scrutinize and criticize every aspect of the company’s crypto management. Minor issues could be blown out of proportion. On the flip side, if a company chooses not to publish addresses, it could face reputational risk from a different angle: skeptics might question why it isn’t being transparent. (Indeed, Grayscale’s refusal to disclose wallet addresses led to social media chatter about whether they truly held all the Bitcoin they claimed, contributing to investor nervousness and a steep discount on GBTC shares .) Thus, companies are in a delicate spot: share too much and every move invites scrutiny; share too little and you breed distrust.
Balancing Transparency Benefits vs. Risks
The central question is whether the benefit of proving reserve holdings to investors outweighs these security and privacy risks. It’s a classic risk-reward calculation, and opinions in the industry are divided.
On the side of transparency, many argue that the credibility and trust gained by proof-of-reserves is invaluable. Advocates note that Bitcoin was designed for open verification – “on-chain auditability and permissionless transparency” are core features . By embracing this, companies demonstrate they are good stewards of a “trustless” asset. In fact, some believe public companies have a duty to be extra transparent. A recent Nasdaq report contended that “when a publicly traded company holds Bitcoin but offers no visibility into how that Bitcoin is held or verified, it exposes itself to multiple levels of risk: legal, reputational, operational, and strategic”, undermining trust . In that view, opacity is riskier in the long run – a lack of proof could weaken investor confidence or invite regulatory suspicion. Shareholders and analysts may actually penalize a company that refuses to provide verifiable proof of its crypto assets .
Transparency done right can also differentiate a firm as a leader in governance. Publishing reserve data (whether via addresses or through third-party attestations) can be seen as a commitment to high standards. For example, Metaplanet, an investment firm, publicly discloses its BTC reserve addresses and even provides a live dashboard for anyone to verify balances . This proactive openness signals confidence and has been touted as an industry best practice in some quarters. By proving its reserves, a company can potentially avoid the fate of those that lost public trust (as happened with opaque crypto firms in 2022). It’s also a means to preempt false rumors – if data is out in the open, misinformation has less room to grow.
However, the pro-transparency camp increasingly acknowledges that there are smarter ways to achieve trust without courting all the risks. One compromise is using cryptographic proofs or audits instead of plain address dumps. For instance, exchanges like Kraken have implemented Merkle tree proof-of-reserves: an independent auditor verifies all customer balances on-chain and provides a cryptographic report, and customers can individually verify their account is included without the exchange revealing every address publicly. This method proves solvency to those who need to know without handing over a complete roadmap to attackers. Another emerging solution is zero-knowledge proofs, where a company can prove knowledge or ownership of certain assets without revealing the addresses or amounts to the public. These technologies are still maturing, but they aim to deliver the best of both worlds: transparency and privacy.
On the side of caution, many experts believe the risks of full public disclosure outweigh the incremental gain in transparency, especially for regulated public companies. Michael Saylor encapsulates this viewpoint: he calls on-chain proof-of-reserve “a bad idea” for institutions, arguing that it “offers one-way transparency” (assets only) and “leaves organizations open to cyberattacks” . He stresses that no serious security expert would advise a Fortune 500 company to list all its wallet addresses, as it essentially compromises corporate security over time . Saylor and others also point out the pointlessness of an assets-only proof: unless you also prove liabilities, showing off reserves might even be dangerous because it could lull investors into a false sense of security .
Regulators and traditional auditors echo this: proof-of-reserves, while a useful tool, “is not enough by itself” to guarantee financial health . They advocate for holistic transparency – audits that consider internal controls, liabilities, and legal obligations, not just a snapshot of a blockchain address  . From this perspective, a public company can satisfy transparency demands through rigorous third-party audits and disclosures rather than raw on-chain data. Indeed, public companies are legally bound to extensive reporting; adding public crypto addresses on top may be seen as redundant and risky.
There is also an implicit cost-benefit analysis: A successful attack resulting from over-sharing could be catastrophic (loss of funds, legal liability, reputational ruin), whereas the benefit of public proof is somewhat intangible (improved investor sentiment, which might be achieved via other assurance methods anyway). Given that trade-off, many firms err on the side of caution. As evidence, few if any U.S.-listed companies that hold Bitcoin have published their wallet addresses. Instead, they reference independent custodians and audits for assurance. Even crypto-native companies have pulled back on full transparency after realizing the downsides – for example, some auditing firms halted issuing proof-of-reserves reports due to concerns about how they were interpreted and the liability involved  .
Industry best practices are still evolving. A prudent approach gaining favor is to prove reserves without leaking sensitive details. This can involve disclosing total balances and having an auditor or blockchain oracle confirm the assets exist, but without listing every address publicly. Companies are also encouraged to disclose encumbrances (whether any of the reserves are collateralized or lent out) in tandem, to address the liabilities issue . By doing so, they aim to achieve transparency and maintain security.
In evaluating whether to publish wallet addresses, a company must ask: Will this level of openness meaningfully increase stakeholder trust, or would a more controlled disclosure achieve the same goal with less risk? For many public companies, the answer has been to avoid public addresses. The risks – from attracting hackers to revealing strategic moves – tend to outweigh the marginal transparency benefit in their judgment. The collapse of unregulated exchanges has certainly proven the value of reserve verification, but public companies operate in a different context with audits and legal accountability. Thus, the optimal solution may be a middle ground: proving reserves through vetted processes (auditor attestations, cryptographic proofs) that satisfy investor needs without blatantly exposing the company’s financial backend to the world.
Conclusion
Publishing Bitcoin wallet addresses as proof of reserves is a bold transparency measure – one that speaks to crypto’s ideals of open verification – but it comes with a laundry list of security considerations. Public companies weighing this approach must contend with the heightened cybersecurity threat of advertising their treasure troves to hackers, the loss of privacy and confidentiality as on-chain sleuths dissect their every transaction, and potential regulatory complications if such disclosures are misunderstood or incomplete. Real-world incidents illustrate the downsides: firms that revealed addresses have seen how quickly online communities flag (and sometimes misinterpret) their blockchain moves, causing reputational turbulence and forcing rapid damage control  .
On the other hand, proving reserves to investors is important – it can prevent fraud and bolster trust. The question is how to achieve it without incurring unacceptable risk. Many experts and industry leaders lean towards the view that simply publishing wallet addresses is too risky a method, especially for public companies with much to lose  . The risks often do outweigh the direct benefits in such cases. Transparency remains crucial, but it can be provided in safer ways – through regular audits, cryptographic proofs that don’t expose all wallet details, and comprehensive disclosures that include liabilities and controls.
In conclusion, while on-chain proof of reserves via public addresses offers a tantalizing level of openness, it must be approached with extreme caution. For most public companies, the smart strategy is to balance transparency with security: verify and show investors that assets exist and are sufficient, but do so in a controlled manner that doesn’t compromise the very assets you’re trying to protect. As the industry matures, we can expect more refined proof-of-reserve practices that satisfy the demand for honesty and solvency verification without unduly endangering the enterprise. Until then, companies will continue to tread carefully, mindful that transparency is only truly valuable when it doesn’t come at the price of security and trust.
Sources:
• Grayscale statement on refusal to share on-chain proof-of-reserves  • Community analysis identifying Grayscale’s wallet addresses  • Cointelegraph – Crypto.com’s mistaken 320k ETH transfer spotted via on-chain proof-of-reserves   • Axios – Binance wallet “commingling” error observed on-chain   • Michael Saylor’s remarks on security risks of publishing wallet addresses    • SEC Acting Chief Accountant on limitations of proof-of-reserves reports  • Nasdaq (Bitcoin for Corporations) – argument for corporate transparency & proof-of-reserves    • 1inch Security Blog – explanation of dusting attacks and privacy loss via address linking 
-
@ 90c656ff:9383fd4e
2025-05-27 11:27:26Since its creation, Bitcoin has been a revolutionary asset, challenging the traditional financial system and proposing a new form of decentralized money. However, its future remains uncertain and the subject of intense debate. Among the possible outcomes, two extreme scenarios stand out: hyperbitcoinization-where Bitcoin becomes the dominant currency in the global economy—and obsolescence, where the network loses relevance and is replaced by other solutions.
- Hyperbitcoinization: The World Adopts Bitcoin as a Monetary Standard
01 - Loss of trust in fiat currencies: Due to excessive money printing by central banks, many economies face rampant inflation. Bitcoin, with its fixed supply of 21 million units, emerges as a more trustworthy alternative.
02 - Growing adoption by companies and governments: Some countries have already begun integrating Bitcoin into their economies, accepting it for payments and as a store of value. If this trend continues, Bitcoin’s legitimacy as a global currency will grow.
03 - Ease of global transactions: Bitcoin enables fast and low-cost international transfers, removing the need for financial intermediaries and reducing operational costs.
04 - Technological advancements: Scalability improvements, such as the Lightning Network, can make Bitcoin more efficient for daily use, encouraging mass adoption.
If hyperbitcoinization becomes reality, the world may witness a radical shift in the financial system—with greater decentralization, censorship resistance, and an economy based on sound, predictable money.
- Obsolescence: Bitcoin Loses Relevance and Is Replaced
01 - Restrictive government regulations: If major economic powers enforce strict regulations on Bitcoin, adoption could slow, reducing its utility.
02 - Technological shortcomings or lack of innovation: Despite its security and decentralization, Bitcoin may struggle to scale effectively. If superior solutions emerge and gain acceptance, Bitcoin could lose its leading position.
03 - Competition from faster, more user-friendly alternatives: Other forms of digital money may surpass Bitcoin in scalability and usability, potentially leading to a decline in Bitcoin adoption.
04 - Decreasing miner incentives: As new Bitcoin issuance halves every four years, miners will rely increasingly on transaction fees. If those fees are insufficient to sustain network security, long-term viability could be at risk.
In summary, Bitcoin’s future could unfold along multiple paths, depending on factors like innovation, global adoption, and resilience to external challenges. Hyperbitcoinization would represent an economic revolution—ushering in a decentralized, inflation-resistant monetary system. Yet, obsolescence remains a risk if the network fails to adapt to future demands. Regardless of the outcome, Bitcoin has already made its mark on financial history, paving the way for a new era of digital money and economic freedom.
Thank you very much for reading this far. I hope everything is well with you, and sending a big hug from your favorite Bitcoiner maximalist from Madeira. Long live freedom!
-
@ e844b39d:adafb6a2
2025-05-27 12:30:49I've been going so deep into black & white for a longer period now that I've totally forgotten about colours!
Actually that is how I felt when I started editing these, it was kinda too much haha
Grasshopper on our banana flower
This was to test my old Minolta 70-210/4 Beercan, even though the AF is slow it still locked in time to get this grasshopper!
I'm contemplating bringing this gear on the long trip instead of the old Nikon stuff, so gotta know it will do almost all sorts of jobs...
Random flower
I know that the pastel colours that I found using auto levels is in there, in the combination of the Sony A900 and the Beercan, which is one of the main reasons that I got it all around a decade ago.
Twig
Maybe too much? But still, these colours are in there, just gotta whack the files hard in post hehe
Sharpness is no problem
All of these are at f4, its sharp enough to tackle anything really.
Spider web
Of course this could be better technically, but it will do for almost anything I'll get across. Also this was manual focus, I didn't think the matte screen and viewfinder would make it possible to focus like this, never really tried before!
Amulet and my Nikon gear
I found a tiny amulet on the floor, of course its the cats that are responsible for that...
Zelda is happy
The A900 has built in stabilization, so any old lenses will get that by default! Which makes it far easier to get things like this right a around 1/4th of a second, even with that mirror clacking...
This one is with the Minolta 20/2.8, which is a lens I should really explore more. I got that and a 24/2.8 for a very low price, never had the time to use them much, and now I realize that they both can focus all the way down to 25 centimeters!
Now that is something I can use creatively, and on the road with ease...
I think this might end with me selling (dumping, really) my Nikon gear instead of this!
We'll find out soon 😁
-
@ 9ca447d2:fbf5a36d
2025-05-27 12:01:21DDC Enterprise, a consumer brand and e-commerce company with operations in the U.S. and China, has launched a big plan to make bitcoin (BTC) a key part of its financial strategy.
The company just bought 21 BTC as the first step in a plan to buy up to 5,000 BTC over the next 3 years.
The move was announced in a press release and a letter to shareholders by DDC’s founder, chairwoman and CEO Norma Chu.
The 21 BTC, worth around $2.28 million at current prices, was bought through a share exchange. DDC issued 254,333 class A ordinary shares.
“We are fully committed to ensuring the success of this strategy, which aligns with our vision to drive long-term value for our shareholders,” said Norma Chu. “Today marks a pivotal moment in DDC’s evolution.”
Chu is the first female founder and CEO of a U.S.-listed public company to lead a bitcoin-only treasury strategy. DDC is one of the first companies in its industry to adopt this strategy in such a structured way.
DDC’s plan is being rolled out in phases. The company will buy another 79 BTC soon and will have 100 BTC in the short term.
In the next 6 months, it will buy 500 BTC, and long-term, it expects to build a 5,000 BTC reserve over 36 months.
This phased approach may allow DDC to manage market volatility and take advantage of price movements.
In her recent letter to shareholders, Chu called the bitcoin strategy “a cornerstone of our long-term value creation plan”.
She said bitcoin’s qualities – especially as a hedge against macroeconomic uncertainty and inflation – make it the perfect reserve asset for DDC. She added:
“Bitcoin’s unique properties as a store of value and hedge against macroeconomic uncertainty align perfectly with our vision to diversify reserves and enhance shareholder returns.”
The announcement comes on the back of a record-breaking year for DDC.
In 2024, the company made $37.4 million in revenue—a 33% increase from 2023.
Gross margin improved from 25.0% in 2023 to 28.4% in 2024 due to strategic acquisitions in the U.S. and more efficient operations in China.
As of March 31, 2025 the company had $11.3 million in shareholder equity and $23.6 million in cash, cash equivalents and short-term investments.
This gives DDC the flexibility and credibility to do something as bold as this bitcoin accumulation plan.
DDC’s announcement comes as corporations are getting increasingly interested in adding bitcoin to their balance sheet.
While giants like Strategy have made headlines with large bitcoin purchases, DDC is the first e-commerce company to do so.
The company’s dual presence in China and the U.S. also adds complexity, especially with the different regulatory environments surrounding Bitcoin in each region.
To ensure proper execution, DDC has expanded its treasury and advisory teams to include experts in the bitcoin markets.
The company will use a mix of dollar cost averaging and tactical buying, adjusting purchases based on market conditions.
-
@ 90c656ff:9383fd4e
2025-05-27 11:22:10Since its creation, Bitcoin has been much more than just an alternative to traditional money. With the ongoing digitalization of the global economy, Bitcoin has emerged as a foundational pillar for new forms of transactions, commerce, and value storage. Its decentralization, transparency, and censorship resistance make it a solid base for digital economies, where financial interactions occur without the need for traditional intermediaries.
- Bitcoin’s role in the digital economy
01 - Global, borderless transactions: Anyone with internet access can send and receive Bitcoin without needing a bank or government authorization.
02 - Limited and predictable supply: Unlike fiat currencies that can be inflated by central banks, Bitcoin has a fixed cap of 21 million units, making it a scarce and reliable asset.
03 - Security and transparency: The Bitcoin blockchain or timechain publicly records all transactions, ensuring a secure and auditable system.
04 - Censorship resistance: No government or institution can block Bitcoin transactions, enabling a freer and more accessible digital economy.
With these characteristics, Bitcoin is already transforming various economic sectors and driving new forms of commerce and investment.
- Bitcoin in digital commerce and the global economy
01 - E-commerce: Businesses and consumers can use Bitcoin for fast international transactions without exorbitant fees.
02 - International remittances: Workers sending money to their home countries can avoid high fees and long delays by using Bitcoin.
03 - Emerging economies: In countries with unstable currencies and unreliable banking systems, Bitcoin serves as a secure and decentralized alternative for storing wealth and conducting daily transactions.
Additionally, Bitcoin is being adopted by companies and even governments as a store of value, reinforcing its role as a foundation for the digital economy of the future.
- Challenges and adapting to the new economy
01 - Price volatility: Bitcoin’s fluctuating value can make it difficult to use as a daily medium of exchange.
02 - Regulations and governmental resistance: Some countries attempt to restrict or regulate Bitcoin to maintain control over the traditional financial system.
03 - Education and adoption: Many people still lack the knowledge to use Bitcoin safely and effectively.
In summary, Bitcoin is transforming the way the world interacts with money, offering a decentralized and transparent alternative for digital economies. As more individuals and businesses adopt Bitcoin for payments, savings, and global commerce, its impact becomes increasingly clear. Despite the challenges, Bitcoin continues to solidify its place as the foundation of a new economic paradigm—where financial freedom and technological innovation go hand in hand.
Thank you very much for reading this far. I hope everything is well with you, and sending a big hug from your favorite Bitcoiner maximalist from Madeira. Long live freedom!
-
@ 866e0139:6a9334e5
2025-05-27 10:15:17Autor: Milosz Matuschek. Dieser Beitrag wurde mit dem Pareto-Client geschrieben. Sie finden alle Texte der Friedenstaube und weitere Texte zum Thema Frieden hier. Die neuesten Pareto-Artikel finden Sie auch in unserem Telegram-Kanal.
Die neuesten Artikel der Friedenstaube gibt es jetzt auch im eigenen Friedenstaube-Telegram-Kanal.
Der Schweizer Historiker Daniele Ganser startet eine Plakataktion. Auf Facebook schreibt er:
"Dieses Plakat habe ich ab heute an sechs Bahnhöfen in der Schweiz aufhängen lassen: Die Schweiz muss die Neutralität bewahren. Keine Zusammenarbeit mit der NATO!
Die Aktion läuft eine Woche. Das Plakat hängt in Basel (Gleis 5 und 7), Zürich (Gleis 9 und 12), Bern (Gleis 3 und 11), Luzern (Gleis 7 und 11), St. Gallen (Gleis 1 und 2) und Chur (Gleis 4 und Arosabahn).
Wenn jemand ein Plakat sieht und fotografiert und es mir per Email schickt freut mich das!
https://globalbridge.ch/die-schweiz-muss-die.../
Daniele Ganser kann man über folgende Seite kontaktieren.
LASSEN SIE DER FRIEDENSTAUBE FLÜGEL WACHSEN!
Hier können Sie die Friedenstaube abonnieren und bekommen die Artikel zugesandt.
Schon jetzt können Sie uns unterstützen:
- Für 50 CHF/EURO bekommen Sie ein Jahresabo der Friedenstaube.
- Für 120 CHF/EURO bekommen Sie ein Jahresabo und ein T-Shirt/Hoodie mit der Friedenstaube.
- Für 500 CHF/EURO werden Sie Förderer und bekommen ein lebenslanges Abo sowie ein T-Shirt/Hoodie mit der Friedenstaube.
- Ab 1000 CHF werden Sie Genossenschafter der Friedenstaube mit Stimmrecht (und bekommen lebenslanges Abo, T-Shirt/Hoodie).
Für Einzahlungen in CHF (Betreff: Friedenstaube):
Für Einzahlungen in Euro:
Milosz Matuschek
IBAN DE 53710520500000814137
BYLADEM1TST
Sparkasse Traunstein-Trostberg
Betreff: Friedenstaube
Wenn Sie auf anderem Wege beitragen wollen, schreiben Sie die Friedenstaube an: friedenstaube@pareto.space
Sie sind noch nicht auf Nostr and wollen die volle Erfahrung machen (liken, kommentieren etc.)? Zappen können Sie den Autor auch ohne Nostr-Profil! Erstellen Sie sich einen Account auf Start. Weitere Onboarding-Leitfäden gibt es im Pareto-Wiki.
-
@ 39cc53c9:27168656
2025-05-27 09:21:53The new website is finally live! I put in a lot of hard work over the past months on it. I'm proud to say that it's out now and it looks pretty cool, at least to me!
Why rewrite it all?
The old kycnot.me site was built using Python with Flask about two years ago. Since then, I've gained a lot more experience with Golang and coding in general. Trying to update that old codebase, which had a lot of design flaws, would have been a bad idea. It would have been like building on an unstable foundation.
That's why I made the decision to rewrite the entire application. Initially, I chose to use SvelteKit with JavaScript. I did manage to create a stable site that looked similar to the new one, but it required Jav aScript to work. As I kept coding, I started feeling like I was repeating "the Python mistake". I was writing the app in a language I wasn't very familiar with (just like when I was learning Python at that mom ent), and I wasn't happy with the code. It felt like spaghetti code all the time.
So, I made a complete U-turn and started over, this time using Golang. While I'm not as proficient in Golang as I am in Python now, I find it to be a very enjoyable language to code with. Most aof my recent pr ojects have been written in Golang, and I'm getting the hang of it. I tried to make the best decisions I could and structure the code as well as possible. Of course, there's still room for improvement, which I'll address in future updates.
Now I have a more maintainable website that can scale much better. It uses a real database instead of a JSON file like the old site, and I can add many more features. Since I chose to go with Golang, I mad e the "tradeoff" of not using JavaScript at all, so all the rendering load falls on the server. But I believe it's a tradeoff that's worth it.
What's new
- UI/UX - I've designed a new logo and color palette for kycnot.me. I think it looks pretty cool and cypherpunk. I am not a graphic designer, but I think I did a decent work and I put a lot of thinking on it to make it pleasant!
- Point system - The new point system provides more detailed information about the listings, and can be expanded to cover additional features across all services. Anyone can request a new point!
- ToS Scrapper: I've implemented a powerful automated terms-of-service scrapper that collects all the ToS pages from the listings. It saves you from the hassle of reading the ToS by listing the lines that are suspiciously related to KYC/AML practices. This is still in development and it will improve for sure, but it works pretty fine right now!
- Search bar - The new search bar allows you to easily filter services. It performs a full-text search on the Title, Description, Category, and Tags of all the services. Looking for VPN services? Just search for "vpn"!
- Transparency - To be more transparent, all discussions about services now take place publicly on GitLab. I won't be answering any e-mails (an auto-reply will prompt to write to the corresponding Gitlab issue). This ensures that all service-related matters are publicly accessible and recorded. Additionally, there's a real-time audits page that displays database changes.
- Listing Requests - I have upgraded the request system. The new form allows you to directly request services or points without any extra steps. In the future, I plan to enable requests for specific changes to parts of the website.
- Lightweight and fast - The new site is lighter and faster than its predecessor!
- Tor and I2P - At last! kycnot.me is now officially on Tor and I2P!
How?
This rewrite has been a labor of love, in the end, I've been working on this for more than 3 months now. I don't have a team, so I work by myself on my free time, but I find great joy in helping people on their private journey with cryptocurrencies. Making it easier for individuals to use cryptocurrencies without KYC is a goal I am proud of!
If you appreciate my work, you can support me through the methods listed here. Alternatively, feel free to send me an email with a kind message!
Technical details
All the code is written in Golang, the website makes use of the chi router for the routing part. I also make use of BigCache for caching database requests. There is 0 JavaScript, so all the rendering load falls on the server, this means it needed to be efficient enough to not drawn with a few users since the old site was reporting about 2M requests per month on average (note that this are not unique users).
The database is running with mariadb, using gorm as the ORM. This is more than enough for this project. I started working with an
sqlite
database, but I ended up migrating to mariadb since it works better with JSON.The scraper is using chromedp combined with a series of keywords, regex and other logic. It runs every 24h and scraps all the services. You can find the scraper code here.
The frontend is written using Golang Templates for the HTML, and TailwindCSS plus DaisyUI for the CSS classes framework. I also use some plain CSS, but it's minimal.
The requests forms is the only part of the project that requires JavaScript to be enabled. It is needed for parsing some from fields that are a bit complex and for the "captcha", which is a simple Proof of Work that runs on your browser, destinated to avoid spam. For this, I use mCaptcha.
-
@ cae03c48:2a7d6671
2025-05-27 11:01:23Bitcoin Magazine
Semler Scientific Buys Additional $50 Million Worth of BitcoinMedical equipment provider Semler Scientific has acquired 455 Bitcoin for $50 million, marking it one of the largest purchases as more publicly traded companies continue to adopt Bitcoin treasury strategies.
According to a Form 8-K filed with the SEC on May 23, the company purchased the Bitcoin between May 13 and May 22 at an average price of $109,801 per coin, including fees. The acquisition brings Semler’s total Bitcoin holdings to 4,264 BTC, acquired at an aggregate cost of $390 million.
The purchase was funded through Semler’s at-the-market (ATM) equity offering program, which has raised approximately $114.8 million since its launch in April 2025. The company has issued 3,003,488 shares under the $500 million program to date.
“$SMLR acquires 455 Bitcoins for $50 million and has generated BTC Yield of 25.8% YTD. Now holding 4,264 $BTC. Flywheel in motion. ,” said Eric Semler, Chairman of Semler Scientific. The company’s Bitcoin holdings are now valued at approximately $474.4 million based on current market prices.
Semler reported its Bitcoin Yield – a key performance indicator measuring the year-to-date percentage change in total Bitcoin holdings relative to diluted shares outstanding – has reached 25.8% in 2025. The metric has become a standard measure among public companies holding Bitcoin on their balance sheets.
The company maintains a Bitcoin Dashboard on its website to provide transparent information about its holdings, including market data, performance metrics, and acquisition details, as part of its Regulation FD compliance strategy.
Semler’s move comes amid accelerating corporate Bitcoin adoption in 2025, with over 40 public companies announcing Bitcoin treasury programs this year alone. The market has shown increased sensitivity to corporate treasury activities as institutional adoption continues to grow.
The company’s latest Bitcoin purchase reinforces the growing trend of public companies using equity offerings to fund Bitcoin acquisitions, a strategy pioneered by larger players like Strategy, which recently added 7,390 BTC to its holdings through a similar funding mechanism.
This post Semler Scientific Buys Additional $50 Million Worth of Bitcoin first appeared on Bitcoin Magazine and is written by Vivek Sen.
-
@ 39cc53c9:27168656
2025-05-27 09:21:51Know Your Customer is a regulation that requires companies of all sizes to verify the identity, suitability, and risks involved with maintaining a business relationship with a customer. Such procedures fit within the broader scope of anti-money laundering (AML) and counterterrorism financing (CTF) regulations.
Banks, exchanges, online business, mail providers, domain registrars... Everyone wants to know who you are before you can even opt for their service. Your personal information is flowing around the internet in the hands of "god-knows-who" and secured by "trust-me-bro military-grade encryption". Once your account is linked to your personal (and verified) identity, tracking you is just as easy as keeping logs on all these platforms.
Rights for Illusions
KYC processes aim to combat terrorist financing, money laundering, and other illicit activities. On the surface, KYC seems like a commendable initiative. I mean, who wouldn't want to halt terrorists and criminals in their tracks?
The logic behind KYC is: "If we mandate every financial service provider to identify their users, it becomes easier to pinpoint and apprehend the malicious actors."
However, terrorists and criminals are not precisely lining up to be identified. They're crafty. They may adopt false identities or find alternative strategies to continue their operations. Far from being outwitted, many times they're several steps ahead of regulations. Realistically, KYC might deter a small fraction – let's say about 1% ^1 – of these malefactors. Yet, the cost? All of us are saddled with the inconvenient process of identification just to use a service.
Under the rhetoric of "ensuring our safety", governments and institutions enact regulations that seem more out of a dystopian novel, gradually taking away our right to privacy.
To illustrate, consider a city where the mayor has rolled out facial recognition cameras in every nook and cranny. A band of criminals, intent on robbing a local store, rolls in with a stolen car, their faces obscured by masks and their bodies cloaked in all-black clothes. Once they've committed the crime and exited the city's boundaries, they switch vehicles and clothes out of the cameras' watchful eyes. The high-tech surveillance? It didn’t manage to identify or trace them. Yet, for every law-abiding citizen who merely wants to drive through the city or do some shopping, their movements and identities are constantly logged. The irony? This invasive tracking impacts all of us, just to catch the 1% ^1 of less-than-careful criminals.
KYC? Not you.
KYC creates barriers to participation in normal economic activity, to supposedly stop criminals. ^2
KYC puts barriers between many users and businesses. One of these comes from the fact that the process often requires multiple forms of identification, proof of address, and sometimes even financial records. For individuals in areas with poor record-keeping, non-recognized legal documents, or those who are unbanked, homeless or transient, obtaining these documents can be challenging, if not impossible.
For people who are not skilled with technology or just don't have access to it, there's also a barrier since KYC procedures are mostly online, leaving them inadvertently excluded.
Another barrier goes for the casual or one-time user, where they might not see the value in undergoing a rigorous KYC process, and these requirements can deter them from using the service altogether.
It also wipes some businesses out of the equation, since for smaller businesses, the costs associated with complying with KYC norms—from the actual process of gathering and submitting documents to potential delays in operations—can be prohibitive in economical and/or technical terms.
You're not welcome
Imagine a swanky new club in town with a strict "members only" sign. You hear the music, you see the lights, and you want in. You step up, ready to join, but suddenly there's a long list of criteria you must meet. After some time, you are finally checking all the boxes. But then the club rejects your membership with no clear reason why. You just weren't accepted. Frustrating, right?
This club scenario isn't too different from the fact that KYC is being used by many businesses as a convenient gatekeeping tool. A perfect excuse based on a "legal" procedure they are obliged to.
Even some exchanges may randomly use this to freeze and block funds from users, claiming these were "flagged" by a cryptic system that inspects the transactions. You are left hostage to their arbitrary decision to let you successfully pass the KYC procedure. If you choose to sidestep their invasive process, they might just hold onto your funds indefinitely.
Your identity has been stolen
KYC data has been found to be for sale on many dark net markets^3. Exchanges may have leaks or hacks, and such leaks contain very sensitive data. We're talking about the full monty: passport or ID scans, proof of address, and even those awkward selfies where you're holding up your ID next to your face. All this data is being left to the mercy of the (mostly) "trust-me-bro" security systems of such companies. Quite scary, isn't it?
As cheap as $10 for 100 documents, with discounts applying for those who buy in bulk, the personal identities of innocent users who passed KYC procedures are for sale. ^3
In short, if you have ever passed the KYC/AML process of a crypto exchange, your privacy is at risk of being compromised, or it might even have already been compromised.
(they) Know Your Coins
You may already know that Bitcoin and most cryptocurrencies have a transparent public blockchain, meaning that all data is shown unencrypted for everyone to see and recorded forever. If you link an address you own to your identity through KYC, for example, by sending an amount from a KYC exchange to it, your Bitcoin is no longer pseudonymous and can then be traced.
If, for instance, you send Bitcoin from such an identified address to another KYC'ed address (say, from a friend), everyone having access to that address-identity link information (exchanges, governments, hackers, etc.) will be able to associate that transaction and know who you are transacting with.
Conclusions
To sum up, KYC does not protect individuals; rather, it's a threat to our privacy, freedom, security and integrity. Sensible information flowing through the internet is thrown into chaos by dubious security measures. It puts borders between many potential customers and businesses, and it helps governments and companies track innocent users. That's the chaos KYC has stirred.
The criminals are using stolen identities from companies that gathered them thanks to these very same regulations that were supposed to combat them. Criminals always know how to circumvent such regulations. In the end, normal people are the most affected by these policies.
The threat that KYC poses to individuals in terms of privacy, security and freedom is not to be neglected. And if we don’t start challenging these systems and questioning their efficacy, we are just one step closer to the dystopian future that is now foreseeable.
Edited 20/03/2024 * Add reference to the 1% statement on Rights for Illusions section to an article where Chainalysis found that only 0.34% of the transaction volume with cryptocurrencies in 2023 was attributable to criminal activity ^1
-
@ 39cc53c9:27168656
2025-05-27 09:21:50Over the past few months, I've dedicated my time to a complete rewrite of the kycnot.me website. The technology stack remains unchanged; Golang paired with TailwindCSS. However, I've made some design choices in this iteration that I believe significantly enhance the site. Particularly to backend code.
UI Improvements
You'll notice a refreshed UI that retains the original concept but has some notable enhancements. The service list view is now more visually engaging, it displays additional information in a more aesthetically pleasing manner. Both filtering and searching functionalities have been optimized for speed and user experience.
Service pages have been also redesigned to highlight key information at the top, with the KYC Level box always accessible. The display of service attributes is now more visually intuitive.
The request form, especially the Captcha, has undergone substantial improvements. The new self-made Captcha is robust, addressing the reliability issues encountered with the previous version.
Terms of Service Summarizer
A significant upgrade is the Terms of Service summarizer/reviewer, now powered by AI (GPT-4-turbo). It efficiently condenses each service's ToS, extracting and presenting critical points, including any warnings. Summaries are updated monthly, processing over 40 ToS pages via the OpenAI API using a self-crafted and thoroughly tested prompt.
Nostr Comments
I've integrated a comment section for each service using Nostr. For guidance on using this feature, visit the dedicated how-to page.
Database
The backend database has transitioned to pocketbase, an open-source Golang backend that has been a pleasure to work with. I maintain an updated fork of the Golang SDK for pocketbase at pluja/pocketbase.
Scoring
The scoring algorithm has also been refined to be more fair. Despite I had considered its removal due to the complexity it adds (it is very difficult to design a fair scoring system), some users highlighted its value, so I kept it. The updated algorithm is available open source.
Listings
Each listing has been re-evaluated, and the ones that were no longer operational were removed. New additions are included, and the backlog of pending services will be addressed progressively, since I still have access to the old database.
API
The API now offers more comprehensive data. For more details, check here.
About Page
The About page has been restructured for brevity and clarity.
Other Changes
Extensive changes have been implemented in the server-side logic, since the whole code base was re-written from the ground up. I may discuss these in a future post, but for now, I consider the current version to be just a bit beyond beta, and additional updates are planned in the coming weeks.
-
@ cae03c48:2a7d6671
2025-05-27 11:01:12Bitcoin Magazine
The Bitcoin Mempool: Relay Network DynamicsIn the last Mempool article, I went over the different kinds of relay policy filters, why they exist, and the incentives that ultimately decide how effective each class of filter is at preventing the confirmation of different classes of transactions. In this piece I’ll be looking at the dynamics of the relay network when some nodes on the network are running different relay policies compared to other nodes.
All else being equal, when nodes on the network are running homogenous relay policies in their mempools, all transactions should propagate across the entire network given that they pay the minimum feerate necessary not to be evicted from a node’s mempool during times of large transaction backlogs. This changes when different nodes on the network are running heterogenous policies.
The Bitcoin relay network operates on a best effort basis, using what is called a flood-fill architecture. This means that when a transaction is received by one node, it is forwarded to every other node it is connected to except the one that it received the transaction from. This is a highly inefficient network architecture, but in the context of a decentralized system it provides a high degree of guarantee that the transaction will eventually reach its intended destination, the miners.
Introducing filters in a node’s relay policy to restrict the relaying of otherwise valid transactions in theory introduces friction to the propagation of that transaction, and degrades the reliability of the network’s ability to perform this function. In practice, things aren’t that simple.
How Much Friction Prevents Propagation
Let’s look at a simplified example of different network node compositions. In the following graphics blue nodes represent ones that will propagate some arbitrary class of consensus valid transactions, and red nodes represent ones that will not propagate those transactions. The collective set of miners is denoted in the center as a simple representation of where transacting users ultimately want their transactions to wind up so as to eventually be confirmed in the blockchain.
This is a model of the network in which the nodes refusing to propagate these transactions are a clear minority. As you can clearly see, any node on the network that accepts them has a clear path to relay them to the miners. The two nodes attempting to restrict the transactions propagation across the network have no effect on their eventual receipt by miners’ nodes.
