-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 11:02:14
Hire [taxi in Vellore](https://cabbazar.com/city/vellore) at best price. Book local and outstation cab in Vellore. Confirmed cab, Real time driver details. Price starts ₹1800
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 11:01:35
Hire [taxi in Nellore](https://cabbazar.com/city/nellore) at best price. Book local and outstation cab in Nellore. Confirmed cab, Real time driver details. Price starts ₹1800
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 11:01:18
Hire [taxi in Kaithal](https://cabbazar.com/city/Kaithal) at best price. Book local and outstation cab in Kaithal. Confirmed cab, Real time driver details. Price starts ₹1400
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:55:02
Book [Delhi to Mussoorie cab](https://cabbazar.com/route/delhi-to-mussoorie) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ b8851a06:9b120ba1
2025-01-14 15:28:32
## **It Begins with a Click**
It starts with a click: *“Do you agree to our terms and conditions?”*\
You scroll, you click, you comply. A harmless act, right? But what if every click was a surrender? What if every "yes" was another link in the chain binding you to a life where freedom requires approval?
This is the age of permission. Every aspect of your life is mediated by gatekeepers. Governments demand forms, corporations demand clicks, and algorithms demand obedience. You’re free, of course, as long as you play by the rules. But who writes the rules? Who decides what’s allowed? Who owns your life?
---
## **Welcome to Digital Serfdom**
We once imagined the internet as a digital frontier—a vast, open space where ideas could flow freely and innovation would know no bounds. But instead of creating a decentralized utopia, we built a new feudal system.
- Your data? Owned by the lords of Big Tech.
- Your money? Controlled by banks and bureaucrats who can freeze it on a whim.
- Your thoughts? Filtered by algorithms that reward conformity and punish dissent.
The modern internet is a land of serfs and lords, and guess who’s doing the farming? You. Every time you agree to the terms, accept the permissions, or let an algorithm decide for you, you till the fields of a system designed to control, not liberate.
They don’t call it control, of course. They call it *“protection.”* They say, “We’re keeping you safe,” as they build a cage so big you can’t see the bars.
---
## **Freedom in Chains**
But let’s be honest: we’re not just victims of this system—we’re participants. We’ve traded freedom for convenience, sovereignty for security. It’s easier to click “I Agree” than to read the fine print. It’s easier to let someone else hold your money than to take responsibility for it yourself. It’s easier to live a life of quiet compliance than to risk the chaos of true independence.
We tell ourselves it’s no big deal. What’s one click? What’s one form? But the permissions pile up. The chains grow heavier. And one day, you wake up and realize you’re free to do exactly what the system allows—and nothing more.
---
## **The Great Unpermissioning**
It doesn’t have to be this way. You don’t need their approval. You don’t need their systems. You don’t need their permission.
The Great Unpermissioning is not a movement—it’s a mindset. It’s the refusal to accept a life mediated by gatekeepers. It’s the quiet rebellion of saying, *“No.”* It’s the realization that the freedom you seek won’t be granted—it must be reclaimed.
- **Stop asking.** Permission is their tool. Refusal is your weapon.
- **Start building.** Embrace tools that decentralize power: Bitcoin, encryption, open-source software, decentralized communication. Build systems they can’t control.
- **Stand firm.** They’ll tell you it’s dangerous. They’ll call you a radical. But remember: the most dangerous thing you can do is comply.
The path won’t be easy. Freedom never is. But it will be worth it.
---
## **The New Frontier**
The age of permission has turned us into digital serfs, but there’s a new frontier on the horizon. It’s a world where you control your money, your data, your decisions. It’s a world of encryption, anonymity, and sovereignty. It’s a world built not on permission but on principles.
This world won’t be given to you. You have to build it. You have to fight for it. And it starts with one simple act: refusing to comply.
---
## **A Final Word**
They promised us safety, but what they delivered was submission. The age of permission has enslaved us to the mundane, the monitored, and the mediocre. The Great Unpermissioning isn’t about tearing down the old world—it’s about walking away from it.
You don’t need to wait for their approval. You don’t need to ask for their permission. The freedom you’re looking for is already yours. Permission is their power—refusal is yours.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:54:45
Book [Delhi to Mathura cab](https://cabbazar.com/taxi/delhi-to-mathura) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:54:26
Book [Delhi to Dehradun cab](https://cabbazar.com/taxi/delhi-to-dehradun) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:53:34
Hire [taxi in Madurai](https://cabbazar.com/city/madurai) at best price. Book local and outstation cab in Madurai. Confirmed cab, Real time driver details. Price starts ₹1800
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:53:19
Hire [taxi in Rajkot](https://cabbazar.com/city/rajkot) at best price. Book local and outstation cab in Rajkot. Confirmed cab, Real time driver details. Price starts ₹1300
-
![](/static/nostr-icon-purple-64x64.png)
@ e8ed3798:67dd345a
2025-01-14 17:38:49
Crowdsourcing subjective value is a great idea, but when no thought has been put into how to do it, the results are neither useful nor healthy.
In this article we discuss the problems with the classic five star rating system and why it needs to be abolished in favor of better expressions of public sentiment.
## Part 1: What's In A Star?
Let's start with a thought experiment:
- Do you buy products on Amazon that have 3 stars?
- Do you take rides from Uber drivers that have 3 stars?
- Do you download apps on the App Store that have 3 stars?
- Do you visit places on Google Maps that have 3 stars?
"Not on purpose," is probably your answer. But why not? After all, a three out of five is better than the median; it's 60 percent! That is solidly "above average" by any usual measure. Although it makes sense in mathematical terms, it is not correct to say that a 3 star product is at least half as good as a 5 star product.
The funny thing about the 5 star rating system is that nobody really knows exactly what the stars mean, mostly because they aren't ever explained. They are just a weak abstraction of a score out of 5, which itself is an abstraction of a score out of 100, and it is used to average all ratings for a thing into an average star rating. Presumably, 5 is the best and 1 is the worst, and somewhere in between is... what exactly? Mediocre? Passable? Acceptable? Average? Who knows! This is the first problem with this system; while the top and bottom of the scale may be implied (ambiguity still isn't great), the middle of the scale is entirely ambiguous.
Most of the time, people start with a default supposition that a product ought to be 5 stars, and then they subtract stars according to their own perceived deficiencies of the product. On the flip side, people who are dissatisfied with a product tend to start at 1 star and perhaps award it a couple more if they are feeling charitable.
This dualistic approach highlights another issue with this kind of rating system. Despite the pure quantitative mechanism, the feelings and disposition of the rater ultimately assign meaning to the numeric scale.
Ultimately, any 5 star rating system ends up being a gamut ranging from hate it to love it with a lot of ambiguity in the middle.
To put it simply, the stars mean nothing. But to be more precise, the stars are the *average* of the *numeric expression* of the public sentiment about a thing.
OK, public sentiment. That's what we want right? We want to know what the public thinks about the product so we can make a good purchase decision.
Except, unfortunately, the 5 star rating system does an incredibly imprecise job at capturing what the public actually thinks about a product. Let's dive into why this is. But first, to conclude our thought experiment, I'd like to establish an informal consensus that we instinctually seek out the highest rated items and avoid ratings less than 4.5 out of 5, with infrequent exceptions. If this sounds like you, then let's proceed.
## Part 2: Trash or Treasure
How does one turn their feelings into a number? This is not something people are good at, or do naturally, or are even required to do very often. It is also completely subjective and arbitrary. Does "happy" mean 5 or 100 or 902,581? It really depends on what you are trying to measure.
However, you've probably done this on a survey. Normally, a range of options is given with accompanying numbers. You may have heard a guiding explanation such as "Rate one through five, with one being 'least likely' and five being 'most likely' to recommend to a friend." Such explanations are useful in assisting a person in expressing their personal sentiments as a numeric range, and anecdotally I seem to provide more nuanced answers when I have guidance as to what each value actually means to me. However, such explanations are missing from most places where five star rating systems can make or break one's livelihood as a seller, developer, or musician. Users are normally given no guidance as to how a particular star value should correspond to their sentiment.
Accordingly, this manifests in an all too common star rating smiley. Like the famed "smiley face curve" equalizer setting popularized in the 70's in which the frequencies of a song were engineered to grow from the midranges upward toward the treble and bass making a smile shape (who's midrange is the lowest), the star rating smile is a common sight on product reviews where the most common review ratings appear anecdotally to be 5 and 1, then 4 and 2, and lastly 3.
The fact that the most common ratings are five stars and one star indicates that people most often do not think about their experience as a gradient between good and bad, but rather simply label their sentiment as only "good" or "bad" with little room for nuance. Having not received any guidance for expressing their sentiment numerically, this should be wholly unsurprising. But, I also feel like this binary outcome is a very natural expression that requires minimal mental energy to produce, and is therefore the most efficient expression of sentiment. I suspect that in another universe where we have a commonplace 15 star rating system but humans are the same, the most common ratings are 15 stars and 1 star respectively.
Other factors influence this binary good/bad paradigm too. People know instinctively that leaving a bad review is bad for business, and often this is their vengeful response to any sense of feeling as if they have been mistreated, misled, or swindled by the seller. Often times the sheer excitement of the new product compels people to write reviews only minutes after they have received it, precluding them from providing an experienced and time-tested perspective of how the product performs.
These quirks of human behavior can skew five star ratings severely. But the behaviors themselves are not bad! They are totally natural and expected. The real problem is how the five star rating system fails to capture these commonplace human sentiments accurately.
We need to build a rating system that works for people rather than forcing people to fit into a poorly executed rating system.
## Part 3: Feast or Famine
It is natural that when presented with a plethora of options, humans will be drawn to the options that are labeled as "the best". When "best" possible is five stars, then five stars naturally becomes the [Schelling point](https://en.wikipedia.org/wiki/Focal_point_(game_theory))for all buyers and sellers, where the vast majority of economic activity is concentrated.
When all ratings are seen from a five-based perspective, fours look barely adequate. Threes look unacceptable. Twos are abject. And ones are complete disasters.