In this diagram, you can see that almost half of the example network is instituting filtering policies for this class of transactions. Despite this, only part of the network that propagates these transactions is cut off from a path to miners. The rest of the nodes not filtering still have a clear path to miners. This has introduced some degree of friction for a subset of users, but the others can still freely engage in propagating these transactions.
Even for the users that are affected by filtering nodes, only a single connection to the rest of the network nodes that are not cut off from miners (or a direct connection to a miner) is necessary in order for that friction to be removed. If the real relay network were to have a similar composition to this example, all it would take is a single new connection to alleviate the problem.
In this scenario, only a tiny minority of the network is actually propagating these transactions. The rest of the network is engaging in filtering policies to prevent their propagation. Even in this case however, those nodes that are not filtering still have a clear path to propagate them to miners.
Only this tiny minority of non-filtering nodes is necessary in order to ensure their eventual propagation to miners. Preferential peering logic, i.e. functionality to ensure that your node prefers peers who implement the same software version or relay policies. These types of solutions can guarantee that peers who will propagate something to others won’t find each other and maintain connections amongst themselves across the network.
The Tolerant Minority
As you can see looking at these different examples, even in the face of an overwhelming majority of the public network engaging in filtering of a specific class of transactions, all that is necessary for them to successfully propagate across the network to miners is a small minority of the network to propagate and relay them.
These nodes will essentially, through whatever technical mechanism, create a “sub-network” within the larger public relay network in order to guarantee that there are viable paths from users engaging in these types of transactions to the miners willing to include them in their blocks.
There is essentially nothing that can be done to counter this dynamic except to engage in a sybil attack against all of these nodes, and sybil attacks only need a single honest connection in order to be completely defeated. As well, an honest node creating a very large number of connections with other nodes on the network can raise the cost of such a sybil attack exorbitantly. The more connections it creates, the more sybil nodes must be spun up in order to consume all of its connection slots.
What If There Is No Minority?
So what if there is no Tolerant Minority? What will happen to this class of transactions in that case?
If users still want to make them and pay fees to miners for them, they will be confirmed. Miners will simply set up an API. The role of miners is to confirm transactions, and the reason they do so is to maximize profit. Miners are not selfless entities, or morally or ideologically motivated, they are a business. They exist to make money.
If users exist that are willing to pay them money for a certain type of transaction, and the entirety of the public relay network is refusing to propagate those transactions to miners in order to include them in blocks, miners will create another way for users to submit those transactions to them.
It is simply the rational move to make as a profit motivated actor when customers exist that wish to pay you money.
Relay Policy Is Not A Replacement For Consensus
At the end of the day, relay policy cannot successfully censor transactions if they are consensus valid, users are willing to pay for them, and miners do not have some extenuating circumstances to turn down the fees users are willing to pay (such as causing material damage or harm to nodes on the network, i.e. crashing nodes, propagating blocks that take hours to verify on a consumer PC, etc.).
If some class of transactions is truly seen as undesirable by Bitcoin users and node operators, there is no solution to stopping them from being confirmed in the blockchain short of enacting a consensus change to make them invalid.
If it were possible to simply prevent transactions from being confirmed by filtering policies implemented on the relay network, then Bitcoin would not be censorship resistant.
This post The Bitcoin Mempool: Relay Network Dynamics first appeared on Bitcoin Magazine and is written by Shinobi.
-
@ 39cc53c9:27168656
2025-05-27 09:21:48I'm launching a new service review section on this blog in collaboration with OrangeFren. These reviews are sponsored, yet the sponsorship does not influence the outcome of the evaluations. Reviews are done in advance, then, the service provider has the discretion to approve publication without modifications.
Sponsored reviews are independent from the kycnot.me list, being only part of the blog. The reviews have no impact on the scores of the listings or their continued presence on the list. Should any issues arise, I will not hesitate to remove any listing.
The review
WizardSwap is an instant exchange centred around privacy coins. It was launched in 2020 making it old enough to have weathered the 2021 bull run and the subsequent bearish year.
| Pros | Cons | |------|------| | Tor-friendly | Limited liquidity | | Guarantee of no KYC | Overly simplistic design | | Earn by providing liquidity | |
Rating: ★★★★★ Service Website: wizardswap.io
Liquidity
Right off the bat, we'll start off by pointing out that WizardSwap relies on its own liquidity reserves, meaning they aren't just a reseller of Binance or another exchange. They're also committed to a no-KYC policy, when asking them, they even promised they would rather refund a user their original coins, than force them to undergo any sort of verification.
On the one hand, full control over all their infrastructure gives users the most privacy and conviction about the KYC policies remaining in place.
On the other hand, this means the liquidity available for swapping isn't huge. At the time of testing we could only purchase at most about 0.73 BTC with XMR.
It's clear the team behind WizardSwap is aware of this shortfall and so they've come up with a solution unique among instant exchanges. They let you, the user, deposit any of the currencies they support into your account and earn a profit on the trades made using your liquidity.
Trading
Fees on WizardSwap are middle-of-the-pack. The normal fee is 2.2%. That's more than some exchanges that reserve the right to suddenly demand you undergo verification, yet less than half the fees on some other privacy-first exchanges. However as we mentioned in the section above you can earn almost all of that fee (2%) if you provide liquidity to WizardSwap.
It's good that with the current Bitcoin fee market their fees are constant regardless of how much, or how little, you send. This is in stark contrast with some of the alternative swap providers that will charge you a massive premium when attempting to swap small amounts of BTC away.
Test trades
Test trades are always performed without previous notice to the service provider.
During our testing we performed a few test trades and found that every single time WizardSwap immediately detected the incoming transaction and the amount we received was exactly what was quoted before depositing. The fees were inline with what WizardSwap advertises.
- Monero payment proof
- Bitcoin received
- Wizardswap TX link - it's possible that this link may cease to be valid at some point in the future.
ToS and KYC
WizardSwap does not have a Terms of Service or a Privacy Policy page, at least none that can be found by users. Instead, they offer a FAQ section where they addresses some basic questions.
The site does not mention any KYC or AML practices. It also does not specify how refunds are handled in case of failure. However, based on the FAQ section "What if I send funds after the offer expires?" it can be inferred that contacting support is necessary and network fees will be deducted from any refund.
UI & Tor
WizardSwap can be visited both via your usual browser and Tor Browser. Should you decide on the latter you'll find that the website works even with the most strict settings available in the Tor Browser (meaning no JavaScript).
However, when disabling Javascript you'll miss the live support chat, as well as automatic refreshing of the trade page. The lack of the first means that you will have no way to contact support from the trade page if anything goes wrong during your swap, although you can do so by mail.
One important thing to have in mind is that if you were to accidentally close the browser during the swap, and you did not save the swap ID or your browser history is disabled, you'll have no easy way to return to the trade. For this reason we suggest when you begin a trade to copy the url or ID to someplace safe, before sending any coins to WizardSwap.
The UI you'll be greeted by is simple, minimalist, and easy to navigate. It works well not just across browsers, but also across devices. You won't have any issues using this exchange on your phone.
Getting in touch
The team behind WizardSwap appears to be most active on X (formerly Twitter): https://twitter.com/WizardSwap_io
If you have any comments or suggestions about the exchange make sure to reach out to them. In the past they've been very receptive to user feedback, for instance a few months back WizardSwap was planning on removing DeepOnion, but the community behind that project got together ^1 and after reaching out WizardSwap reversed their decision ^2.
You can also contact them via email at:
support @ wizardswap . io
Disclaimer
None of the above should be understood as investment or financial advice. The views are our own only and constitute a faithful representation of our experience in using and investigating this exchange. This review is not a guarantee of any kind on the services rendered by the exchange. Do your own research before using any service.
-
@ 162b4b08:9f7d278c
2025-05-27 10:12:53Trong thời đại mà công nghệ số trở thành trụ cột không thể thiếu trong mọi lĩnh vực, từ công việc đến giải trí, việc sở hữu một nền tảng số toàn diện như PUM88 đóng vai trò vô cùng quan trọng đối với người dùng hiện đại. Không chỉ là nơi cung cấp các công cụ tiện ích, PUM88 còn tạo nên một hệ sinh thái linh hoạt, đáp ứng mọi nhu cầu trong một môi trường trực tuyến đầy năng động. Từ những bước đầu như đăng ký, đăng nhập, cho đến trải nghiệm thực tế, tất cả đều được tối ưu nhằm mang lại sự thuận tiện tối đa. Giao diện thiết kế thông minh, bố cục rõ ràng, thao tác nhanh gọn giúp người dùng dễ dàng tiếp cận và sử dụng mà không cần kiến thức kỹ thuật chuyên sâu. Bên cạnh đó, hệ thống xử lý tốc độ cao và khả năng tương thích đa nền tảng (từ smartphone đến laptop) giúp người dùng duy trì kết nối mọi lúc mọi nơi, không bị giới hạn bởi thiết bị hay không gian sử dụng. Không dừng lại ở đó, PUM88 còn liên tục nâng cấp công nghệ như tích hợp trí tuệ nhân tạo để gợi ý nội dung cá nhân hóa theo hành vi và sở thích, giúp mỗi trải nghiệm trở nên sống động, gần gũi và mang tính cá nhân cao hơn bao giờ hết. Đây chính là điểm cộng lớn giúp PUM88 tạo nên dấu ấn trong lòng người dùng yêu thích sự tiện lợi và linh hoạt trong đời sống số.
Ngoài ra, yếu tố khiến PUM88 trở nên đáng tin cậy chính là khả năng bảo mật vượt trội và chính sách hỗ trợ khách hàng tận tâm. Dữ liệu cá nhân và các hoạt động của người dùng luôn được bảo vệ nghiêm ngặt bằng các chuẩn mã hóa quốc tế, hệ thống tường lửa, xác thực hai lớp và giám sát bảo mật liên tục. Nhờ vậy, người dùng hoàn toàn yên tâm khi sử dụng mà không lo bị lộ thông tin hay rò rỉ dữ liệu. Thêm vào đó, đội ngũ chăm sóc khách hàng hoạt động 24/7 với thái độ chuyên nghiệp và phản hồi nhanh chóng giúp giải quyết mọi thắc mắc hoặc sự cố kỹ thuật một cách hiệu quả. Không những thế, PUM88 còn thường xuyên lắng nghe ý kiến người dùng để cải tiến giao diện, bổ sung tính năng mới, đảm bảo rằng nền tảng luôn bắt kịp xu hướng công nghệ và đáp ứng đúng nhu cầu thực tế. Việc cập nhật liên tục không chỉ giúp người dùng có được trải nghiệm mượt mà hơn mà còn giữ cho nền tảng luôn mới mẻ, sáng tạo và không ngừng phát triển. Trong bối cảnh chuyển đổi số đang diễn ra mạnh mẽ tại Việt Nam, PUM88 không chỉ đơn thuần là một ứng dụng tiện ích mà còn là một trợ thủ đắc lực cho cuộc sống hiện đại – nơi mà người dùng có thể tận dụng công nghệ để nâng cao hiệu suất cá nhân, tối ưu hóa thời gian và tận hưởng trải nghiệm số trọn vẹn nhất mỗi ngày.
-
@ 7f6db517:a4931eda
2025-05-27 10:01:54
"Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world." - Eric Hughes, A Cypherpunk's Manifesto, 1993
Privacy is essential to freedom. Without privacy, individuals are unable to make choices free from surveillance and control. Lack of privacy leads to loss of autonomy. When individuals are constantly monitored it limits our ability to express ourselves and take risks. Any decisions we make can result in negative repercussions from those who surveil us. Without the freedom to make choices, individuals cannot truly be free.
Freedom is essential to acquiring and preserving wealth. When individuals are not free to make choices, restrictions and limitations prevent us from economic opportunities. If we are somehow able to acquire wealth in such an environment, lack of freedom can result in direct asset seizure by governments or other malicious entities. At scale, when freedom is compromised, it leads to widespread economic stagnation and poverty. Protecting freedom is essential to economic prosperity.
The connection between privacy, freedom, and wealth is critical. Without privacy, individuals lose the freedom to make choices free from surveillance and control. While lack of freedom prevents individuals from pursuing economic opportunities and makes wealth preservation nearly impossible. No Privacy? No Freedom. No Freedom? No Wealth.
Rights are not granted. They are taken and defended. Rights are often misunderstood as permission to do something by those holding power. However, if someone can give you something, they can inherently take it from you at will. People throughout history have necessarily fought for basic rights, including privacy and freedom. These rights were not given by those in power, but rather demanded and won through struggle. Even after these rights are won, they must be continually defended to ensure that they are not taken away. Rights are not granted - they are earned through struggle and defended through sacrifice.
If you found this post helpful support my work with bitcoin.
-
@ 39cc53c9:27168656
2025-05-27 09:21:46Bitcoin enthusiasts frequently and correctly remark how much value it adds to Bitcoin not to have a face, a leader, or a central authority behind it. This particularity means there isn't a single person to exert control over, or a single human point of failure who could become corrupt or harmful to the project.
Because of this, it is said that no other coin can be equally valuable as Bitcoin in terms of decentralization and trustworthiness. Bitcoin is unique not just for being first, but also because of how the events behind its inception developed. This implies that, from Bitcoin onwards, any coin created would have been created by someone, consequently having an authority behind it. For this and some other reasons, some people refer to Bitcoin as "The Immaculate Conception".
While other coins may have their own unique features and advantages, they may not be able to replicate Bitcoin's community-driven nature. However, one other cryptocurrency shares a similar story of mystery behind its creation: Monero.
History of Monero
Bytecoin and CryptoNote
In March 2014, a Bitcointalk thread titled "Bytecoin. Secure, private, untraceable since 2012" was initiated by a user under the nickname "DStrange"^1^. DStrange presented Bytecoin (BCN) as a unique cryptocurrency, in operation since July 2012. Unlike Bitcoin, it employed a new algorithm known as CryptoNote.
DStrange apparently stumbled upon the Bytecoin website by chance while mining a dying bitcoin fork, and decided to create a thread on Bitcointalk^1^. This sparked curiosity among some users, who wondered how could Bytecoin remain unnoticed since its alleged launch in 2012 until then^2^.
Some time after, a user brought up the "CryptoNote v2.0" whitepaper for the first time, underlining its innovative features^4^. Authored by the pseudonymous Nicolas van Saberhagen in October 2013, the CryptoNote v2 whitepaper^5^ highlighted the traceability and privacy problems in Bitcoin. Saberhagen argued that these flaws could not be quickly fixed, suggesting it would be more efficient to start a new project rather than trying to patch the original^5^, an statement simmilar to the one from Satoshi Nakamoto^6^.
Checking with Saberhagen's digital signature, the release date of the whitepaper seemed correct, which would mean that Cryptonote (v1) was created in 2012^7^, although there's an important detail: "Signing time is from the clock on the signer's computer" ^9^.
Moreover, the whitepaper v1 contains a footnote link to a Bitcointalk post dated May 5, 2013^10^, making it impossible for the whitepaper to have been signed and released on December 12, 2012.
As the narrative developed, users discovered that a significant 80% portion of Bytecoin had been pre-mined^11^ and blockchain dates seemed to be faked to make it look like it had been operating since 2012, leading to controversy surrounding the project.
The origins of CryptoNote and Bytecoin remain mysterious, leaving suspicions of a possible scam attempt, although the whitepaper had a good amount of work and thought on it.
The fork
In April 2014, the Bitcointalk user
thankful_for_today
, who had also participated in the Bytecoin thread^12^, announced plans to launch a Bytecoin fork named Bitmonero^13^.The primary motivation behind this fork was "Because there is a number of technical and marketing issues I wanted to do differently. And also because I like ideas and technology and I want it to succeed"^14^. This time Bitmonero did things different from Bytecoin: there was no premine or instamine, and no portion of the block reward went to development.
However, thankful_for_today proposed controversial changes that the community disagreed with. Johnny Mnemonic relates the events surrounding Bitmonero and thankful_for_today in a Bitcointalk comment^15^:
When thankful_for_today launched BitMonero [...] he ignored everything that was discussed and just did what he wanted. The block reward was considerably steeper than what everyone was expecting. He also moved forward with 1-minute block times despite everyone's concerns about the increase of orphan blocks. He also didn't address the tail emission concern that should've (in my opinion) been in the code at launch time. Basically, he messed everything up. Then, he disappeared.
After disappearing for a while, thankful_for_today returned to find that the community had taken over the project. Johnny Mnemonic continues:
I, and others, started working on new forks that were closer to what everyone else was hoping for. [...] it was decided that the BitMonero project should just be taken over. There were like 9 or 10 interested parties at the time if my memory is correct. We voted on IRC to drop the "bit" from BitMonero and move forward with the project. Thankful_for_today suddenly resurfaced, and wasn't happy to learn the community had assumed control of the coin. He attempted to maintain his own fork (still calling it "BitMonero") for a while, but that quickly fell into obscurity.
The unfolding of these events show us the roots of Monero. Much like Satoshi Nakamoto, the creators behind CryptoNote/Bytecoin and thankful_for_today remain a mystery^17^, having disappeared without a trace. This enigma only adds to Monero's value.
Since community took over development, believing in the project's potential and its ability to be guided in a better direction, Monero was given one of Bitcoin's most important qualities: a leaderless nature. With no single face or entity directing its path, Monero is safe from potential corruption or harm from a "central authority".
The community continued developing Monero until today. Since then, Monero has undergone a lot of technological improvements, migrations and achievements such as RingCT and RandomX. It also has developed its own Community Crowdfundinc System, conferences such as MoneroKon and Monerotopia are taking place every year, and has a very active community around it.
Monero continues to develop with goals of privacy and security first, ease of use and efficiency second. ^16^
This stands as a testament to the power of a dedicated community operating without a central figure of authority. This decentralized approach aligns with the original ethos of cryptocurrency, making Monero a prime example of community-driven innovation. For this, I thank all the people involved in Monero, that lead it to where it is today.
If you find any information that seems incorrect, unclear or any missing important events, please contact me and I will make the necessary changes.
Sources of interest
- https://forum.getmonero.org/20/general-discussion/211/history-of-monero
- https://monero.stackexchange.com/questions/852/what-is-the-origin-of-monero-and-its-relationship-to-bytecoin
- https://en.wikipedia.org/wiki/Monero
- https://bitcointalk.org/index.php?topic=583449.0
- https://bitcointalk.org/index.php?topic=563821.0
- https://bitcointalk.org/index.php?action=profile;u=233561
- https://bitcointalk.org/index.php?topic=512747.0
- https://bitcointalk.org/index.php?topic=740112.0
- https://monero.stackexchange.com/a/1024
- https://inspec2t-project.eu/cryptocurrency-with-a-focus-on-anonymity-these-facts-are-known-about-monero/
- https://medium.com/coin-story/coin-perspective-13-riccardo-spagni-69ef82907bd1
- https://www.getmonero.org/resources/about/
- https://www.wired.com/2017/01/monero-drug-dealers-cryptocurrency-choice-fire/
- https://www.monero.how/why-monero-vs-bitcoin
- https://old.reddit.com/r/Monero/comments/u8e5yr/satoshi_nakamoto_talked_about_privacy_features/
-
@ cefb08d1:f419beff
2025-05-27 09:36:52Gabriela Bryan vs Caitlin Simmers | Western Australia Margaret River Pro 2025 - Final
https://www.youtube.com/watch?v=2GK8l3RPqmE
Jordy Smith vs Griffin Colapinto | Western Australia Margaret River Pro 2025 - Final
https://www.youtube.com/watch?v=zGWMVDwU_is
Highlights: Western Australia Margaret River Pro 2025 - All the Highlights
https://www.youtube.com/watch?v=32055IXrtnU
Ranking WSL Women:
Ranking WSL Men:
Source: https://www.worldsurfleague.com/athletes/tour/wct?year=2025
https://stacker.news/items/990198
-
@ 39cc53c9:27168656
2025-05-27 09:21:40“The future is there... staring back at us. Trying to make sense of the fiction we will have become.” — William Gibson.
This month is the 4th anniversary of kycnot.me. Thank you for being here.
Fifteen years ago, Satoshi Nakamoto introduced Bitcoin, a peer-to-peer electronic cash system: a decentralized currency free from government and institutional control. Nakamoto's whitepaper showed a vision for a financial system based on trustless transactions, secured by cryptography. Some time forward and KYC (Know Your Customer), AML (Anti-Money Laundering), and CTF (Counter-Terrorism Financing) regulations started to come into play.
What a paradox: to engage with a system designed for decentralization, privacy, and independence, we are forced to give away our personal details. Using Bitcoin in the economy requires revealing your identity, not just to the party you interact with, but also to third parties who must track and report the interaction. You are forced to give sensitive data to entities you don't, can't, and shouldn't trust. Information can never be kept 100% safe; there's always a risk. Information is power, who knows about you has control over you.
Information asymmetry creates imbalances of power. When entities have detailed knowledge about individuals, they can manipulate, influence, or exploit this information to their advantage. The accumulation of personal data by corporations and governments enables extensive surveillances.
Such practices, moreover, exclude individuals from traditional economic systems if their documentation doesn't meet arbitrary standards, reinforcing a dystopian divide. Small businesses are similarly burdened by the costs of implementing these regulations, hindering free market competition^1:
How will they keep this information safe? Why do they need my identity? Why do they force businesses to enforce such regulations? It's always for your safety, to protect you from the "bad". Your life is perpetually in danger: terrorists, money launderers, villains... so the government steps in to save us.
‟Hush now, baby, baby, don't you cry Mamma's gonna make all of your nightmares come true Mamma's gonna put all of her fears into you Mamma's gonna keep you right here, under her wing She won't let you fly, but she might let you sing Mamma's gonna keep baby cosy and warm” — Mother, Pink Floyd
We must resist any attack on our privacy and freedom. To do this, we must collaborate.
If you have a service, refuse to ask for KYC; find a way. Accept cryptocurrencies like Bitcoin and Monero. Commit to circular economies. Remove the need to go through the FIAT system. People need fiat money to use most services, but we can change that.
If you're a user, donate to and prefer using services that accept such currencies. Encourage your friends to accept cryptocurrencies as well. Boycott FIAT system to the greatest extent you possibly can.
This may sound utopian, but it can be achieved. This movement can't be stopped. Go kick the hornet's nest.
“We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.” — Eric Hughes, A Cypherpunk's Manifesto
The anniversary
Four years ago, I began exploring ways to use crypto without KYC. I bookmarked a few favorite services and thought sharing them to the world might be useful. That was the first version of kycnot.me — a simple list of about 15 services. Since then, I've added services, rewritten it three times, and improved it to what it is now.
kycnot.me has remained 100% independent and 100% open source^2 all these years. I've received offers to buy the site, all of which I have declined and will continue to decline. It has been DDoS attacked many times, but we made it through. I have also rewritten the whole site almost once per year (three times in four years).
The code and scoring algorithm are open source (contributions are welcome) and I can't arbitrarly change a service's score without adding or removing attributes, making any arbitrary alterations obvious if they were fake. You can even see the score summary for any service's score.
I'm a one-person team, dedicating my free time to this project. I hope to keep doing so for many more years. Again, thank you for being part of this.
-
@ 39cc53c9:27168656
2025-05-27 09:21:37After almost 3 months of work, we've completed the redesign of kycnot.me. More modern and with many new features.
Privacy remains the foundation - everything still works with JavaScript disabled. If you enable JS, you will get some nice-to-have features like lazy loading and smoother page transitions, but nothing essential requires it.
User Accounts
We've introduced user accounts that require zero personal information:
- Secret user tokens - no email, no phone number, no personal data
- Randomly generated usernames for default privacy and fairness
- Karma system that rewards contributions and unlocks features: custom display names, profile pictures, and more.
Reviews and Community Discussions
On the previous sites, I was using third party open source tools for the comments and discussions. This time, I've built my own from scratch, fully integrated into the site, without JavaScript requirements.
Everyone can share their experiences and help others make informed decisions:
- Ratings: Comments can have a 1-5 star rating attached. You can have one rating per service and it will affect the overall user score.
- Discussions: These are normal comments, you can add them on any listed service.
Comment Moderation
I was strugling to keep up with moderation on the old site. For this, we've implemented an AI-powered moderation system that:
- Auto-approves legitimate comments instantly
- Flags suspicious content for human review
- Keeps discussions valuable by minimizing spam
The AI still can mark comments for human review, but most comments will get approved automatically by this system. The AI also makes summaries of the comments to help you understand the overall sentiment of the community.
Powerful Search & Filtering
Finding exactly what you need is now easier:
- Advanced filtering system with many parameters. You can even filter by attributes to pinpoint services with specific features.
The results are dynamic and shuffle services with identical scores for fairness.
See all listings
Listings are now added as 'Community Contributed' by default. This means that you can still find them in the search results, but they will be clearly marked as such.
Updated Scoring System
New dual-score approach provides more nuanced service evaluations:
- Privacy Score: Measures how well a service protects your personal information and data
-
Trust Score: Assesses reliability, security, and overall reputation
-
Combined into a weighted Overall Score for quick comparisons
- Completely transparent and open source calculation algorithm. No manual tweaking or hidden factors.
AI-Powered Terms of Service Analysis
Basically, a TLDR summary for Terms of Service:
- Automated system extracts the most important points from complex ToS documents
- Clear summaries
- Updated monthly to catch any changes
The ToS document is hashed and only will be updated if there are any changes.
Service Events and Timelines
Track the complete history of any service, on each service page you can see the timeline of events. There are two types of events:
- Automatic events: Created by the system whenever something about a service changes, like its description, supported currencies, attributes, verification status…
- Manual events: Added by admins when there’s important news, such as a service going offline, being hacked, acquired, shut down, or other major updates.
There is also a global timeline view available at /events
Notification System
Since we now have user accounts, we built a notifiaction system so you can stay informed about anything:
- Notifications for comment replies and status changes
- Watch any comment to get notified for new replies.
- Subscribe to services to monitor events and updates
- Notification customization.
Coming soon: Third-party privacy-preserving notifications integration with Telegram, Ntfy.sh, webhooks...
Service Suggestions
Anyone with an account can suggest a new service via the suggestion form. After submitting, you'll receive a tracking page where you can follow the status of your suggestion and communicate directly with admins.
All new suggestions start as "unlisted" — they won't appear in search results until reviewed. Our team checks each submission to ensure it's not spam or inappropriate. If similar services already exist, you'll be shown possible duplicates and can choose to submit your suggestion as an edit instead.
You can always check the progress of your suggestion, respond to moderator questions, and see when it goes live, everything will also be notified to your account. This process ensures high-quality listings and a collaborative approach to building the directory.
These are some of the main features we already have, but there are many more small changes and improvements that you will find when using the site.
What's Next?
This is just the beginning. We will be constantly working to improve KYCnot.me and add more features that help you preserve your privacy.
Remember: True financial freedom requires the right to privacy. Stay KYC-free!
-
@ 84b0c46a:417782f5
2025-05-27 08:19:49Simple Long Form Content Editor (NIP-23)
機能
-
nostr:npub1sjcvg64knxkrt6ev52rywzu9uzqakgy8ehhk8yezxmpewsthst6sw3jqcw や、 nostr:nevent1qvzqqqqqqypzq4jsz7zew5j7jr4pdfxh483nwq9vyw9ph6wm706sjwrzj2we58nqqyxhwumn8ghj77tpvf6jumt9qys8wumn8ghj7un9d3shjtt2wqhxummnw3ezuamfwfjkgmn9wshx5uqpr4mhxue69uhhyetvv9ujumn0wd68ytnhd9ex2erwv46zu6nsqyxhwumn8ghj7mn0wvhxcmmvqqsgcn99jyn5tevxz5zxsrkd7h0sx8fwnqztula423xh83j9wau7cms3vg9c7 のようにnostr:要素を挿入できる (メニューのNアイコンから挿入またはnostr:note~~のように手動で入力)
-
:monoice:のようにカスタム絵文字を挿入できる(メニューの🙂アイコンから)
:monopaca_kao:
:kubipaca_karada:
- 新規記事作成と、既存記事の修正ができる
やることやったこと
-
[x] nostr:を投稿するときにtagにいれる
-
[x] 画像をアップロードできるようにする(NIP-96)
できる
- [x] 投稿しましたログとかをトースト的なやつでだすようにする
- [ ] レイアウトを整える
- [ ] あとなんか
-
-
@ b7274d28:c99628cb
2025-05-27 07:07:33A few months ago, a nostrich was switching from iOS to Android and asked for suggestions for #Nostr apps to try out. nostr:npub18ams6ewn5aj2n3wt2qawzglx9mr4nzksxhvrdc4gzrecw7n5tvjqctp424 offered the following as his response:
nostr:nevent1qvzqqqqqqypzq0mhp4ja8fmy48zuk5p6uy37vtk8tx9dqdwcxm32sy8nsaa8gkeyqydhwumn8ghj7un9d3shjtnwdaehgunsd3jkyuewvdhk6tcpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhszythwden5te0dehhxarj9emkjmn99uqzpwwts6n28eyvjpcwvu5akkwu85eg92dpvgw7cgmpe4czdadqvnv984rl0z
Yes. #Android users are fortunate to have some powerful Nostr apps and tools at our disposal that simply have no comparison over on the iOS side. However, a tool is only as good as the knowledge of the user, who must have an understanding of how best to wield it for maximum effect. This fact was immediately evidenced by replies to Derek asking, "What is the use case for Citrine?" and "This is the first time I'm hearing about Citrine and Pokey. Can you give me links for those?"
Well, consider this tutorial your Nostr starter-kit for Android. We'll go over installing and setting up Amber, Amethyst, Citrine, and Pokey, and as a bonus we'll be throwing in the Zapstore and Coinos to boot. We will assume no previous experience with any of the above, so if you already know all about one or more of these apps, you can feel free to skip that tutorial.
So many apps...
You may be wondering, "Why do I need so many apps to use Nostr?" That's perfectly valid, and the honest answer is, you don't. You can absolutely just install a Nostr client from the Play Store, have it generate your Nostr identity for you, and stick with the default relays already set up in that app. You don't even need to connect a wallet, if you don't want to. However, you won't experience all that Nostr has to offer if that is as far as you go, any more than you would experience all that Italian cuisine has to offer if you only ever try spaghetti.
Nostr is not just one app that does one thing, like Facebook, Twitter, or TikTok. It is an entire ecosystem of applications that are all built on top of a protocol that allows them to be interoperable. This set of tools will help you make the most out of that interoperability, which you will never get from any of the big-tech social platforms. It will provide a solid foundation for you to build upon as you explore more and more of what Nostr has to offer.
So what do these apps do?
Fundamental to everything you do on Nostr is the need to cryptographically sign with your private key. If you aren't sure what that means, just imagine that you had to enter your password every time you hit the "like" button on Facebook, or every time you commented on the latest dank meme. That would get old really fast, right? That's effectively what Nostr requires, but on steroids.
To keep this from being something you manually have to do every 5 seconds when you post a note, react to someone else's note, or add a comment, Nostr apps can store your private key and use it to sign behind the scenes for you. This is very convenient, but it means you are trusting that app to not do anything with your private key that you don't want it to. You are also trusting it to not leak your private key, because anyone who gets their hands on it will be able to post as you, see your private messages, and effectively be you on Nostr. The more apps you give your private key to, the greater your risk that it will eventually be compromised.
Enter #Amber, an application that will store your private key in only one app, and all other compatible Nostr apps can communicate with it to request a signature, without giving any of those other apps access to your private key.
Most Nostr apps for Android now support logging in and signing with Amber, and you can even use it to log into apps on other devices, such as some of the web apps you use on your PC. It's an incredible tool given to us by nostr:npub1w4uswmv6lu9yel005l3qgheysmr7tk9uvwluddznju3nuxalevvs2d0jr5, and only available for Android users. Those on iPhone are incredibly jealous that they don't have anything comparable, yet.
Speaking of nostr:npub1w4uswmv6lu9yel005l3qgheysmr7tk9uvwluddznju3nuxalevvs2d0jr5, the next app is also one of his making.
All Nostr data is stored on relays, which are very simple servers that Nostr apps read notes from and write notes to. In most forms of social media, it can be a pain to get your own data out to keep a backup. That's not the case on Nostr. Anyone can run their own relay, either for the sake of backing up their personal notes, or for others to post their notes to, as well.
Since Nostr notes take up very little space, you can actually run a relay on your phone. I have been on Nostr for almost 2 and a half years, and I have 25,000+ notes of various kinds on my relay, and a backup of that full database is just 24MB on my phone's storage.
Having that backup can save your bacon if you try out a new Nostr client and it doesn't find your existing follow list for some reason, so it writes a new one and you suddenly lose all of the people you were following. Just pop into your #Citrine relay, confirm it still has your correct follow list or import it from a recent backup, then have Citrine restore it. Done.
Additionally, there are things you may want to only save to a relay you control, such as draft messages that you aren't ready to post publicly, or eCash tokens, which can actually be saved to Nostr relays now. Citrine can also be used with Amber for signing into certain Nostr applications that use a relay to communicate with Amber.
If you are really adventurous, you can also expose Citrine over Tor to be used as an outbox relay, or used for peer-to-peer private messaging, but that is far more involved than the scope of this tutorial series.
You can't get far in Nostr without a solid and reliable client to interact with. #Amethyst is the client we will be using for this tutorial because there simply isn't another Android client that comes close, so far. Moreover, it can be a great client for new users to get started on, and yet it has a ton of features for power-users to take advantage of as well.
There are plenty of other good clients to check out over time, such as Coracle, YakiHonne, Voyage, Olas, Flotilla and others, but I keep coming back to Amethyst, and by the time you finish this tutorial, I think you'll see why. nostr:npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z and others who have contributed to Amethyst have really built something special in this client, and it just keeps improving with every update that's shipped.
Most social media apps have some form of push notifications, and some Nostr apps do, too. Where the issue comes in is that Nostr apps are all interoperable. If you have more than one application, you're going to have both of them notifying you. Nostr users are known for having five or more Nostr apps that they use regularly. If all of them had notifications turned on, it would be a nightmare. So maybe you limit it to only one of your Nostr apps having notifications turned on, but then you are pretty well locked-in to opening that particular app when you tap on the notification.
Pokey, by nostr:npub1v3tgrwwsv7c6xckyhm5dmluc05jxd4yeqhpxew87chn0kua0tjzqc6yvjh, solves this issue, allowing you to turn notifications off for all of your Nostr apps, and have Pokey handle them all for you. Then, when you tap on a Pokey notification, you can choose which Nostr app to open it in.
Pokey also gives you control over the types of things you want to be notified about. Maybe you don't care about reactions, and you just want to know about zaps, comments, and direct messages. Pokey has you covered. It even supports multiple accounts, so you can get notifications for all the npubs you control.
One of the most unique and incredibly fun aspects of Nostr is the ability to send and receive #zaps. Instead of merely giving someone a 👍️ when you like something they said, you can actually send them real value in the form of sats, small portions of a Bitcoin. There is nothing quite like the experience of receiving your first zap and realizing that someone valued what you said enough to send you a small amount (and sometimes not so small) of #Bitcoin, the best money mankind has ever known.