You may have heard about how [Uber would suspend drivers whose ratings fell below 4.6](https://www.inc.com/minda-zetlin/uber-rider-ratings-deactivation-lyft-rideshare.html). The tendency of five star rating systems is to create a gradient of sentiment where 1 to 4.5 stars is "bad" and 4.5 to 5 stars is "good".
One rarely discussed outcome of this dynamic is that good ratings are nearly impossible to compare to each other. As alluded to in the introduction thought experiment, the narrow range between 4.5 and 5 leaves very little room to distinguish from a good product and an excellent product; both are simply "good" or "not bad". As highly rated products are usually the products people are most interested in, it is unfortunate that a favorable rating would actually provide less signal than a bad rating as to the product's relative quality in the spectrum of good ratings.
Meanwhile, bad ratings have wide berth to compare numerically. The astronomical range between 1 and 4.5 is a very spacious gradient in which to assess how bad one product is versus another, except nobody actually cares because nobody is going to buy it anyway!
In the five star rating system, the better a product is, the *less* information we get to compare it to other similarly good products. This is a critical design flaw, because the better a product is and the more people review it, the *more* information we should have about it versus other similar products. It would be better if the range of "good" ratings was wider so that good ratings could be compared to each other.
I'd like to emphasize that the *loss of precision* as a product becomes more desirable is a truly ludicrous mechanic of the five star rating system. This poorly conceived rating paradigm completely pervades our digital economic systems and determines the success of millions of producers. Let's be clear about the stakes. Assigning subjective value to things is completely overlooked for what it really is: a absolutely critical and monumentally influential economic activity. Because the most important economic activity is how we assign value to things with money, the second most important economic activity is how we *inform* our economic value assignments with subjective value assignments such as these.
We need to fix how we rate things. It could literally change how entire economies function.
## Part 4: Quality or Quantity
Valve has obviously put thought into how they handle ratings for video games sold through their extremely popular and long-lived Steam platform.
Reviews are not allowed until a certain amount of hours of the game have been played. The review must assign a thumbs-up or thumbs-down, and then provide a minimum amount of text.
Then, rather than simply providing an average of these binary ratings, Steam averages them over a recent period of time, creating a dynamic where if a game developer releases a new update, the reviews written more recently are sure to influence the overall rating of the game rather than old ratings that haven't taken the new update into consideration.
Finally, the aggregated rating itself is displayed as "Overwhelming Negative", "Very Negative", "Mostly Negative", "Mixed", "Mostly Positive", "Very Positive", or "Overwhelmingly Positive".
Ask yourself, which product would you be more likely to try?
- 2.5/5 stars
- "Mixed Reviews"
Ironically, the Steam rating system gives users less flexibility to express their sentiment as a number, and yet provides more depth, nuance, and balance to the resulting ratings. This, ladies and gentlemen, is what it looks like when somebody gives a damn about how things work. It is a great system.
Another interesting emergent behavior that accompanies many Steam reviews, as well as many reviews on other sites, are user generated pros/cons lists. These lists are helpful and offer qualitative labels that help to explain the quantitative rating assignment, although these labels are not mechanically related to the rating system itself.
Steam has another mechanism to express qualitative judgements in the form of labels, although they had to be restricted because they were being abused in undesirable or nefarious ways. Now the labeling system does more to tell you about what the game is rather than what people think about it, which is fine, but I feel like it is a missed opportunity.
Therefore, I'd like to propose a simple system that combines thumbs up/down and labeling to be used in the context of nostr's review system.
## Part 5: QTS
I call this new review system QTS, or the "Qualitative Thumb System". [Originally I developed QTS when working at Arcade Labs.](https://github.com/ArcadeLabsInc/arcade/wiki/ArcadeSocial)
[This PR for a new nostr review mechanism](https://github.com/nostr-protocol/nips/pull/879) allows for a lot of flexibility in how you apply ratings to things, so QTS is simply a method of applying rating values that creates a better human-oriented review system. QTS is a way of using reviews.
In essence, QTS capitalizes on our very human instinct to assign a "good" or "bad" label by limiting the quantitative assessment to a thumbs-up or thumbs-down. Then, QTS provides qualitative labels that describe possible positive sentiments that describe different aspects of the thing being rated.
First, the user chooses thumbs-up or thumbs-down as their overall assessment. If they do nothing else, this is sufficient to capture their sentiment. However, labels should be provided which the user can check or toggle on to increase their rating further.
The initial thumbs up is worth 0.5, and each label is worth (0.5 / number of labels). The minimum rating is 0 (thumbs down, no labels), and the maximum rating is 1 (thumbs up and all labels). Any rating 0.5 or above is trending toward good and below 0.5 is trending toward bad.
The labels should be applicable in the context of the thing. So, for example, I might provide the following labels for place reviews in a Google Maps-style app:
- Convenient
- Clean
- Affordable
- Memorable
- Inviting
These labels could possibly describe any place. It's OK if a place doesn't have all of these qualities. Zero labels and at thumbs up is still a "good" rating. Each label selected is essentially a "cherry on top" and its absence may indicate that either it isn't applicable OR the place failed to earn it.
Likewise, it is possible that you may give a place a thumbs-down and apply labels; this would result in a rating higher than 0 but still in the bad gradient (below 0.5).
Here are the key benefits I want to highlight of QTS:
- The 5 star rating system forces a user to do the work of translating their sentiment into a quantity. With QTS, the user never has to translate their feelings into a number! They only express good or bad and pick labels, and the QTS mechanism does the work of translating this into a computation-friendly value.
- The 5 star rating system generally results in a "bad" range from 1 to 4.5 and a "good" range from 4.5 to 5. QTS balances this with a "bad" rating at 0, a "good" rating at 0.5, and an excellent rating is anything above 0.5 (up to 1.0). This creates the maximum possible gradient between good and bad which makes it easier to compare similar ratings. Recall this in contrast to the 5 star rating system which actually _loses precision_ as more ratings are provided.
- It is also helpful that similar QTS ratings may have different labels, which will allow people to make easy qualitative assessments that do not depend on users generating their own pros/cons list.
## Part 6: Implementing QTS
Here is how it works:
You give the user the option to rate a thumbs up or thumbs down.
Then, you also give your user the option to choose from a predefined set of positive labels. You can have any number of labels but try to keep it below 10 so as not to overwhelm your users. Keep the labels general enough that they could potentially apply to any thing being rated.
For example, if you were providing labels for Amazon.com, some good labels would be:
- Good Value
- Good Quality
- As Described
- Durable
- Right Size
These labels are general enough that they could apply to almost any product. It is important to create labels that are general so that when comparing product ratings you are comparing the same labels. It is possible however that something like Amazon.com could define a different QTS label subset for each product category, and then the labels could be more specific to that category.
For example, a product category of Candles could have "Long Burning", "Good smell", "Safe", etc. These labels are much more specific, but appropriate for the Candle product category. The main point is that products which should be compared should use the same QTS label set.
Some poor examples of labels would be:
- Orange (not really relevant to the product's assessment)
- Easy to Lift (only relevant to certain products)
- Made in USA (not really relevant to the product's assessment)
- Cheap (not descriptive enough and could be interpreted as negative)
A score is derived as follows:
- a thumbs-down is a score of 0.00
- a thumbs-up is a score of 0.50
- a label is worth 0.50 ÷ the number of labels available. So, if there are 3 labels to pick from, each label is worth 0.1666. The labels should all have the same value.
Here is an example by calvadev being used on Shopstr:
https://github.com/nostr-protocol/nips/pull/879#issuecomment-2502210146
You can adjust the weights however you want. The fundamental thing that QTS prescribes is that a thumbs up gives a 50% score, and labels each contribute an equal share up to another 50%.
# Conclusion
With nostr we have a great opportunity to improve the economic information available to the planet. A more efficient market based on higher quality information will improve civilization in ways we may not expect, but definitely deserve!
If you like this post, be sure to give it a thumbs up ✌😁
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:30:42
Book [Bilaspur to Raipur cab](https://cabbazar.com/taxi/bilaspur-to-raipur) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:30:24
Book [Raipur to Korba cab](https://cabbazar.com/taxi/cab/raipur-to-korba) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:30:01
Book [Raipur to Jagdalpur cab](https://cabbazar.com/taxi/cab/raipur-to-jagdalpur) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:27:58
Book [Surat to Navsari cab](https://cabbazar.com/taxi/cab/surat-to-navsari) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:27:38
Book [Surat to Bharuch cab](https://cabbazar.com/taxi/cab/surat-to-bharuch) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:27:18
Book [Surat to Mumbai cab](https://cabbazar.com/taxi/surat-to-mumbai) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:14:39
Book [Vadodara to Bharuch cab](https://cabbazar.com/taxi/vadodara-to-bharuch) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:14:20
Book [Vadodara to Anand cab](https://cabbazar.com/taxi/vadodara-to-anand) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5adb967d:ac1f7d04
2025-01-16 10:02:22
In this era of ubiquitous radio waves surrounding us, the issue of communication security is receiving increasing attention. The leakage of radio signals may bring great danger to governmental organizations, enterprises and the general public. Effective blocking of radio waves, constructing an absolutely safe “quiet zone”, has become the urgent needs of many people. Advanced communication [gps blocker](https://www.thejammerblocker.com/gps-jammer-car-tracker-blocker/), with its powerful electromagnetic shielding ability, is to meet this demand is the magic weapon. It can be described as an invisible “quiet cage”, all radio signals completely isolated.
Communication shielding using the physical principle of electromagnetic shielding, in a specific range to form an effective isolation of radio waves “quiet zone”. As long as in this area, whether it is the most advanced eavesdropping and monitoring equipment, or intended to harass the interference of radio waves, all have no way to start, from the root to eliminate the risk of communications leaks.
As an unbreakable radio “copper wall”, communications shielding can be widely used in a variety of military, government, business and other communications security requirements are extremely high places. Just open the shielding function, the entire region will become an absolutely safe and reliable “quiet cage”, where you can freely carry out classified meetings, conversations, deliberations and other work, no worries.
Even if the region within the deployer has a “mole” carrying eavesdropping equipment, will also be completely “off”. There will be no radio interference signal infiltration, so that the most stringent confidentiality work can also be foolproof, so as to escort the security of important confidential information.
In addition to fixed places, communication [wifi jammer](https://www.thejammerblocker.com/wifi-bluetooth-camera-jammer-blocker/) can also be installed in a variety of special vehicles, trains, ships and other mobile carriers for the transportation of classified materials and important personnel to provide solid communication protection. Whether traveling in any environment, just turn on the mobile shielding mode at any time, the entire transportation will become an absolutely safe and controllable “quiet cage”. Any radio waves on the road can not spy, eliminating the risk of sensitive information leakage in transit.
The latest generation of communication shielding, but also has the ability of intelligent frequency selection. They can be based on specific needs, 2G/3G/4G/5G, WiFi, GPS and other specific radio frequency bands to accurately and selectively implement the [signal jammer](https://www.thejammerblocker.com/), the other wireless communication functions to be retained. This “semi-closed static area” effectively realizes the organic combination of convenience and communication protection.
It is worth mentioning that nowadays there are portable communication [UAV jammer](https://www.thejammerblocker.com/drone-uavs-jammers-blockers/) device. This compact, plug-and-play products, you can easily carry, so that the protection ability to extend to a variety of business trips, outdoor conversations and other scenarios. No matter where they are, users only need to flick the switch, you can build an absolutely safe and reliable “quiet cage”.
It can be said that the communication [recording jammer](https://www.thejammerblocker.com/audio-recorder-jammers/) is with its impenetrable electromagnetic protection ability, for us to build an isolation of radio waves “quiet cage”, effectively guarding the absolute security of communications and information. At a time when the risk of information leakage is increasing, this “silent guardian” will play an increasingly important role in protection, and become an important guarantee to ensure communications security. Whether in the military, government, enterprises and other fields, or business travel, daily life, it will be a solid backing for communications protection.
1. [https://www.causes.com/users/thejammerblocker](https://www.causes.com/users/thejammerblocker)
2. [https://giphy.com/gifs/Qvwn5es56xfSbl8RjU](https://giphy.com/gifs/Qvwn5es56xfSbl8RjU)
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:01:12
Book [Ahmedabad to Bharuch cab](https://cabbazar.com/taxi/cab/ahmedabad-to-bharuch) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 10:00:54
Book [Ahmedabad to Patan cab](https://cabbazar.com/taxi/cab/ahmedabad-to-patan) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 09:59:11
Book [Ahmedabad to Unjha cab](https://cabbazar.com/taxi/ahmedabad-to-unjha) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 09:56:50
Book [Ahmedabad to Anand cab](https://cabbazar.com/taxi/ahmedabad-to-anand) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 09:55:48
Book [Ahmedabad to Nadiad cab](https://cabbazar.com/taxi/ahmedabad-to-nadiad) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 09:55:27
Book [Ahmedabad to Gandhidham cab](https://cabbazar.com/taxi/ahmedabad-to-gandhidham) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 09:54:38
Book [Ahmedabad to Jamnagar cab](https://cabbazar.com/taxi/ahmedabad-to-jamnagar) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ fbf0e434:e1be6a39
2025-01-16 09:54:26
# **Hackathon 总结**
[Aptos Code Collision Hackathon](https://dorahacks.io/hackathon/code-collision) 圆满结束,吸引了658个注册项目和来自全球2,658名开发者参与。该Hackathon以混合格式进行,旨在通过研讨会和训练营推进Aptos平台上Web3发展的区块链创新。
活动提供超过500,000美元的奖金,吸引了众多热衷于创建有意义应用程序的参与者。评审由行业专家进行,包括来自Aptos Labs的Mo Shaikh和Avery Ching,以及其他著名区块链和投资公司领导人。
Hackathon 突出展示了Aptos技术,如Keyless用户认证和链上随机性,支持开发人员创建安全高效的应用。通过提供详尽的参与者手册,增强了新手和高级用户的学习和开发。活动展示了显著的参与和有前景的创新,旨在增强Aptos区块链生态系统。
# **Hackathon 获奖者**
### **DeFi / RWA 奖项获奖者**
- [**Panana Predictions**](https://dorahacks.io/buidl/16813):一个通过Aptos智能合约进行事件预测的去中心化平台,提供透明交易和社区治理市场。
- [**Sentra Restaking Protocol**](https://dorahacks.io/buidl/17617):通过再抵押层加强Aptos安全性,提供池化安全和可定制惩罚措施。
- [**Legato**](https://dorahacks.io/buidl/16659):利用AI进行BTC价格预测并使用智能合约管理流动性池的DeFi市场平台。
- [**eVault**](https://dorahacks.io/buidl/16003):结合DeFi和TradFi,为Aptos上的未服务社区提供金融服务。
- [**MeowFi**](https://dorahacks.io/buidl/16628):使用NFT作为贷款抵押品,支持Aptos上的透明借贷。
### **游戏 / NFTs 奖项获奖者**
- [**Jeton**](https://dorahacks.io/buidl/16033):使用zk-SNARKs确保公平的Aptos去中心化扑克平台。
- [**On-Chain Treasure Hunt Multiplayer!**](https://dorahacks.io/buidl/17434):完全链上游戏,利用智能合约确保透明机制和奖励。
- [**Forged Realms - IP Incubation with Games**](https://dorahacks.io/buidl/16825):通过代币化和社区驱动的方法支持游戏IP孵化。
- [**Aptos Legacy**](https://dorahacks.io/buidl/16606):在Aptos上提供代币化资产增强玩家所有权的3D RPG游戏。
- [**appToss Friends**](https://dorahacks.io/buidl/16020):提供链上赌场基础设施,利用流动性池和好友注册表。
### **AI / DePIN 奖项获奖者**
- [**ChatEDU**](https://dorahacks.io/buidl/17476):利用AI支持的教育系统,通过区块链积分激励内容共享。
- [**Unity Network**](https://dorahacks.io/buidl/16826):通过联邦学习协议促进AI模型的数据货币化。
- [**ProxiRun**](https://dorahacks.io/buidl/16608):通过Aptos智能合约管理的去中心化计算市场。
- [**FLock Move GPT**](https://dorahacks.io/buidl/17281):使用高级调优和分类方法训练符合Aptos编码标准的大型语言模型(LLM)。
- [**Antikythera**](https://dorahacks.io/buidl/17612):通过执行交易和识别实时机会来增强Aptos交互的AI代理。
### **社交奖项获奖者**
- [**Cook App**](https://dorahacks.io/buidl/16797):基于Telegram的应用,通过区块链支持的滑动界面策划加密新闻。
- [**BiUwU**](https://dorahacks.io/buidl/16632):直播平台,特色包括AI驱动的影响者和互动的区块链支持参与。
- [**FundMate**](https://dorahacks.io/buidl/16821):提供社交消息传递和加密交易的平台,具有去中心化支付管理。
- [**Enthro**](https://dorahacks.io/buidl/16423):利用区块链增强视频内容创建以促进市场增长机会。
- [**StreamAd**](https://dorahacks.io/buidl/17622):一个专注于Twitter的平台,通过智能合约自动化管理活动和奖励分发。
### **意外奖项获奖者**
- [**ActionX**](https://dorahacks.io/buidl/14572):通过将流程转化为可操作链接简化区块链交互。
- [**Compensate**](https://dorahacks.io/buidl/17562):运用零知识证明,实现安全透明薪水交易的工资管理创新。
- [**Khizab**](https://dorahacks.io/buidl/16769):提供反应式区块链能力,通过模块化、类型安全的工具进行应用开发。
- [**Aptos Extension**](https://dorahacks.io/buidl/15534):提升Aptos生态系统内生产力和协作的开发工具。
- [**Aptotic: Industrial Robotic Automation on Aptos 🤖**](https://dorahacks.io/buidl/16701):通过区块链集成安全操作,为工业自动化提供MaaS。
### **UI 挑战奖项获奖者**
- [**PlayStop**](https://dorahacks.io/buidl/16822):一个社交小游戏平台,结合数字资产所有权和实时竞赛。
- [**EdenX**](https://dorahacks.io/buidl/6955):一个Web3学习平台,特色包含通过Telegram bot进行游戏化学习赚钱体验。
- [**Vortex**](https://dorahacks.io/buidl/17499):为玩家对玩家游戏提供安全流动性管理的GameFi平台。