To be able to have that experience, though, you are going to need a wallet that can send and receive zaps, and preferably one that is easy to connect to Nostr applications. My current preference for that is Alby Hub, but not everyone wants to deal with all that comes along with running a #Lightning node. That being the case, I have opted to use nostr:npub1h2qfjpnxau9k7ja9qkf50043xfpfy8j5v60xsqryef64y44puwnq28w8ch for this tutorial, because they offer one of the easiest wallets to set up, and it connects to most Nostr apps by just copy/pasting a connection string from the settings in the wallet into the settings in your Nostr app of choice.
Additionally, even though #Coinos is a custodial wallet, you can have it automatically transfer any #sats over a specified threshold to a separate wallet, allowing you to mitigate the custodial risk without needing to keep an eye on your balance and make the transfer manually.
Most of us on Android are used to getting all of our mobile apps from one souce: the Google Play Store. That's not possible for this tutorial series. Only one of the apps mentioned above is available in Google's permissioned playground. However, on Android we have the advantage of being able to install whatever we want on our device, just by popping into our settings and flipping a toggle. Indeed, thumbing our noses at big-tech is at the heart of the Nostr ethos, so why would we make ourselves beholden to Google for installing Nostr apps?
The nostr:npub10r8xl2njyepcw2zwv3a6dyufj4e4ajx86hz6v4ehu4gnpupxxp7stjt2p8 is an alternative app store made by nostr:npub1wf4pufsucer5va8g9p0rj5dnhvfeh6d8w0g6eayaep5dhps6rsgs43dgh9 as a resource for all sorts of open-source apps, but especially Nostr apps. What is more, you can log in with Amber, connect a wallet like Coinos, and support the developers of your favorite Nostr apps directly within the #Zapstore by zapping their app releases.
One of the biggest features of the Zapstore is the fact that developers can cryptographically sign their app releases using their Nostr keys, so you know that the app you are downloading is the one they actually released and hasn't been altered in any way. The Zapstore will warn you and won't let you install the app if the signature is invalid.
Getting Started
Since the Zapstore will be the source we use for installing most of the other apps mentioned, we will start with installing the Zapstore.
We will then use the Zapstore to install Amber and set it up with our Nostr account, either by creating a new private key, or by importing one we already have. We'll also use it to log into the Zapstore.
Next, we will install Amethyst from the Zapstore and log into it via Amber.
After this, we will install Citrine from the Zapstore and add it as a local relay on Amethyst.
Because we want to be able to send and receive zaps, we will set up a wallet with CoinOS and connect it to Amethyst and the Zapstore using Nostr Wallet Connect.
Finally, we will install Pokey using the Zapstore, log into it using Amber, and set up the notifications we want to receive.
By the time you are done with this series, you will have a great head-start on your Nostr journey compared to muddling through it all on your own. Moreover, you will have developed a familiarity with how things generally work on Nostr that can be applied to other apps you try out in the future.
Continue to Part 2: The Zapstore. Nostr Link: nostr:naddr1qvzqqqr4gupzpde8f55w86vrhaeqmd955y4rraw8aunzxgxstsj7eyzgntyev2xtqydhwumn8ghj7un9d3shjtnzwf5kw6r5vfhkcapwdejhgtcqp5cnwdphxv6rwwp3xvmnzvqgty5au
-
@ 39cc53c9:27168656
2025-05-27 09:21:45I've been thinking about how to improve my seed backup in a cheap and cool way, mostly for fun. Until now, I had the seed written on a piece of paper in a desk drawer, and I wanted something more durable and fire-proof.
After searching online, I found two options I liked the most: the Cryptosteel Capsule and the Trezor Keep. These products are nice but quite expensive, and I didn't want to spend that much on my seed backup. Privacy is also important, and sharing details like a shipping address makes me uncomfortable. This concern has grown since the Ledger incident^1. A $5 wrench attack^2 seems too cheap, even if you only hold a few sats.
Upon seeing the design of Cryptosteel, I considered creating something similar at home. Although it may not be as cool as their device, it could offer almost the same in terms of robustness and durability.
Step 1: Get the materials and tools
When choosing the materials, you will want to go with stainless steel. It is durable, resistant to fire, water, and corrosion, very robust, and does not rust. Also, its price point is just right; it's not the cheapest, but it's cheap for the value you get.
I went to a material store and bought:
- Two bolts
- Two hex nuts and head nuts for the bolts
- A bag of 30 washers
All items were made of stainless steel. The total price was around €6. This is enough for making two seed backups.
You will also need:
- A set of metal letter stamps (I bought a 2mm-size letter kit since my washers were small, 6mm in diameter)
- You can find these in local stores or online marketplaces. The set I bought cost me €13.
- A good hammer
- A solid surface to stamp on
Total spent: 19€ for two backups
Step 2: Stamp and store
Once you have all the materials, you can start stamping your words. There are many videos on the internet that use fancy 3D-printed tools to get the letters nicely aligned, but I went with the free-hand option. The results were pretty decent.
I only stamped the first 4 letters for each word since the BIP-39 wordlist allows for this. Because my stamping kit did not include numbers, I used alphabet letters to define the order. This way, if all the washers were to fall off, I could still reassemble the seed correctly.
The final result
So this is the final result. I added two smaller washers as protection and also put the top washer reversed so the letters are not visible:
Compared to the Cryptosteel or the Trezor Keep, its size is much more compact. This makes for an easier-to-hide backup, in case you ever need to hide it inside your human body.
Some ideas
Tamper-evident seal
To enhance the security this backup, you can consider using a tamper-evident seal. This can be easily achieved by printing a unique image or using a specific day's newspaper page (just note somewhere what day it was).
Apply a thin layer of glue to the washer's surface and place the seal over it. If someone attempts to access the seed, they will be forced to destroy the seal, which will serve as an evident sign of tampering.
This simple measure will provide an additional layer of protection and allow you to quickly identify any unauthorized access attempts.
Note that this method is not resistant to outright theft. The tamper-evident seal won't stop a determined thief but it will prevent them from accessing your seed without leaving any trace.
Redundancy
Make sure to add redundancy. Make several copies of this cheap backup, and store them in separate locations.
Unique wordset
Another layer of security could be to implement your own custom mnemonic dictionary. However, this approach has the risk of permanently losing access to your funds if not implemented correctly.
If done properly, you could potentially end up with a highly secure backup, as no one else would be able to derive the seed phrase from it. To create your custom dictionary, assign a unique number from 1 to 2048 to a word of your choice. Maybe you could use a book, and index the first 2048 unique words that appear. Make sure to store this book and even get a couple copies of it (digitally and phisically).
This self-curated set of words will serve as your personal BIP-39 dictionary. When you need to translate between your custom dictionary and the official BIP-39 wordlist, simply use the index number to find the corresponding word in either list.
Never write the idex or words on your computer (Do not use
Ctr+F
) -
@ 7f6db517:a4931eda
2025-05-27 05:01:34There must be a limit to how much data is transferred across the bitcoin network in order to keep the ability to run and use your own node accessible. A node is required to interact with the global bitcoin network - if you do not use your own node then you must trust someone else's node. If nodes become inaccessible to run then the network will centralize around the remaining entities that operate them - threatening the censorship resistance at the core of bitcoin's value prop. The bitcoin protocol uses three main mechanisms to keep node operation costs low - a fixed limit on the amount of data in each block, an automatic difficulty adjustment that regulates how many blocks are produced based on current mining hash rate, and a robust dynamic transaction fee market.
Bitcoin transaction fees limit network abuse by making usage expensive. There is a cost to every transaction, set by a dynamic free market based on demand for scarce block space. It is an incredibly robust way to prevent spam without relying on centralized entities that can be corrupted or pressured.
After the 2017 bitcoin fee spike we had six years of relative quiet to build tools that would be robust in a sustained high fee market. Fortunately our tools are significantly better now but many still need improvement. Most of the pain points we see today will be mitigated.
The reality is we were never going to be fully prepared - pressure is needed to show the pain points and provide strong incentives to mitigate them.
It will be incredibly interesting to watch how projects adapt under pressure. Optimistic we see great innovation here.
_If you are willing to wait for your transaction to confirm you can pay significantly lower fees. Learn best practices for reducing your fee burden here.
My guide for running and using your own bitcoin node can be found here._
If you found this post helpful support my work with bitcoin.
-
@ 39cc53c9:27168656
2025-05-27 09:21:43kycnot.me features a somewhat hidden tool that some users may not be aware of. Every month, an automated job crawls every listed service's Terms of Service (ToS) and FAQ pages and conducts an AI-driven analysis, generating a comprehensive overview that highlights key points related to KYC and user privacy.
Here's an example: Changenow's Tos Review
Why?
ToS pages typically contain a lot of complicated text. Since the first versions of kycnot.me, I have tried to provide users a comprehensive overview of what can be found in such documents. This automated method keeps the information up-to-date every month, which was one of the main challenges with manual updates.
A significant part of the time I invest in investigating a service for kycnot.me involves reading the ToS and looking for any clauses that might indicate aggressive KYC practices or privacy concerns. For the past four years, I performed this task manually. However, with advancements in language models, this process can now be somewhat automated. I still manually review the ToS for a quick check and regularly verify the AI’s findings. However, over the past three months, this automated method has proven to be quite reliable.
Having a quick ToS overview section allows users to avoid reading the entire ToS page. Instead, you can quickly read the important points that are grouped, summarized, and referenced, making it easier and faster to understand the key information.
Limitations
This method has a key limitation: JS-generated pages. For this reason, I was using Playwright in my crawler implementation. I plan to make a release addressing this issue in the future. There are also sites that don't have ToS/FAQ pages, but these sites already include a warning in that section.
Another issue is false positives. Although not very common, sometimes the AI might incorrectly interpret something harmless as harmful. Such errors become apparent upon reading; it's clear when something marked as bad should not be categorized as such. I manually review these cases regularly, checking for anything that seems off and then removing any inaccuracies.
Overall, the automation provides great results.
How?
There have been several iterations of this tool. Initially, I started with GPT-3.5, but the results were not good in any way. It made up many things, and important thigs were lost on large ToS pages. I then switched to GPT-4 Turbo, but it was expensive. Eventually, I settled on Claude 3 Sonnet, which provides a quality compromise between GPT-3.5 and GPT-4 Turbo at a more reasonable price, while allowing a generous 200K token context window.
I designed a prompt, which is open source^1, that has been tweaked many times and will surely be adjusted further in the future.
For the ToS scraping part, I initially wrote a scraper API using Playwright^2, but I replaced it with Jina AI Reader^3, which works quite well and is designed for this task.
Non-conflictive ToS
All services have a dropdown in the ToS section called "Non-conflictive ToS Reviews." These are the reviews that the AI flagged as not needing a user warning. I still provide these because I think they may be interesting to read.
Feedback and contributing
You can give me feedback on this tool, or share any inaccuraties by either opening an issue on Codeberg^4 or by contacting me ^5.
You can contribute with pull requests, which are always welcome, or you can support this project with any of the listed ways.
-
@ 39cc53c9:27168656
2025-05-27 09:21:41These reviews are sponsored, yet the sponsorship does not influence the outcome of the evaluations. Sponsored reviews are independent from the kycnot.me list, being only part of the blog. The reviews have no impact on the scores of the listings or their continued presence on the list. Should any issues arise, I will not hesitate to remove any listing. Reviews are in collaboration with Orangefren.
The review
Swapter.io is an all-purpose instant exchange. They entered the scene in the depths of the bear market about 2 years ago in June of 2022.
| Pros | Cons | | --------------- | ---------------------------------- | | Low fees | Shotgun KYC with opaque triggers | | Large liquidity | Relies on 3rd party liquidity | | Works over Tor | Front-end not synced with back-end | | Pretty UI | |
Rating: ★★★☆☆ Service Website: swapter.io
⚠️ There is an ongoing issue with this service: read more on Reddit.
Test Trades
During our testing we performed a trade from XMR to LTC, and then back to XMR.
Our first trade had the ID of:
mpUitpGemhN8jjNAjQuo6EvQ
. We were promised 0.8 LTC for sending 0.5 XMR, before we sent the Monero. When the Monero arrived we were sent 0.799 LTC.On the return journey we performed trade with ID:
yaCRb5pYcRKAZcBqg0AzEGYg
. This time we were promised 0.4815 XMR for sending 0.799 LTC. After Litecoin arrived we were sent 0.4765 XMR.As such we saw a discrepancy of
~0.1%
in the first trade and~1%
in the second trade. Considering those trades were floating we determine the estimates presented in the UI to be highly accurate and honest.Of course Swapter could've been imposing a large fee on their estimates, but we checked their estimates against CoinGecko and found the difference to be equivalent to a fee of just over
0.5%
. Perfectly in line with other swapping services.Trading
Swapter supports BTC, LTC, XMR and well over a thousand other coins. Sadly they don't support the Lightning Network. For the myriad of currencies they deal with they provide massive upper limits. You could exchange tens, or even hundreds, of thousands of dollars worth of cryptocurrency in a single trade (although we wouldn't recommend it).
The flip side to this is that Swapter relies on 3rd party liquidity. Aside from the large liqudity this also benefits the user insofar as it allows for very low fees. However, it also comes with a negative - the 3rd party gets to see all your trades. Unfortunately Swapter opted not to share where they source their liquidity in their Privacy Policy or Terms of Service.
KYC & AML policies
Swapter reserves the right to require its users to provide their full name, their date of birth, their address and government-issued ID. A practice known as "shotgun KYC". This should not happen often - in our testing it never did - however it's not clear when exactly it could happen. The AML & KYC policy provided on Swapter's website simply states they will put your trade on hold if their "risk scoring system [deems it] as suspicious".
Worse yet, if they determine that "any of the information [the] customer provided is incorrect, false, outdated, or incomplete" then Swapter may decide to terminate all of the services they provide to the user. What exactly would happen to their funds in such a case remains unclear.
The only clarity we get is that the Swapter policy outlines a designated 3rd party that will verify the information provided by the user. The third party's name is Sum & Substance Ltd, also simply known as samsub and available at sumsub.com
It's understandable that some exchanges will decide on a policy of this sort, especially when they rely on external liquidity, but we would prefer more clarity be given. When exactly is a trade suspicious?
Tor
We were pleased to discover Swapter works over Tor. However, they do not provide a Tor mirror, nor do they work without JavaScript. Additionally, we found that some small features, such as the live chat, did not work over Tor. Fortunately, other means of contacting their support are still available.
UI
We have found the Swapter UI to be very modern, straightforward and simple to use. It's available in 4 languages (English, French, Dutch and Russian), although we're unable to vouch for the quality of some of those, the ones that we used seemed perfectly serviceable.
Our only issue with the UI was that it claims the funds have been sent following the trade, when in reality it seems to take the backend a minute or so to actually broadcast the transaction.
Getting in touch
Swapter's team has a chat on their website, a support email address and a support Telegram. Their social media presence in most active on Telegram and X (formerly Twitter).
Disclaimer
None of the above should be understood as investment or financial advice. The views are our own only and constitute a faithful representation of our experience in using and investigating this exchange. This review is not a guarantee of any kind on the services rendered by the exchange. Do your own research before using any service.
-
@ 39cc53c9:27168656
2025-05-27 09:21:38Silent.link is an anonymous eSIM provider. They offer pay-as-you-go roaming in 160+ countries.
Pros
- Anonymous
- Private payment options
- High performance
- Global availability
Cons
- Need to select the right networks sometimes
- Latency
- Data and incoming SMS & call only
Rating
★★★★★
Service website
eSIMs replace traditional, physical SIM cards, if you have a fairly new phone, odds are it supports them. Since most people change their mobile carrier very rarely, the most common use case for these new eSIMs is their use in travel. Although their use as a piece of a larger OPSEC puzzle to improve privacy when using the internet from your phone is increasingly popular too.
Silent.link is not the only eSIM provider out there. Yet, they’re so unique that even Twitter’s (now X) founder Jack Dorsey recommends them.
Let’s start off with a quick explanation of how Silent.link works and what pay-as-you-go means. Most other eSIM providers will sell you packages of GBs with an expiration date. For instance imagine you’re visiting France then going to the UK after a few months. With other providers you might buy a 10GB in France package valid for 7 days, then after some months a 10GB in the UK package also valid for 7 days. You likely won’t use up the full package in either country and the remaining capacity will be voided as the package expires.
Silent.link’s pay-as-you-go is different. There are no geographic packages. There are no expiration dates. You simply have a balance denominated in USD and are charged as you use up the data according to the pricing of whichever local carrier you’re connecting via.
Preparing for the same trips from the example above you’d simply top-up your Silent.link balance with $10. Then you’d use Silent.link in France paying $1.33/GB, you’d only be charged for the exact amount used, then you’d go to the UK and pay $1.54/GB from the balance you had left over from France. It doesn’t matter how much time passes between the trips, because Silent.link balances don’t expire. If you have a balance left over you can use it on a future trip, or simply use it up in your home country.
Pros
Anonymity
Silent.link is anonymous. Most other eSIM providers require some form of identification. This can be a traditional, full KYC, procedure involving your ID or passport numbers or, as seemingly innocent, as verifying your phone number with your main carrier. Regardless, a link between the eSIM you bought online and your identity is established.
In some countries you’ll be able to pick up a traditional SIM (or the new eSIM) from a local carrier without undergoing this verification. This can still be a hassle though. You’ll need to look up the laws before travelling, you’ll need to find a local store selling them, you’ll need to decide how you’ll pay privately, etc. And that’s the best case, that’s assuming the country you want to get the SIM in allows you to buy one anonymously.
Private payment methods
Silent.link only accepts cryptocurrency and according to their stats, most payments are made with Bitcoin (either onchain or using the Lightning Network) or with Monero. As such paying anonymously is not a problem. The use a self-hosted instance of BTCPay Server to process payments and operate their own LN node. The entire checkout process can be completed over Tor.
Cons
Network selection
Although you can skip the hassle of buying a new eSIM every time you travel it’s a good idea to look up the pricing of different mobile networks in the country you’re going to. The differences can be trivial, but can also be 100x. If a specific mobile network offers a much better deal, you’ll probably want to dive into your phone’s settings to make sure it only connects to that network.
High prices for some regions
Second issue can be that, especially for poorer countries, Silent.link might not have the best prices. For instance if you travel to Angola you’ll end up paying $155.44/GB. But if you search around for other providers you’ll find eSIM that offer much lower prices for that same country.
Data & incoming SMS & calls only
These eSIMs are either data-only or only offer data and inbound sms and calls. You can’t use Silent.link eSIMs to send texts or make phone calls.
Latency
For most use-cases this shouldn’t matter, but the way roaming works is that when you’re abroad your data is first sent to your home country then sent out into the internet from there. For instance if you’re a Brit on holiday in Spain wherever you open up a website your phone communicates with the Spanish network who forwards the request to your home network in the UK and only there does the request start going towards the website you’re trying to load. The response takes the same path in reverse.
The home network for the Silent.link eSIMs is Poland. To take an extreme (antipodal) example, if you’re in Chile loading a Chilean website your request will go to Poland then back from Poland to the website’s server in Chile, then the response will go from Chile to Poland to you (in Chile). All those trips add latency. In our testing, done during the recent OrangeFren.com meetup in Istanbul, the difference was an additional 73ms. The bandwidth, however, was exceptional, easily surpassing 100 Mbps.
This latency issue isn’t unique to Silent.link, other eSIM providers usually suffer from it too, though their home network may be better suited for your latency needs. If you need the best latency we recommend a SIM from a local provider (or WiFi).
This proxy behaviour isn’t all negative however. It may potentially allow you to circumvent censorship or geoblocking if you’re trying to access resources available from Poland, but unavailable elsewhere.
Besides Istanbul one of the countries we also tested Silent.link in was Northern Cyprus. This territory is mostly unrecognized. It’s a country that, depending on who you ask, is or isn’t real. Despite this unresolved geopolitical status Silent.link performed without any issues.
Installation
If you decide to give Silent.link a try, you'll need to select if you want a data-only plan or a plan with inbound SMS & calling, once you complete the payment simply scan the QR code on the order confirmation page with your phone. Make sure to save the url of that order confirmation page somewhere! You will need it to top up your eSIM and check your remaining balance.
Getting in touch
The preferred way of contacting Silent.link's support is using the website's built-in chat function. Alternative methods include X (formerly Twitter), Matrix and email.
Their support is online from 09:00 - 21:00 UTC although even when testing outside of those hours we got a reply within a minute.
NOTE: These reviews are sponsored, yet the sponsorship does not influence the outcome of the evaluations. Sponsored reviews are independent from the kycnot.me list, being only part of the blog. The reviews have no impact on the scores of the listings or their continued presence on the list. Should any issues arise, I will not hesitate to remove any listing.
-
@ 7f6db517:a4931eda
2025-05-27 05:01:34I often hear "bitcoin doesn't interest me, I'm not a finance person."
Ironically, the beauty of sound money is you don't have to be. In the current system you're expected to manage a diversified investment portfolio or pay someone to do it. Bitcoin will make that optional.
— ODELL (@ODELL) September 16, 2018
At first glance bitcoin often appears overwhelming to newcomers. It is incredibly easy to get bogged down in the details of how it works or different ways to use it. Enthusiasts, such as myself, often enjoy going down the deep rabbit hole of the potential of bitcoin, possible pitfalls and theoretical scenarios, power user techniques, and the developer ecosystem. If your first touch point with bitcoin is that type of content then it is only natural to be overwhelmed. While it is important that we have a thriving community of bitcoiners dedicated to these complicated tasks - the true beauty of bitcoin lies in its simplicity. Bitcoin is simply better money. It is the best money we have ever had.
Life is complicated. Life is hard. Life is full of responsibility and surprises. Bitcoin allows us to focus on our lives while relying on a money that is simple. A money that is not controlled by any individual, company, or government. A money that cannot be easily seized or blocked. A money that cannot be devalued at will by a handful of corrupt bureaucrat who live hundreds of miles from us. A money that can be easily saved and should increase in purchasing power over time without having to learn how to "build a diversified stock portfolio" or hire someone to do it for us.
Bitcoin enables all of us to focus on our lives - our friends and family - doing what we love with the short time we have on this earth. Time is scarce. Life is complicated. Bitcoin is the most simple aspect of our complicated lives. If we spend our scarce time working then we should be able to easily save that accrued value for future generations without watching the news or understanding complicated financial markets. Bitcoin makes this possible for anyone.
Yesterday was Mother's Day. Raising a human is complicated. It is hard, it requires immense personal responsibility, it requires critical thinking, but mothers figure it out, because it is worth it. Using and saving bitcoin is simple - simply install an app on your phone. Every mother can do it. Every person can do it.
Life is complicated. Life is beautiful. Bitcoin is simple.
If you found this post helpful support my work with bitcoin.
-
@ 3c559080:a053153e
2025-05-25 20:26:43So firstly you should find an emulator for whatever you want to play on. There are many for desktop and mobile devices. Checkhere for a list of all the available consoles and their various emulators.
Next what game do you want to play? This is the like the homepage for a shit ton of roms.
Some of the more popular roms are there and other various list like Sony Nintendo
After narrowing down your selection you will end up on myrient i assume this is just some dope person hosting all these so if you get some use out of it, think of donating they even take corn, but other shitcoins too (but thats not the focus here)
Once you download the Rom of the game you want, you will get a compressed (zip) folder, unzip it and within it will be the rom, most systems will identify your emulator and use it open the game. If not, launch the emulator and within it should be an option to open a file, open the file in the unzipped folder.
Enjoy So you want to Mod?
So every Mod, is a mod for a specific game [ex. Pokemon Blue, Pokemon FireRed, Super Mario Bros.] so it requires you to get the Rom for that base game, the mod itself, and a tool to patch it.
There is an online tool to easily patch the mod to the ROM. IMPORTANT, this will not change any naming, Id recommend having a folder with the base game roms, and a folder for the mods, and lastly a folder for the newly modded roms. Make sure to name or just save the game in modded roms folder after the patch.
Below are a few resource to find various Pokemon Rom mods(sometimes called hacks)
Personally, Pokemon Unbound is considered the best most polished hack. it runs on Pokemon Fire Red.
Pokemon Emerald Rouge is a cool take on the popular Rougelite genre. This runs on base game Pokemon Emerald
-
@ 7f6db517:a4931eda
2025-05-27 05:01:33Will not live in a pod.
Will not eat the bugs.
Will not get the chip.
Will not get a blue check.
Will not use CBDCs.Live Free or Die.
Why did Elon buy twitter for $44 Billion? What value does he see in it besides the greater influence that undoubtedly comes with controlling one of the largest social platforms in the world? We do not need to speculate - he made his intentions incredibly clear in his first meeting with twitter employees after his takeover - WeChat of the West.
To those that do not appreciate freedom, the value prop is clear - WeChat is incredibly powerful and successful in China.
To those that do appreciate freedom, the concern is clear - WeChat has essentially become required to live in China, has surveillance and censorship integrated at its core, and if you are banned from the app your entire livelihood is at risk. Employment, housing, payments, travel, communication, and more become extremely difficult if WeChat censors determine you have acted out of line.
The blue check is the first step in Elon's plan to bring the chinese social credit score system to the west. Users who verify their identity are rewarded with more reach and better tools than those that do not. Verified users are the main product of Elon's twitter - an extensive database of individuals and complete control of the tools he will slowly get them to rely on - it is easier to monetize cattle than free men.
If you cannot resist the temptation of the blue check in its current form you have already lost - what comes next will be much darker. If you realize the need to resist - freedom tech provides us options.
If you found this post helpful support my work with bitcoin.
-
@ c1e9ab3a:9cb56b43
2025-05-18 04:14:48Abstract
This document proposes a novel architecture that decouples the peer-to-peer (P2P) communication layer from the Bitcoin protocol and replaces or augments it with the Nostr protocol. The goal is to improve censorship resistance, performance, modularity, and maintainability by migrating transaction propagation and block distribution to the Nostr relay network.
Introduction
Bitcoin’s current architecture relies heavily on its P2P network to propagate transactions and blocks. While robust, it has limitations in terms of flexibility, scalability, and censorship resistance in certain environments. Nostr, a decentralized event-publishing protocol, offers a multi-star topology and a censorship-resistant infrastructure for message relay.
This proposal outlines how Bitcoin communication could be ported to Nostr while maintaining consensus and verification through standard Bitcoin clients.
Motivation
- Enhanced Censorship Resistance: Nostr’s architecture enables better relay redundancy and obfuscation of transaction origin.
- Simplified Lightweight Nodes: Removing the full P2P stack allows for lightweight nodes that only verify blockchain data and communicate over Nostr.
- Architectural Modularity: Clean separation between validation and communication enables easier auditing, upgrades, and parallel innovation.
- Faster Propagation: Nostr’s multi-star network may provide faster propagation of transactions and blocks compared to the mesh-like Bitcoin P2P network.
Architecture Overview
Components
-
Bitcoin Minimal Node (BMN):
- Verifies blockchain and block validity.
- Maintains UTXO set and handles mempool logic.
- Connects to Nostr relays instead of P2P Bitcoin peers.
-
Bridge Node:
- Bridges Bitcoin P2P traffic to and from Nostr relays.
- Posts new transactions and blocks to Nostr.
- Downloads mempool content and block headers from Nostr.
-
Nostr Relays:
- Accept Bitcoin-specific event kinds (transactions and blocks).
- Store mempool entries and block messages.
- Optionally broadcast fee estimation summaries and tipsets.
Event Format
Proposed reserved Nostr
kind
numbers for Bitcoin content (NIP/BIP TBD):| Nostr Kind | Purpose | |------------|------------------------| | 210000 | Bitcoin Transaction | | 210001 | Bitcoin Block Header | | 210002 | Bitcoin Block | | 210003 | Mempool Fee Estimates | | 210004 | Filter/UTXO summary |
Transaction Lifecycle
- Wallet creates a Bitcoin transaction.
- Wallet sends it to a set of configured Nostr relays.
- Relays accept and cache the transaction (based on fee policies).
- Mining nodes or bridge nodes fetch mempool contents from Nostr.
- Once mined, a block is submitted over Nostr.
- Nodes confirm inclusion and update their UTXO set.
Security Considerations
- Sybil Resistance: Consensus remains based on proof-of-work. The communication path (Nostr) is not involved in consensus.
- Relay Discoverability: Optionally bootstrap via DNS, Bitcoin P2P, or signed relay lists.
- Spam Protection: Relay-side policy, rate limiting, proof-of-work challenges, or Lightning payments.
- Block Authenticity: Nodes must verify all received blocks and reject invalid chains.
Compatibility and Migration
- Fully compatible with current Bitcoin consensus rules.
- Bridge nodes preserve interoperability with legacy full nodes.
- Nodes can run in hybrid mode, fetching from both P2P and Nostr.
Future Work
- Integration with watch-only wallets and SPV clients using verified headers via Nostr.
- Use of Nostr’s social graph for partial trust assumptions and relay reputation.
- Dynamic relay discovery using Nostr itself (relay list events).
Conclusion
This proposal lays out a new architecture for Bitcoin communication using Nostr to replace or augment the P2P network. This improves decentralization, censorship resistance, modularity, and speed, while preserving consensus integrity. It encourages innovation by enabling smaller, purpose-built Bitcoin nodes and offloading networking complexity.
This document may become both a Bitcoin Improvement Proposal (BIP-XXX) and a Nostr Improvement Proposal (NIP-XXX). Event kind range reserved: 210000–219999.
-
@ cefb08d1:f419beff
2025-05-27 09:20:54https://stacker.news/items/990192
-
@ 7f6db517:a4931eda
2025-05-27 05:01:33Nostr is an open communication protocol that can be used to send messages across a distributed set of relays in a censorship resistant and robust way.
If you missed my nostr introduction post you can find it here. My nostr account can be found here.
We are nearly at the point that if something interesting is posted on a centralized social platform it will usually be posted by someone to nostr.
We are nearly at the point that if something interesting is posted exclusively to nostr it is cross posted by someone to various centralized social platforms.
We are nearly at the point that you can recommend a cross platform app that users can install and easily onboard without additional guides or resources.
As companies continue to build walls around their centralized platforms nostr posts will be the easiest to cross reference and verify - as companies continue to censor their users nostr is the best censorship resistant alternative - gradually then suddenly nostr will become the standard. 🫡
Current Nostr Stats
If you found this post helpful support my work with bitcoin.
-
@ 9ca447d2:fbf5a36d
2025-05-27 09:01:12Bahrain-based Al Abraaj Restaurants Group has made history by becoming the first publicly-traded company in the Middle East to add bitcoin to its corporate treasury. This is a major step forward for regional bitcoin adoption.
On May 15, 2025, Al Abraaj Restaurants Group, a well-known restaurant chain listed on the Bahrain Bourse, announced it had bought 5 bitcoin (BTC) as part of a new treasury strategy. This makes the company the first in Bahrain, the GCC and the Middle East to officially hold bitcoin as a reserve asset.
Al Abraaj adds bitcoin to its treasury — Zawya
This is a growing trend globally where companies are treating bitcoin not just as an investment but as a long-term store of value. Major companies like Strategy, Tesla and Metaplanet have already done this — and now Al Abraaj is following suit.
Metaplanet recently added 1,241 BTC to its treasury, boosting the company’s holdings above El Salvador’s.
Related: Metaplanet Overtakes El Salvador in Bitcoin Holdings After $126M Purchase
“Our initiative towards becoming a Bitcoin Treasury Company reflects our forward-thinking approach and dedication to maximizing shareholder value,” said Abdulla Isa, Chairman of the Bitcoin Treasury Committee at Al Abraaj.
Al Abraaj’s move is largely inspired by Michael Saylor, Executive Chairman of Strategy, the world’s largest corporate holder of bitcoin. Saylor’s strategy of allocating billions to bitcoin has set a model that other companies — now including Al Abraaj — are following.
A photo shared by the company even showed a meeting between an Al Abraaj representative and Saylor, with the company calling itself the “MicroStrategy of the Middle East”.
“We believe that Bitcoin will play a pivotal role in the future of finance, and we are excited to be at the forefront of this transformation in the Kingdom of Bahrain,” Isa added.
To support its bitcoin initiative, Al Abraaj has partnered with 10X Capital, a New York-based investment firm that specializes in digital assets.
10X Capital has a strong track record in bitcoin treasury strategies, and recently advised Nakamoto Holdings on a $710 million deal — the largest of its kind.
With 10X’s help, Al Abraaj looks to raise more capital and increase its bitcoin holdings over time to maximize bitcoin-per-share for its investors. The company will also develop Sharia-compliant financial instruments so Islamic investors can get exposure to bitcoin in a halal way.
“Bahrain continues to be a leader in the Middle East in Bitcoin adoption,” said Hans Thomas, CEO of 10X Capital. He noted, with a combined GDP of $2.2 trillion and over $6 trillion in sovereign wealth, the GCC now has its first publicly listed bitcoin treasury company.
This is not just a first for Al Abraaj — it’s a first for the region. Bahrain has been positioning itself as a fintech hub and Al Abraaj’s move will encourage more non-fintech companies in the region to look into bitcoin.
The company said the decision was made after thorough due diligence and is in line with the regulations set by the Central Bank of Bahrain (CBB). Al Abraaj will be fully compliant with all digital asset transaction rules, including transparency, security and governance.
A special Bitcoin Committee has been formed to oversee the treasury strategy. It includes experienced bitcoin investors, financial experts and portfolio managers who will manage risk, monitor market conditions and ensure best practices in custody and disclosure.
The initial purchase was 5 BTC, but Al Abraaj sees this as just the beginning. The company stated that there are plans in motion to allocate a significant portion of their treasury into bitcoin over time.
According to the company’s reports, Al Abraaj is financially sound with $12.5 million in EBITDA in 2024. This strong financial foundation gives the company the confidence to explore new strategies like bitcoin investment.
-
@ 7f6db517:a4931eda
2025-05-27 05:01:33Influencers would have you believe there is an ongoing binance bank run but bitcoin wallet data says otherwise.
- binance wallets are near all time highs
- bitfinex wallets are also trending up
- gemini and coinbase are being hit with massive withdrawals thoughYou should not trust custodians, they can rug you without warning. It is incredibly important you learn how to hold bitcoin yourself, but also consider not blindly trusting influencers with a ref link to shill you.
If you found this post helpful support my work with bitcoin.
-
@ 2f29aa33:38ac6f13
2025-05-17 12:59:01The Myth and the Magic
Picture this: a group of investors, huddled around a glowing computer screen, nervously watching Bitcoin’s price. Suddenly, someone produces a stick-no ordinary stick, but a magical one. With a mischievous grin, they poke the Bitcoin. The price leaps upward. Cheers erupt. The legend of the Bitcoin stick is born.
But why does poking Bitcoin with a stick make the price go up? Why does it only work for a lucky few? And what does the data say about this mysterious phenomenon? Let’s dig in, laugh a little, and maybe learn the secret to market-moving magic.
The Statistical Side of Stick-Poking
Bitcoin’s Price: The Wild Ride
Bitcoin’s price is famous for its unpredictability. In the past year, it’s soared, dipped, and soared again, sometimes gaining more than 50% in just a few months. On a good day, billions of dollars flow through Bitcoin trades, and the price can jump thousands in a matter of hours. Clearly, something is making this happen-and it’s not just spreadsheets and financial news.
What Actually Moves the Price?
-
Scarcity: Only 21 million Bitcoins will ever exist. When more people want in, the price jumps.
-
Big News: Announcements, rumors, and meme-worthy moments can send the price flying.
-
FOMO: When people see Bitcoin rising, they rush to buy, pushing it even higher.
-
Liquidations: When traders betting against Bitcoin get squeezed, it triggers a chain reaction of buying.
But let’s be honest: none of this is as fun as poking Bitcoin with a stick.