### **最佳公共利益奖项获奖者**
- [**Scaffold Move**](https://dorahacks.io/buidl/13953):一个开发Aptos上dApps的开源工具包,包括部署脚本和模块热重载。
- [**build 3 (fka Aptos Bounty App)**](https://dorahacks.io/buidl/17630):支持任务完成并附带分析仪表板的去中心化劳动力市场。
- [**Aptos Extension**](https://dorahacks.io/buidl/15534)
### **Aptos Indexer Challenge with Nodit 奖项获奖者**
- Panana Predictions
- [**Wavefy Network - Decentralized Network for Generative AI Inference**](https://dorahacks.io/buidl/15025):使用P2P网络解决AI内存问题,实现分布式模型推理。
- Compensate
### **远见选择:消费者应用程序悬赏奖项获奖者**
- BiUwU
- Cook App
- eVault
- Antikythera
- ChatEDU
### **Mirana悬赏奖项获奖者**
- Sentra Restaking Protocol
- BiUwU
- FLock Move GPT
### **MEXC Venture's 选择奖项获奖者**
- [**AGDEX**](https://dorahacks.io/buidl/15926):一个用于杠杆交易的去中心化永久交易平台,特点包括AGLP代币。
- EdenX
- Panana Predictions
- [**紅包拿來**](https://dorahacks.io/buidl/17220):将传统红包文化与区块链结合,实现安全的数字资产分享。
- [**Inbox-to-Earn using Telegram + Mizu**](https://dorahacks.io/buidl/16789):通过Aptos代币支付优先消息,货币化Telegram收件箱。
### **Mizu Wallet's Telegram Integration Challenge 奖项获奖者**
- AGDEX
- Panana Predictions
- [**Apt Date**](https://dorahacks.io/buidl/17393):通过区块链确保互动安全的约会平台,使用链上随机性进行用户匹配。
有关所有项目的详细信息,请访问 https://dorahacks.io/hackathon/code-collision/buidl。
# **关于组织者**
### **Aptos Foundation**
Aptos Foundation 在区块链技术领域占有重要地位,提供一个采用Move编程语言的Layer 1区块链以增强可扩展性。其每秒可处理高达30,000笔交易,并每日处理20亿笔交易,该基金会重视交易效率和安全性。致力于持续创新,其使命是通过成本效益高且稳健的解决方案演进区块链基础设施。Aptos Foundation 积极投入技术开发,促进动感和安全的数字生态系统。
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 09:54:17
Book [Ahmedabad to Himmatnagar cab](https://cabbazar.com/taxi/ahmedabad-to-himmatnagar) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ fbf0e434:e1be6a39
2025-01-16 09:54:04
# **Hackathon 总结**
[Hackmos 2024](https://dorahacks.io/hackathon/hackmos2024) 活动在迪拜圆满结束,作为 Cosmoverse 2024 的一部分,该活动吸引了 53 个注册项目和 101 位开发者参与。Hackathon 为学生和非学生团队提供了展示平台,每个团队在特定时间段展示项目,由针对不同赛道类别的评审小组进行评估。此次活动展现了 Cosmos 生态系统的创新成果,促进了开发者与区块链爱好者之间的交流。
参与者被鼓励开发展示技术创新和实用功能的项目。活动的结束阶段,项目展示以技术创新、功能性、可用性和安全性为评估标准。通过接触更广泛的加密社区,Hackathon 展示了具有显著社区影响力和采纳潜力的有前景项目。
在迪拜的文化背景下,参与者还有机会探索当地环境。Hackathon 参会者获得非可转让的 Cosmoverse 会议入场券,这是一个围绕 Cosmos 生态系统发展的论坛。活动促进了协作和竞争,旨在推动区块链项目开发的增长和探索。
# **Hackathon 获奖者**
### **Interchain 奖获奖者**
- [**Wasm ICQ Datahub**](https://dorahacks.io/buidl/18068):在 Neutron 区块链上使用智能合约,促进跨链数据交换,无需进行架构更改,特别适用于金融协议和分析。
- [**ZkResolution**](https://dorahacks.io/buidl/18096):通过零知识证明提高 DNS 隐私,提供安全查询并确保 EVM 和 Cosmos 生态系统之间的互操作性。
- [**FractionXChange**](https://dorahacks.io/buidl/17974):实现 NFT 的分割和租赁,允许可分割代币用于共享资产访问,同时保持资产排他性。
- [**Cosmic Quest**](https://dorahacks.io/buidl/18078):通过角色扮演任务游戏化区块链教育,结合实际互动和链上凭证。
- [**SupportMEow**](https://dorahacks.io/buidl/17976):通过区块链促进猫舍捐赠,使用 AI 和 IBC 进行图像验证和区块链铭文。
- [**NAMI <> Mars Protocol Integration**](https://dorahacks.io/buidl/17984):将 NAMI 和 Mars Protocol 集成,用于跨链储蓄,提供可持续收益和稳定币管理。
- [**InMail Treasury**](https://dorahacks.io/buidl/18108):提供基于 AI 的金库管理和电子邮件接口,利用 CosmWasm 和 Osmosis 智能账户进行安全的加密管理。
- [**BreezeNode**](https://dorahacks.io/buidl/18114):通过区块链驱动的智能能源管理系统,促进节能行为,针对减少使用提供基于代币的奖励。
- [**FreshCatch**](https://dorahacks.io/buidl/18120):通过直接交易连接渔民和市场,简化海鲜供应链,提升可持续性和效率。
- [**LogoSpark - RECs Blockchain**](https://dorahacks.io/buidl/18118):通过 PoS 区块链进行 REC 交易,确保可再生能源市场的透明度和可持续性。
### **Cosmos Hub 奖获奖者**
- [**MEME HERO**](https://dorahacks.io/buidl/18067):在 Cosmos 上为 meme 代币提供启动平台,使用 IBC 提供流动性,并在游戏化平台中实现可定制的代币经济学。
- **Symbiosis**
- [**Proof of Profit**](https://dorahacks.io/buidl/18105):模拟交易环境以展示可验证的盈利能力,安全地在链上吸引投资。
- **Swift Notify: Cosmos Hub Newsletters**
- **Wasm ICQ Datahub**
### **Babylon 奖获奖者**
- [**HWStaking**](https://dorahacks.io/buidl/18061):通过 Babylon 集成 Ledger 钱包进行比特币质押,提高质押者的安全性和可访问性。
### **Warden 奖获奖者**
- **SupportMEow**
- **InMail Treasury**
- [**FedLearn**](https://dorahacks.io/buidl/18098):通过去中心化的联邦学习和 Warden Protocol 集成实现私有机器学习。
### **Osmosis 奖获奖者**
- **InMail Treasury**
- **Symbiosis**
- [**Osmosis smart contract EOL**](https://dorahacks.io/buidl/18086):通过非活动监控和用户无法操作时的委托执行,提供安全的加密基金回收。
### **Neutron 奖获奖者**
- **Wasm ICQ Datahub**
- **Proof of Profit**
- [**Neutron Drop protocol UI in TMA**](https://dorahacks.io/buidl/18103):Telegram 应用接口与 Neutron Drop Protocol 集成,实现跨网络无缝智能合约操作。
### **Mantra 奖获奖者**
- [**TOKIFY Protocol**](https://dorahacks.io/buidl/18095):在 MANTRA 链上管理现实世界资产代币化,允许在合规、DAO 治理的框架下实现部分所有权。
- **FractionXChange**
- [**mantrapy**](https://dorahacks.io/buidl/18069): 通过功能强大的 Python 库增强与 Mantra 链的交互,实现去中心化应用的可扩展性。
### **Agoric Bounty 奖获奖者**
- [**Zero mile**](https://dorahacks.io/buidl/17981):开发一个流动性层,用于在区块链之间实现无传统消息传递的无缝 DeFi 操作,提高互操作性。
- **SupportMEow**
- [**Agoric: Event Registration**](https://dorahacks.io/buidl/18112):扩展活动注册平台,通过 Agoric 集成支持多区块链交易。
### **Dora Factory Bounty 奖获奖者**
- [**ZKBugs**](https://dorahacks.io/buidl/18023):专注于 Circom 电路中的错误检测,确保密码学应用的最佳性能。
- [**HACKMOS BOUNTY MINOR**](https://dorahacks.io/buidl/18041):检查消息链验证漏洞,以提高去中心化系统的安全性。
查看所有获奖项目和详细信息,请访问 [Hackmos 2024 Projects](https://dorahacks.io/hackathon/hackmos2024/buidl)。
# **关于组织者**
### **Cosmoverse**
Cosmoverse & Hackmos Dubai 2024 是技术和区块链领域的知名社区,致力于推动Cosmos区块链的创新和合作,以组织吸引人的会议和 Hackathon 而闻名,将行业专家、开发人员和爱好者聚集在一起,探索新兴趋势和解决方案。该组织的举措旨在推进区块链技术的知识和实践应用。目前,其重点是加强技术参与,促进对话以推动行业向前发展。
-
![](/static/nostr-icon-purple-64x64.png)
@ fbf0e434:e1be6a39
2025-01-16 09:53:37
# **Hackathon 总结**
[Funding the Commons & Earth Commons Hackathon](https://dorahacks.io/hackathon/ftc-2024) 从10月7日到11月7日举行,吸引了356名开发者注册116个项目。活动专注于为公共物品融资创造解决方案,重点是再生金融、去中心化治理和气候创新。主要在线上进行的Hackathon在11月6日和7日于曼谷举行了一次可选的线下会议,以促进全球协作。
参与者最初在一个包括每周挑战的创意阶段进行,然后发展到原型开发。Hackathon提供了指导和研讨会访问,评审标准集中在创新性、影响力和可行性。虽然未详细介绍具体项目,但大量的参与显示了对目标领域的浓厚兴趣。
该Hackathon由Funding the Commons与Earth Commons共同组织,前者倡导基于区块链的公共物品基础设施,后者强调自然资源治理。通过吸引多元化的全球社区,该活动旨在推动公共物品管理和管理方面的系统性变革。
# **Hackathon 获奖者**
### **Stellar奖项的金融普惠**
- [**Freelii**](https://dorahacks.io/buidl/18601) 使用Stellar的区块链来促进安全且具成本效益的汇款,并通过Telegram增加全球南方地区的可访问性。
- [**Ask Billy**](https://dorahacks.io/buidl/18911) 利用AI、调查和区块链促进人道主义援助,改善影响评估和安全转账。
- [**Stellar Mobile Money Bridge**](https://dorahacks.io/buidl/18913) 将移动支付与Stellar集成,简化跨境交易并解决金融碎片化问题。
### **NEAR奖项的去中心化AI**
- [**VielNetFL**](https://dorahacks.io/buidl/18948) 是一个使用NEAR智能合约和IPFS的安全联邦学习平台,通过先进的加密技术确保数据隐私。
- [**FederNear**](https://dorahacks.io/buidl/18965) 提供基于NEAR区块链的隐私保护联邦学习,采用Pedersen承诺进行加密模型训练。
- [**Delta**](https://dorahacks.io/buidl/18962) 是一个利用去中心化AI和区块链预测灾害并透明管理资金的灾难救援平台。
### **Filecoin奖项的去中心化存储**
- [**ZkResolution**](https://dorahacks.io/buidl/18096) 作为一个使用零知识证明的DNS隐私协议运行,实现EVM和Cosmos生态系统之间的跨链能力。
- [**SovereignSearch**](https://dorahacks.io/buidl/18722) 是一个去中心化搜索引擎,专注于隐私的数据检索,使用Storcha和Filecoin Lassie进行安全存储。
### **KlimaDAO奖项的环境影响**
- [**Proof of Change**](https://dorahacks.io/buidl/17989) 基于验证结果为气候项目提供资金,使用以太坊进行状态变更验证和IPFS进行文档记录。
- [**PGAtlas**](https://dorahacks.io/buidl/18897) 是一个互动平台,连接用户与全球公共物品项目,通过地理定位和Celo网络进行捐赠。
- [**0xFarms**](https://dorahacks.io/buidl/18749) 通过AI驱动的农场和区块链众筹提高粮食安全,支持农村和城市农业倡议。
- [**GreenLink**](https://dorahacks.io/buidl/18912) 是一个利用区块链进行安全数据处理和激励回收的废物管理平台。
### **公共物品融资基础设施奖项**
- [**Doogly**](https://dorahacks.io/buidl/18960) 通过Allo协议简化加密捐赠,支持多链和多代币交易,以NFT证书确认捐赠。
- [**Dead Project Snipper**](https://dorahacks.io/buidl/18384) 评估区块链项目活动以识别不活跃项目,并通过机器学习优化资助分配。
- [**IES(Impact Evaluation Service)**](https://dorahacks.io/buidl/18262) 激励基于区块链的影响评估,促进项目资助的链上评估。
- [**Counterfactually**](https://dorahacks.io/buidl/18929) 使用合成控制方法分析web3干预措施的影响,以便为决策提供信息。
- [**Ecosystem Vision**](https://dorahacks.io/buidl/17862) 提供一个集中式仪表盘,用于评估加密资助的影响,整合来自不同资助计划的数据。
- [**GrantScan: Indexing all Grant Applications Ever in Web3**](https://dorahacks.io/buidl/18899) 是一个索引Web3资助申请的搜索引擎,可增强数据访问和验证。
### **Holonym奖项的身份和隐私**
- [**Refugee Identity Issuer**](https://dorahacks.io/buidl/18941) 利用区块链、零知识证明和生物识别数据为难民提供去中心化身份验证。
- [**Trufy**](https://dorahacks.io/buidl/18798) 通过基于凭证的影响增强DAO投票,提供多样化模式以改善决策质量。
### **Layer奖项的全栈去中心化**
- [**Builder's Dollar**](https://dorahacks.io/buidl/18381) 是一种用于资助Optimism Foundation项目的收益稳定币,集成AAVE以获得收益。
### **Numbers Protocol奖项的信任和真实性**
- [**Jurdil - Community-Based Election Recap Utilizing Blockchain Technology with Captures**](https://dorahacks.io/buidl/18970) 通过区块链和媒体验证增强印度尼西亚的选举透明度。
- [**Infinity Book: Pet Heroes**](https://dorahacks.io/buidl/18704) 是一个使用区块链内容验证和AI增强的故事创作的数字书籍平台。
如需更多详细信息及探索所有项目,请访问[此处](https://dorahacks.io/hackathon/ftc-2024/buidl)。
# **关于组织者**
### **Funding the Commons**
Funding the Commons 致力于加速区块链基础设施在公共物品融资中的发展。通过培育一个涉及Web2、Web3、学术界、公共部门、慈善业和行业的多元化生态系统,该组织旨在推动公共物品管理中的系统性变革。其重要举措包括举办国际会议、建设者驻场项目和Hackathon,同时通过实验性资金轮次为开源项目提供资本。其使命集中于增强人类协调,以优先保护公共物品,并以影响评估系统和可持续资本流动为支持。
-
![](/static/nostr-icon-purple-64x64.png)
@ c1adca38:5c6dd4f8
2025-01-16 09:51:58
Book [Rajkot to Morbi cab](https://cabbazar.com/taxi/rajkot-to-morbi) online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ b50957d8:6fcbccb4
2025-01-16 09:47:31
NgonClub là một nền tảng trực tuyến hiện đại, được thiết kế với giao diện dễ sử dụng và các tính năng tối ưu nhằm mang đến cho người dùng một trải nghiệm mượt mà và hiệu quả. Với phương châm luôn đặt sự tiện lợi và trải nghiệm người dùng lên hàng đầu, NgonClub cung cấp một không gian trực tuyến đầy đủ các công cụ hỗ trợ, giúp người dùng dễ dàng truy cập và tìm kiếm thông tin mà họ cần. Từ giao diện đơn giản cho đến các tính năng nâng cao, mọi thứ đều được tinh chỉnh để mang lại sự hài lòng cao nhất cho người sử dụng.
Điểm mạnh của NgonClub là khả năng cập nhật thông tin chính xác và kịp thời. Với một đội ngũ biên tập viên chuyên nghiệp, nền tảng này luôn cung cấp những tin tức, xu hướng và sự kiện mới nhất trong các lĩnh vực quan trọng. Người dùng có thể dễ dàng tiếp cận thông tin nhanh chóng, giúp họ nắm bắt được tình hình và không bỏ lỡ các cơ hội quan trọng. NgonClub không chỉ cung cấp các thông tin tổng quát mà còn chú trọng đến việc đưa ra các phân tích chi tiết, giúp người dùng hiểu rõ hơn về các vấn đề và sự kiện đang diễn ra.
Bảo mật là một yếu tố rất quan trọng đối với <a href="https://ngonclub.cc">NGONCLUB</a>, và nền tảng này luôn đảm bảo rằng dữ liệu cá nhân của người dùng được bảo vệ tuyệt đối. Với việc áp dụng các công nghệ bảo mật tiên tiến, NgonClub bảo vệ thông tin người dùng khỏi các mối đe dọa từ bên ngoài và ngăn ngừa mọi hành vi xâm nhập trái phép. Mọi giao dịch và thông tin cá nhân đều được mã hóa một cách an toàn, đảm bảo rằng người dùng có thể yên tâm khi sử dụng các dịch vụ trên nền tảng này mà không lo ngại về vấn đề bảo mật.
Ngoài tính năng bảo mật, NgonClub còn cung cấp nhiều công cụ hỗ trợ cá nhân hóa trải nghiệm người dùng. Với các tính năng tùy chỉnh linh hoạt, người dùng có thể thiết lập giao diện và các công cụ sao cho phù hợp với nhu cầu của mình. Điều này giúp nâng cao hiệu quả sử dụng và tiết kiệm thời gian trong quá trình tìm kiếm thông tin. Hơn nữa, việc tùy chỉnh các tính năng còn giúp tạo ra một không gian trực tuyến thân thiện và dễ chịu, nơi người dùng cảm thấy thoải mái và hài lòng khi trải nghiệm.
Với tất cả những ưu điểm vượt trội như vậy, NgonClub là một nền tảng lý tưởng cho những ai tìm kiếm một không gian trực tuyến an toàn, tiện ích và đầy đủ thông tin. Nền tảng này luôn chú trọng đến việc mang lại giá trị cho người dùng thông qua các tính năng hữu ích, bảo mật cao và dịch vụ khách hàng tận tình. Với cam kết không ngừng cải tiến và phát triển, NgonClub sẽ tiếp tục là sự lựa chọn hàng đầu của những người dùng thông thái, luôn tìm kiếm những thông tin chính xác, nhanh chóng và tiện lợi.
-
![](/static/nostr-icon-purple-64x64.png)
@ b50957d8:6fcbccb4
2025-01-16 09:46:26
Max10 là một nền tảng trực tuyến hiện đại, được thiết kế để đáp ứng nhu cầu của người dùng thông qua giao diện thân thiện và dễ sử dụng. Nền tảng này cung cấp nhiều tính năng tối ưu hóa, giúp người dùng có thể dễ dàng truy cập các dịch vụ và công cụ mà họ cần. Bằng cách tối giản các thao tác và cải tiến hiệu suất, Max10 đảm bảo rằng người dùng có thể thực hiện mọi nhiệm vụ một cách nhanh chóng và hiệu quả. Mọi tính năng được tích hợp vào nền tảng này đều mang lại sự tiện lợi tối đa cho người sử dụng.
Một trong những điểm nổi bật của Max10 chính là khả năng cung cấp thông tin chính xác và cập nhật liên tục. Nền tảng này luôn theo dõi và cập nhật các xu hướng mới nhất, những tin tức nóng hổi trong nhiều lĩnh vực khác nhau. Dù là trong lĩnh vực công nghệ, tài chính hay các sự kiện xã hội, Max10 luôn cung cấp những thông tin đáng tin cậy và kịp thời, giúp người dùng không bỏ lỡ bất kỳ cơ hội hay sự kiện quan trọng nào. Tính năng này đặc biệt hữu ích cho những ai muốn luôn cập nhật và nắm bắt các thông tin quan trọng ngay lập tức.
<a href="https://max10-vn.com">MAX10</a> cũng chú trọng đến việc bảo mật thông tin người dùng, đảm bảo rằng tất cả dữ liệu cá nhân và giao dịch đều được bảo vệ an toàn. Nền tảng này sử dụng công nghệ mã hóa tiên tiến, giúp ngăn chặn các mối đe dọa từ bên ngoài và bảo vệ người dùng khỏi các rủi ro mất mát thông tin. Mọi thông tin cá nhân của người dùng đều được bảo mật tuyệt đối, giúp người dùng cảm thấy an tâm khi sử dụng nền tảng. Điều này tạo dựng niềm tin vững chắc và khẳng định sự cam kết của Max10 đối với bảo mật dữ liệu.
Ngoài tính năng bảo mật, Max10 còn cung cấp các công cụ cá nhân hóa mạnh mẽ, giúp người dùng có thể tùy chỉnh trải nghiệm của mình. Các tính năng cá nhân hóa không chỉ giúp người dùng tiết kiệm thời gian mà còn cải thiện hiệu quả sử dụng nền tảng. Người dùng có thể điều chỉnh giao diện và các công cụ để phù hợp với nhu cầu và sở thích riêng của mình, mang lại một trải nghiệm trực tuyến tối ưu và linh hoạt. Điều này giúp Max10 nổi bật so với các nền tảng khác, vì người dùng luôn cảm thấy thoải mái và hài lòng khi sử dụng các dịch vụ trên nền tảng này.