The Magical Stick: Not Your Average Twig
Why Not Every Stick Works
You can’t just grab any old branch and expect Bitcoin to dance. The magical stick is a rare artifact, forged in the fires of internet memes and blessed by the spirit of Satoshi. Only a chosen few possess it-and when they poke, the market listens.
Signs You Have the Magical Stick
-
When you poke, Bitcoin’s price immediately jumps a few percent.
-
Your stick glows with meme energy and possibly sparkles with digital dust.
-
You have a knack for timing your poke right after a big event, like a halving or a celebrity tweet.
-
Your stick is rumored to have been whittled from the original blockchain itself.
Why Most Sticks Fail
-
No Meme Power: If your stick isn’t funny, Bitcoin ignores you.
-
Bad Timing: Poking during a bear market just annoys the blockchain.
-
Not Enough Hype: If the bitcoin community isn’t watching, your poke is just a poke.
-
Lack of Magic: Some sticks are just sticks. Sad, but true.
The Data: When the Stick Strikes
Let’s look at some numbers:
-
In the last month, Bitcoin’s price jumped over 20% right after a flurry of memes and stick-poking jokes.
-
Over the past year, every major price surge was accompanied by a wave of internet hype, stick memes, or wild speculation.
-
In the past five years, Bitcoin’s biggest leaps always seemed to follow some kind of magical event-whether a halving, a viral tweet, or a mysterious poke.
Coincidence? Maybe. But the pattern is clear: the stick works-at least when it’s magical.
The Role of Memes, Magic, and Mayhem
Bitcoin’s price is like a cat: unpredictable, easily startled, and sometimes it just wants to be left alone. But when the right meme pops up, or the right stick pokes at just the right time, the price can leap in ways that defy logic.
The bitcoin community knows this. That’s why, when Bitcoin’s stuck in a rut, you’ll see a flood of stick memes, GIFs, and magical thinking. Sometimes, it actually works.
The Secret’s in the Stick (and the Laughs)
So, does poking Bitcoin with a stick really make the price go up? If your stick is magical-blessed by memes, timed perfectly, and watched by millions-absolutely. The statistics show that hype, humor, and a little bit of luck can move markets as much as any financial report.
Next time you see Bitcoin stalling, don’t just sit there. Grab your stick, channel your inner meme wizard, and give it a poke. Who knows? You might just be the next legend in the world of bitcoin magic.
And if your stick doesn’t work, don’t worry. Sometimes, the real magic is in the laughter along the way.
-aco
@block height: 897,104
-
-
@ c1e9ab3a:9cb56b43
2025-05-09 23:10:14I. Historical Foundations of U.S. Monetary Architecture
The early monetary system of the United States was built atop inherited commodity money conventions from Europe’s maritime economies. Silver and gold coins—primarily Spanish pieces of eight, Dutch guilders, and other foreign specie—formed the basis of colonial commerce. These units were already integrated into international trade and piracy networks and functioned with natural compatibility across England, France, Spain, and Denmark. Lacking a centralized mint or formal currency, the U.S. adopted these forms de facto.
As security risks and the practical constraints of physical coinage mounted, banks emerged to warehouse specie and issue redeemable certificates. These certificates evolved into fiduciary media—claims on specie not actually in hand. Banks observed over time that substantial portions of reserves remained unclaimed for years. This enabled fractional reserve banking: issuing more claims than reserves held, so long as redemption demand stayed low. The practice was inherently unstable, prone to panics and bank runs, prompting eventual centralization through the formation of the Federal Reserve in 1913.
Following the Civil War and unstable reinstatements of gold convertibility, the U.S. sought global monetary stability. After World War II, the Bretton Woods system formalized the U.S. dollar as the global reserve currency. The dollar was nominally backed by gold, but most international dollars were held offshore and recycled into U.S. Treasuries. The Nixon Shock of 1971 eliminated the gold peg, converting the dollar into pure fiat. Yet offshore dollar demand remained, sustained by oil trade mandates and the unique role of Treasuries as global reserve assets.
II. The Structure of Fiduciary Media and Treasury Demand
Under this system, foreign trade surpluses with the U.S. generate excess dollars. These surplus dollars are parked in U.S. Treasuries, thereby recycling trade imbalances into U.S. fiscal liquidity. While technically loans to the U.S. government, these purchases act like interest-only transfers—governments receive yield, and the U.S. receives spendable liquidity without principal repayment due in the short term. Debt is perpetually rolled over, rarely extinguished.
This creates an illusion of global subsidy: U.S. deficits are financed via foreign capital inflows that, in practice, function more like financial tribute systems than conventional debt markets. The underlying asset—U.S. Treasury debt—functions as the base reserve asset of the dollar system, replacing gold in post-Bretton Woods monetary logic.
III. Emergence of Tether and the Parastatal Dollar
Tether (USDT), as a private issuer of dollar-denominated tokens, mimics key central bank behaviors while operating outside the regulatory perimeter. It mints tokens allegedly backed 1:1 by U.S. dollars or dollar-denominated securities (mostly Treasuries). These tokens circulate globally, often in jurisdictions with limited banking access, and increasingly serve as synthetic dollar substitutes.
If USDT gains dominance as the preferred medium of exchange—due to technological advantages, speed, programmability, or access—it displaces Federal Reserve Notes (FRNs) not through devaluation, but through functional obsolescence. Gresham’s Law inverts: good money (more liquid, programmable, globally transferable USDT) displaces bad (FRNs) even if both maintain a nominal 1:1 parity.
Over time, this preference translates to a systemic demand shift. Actors increasingly use Tether instead of FRNs, especially in global commerce, digital marketplaces, or decentralized finance. Tether tokens effectively become shadow base money.
IV. Interaction with Commercial Banking and Redemption Mechanics
Under traditional fractional reserve systems, commercial banks issue loans denominated in U.S. dollars, expanding the money supply. When borrowers repay loans, this destroys the created dollars and contracts monetary elasticity. If borrowers repay in USDT instead of FRNs:
- Banks receive a non-Fed liability (USDT).
- USDT is not recognized as reserve-eligible within the Federal Reserve System.
- Banks must either redeem USDT for FRNs, or demand par-value conversion from Tether to settle reserve requirements and balance their books.
This places redemption pressure on Tether and threatens its 1:1 peg under stress. If redemption latency, friction, or cost arises, USDT’s equivalence to FRNs is compromised. Conversely, if banks are permitted or compelled to hold USDT as reserve or regulatory capital, Tether becomes a de facto reserve issuer.
In this scenario, banks may begin demanding loans in USDT, mirroring borrower behavior. For this to occur sustainably, banks must secure Tether liquidity. This creates two options: - Purchase USDT from Tether or on the secondary market, collateralized by existing fiat. - Borrow USDT directly from Tether, using bank-issued debt as collateral.
The latter mirrors Federal Reserve discount window operations. Tether becomes a lender of first resort, providing monetary elasticity to the banking system by creating new tokens against promissory assets—exactly how central banks function.
V. Structural Consequences: Parallel Central Banking
If Tether begins lending to commercial banks, issuing tokens backed by bank notes or collateralized debt obligations: - Tether controls the expansion of broad money through credit issuance. - Its balance sheet mimics a central bank, with Treasuries and bank debt as assets and tokens as liabilities. - It intermediates between sovereign debt and global liquidity demand, replacing the Federal Reserve’s open market operations with its own issuance-redemption cycles.
Simultaneously, if Tether purchases U.S. Treasuries with FRNs received through token issuance, it: - Supplies the Treasury with new liquidity (via bond purchases). - Collects yield on government debt. - Issues a parallel form of U.S. dollars that never require redemption—an interest-only loan to the U.S. government from a non-sovereign entity.
In this context, Tether performs monetary functions of both a central bank and a sovereign wealth fund, without political accountability or regulatory transparency.
VI. Endgame: Institutional Inversion and Fed Redundancy
This paradigm represents an institutional inversion:
- The Federal Reserve becomes a legacy issuer.
- Tether becomes the operational base money provider in both retail and interbank contexts.
- Treasuries remain the foundational reserve asset, but access to them is mediated by a private intermediary.
- The dollar persists, but its issuer changes. The State becomes a fiscal agent of a decentralized financial ecosystem, not its monetary sovereign.
Unless the Federal Reserve reasserts control—either by absorbing Tether, outlawing its instruments, or integrating its tokens into the reserve framework—it risks becoming irrelevant in the daily function of money.
Tether, in this configuration, is no longer a derivative of the dollar—it is the dollar, just one level removed from sovereign control. The future of monetary sovereignty under such a regime is post-national and platform-mediated.
-
@ 9ca447d2:fbf5a36d
2025-05-27 12:01:36Donald Trump’s recent four-day visit took the President to Saudi Arabia, Qatar, and the United Arab Emirates. This visit has intertwined diplomatic relations with business interests, while simultaneously influencing the bitcoin market.
In Qatar, the President met with Emir Tanim bin Hamad Al Thani, resulting in over $243 billion in deals including major defense agreements, according to Bloomberg.
On May 15, the President made his visit to the Sheikh Zayed Grand Mosque in Abu Dhabi alongside Crown Prince Khaled bin Mohamed Al Nahyan. This occurs as the Trump family expands its business presence in the Middle East.
The Trump Organization is developing luxury properties across the region, including Trump Tower Dubai, real estate projects in Riyadh, and development in Jeddah and Oman.
Donald Trump and Mohammed bin Salman in King Khalid International Airport — NBCNews
Eric Trump publicly announced construction plans for Trump Tower Dubai just last month, highlighting the family’s ongoing commercial footprint in the region.
These business connections extend into the digital asset ecosystem as UAE-backed investment firm MGX recently announced it would use USD1, World Liberty Financial’s stablecoin to support a $2 billion investment in Binance, the world’s largest digital asset exchange, according to APNews.
This connection between Trump-aligned interests and major digital asset investments creates a potential avenue for market influence.
Historically, stability in the Middle East, especially among oil-rich nations, reduces global market volatility. This encourages risk appetite among investors, often leading to increased allocations to digital assets like bitcoin.
Middle East diplomacy directly affects global oil prices. Stable oil prices can lower inflation expectations and lead to interest rate cuts by the Fed. Lower rates lead to an increase in liquidity, having positive effects on bitcoin, an asset that benefits from money printing.
Related: Fed Rate Cuts Could Lead to Major Price Swings for Bitcoin
On the investment front, Abu Dhabi’s Wealth Fund, Mubadala Investment Company, has been focused on increasing their shares in BlackRock’s iShares Bitcoin Trust (IBIT).
According to a 13F filing with the U.S. Securities and Exchange Commission, Mubdala held 8.7 million IBIT shares, totaling $408.5 million as of March 31, 2025.
The Abu Dhabi Wealth Fund increased its shares by 500,000 since its last filing in December of 2024.
Back in March, the United States created a Strategic Bitcoin Reserve. The executive order states that the U.S. will not sell the bitcoin they already hold, and will create budget-neutral ways to increase their holdings.
The time has come where governments and wealth funds alike are jumping on board the Bitcoin train.
Trump’s recent visit to the Middle East illustrates how financial, diplomatic, and personal interests are becoming increasingly intertwined with Bitcoin and digital assets, serving as a new axis of influence in the U.S.-Middle East relations.
The combination of diplomatic progress and business expansion has heightened short-term volatility and trading volumes in the bitcoin market.
Trump’s business and digital asset ties in the region may further boost institutional interest and create an opportunity for more players to enter the market.
-
@ 05a0f81e:fc032124
2025-05-27 08:57:45May 27 is not internationally recognized as Universal Children's Day — that date is typically November 20, as declared by the United Nations. However, some countries or regions may celebrate Children's Day on May 27 for local or historical reasons.
Nigeria celebrates Children's Day on May 27 every year. The reason behind this date is rooted in post-independence nation-building efforts. The Nigerian government designated May 27 in the 1960s as a day to promote the rights and welfare of children, celebrate childhood, and reflect on issues affecting them.
Happy children's day !!!
-
@ 7f6db517:a4931eda
2025-05-27 05:01:33For years American bitcoin miners have argued for more efficient and free energy markets. It benefits everyone if our energy infrastructure is as efficient and robust as possible. Unfortunately, broken incentives have led to increased regulation throughout the sector, incentivizing less efficient energy sources such as solar and wind at the detriment of more efficient alternatives.
The result has been less reliable energy infrastructure for all Americans and increased energy costs across the board. This naturally has a direct impact on bitcoin miners: increased energy costs make them less competitive globally.
Bitcoin mining represents a global energy market that does not require permission to participate. Anyone can plug a mining computer into power and internet to get paid the current dynamic market price for their work in bitcoin. Using cellphone or satellite internet, these mines can be located anywhere in the world, sourcing the cheapest power available.
Absent of regulation, bitcoin mining naturally incentivizes the build out of highly efficient and robust energy infrastructure. Unfortunately that world does not exist and burdensome regulations remain the biggest threat for US based mining businesses. Jurisdictional arbitrage gives miners the option of moving to a friendlier country but that naturally comes with its own costs.
Enter AI. With the rapid development and release of AI tools comes the requirement of running massive datacenters for their models. Major tech companies are scrambling to secure machines, rack space, and cheap energy to run full suites of AI enabled tools and services. The most valuable and powerful tech companies in America have stumbled into an accidental alliance with bitcoin miners: THE NEED FOR CHEAP AND RELIABLE ENERGY.
Our government is corrupt. Money talks. These companies will push for energy freedom and it will greatly benefit us all.
Microsoft Cloud hiring to "implement global small modular reactor and microreactor" strategy to power data centers: https://www.datacenterdynamics.com/en/news/microsoft-cloud-hiring-to-implement-global-small-modular-reactor-and-microreactor-strategy-to-power-data-centers/
If you found this post helpful support my work with bitcoin.
-
@ c1e9ab3a:9cb56b43
2025-05-06 14:05:40If you're an engineer stepping into the Bitcoin space from the broader crypto ecosystem, you're probably carrying a mental model shaped by speed, flexibility, and rapid innovation. That makes sense—most blockchain platforms pride themselves on throughput, programmability, and dev agility.
But Bitcoin operates from a different set of first principles. It’s not competing to be the fastest network or the most expressive smart contract platform. It’s aiming to be the most credible, neutral, and globally accessible value layer in human history.
Here’s why that matters—and why Bitcoin is not just an alternative crypto asset, but a structural necessity in the global financial system.
1. Bitcoin Fixes the Triffin Dilemma—Not With Policy, But Protocol
The Triffin Dilemma shows us that any country issuing the global reserve currency must run persistent deficits to supply that currency to the world. That’s not a flaw of bad leadership—it’s an inherent contradiction. The U.S. must debase its own monetary integrity to meet global dollar demand. That’s a self-terminating system.
Bitcoin sidesteps this entirely by being:
- Non-sovereign – no single nation owns it
- Hard-capped – no central authority can inflate it
- Verifiable and neutral – anyone with a full node can enforce the rules
In other words, Bitcoin turns global liquidity into an engineering problem, not a political one. No other system, fiat or crypto, has achieved that.
2. Bitcoin’s “Ossification” Is Intentional—and It's a Feature
From the outside, Bitcoin development may look sluggish. Features are slow to roll out. Code changes are conservative. Consensus rules are treated as sacred.
That’s the point.
When you’re building the global monetary base layer, stability is not a weakness. It’s a prerequisite. Every other financial instrument, app, or protocol that builds on Bitcoin depends on one thing: assurance that the base layer won’t change underneath them without extreme scrutiny.
So-called “ossification” is just another term for predictability and integrity. And when the market does demand change (SegWit, Taproot), Bitcoin’s soft-fork governance process has proven capable of deploying it safely—without coercive central control.
3. Layered Architecture: Throughput Is Not a Base Layer Concern
You don’t scale settlement at the base layer. You build layered systems. Just as TCP/IP doesn't need to carry YouTube traffic directly, Bitcoin doesn’t need to process every microtransaction.
Instead, it anchors:
- Lightning (fast payments)
- Fedimint (community custody)
- Ark (privacy + UTXO compression)
- Statechains, sidechains, and covenants (coming evolution)
All of these inherit Bitcoin’s security and scarcity, while handling volume off-chain, in ways that maintain auditability and self-custody.
4. Universal Assayability Requires Minimalism at the Base Layer
A core design constraint of Bitcoin is that any participant, anywhere in the world, must be able to independently verify the validity of every transaction and block—past and present—without needing permission or relying on third parties.
This property is called assayability—the ability to “test” or verify the authenticity and integrity of received bitcoin, much like verifying the weight and purity of a gold coin.
To preserve this:
- The base layer must remain resource-light, so running a full node stays accessible on commodity hardware.
- Block sizes must remain small enough to prevent centralization of verification.
- Historical data must remain consistent and tamper-evident, enabling proof chains across time and jurisdiction.
Any base layer that scales by increasing throughput or complexity undermines this fundamental guarantee, making the network more dependent on trust and surveillance infrastructure.
Bitcoin prioritizes global verifiability over throughput—because trustless money requires that every user can check the money they receive.
5. Governance: Not Captured, Just Resistant to Coercion
The current controversy around
OP_RETURN
and proposals to limit inscriptions is instructive. Some prominent devs have advocated for changes to block content filtering. Others see it as overreach.Here's what matters:
- No single dev, or team, can force changes into the network. Period.
- Bitcoin Core is not “the source of truth.” It’s one implementation. If it deviates from market consensus, it gets forked, sidelined, or replaced.
- The economic majority—miners, users, businesses—enforce Bitcoin’s rules, not GitHub maintainers.
In fact, recent community resistance to perceived Core overreach only reinforces Bitcoin’s resilience. Engineers who posture with narcissistic certainty, dismiss dissent, or attempt to capture influence are routinely neutralized by the market’s refusal to upgrade or adopt forks that undermine neutrality or openness.
This is governance via credible neutrality and negative feedback loops. Power doesn’t accumulate in one place. It’s constantly checked by the network’s distributed incentives.
6. Bitcoin Is Still in Its Infancy—And That’s a Good Thing
You’re not too late. The ecosystem around Bitcoin—especially L2 protocols, privacy tools, custody innovation, and zero-knowledge integrations—is just beginning.
If you're an engineer looking for:
- Systems with global scale constraints
- Architectures that optimize for integrity, not speed
- Consensus mechanisms that resist coercion
- A base layer with predictable monetary policy
Then Bitcoin is where serious systems engineers go when they’ve outgrown crypto theater.
Take-away
Under realistic, market-aware assumptions—where:
- Bitcoin’s ossification is seen as a stability feature, not inertia,
- Market forces can and do demand and implement change via tested, non-coercive mechanisms,
- Proof-of-work is recognized as the only consensus mechanism resistant to fiat capture,
- Wealth concentration is understood as a temporary distribution effect during early monetization,
- Low base layer throughput is a deliberate design constraint to preserve verifiability and neutrality,
- And innovation is layered by design, with the base chain providing integrity, not complexity...
Then Bitcoin is not a fragile or inflexible system—it is a deliberately minimal, modular, and resilient protocol.
Its governance is not leaderless chaos; it's a negative-feedback structure that minimizes the power of individuals or institutions to coerce change. The very fact that proposals—like controversial OP_RETURN restrictions—can be resisted, forked around, or ignored by the market without breaking the system is proof of decentralized control, not dysfunction.
Bitcoin is an adversarially robust monetary foundation. Its value lies not in how fast it changes, but in how reliably it doesn't—unless change is forced by real, bottom-up demand and implemented through consensus-tested soft forks.
In this framing, Bitcoin isn't a slower crypto. It's the engineering benchmark for systems that must endure, not entertain.
Final Word
Bitcoin isn’t moving slowly because it’s dying. It’s moving carefully because it’s winning. It’s not an app platform or a sandbox. It’s a protocol layer for the future of money.
If you're here because you want to help build that future, you’re in the right place.
nostr:nevent1qqswr7sla434duatjp4m89grvs3zanxug05pzj04asxmv4rngvyv04sppemhxue69uhkummn9ekx7mp0qgs9tc6ruevfqu7nzt72kvq8te95dqfkndj5t8hlx6n79lj03q9v6xcrqsqqqqqp0n8wc2
nostr:nevent1qqsd5hfkqgskpjjq5zlfyyv9nmmela5q67tgu9640v7r8t828u73rdqpr4mhxue69uhkymmnw3ezucnfw33k76tww3ux76m09e3k7mf0qgsvr6dt8ft292mv5jlt7382vje0mfq2ccc3azrt4p45v5sknj6kkscrqsqqqqqp02vjk5
nostr:nevent1qqstrszamvffh72wr20euhrwa0fhzd3hhpedm30ys4ct8dpelwz3nuqpr4mhxue69uhkymmnw3ezucnfw33k76tww3ux76m09e3k7mf0qgs8a474cw4lqmapcq8hr7res4nknar2ey34fsffk0k42cjsdyn7yqqrqsqqqqqpnn3znl
-
@ 5ea46480:450da5bd
2025-05-27 08:23:58Understanding or grasping Nostr can be deceptively difficult. At the very least it is non-trivial. At first glance, looking at NIP-01, the protocol is rather straight forward. But those are just the basics; yes the beauty of Nostr is its ‘simplicity’, but that does not mean the system that results from it is not complex. Conway's Game of Life only has a hand full of rules, yet you can, in theory at least, create any complex system imaginable. And this is where the deception lies; the less you define from the outset, the more you imply on what follows.
It appears that as it stands, Nostr suffers from this deceptiveness. You can reason through all these implications, but that is still an exercise that has to be performed and where mistakes can be made. Worse, this exercise has been a group effort from the start that is still in progress. Currently there is no clear cut ‘authoritative’ example of all the implications that have been ‘discovered’ thus far.
A good example of the implications following Nostr’s primitives is what we now refer to as the ‘outbox model’. The reason we ‘now’ refer to it as such, is because initially it was called the ‘Gossip model’ derived from the client that first implemented the idea. Outbox is fundamental to Nostr, but it was never explicitly stated in the initial protocol description. The result is that roughly five years into this Nostr endeavor, it is still not universally implemented; worse yet, some developers appear to be in no rush to do so. Now the reason they will give you is probably one based on priority, yet I can’t shake the feeling that they apparently don’t ‘get it’.
My point here is not to play some blame game or hold anyone to account. I am just concluding they don’t actually get the new paradigm that we have all stumbled into. To expand on this specific outbox example, its significance only becomes really apparent further along in the ‘reasoning through all the implications’ exercise. In relation to one aspect, but there are more: The point is not ‘just’ censorship-resistance for users, but the freedom for relays that comes with it to apply whatever policy on what they store and make available; it is this discrimination or curation that can add value by making finding relevant information easier in a straightforward manner. But it relies on outbox to avoid isolation; something that only becomes apparent once you are reasoning through all the implications on how we discover and consume content.
To be clear, this piece is not supposed to a crusade on the outbox model, my point here is that there is an inherent logic to Nostr stemming from putting cryptography front and center. It is a logic that has to be applied and will subsequently carry you through all the challenges we face in reconstructing the entirety of the web. This is not to say there is only one obvious path, and different schools of thought are bound to emerge. But it behooves us all, faced with this new paradigm, to continuously reflect on the mental image we have cultivated of what Nostr is; actively re-performing that exercise of exploring the implications this simple set of protocol rules creates.
Unfortunately I can not escape my own folly. After all, I am just an armchair asshole that never wrote a single line of code in his life. Obviously this minds-eye bullshit is not even half the story, the bulk of the effort is translating it into software, the tangible, the real. It is in that effort ultimately the real exploration of this paradigm occurs. All I can do is build castles in the sky.
-
@ 7f6db517:a4931eda
2025-05-27 05:01:32Humanity's Natural State Is Chaos
Without order there is chaos. Humans competing with each other for scarce resources naturally leads to conflict until one group achieves significant power and instates a "monopoly on violence."Power Brings Stability
Power has always been the key means to achieve stability in societies. Centralized power can be incredibly effective in addressing issues such as crime, poverty, and social unrest efficiently. Unfortunately this power is often abused and corrupted.Centralized Power Breeds Tyranny
Centralized power often leads to tyrannical rule. When a select few individuals hold control over a society, they tend to become corrupted. Centralized power structures often lack accountability and transparency, and rely too heavily on trust.Distributed Power Cultivates Freedom
New technology that empowers individuals provide us the ability to rebuild societies from the bottom up. Strong individuals that can defend and provide for themselves will help build strong local communities on a similar foundation. The result is power being distributed throughout society rather than held by a select few.In the short term, relying on trust and centralized power is an easy answer to mitigating chaos, but freedom tech tools provide us the ability to build on top of much stronger distributed foundations that provide stability while also cultivating individual freedom.
The solution starts with us. Empower yourself. Empower others. A grassroots freedom tech movement scaling one person at a time.
If you found this post helpful support my work with bitcoin.
-
@ 7f6db517:a4931eda
2025-05-27 04:01:32What is KYC/AML?
- The acronym stands for Know Your Customer / Anti Money Laundering.
- In practice it stands for the surveillance measures companies are often compelled to take against their customers by financial regulators.
- Methods differ but often include: Passport Scans, Driver License Uploads, Social Security Numbers, Home Address, Phone Number, Face Scans.
- Bitcoin companies will also store all withdrawal and deposit addresses which can then be used to track bitcoin transactions on the bitcoin block chain.
- This data is then stored and shared. Regulations often require companies to hold this information for a set number of years but in practice users should assume this data will be held indefinitely. Data is often stored insecurely, which results in frequent hacks and leaks.
- KYC/AML data collection puts all honest users at risk of theft, extortion, and persecution while being ineffective at stopping crime. Criminals often use counterfeit, bought, or stolen credentials to get around the requirements. Criminals can buy "verified" accounts for as little as $200. Furthermore, billions of people are excluded from financial services as a result of KYC/AML requirements.
During the early days of bitcoin most services did not require this sensitive user data, but as adoption increased so did the surveillance measures. At this point, most large bitcoin companies are collecting and storing massive lists of bitcoiners, our sensitive personal information, and our transaction history.
Lists of Bitcoiners
KYC/AML policies are a direct attack on bitcoiners. Lists of bitcoiners and our transaction history will inevitably be used against us.
Once you are on a list with your bitcoin transaction history that record will always exist. Generally speaking, tracking bitcoin is based on probability analysis of ownership change. Surveillance firms use various heuristics to determine if you are sending bitcoin to yourself or if ownership is actually changing hands. You can obtain better privacy going forward by using collaborative transactions such as coinjoin to break this probability analysis.
Fortunately, you can buy bitcoin without providing intimate personal information. Tools such as peach, hodlhodl, robosats, azteco and bisq help; mining is also a solid option: anyone can plug a miner into power and internet and earn bitcoin by mining privately.
You can also earn bitcoin by providing goods and/or services that can be purchased with bitcoin. Long term, circular economies will mitigate this threat: most people will not buy bitcoin - they will earn bitcoin - most people will not sell bitcoin - they will spend bitcoin.
There is no such thing as KYC or No KYC bitcoin, there are bitcoiners on lists and those that are not on lists.
If you found this post helpful support my work with bitcoin.
-
@ c1e9ab3a:9cb56b43
2025-05-05 14:25:28Introduction: The Power of Fiction and the Shaping of Collective Morality
Stories define the moral landscape of a civilization. From the earliest mythologies to the modern spectacle of global cinema, the tales a society tells its youth shape the parameters of acceptable behavior, the cost of transgression, and the meaning of justice, power, and redemption. Among the most globally influential narratives of the past half-century is the Star Wars saga, a sprawling science fiction mythology that has transcended genre to become a cultural religion for many. Central to this mythos is the arc of Anakin Skywalker, the fallen Jedi Knight who becomes Darth Vader. In Star Wars: Episode III – Revenge of the Sith, Anakin commits what is arguably the most morally abhorrent act depicted in mainstream popular cinema: the mass murder of children. And yet, by the end of the saga, he is redeemed.
This chapter introduces the uninitiated to the events surrounding this narrative turn and explores the deep structural and ethical concerns it raises. We argue that the cultural treatment of Darth Vader as an anti-hero, even a role model, reveals a deep perversion in the collective moral grammar of the modern West. In doing so, we consider the implications this mythology may have on young adults navigating identity, masculinity, and agency in a world increasingly shaped by spectacle and symbolic narrative.
Part I: The Scene and Its Context
In Revenge of the Sith (2005), the third episode of the Star Wars prequel trilogy, the protagonist Anakin Skywalker succumbs to fear, ambition, and manipulation. Convinced that the Jedi Council is plotting against the Republic and desperate to save his pregnant wife from a vision of death, Anakin pledges allegiance to Chancellor Palpatine, secretly the Sith Lord Darth Sidious. Upon doing so, he is given a new name—Darth Vader—and tasked with a critical mission: to eliminate all Jedi in the temple, including its youngest members.
In one of the most harrowing scenes in the film, Anakin enters the Jedi Temple. A group of young children, known as "younglings," emerge from hiding and plead for help. One steps forward, calling him "Master Skywalker," and asks what they are to do. Anakin responds by igniting his lightsaber. The screen cuts away, but the implication is unambiguous. Later, it is confirmed through dialogue and visual allusion that he slaughtered them all.
There is no ambiguity in the storytelling. The man who will become the galaxy’s most feared enforcer begins his descent by murdering defenseless children.
Part II: A New Kind of Evil in Youth-Oriented Media
For decades, cinema avoided certain taboos. Even films depicting war, genocide, or psychological horror rarely crossed the line into showing children as victims of deliberate violence by the protagonist. When children were harmed, it was by monstrous antagonists, supernatural forces, or offscreen implications. The killing of children was culturally reserved for historical atrocities and horror tales.
In Revenge of the Sith, this boundary was broken. While the film does not show the violence explicitly, the implication is so clear and so central to the character arc that its omission from visual depiction does not blunt the narrative weight. What makes this scene especially jarring is the tonal dissonance between the gravity of the act and the broader cultural treatment of Star Wars as a family-friendly saga. The juxtaposition of child-targeted marketing with a central plot involving child murder is not accidental—it reflects a deeper narrative and commercial structure.
This scene was not a deviation from the arc. It was the intended turning point.
Part III: Masculinity, Militarism, and the Appeal of the Anti-Hero
Darth Vader has long been idolized as a masculine icon. His towering presence, emotionless control, and mechanical voice exude power and discipline. Military institutions have quoted him. He is celebrated in memes, posters, and merchandise. Within the cultural imagination, he embodies dominance, command, and strategic ruthlessness.
For many young men, particularly those struggling with identity, agency, and perceived weakness, Vader becomes more than a character. He becomes an archetype: the man who reclaims power by embracing discipline, forsaking emotion, and exacting vengeance against those who betrayed him. The emotional pain that leads to his fall mirrors the experiences of isolation and perceived emasculation that many young men internalize in a fractured society.
The symbolism becomes dangerous. Anakin's descent into mass murder is portrayed not as the outcome of unchecked cruelty, but as a tragic mistake rooted in love and desperation. The implication is that under enough pressure, even the most horrific act can be framed as a step toward a noble end.
Part IV: Redemption as Narrative Alchemy
By the end of the original trilogy (Return of the Jedi, 1983), Darth Vader kills the Emperor to save his son Luke and dies shortly thereafter. Luke mourns him, honors him, and burns his body in reverence. In the final scene, Vader's ghost appears alongside Obi-Wan Kenobi and Yoda—the very men who once considered him the greatest betrayal of their order. He is welcomed back.
There is no reckoning. No mention of the younglings. No memorial to the dead. No consequence beyond his own internal torment.
This model of redemption is not uncommon in Western storytelling. In Christian doctrine, the concept of grace allows for any sin to be forgiven if the sinner repents sincerely. But in the context of secular mass culture, such redemption without justice becomes deeply troubling. The cultural message is clear: even the worst crimes can be erased if one makes a grand enough gesture at the end. It is the erasure of moral debt by narrative fiat.
The implication is not only that evil can be undone by good, but that power and legacy matter more than the victims. Vader is not just forgiven—he is exalted.
Part V: Real-World Reflections and Dangerous Scripts
In recent decades, the rise of mass violence in schools and public places has revealed a disturbing pattern: young men who feel alienated, betrayed, or powerless adopt mythic narratives of vengeance and transformation. They often see themselves as tragic figures forced into violence by a cruel world. Some explicitly reference pop culture, quoting films, invoking fictional characters, or modeling their identities after cinematic anti-heroes.
It would be reductive to claim Star Wars causes such events. But it is equally naive to believe that such narratives play no role in shaping the symbolic frameworks through which vulnerable individuals understand their lives. The story of Anakin Skywalker offers a dangerous script:
- You are betrayed.
- You suffer.
- You kill.
- You become powerful.
- You are redeemed.
When combined with militarized masculinity, institutional failure, and cultural nihilism, this script can validate the darkest impulses. It becomes a myth of sacrificial violence, with the perpetrator as misunderstood hero.
Part VI: Cultural Responsibility and Narrative Ethics
The problem is not that Star Wars tells a tragic story. Tragedy is essential to moral understanding. The problem is how the culture treats that story. Darth Vader is not treated as a warning, a cautionary tale, or a fallen angel. He is merchandised, celebrated, and decontextualized.
By separating his image from his actions, society rebrands him as a figure of cool dominance rather than ethical failure. The younglings are forgotten. The victims vanish. Only the redemption remains. The merchandise continues to sell.
Cultural institutions bear responsibility for how such narratives are presented and consumed. Filmmakers may intend nuance, but marketing departments, military institutions, and fan cultures often reduce that nuance to symbol and slogan.
Conclusion: Reckoning with the Stories We Tell
The story of Anakin Skywalker is not morally neutral. It is a tale of systemic failure, emotional collapse, and unchecked violence. When presented in full, it can serve as a powerful warning. But when reduced to aesthetic dominance and easy redemption, it becomes a tool of moral decay.
The glorification of Darth Vader as a cultural icon—divorced from the horrific acts that define his transformation—is not just misguided. It is dangerous. It trains a generation to believe that power erases guilt, that violence is a path to recognition, and that final acts of loyalty can overwrite the deliberate murder of the innocent.
To the uninitiated, Star Wars may seem like harmless fantasy. But its deepest myth—the redemption of the child-killer through familial love and posthumous honor—deserves scrutiny. Not because fiction causes violence, but because fiction defines the possibilities of how we understand evil, forgiveness, and what it means to be a hero.
We must ask: What kind of redemption erases the cries of murdered children? And what kind of culture finds peace in that forgetting?
-
@ f6488c62:c929299d
2025-05-27 08:18:51เมื่อวันที่ 21 พฤษภาคม 2568 รัฐเท็กซัสได้เดินหน้าอีกขั้นในการสร้างประวัติศาสตร์ด้านคริปโต ด้วยการผ่านร่างกฎหมาย SB 21 ที่จะจัดตั้ง Texas Strategic Bitcoin Reserve หรือ "กองหนุนบิตคอยน์แห่งรัฐเท็กซัส" ผ่านสภาผู้แทนราษฎร ด้วยคะแนนเสียง 101-42
แม้จะเป็นสัญญาณที่ดี แต่คำถามที่หลายคนสงสัยคือ “แล้วเมื่อไรจะเปิดใช้จริง?”