Với những ưu điểm vượt trội về tính năng, bảo mật và tính cá nhân hóa, Max10 đã trở thành một nền tảng đáng tin cậy và hiệu quả cho mọi người dùng. Nền tảng này không chỉ giúp người dùng truy cập thông tin nhanh chóng và chính xác mà còn mang đến một không gian trực tuyến an toàn và tiện lợi. Max10 luôn cam kết cải tiến và đổi mới để đáp ứng tốt hơn nhu cầu ngày càng cao của người dùng. Với sự phát triển không ngừng, Max10 sẽ tiếp tục là lựa chọn hàng đầu cho những ai muốn trải nghiệm một nền tảng trực tuyến hiện đại và hoàn hảo.
-
![](/static/nostr-icon-purple-64x64.png)
@ b50957d8:6fcbccb4
2025-01-16 09:44:58
N88 là nền tảng trực tuyến tiên tiến, được thiết kế với mục tiêu mang lại trải nghiệm người dùng mượt mà và hiệu quả. Với giao diện thân thiện và dễ sử dụng, N88 giúp người dùng nhanh chóng truy cập vào các dịch vụ và tính năng mà họ cần. Nền tảng này được tối ưu hóa để đáp ứng mọi nhu cầu của người dùng, từ việc tìm kiếm thông tin đến việc sử dụng các công cụ trực tuyến, tất cả đều được tích hợp một cách hoàn hảo. N88 không chỉ là một công cụ hữu ích mà còn là người bạn đồng hành giúp người dùng tiết kiệm thời gian và nâng cao hiệu quả công việc.
Một trong những điểm mạnh của N88 là khả năng cập nhật thông tin nhanh chóng và chính xác. Với công nghệ tiên tiến, N88 liên tục theo dõi và cung cấp các tin tức mới nhất trong nhiều lĩnh vực quan trọng, từ các sự kiện nổi bật cho đến các xu hướng mới trong ngành công nghệ, kinh tế và đời sống. Người dùng có thể dễ dàng truy cập và nắm bắt thông tin kịp thời, giúp họ luôn ở trong tình thế chủ động và không bỏ lỡ bất kỳ cơ hội quan trọng nào. Tất cả các thông tin trên N88 đều được chọn lọc kỹ càng, đảm bảo chất lượng và độ tin cậy cao.
Ngoài việc cung cấp thông tin, <a href="https://n88-online.com
">N88</a> còn đặc biệt chú trọng đến vấn đề bảo mật. Nền tảng này sử dụng các công nghệ mã hóa và bảo vệ tiên tiến để đảm bảo an toàn cho tất cả dữ liệu cá nhân của người dùng. Mọi giao dịch và thông tin đều được bảo vệ một cách nghiêm ngặt, giúp người dùng yên tâm khi sử dụng dịch vụ mà không phải lo ngại về các rủi ro bảo mật. N88 cam kết không chia sẻ hay lạm dụng thông tin cá nhân, mang đến một môi trường trực tuyến an toàn và đáng tin cậy.
N88 cũng không ngừng nâng cấp và cải tiến các tính năng của mình để đáp ứng tốt hơn nhu cầu của người dùng. Một trong những tính năng đáng chú ý là khả năng cá nhân hóa trải nghiệm người dùng. Người dùng có thể tùy chỉnh giao diện và các công cụ hỗ trợ để phù hợp với sở thích và nhu cầu riêng. Điều này không chỉ giúp tạo ra một không gian trực tuyến dễ sử dụng mà còn làm tăng tính linh hoạt và hiệu quả trong quá trình sử dụng. Tính năng cá nhân hóa này giúp người dùng có thể tối ưu hóa các lựa chọn của mình và tiết kiệm thời gian khi sử dụng nền tảng.
Với tất cả những tính năng ưu việt và cam kết bảo mật mạnh mẽ, N88 xứng đáng là sự lựa chọn hàng đầu cho những ai tìm kiếm một nền tảng trực tuyến đáng tin cậy và hiệu quả. Nền tảng này không chỉ cung cấp các dịch vụ hữu ích mà còn mang đến một trải nghiệm người dùng tuyệt vời, giúp người dùng cảm thấy thoải mái và an tâm khi sử dụng. Với sự đổi mới liên tục, N88 sẽ luôn là người bạn đồng hành tin cậy, cung cấp những giải pháp và công cụ tối ưu để nâng cao hiệu quả công việc và giải trí.
-
![](/static/nostr-icon-purple-64x64.png)
@ fbf0e434:e1be6a39
2025-01-16 09:40:32
# **Hackathon 总结**
[v4 Hookathon: PancakeSwap x Brevis Hackathon](https://dorahacks.io/hackathon/v4hookathon) 吸引了116名开发者和26个项目。作为50万美元开发者计划的一部分,本次Hackathon旨在促进PancakeSwap v4生态系统的创新,重点开发使用Brevis ZK-Coprocessor的Hooks。提供了40,000美元的奖金池,以激励解决流动性管理和智能合约功能中的挑战。
Hackathon 侧重于开发健全、用户友好且无需信任的Hooks。参与者探索了动态费用结构、主动流动性管理和独享访问池等应用。开放式赛道鼓励了多样化和创新的解决方案。关键创新领域包括流动性激励机制、做市机器人和身份验证池。
总体而言,Hackathon提升了PancakeSwap v4平台上的参与度和开发,获奖者于2023年10月24日公布。通过工作坊和资源促进了社区学习,推进了开发者之间的技术讨论和协作。
# **Hackathon 获奖者**
**1. [Smart Liquidity Hook (Stable)](https://dorahacks.io/buidl/16770)** - 该项目优化了稳定币对的流动性提供者奖励,使其能够同时从流动性提供和借贷中获利。
**奖金:** $12,000
**2. [OG Boost](https://dorahacks.io/buidl/16633)** - 通过根据其他AMM的交换费按比例分配奖励来支持激励提供者,并在增加流动性时存储LP头寸。
**奖金:** $10,000
**3. [Superfluid Swapper](https://dorahacks.io/buidl/16804)** - 利用零知识证明技术和市场分析形成自适应流动性池系统。
**奖金:** $8,000
**4. [VWAP Dynamic Fee Hook](https://dorahacks.io/buidl/16733)** - 根据其对成交量加权平均价格(VWAP)的影响调整交换费,创造了对流动性提供者、交换者和PancakeSwap生态系统有益的反馈回路。
**奖金:** $6,000
**5. [PADO Hook](https://dorahacks.io/buidl/16589)** - 使用链上和链下数据预言机验证用户交易证明,增强了精准度和隐私性以实现有效的用户目标定位。
**奖金:** $4,000
欲获取更多信息,请访问[DoraHacks](https://dorahacks.io/hackathon/v4hookathon/buidl)查看所有项目。
# **关于组织者:**
### **PancakeSwap**
PancakeSwap是一个领先的多链去中心化交易所(DEX),支持包括以太坊、BNB Chain和Polygon zkEVM等区块链的无缝交易。自2020年推出以来,PancakeSwap 已实现8000亿美元的总交易量,并拥有20亿美元的锁定流动性。拥有超过200万活跃用户,其低费用和用户友好的界面得到了广泛认可。该平台的重点是提供一个灵活的加密生态系统交易体验,同时培育一个强大而充满活力的社区。
-
![](/static/nostr-icon-purple-64x64.png)
@ ed84ce10:cccf4c2a
2025-01-16 09:21:55
# **Hackathon Summary**
The [v4 Hookathon: PancakeSwap x Brevis Hackathon](https://dorahacks.io/hackathon/v4hookathon) featured 116 developers and 26 projects. As part of the $500K Developer Program, the hackathon aimed to foster innovation within the PancakeSwap v4 ecosystem, emphasizing the development of Hooks using the Brevis ZK-Coprocessor. A $40,000 prize pool was offered to incentivize solutions targeting challenges in liquidity management and smart contract functionalities.
The hackathon focused on developing robust, user-friendly, and trustless Hooks. Participants explored applications such as dynamic fee structures, active liquidity management, and exclusive-access pools. The open track format encouraged diverse and creative solutions. Key innovation areas included mechanisms for liquidity incentivization, market-making bots, and identity-verified pools.
Overall, the hackathon increased engagement and development on the PancakeSwap v4 platform, with winners announced on October 24, 2023. It facilitated community learning through workshops and resources, advancing technical discussions and collaboration among developers.
# **Hackathon Winners**
**1. [Smart Liquidity Hook (Stable)](https://dorahacks.io/buidl/16770)** - This project optimizes rewards for Liquidity Providers in stablecoin pairs, enabling concurrent profit from both liquidity provision and lending.
**Prize:** $12,000
**2. [OG Boost](https://dorahacks.io/buidl/16633)** - It supports Incentive Providers by allocating rewards proportionally based on swap fees from other AMMs, storing LP positions as liquidity is added.
**Prize:** $10,000
**3. [Superfluid Swapper](https://dorahacks.io/buidl/16804)** - Utilizes zero-knowledge proof technology and market analysis to form an adaptive liquidity pool system.
**Prize:** $8,000
**4. [VWAP Dynamic Fee Hook](https://dorahacks.io/buidl/16733)** - Adjusts swap fees according to their influence on the Volume Weighted Average Price (VWAP), creating a beneficial feedback loop for Liquidity Providers, Swappers, and the PancakeSwap ecosystem.
**Prize:** $6,000
**5. [PADO Hook](https://dorahacks.io/buidl/16589)** - Employs on-chain and off-chain data oracles to validate user transaction proofs, enhancing accuracy and privacy for effective user targeting.
**Prize:** $4,000
For further information, view all projects at [DoraHacks](https://dorahacks.io/hackathon/v4hookathon/buidl).
# **About the Organizer**
### **PancakeSwap**
PancakeSwap is a leading multichain decentralized exchange (DEX), facilitating seamless transactions across blockchains, including Ethereum, BNB Chain, and Polygon zkEVM. Since its launch in 2020, PancakeSwap has achieved $800 billion in total trading volume and maintains $2 billion in locked liquidity. It serves over 2 million active users, recognized for its low fees and user-friendly interface. The platform's primary focus is on providing a versatile trading experience within the crypto ecosystem while fostering a robust and vibrant community.
-
![](/static/nostr-icon-purple-64x64.png)
@ cf7ed325:050194cf
2025-01-16 08:39:25
Embark on an unforgettable journey with Alexandria shore excursions, where history, culture, and adventure await. These carefully curated tours ensure a memorable experience for travelers arriving at Alexandria Port.
Begin your adventure with the [Explore Pyramids Tours included Lunch Cruise From Alexandria Port](https://www.etbtoursegypt.com/tour/Pyramids-Tours-and-Lunch-cruise-from-Alexandria-port), offering a blend of ancient wonders and a relaxing Nile cruise. Dive deeper into Egypt's history with the [Discover Amazing trip to the pyramids and Saqqara from Alexandria Port](https://www.etbtoursegypt.com/tour/Day-Trip-to-Pyramids-and-Sakkara-from-Alexandria-Port), where the iconic pyramids meet the fascinating Step Pyramid of Saqqara. [Alexandria shore Excusions: Experience Alexandria day tours](https://www.etbtoursegypt.com/tour/Alexandria-Day-Tour-from-Alexandria-Port)
For those seeking a cultural immersion, the [Day Tour to Islamic and Coptic Cairo from Alexandria Excursions](https://www.etbtoursegypt.com/tour/Tour-to-Islamic-Coptic-Cairo-from-Alexandria-port) provides a glimpse into Egypt's rich religious heritage, including historic mosques and churches. Alternatively, enjoy the [Full Day Trip in Cairo From Alexandria Excursions returning to Port Said](https://www.etbtoursegypt.com/tour/Cairo-tours-from-Alexandria-port-returning-to-Port-Said), a comprehensive exploration of Cairo's highlights before heading back to your port.
If you’re interested in wartime history, don’t miss the chance to [Book your trip to Alamein From Alexandria Shore Excursions](https://www.etbtoursegypt.com/tour/Tour-to-El-Alamein-from-Alexandria-Port). Visit the World War II cemeteries and museum, a moving tribute to the soldiers who fought in the desert. For thrill-seekers, [From Alexandria Port Experience Desert Safari Trip in Giza Pyramids](https://www.etbtoursegypt.com/tour/Desert-Safari-Trip-in-Pyramids-area-from-Alexandria-Port) combines the grandeur of the pyramids with an exhilarating desert adventure.
Extend your journey with [2 Day Tours in Cairo from Alexandria Shore Excursions](https://www.etbtoursegypt.com/tour/tourgiza-pyramids-day-tour-cairo-alexandria-port-trip), where you can fully immerse yourself in the wonders of the Egyptian capital. Don’t forget to explore the Highlights of Cairo Day Tours From Alexandria Shore Excursions, featuring top landmarks like the Egyptian Museum and Khan El Khalili Bazaar.
No matter which tour you choose, [Alexandria shore excursions](https://www.etbtoursegypt.com/Shore-Excursions/Alexandria-Shore-Excursions-Port-Trips) promise an enriching experience that blends history, culture, and adventure. Book now for a journey you’ll never forget!
🌐 Visit us at www.etbtoursegypt.com
📲 Contact us now! +20 10 21100873
📧 Email: info@etbtours.com
🏢 Company Address: 4 El Lebeny Axis , Nazlet Al Batran , Al Haram, Giza , Egypt
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-01-16 07:30:46
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/852155
-
![](/static/nostr-icon-purple-64x64.png)
@ e3ba5e1a:5e433365
2025-01-16 07:23:56
Humans want the resources of other humans. I want the food that the supermarket owns so that I can eat it. Before buying it, I wanted the house that I now own. And before that, someone wanted to build a house on that plot of land, which was owned by someone else first. Most of the activities we engage in during our lifetime revolve around extracting something from someone else.
There are two basic modalities to getting the resources of someone else. The first, the simplest, and the one that has dominated the majority of human history, is force. Conquer people, kill them, beat them up and take their stuff, force them into slavery and make them do your work. It’s a somewhat effective strategy. This can also be more subtle, by using coercive and fraudulent methods to trick people into giving you their resources. Let’s call this modality the looter approach.
The second is trade. In the world of trade, I can only extract resources from someone else when they willingly give them to me in exchange for something else of value. This can be barter of value for value, payment in money, built-up goodwill, favors, charity (exchanging resources for the benefit you receive for helping someone else), and more. In order to participate in this modality, you need to create your own valuable resources that other people want to trade for. Let’s call this the producer approach.
The producer approach is better for society in every conceivable way. The looter approach causes unnecessary destruction, pushes production into ventures that don’t directly help anyone (like making more weapons), and rewards people for their ability to inflict harm. By contrast, the producer approach rewards the ability to meet the needs of others and causes resources to end up in the hands of those who value them the most.
Looter philosophy is rooted in the concept of the zero sum game, the mistaken belief that I can only have more if someone else has less. By contrast, the producer philosophy correctly identifies the fact that we can *all* end up better by producing more goods in more efficient ways. We live in our modern world of relatively widespread luxury because producers have made technological leaps—for their own self-serving motives—that have improved everyone’s ability to produce more goods going forward. Think of the steam engine, electricity, computing power, and more.
# A producer-only world
It would be wonderful to live in a world in which there are no looters. We all produce, we all trade, everyone receives more value than they give, and there is no wasted energy or destruction from the use of force.
Think about how wonderful it could be\! We wouldn’t need militaries, allowing a massive amount of productive capacity to be channeled into things that make everyone’s lives better. We wouldn’t need police. Not only would that free up more resources, but would remove the threat of improper use of force by the state against citizens. The list goes on and on.
I believe many economists—especially Austrian economists—are cheering for that world. I agree with them on the cheering. It’s why things like Donald Trump’s plans for tariffs are so horrific in their eyes. Tariffs introduce an artificial barrier between nations, impeding trade, preventing the peaceful transfer of resources, and leading to a greater likelihood of armed conflict.
There’s only one problem with this vision, and it’s also based in economics: game theory.
# Game theory and looters
Imagine I’m a farmer. I’m a great farmer, I have a large plot of land, I run my operations efficiently, and I produce huge amounts of food. I sell that food into the marketplace, and with that money I’m able to afford great resources from other people, who willingly trade them to me because they value the money more than their own resources. For example, how many T-shirts does the clothing manufacturer need? Instead of his 1,000th T-shirt, he’d rather sell it for $5 and buy some food.
While I’m really great as a farmer, I’m not very good as a fighter. I have no weapons training, I keep no weapons on my property, and I dislike violence.
And finally, there’s a strong, skilled, unethical person down the street. He could get a job with me on the farm. For back-breaking work 8 hours a day, I’ll pay him 5% of my harvest. Or, by contrast, he could act like the mafia, demand a “protection fee” of 20%, and either beat me up, beat up my family, or cause harm to my property, if I don’t pay it.
In other words, he could be a producer and get 5% in exchange for hard work, or be a looter and get 20% in exchange for easy (and, likely for him, fun) work. As described, the game theoretic choice is clear.
So how do we stop a producer world from devolving back into a looter world?
# Deterrence
There’s only one mechanism I’m aware of for this, and it’s deterrence. As the farmer, I made a mistake. I *should* get weapons training. I *should* keep weapons on my farm. I *should* be ready to defend myself and my property. Because if I don’t, game theory ultimately predicts that all trade will collapse, and society as we know it will crumble.
I don’t necessarily have to have the power of deterrence myself. I could hire a private security company, once again allowing the producer world to work out well. I trade something of lesser value (some money) for something I value more (the protection afforded by private security). If I’m lucky, that security company will never need to do anything, because the mere *threat* of their presence is sufficient.
And in modern society, we generally hope to rely on the government police force to provide this protection.
There are easy ways to defeat the ability of deterrence to protect our way of life. The simplest is to defang it. Decriminalize violent and destructive acts, for example. Remove the consequences for bad, looter behavior, and you will incentivize looting. This is far from a theoretical discussion. We’ve seen the clear outcome in California, which has decriminalized theft under $950, resulting—in a completely predictable way—in more theft, stores closing, and an overall erosion of producer philosophy.
And in California, this is even worse. Those who try to be their own deterrence, by arming themselves and protecting their rights, are often the targets of government force instead of the looters.
I’m guessing this phrasing has now split my reading audience into three groups. Group A agrees wholly with what I’m saying. Group B believes what I’ve just written is pure evil and garbage. Group C initially disagreed with my statements, but has an open mind and is willing to consider a different paradigm. The next section is targeted at groups A and C. Group B: good luck with the broken world you’re advocating.
# Global scale
This concept of deterrence applies at a global scale too. I would love to live in a world where all nations exchange value for value and never use force against others. In fact, I believe the ultimate vision for this kind of a world ends with anarcho-capitalism (though I don’t know enough about the topic to be certain). There ends up being no need for any force against anyone else. It’s a beautiful vision for a unified world, where there are no borders, there is no destruction, there is only unity through trade. I love it.
But game theory destroys this too. If the entire world disarmed, it would take just one person who thinks he can do better through looter tactics to destroy the system. The only way to defeat that is to have a realistic threat of force to disincentivize someone from acting like a looter.
And this is the paradox. In order to live in our wonderful world of production, prosperity, health, and happiness, we always need to have our finger near enough to the trigger to respond to looters with force. I know of no other approach that allows production to happen. (And I am very interested in other theoretical solutions to this problem, if anyone wants to share reading material.)
# Peace through strength
This line of thinking leads to the concept of [peace through strength](https://en.wikipedia.org/wiki/Peace_through_strength). When those tempted to use violence see the overwhelming strength of their potential victims, they will be disincentivized to engage in violent behavior. It’s the story of the guy who wants to rob my farm. Or the roaming army in the ancient world that bypassed the well fortified walled city and attacked its unprotected neighbor.
There are critics of this philosophy. As put by Andrew Bacevich, "'Peace through strength' easily enough becomes 'peace through war.'" I don’t disagree at all with that analysis, and it’s something we must remain vigilant against. But disarming is not the answer, as it will, of course, necessarily lead to the victory of those willing to use violence on others.