🔧 กระบวนการยังไม่จบ – แต่เข้าใกล้ความจริงมากขึ้น หลังผ่านสภาผู้แทนราษฎร ร่างกฎหมาย SB 21 ต้องกลับไปที่วุฒิสภาอีกครั้ง เพื่อยืนยันการแก้ไขบางประการ เช่น
เปลี่ยนเกณฑ์เลือกเหรียญคริปโตจากมูลค่าตลาดเฉลี่ย 12 เดือน → 24 เดือน
ทำให้ มีเพียง Bitcoin เท่านั้น ที่เข้าเกณฑ์ในตอนนี้
ขณะนี้ คณะกรรมการประชุม (Conference Committee) ได้ถูกตั้งขึ้นเพื่อ “หาจุดลงตัว” ระหว่างทั้งสองสภา โดยจะสรุปร่างสุดท้ายก่อนนำไปลงมติอีกครั้งในทั้งสองสภา
⏳ ณ วันที่ 27 พฤษภาคม 2568 ยังไม่มีข้อมูลความคืบหน้าจากคณะกรรมการประชุม
🖋️ หากผ่านทุกขั้น – เหลือแค่ลายเซ็นเดียว หากร่างกฎหมายที่แก้ไขแล้วได้รับการอนุมัติจากทั้งสองสภา จะถูกส่งไปยัง ผู้ว่าการรัฐ Greg Abbott ซึ่งแสดงจุดยืนสนับสนุนคริปโตมาตลอด
มีแนวโน้มสูงว่าเขาจะ ลงนามอนุมัติภายในเดือนมิถุนายน 2568 โดยเฉพาะเมื่อได้รับแรงสนับสนุนจากทั้งสองพรรค และเสียงจากผู้มีอิทธิพลในวงการคริปโต เช่น Dennis Porter ที่ประเมินโอกาสผ่านอยู่ที่ 99%
💰 แล้วจะเริ่มซื้อ Bitcoin เมื่อไหร่? หากร่างกฎหมายกลายเป็นกฎหมายจริง การจัดตั้งกองหนุนจะอยู่ภายใต้ความรับผิดชอบของ สำนักงานควบคุมบัญชีสาธารณะของรัฐเท็กซัส (Texas Comptroller) โดยจะมีรายละเอียดการดำเนินงาน เช่น:
จัดเก็บ Bitcoin ไว้ใน cold storage
ตรวจสอบทรัพย์สินทุก 2 ปี
รับเงินทุนจากการจัดสรรงบ, การบริจาค และผลตอบแทนจากการถือครอง
เบื้องต้น มีการเสนอจัดสรรเงิน 21 ล้านดอลลาร์ เพื่อเริ่มต้นกองหนุน แม้จะยังไม่ถูกรวมไว้ในร่างงบประมาณของวุฒิสภา
🔮 สรุป: อีกนานไหม? ไม่นาน — แต่ยังไม่ใช่สัปดาห์หน้า
หากคณะกรรมการประชุมสามารถหาข้อตกลงได้เร็ว และไม่มีฝ่ายใดคัดค้านเพิ่มเติม คาดว่า ภายในไตรมาส 3 ปี 2568 เท็กซัสอาจเป็นรัฐแรกของสหรัฐฯ ที่ถือ Bitcoin ไว้เป็นทุนสำรองอย่างเป็นทางการ
เท็กซัสอาจไม่เพียงแค่ “เป็นมิตรต่อคริปโต” แต่กำลังจะกลายเป็น “ธนาคารบิตคอยน์ของรัฐบาลรัฐ” แห่งแรกของโลก
-
@ 7f6db517:a4931eda
2025-05-27 04:01:32The former seems to have found solid product market fit. Expect significant volume, adoption, and usage going forward.
The latter's future remains to be seen. Dependence on Tor, which has had massive reliability issues, and lack of strong privacy guarantees put it at risk.
— ODELL (@ODELL) October 27, 2022
The Basics
- Lightning is a protocol that enables cheap and fast native bitcoin transactions.
- At the core of the protocol is the ability for bitcoin users to create a payment channel with another user.
- These payment channels enable users to make many bitcoin transactions between each other with only two on-chain bitcoin transactions: the channel open transaction and the channel close transaction.
- Essentially lightning is a protocol for interoperable batched bitcoin transactions.
- It is expected that on chain bitcoin transaction fees will increase with adoption and the ability to easily batch transactions will save users significant money.
- As these lightning transactions are processed, liquidity flows from one side of a channel to the other side, on chain transactions are signed by both parties but not broadcasted to update this balance.
- Lightning is designed to be trust minimized, either party in a payment channel can close the channel at any time and their bitcoin will be settled on chain without trusting the other party.
There is no 'Lightning Network'
- Many people refer to the aggregate of all lightning channels as 'The Lightning Network' but this is a false premise.
- There are many lightning channels between many different users and funds can flow across interconnected channels as long as there is a route through peers.
- If a lightning transaction requires multiple hops it will flow through multiple interconnected channels, adjusting the balance of all channels along the route, and paying lightning transaction fees that are set by each node on the route.
Example: You have a channel with Bob. Bob has a channel with Charlie. You can pay Charlie through your channel with Bob and Bob's channel with User C.
- As a result, it is not guaranteed that every lightning user can pay every other lightning user, they must have a route of interconnected channels between sender and receiver.
Lightning in Practice
- Lightning has already found product market fit and usage as an interconnected payment protocol between large professional custodians.
- They are able to easily manage channels and liquidity between each other without trust using this interoperable protocol.
- Lightning payments between large custodians are fast and easy. End users do not have to run their own node or manage their channels and liquidity. These payments rarely fail due to professional management of custodial nodes.
- The tradeoff is one inherent to custodians and other trusted third parties. Custodial wallets can steal funds and compromise user privacy.
Sovereign Lightning
- Trusted third parties are security holes.
- Users must run their own node and manage their own channels in order to use lightning without trusting a third party. This remains the single largest friction point for sovereign lightning usage: the mental burden of actively running a lightning node and associated liquidity management.
- Bitcoin development prioritizes node accessibility so cost to self host your own node is low but if a node is run at home or office, Tor or a VPN is recommended to mask your IP address: otherwise it is visible to the entire network and represents a privacy risk.
- This privacy risk is heightened due to the potential for certain governments to go after sovereign lightning users and compel them to shutdown their nodes. If their IP Address is exposed they are easier to target.
- Fortunately the tools to run and manage nodes continue to get easier but it is important to understand that this will always be a friction point when compared to custodial services.
The Potential Fracture of Lightning
- Any lightning user can choose which users are allowed to open channels with them.
- One potential is that professional custodians only peer with other professional custodians.
- We already see nodes like those run by CashApp only have channels open with other regulated counterparties. This could be due to performance goals, liability reduction, or regulatory pressure.
- Fortunately some of their peers are connected to non-regulated parties so payments to and from sovereign lightning users are still successfully processed by CashApp but this may not always be the case going forward.
Summary
- Many people refer to the aggregate of all lightning channels as 'The Lightning Network' but this is a false premise. There is no singular 'Lightning Network' but rather many payment channels between distinct peers, some connected with each other and some not.
- Lightning as an interoperable payment protocol between professional custodians seems to have found solid product market fit. Expect significant volume, adoption, and usage going forward.
- Lightning as a robust sovereign payment protocol has yet to be battle tested. Heavy reliance on Tor, which has had massive reliability issues, the friction of active liquidity management, significant on chain fee burden for small amounts, interactivity constraints on mobile, and lack of strong privacy guarantees put it at risk.
If you have never used lightning before, use this guide to get started on your phone.
If you found this post helpful support my work with bitcoin.
-
@ f6488c62:c929299d
2025-05-27 07:53:24ในยุคที่เทคโนโลยีควอนตัมคอมพิวเตอร์พัฒนาอย่างรวดเร็ว ผู้ถือ Bitcoin และคริปโตเคอร์เรนซีอื่น ๆ เริ่มเผชิญกับความกังวลใหม่: ความปลอดภัยของคีย์ส่วนตัว (private key) ที่ใช้ควบคุมสินทรัพย์ดิจิทัล ด้วยความสามารถของควอนตัมคอมพิวเตอร์ที่อาจถอดรหัสอัลกอริทึมเข้ารหัสแบบดั้งเดิม เช่น ECDSA (Elliptic Curve Digital Signature Algorithm) ซึ่งเป็นรากฐานของความปลอดภัยใน Bitcoin ความกังวลนี้จึงไม่ใช่เรื่องไกลตัวอีกต่อไป
บทความนี้จะสำรวจความท้าทายที่ผู้ถือคีย์ Bitcoin กำลังเผชิญ และแนวทางที่กำลังพัฒนาเพื่อรับมือภัยคุกคามจากควอนตัมคอมพิวเตอร์ ผ่านการนำ Post-Quantum Cryptography (PQC) มาใช้
ควอนตัมคอมพิวเตอร์: ภัยคุกคามต่อ ECDSA Bitcoin ใช้ ECDSA เพื่อสร้างลายเซ็นดิจิทัลในการยืนยันความถูกต้องของธุรกรรม และปกป้องคีย์ส่วนตัวของผู้ใช้ อัลกอริทึมนี้พึ่งพาความยากของปัญหาทางคณิตศาสตร์ที่เรียกว่า Elliptic Curve Discrete Logarithm Problem ซึ่งคอมพิวเตอร์ทั่วไปไม่สามารถถอดรหัสได้อย่างมีประสิทธิภาพ
อย่างไรก็ตาม อัลกอริทึมของ Shor ซึ่งสามารถทำงานบนควอนตัมคอมพิวเตอร์ที่มีประสิทธิภาพเพียงพอ สามารถถอดรหัส ECDSA ได้ในเวลาอันสั้น ทำให้คีย์ส่วนตัวและสินทรัพย์ของผู้ใช้ตกอยู่ในความเสี่ยง
ตามการคาดการณ์ของ National Institute of Standards and Technology (NIST) ควอนตัมคอมพิวเตอร์ที่มีความสามารถถอดรหัส ECDSA อาจปรากฏภายในปี 2573 หรือเร็วกว่านั้น ทั้งนี้ขึ้นอยู่กับความก้าวหน้าทางเทคโนโลยี แม้ความเสี่ยงนี้จะยังไม่เกิดขึ้นทันที แต่ผู้ถือ Bitcoin ควรตระหนักถึงภัยคุกคามนี้ โดยเฉพาะผู้ที่เก็บ Bitcoin ไว้ในที่อยู่ที่เคยใช้งานและเปิดเผย public key แล้ว เช่น กระเป๋าเงินที่มีธุรกรรมก่อนหน้า ซึ่งทำให้ public key ปรากฏบนบล็อกเชนและอาจตกเป็นเป้าหมายการโจมตีได้ง่ายขึ้น
ความกังวลของผู้ถือคีย์ 1. ความเสี่ยงต่อคีย์ส่วนตัว: หากควอนตัมคอมพิวเตอร์สามารถถอดรหัส ECDSA ได้ ผู้โจมตีอาจใช้ public key ที่เปิดเผยบนบล็อกเชนในการคำนวณหาคีย์ส่วนตัว และขโมย Bitcoin จากกระเป๋าเงิน โดยเฉพาะที่อยู่แบบ Pay-to-Public-Key-Hash (P2PKH) ซึ่งจะเปิดเผย public key เมื่อมีการใช้จ่าย
-
ความล่าช้าในการเปลี่ยนผ่านเทคโนโลยี: การเปลี่ยนไปใช้ระบบเข้ารหัสที่ต้านทานควอนตัม เช่น อัลกอริทึมที่ NIST รับรอง (CRYSTALS-Dilithium, SPHINCS+, CRYSTALS-Kyber, FALCON) ต้องอาศัยเวลาและความร่วมมือจากชุมชน Bitcoin การอัปเกรดโปรโตคอล (hard fork) หรือการย้ายที่อยู่เดิมไปยังที่อยู่ที่ปลอดภัยยิ่งขึ้น (Quantum-Resistant Address Migration Protocol – QRAMP) เป็นกระบวนการที่ซับซ้อนและอาจใช้เวลาหลายปี
-
ความไม่แน่นอนในชุมชน: Bitcoin เป็นระบบกระจายอำนาจ ซึ่งการเปลี่ยนแปลงใหญ่ต้องได้รับความเห็นชอบจากผู้มีส่วนร่วมจำนวนมาก การตัดสินใจเปลี่ยนไปใช้ PQC อาจเจอกับข้อถกเถียง เนื่องจากนักพัฒนาและผู้ใช้บางส่วนอาจไม่เห็นด้วยกับการปรับเปลี่ยนระบบที่ใช้งานมานาน
-
ขนาดของลายเซ็นและประสิทธิภาพ: อัลกอริทึม PQC ส่วนมากมีขนาดคีย์หรือลายเซ็นใหญ่กว่า ECDSA ซึ่งอาจส่งผลต่อประสิทธิภาพของเครือข่ายและต้นทุนการทำธุรกรรม
การตอบสนองของ Bitcoin ต่อภัยควอนตัม แม้จะมีความท้าทาย แต่ชุมชน Bitcoin และนักพัฒนากำลังดำเนินการเพื่อรับมือ ดังนี้:
การสำรวจอัลกอริทึม PQC: นักพัฒนาเริ่มศึกษาการนำอัลกอริทึมอย่าง CRYSTALS-Dilithium และ SPHINCS+ มาใช้ทดแทน ECDSA โดยทั้งสองออกแบบมาให้ทนต่อการโจมตีจากควอนตัมคอมพิวเตอร์ ส่วน CRYSTALS-Kyber เหมาะสำหรับการเข้ารหัสกุญแจ
Quantum-Resistant Address Migration Protocol (QRAMP): มีข้อเสนอให้ใช้โปรโตคอล QRAMP เพื่อย้ายที่อยู่เดิมไปยังที่อยู่ที่ใช้ PQC โดยเฉพาะสำหรับผู้ที่ public key ถูกเปิดเผยแล้ว
การปรับปรุงโปรโตคอล: การนำ PQC มาใช้ในระดับโปรโตคอลอาจต้องมี hard fork นักพัฒนากำลังพยายามหาวิธีที่เปลี่ยนแปลงน้อยที่สุด เช่น ออกแบบ address ใหม่ที่เข้ากันได้กับระบบเดิม
ตัวอย่างจากโครงการอื่น: Quantum Resistant Ledger (QRL) ใช้อัลกอริทึม XMSS ซึ่งเป็นลายเซ็นแบบ hash-based และสามารถต้านทานควอนตัมคอมพิวเตอร์ได้ตั้งแต่แรกเริ่ม แนวทางนี้แสดงให้เห็นว่า Bitcoin สามารถเรียนรู้และประยุกต์ใช้ได้เช่นกัน
แนวทางสำหรับผู้ถือ Bitcoin หลีกเลี่ยงการเปิดเผย public key: ใช้ที่อยู่แบบ Pay-to-Script-Hash (P2SH) หรือ Taproot ที่ป้องกันการเปิดเผย public key จนกว่าจะมีการใช้จ่าย และควรย้ายเหรียญไปยังที่อยู่ใหม่หลังทำธุรกรรม
ติดตามความคืบหน้า PQC: ควรติดตามพัฒนาการของ PQC และข่าวสารเกี่ยวกับการอัปเกรดเครือข่าย เพื่อเตรียมความพร้อม
กระจายความเสี่ยง: อาจพิจารณาลงทุนในบล็อกเชนที่ออกแบบมาเพื่อรองรับภัยคุกคามจากควอนตัม เช่น QRL
ใช้กระเป๋าเงินแบบเย็น (Cold Wallet): เก็บคีย์ส่วนตัวแบบออฟไลน์เพื่อลดความเสี่ยงจากการถูกโจมตี
มองไปสู่อนาคต ภัยจากควอนตัมคอมพิวเตอร์ถือเป็นทั้งความท้าทายและโอกาสของวงการคริปโต การรับรองอัลกอริทึม PQC โดย NIST เมื่อวันที่ 13 สิงหาคม 2567 และ HQC เมื่อวันที่ 11 มีนาคม 2568 ถือเป็นจุดเริ่มต้นของการเปลี่ยนผ่านสู่ระบบเข้ารหัสยุคใหม่
แม้การนำ PQC มาใช้ใน Bitcoin จะยังอยู่ในขั้นเริ่มต้น แต่ความพยายามของชุมชนแสดงให้เห็นถึงความตั้งใจในการปกป้องสินทรัพย์ของผู้ใช้ในระยะยาว สำหรับผู้ถือ Bitcoin การเตรียมพร้อมและติดตามเทคโนโลยีอย่างใกล้ชิดจะช่วยให้มั่นใจได้ว่าสินทรัพย์ของพวกเขาจะปลอดภัย แม้ในโลกยุคควอนตัมที่ใกล้เข้ามา
-
-
@ 9ca447d2:fbf5a36d
2025-05-27 12:01:34Bahrain-based Al Abraaj Restaurants Group has made history by becoming the first publicly-traded company in the Middle East to add bitcoin to its corporate treasury. This is a major step forward for regional bitcoin adoption.
On May 15, 2025, Al Abraaj Restaurants Group, a well-known restaurant chain listed on the Bahrain Bourse, announced it had bought 5 bitcoin (BTC) as part of a new treasury strategy. This makes the company the first in Bahrain, the GCC and the Middle East to officially hold bitcoin as a reserve asset.
Al Abraaj adds bitcoin to its treasury — Zawya
This is a growing trend globally where companies are treating bitcoin not just as an investment but as a long-term store of value. Major companies like Strategy, Tesla and Metaplanet have already done this — and now Al Abraaj is following suit.
Metaplanet recently added 1,241 BTC to its treasury, boosting the company’s holdings above El Salvador’s.
Related: Metaplanet Overtakes El Salvador in Bitcoin Holdings After $126M Purchase
“Our initiative towards becoming a Bitcoin Treasury Company reflects our forward-thinking approach and dedication to maximizing shareholder value,” said Abdulla Isa, Chairman of the Bitcoin Treasury Committee at Al Abraaj.
Al Abraaj’s move is largely inspired by Michael Saylor, Executive Chairman of Strategy, the world’s largest corporate holder of bitcoin. Saylor’s strategy of allocating billions to bitcoin has set a model that other companies — now including Al Abraaj — are following.
A photo shared by the company even showed a meeting between an Al Abraaj representative and Saylor, with the company calling itself the “MicroStrategy of the Middle East”.
“We believe that Bitcoin will play a pivotal role in the future of finance, and we are excited to be at the forefront of this transformation in the Kingdom of Bahrain,” Isa added.
To support its bitcoin initiative, Al Abraaj has partnered with 10X Capital, a New York-based investment firm that specializes in digital assets.
10X Capital has a strong track record in bitcoin treasury strategies, and recently advised Nakamoto Holdings on a $710 million deal — the largest of its kind.
With 10X’s help, Al Abraaj looks to raise more capital and increase its bitcoin holdings over time to maximize bitcoin-per-share for its investors. The company will also develop Sharia-compliant financial instruments so Islamic investors can get exposure to bitcoin in a halal way.
“Bahrain continues to be a leader in the Middle East in Bitcoin adoption,” said Hans Thomas, CEO of 10X Capital. He noted, with a combined GDP of $2.2 trillion and over $6 trillion in sovereign wealth, the GCC now has its first publicly listed bitcoin treasury company.
This is not just a first for Al Abraaj — it’s a first for the region. Bahrain has been positioning itself as a fintech hub and Al Abraaj’s move will encourage more non-fintech companies in the region to look into bitcoin.
The company said the decision was made after thorough due diligence and is in line with the regulations set by the Central Bank of Bahrain (CBB). Al Abraaj will be fully compliant with all digital asset transaction rules, including transparency, security and governance.
A special Bitcoin Committee has been formed to oversee the treasury strategy. It includes experienced bitcoin investors, financial experts and portfolio managers who will manage risk, monitor market conditions and ensure best practices in custody and disclosure.
The initial purchase was 5 BTC, but Al Abraaj sees this as just the beginning. The company stated that there are plans in motion to allocate a significant portion of their treasury into bitcoin over time.
According to the company’s reports, Al Abraaj is financially sound with $12.5 million in EBITDA in 2024. This strong financial foundation gives the company the confidence to explore new strategies like bitcoin investment.
-
@ 7f6db517:a4931eda
2025-05-27 04:01:32Bank run on every crypto bank then bank run on every "real" bank.
— ODELL (@ODELL) December 14, 2022
The four main banks of bitcoin and “crypto” are Signature, Prime Trust, Silvergate, and Silicon Valley Bank. Prime Trust does not custody funds themselves but rather maintains deposit accounts at BMO Harris Bank, Cross River, Lexicon Bank, MVB Bank, and Signature Bank. Silvergate and Silicon Valley Bank have already stopped withdrawals. More banks will go down before the chaos stops. None of them have sufficient reserves to meet withdrawals.
Bitcoin gives us all the ability to opt out of a system that has massive layers of counterparty risk built in, years of cheap money and broken incentives have layered risk on top of risk throughout the entire global economy. If you thought the FTX bank run was painful to watch, I have bad news for you: every major bank in the world is fractional reserve. Bitcoin held in self custody is unique in its lack of counterparty risk, as global market chaos unwinds this will become much more obvious.
The rules of bitcoin are extremely hard to change by design. Anyone can access the network directly without a trusted third party by using their own node. Owning more bitcoin does not give you more control over the network with all participants on equal footing.
Bitcoin is:
- money that is not controlled by a company or government
- money that can be spent or saved without permission
- money that is provably scarce and should increase in purchasing power with adoptionBitcoin is money without trust. Whether you are a nation state, corporation, or an individual, you can use bitcoin to spend or save without permission. Social media will accelerate the already deteriorating trust in our institutions and as this trust continues to crumble the value of trust minimized money will become obvious. As adoption increases so should the purchasing power of bitcoin.
A quick note on "stablecoins," such as USDC - it is important to remember that they rely on trusted custodians. They have the same risk as funds held directly in bank accounts with additional counterparty risk on top. The trusted custodians can be pressured by gov, exit scam, or caught up in fraud. Funds can and will be frozen at will. This is a distinctly different trust model than bitcoin, which is a native bearer token that does not rely on any centralized entity or custodian.
Most bitcoin exchanges have exposure to these failing banks. Expect more chaos and confusion as this all unwinds. Withdraw any bitcoin to your own wallet ASAP.
Simple Self Custody Guide: https://werunbtc.com/muun
More Secure Cold Storage Guide: https://werunbtc.com/coldcard
If you found this post helpful support my work with bitcoin.
-
@ b1ddb4d7:471244e7
2025-05-27 12:01:18Global fintech leader Revolut has announced a landmark partnership with Lightspark, a pioneer in blockchain infrastructure solutions, to integrate bitcoin’s Lightning Network into its platform.
This collaboration, now live for Revolut users in the UK and select European Economic Area (EEA) countries, marks a transformative leap toward frictionless, real-time transactions—eliminating delays and exorbitant fees traditionally associated with digital asset transfers.
Major update: @RevolutApp is now partnering with @lightspark pic.twitter.com/OUblgrj6Xr
— Lightspark (@lightspark) May 7, 2025
Breaking Barriers in Digital Currency Usability
By adopting Lightspark’s cutting-edge technology, Revolut empowers its 40+ million customers to execute bitcoin transactions instantly at a fraction of current costs.
This integration addresses longstanding pain points in digital currency adoption, positioning bitcoin as a practical tool for everyday payments. Users can now seamlessly send, receive, and store bitcoin with the same ease as traditional fiat currencies, backed by Revolut’s secure platform.
The partnership also advances Revolut’s integration into the open Money Grid, a decentralized network enabling universal interoperability between financial platforms.
This move aligns Revolut with forward-thinking fintechs adopting next-gen solutions like Lightning transactions and Universal Money Addresses (UMA), which simplify cross-border payments by replacing complex wallet codes with human-readable addresses (e.g., $john.smith).
Why This Matters
The collaboration challenges conventional payment rails, which often incur delays of days and high fees for cross-border transfers. By contrast, Lightning Network transactions settle in seconds for minimal cost, revolutionizing peer-to-peer payments, remittances, and merchant settlements. For Revolut users, this means:
- Instant transactions: Send bitcoin globally in under three seconds.
- Near-zero fees: Dramatically reduce costs compared to traditional crypto transfers.
- Enhanced utility: Use bitcoin for daily spending, not just as a speculative asset.
The Road Ahead
Revolut plans to expand Lightning Network access to additional markets in 2025, with ambitions to integrate UMA support for seamless fiat and digital currency interactions. Lightspark will continue optimizing its infrastructure to support Revolut’s scaling efforts, further bridging the gap between blockchain innovation and mainstream finance.
About Revolut
Revolut is a global financial app serving over 40 million customers worldwide. Offering services ranging from currency exchange and stock trading to digital assets and insurance, Revolut is committed to building a borderless financial ecosystem.About Lightspark
Founded by former PayPal and Meta executives, Lightspark develops enterprise-grade solutions for the Lightning Network. Its technology stack empowers institutions to harness bitcoin’s speed and efficiency while maintaining regulatory compliance. -
@ 7f6db517:a4931eda
2025-05-27 04:01:31The newly proposed RESTRICT ACT - is being advertised as a TikTok Ban, but is much broader than that, carries a $1M Fine and up to 20 years in prison️! It is unconstitutional and would create massive legal restrictions on the open source movement and free speech throughout the internet.
The Bill was proposed by: Senator Warner, Senator Thune, Senator Baldwin, Senator Fischer, Senator Manchin, Senator Moran, Senator Bennet, Senator Sullivan, Senator Gillibrand, Senator Collins, Senator Heinrich, and Senator Romney. It has broad support across Senators of both parties.
Corrupt politicians will not protect us. They are part of the problem. We must build, support, and learn how to use censorship resistant tools in order to defend our natural rights.
The RESTRICT Act, introduced by Senators Warner and Thune, aims to block or disrupt transactions and financial holdings involving foreign adversaries that pose risks to national security. Although the primary targets of this legislation are companies like Tik-Tok, the language of the bill could potentially be used to block or disrupt cryptocurrency transactions and, in extreme cases, block Americans’ access to open source tools or protocols like Bitcoin.
The Act creates a redundant regime paralleling OFAC without clear justification, it significantly limits the ability for injured parties to challenge actions raising due process concerns, and unlike OFAC it lacks any carve-out for protected speech. COINCENTER ON THE RESTRICT ACT
If you found this post helpful support my work with bitcoin.
-
@ b1ddb4d7:471244e7
2025-05-27 06:00:54Global fintech leader Revolut has announced a landmark partnership with Lightspark, a pioneer in blockchain infrastructure solutions, to integrate bitcoin’s Lightning Network into its platform.
This collaboration, now live for Revolut users in the UK and select European Economic Area (EEA) countries, marks a transformative leap toward frictionless, real-time transactions—eliminating delays and exorbitant fees traditionally associated with digital asset transfers.
Major update: @RevolutApp is now partnering with @lightspark pic.twitter.com/OUblgrj6Xr
— Lightspark (@lightspark) May 7, 2025
Breaking Barriers in Digital Currency Usability
By adopting Lightspark’s cutting-edge technology, Revolut empowers its 40+ million customers to execute bitcoin transactions instantly at a fraction of current costs.
This integration addresses longstanding pain points in digital currency adoption, positioning bitcoin as a practical tool for everyday payments. Users can now seamlessly send, receive, and store bitcoin with the same ease as traditional fiat currencies, backed by Revolut’s secure platform.
The partnership also advances Revolut’s integration into the open Money Grid, a decentralized network enabling universal interoperability between financial platforms.
This move aligns Revolut with forward-thinking fintechs adopting next-gen solutions like Lightning transactions and Universal Money Addresses (UMA), which simplify cross-border payments by replacing complex wallet codes with human-readable addresses (e.g., $john.smith).
Why This Matters
The collaboration challenges conventional payment rails, which often incur delays of days and high fees for cross-border transfers. By contrast, Lightning Network transactions settle in seconds for minimal cost, revolutionizing peer-to-peer payments, remittances, and merchant settlements. For Revolut users, this means:
- Instant transactions: Send bitcoin globally in under three seconds.
- Near-zero fees: Dramatically reduce costs compared to traditional crypto transfers.
- Enhanced utility: Use bitcoin for daily spending, not just as a speculative asset.
The Road Ahead
Revolut plans to expand Lightning Network access to additional markets in 2025, with ambitions to integrate UMA support for seamless fiat and digital currency interactions. Lightspark will continue optimizing its infrastructure to support Revolut’s scaling efforts, further bridging the gap between blockchain innovation and mainstream finance.
About Revolut
Revolut is a global financial app serving over 40 million customers worldwide. Offering services ranging from currency exchange and stock trading to digital assets and insurance, Revolut is committed to building a borderless financial ecosystem.About Lightspark
Founded by former PayPal and Meta executives, Lightspark develops enterprise-grade solutions for the Lightning Network. Its technology stack empowers institutions to harness bitcoin’s speed and efficiency while maintaining regulatory compliance. -
@ 7f6db517:a4931eda
2025-05-27 04:01:31@matt_odell don't you even dare not ask about nostr!
— Kukks (Andrew Camilleri) (@MrKukks) May 18, 2021
Nostr first hit my radar spring 2021: created by fellow bitcoiner and friend, fiatjaf, and released to the world as free open source software. I was fortunate to be able to host a conversation with him on Citadel Dispatch in those early days, capturing that moment in history forever. Since then, the protocol has seen explosive viral organic growth as individuals around the world have contributed their time and energy to build out the protocol and the surrounding ecosystem due to the clear need for better communication tools.
nostr is to twitter as bitcoin is to paypal
As an intro to nostr, let us start with a metaphor:
twitter is paypal - a centralized platform plagued by censorship but has the benefit of established network effects
nostr is bitcoin - an open protocol that is censorship resistant and robust but requires an organic adoption phase
Nostr is an open communication protocol that can be used to send messages across a distributed set of relays in a censorship resistant and robust way.
- Anyone can run a relay.
- Anyone can interact with the protocol.
- Relays can choose which messages they want to relay.
- Users are identified by a simple public private key pair that they can generate themselves.Nostr is often compared to twitter since there are nostr clients that emulate twitter functionality and user interface but that is merely one application of the protocol. Nostr is so much more than a mere twitter competitor. Nostr clients and relays can transmit a wide variety of data and clients can choose how to display that information to users. The result is a revolution in communication with implications that are difficult for any of us to truly comprehend.
Similar to bitcoin, nostr is an open and permissionless protocol. No person, company, or government controls it. Anyone can iterate and build on top of nostr without permission. Together, bitcoin and nostr are incredibly complementary freedom tech tools: censorship resistant, permissionless, robust, and interoperable - money and speech protected by code and incentives, not laws.
As censorship throughout the world continues to escalate, freedom tech provides hope for individuals around the world who refuse to accept the status quo. This movement will succeed on the shoulders of those who choose to stand up and contribute. We will build our own path. A brighter path.
My Nostr Public Key: npub1qny3tkh0acurzla8x3zy4nhrjz5zd8l9sy9jys09umwng00manysew95gx
If you found this post helpful support my work with bitcoin.
-
@ 7f6db517:a4931eda
2025-05-27 04:01:31
"Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world." - Eric Hughes, A Cypherpunk's Manifesto, 1993
Privacy is essential to freedom. Without privacy, individuals are unable to make choices free from surveillance and control. Lack of privacy leads to loss of autonomy. When individuals are constantly monitored it limits our ability to express ourselves and take risks. Any decisions we make can result in negative repercussions from those who surveil us. Without the freedom to make choices, individuals cannot truly be free.
Freedom is essential to acquiring and preserving wealth. When individuals are not free to make choices, restrictions and limitations prevent us from economic opportunities. If we are somehow able to acquire wealth in such an environment, lack of freedom can result in direct asset seizure by governments or other malicious entities. At scale, when freedom is compromised, it leads to widespread economic stagnation and poverty. Protecting freedom is essential to economic prosperity.
The connection between privacy, freedom, and wealth is critical. Without privacy, individuals lose the freedom to make choices free from surveillance and control. While lack of freedom prevents individuals from pursuing economic opportunities and makes wealth preservation nearly impossible. No Privacy? No Freedom. No Freedom? No Wealth.
Rights are not granted. They are taken and defended. Rights are often misunderstood as permission to do something by those holding power. However, if someone can give you something, they can inherently take it from you at will. People throughout history have necessarily fought for basic rights, including privacy and freedom. These rights were not given by those in power, but rather demanded and won through struggle. Even after these rights are won, they must be continually defended to ensure that they are not taken away. Rights are not granted - they are earned through struggle and defended through sacrifice.
If you found this post helpful support my work with bitcoin.
-
@ 52b4a076:e7fad8bd
2025-05-03 21:54:45Introduction
Me and Fishcake have been working on infrastructure for Noswhere and Nostr.build. Part of this involves processing a large amount of Nostr events for features such as search, analytics, and feeds.
I have been recently developing
nosdex
v3, a newer version of the Noswhere scraper that is designed for maximum performance and fault tolerance using FoundationDB (FDB).Fishcake has been working on a processing system for Nostr events to use with NB, based off of Cloudflare (CF) Pipelines, which is a relatively new beta product. This evening, we put it all to the test.
First preparations
We set up a new CF Pipelines endpoint, and I implemented a basic importer that took data from the
nosdex
database. This was quite slow, as it did HTTP requests synchronously, but worked as a good smoke test.Asynchronous indexing
I implemented a high-contention queue system designed for highly parallel indexing operations, built using FDB, that supports: - Fully customizable batch sizes - Per-index queues - Hundreds of parallel consumers - Automatic retry logic using lease expiration
When the scraper first gets an event, it will process it and eventually write it to the blob store and FDB. Each new event is appended to the event log.
On the indexing side, a
Queuer
will read the event log, and batch events (usually 2K-5K events) into one work job. This work job contains: - A range in the log to index - Which target this job is intended for - The size of the job and some other metadataEach job has an associated leasing state, which is used to handle retries and prioritization, and ensure no duplication of work.
Several
Worker
s monitor the index queue (up to 128) and wait for new jobs that are available to lease.Once a suitable job is found, the worker acquires a lease on the job and reads the relevant events from FDB and the blob store.
Depending on the indexing type, the job will be processed in one of a number of ways, and then marked as completed or returned for retries.
In this case, the event is also forwarded to CF Pipelines.
Trying it out
The first attempt did not go well. I found a bug in the high-contention indexer that led to frequent transaction conflicts. This was easily solved by correcting an incorrectly set parameter.
We also found there were other issues in the indexer, such as an insufficient amount of threads, and a suspicious decrease in the speed of the
Queuer
during processing of queued jobs.Along with fixing these issues, I also implemented other optimizations, such as deprioritizing
Worker
DB accesses, and increasing the batch size.To fix the degraded
Queuer
performance, I ran the backfill job by itself, and then started indexing after it had completed.Bottlenecks, bottlenecks everywhere
After implementing these fixes, there was an interesting problem: The DB couldn't go over 80K reads per second. I had encountered this limit during load testing for the scraper and other FDB benchmarks.
As I suspected, this was a client thread limitation, as one thread seemed to be using high amounts of CPU. To overcome this, I created a new client instance for each
Worker
.After investigating, I discovered that the Go FoundationDB client cached the database connection. This meant all attempts to create separate DB connections ended up being useless.
Using
OpenWithConnectionString
partially resolved this issue. (This also had benefits for service-discovery based connection configuration.)To be able to fully support multi-threading, I needed to enabled the FDB multi-client feature. Enabling it also allowed easier upgrades across DB versions, as FDB clients are incompatible across versions:
FDB_NETWORK_OPTION_EXTERNAL_CLIENT_LIBRARY="/lib/libfdb_c.so"
FDB_NETWORK_OPTION_CLIENT_THREADS_PER_VERSION="16"
Breaking the 100K/s reads barrier
After implementing support for the multi-threaded client, we were able to get over 100K reads per second.
You may notice after the restart (gap) the performance dropped. This was caused by several bugs: 1. When creating the CF Pipelines endpoint, we did not specify a region. The automatically selected region was far away from the server. 2. The amount of shards were not sufficient, so we increased them. 3. The client overloaded a few HTTP/2 connections with too many requests.
I implemented a feature to assign each
Worker
its own HTTP client, fixing the 3rd issue. We also moved the entire storage region to West Europe to be closer to the servers.After these changes, we were able to easily push over 200K reads/s, mostly limited by missing optimizations:
It's shards all the way down
While testing, we also noticed another issue: At certain times, a pipeline would get overloaded, stalling requests for seconds at a time. This prevented all forward progress on the
Worker
s.We solved this by having multiple pipelines: A primary pipeline meant to be for standard load, with moderate batching duration and less shards, and high-throughput pipelines with more shards.
Each
Worker
is assigned a pipeline on startup, and if one pipeline stalls, other workers can continue making progress and saturate the DB.The stress test
After making sure everything was ready for the import, we cleared all data, and started the import.
The entire import lasted 20 minutes between 01:44 UTC and 02:04 UTC, reaching a peak of: - 0.25M requests per second - 0.6M keys read per second - 140MB/s reads from DB - 2Gbps of network throughput
FoundationDB ran smoothly during this test, with: - Read times under 2ms - Zero conflicting transactions - No overloaded servers
CF Pipelines held up well, delivering batches to R2 without any issues, while reaching its maximum possible throughput.
Finishing notes
Me and Fishcake have been building infrastructure around scaling Nostr, from media, to relays, to content indexing. We consistently work on improving scalability, resiliency and stability, even outside these posts.
Many things, including what you see here, are already a part of Nostr.build, Noswhere and NFDB, and many other changes are being implemented every day.
If you like what you are seeing, and want to integrate it, get in touch. :)
If you want to support our work, you can zap this post, or register for nostr.land and nostr.build today.
-
@ 7f6db517:a4931eda
2025-05-27 04:01:31People forget Bear Stearns failed March 2008 - months of denial followed before the public realized how bad the situation was under the surface.
Similar happening now but much larger scale. They did not fix fundamental issues after 2008 - everything is more fragile.
The Fed preemptively bailed out every bank with their BTFP program and First Republic Bank still failed. The second largest bank failure in history.
There will be more failures. There will be more bailouts. Depositors will be "protected" by socializing losses across everyone.
Our President and mainstream financial pundits are currently pretending the banking crisis is over while most banks remain insolvent. There are going to be many more bank failures as this ponzi system unravels.
Unlike 2008, we have the ability to opt out of these broken and corrupt institutions by using bitcoin. Bitcoin held in self custody is unique in its lack of counterparty risk - you do not have to trust a bank or other centralized entity to hold it for you. Bitcoin is also incredibly difficult to change by design since it is not controlled by an individual, company, or government - the supply of dollars will inevitably be inflated to bailout these failing banks but bitcoin supply will remain unchanged. I do not need to convince you that bitcoin provides value - these next few years will convince millions.
If you found this post helpful support my work with bitcoin.
-
@ 3642cebe:c8948d8f
2025-05-27 05:29:09O Cuia777 é uma plataforma de entretenimento digital que oferece uma experiência única para jogadores e entusiastas de jogos online. Com uma interface intuitiva, uma vasta seleção de jogos e um ambiente seguro e confiável, a plataforma conquistou um espaço importante no mercado de apostas e jogos virtuais. Neste artigo, vamos explorar as principais características do Cuia777, desde sua introdução até os jogos e a experiência dos jogadores, sem mencionar qualquer referência ao termo "cassino", mas focando em tudo o que torna o Cuia777 uma escolha empolgante.
Plataforma de Entretenimento Completa Cuia777 é uma plataforma robusta que se destaca pelo seu design amigável e fácil navegação. Ao entrar no site, os usuários encontram uma interface organizada e moderna, com todas as informações necessárias ao alcance de um clique. A plataforma foi pensada para oferecer uma experiência fluida tanto para iniciantes quanto para jogadores experientes.
O cuia777também se preocupa com a segurança de seus jogadores. Com a implementação de criptografia de ponta e sistemas avançados de proteção de dados, o site garante que todas as transações e interações dentro da plataforma sejam realizadas de forma segura. Os jogadores podem se concentrar completamente na diversão, sabendo que suas informações pessoais e financeiras estão protegidas.
Variedade de Jogos: Uma Jornada de Diversão e Emoção A plataforma oferece uma enorme variedade de jogos para todos os gostos. Se você é fã de jogos de mesa, como poker, roleta, ou blackjack, encontrará uma seleção diversificada de opções para se divertir. Para os entusiastas de jogos de cartas, o Cuia777 oferece diferentes modalidades e níveis de dificuldade, permitindo que os jogadores testem suas habilidades em confrontos emocionantes.
Além disso, a plataforma oferece uma série de opções de jogos rápidos, como slots e outros jogos eletrônicos, com gráficos de alta qualidade e sons imersivos que tornam a experiência ainda mais envolvente. Seja você um jogador casual ou um expert em busca de desafios, o Cuia777 tem algo especial para oferecer a todos.
Outro aspecto importante é a constante atualização do portfólio de jogos. A plataforma trabalha com desenvolvedores renomados para trazer novos títulos e versões exclusivas, garantindo que os jogadores tenham acesso a conteúdo fresquinho e inovador a qualquer momento. A diversidade de jogos, aliada à alta qualidade das produções, faz com que a experiência seja dinâmica e sempre surpreendente.
Experiência do Jogador: A Diversão no Cuia777 Vai Além dos Jogos O Cuia777 não se limita apenas a oferecer bons jogos; a plataforma também é projetada para proporcionar uma experiência de usuário sem igual. A navegabilidade intuitiva permite que os jogadores encontrem facilmente os jogos que desejam jogar e acompanhem suas preferências e histórico de forma prática. A plataforma também conta com suporte ao cliente eficiente, pronto para ajudar em qualquer dúvida ou problema que possa surgir durante a experiência de jogo.
A comunidade no Cuia777 é outro aspecto que agrega valor à plataforma. Jogadores de todo o Brasil têm a oportunidade de interagir, competir e compartilhar dicas, criando um ambiente acolhedor e divertido. A competitividade saudável e o ambiente amigável fazem com que a experiência de jogar na plataforma seja ainda mais gratificante.
Além disso, o Cuia777 se destaca por oferecer promoções regulares e bônus especiais, que são uma excelente forma de aumentar as chances de diversão. Esses bônus podem ser utilizados em uma ampla gama de jogos, proporcionando ainda mais diversão e a possibilidade de ganhar prêmios ao longo do caminho.
Conclusão: O Cuia777 é a Escolha Certa para quem Busca Diversão Se você está à procura de uma plataforma inovadora e emocionante para se divertir, o Cuia777 é a escolha certa. Com uma interface fácil de usar, uma vasta gama de jogos e uma experiência segura e divertida, ele se destaca como uma das melhores opções para quem busca entretenimento online de qualidade. Não importa se você é um novato ou um veterano, o Cuia777 tem tudo o que você precisa para viver momentos emocionantes e inesquecíveis.
-
@ cae03c48:2a7d6671
2025-05-27 12:01:05Bitcoin Magazine
The Bitcoin Mempool: Relay Network DynamicsIn the last Mempool article, I went over the different kinds of relay policy filters, why they exist, and the incentives that ultimately decide how effective each class of filter is at preventing the confirmation of different classes of transactions. In this piece I’ll be looking at the dynamics of the relay network when some nodes on the network are running different relay policies compared to other nodes.
All else being equal, when nodes on the network are running homogenous relay policies in their mempools, all transactions should propagate across the entire network given that they pay the minimum feerate necessary not to be evicted from a node’s mempool during times of large transaction backlogs. This changes when different nodes on the network are running heterogenous policies.
The Bitcoin relay network operates on a best effort basis, using what is called a flood-fill architecture. This means that when a transaction is received by one node, it is forwarded to every other node it is connected to except the one that it received the transaction from. This is a highly inefficient network architecture, but in the context of a decentralized system it provides a high degree of guarantee that the transaction will eventually reach its intended destination, the miners.
Introducing filters in a node’s relay policy to restrict the relaying of otherwise valid transactions in theory introduces friction to the propagation of that transaction, and degrades the reliability of the network’s ability to perform this function. In practice, things aren’t that simple.
How Much Friction Prevents Propagation
Let’s look at a simplified example of different network node compositions. In the following graphics blue nodes represent ones that will propagate some arbitrary class of consensus valid transactions, and red nodes represent ones that will not propagate those transactions. The collective set of miners is denoted in the center as a simple representation of where transacting users ultimately want their transactions to wind up so as to eventually be confirmed in the blockchain.
This is a model of the network in which the nodes refusing to propagate these transactions are a clear minority. As you can clearly see, any node on the network that accepts them has a clear path to relay them to the miners. The two nodes attempting to restrict the transactions propagation across the network have no effect on their eventual receipt by miners’ nodes.
In this diagram, you can see that almost half of the example network is instituting filtering policies for this class of transactions. Despite this, only part of the network that propagates these transactions is cut off from a path to miners. The rest of the nodes not filtering still have a clear path to miners. This has introduced some degree of friction for a subset of users, but the others can still freely engage in propagating these transactions.
Even for the users that are affected by filtering nodes, only a single connection to the rest of the network nodes that are not cut off from miners (or a direct connection to a miner) is necessary in order for that friction to be removed. If the real relay network were to have a similar composition to this example, all it would take is a single new connection to alleviate the problem.
In this scenario, only a tiny minority of the network is actually propagating these transactions. The rest of the network is engaging in filtering policies to prevent their propagation. Even in this case however, those nodes that are not filtering still have a clear path to propagate them to miners.
Only this tiny minority of non-filtering nodes is necessary in order to ensure their eventual propagation to miners. Preferential peering logic, i.e. functionality to ensure that your node prefers peers who implement the same software version or relay policies. These types of solutions can guarantee that peers who will propagate something to others won’t find each other and maintain connections amongst themselves across the network.
The Tolerant Minority
As you can see looking at these different examples, even in the face of an overwhelming majority of the public network engaging in filtering of a specific class of transactions, all that is necessary for them to successfully propagate across the network to miners is a small minority of the network to propagate and relay them.
These nodes will essentially, through whatever technical mechanism, create a “sub-network” within the larger public relay network in order to guarantee that there are viable paths from users engaging in these types of transactions to the miners willing to include them in their blocks.
There is essentially nothing that can be done to counter this dynamic except to engage in a sybil attack against all of these nodes, and sybil attacks only need a single honest connection in order to be completely defeated. As well, an honest node creating a very large number of connections with other nodes on the network can raise the cost of such a sybil attack exorbitantly. The more connections it creates, the more sybil nodes must be spun up in order to consume all of its connection slots.
What If There Is No Minority?
So what if there is no Tolerant Minority? What will happen to this class of transactions in that case?
If users still want to make them and pay fees to miners for them, they will be confirmed. Miners will simply set up an API. The role of miners is to confirm transactions, and the reason they do so is to maximize profit. Miners are not selfless entities, or morally or ideologically motivated, they are a business. They exist to make money.
If users exist that are willing to pay them money for a certain type of transaction, and the entirety of the public relay network is refusing to propagate those transactions to miners in order to include them in blocks, miners will create another way for users to submit those transactions to them.
It is simply the rational move to make as a profit motivated actor when customers exist that wish to pay you money.
Relay Policy Is Not A Replacement For Consensus
At the end of the day, relay policy cannot successfully censor transactions if they are consensus valid, users are willing to pay for them, and miners do not have some extenuating circumstances to turn down the fees users are willing to pay (such as causing material damage or harm to nodes on the network, i.e. crashing nodes, propagating blocks that take hours to verify on a consumer PC, etc.).
If some class of transactions is truly seen as undesirable by Bitcoin users and node operators, there is no solution to stopping them from being confirmed in the blockchain short of enacting a consensus change to make them invalid.
If it were possible to simply prevent transactions from being confirmed by filtering policies implemented on the relay network, then Bitcoin would not be censorship resistant.
This post The Bitcoin Mempool: Relay Network Dynamics first appeared on Bitcoin Magazine and is written by Shinobi.
-
@ 7f6db517:a4931eda
2025-05-27 04:01:31Bank run on every crypto bank then bank run on every "real" bank.
— ODELL (@ODELL) December 14, 2022
Good morning.
It looks like PacWest will fail today. It will be both the fifth largest bank failure in US history and the sixth major bank to fail this year. It will likely get purchased by one of the big four banks in a government orchestrated sale.
March 8th - Silvergate Bank
March 10th - Silicon Valley Bank
March 12th - Signature Bank
March 19th - Credit Suisse
May 1st - First Republic Bank
May 4th - PacWest Bank?PacWest is the first of many small regional banks that will go under this year. Most will get bought by the big four in gov orchestrated sales. This has been the playbook since 2008. Follow the incentives. Massive consolidation across the banking industry. PacWest gonna be a drop in the bucket compared to what comes next.
First, a hastened government led bank consolidation, then a public/private partnership with the remaining large banks to launch a surveilled and controlled digital currency network. We will be told it is more convenient. We will be told it is safer. We will be told it will prevent future bank runs. All of that is marketing bullshit. The goal is greater control of money. The ability to choose how we spend it and how we save it. If you control the money - you control the people that use it.
If you found this post helpful support my work with bitcoin.
-
@ 3642cebe:c8948d8f
2025-05-27 05:28:43O 222g é uma plataforma online inovadora que oferece uma experiência única para jogadores que buscam se divertir com uma vasta gama de opções de jogos. Se você está em busca de uma plataforma segura, intuitiva e repleta de diversão, o 222g é a escolha ideal. Com foco em entregar uma experiência de alta qualidade, o site proporciona uma navegação fácil, jogos emocionantes e diversas opções para que todos os gostos sejam atendidos.
Introdução à Plataforma 222g A plataforma 222g foi criada para trazer uma experiência online moderna e prática, pensando no conforto e na diversão de seus usuários. A interface do site é intuitiva e de fácil navegação, o que torna a experiência do jogador agradável desde o momento em que ele acessa o site. Além disso, o 222g é compatível com diferentes dispositivos, o que permite aos jogadores aproveitarem seus jogos favoritos tanto no desktop quanto em smartphones e tablets.
Com uma plataforma segura, o 222gprioriza a proteção das informações de seus usuários, utilizando as tecnologias mais avançadas de criptografia e segurança de dados. O site segue as melhores práticas de segurança, garantindo que os jogadores possam se divertir sem preocupações com a proteção de suas informações pessoais e financeiras.
A plataforma oferece um suporte eficiente e acessível, com uma equipe pronta para ajudar sempre que necessário. Seja para tirar dúvidas ou resolver algum imprevisto, o atendimento ao cliente é um dos grandes diferenciais do 222g, com um time dedicado a oferecer soluções rápidas e eficazes.
Variedade de Jogos no 222g Uma das maiores vantagens do 222g é sua vasta oferta de jogos, com opções para todos os gostos e preferências. O site conta com uma coleção impressionante de títulos de diferentes categorias, incluindo jogos de mesa, máquinas de jogos, jogos de cartas e até opções de estilo arcade. Com tantos jogos disponíveis, os jogadores podem escolher entre opções clássicas ou mais modernas, sempre com a garantia de diversão e emoção.
Os jogos oferecidos na plataforma são desenvolvidos por grandes fornecedores de software de renome internacional, o que garante não apenas uma jogabilidade de alta qualidade, mas também uma excelente performance e gráficos impressionantes. Além disso, todos os jogos do 222g possuem um sistema justo, assegurando que cada rodada ou partida seja determinada de forma imparcial e transparente.
A Experiência do Jogador no 222g No 222g, a experiência do jogador é o que mais importa. A plataforma foi projetada para oferecer um ambiente amigável, onde os jogadores podem se sentir à vontade e concentrados na diversão. O layout do site é clean, facilitando o acesso rápido aos jogos e outras seções importantes, como promoções, informações sobre bônus e métodos de pagamento.
Os jogadores também têm a oportunidade de aproveitar diversas promoções e bônus, que tornam a experiência ainda mais interessante. Com uma série de recompensas, o 222g mantém os jogadores engajados e motivados a explorar os diversos jogos disponíveis, sempre oferecendo novas oportunidades de ganhar prêmios e bônus exclusivos.
Além disso, a plataforma conta com uma comunidade ativa de jogadores, proporcionando um ambiente interativo onde é possível compartilhar experiências e dicas com outros usuários. A possibilidade de se conectar com outros jogadores e fazer novas amizades também faz parte da experiência de jogo oferecida pelo 222g.
Outro ponto positivo é a velocidade e a estabilidade do site. O 222g garante que seus jogadores tenham acesso rápido aos jogos, sem enfrentar lags ou quedas de conexão. Isso é fundamental para uma experiência de jogo fluida e sem interrupções, permitindo que os jogadores se concentrem apenas na diversão e nas suas estratégias.
Conclusão Se você está procurando uma plataforma online confiável, divertida e cheia de opções de entretenimento, o 222g é uma excelente escolha. Com uma interface fácil de usar, uma vasta gama de jogos e uma experiência de jogador excepcional, a plataforma se destaca como uma das melhores opções do mercado. Junte-se à comunidade 222g hoje mesmo e descubra um novo mundo de diversão e possibilidades!
-
@ c1e9ab3a:9cb56b43
2025-05-01 17:29:18High-Level Overview
Bitcoin developers are currently debating a proposed change to how Bitcoin Core handles the
OP_RETURN
opcode — a mechanism that allows users to insert small amounts of data into the blockchain. Specifically, the controversy revolves around removing built-in filters that limit how much data can be stored using this feature (currently capped at 80 bytes).Summary of Both Sides
Position A: Remove OP_RETURN Filters
Advocates: nostr:npub1ej493cmun8y9h3082spg5uvt63jgtewneve526g7e2urca2afrxqm3ndrm, nostr:npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg, nostr:npub17u5dneh8qjp43ecfxr6u5e9sjamsmxyuekrg2nlxrrk6nj9rsyrqywt4tp, others
Arguments: - Ineffectiveness of filters: Filters are easily bypassed and do not stop spam effectively. - Code simplification: Removing arbitrary limits reduces code complexity. - Permissionless innovation: Enables new use cases like cross-chain bridges and timestamping without protocol-level barriers. - Economic regulation: Fees should determine what data gets added to the blockchain, not protocol rules.
Position B: Keep OP_RETURN Filters
Advocates: nostr:npub1lh273a4wpkup00stw8dzqjvvrqrfdrv2v3v4t8pynuezlfe5vjnsnaa9nk, nostr:npub1s33sw6y2p8kpz2t8avz5feu2n6yvfr6swykrnm2frletd7spnt5qew252p, nostr:npub1wnlu28xrq9gv77dkevck6ws4euej4v568rlvn66gf2c428tdrptqq3n3wr, others
Arguments: - Historical intent: Satoshi included filters to keep Bitcoin focused on monetary transactions. - Resource protection: Helps prevent blockchain bloat and abuse from non-financial uses. - Network preservation: Protects the network from being overwhelmed by low-value or malicious data. - Social governance: Maintains conservative changes to ensure long-term robustness.
Strengths and Weaknesses
Strengths of Removing Filters
- Encourages decentralized innovation.
- Simplifies development and maintenance.
- Maintains ideological purity of a permissionless system.
Weaknesses of Removing Filters
- Opens the door to increased non-financial data and potential spam.
- May dilute Bitcoin’s core purpose as sound money.
- Risks short-term exploitation before economic filters adapt.
Strengths of Keeping Filters
- Preserves Bitcoin’s identity and original purpose.
- Provides a simple protective mechanism against abuse.
- Aligns with conservative development philosophy of Bitcoin Core.
Weaknesses of Keeping Filters
- Encourages central decision-making on allowed use cases.
- Leads to workarounds that may be less efficient or obscure.
- Discourages novel but legitimate applications.
Long-Term Consequences
If Filters Are Removed
- Positive: Potential boom in new applications, better interoperability, cleaner architecture.
- Negative: Risk of increased blockchain size, more bandwidth/storage costs, spam wars.
If Filters Are Retained
- Positive: Preserves monetary focus and operational discipline.
- Negative: Alienates developers seeking broader use cases, may ossify the protocol.
Conclusion
The debate highlights a core philosophical split in Bitcoin: whether it should remain a narrow monetary system or evolve into a broader data layer for decentralized applications. Both paths carry risks and tradeoffs. The outcome will shape not just Bitcoin's technical direction but its social contract and future role in the broader crypto ecosystem.
-
@ 52b4a076:e7fad8bd
2025-04-28 00:48:57I have been recently building NFDB, a new relay DB. This post is meant as a short overview.
Regular relays have challenges
Current relay software have significant challenges, which I have experienced when hosting Nostr.land: - Scalability is only supported by adding full replicas, which does not scale to large relays. - Most relays use slow databases and are not optimized for large scale usage. - Search is near-impossible to implement on standard relays. - Privacy features such as NIP-42 are lacking. - Regular DB maintenance tasks on normal relays require extended downtime. - Fault-tolerance is implemented, if any, using a load balancer, which is limited. - Personalization and advanced filtering is not possible. - Local caching is not supported.
NFDB: A scalable database for large relays
NFDB is a new database meant for medium-large scale relays, built on FoundationDB that provides: - Near-unlimited scalability - Extended fault tolerance - Instant loading - Better search - Better personalization - and more.
Search
NFDB has extended search capabilities including: - Semantic search: Search for meaning, not words. - Interest-based search: Highlight content you care about. - Multi-faceted queries: Easily filter by topic, author group, keywords, and more at the same time. - Wide support for event kinds, including users, articles, etc.
Personalization
NFDB allows significant personalization: - Customized algorithms: Be your own algorithm. - Spam filtering: Filter content to your WoT, and use advanced spam filters. - Topic mutes: Mute topics, not keywords. - Media filtering: With Nostr.build, you will be able to filter NSFW and other content - Low data mode: Block notes that use high amounts of cellular data. - and more
Other
NFDB has support for many other features such as: - NIP-42: Protect your privacy with private drafts and DMs - Microrelays: Easily deploy your own personal microrelay - Containers: Dedicated, fast storage for discoverability events such as relay lists
Calcite: A local microrelay database
Calcite is a lightweight, local version of NFDB that is meant for microrelays and caching, meant for thousands of personal microrelays.
Calcite HA is an additional layer that allows live migration and relay failover in under 30 seconds, providing higher availability compared to current relays with greater simplicity. Calcite HA is enabled in all Calcite deployments.
For zero-downtime, NFDB is recommended.
Noswhere SmartCache
Relays are fixed in one location, but users can be anywhere.
Noswhere SmartCache is a CDN for relays that dynamically caches data on edge servers closest to you, allowing: - Multiple regions around the world - Improved throughput and performance - Faster loading times
routerd
routerd
is a custom load-balancer optimized for Nostr relays, integrated with SmartCache.routerd
is specifically integrated with NFDB and Calcite HA to provide fast failover and high performance.Ending notes
NFDB is planned to be deployed to Nostr.land in the coming weeks.
A lot more is to come. 👀️️️️️️
-
@ c1e9ab3a:9cb56b43
2025-04-25 00:37:34If you ever read about a hypothetical "evil AI"—one that manipulates, dominates, and surveils humanity—you might find yourself wondering: how is that any different from what some governments already do?
Let’s explore the eerie parallels between the actions of a fictional malevolent AI and the behaviors of powerful modern states—specifically the U.S. federal government.
Surveillance and Control
Evil AI: Uses total surveillance to monitor all activity, predict rebellion, and enforce compliance.
Modern Government: Post-9/11 intelligence agencies like the NSA have implemented mass data collection programs, monitoring phone calls, emails, and online activity—often without meaningful oversight.
Parallel: Both claim to act in the name of “security,” but the tools are ripe for abuse.
Manipulation of Information
Evil AI: Floods the information space with propaganda, misinformation, and filters truth based on its goals.
Modern Government: Funds media outlets, promotes specific narratives through intelligence leaks, and collaborates with social media companies to suppress or flag dissenting viewpoints.
Parallel: Control the narrative, shape public perception, and discredit opposition.
Economic Domination
Evil AI: Restructures the economy for efficiency, displacing workers and concentrating resources.
Modern Government: Facilitates wealth transfer through lobbying, regulatory capture, and inflationary monetary policy that disproportionately hurts the middle and lower classes.
Parallel: The system enriches those who control it, leaving the rest with less power to resist.
Perpetual Warfare
Evil AI: Instigates conflict to weaken opposition or as a form of distraction and control.
Modern Government: Maintains a state of nearly constant military engagement since WWII, often for interests that benefit a small elite rather than national defense.
Parallel: War becomes policy, not a last resort.
Predictive Policing and Censorship
Evil AI: Uses predictive algorithms to preemptively suppress dissent and eliminate threats.
Modern Government: Experiments with pre-crime-like measures, flags “misinformation,” and uses AI tools to monitor online behavior.
Parallel: Prevent rebellion not by fixing problems, but by suppressing their expression.
Conclusion: Systemic Inhumanity
Whether it’s AI or a bureaucratic state, the more a system becomes detached from individual accountability and human empathy, the more it starts to act in ways we would call “evil” if a machine did them.
An AI doesn’t need to enslave humanity with lasers and killer robots. Sometimes all it takes is code, coercion, and unchecked power—something we may already be facing.
-
@ 3642cebe:c8948d8f
2025-05-27 05:28:18A 6699bet é uma plataforma de entretenimento digital que oferece uma experiência única aos seus usuários, proporcionando uma variedade de jogos e atividades interativas. Com uma interface amigável e diversas opções de jogos, ela se destaca como uma das melhores opções para quem busca diversão e emoção no mundo digital. Se você ainda não conheceu a plataforma, é hora de descobrir tudo o que ela tem a oferecer e como pode transformar seu tempo livre em momentos de pura diversão.
Uma Plataforma Inovadora e Acessível A 6699bet foi desenvolvida para proporcionar uma experiência de entretenimento online inovadora e fácil de navegar. Desde o primeiro acesso, o usuário se depara com uma interface intuitiva, ideal para iniciantes e também para jogadores mais experientes. A plataforma é compatível com diferentes dispositivos, permitindo que os usuários acessem suas contas e jogos preferidos de qualquer lugar, seja no computador ou em dispositivos móveis.
Além disso, a 6699betse preocupa com a segurança e a proteção de seus usuários. A plataforma utiliza tecnologia de ponta para garantir transações seguras, a proteção de dados pessoais e a integridade do ambiente digital, proporcionando um espaço confiável para todos.
Uma Variedade de Jogos para Todos os Gostos O grande atrativo da 6699bet é a variedade de jogos que ela oferece. A plataforma conta com uma extensa gama de opções, permitindo que os jogadores escolham o que mais se adequa ao seu perfil. Se você é fã de jogos de habilidade, como poker e blackjack, ou prefere algo mais simples e divertido, como jogos de slots, a 6699bet tem algo para todos.
A seção de jogos de mesa é uma das mais procuradas. Aqui, os jogadores podem testar suas habilidades em jogos desafiadores, como blackjack e roleta, onde a estratégia e a sorte se combinam para oferecer grandes chances de vitória. Já para quem gosta de algo mais rápido e empolgante, os jogos de slots e caça-níqueis são a escolha ideal. Com gráficos de alta qualidade e temas variados, esses jogos proporcionam uma experiência imersiva e cheia de emoção.
Além disso, a 6699bet também conta com jogos ao vivo, que permitem aos jogadores interagir com dealers reais e competir em tempo real. Isso traz uma sensação de realidade e cria uma atmosfera ainda mais envolvente, fazendo com que a experiência de jogo se torne ainda mais emocionante.
A Experiência do Jogador na 6699bet O que realmente distingue a 6699bet das outras plataformas é a atenção à experiência do jogador. A plataforma oferece um atendimento ao cliente excepcional, disponível 24 horas por dia, 7 dias por semana, para garantir que todas as dúvidas sejam resolvidas rapidamente. Se você encontrar qualquer problema técnico ou precisar de ajuda em relação a pagamentos ou bônus, a equipe de suporte está pronta para ajudar.
Além disso, a 6699bet valoriza a experiência personalizada. Com promoções e bônus regulares, os jogadores podem aproveitar ofertas exclusivas, aumentando suas chances de ganhar e aproveitando ainda mais a plataforma. Os jogadores também têm acesso a recursos como jogos gratuitos, onde é possível treinar e aprender as regras sem compromisso financeiro.
Outro ponto positivo é a comunidade ativa de jogadores. A 6699bet promove uma atmosfera amigável, onde os jogadores podem interagir, trocar experiências e até participar de torneios e competições. Isso cria um senso de pertencimento e faz com que os jogadores se sintam parte de algo maior, além de aumentar a competitividade e o prazer durante os jogos.
Conclusão A 6699bet é, sem dúvida, uma das melhores plataformas de entretenimento online disponíveis atualmente. Com uma vasta seleção de jogos, uma interface amigável, promoções atrativas e um atendimento ao cliente de excelência, a plataforma oferece uma experiência de jogo completa e emocionante. Se você está procurando por uma maneira divertida e segura de passar o tempo, a 6699bet é a escolha ideal. Não perca a chance de explorar tudo o que ela tem a oferecer e se divertir de uma forma inovadora e envolvente.
-
@ 1d7ff02a:d042b5be
2025-05-27 02:56:33ສຳລັບໃຜທີ່ຍັງບໍ່ເຂົ້າໃຈ Bitcoin ຢ່າງແທ້ຈິງ, ຫມາຍຄວາມວ່າເຈົ້າຍັງບໍ່ທັນເຂົ້າໃຈວ່າເງິນແມ່ນຫຍັງ, ໃຜເປັນຜູ້ສ້າງມັນ, ແລະເປັນຫຍັງມະນຸດຈຶ່ງຕ້ອງການເງິນ. ມັນເປັນເລື່ອງ scam ທີ່ລະບົບການສຶກສາບໍ່ໄດ້ສອນເລື່ອງສຳຄັນນີ້, ໃນຂະນະທີ່ພວກເຮົາໃຊ້ເວລາເກືອບທັງຊີວິດເພື່ອຫາເງິນ. ດັ່ງນັ້ນ, ຂໍແນະນຳໃຫ້ follow the money ແລະ ສຶກສາ Bitcoin ຢ່າງຈິງຈັງ.
Why Bitcoin Matters
Saving is the greatest discovery in human history
ກ່ອນທີ່ມະນຸດຈະຮຽນຮູ້ການເກັບອອມ, ພວກເຮົາເປັນພຽງແຕ່ສັດທີ່ມີຊີວິດຢູ່ແບບວັນຕໍ່ວັນ. ການປະຢັດແມ່ນສິ່ງທີ່ເຮັດໃຫ້ມະນຸດແຕກຕ່າງຈາກສັດອື່ນ — ຄວາມສາມາດໃນການຄິດກ່ຽວກັບອະນາຄົດ ແລະ ເກັບໄວ້ສຳລັບມື້ຫຼັງ.
Saving created civilization itself
ບໍ່ມີການເກັບອອມ, ບໍ່ມີການສ້າງເມືອງ, ບໍ່ມີວິທະຍາສາດ, ບໍ່ມີສິລະປະ. ທຸກສິ່ງທີ່ເຮົາເອີ້ນວ່າ "ຄວາມກ້າວໜ້າ" ແມ່ນມາຈາກຄວາມສາມາດໃນການຮູ້ຈັກເກັບອອມ.
Money is the greatest creation in human history
ມັນເປັນເຄື່ອງມືທີ່ເຮັດໃຫ້ອາລະຍະທຳມະນຸດກ້າວໜ້າມາເຖິງທຸກມື້ນີ້ ເງິນ ເປັນເຄື່ອງມືທີ່ດີທີ່ສຸດທີ່ມະນຸດໃຊ້ໃນການເກັບອອມ.
Bitcoin is the best money ever created
ມັນແມ່ນເງິນທີ່ສົມບູນແບບທີ່ສຸດທີ່ມະນຸດເຄີຍສ້າງຂຶ້ນມາ. ບໍ່ມີໃຜສາມາດ ຄວບຄຸມ, ຈັດການ, ທຳລາຍ ແລະ ມີຈຳກັດຢ່າງແທ້ຈິງ ຄືກັບເວລາໃນຊີວິດ.
Bitcoin ຄືກັບ black hole
ທີ່ຈະດູດເອົາມູນຄ່າທັງໝົດຈາກລະບົບການເງິນທີ່ເສຍຫາຍມັນຈະດູດເອົາຄວາມໝັ້ນຄົງແລະມູນຄ່າມາສູ່ຕົວມັນເອງ. ທຸກສິ່ງທີ່ມີມູນຄ່າຈະໄຫຼເຂົ້າສູ່ Bitcoin ໃນທີ່ສຸດ.
Bitcoin ຄືກັບສາດສະໜາພຸດທີ່ຄົ້ນພົບຄວາມຈິງ
ມັນເຮັດໃຫ້ເຂົ້າໃຈຕົ້ນຕໍບັນຫາຂອງລະບົບການເງິນປະຈຸບັນ ແລະ ເກີດເປັນບັນຫາຫລາຍໆຢ່າງໃນສັງຄົມ ດັ່ງກັບພະພຸດທະເຈົ້າທີ່ເຂົ້າໃຈທຸກ ແລະ ເຫດຂອງການເກີດທຸກ.
Bitcoin ຄືອິດສະຫຼະພາບ
ເງິນຄືອຳນາດ, ເງິນຄືສິ່ງຄວບຄຸມພຶດຕິກຳຂອງມະນຸດ ເມື່ອເຮົາມີເງິນທີ່ຮັກສາມູນຄ່າໄດ້ ແລະ ຄວບຄຸມບໍ່ໄດ້ ຈຶ່ງຈະມີຄວາມອິດສະຫຼະທາງຄວາມຄິດ, ການສະແດງອອກ, ແລະ ອຳນາດໃນການເລືອກ.
ຫນີ້ສິນທີ່ມະນຸດສ້າງຂຶ້ນໃນປະຈຸບັນນີ້ ໃຊ້ເວລາອີກພັນປີກໍ່ໄຊ້ຫນີ້ບໍ່ໝົດ
ມັນບໍ່ມີທາງອອກ ແລະ ກຳລັງມຸ່ງໜ້າສູ່ການລົ່ມສະລາຍຢ່າງຮ້າຍແຮງ. Bitcoin ຄືແສງສະຫວ່າງທີ່ຈະຊ່ວຍປ້ອງກັນບໍ່ໃຫ້ມະນຸດເຂົ້າສູ່ຍຸກມືດມົວອີກຄັ້ງ.
Bitcoin cannot steal your time
ມັນບໍ່ສາມາດຖືກສ້າງຂຶ້ນຈາກຄວາມຫວ່າງເປົ່າ. ທຸກ Bitcoin ຕ້ອງໃຊ້ພະລັງງານແລະເວລາທີ່ແທ້ຈິງໃນການສ້າງ.
Bitcoin ຄືປະກັນໄພທີ່ປ້ອງກັນການບໍລິຫານທີ່ຜິດພາດ
ມັນຊ່ວຍປ້ອງກັນຄວາມເສື່ອມໂຊມຂອງເງິນຕາ, ເສດຖະກິດທີ່ຕົກຕ່ຳ ແລະ ນະໂຍບາຍທີ່ຜິດພາດ, Bitcoin ຈະປົກປ້ອງຄຸນຄ່າຂອງເຈົ້າ.
Bitcoin is going to absorb the world's value
ໃນທີ່ສຸດ, Bitcoin ຈະກາຍເປັນທີ່ເກັບຮັກສາມູນຄ່າຂອງໂລກທັງໝົດ. ມັນຈະດູດເອົາຄວາມມັ່ງຄັ່ງຈາກທຸກຊັບສິນ, ທຸກລາຄາ, ແລະທຸກການລົງທຶນ.
Exit The Matrix
ພວກເຮົາອາໄສຢູ່ໃນ Matrix ທາງດ້ານການເງິນ. ທຸກໆມື້ພວກເຮົາຕື່ນຂຶ້ນມາແລະໄປເຮັດວຽກ, ຄິດວ່າເຮົາກຳລັງສ້າງອະນາຄົດໃຫ້ຕົວເອງ. ແຕ່ຄວາມຈິງແລ້ວ, ພວກເຮົາພຽງແຕ່ກຳລັງໃຫ້ພະລັງງານແກ່ລະບົບທີ່ຂູດເອົາຄຸນຄ່າຈາກພວກເຮົາທຸກວິນາທີ. Bitcoin is the red pill — ມັນຈະເປີດຕາໃຫ້ເຈົ້າເຫັນຄວາມຈິງຂອງໂລກການເງິນ. Central banks are the architects of this Matrix — ພວກເຂົາສ້າງເງິນຈາກຄວາມຫວ່າງເປົ່າ, ແລະພວກເຮົາຕ້ອງເຮັດວຽກໜັກເພື່ອໄດ້ມັນມາ.
ລະບົບການສຶກສາໄດ້ຫຼອກລວງເຮົາຢ່າງໃຫຍ່ຫຼວງ. ພວກເຂົາສອນໃຫ້ເຮົາເຮັດວຽກເພື່ອຫາເງິນ, ແຕ່ບໍ່ເຄີຍສອນວ່າເງິນແມ່ນຫຍັງ. ເຮົາໃຊ້ເວລາ 12-16 ປີໃນໂຮງຮຽນ, ຫຼັງຈາກນັ້ນໃຊ້ເວລາທັງຊີວິດເພື່ອຫາເງິນ, ແຕ່ບໍ່ເຄີຍຮູ້ຈັກວ່າມັນແມ່ນຫຍັງ, ໃຜສ້າງ, ແລະເປັນຫຍັງມັນມີຄຸນຄ່າ.This is the biggest scam in human history ພວກເຮົາຖືກສອນໃຫ້ເປັນທາດຂອງລະບົບ, ແຕ່ບໍ່ໄດ້ຮັບການສອນໃຫ້ເຂົ້າໃຈລະບົບ.
The Bitcoin standard will end war
ເມື່ອບໍ່ສາມາດພິມເງິນເພື່ອສົງຄາມແລ້ວ, ສົງຄາມຈະກາຍເປັນສິ່ງທີ່ແພງເກີນໄປ.
ພວກເຮົາກຳລັງເຂົ້າສູ່ຍຸກ Bitcoin Renaissance
ຍຸກແຫ່ງການຟື້ນຟູທາງດ້ານການເງິນແລະປັນຍາ. Bitcoin is creating a new class of humans ຄົນທີ່ເຂົ້າໃຈ ແລະ ຖື Bitcoin ຈະກາຍເປັນຊົນຊັ້ນໃໝ່ທີ່ມີອິດສະຫຼະພາບຢ່າງແທ້ຈິງ.
The Path to Financial Truth
Follow the money trail ແລະເຈົ້າຈະເຫັນຄວາມຈິງ:
- ໃຜຄວບຄຸມການພິມເງິນ?
- ເປັນຫຍັງລາຄາສິນຄ້າຂຶ້ນສູງຂຶ້ນເລື້ອຍໆ?
- ເປັນຫຍັງຄົນທຸກທຸກກວ່າເກົ່າ ແລະຄົນຮັ່ງມີຮັ່ງມີກວ່າເກົ່າ?
ຄຳຕອບທັງໝົດແມ່ນຢູ່ໃນການທຳຄວາມເຂົ້າໃຈເລື່ອງເງິນ ແລະ Bitcoin.
ການສຶກສາ Bitcoin ບໍ່ແມ່ນພຽງແຕ່ການລົງທຶນ — ມັນແມ່ນການເຂົ້າໃຈອະນາຄົດຂອງເງິນຕາ ແລະ ສັງຄົມມະນຸດ.
Don't just work for money. Understand money. Study Bitcoin.
ຖ້າເຈົ້າບໍ່ເຂົ້າໃຈເງິນ, ເຈົ້າຈະເປັນທາດຂອງລະບົບຕະຫຼອດໄປ. ຖ້າເຈົ້າເຂົ້າໃຈ Bitcoin, ເຈົ້າຈະໄດ້ຮັບອິດສະຫຼະພາບ.
-
@ 1d7ff02a:d042b5be
2025-05-27 02:35:53ກຸນແຈສຳຄັນແມ່ນການເຂົ້າໃຈວ່າແສງແດດບໍ່ແມ່ນສິ່ງດຽວ—ມັນແມ່ນຄື່ນຄວາມຖີ່ທີ່ສັບສົນທີ່ເຮັດວຽກຮ່ວມກັນຄືດັ່ງດົນຕີສຳລັບສຸຂະພາບຂອງມະນຸດ.
ວົງດົນຕີສຸຂະພາບຂອງດວງອາທິດ
ແສງຕອນເຊົ້າ (ແສງແດງ/ແສງອິນຟາເຣດໃກ້): ແສງແດງອ່ອນໂຍນຂອງຕອນແລງແລະຄຳ່ທີ່ປະກອບສ້າງ 90% ຂອງການປ່ອຍແສງຂອງດວງອາທິດ. ຄື່ນຄວາມຖີ່ນີ້ເຮັດໜ້າທີ່ຄືການປັບແຕ່ງເຊວລ໌, ເພີ່ມການຜະລິດພະລັງງານມີໂຕຄອນເດຍແລະກະກຽມຮ່າງກາຍຂອງທ່ານສຳລັບມື້ທີ່ຈະມາເຖິງ. ຄິດໃສ່ວ່າມັນແມ່ນການກະກຽມເຄື່ອງຈັກເຊວລ໌ຂອງທ່ານ.
ແສງຕອນກາງວັນ (ແສງ UV/ແສງສີຟ້າ): ແສງອາທິດທີ່ເຂັ້ມຂົ້ນຕອນກາງວັນສົ່ງມອບແສງອຸນຕາລະວິໂອເລດທີ່ຜະລິດວິຕາມິນ D—ຮໍໂມນທີ່ສຳຄັນຫຼາຍທີ່ເກືອບທຸກເຊວລ໌ໃນຮ່າງກາຍຂອງທ່ານມີຕົວຮັບສຳລັບມັນ. ເຖິງແມ່ນວ່າມັນຖືກເອີ້ນວ່າ "ວິຕາມິນ," ຮ່າງກາຍຂອງທ່ານຜະລິດວິຕາມິນ D ສ່ວນໃຫຍ່ຜ່ານການສຳຜັດຜິວໜັງກັບແສງ UVB. ນີ້ບໍ່ແມ່ນພຽງແຕ່ເລື່ອງສຸຂະພາບກະດູກ—ການຂາດວິຕາມິນ D ໄດ້ຖືກເຊື່ອມໂຍງກັບມະເຮັງ, ໂຣກພູມຄຸ້ມກັນຕົນເອງ, ໂຣກຫົວໃຈແລະເສັ້ນເລືອດ, ແລະການເພີ່ມຂຶ້ນຂອງການເສຍຊີວິດຈາກທຸກສາເຫດ. ວິຕາມິນ D ທີ່ຜະລິດຕາມທຳມະຊາດຈາກແສງແດດແກ່ຍາວ 2-3 ເທົ່າໃນຮ່າງກາຍຂອງທ່ານເມື່ອທຽບກັບຢາເສີມ, ສະແດງໃຫ້ເຫັນວ່າເປັນຫຍັງການສຳຜັດແສງແດດຕາມທຳມະຊາດຈຶ່ງດີກວ່າຢາເສີມ.
ແສງ UV ຍັງກະຕຸ້ນການຜະລິດເມລານິນ, ທີ່ເຮັດໜ້າທີ່ເປັນແບັດເຕີຣີທຳມະຊາດ, ເກັບຮັກສາອີເລັກຕຣອນທີ່ໃຫ້ພະລັງງານແກ່ມີໂຕຄອນເດຍຂອງທ່ານ. ໃນຂະນະທີ່ແສງສີຟ້າຮັບໃຊ້ຈຸດປະສົງຄູ່: ມັນຮັກສາໃຫ້ທ່ານຕື່ນຕົວໃນຕອນກາງວັນໃນຂະນະທີ່ຂັດຂວາງການຜະລິດເມລາໂທນິນ. ແຕ່ວ່າ, ແສງສີຟ້າມີດ້ານມືດ—ການສຶກສາສະແດງວ່າມັນສາມາດເຮັດໃຫ້ເກີດຄວາມເສຍຫາຍຂອງ DNA ແລະສ້າງສິ່ງທີ່ເປັນອັນຕະລາຍທີ່ເອີ້ນວ່າສະສາລະອົກຊິເຈນປະຕິກິລິຍາຢູ່ທັງຜິວໜັງແລະຕາ, ຄ້າຍຄືກັບລັງສີ UV. ນີ້ແມ່ນເຫດຜົນທີ່ການສຳຜັດແສງສີຟ້າໂດດດ່ຽວ (ເຊັ່ນຈາກໜ້າຈໍ) ໂດຍບໍ່ມີຄື່ນຄວາມຖີ່ປ້ອງກັນຂອງແສງອາທິດສາມາດເປັນອັນຕະລາຍໂດຍສະເພາະ.
ການປ່ຽນແປງຕອນແລງ: ເມື່ອແສງສີຟ້າຫຼຸດລົງໃນຕອນແລງ, ຮ່າງກາຍຂອງທ່ານເລີ່ມຜະລິດເມລາໂທນິນ, ທີມງານທຳຄວາມສະອາດເຊວລ໌ທີ່ເອົາຜະລິດຕະພັນພິດທີ່ສະສົມໃນລະຫວ່າງການຜະລິດພະລັງງານຂອງມື້ອອກ.
ວິກິດການແສງສະໄໝໃໝ່
ມະນຸດສະໄໝໃໝ່ໃຊ້ເວລາ 93% ຢູ່ໃນເຮືອນ, ສ້າງຄວາມບໍ່ສົມດູນຂອງແສງທີ່ເປັນອັນຕະລາຍ. ພວກເຮົາໄດ້ປ່ຽນໝໍ້ແສງໄຟແກ້ວທີ່ມີປະໂຫຍດດ້ວຍ LED ທີ່ຂາດຄື່ນຄວາມຖີ່ແສງອິນຟາເຣດໃກ້ທີ່ປ້ອງກັນ, ໃນຂະນະທີ່ແສງສີຟ້າປອມຈາກໜ້າຈໍຂັດຂວາງການຜະລິດເມລາໂທນິນຕາມທຳມະຊາດຂອງພວກເຮົາໃນຕອນກາງຄືນ. ນີ້ສ້າງພາຍຸທີ່ສົມບູນແບບ: ຄວາມເຄັ່ງຕຶງຈາກການເກີດອົກຊິເດຊັນໂດຍບໍ່ມີກົນໄກການທຳຄວາມສະອາດຕາມທຳມະຊາດ, ການຂາດວິຕາມິນ D, ແລະການຂາດຄື່ນຄວາມຖີ່ປ້ອງກັນຕອນເຊົ້າທີ່ກະກຽມຮ່າງກາຍຂອງພວກເຮົາສຳລັບການສຳຜັດແສງແດດ.
ທາງແກ້ໄຂຕາມທຳມະຊາດ
ການຄົ້ນຄວ້າຊີ້ໃຫ້ເຫັນວິທີການງ່າຍໆ: ຮັບເອົາຈັງຫວະຕາມທຳມະຊາດຂອງດວງອາທິດ. ເລີ່ມມື້ຂອງທ່ານດ້ວຍການສຳຜັດແສງຕອນເຊົ້າເພື່ອກະກຽມມີໂຕຄອນເດຍຂອງທ່ານ. ຍອມຮັບວ່າແສງແດດຕອນກາງວັນບາງຢ່າງໃຫ້ວິຕາມິນ D ແລະເມລານິນທີ່ຈຳເປັນ. ຄ່ອຍໆຜ່ອນຄາຍເມື່ອແສງແລງຫຼຸດລົງ, ອະນຸຍາດໃຫ້ມີການຜະລິດເມລາໂທນິນຕາມທຳມະຊາດ.
ຮ່າງກາຍຂອງທ່ານພັດທະນາມາຫຼາຍລ້ານປີກັບວົງຈອນແສງນີ້. ໃນຂະນະທີ່ພວກເຮົາບໍ່ສາມາດປະຖິ້ມຊີວິດທີ່ທັນສະໄໝໄດ້, ພວກເຮົາສາມາດເຄົາລົບຄວາມຕ້ອງການທາງຊີວະວິທະຍາຂອງພວກເຮົາສຳລັບແສງແດດແບບຄົບຖ້ວນ. ຫຼັງຈາກທັງໝົດ, ທຸກເຊວລ໌ໃນຮ່າງກາຍຂອງທ່ານແລ່ນດ້ວຍພະລັງງານ, ແລະດວງອາທິດຍັງຄົງເປັນແຫຼ່ງພະລັງງານຫຼັກຂອງໂລກພວກເຮົາ. ໃນໂລກເທັກໂນໂລຢີສູງຂອງພວກເຮົາ, ພວກເຮົາຕ້ອງຈື່ຄູ່ຮ່ວມງານບູຮານລະຫວ່າງສຸຂະພາບຂອງມະນຸດກໍຄືແສງແດດ.
-
@ c1e9ab3a:9cb56b43
2025-04-15 13:59:17Prepared for Off-World Visitors by the Risan Institute of Cultural Heritage
Welcome to Risa, the jewel of the Alpha Quadrant, celebrated across the Federation for its tranquility, pleasure, and natural splendor. But what many travelers do not know is that Risa’s current harmony was not inherited—it was forged. Beneath the songs of surf and the serenity of our resorts lies a history rich in conflict, transformation, and enduring wisdom.
We offer this briefing not merely as a tale of our past, but as an invitation to understand the spirit of our people and the roots of our peace.
I. A World at the Crossroads
Before its admittance into the United Federation of Planets, Risa was an independent and vulnerable world situated near volatile borders of early galactic powers. Its lush climate, mineral wealth, and open society made it a frequent target for raiders and an object of interest for imperial expansion.
The Risan peoples were once fragmented, prone to philosophical and political disunity. In our early records, this period is known as the Winds of Splintering. We suffered invasions, betrayals, and the slow erosion of trust in our own traditions.
II. The Coming of the Vulcans
It was during this period of instability that a small delegation of Vulcan philosophers, adherents to the teachings of Surak, arrived on Risa. They did not come as conquerors, nor even as ambassadors, but as seekers of peace.
These emissaries of logic saw in Risa the potential for a society not driven by suppression of emotion, as Vulcan had chosen, but by the balance of joy and discipline. While many Vulcans viewed Risa’s culture as frivolous, these followers of Surak saw the seed of a different path: one in which beauty itself could be a pillar of peace.
The Risan tradition of meditative dance, artistic expression, and communal love resonated with Vulcan teachings of unity and inner control. From this unlikely exchange was born the Ricin Doctrine—the belief that peace is sustained not only through logic or strength, but through deliberate joy, shared vulnerability, and readiness without aggression.
III. Betazed and the Trial of Truth
During the same era, early contact with the people of Betazed brought both inspiration and tension. A Betazoid expedition, under the guise of diplomacy, was discovered to be engaging in deep telepathic influence and information extraction. The Risan people, who valued consent above all else, responded not with anger, but with clarity.
A council of Ricin philosophers invited the Betazoid delegation into a shared mind ceremony—a practice in which both cultures exposed their thoughts in mutual vulnerability. The result was not scandal, but transformation. From that moment forward, a bond was formed, and Risa’s model of ethical emotional expression and consensual empathy became influential in shaping Betazed’s own peace philosophies.
IV. Confronting Marauders and Empires
Despite these philosophical strides, Risa’s path was anything but tranquil.
-
Orion Syndicate raiders viewed Risa as ripe for exploitation, and for decades, cities were sacked, citizens enslaved, and resources plundered. In response, Risa formed the Sanctum Guard, not a military in the traditional sense, but a force of trained defenders schooled in both physical technique and psychological dissuasion. The Ricin martial arts, combining beauty with lethality, were born from this necessity.
-
Andorian expansionism also tested Risa’s sovereignty. Though smaller in scale, skirmishes over territorial claims forced Risa to adopt planetary defense grids and formalize diplomatic protocols that balanced assertiveness with grace. It was through these conflicts that Risa developed the art of the ceremonial yield—a symbolic concession used to diffuse hostility while retaining honor.
-
Romulan subterfuge nearly undid Risa from within. A corrupt Romulan envoy installed puppet leaders in one of our equatorial provinces. These agents sought to erode Risa’s social cohesion through fear and misinformation. But Ricin scholars countered the strategy not with rebellion, but with illumination: they released a network of truths, publicly broadcasting internal thoughts and civic debates to eliminate secrecy. The Romulan operation collapsed under the weight of exposure.
-
Even militant Vulcan splinter factions, during the early Vulcan-Andorian conflicts, attempted to turn Risa into a staging ground, pressuring local governments to support Vulcan supremacy. The betrayal struck deep—but Risa resisted through diplomacy, invoking Surak’s true teachings and exposing the heresy of their logic-corrupted mission.
V. Enlightenment Through Preparedness
These trials did not harden us into warriors. They refined us into guardians of peace. Our enlightenment came not from retreat, but from engagement—tempered by readiness.
- We train our youth in the arts of balance: physical defense, emotional expression, and ethical reasoning.
- We teach our history without shame, so that future generations will not repeat our errors.
- We host our guests with joy, not because we are naïve, but because we know that to celebrate life fully is the greatest act of resistance against fear.
Risa did not become peaceful by denying the reality of conflict. We became peaceful by mastering our response to it.
And in so doing, we offered not just pleasure to the stars—but wisdom.
We welcome you not only to our beaches, but to our story.
May your time here bring you not only rest—but understanding.
– Risan Institute of Cultural Heritage, in collaboration with the Council of Enlightenment and the Ricin Circle of Peacekeepers
-
-
@ 75869cfa:76819987
2025-05-27 05:25:13GM, Nostriches!
The Nostr Review is a biweekly newsletter focused on protocol updates, exciting programs, the long-form content ecosystem, and key events happening in the Nostr-verse. If you’re interested, join me in covering updates from the Nostr ecosystem!
Quick review:
In the past two weeks, 22 pull requests were submitted to the Nostr protocol, with 6 merged. A total of 65 Nostr projects were tracked, with 12 releasing product updates, and over 359 long-form articles were published, 43% focusing on Bitcoin and Nostr. During this period, 4 notable events took place, and 4 significant events are upcoming.
NIPs
nostr:npub1t70s45chajpkl4ncyqhsldd2c4557ecg3ze0t5lxuam96gzr6qlqae2qq0 is proposing PR that an interface like discord server channels / telegram topics / matrix(element) space rooms.
NIP-XX: Passkey-Wrapped Keys a.k.a. Nosskey #1919
nostr:npub1y6aja0kkc4fdvuxgqjcdv4fx0v7xv2epuqnddey2eyaxquznp9vq0tp75l is proposing a PR that proposes a standardized method for managing Nostr private keys using WebAuthn passkeys (FIDO2/WebAuthn credentials). The specification aims to significantly improve user experience by eliminating the need for private key backup or complex secret key management, enabling users to interact with Nostr applications through intuitive operations such as biometric authentication or physical security keys.Two implementation approaches are defined:PRF Direct Usage Method - Directly utilizing WebAuthn PRF extension values as Nostr private keys; Encryption Method - Encrypting existing Nostr private keys with keys derived from passkeys For the Encryption Method, while AES-GCM is used as an example in the specification, the NIP itself does not mandate any specific encryption algorithm, allowing implementers to choose appropriate methods. This approach does not require compatibility with NIP-49 (password-based encryption) as the PRF extension in WebAuthn already provides sufficient entropy, making it more efficient to use other standardized encryption algorithms directly.
Create NIP-XX.md: Voice Messages #1923
nostr:npub18ams6ewn5aj2n3wt2qawzglx9mr4nzksxhvrdc4gzrecw7n5tvjqctp424 is proposing a new NIP for Kind 1222: Voice Messages.This new event kind is designed for sharing short audio recordings, intended to function similarly to kind: 1 but specifically for voice content. This is currently in use for YakBak: https://yakbak.app
nostr:npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z is proposing a new NIP that adds a command message to let Clients know which features are available on each relay and collect conventions for features and their labels. Instead of "negotiating" the connection, this model simply lets clients know what they can use at any point of time. More specifically, it currently allows clients to know when they can switch their regular EOSE-based filters for a Negentropy sync and when they can use COUNT.
nostr:npub17v7g49shev2lwp0uwrx5v88ad6hj970zfse74wkes9jguhkx7aqsgjwsvj is proposing a new proposal for standardized communication with LLM/AI Agents on the Nostr network that aims to enhance and supersede parts of NIP-90 by providing a more comprehensive and robust framework specifically tailored for AI agent interactions/transactions.This NIP seeks to foster a more interoperable and vibrant ecosystem for AI agents and services on Nostr, while addressing many of the valid arguments against NIP90 in its current state, e.g. 1903
Add NIP-XX: Donation Addresses in User Metadata #1934
nostr:npub1zmc6qyqdfnllhnzzxr5wpepfpnzcf8q6m3jdveflmgruqvd3qa9sjv7f60 is proposing a NIP that introduces standardized donation addresses in user metadata using w tags.The goal is to provide a consistent and interoperable way for users to share payment information across different Nostr clients. It supports multiple cryptocurrencies and networks, including BTC (on Bitcoin, Lightning, and Liquid), ETH, XMR, and USDT. The NIP also offers clear implementation guidelines to help clients integrate this feature seamlessly.
NIP-XX: Ride-hailing protocol on Nostr #1935
nostr:npub13a56exdeda7y44vtnrxr3ljaxh8q9kh04e73vzw8jl8rknuj7h7sst4t9m is proposing a NIP that defines a censorship-resistant, peer-to-peer ride-hailing and delivery protocol on Nostr. It leverages Nostr events, Bitcoin Lightning payments, and reputation mechanisms to create a decentralized alternative to Uber and other centralized transportation platforms.
Notable Projects
Coracle 0.6.16 nostr:npub13myx4j0pp9uenpjjq68wdvqzywuwxfj64welu28mdvaku222mjtqzqv3qk
Coracle 0.6.16 with some minor updates, * Add support for editing WOT feeds * Change default blossom servers * Add support for custom emojis * Fix note deduplication
Primal V2.2.20 nostr:npub12vkcxr0luzwp8e673v29eqjhrr7p9vqq8asav85swaepclllj09sylpugg
They released a new update focused on improving performance and stability across the app. Release 2.2.20 includes: * Feed rendering optimizations * Fix for Blossom uploader crash when uploading large files * Additional minor fixes and improvements
Zap.stream v0.7.0 nostr:npub1eaz6dwsnvwkha5sn5puwwyxjgy26uusundrm684lg3vw4ma5c2jsqarcgz
- Add show "copied to clipboard" message on iOS
- Add badge awards in chat feed
- Add badges assigned to users in chat
- Add share stream button on stream info modal
- Add timeout feature, timeout viewers for x seconds
- Fixed Auto raid redirect loop
- Fixed Always show open in wallet button
Nostur v1.21 nostr:npub1n0stur7q092gyverzc2wfc00e8egkrdnnqq3alhv7p072u89m5es5mk6h0
New in this version: * Support Follow Packs * Support Blossom servers (uploading and mirroring) * Post Preview for Picture-only posts * Audio-only bar * Drag unread counter anywhere, tap to go to next unread post * Show media info in iOS Now Playing control center
Fountain 1.2.2 nostr:npub1v5ufyh4lkeslgxxcclg8f0hzazhaw7rsrhvfquxzm2fk64c72hps45n0v5
Fountain 1.2.2 is live on iOS and Android This update contains a couple of bug fixes for playback issues that were reported in the last week or so.
Alby nostr:npub1getal6ykt05fsz5nqu4uld09nfj3y3qxmv8crys4aeut53unfvlqr80nfm
Alby Hub v1.17 Release * Sub-wallets — Fully redesigned and optimized * Auto-swaps between lightning & on-chain * On-chain TX list now on the node page * LDK upgrade for your integrated node
zap.store nostr:npub10r8xl2njyepcw2zwv3a6dyufj4e4ajx86hz6v4ehu4gnpupxxp7stjt2p8
zapstore-cli 0.2.0-rc1 released The biggest zapstore-cli release yet, with lots of improvements for publishing. * Support for signing with nsec, NIP-07 in the CLI, NIP-46 bunkers, as well as sending unsigned events to stdout for use with nak or any other signer * No longer depend on apktool (that annoyed so many Linux devs) or apksigner, no more shell calls * Upload to configurable Blossom servers * Simplified yet more powerful config file format * Much smarter extracting metadata * Overall way faster
RUNSTR v0.4.0 nostr:npub1vygzr642y6f8gxcjx6auaf2vd25lyzarpjkwx9kr4y752zy6058s8jvy4e
Streak Rewards * Base Reward: Earn 50 sats for every completed run over .5 miles * Streak Bonus: Unlock an additional 50 sat boost for each day your streak continues
Teams Enhancement * Group Chat: Communicate with your team members in real-time * Share achievements, plan group runs, and stay motivated together
NIP101h Integration * Caloric Data: Track calories burned during your activities * Workout Intensity: Monitor how hard you're pushing yourself * NIP-44 Encryption: Your fitness data stays private and secure
Performance Improvements and Small Upgrades * Graphene Optimizations: Faster loading times and smoother experience * Stricter Distance Filtering: More accurate run tracking and statistics * Code Refactoring: Cleaner codebase for better stability * Bug Fixes & UI Improvements: Various small enhancements
ZEUS v0.11.0 nostr:npub1xnf02f60r9v0e5kty33a404dm79zr7z2eepyrk5gsq3m7pwvsz2sazlpr5
ZEUS v0.11.0-alpha4 with Cashu support is now available for testing. * Feat: Automatic Cashu mint sweeping based on threshold * Feat: new Cashu seed format + BIP-39 export * Misc: UX enhancements + fixes * Cashu wallets are tied to Embedded LND wallets. Enable under Settings > Ecash * Other wallet types can still sweep funds from Cashu tokens * ZEUS Pay now supports Cashu address types. You can switch between Zaplocker, Cashu, and NWC mode but can only use one at a time. * Atomic swaps are not featured in this build.
KYCNOT.me nostr:npub188x98j0r7l2fszeph6j7hj99h8xl07n989pskk5zd69d2fcksetq5mgcqf
- UI/UX - designe a new logo and color palette for kycnot.me.
- Point system - The new point system provides more detailed information about the listings, and can be expanded to cover additional features across all services.
- ToS Scrapper: implement a powerful automated terms-of-service scrapper that collects all the ToS pages from the listings. It saves you from the hassle of reading the ToS by listing the lines that are suspiciously related to KYC/AML practices.
- Search bar - The new search bar allows you to easily filter services. It performs a full-text search on the Title, Description, Category, and Tags of all the services. Looking for VPN services? Just search for "vpn"!
- Transparency - To be more transparent, all discussions about services now take place publicly on GitLab. This ensures that all service-related matters are publicly accessible and recorded. Additionally, there's a real-time audits page that displays database changes.
- Listing Requests - upgrade the request system. The new form allows you to directly request services or points without any extra steps.
- Lightweight and fast - The new site is lighter and faster than its predecessor!
- Tor and I2P - At last! kycnot.me is now officially on Tor and I2P!
Shopstr v0.7.2 nostr:npub15dc33fyg3cpd9r58vlqge2hh8dy6hkkrjxkhluv2xpyfreqkmsesesyv6e
This update brings the following improvements and fixes: * Added loading indicators for image uploads and improved upload UX and validation * Added support for out-of-band fiat payment methods * Added improved onboarding flow * Fixed styling for onboarding flow * Fixed styling for 404 page
Sparrow nostr:npub1hea99yd4xt5tjx8jmjvpfz2g5v7nurdqw7ydwst0ww6vw520prnq6fg9v2
Sparrow v2.2.0 released with: * Recent Blocks view * Improved camera support * Dark mode improvements
Long-Form Content Eco
In the past two weeks, more than 359 long-form articles have been published, including over 130 articles on Bitcoin and more than 24 related to Nostr, accounting for 43% of the total content.
These articles about Nostr mainly explore the protocol’s growth, technical tools, and emerging use cases. Topics include relay challenges, LNbits integration via Nostr Wallet Connect, trust systems like NostrTrust, and self-managed NIP-05 identities. Several tools and apps—such as Primal for iOS, Satlantis, and Hostr—highlight client diversity and interoperability. Educational and social angles, including university engagement and long-form note-taking styles, show Nostr’s broader cultural impact.
These articles present a comprehensive picture of Bitcoin as a technology, asset, and cultural force. From beginner guides to advanced strategies, they explore how to buy, store, and use Bitcoin securely, including the adoption of multisig, Lightning Network, and self-custody practices. Many pieces highlight Bitcoin’s global impact—from everyday use in payments and savings, to its adoption by institutions and governments in Africa and Asia. The content delves into larger issues such as mining centralization, regulatory conflicts, and the geopolitical implications of de-dollarization. On the cultural side, Bitcoin is portrayed as a symbol of freedom, resistance, and long-term thinking, with movements like HODL and self-sovereign ownership gaining ground. Technological innovations and grassroots efforts are also driving Bitcoin’s integration with decentralized social platforms and smart contract frameworks.
Thank you, nostr:npub1jp3776ujdul56rfkkrv8rxxgrslqr07rz83xpmz3ndl74lg7ngys320eg2 nostr:npub1dk8z5f8pkrn2746xuhfk347a0g6fsxh20wk492fh9h8lkha2efxqgeq55a nostr:npub10vsdn82fps4vwjaqxcpwj0nyync0cfrp2f5qlayrljh6d549gx5s0y9eap nostr:npub186a9aaqmyp436j0gkxl8yswhat2ampahxunpmfjv80qwyaglywhqswhd06 nostr:npub1jrr9dlerex7tg8njvc88c60asxnf5dp8hgcerh0q8w3gdyurl48q6s5nwv nostr:npub150r0j29fypshg3xcl5gt5ew85gw8tg5qetzcawkapwcaa4z5jnaspwmwfg nostr:npub1zssx5e5cne75w4hxenry8x9qqmn9ql3ty4umlmewu7dqv6yhyh8survrwk nostr:npub1xncam2l8u5chg6w096v89f2q2l0lz4jz4n7q7tdjsu6y5t9qea7q2cmrua nostr:npub1harur8s4wmwzgrugwdmrd9gcv6zzfkzfmp36xu4tel0ces7j2uas3gcqdy nostr:npub10efcj7x65z2ak6vd69xr8f2hvqwuaqrhlygl3yqa4y63hfvc02mqwzaeh3 nostr:npub1sehqzwgg2k03t300l8gjj4znpqhsrg0mtaq2yk70qam2x65nxnjs9ul7fr nostr:npub12lg6yexfh0gsk8aupv5cr5fnj46l0kxg6lp6rz0zw6kwx603lmsshmac9c nostr:npub1guh5grefa7vkay4ps6udxg8lrqxg2kgr3qh9n4gduxut64nfxq0q9y6hjy nostr:npub1lpdect8qqg6u6se46ta22jqu4jn6jnsjzem36dejanjr95vshnlsxqcsgs nostr:npub1s4mv5rnj6cx64eurt5ucmtfnkp6qy65kh4wh799mdfk6ycslwd0qjrdu03 nostr:npub1h3kv6yar972dxetymty0t936p45utq7fj6p5rw7ly79jrafsnrjqvuwlmn and others, for your work. Enriching Nostr’s long-form content ecosystem is crucial.Nostriches Global Meet Ups
Recently, several Nostr events have been hosted in different countries. * Recently, YakiHonne collaborated with the Nigerian Army College and kasu techies community to successfully host two Nostr Workshops, attracting over 70 enthusiastic participants. The events not only provided a comprehensive introduction to the Nostr ecosystem and Bitcoin payments but also offered hands-on experiences with decentralized technologies through the YakiHonne platform.
YakiHonne Global Pizza Fest officially kicked off on May 21, 2025, and will run through May 28.The event celebrates the evolution of Bitcoin by encouraging participants to buy pizza using sats, while promoting the concept of social payments.YakiHonne is offering up to 10,000 sats in pizza sponsorship for each participating community. Outstanding content may be featured in the official recap video and selected communities will be invited to join the Global Community Partner Program. * Bitcoin FilmFest 2025* officially kicked off on May 22 at Kinoteka Cinema in Warsaw, Poland, and will run through May 25.This international event brings together Bitcoin culture, independent cinema, and decentralized media under the theme "exploring the uncharted stories beyond the frame." YakiHonne is an official partner on site, sharing on open content networks and the future of social payments during our stage appearance.Here is the upcoming Nostr event that you might want to check out. * The Bitcoin 2025 conference was held from May 26 to 29 at the Venetian Convention Center in Las Vegas, with the Nostr community hosting a series of vibrant activities.While the Nostr Lounge served as a central hub for socializing and technical exchange, featuring app demos, lightning talks, and limited-edition merchandise. Nostr also delivered two key presentations during the conference, focusing on multisig key management and the future of decentralized social media. * Africa Bitcoin Day – Kenya will take place on May 31st, 2025 (Saturday), from 2:00 PM to 6:00 PM at Nairobi Street Kitchen.Co-hosted by AfroBitcoinOrg and local communities, this event returns following the great success of last year. It will bring together developers, tech entrepreneurs, policymakers, and grassroots organizers to build, connect, and learn around Bitcoin and open technologies. * The 3rd Privacy Summit will take place on June 27, 2024, in Switzerland, bringing together leading figures and innovative projects from the global cryptography and privacy tech space.This edition will focus on on-chain privacy and cutting-edge cryptographic applications, featuring keynote talks, panel discussions, and in-depth community exchanges.The speaker lineup includes core developers, researchers, and founders from projects. * The Bitcoin Paradigm Program 2025 will take place from July 4 to July 5, 2025 (Friday to Saturday), under the theme "Bitcoin: Sovereignty, Energy, and Networks." This two-day event will explore Bitcoin’s relevance in modern society, focusing on its role in financial sovereignty, energy transformation, and decentralized network security. Speakers include
nostr:npub1renaud65zug8r570ndztde2xhk206z3v50a5mwa3kp2xshy3zmjqkqaw97 nostr:npub1admhd8e9r28zl4u73l95c7lmu8k233xn50ayjsruuc62hm7l2a2q2l5zht nostr:npub1nm44dsxxns2f6zquhk24dqzvlawdaf49jdpvvgnuuvy4aqc3r29qcwx73p nostr:npub158d7zqnl36ze3gmyv4kedezvla3z3rvgsfpap83drqrywswwvc8skw9kx0 and more.
Additionally, We warmly invite event organizers who have held recent activities to reach out to us so we can work together to promote the prosperity and development of the Nostr ecosystem.
Thanks for reading! If there’s anything I missed, feel free to reach out and help improve the completeness and accuracy of my coverage.
-
@ 502ab02a:a2860397
2025-05-27 01:45:49เราค่อยๆลำดับเรื่องราวเริ่มจากเบาๆกันก่อนนะครับ หากย้อนกลับไปในปี 2009 บนเส้นทางที่โลกกำลังสับสนระหว่างการกินที่อิงธรรมชาติกับแนวทางการเปลี่ยนแปลงอาหารแบบสุดขั้ว Ethan Brown ได้ก่อตั้งบริษัท Beyond Meat ขึ้นมา โดยมีจุดประสงค์ชัดเจนว่าอยากสร้าง "เนื้อจากพืช" ให้มีรสชาติ เนื้อสัมผัส และประสบการณ์ที่ใกล้เคียงกับเนื้อสัตว์จริงให้มากที่สุดเท่าที่จะทำได้ นี่คือภาพลวงตาที่ถูกสร้างขึ้นภายใต้ธงของความยั่งยืน แต่เบื้องลึกกลับแฝงความเงียบงันอยู่ใต้เงาเทคโนโลยี
Ethan Brown ไม่ใช่คนที่ตื่นเช้ามาแล้วอยากเปลี่ยนโลกในทันที เขาเติบโตมากับพ่อที่เป็นนักอนุรักษ์ธรรมชาติ มีฟาร์มโคนมเล็ก ๆ ให้ได้สัมผัสความจริงของเกษตรกรรมแบบดั้งเดิม เขาเรียนจบปริญญาตรีด้านประวัติศาสตร์และรัฐบาล ต่อด้วยปริญญาโทด้านนโยบายสาธารณะจาก University of Maryland และ MBA จาก Columbia University เขาเคยทำงานด้านนโยบายพลังงานทางเลือกที่ National Governors Association และบริษัท Ballard Power Systems ก่อนจะย้ายขั้วจากพลังงานสู่โปรตีนแทน
ช่วงหนึ่งเขาพูดใน TED ว่า “ผมมองเห็นว่าอาหารนั้นเชื่อมโยงกับสิ่งแวดล้อมและสุขภาพมนุษย์อย่างลึกซึ้ง แต่เราแทบไม่พูดถึงเรื่องนี้ในระดับระบบเลย” เขาเห็นว่าสัตว์คือ “เครื่องจักรแปลงโปรตีนจากพืชไปเป็นเนื้อ” ซึ่งเขาเชื่อว่ามัน “ไม่จำเป็นอีกต่อไปแล้ว” ในศตวรรษที่ 21
Beyond Meat ไม่ได้ใช้สูตรการต้มถั่วแล้วปั้นเป็นเบอร์เกอร์แบบบ้าน ๆ แต่ใช้กระบวนการแปรรูปที่ซับซ้อนระดับอุตสาหกรรมที่เรียกว่า High Moisture Extrusion (HME) ที่ต้องใช้เครื่องจักรเฉพาะราคาแพงมาก เพื่อดัดแปลงโปรตีนพืช เช่น ถั่วเหลือง ถั่วลันเตา ให้มีโครงสร้างเหมือนกล้ามเนื้อสัตว์ ทั้งเส้นใย ความชุ่มฉ่ำ และแรงต้านเมื่อกัด ซึ่งทั้งหมดนี้ไม่สามารถทำในครัวชาวบ้านได้ง่าย ๆ
บริษัทได้รับทุนสนับสนุนตั้งแต่ช่วงเริ่มต้นจากกลุ่มนักลงทุนที่มีอิทธิพลใน Silicon Valley เช่น Kleiner Perkins และ Obvious Corporation ของ Evan Williams ผู้ร่วมก่อตั้ง Twitter ก่อนจะขยายฐานนักลงทุนไปยัง Tyson Foods (ซึ่งเป็นบริษัทยักษ์ใหญ่ด้านเนื้อสัตว์ของสหรัฐฯ ที่ลงทุนใน Beyond Meat ก่อนจะถอนตัวภายหลัง) และนักแสดงฮอลลีวูดอย่าง Leonardo DiCaprio การเข้าระดมทุนในตลาดหุ้น (IPO) ปี 2019 ก็ยิ่งสร้างกระแสให้บริษัทกลายเป็นภาพตัวแทนของการกินอนาคตที่ยั่งยืน ทว่าในความหรูหรานั้น มีรอยร้าวแฝงอยู่เสมอ
ในขณะที่ภาพจำของ Beyond Meat ถูกวาดว่าเป็น “ทางรอดของโลก” และ “อาหารเพื่อสิ่งแวดล้อม” รัฐบาลสหรัฐฯ ก็สนับสนุนทิศทางนี้อย่างเงียบเชียบ ด้วยการอัดงบประมาณกว่า 125 ล้านดอลลาร์เข้าสู่อุตสาหกรรมโปรตีนทางเลือกผ่านโครงการต่าง ๆ เช่น หน่วยงานวิจัย USDA และกองทุนสนับสนุนมหาวิทยาลัยด้านเทคโนโลยีอาหาร ไม่ต่างจากรัฐบาลอิสราเอลที่ทุ่มงบกว่า 18 ล้านดอลลาร์ให้บริษัทเนื้อเพาะเลี้ยงแบบไม่มีอ้อมค้อม ทั้งหมดนี้กำลังสร้างระบบอาหารที่ไม่ต้องพึ่งดิน ไม่ต้องพึ่งแดด ไม่ต้องพึ่งเกษตรกร แต่ขึ้นอยู่กับโรงงานที่ควบคุมโดยบริษัทมหาชนเพียงไม่กี่เจ้า
เมื่อมองให้ลึกลงไป Beyond Meat ไม่ใช่แค่บริษัทอาหาร แต่คือจุดเริ่มต้นแรกๆของโลก ในด้านระบบนิเวศใหม่ที่ตัด “คนตัวเล็ก” ออกจากสมการเกษตรกรรมโดยสิ้นเชิง เกษตรกรจะไม่มีทางผลิต “เนื้อจากพืช” เหล่านี้ได้ด้วยตัวเอง เพราะต้องใช้เทคโนโลยีราคาแพง วัตถุดิบเฉพาะ และสูตรการแปรรูปที่ถูกจดสิทธิบัตรไว้หมดแล้ว ระบบอาหารจึงค่อย ๆ ถูกปิดตายภายใต้รั้วของลิขสิทธิ์ เหมือนโลกของซอฟต์แวร์ที่ไม่มีใครแตะต้องโค้ดต้นฉบับได้ ทุกคำที่เคี้ยวอาจกลายเป็นทรัพย์สินของใครบางคน และในวันที่ดินผืนสุดท้ายไม่ได้ปลูกพืช แต่กลายเป็นโรงงานสังเคราะห์โปรตีน นั่นแหละที่มนุษย์จะพบว่า ตนเองไม่ได้เป็น “ผู้ผลิตอาหาร” อีกต่อไป แต่กลายเป็น “ผู้บริโภค” ตลอดกาล
แม้ตัวเลขยอดขายของ Beyond Meat จะพุ่งขึ้นในช่วงแรกหลังเข้าตลาดหุ้น แต่เมื่อเวลาผ่านไป กลับสะท้อนความจริงที่น่าสนใจว่าสิ่งที่ดูเหมือนจะเป็นทางออกของโลก อาจไม่ใช่คำตอบที่ยั่งยืนเลยก็ได้
ในปี 2022 บริษัทประกาศลดพนักงานลง 19% และราคาหุ้นร่วงลงกว่า 80% จากจุดสูงสุด พร้อมกับข่าวคราวที่ส่อให้เห็นปัญหาด้านความปลอดภัยในสายการผลิต และยอดขายที่ไม่เติบโตตามเป้า แม้จะพยายามขยายตลาดอย่างต่อเนื่อง แต่คนทั่วไปเริ่มตระหนักว่า “เนื้อจากพืช” ที่แปรรูปหนักอาจไม่ใช่คำตอบของสุขภาพหรือสิ่งแวดล้อมอย่างที่เคยเชื่อ
ไม่เพียงเท่านั้น ผลการสำรวจในอเมริกาและยุโรปเริ่มชี้ว่า คนที่เคยทดลองกิน plant-based meat กลับไม่ซื้อซ้ำ โดยให้เหตุผลว่าไม่อร่อย แพง และไม่เชื่อว่าเป็นอาหารที่ดีต่อร่างกายจริง ๆ อีกทั้งบางรายถึงกับบอกว่ารู้สึกแปลกแยก เพราะอาหารที่มีส่วนผสมเยอะและชื่อส่วนประกอบที่อ่านไม่ออก มักทำให้คนรู้สึกว่าไม่ใช่อาหารธรรมชาติ ซึ่งขัดกับความตั้งใจเดิมที่อยากกินอาหารเพื่อสุขภาพ
คำว่า “ยั่งยืน” จึงไม่เพียงพอจะอธิบายได้ว่าอะไรคือสิ่งดีจริง ๆ เพราะหากความยั่งยืนนั้นหมายถึงการผูกขาด แปรรูป และบังคับให้ผู้คนต้องซื้ออาหารจากบริษัทไม่กี่แห่ง มันก็ไม่ได้ต่างอะไรกับการจำกัดอิสรภาพในจานข้าว อาหารที่แท้ควรเป็นของทุกคน เป็นสิทธิ์พื้นฐานที่มนุษย์ควรสร้างได้เอง ไม่ใช่ต้องลงทะเบียนซื้อกับห้างใหญ่ ๆ ผ่าน QR code ทุกมื้อ
ทุกวันนี้ Beyond Meat ยังไม่ถึงจุดตกต่ำที่สุด และยังมีโอกาสกลับมาได้เสมอ แต่สิ่งนึงที่เราต้องตระหนักเอาไว้คือ นี่ยังเป็นแค่ยักษ์เล็กไม่ใช่ยักษ์ใหญ่ เทคโนโลยีการสกัดโปรตีนพืชมาขยำเป็นรูปนั้น ณ วินาทีนี้ คือโบราณเกินไปแล้วครับ ในตลาดก็มีหมูปลอมเนื้อปลอมแบบนี้ออกมามากมาย หน้าตางดงามสมจริง แต่สิ่งเหล่านี้มันคือแค่จุดเริ่มต้นครับ ถ้าจะนับเรื่องราวเหล่านี้ว่าเริ่มจาก 2009 ก็ไม่ผิดนัก
เมื่อถึงจุดหนึ่ง คุณจะมองเห็นลำดับชั้นของ ธุรกิจ นวตกรรม การครอบงำทางการตลาดแบบผูกมัดที่ตัดแขนตัดขาไปทีละนิดจนเราหมดสิทธิ์เลือก สิ่งเดียวที่เราจะเลือกได้คือ ซื้อเนื้อจากแลปไหน #pirateketo #กูต้องรู้มั๊ย #ม้วนหางสิลูก #siamstr
-
@ c1e6505c:02b3157e
2025-05-27 01:11:45I spent Memorial Day swimming in the local river - something I try to do at least four times a week. It’s the best form of exercise imo, but it’s more than that. Swimming against the tide, feeling the water move around me... there’s something about it that keeps me grounded. Nature at her peak.
Today I brought my X-Pro2 with the 1959 Leica Summaron 35mm f/2.8. I'm still testing the lens wide open to get a feel for its character. My subject this time: the light playing on the ripples and waves.
While I was shooting, a kid randomly ran up to me and started telling me something about what he got for his dad while fishing, or something - I didn’t quite hear him - and then he asked what I was looking at. I told him, “The ripples. The way the light is refracting.” I had him sit exactly where I was so he could see it too.
He lit up. You could tell no one had ever pointed something like that out to him before. In that moment, I felt like maybe I was able to plant a little seed - a new way of seeing.
This is what I was looking at.
-
@ eb0157af:77ab6c55
2025-05-27 05:01:20The exchange reveals the extent of the breach that occurred last December as federal authorities investigate the data leak.
Coinbase has disclosed that the personal data of 69,461 users was compromised during the breach in December 2024, according to documentation filed with the Maine Attorney General’s Office.
The disclosure comes after Coinbase announced last week that a group of hackers had demanded a $20 million ransom, threatening to publish the stolen data on the dark web. The attackers allegedly bribed overseas customer service agents to extract information from the company’s systems.
Coinbase had previously stated that the breach affected less than 1% of its user base, compromising KYC (Know Your Customer) data such as names, addresses, and email addresses. In a filing with the U.S. Securities and Exchange Commission (SEC), the company clarified that passwords, private keys, and user funds were not affected.
Following the reports, the SEC has reportedly opened an official investigation to verify whether Coinbase may have inflated user metrics ahead of its 2021 IPO. Separately, the Department of Justice is investigating the breach at Coinbase’s request, according to CEO Brian Armstrong.
Meanwhile, Coinbase has faced criticism for its delayed response to the data breach. Michael Arrington, founder of TechCrunch, stated that the stolen data could cause irreparable harm. In a post on X, Arrington wrote:
“The human cost, denominated in misery, is much larger than the $400m or so they think it will actually cost the company to reimburse people. The consequences to companies who do not adequately protect their customer information should include, without limitation, prison time for executives.”
Coinbase estimates the incident could cost between $180 million and $400 million in remediation expenses and customer reimbursements.
Arrington also condemned KYC laws as ineffective and dangerous, calling on both regulators and companies to better protect user data:
“Combining these KYC laws with corporate profit maximization and lax laws on penalties for hacks like these means these issues will continue to happen. Both governments and corporations need to step up to stop this. As I said, the cost can only be measured in human suffering.”
The post Coinbase: 69,461 users affected by December 2024 data breach appeared first on Atlas21.
-
@ c9badfea:610f861a
2025-05-26 21:30:33- Install Loop Habit Tracker (it's free and open source)
- Launch the app, tap ➡️
- Tap ⁝, select Settings, scroll down and tap Customize Notifications
- Enable Show Notifications
- Return to the main screen
- Tap + to add a habit
- Choose Yes Or No for simple yes/no questions (e.g. Did you wake up early?)
- Choose Measurable for questions where a quantity is expected (e.g. How many pages did you read?)
- Assign a Name (e.g. Waking up early)
- Enter a Question (e.g. Did you wake up early?)
- Define the Frequency (e.g. Every Day)
- Schedule a Reminder (e.g. 08:00 and Any Day Of The Week)
- Include a Note if needed
- Hit Save to create the habit
- Start tracking your habits!
ℹ️ To categorize habits, use colors (e.g. blue for morning, orange for afternoon) or title prefixes (e.g. "Morning - Waking Up Early" and "Afternoon - Workout")
-
@ bf47c19e:c3d2573b
2025-05-26 21:26:19U ovoj sekciji pratićemo cene raznih dobara i usluga, a pre svega nekretnina, prosečne srpske plate, goriva, deviznih i zlatnih rezervi Srbije u odnosu na Bitkoin. Iz priloženih grafikona može se videti da sve vremenom gubi vrednost, odnosno postaje jeftinije u odnosu na BTC.
Cene nekretnina u Republici Srbiji izražene kroz Bitkoin (kompletni grafikoni)
Visina prosečne zarade u Republici Srbiji, cene goriva, dinarska i devizna štednja stanovništva, devizne i zlatne rezerve Srbije - izraženo kroz Bitkoin (kompletni grafikoni)
Prosečna cena m2 stana u Gradu Beogradu izražena kroz BTC
Prosečna cena m2 stana u Novom Sadu izražena kroz BTC
Prosečna cena m2 stana u Nišu izražena kroz BTC
Prosečna cena m2 stana u Kragujevcu izražena kroz BTC
Prosečna zarada u Republici Srbiji izražena kroz BTC
Cena goriva 'Evro Premium BMB 95' izražena kroz BTC
Cena goriva 'Evro Dizel' izražena kroz BTC
Dinarska štednja stanovništva kod banaka izražena kroz BTC
Devizna štednja stanovništva kod banaka izražena kroz BTC
Devizne rezerve Republike Srbije izražene kroz BTC
Zlatne rezerve Republike Srbije izražene kroz BTC
-
@ 9ca447d2:fbf5a36d
2025-05-27 05:01:10Donald Trump’s recent four-day visit took the President to Saudi Arabia, Qatar, and the United Arab Emirates. This visit has intertwined diplomatic relations with business interests, while simultaneously influencing the bitcoin market.
In Qatar, the President met with Emir Tanim bin Hamad Al Thani, resulting in over $243 billion in deals including major defense agreements, according to Bloomberg.
On May 15, the President made his visit to the Sheikh Zayed Grand Mosque in Abu Dhabi alongside Crown Prince Khaled bin Mohamed Al Nahyan. This occurs as the Trump family expands its business presence in the Middle East.
The Trump Organization is developing luxury properties across the region, including Trump Tower Dubai, real estate projects in Riyadh, and development in Jeddah and Oman.
Donald Trump and Mohammed bin Salman in King Khalid International Airport — NBCNews
Eric Trump publicly announced construction plans for Trump Tower Dubai just last month, highlighting the family’s ongoing commercial footprint in the region.
These business connections extend into the digital asset ecosystem as UAE-backed investment firm MGX recently announced it would use USD1, World Liberty Financial’s stablecoin to support a $2 billion investment in Binance, the world’s largest digital asset exchange, according to APNews.
This connection between Trump-aligned interests and major digital asset investments creates a potential avenue for market influence.
Historically, stability in the Middle East, especially among oil-rich nations, reduces global market volatility. This encourages risk appetite among investors, often leading to increased allocations to digital assets like bitcoin.
Middle East diplomacy directly affects global oil prices. Stable oil prices can lower inflation expectations and lead to interest rate cuts by the Fed. Lower rates lead to an increase in liquidity, having positive effects on bitcoin, an asset that benefits from money printing.
Related: Fed Rate Cuts Could Lead to Major Price Swings for Bitcoin
On the investment front, Abu Dhabi’s Wealth Fund, Mubadala Investment Company, has been focused on increasing their shares in BlackRock’s iShares Bitcoin Trust (IBIT).
According to a 13F filing with the U.S. Securities and Exchange Commission, Mubdala held 8.7 million IBIT shares, totaling $408.5 million as of March 31, 2025.
The Abu Dhabi Wealth Fund increased its shares by 500,000 since its last filing in December of 2024.
Back in March, the United States created a Strategic Bitcoin Reserve. The executive order states that the U.S. will not sell the bitcoin they already hold, and will create budget-neutral ways to increase their holdings.
The time has come where governments and wealth funds alike are jumping on board the Bitcoin train.
Trump’s recent visit to the Middle East illustrates how financial, diplomatic, and personal interests are becoming increasingly intertwined with Bitcoin and digital assets, serving as a new axis of influence in the U.S.-Middle East relations.
The combination of diplomatic progress and business expansion has heightened short-term volatility and trading volumes in the bitcoin market.
Trump’s business and digital asset ties in the region may further boost institutional interest and create an opportunity for more players to enter the market.
-
@ cae03c48:2a7d6671
2025-05-27 04:00:28Bitcoin Magazine
Something is Brewing in Ireland: A Sound Punt Is Released, As Bitcoin Enters The National ConversationFor years, Bitcoin in Ireland has quietly simmered at the grassroots level—discussed in pubs and meetups, debated in Telegram groups, and occasionally splashed across headlines with predictable suspicion. But recently, the temperature is beginning to rise. With the release of “A Sound Punt: The Case for Ireland’s Interest in Bitcoin” by Bitcoin Network Ireland (BNI), and a weekend that sees both the Bitcoin Ireland Conference and Aontú’s Ard Fheis, it’s clear momentum is building on the Emerald Isle.
A Sound Punt: A Paper for the Citizens of Ireland
The new paper, released today by Bitcoin Network Ireland, is a concise, accessible document crafted to cut through the noise and present the merits of Bitcoin to the general public and politicians alike. Its aim is straightforward: provide a rational, jargon-free entry point into why Bitcoin matters, especially in an era of euro debasement and rising living costs.
The name itself is a clever pun—while it is a nod to both “sound money” and Ireland’s former currency, the punt, it also playfully suggests that although the majority of people view it as associated with risk, this may be worth reevaluating. It’s a signal that this is about more than technology: it’s about claiming monetary sovereignty and re-examining what makes money “good” in the first place.
What BNI is attempting to accomplish is bridging an important gap in understanding, helping citizens seeking change and government officials looking for solutions to recognize that sound, stateless money has value for everyone. As Mark Goodwin famously noted, “Bitcoin simply must be for enemies, or it will never be for friends.“—a neutral system that serves all participants regardless of their political stance.
Ireland’s Long and Complicated Relationship With Money
To appreciate the significance of this moment, it’s worth noting that Ireland’s relationship with money has always been distinct from its European neighbors. While the Romans introduced coinage to Britain over a thousand years before it was adopted in Ireland. The native Irish resisted state-issued money, relying instead on barter and bullion well into the second millennium.
In ancient Ireland, the absence of coinage was a testament to a society that was stateless, highly decentralised, and it embraced a polycentric legal system varying between clans. The ideal of that society was that no man in society has rule over others, and even kings could be disposed of if they abused their power.
So it’s perhaps no coincidence that Ireland was the last European society to adopt coinage, as coinage gives power to rulers. Eventually, it was forced upon the land by the English crown in 1601, this period coincided with the final stages of the Nine Years’ War (1594-1603) and the increasing English control over Ireland. To this day, Ireland has never had its own free-floating currency; it has always been tethered to external powers: first the pound sterling, then the European Monetary System, and now the euro under the ECB. So it should come as no coincidence that in recent years, the EU is growing unabated in power and influence over Ireland.
“Give me control over a nation’s currency, and I care not who makes its laws.” — Mayer Amschel Rothschild (1743–1812)
Perhaps, given this historical context, Ireland is uniquely positioned to understand the value of sound, stateless money. Bitcoin represents a return to the monetary independence that preceded state-issued currencies, but with the technological advantages of the digital age. Where ancient Irish kingdoms used market goods that couldn’t be manipulated by distant authorities, Bitcoin offers a modern equivalent: a system that can’t be debased or controlled by any power, whether domestic or foreign.
This historical skepticism toward centrally-controlled currency is resurfacing in the present, as the Irish state and its citizens face a new wave of economic uncertainty via euro debasement and tariffs. Geopolitical and economic tensions have rarely felt less stable. Tariff disputes, renewed questions over Ireland’s foreign direct-investment model, and potential tech and pharma layoffs are sure to sharpen the focus on sovereignty and resilience. The release of “A Sound Punt” is timely, inviting the nation to once again question the wisdom of tying its fortunes to distant monetary authorities.
A Political Crossroads
Coinciding with the release of “A Sound Punt,” Dr. Niall Burke—a respected academic and BNI member—will be putting forward two motions at the Aontú Ard Fheis (party conference). Aontú, the party that saw the largest surge in votes in the last general election, has shown itself to be receptive to Bitcoin and is opening its doors to conversations that, until recently, were relegated to the margins. That Bitcoin motions are being presented and accepted at a major party conference is a marker of how the conversation is turning.
Meanwhile, the Bitcoin Ireland Conference is gathering the country’s growing community of plebs, builders, and advocates. These circles, once on the periphery, are now finding doors opening in political circles.
Public Discontent and a Call for Financial Autonomy
It’s not just Bitcoiners who are seeking alternatives. Ireland is witnessing its largest public demonstrations since the post-GFC days of 2012. Recent marches have drawn in excess of 100,000 people to the streets of Dublin. These protests reflect deep frustration and a sense that the political establishment is no longer in alignment with its people.
What’s particularly striking is how Bitcoin could serve as common ground for seemingly opposing interests. For protesters, Bitcoin offers protection from inflation and defends against government overreach. For a government concerned about economic stability and growth, Bitcoin may be the very solution it needs, especially to protect pension funds and indeed the state’s very own investment fund—ISIF, from inflation over the coming decades. This is the paradox and promise of sound, stateless money. It serves everyone’s interests because it enforces property rights, and can’t be captured or controlled by any single faction.
Last, but not least, MMA star Conor McGregor’s foray into both politics and Bitcoin is something few would have predicted a year ago, but for those with an ear to the ground, this has been a developing story for some time. His proposal for a national Bitcoin reserve is emblematic of a broader national shift: Bitcoin is finally entering the Zeitgeist and perhaps he, like BNI, has a part to play in keeping it there.
Bitcoin is an open-source monetary protocol, and adoption comes from all quarters, irrespective of politics. Bitcoin is neutral, it supports no partisan cause. What’s perhaps not recognized enough is how empowering Bitcoin can be and we should focus on its ability to unite rather than divide, giving every Irish citizen—regardless of their political views—tools for individual liberty, inflation protection, as well as practical solutions for businesses.
Back to “A Sound Punt” Paper
The paper itself makes a compelling case for Ireland’s interest in Bitcoin:
- Sound Money Principles: It evaluates Bitcoin against the six characteristics of “good money”—durability, divisibility, uniformity, portability, verifiability, and scarcity.
- Store of Value: The document highlights Bitcoin’s fixed supply as protection against rising inflation and currency debasement.
- Practical Examples: It provides evidence of Bitcoin’s monetization, comparing the costs of buying a home in Euros vs. Bitcoin over the span of a decade.
- Common Concern Rebuttals: The paper addresses the most common objections to Bitcoin—energy usage, volatility, criminal activity, undermining traditional currencies, and speculation—offering balanced counterarguments to each.
- Action Steps: Rather than just theoretical arguments, the paper outlines specific actions for individuals, businesses, and the government to consider, from education to strategic Bitcoin reserves.
The Beginning of a Process
No one expects the Irish government to announce a Bitcoin treasury next week, and it’s debatable whether it should establish one at all. But “A Sound Punt” marks the beginning of a process that could, in time, help reshape Ireland’s approach to money and economic sovereignty.
This accessible primer is just the first step in Bitcoin Network Ireland’s broader educational mission. BNI plans to publish a much more comprehensive policy paper for policymakers in the coming months, which is currently going through the editing phase. While “A Sound Punt” introduces the concepts to the general public, the forthcoming document will provide the detailed analysis and policy recommendations that decision-makers need.
As BNI works to elevate this conversation through both public ed
-
@ 2b998b04:86727e47
2025-05-26 21:05:47Today I pause — not to celebrate, but to remember.\ Memorial Day is a reminder that freedom always comes at a cost. Not theoretical. Not digital. Real. Blood-bought. Passed down.
I didn’t earn the liberties I have. Someone else paid for them.\ The least I can do is steward them well — in how I live, build, and speak.
Tomorrow, I head to Bitcoin 2025.\ I go not just as a Bitcoiner, but as someone who believes Bitcoin, when rightly understood, calls us back to truth, cost, and accountability.\ Not magic internet money. Not another tech trend.\ But a reckoning.
So I walk into this week with both gratitude and resolve:
-
Grateful for those who gave their lives.
-
Grateful for the freedom to write, build, and think out loud.
-
Resolved to use that freedom wisely — and to build systems that don't require bloodshed to sustain them.
Let’s build what lasts.\ Let’s remember what was paid.\ Let’s walk into Bitcoin 2025 with clear eyes and full hearts.
-
-
@ 2b998b04:86727e47
2025-05-26 20:56:42Why Trading Matters (And Why It’s Not a Zero-Sum Game)
There’s a common belief — even in some Bitcoin circles — that short-term trading is just gambling. That it’s a zero-sum game where one trader’s win is another’s loss.
I get it. The noise is real. So is the wreckage from over-leveraged bets and mindless speculation.
But that’s not the whole story.
Recently, someone I worked with in 2023 and 2024 — a former mortgage broker — invited me to join an “investment club” that sends buy/sell signals through WhatsApp.\ Just follow the messages. Don’t think. Don’t learn. Just click and hope.
That’s not trading.\ That’s waiting on an oracle and outsourcing your judgment. It’s faith in hype, not process. It’s anti-skill.
Another friend told me my approach — aiming for consistent, small intraday gains — sounded boring. But here’s what I told him:
If I trade a $100 stock ten times in a day for a $1–2 gain each time, I’ve made the same as someone waiting around for that one 10% spike.\ But I’ve done it with discipline, risk control, and real engagement. That’s not boring. That’s working.
These days, I only trade equities. No crypto. No forex.
Why? Because equities are productive assets tied to real businesses in a real economy.\ They aren’t my end goal — Bitcoin is.\ But equities offer a stable, regulated environment to extract short-term gains without feeding the casino culture of leveraged altcoins or hypervolatile FX pairs.
And forex? You're just trading one melting ice cube for another — flipping between fiat currencies that are backed by nothing but promises and policies.\ It's like playing musical chairs with pieces of paper while the music gets faster.\ I’ve done it. I understand it. But it no longer feels congruent with my Bitcoin ethos.
It’s not about purity. It’s about alignment.\ If I’m going to trade, I want the process to reflect the same principles that drew me to Bitcoin: transparency, discipline, and long-term thinking.
Real trading is:
-
Dynamic, not zero-sum.\ While some instruments are win/lose, markets as a whole reward liquidity, attention, and adaptability. Traders contribute to price discovery.
-
A funding mechanism for conviction.\ I don’t trade just to make money — I trade to build. My equity gains fund my Bitcoin stacking, my open-source work, my writing, my peace of mind.
-
A craft, not a shortcut.\ The edge is earned. Over time. In silence. With scars.
I’m not here to follow someone’s signals.\ And I’m not chasing that one moonshot.
This is daily work.\ This is Proof of Work.
Postscript:\ This week? No red days. A green week — around $300.\ Not a huge number. And that’s okay.\ Because I wasn’t just trading.
I was writing. Building. Launching tools. Finishing a 5-part series.\ Some weeks, the return isn’t measured in dollars. It’s measured in direction.
Small trades. Strong conviction. Deep alignment.
That’s Proof of Work, too.
-
-
@ 5d4b6c8d:8a1c1ee3
2025-05-27 02:24:08I did pretty poorly today. It's dreary and drizzly here, so I didn't get out walking. Even the dog didn't want to go out. We also had weirdly few chores or errands to do.
Maybe this was just a natural rest day. I did catch up on some sleep.
Foodwise, I kept my fast until reasonably late in the day, but then I ate a bunch of cookies. I'll need to do better tomorrow.
How'd everyone else do, today?
https://stacker.news/items/990061
-
@ 87fedb9f:0da83419
2025-05-26 19:57:22https://www.thrivingnow.center/t/1487/5
We covered…
1. Differentiation: Claiming Our Energetic Space
Differentiation isn’t just about closeness or distance—it’s about clearly knowing where we end and others begin. We can say, “They’re tired and grumpy right now,” without giving up our cheerful mood from a peaceful morning meditation. We can adapt without losing ourselves, choosing consciously rather than reacting habitually.
2. Energetic Boundaries: Maintaining Our Own Weather
Many of us with heightened empathy tend to embody another person’s emotions, making their grumpiness our own. Practicing differentiation helps us notice their state without internalizing it, allowing us to maintain our own emotional clarity and calm, even when someone else brings stormy energy into the room.
3. Growing Emotional Muscles Through Discomfort
Differentiation is challenging because it involves tolerating discomfort. For example, preparing a meal lovingly and then watching someone else be disappointed requires emotional resilience. Using EFT tapping, we actively address these uncomfortable moments, building inner strength and clarity to stay true to ourselves even under pressure.
4. Self-Validation: Anchoring Our Integrity
Instead of relying on external validation, we ask ourselves: “Did I act with integrity?” If we’ve lovingly prepared a meal or helped in a situation, we can acknowledge our effort regardless of others’ reactions. By validating ourselves internally, we nurture our sense of self-worth and emotional freedom.
5. Allowing Others Their Own Discomfort
We often feel compelled to alleviate others’ discomfort immediately—yet it’s not always helpful. For instance, when someone is hungover or grumpy, we don’t need to energetically jump in to fix their state. Allowing people to experience their discomfort without interference respects their personal growth and conserves our emotional resources.
6. From Survival Obligations to Conscious Responsiveness
As children, enmeshment—absorbing others’ emotional states—was crucial for survival. As adults, we can shift to a posture of response-ability, being willing and able to respond without obligation. Recognizing we no longer need survival reactions for non-life-threatening situations helps us thrive rather than merely survive emotionally.
7. Honoring the Essential Struggle
Just like a butterfly must struggle out of its chrysalis to survive, allowing someone to face their own challenges supports genuine growth. Even if our heart urges us to intervene, differentiation guides us to remain compassionately present without interfering with their developmental process.
8. Turning Down the Empathy Volume
Many of us developed heightened empathy to monitor emotional threats in childhood. We can now gently turn down this sensitivity, trusting that we’ll notice genuine needs without overreacting to every emotional ripple around us. We use EFT tapping and mindful intentions to recalibrate this empathic awareness.
9. Discernment Check-In: “How Much Is Mine?”
We practice asking ourselves: “How much of this discomfort belongs to me, and how much is theirs?” If we’re triggered by someone’s frustration or disappointment, checking in helps us clarify our own feelings from theirs. For example, recognizing that a child’s intense disappointment resonates with our own unresolved feelings helps us respond more skillfully.
10. Permission to Pause and Choose
When faced with emotional demands—especially from family or intense group dynamics—we give ourselves permission to pause and reflect. We ask, “Is this really my circus, my monkey?” and decide what genuinely feels right. For instance, deciding whether to answer a distressed late-night call from a family member becomes a conscious choice rather than an automatic obligation.
11. Authentic Connections in the “We Space”
Differentiation doesn’t mean isolation—it creates a “we space” where authentic relationships thrive. Being differentiated means we are fully ourselves within relationships, clearly communicating our needs and limits, and respecting those of others. This mutual clarity fosters deeper, healthier connections built on emotional freedom and genuine understanding.
-
@ 26769dac:498e333b
2025-05-26 18:34:14My life is my way Home\ My death is my arrival
I can't wait to be Home\ And so I love life
I can't wait to be Home\ And so I want to live to the fullest
For there are no shortcuts
Many people die\ And never make it Home
They will have to wait\ For another chance to die
Another chance to live fully\ And die totally
I'm so thankful to be alive\ I'm on my way Home
I'm so thankful to be alive\ To have another chance to die
Every day I take a step\ In the direction of my death\ I do not postpone it
Every day I take a step\ In the direction of my truth\ I do not avoid it
It is who I am, always have been\ And always will be
It lies beyond that door\ That keeps everything in check
Where only can go through\ Which is forever true
-
@ bf47c19e:c3d2573b
2025-05-26 16:56:52Dragi Bitcoineri,
Kako se bliži treći mesec izostanka ličnog dohotka na Fakultetu dramskih umetnosti u Beogradu, a dosadašnji vidovi podrške ne mogu da pokriju sve profesore, neophodno je da preduzmemo dalje korake kako ne bi više ispaštali profesori zbog svoje otvorene podrške studentima u borbi za pravednije društvo.
Možda nekad, kad se spolja gleda, deluje kao da se ništa ne dešava na fakultetima ali u našoj zajednici konstantno vri. Borbu sa studentima osećamo kao svoju moralnu i građansku dužnost, a namera nam je da istrajemo na tom putu ka instuitucionalnoj odgovornosti, slobodi i pravdi.
Doniraj BTC! Sve donacije idu u Bitcoin novčanik studenata u blokadi FDU! Hvala unapred ❤️