In other words, my thesis here is that the threat of violence must be present to keep society civilized. But the cost of *using* that violence must be high enough that neither side is incentivized to initiate it.
# Israel
I’d been thinking of writing a blog post on this topic for a few months now, but finally decided to today. Israel just agreed to a hostage deal with Hamas. In exchange for the release of 33 hostages taken in the October 7 massacre, Israel will hand over 1,000 terrorists in Israeli prisons.
I have all the sympathy in the world for the hostages and their families. I also have great sympathy for the Palestinian civilians who have been harmed, killed, displaced, and worse by this war. And I have empathy (as one of the victims) for all of the Israeli citizens who have lived under threat of rocket attacks, had our lives disrupted, and for those who have been killed by this war. War is hell, full stop.
My message here is to those who have been pushing the lie of “peace through negotiations.” Or peace through capitulation. Or anything else. These tactics are the reason the war has continued. As long as the incentive structure makes initiating a war a positive, wars will continue to be initiated. Hamas has made its stance on the matter clear: it has sworn for the eradication of all Jews within the region, and considers civilian casualties on the Palestinian side not only acceptable, but advantageous.
![Gaza Chief's Brutal Calculation: Civilian Bloodshed Will Help Hamas](https://www.snoyman.com/img/civilian-bloodshed.png)
I know that many people who criticize Israel and put pressure on us to stop the war in Gaza believe they are doing so for noble reasons. (For the record, I also believe many people have less altruistic reasons for their stance.) I know people like to point to the list of atrocities they believe Israel has committed. And, by contrast, the pro-Israel side is happy to respond with corresponding atrocities from the other side.
I honestly believe this is all far beyond irrelevant. The only question people should be asking is: how do we disincentivize the continuation of hostilities? And hostage deals that result in the release of terrorists, allow “aid” to come in (which, if history is any indication, will be used to further the construction of tunnels and other sources for attack on Israel), and give Hamas an opportunity to rearm, only incentivize the continuation of the war.
In other words, if you care about the innocent people on either side, you should be opposed to this kind of capitulation. Whatever you think about the morality of each side, more people will suffer with this approach.
# Skin in the game
It’s easy to say things like that when your life isn’t on the line. I also don’t think that matters much. Either the philosophical, political, and economic analysis is correct, or it isn’t. Nonetheless, I *do* have skin in the game here. I still live in a warzone. I am less than 15 kilometers from the Lebanese border. We’ve had Hezbollah tunnels reaching into our surrounding cities. My family had to lock ourselves inside when Hezbollah paratroopers had attempted to land in our city.
My wife (Miriam) and I have discussed this situation at length, many times, over the course of this war. If I’m ever taken hostage, I hope the Israeli government bombs the hell out of wherever I am being held. I say this not only because I believe it is the right, just, moral, ethical, and strategically correct thing to do. I say this because I am selfish:
* I would rather die than be tortured by our enemies.
* I would rather die than be leveraged to make my family and country less safe.
* I would rather die than live the rest of my life a shell of my former self, haunted not only by the likely torture inflicted on me, but by the guilt of the harm to others resulting from my spared life.
I don’t know why this hostage deal went through now. I don’t know what pressures have been brought to bear on the leaders in Israel. I don’t know if they are good people trying to protect their citizens, nefarious power hungry cretins looking to abuse both the Israeli and Palestinian populace to stay in control, weak-willed toadies who do what they’re told by others, or simply stupid. But my own stance is clear.
# But what about the Palestinians?
I said it above, and I’ll say it again: I truly do feel horrible for the trauma that the Palestinian people are going through. Not for the active terrorists mind you, I feel no qualms about those raising arms against us being destroyed. But everyone else, even those who wish me and my fellow Israelis harm. (And, if polling is to be believed, that’s the majority of Palestinians.) I would much rather that they *not* be suffering now, and that eventually through earned trust on both sides, everyone’s lots are improved.
But the framework being imposed by those who “love” peace isn’t allowing that to happen. Trust cannot be built when there’s a greater incentive to return to the use of force. I was strongly opposed to the 2005 disengagement from Gaza. But once it happened, it could have been one of those trust-building starting points. Instead, I saw many people justify further violence by Hamas—such as non-stop rocket attacks on the south of Israel—because Israel hadn’t done enough yet.
Notice how fundamentally flawed this mentality is, just from an incentives standpoint\! Israel gives up control of land, something against its own overall interests and something desired by Palestinians, and is punished for it with increased violence against citizens. Hamas engaged in a brutal destruction of all of its opponents within the Palestinian population, launched attacks on Israel, and when Israel *did* respond with force, Israel was blamed for having not done enough to appease Hamas.
I know people will want to complicate this story by bringing up the laundry list of past atrocities, of assigning negative motivations to Israel and its leaders, and a million other evasions that are used to avoid actually solving this conflict. Instead, I beg everyone to just use basic logic.
The violence will continue as long as the violence gets results.
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-01-16 07:02:25
Kalaripayattu, one of the oldest martial arts in the world, is a system of combat that emphasizes precision, agility, and functional strength. At the heart of this ancient art lies Kaalukal, a series of leg movements that build strength, flexibility, and balance. These movements are not just combat techniques—they are a masterclass in biomechanical efficiency and functional conditioning. With modern sports science backing up the principles of Kaalukal, it’s clear why this training remains relevant for fighters, athletes, and anyone focused on longevity.
Breaking Down Kaalukal: The Anatomy of Movement
![image
]( https://image.nostr.build/0a5ebe14902d1fb0a539b8be572a418ae067d7931798e43f33b765843c7f72aa.jpg)
Kaalukal incorporates a range of movements designed to engage multiple muscle groups, build joint stability, and improve neuromuscular coordination. Below are key movements and their biomechanical implications:
1. High Leaps (Mei Adavu)
Movement Description: Practitioners perform explosive vertical or diagonal leaps, often combined with twisting or spinning.
Muscles Engaged: Glutes, quadriceps, hamstrings, calves, and core.
Biomechanical Benefits:
Enhances power output through the stretch-shortening cycle, the mechanism behind plyometric efficiency.
Develops fast-twitch muscle fibers, crucial for explosive strikes and evasive maneuvers.
Improves landing mechanics, reducing the risk of ACL injuries—a common problem in high-impact sports.
2. Wide Stances (Chuvadu)
Movement Description: Low, wide stances like the horse stance (Ashwa Vadivu) or elephant stance (Gaja Vadivu) are held for extended periods during practice.
Muscles Engaged: Quadriceps, adductors, glutes, hip stabilizers, and spinal erectors.
Biomechanical Benefits:
Strengthens the lower body while increasing isometric endurance.
Improves joint mobility in the hips and knees, essential for maintaining stability in dynamic movements.
Enhances proprioception, the body’s ability to sense its position in space, critical for balance in combat scenarios.
3. Rotational Leg Swings (Kalari Pirichal)
Movement Description: Controlled leg swings performed in circular or linear trajectories, often with an emphasis on hip rotation.
Muscles Engaged: Hip flexors, extensors, abductors, adductors, and obliques.
Biomechanical Benefits:
Increases dynamic flexibility in the hips, allowing for high kicks and evasive maneuvers.
Strengthens the oblique sling system, a network of muscles that enhances rotational power—a key element in strikes and takedowns.
Promotes joint stability and reduces the risk of hip and groin injuries.
4. Dynamic Lunges (Nadakkal)
Movement Description: Deep lunges performed with forward, backward, or lateral motion, often transitioning fluidly between stances.
Muscles Engaged: Quadriceps, glutes, hamstrings, calves, and core.
Biomechanical Benefits:
Develops unilateral strength, addressing imbalances between legs.
Enhances deceleration control, critical for rapid changes in direction during combat.
Strengthens the posterior chain, improving overall athletic performance and injury resilience.
5. Heel-Lift Movements (Kannadi Nirutham)
Movement Description: Movements performed on the balls of the feet, emphasizing balance and agility.
Muscles Engaged: Calves, intrinsic foot muscles, and stabilizers in the lower leg.
Biomechanical Benefits:
Strengthens the ankle complex, reducing the risk of sprains and other common injuries.
Improves quick directional changes, a skill critical for both striking and grappling.
Enhances proprioceptive feedback for better reaction times.
Kaalukal and Modern Sports Science
The principles of Kaalukal align with contemporary understanding of sports science. Research shows that dynamic, multi-plane movements like those in Kaalukal enhance:
1. Muscle Activation Patterns: Movements like wide stances and lunges activate stabilizing muscles that are often neglected in linear exercises like squats or deadlifts. This creates a more balanced and injury-resistant athlete.
2. Elastic Energy Storage and Release: Explosive leaps leverage the stretch-shortening cycle, where muscles store elastic energy during loading (eccentric phase) and release it during unloading (concentric phase). This mechanism is the foundation of plyometric training, making movements more efficient and powerful.
3. Joint Health and Mobility: The low stances and rotational movements in Kaalukal improve joint range of motion and synovial fluid circulation, reducing the risk of arthritis and other degenerative conditions.
4. Neuromuscular Coordination: The fluid transitions between stances challenge the central nervous system, enhancing coordination and reaction time—key components for combat athletes.
Kaalukal and Longevity
Recent studies on muscle mass and longevity reveal a strong correlation between lower body strength and overall health. A 2019 study published in the Journal of Cachexia, Sarcopenia, and Muscle found that individuals with greater thigh muscle mass had a lower risk of mortality, even when controlling for other factors like cardiovascular health.
Kaalukal, with its emphasis on dynamic leg strength and balance, is an ancient blueprint for maintaining health into old age. Its combination of strength, flexibility, and functional movement creates a resilient body capable of withstanding the rigors of both combat and aging.
Application for Modern Fighters and Athletes
Modern athletes can incorporate Kaalukal-inspired training into their routines to reap its benefits:
1. Warm-Up Routine: Use rotational leg swings and dynamic lunges to prepare the body for high-intensity activity.
2. Balance Training: Incorporate wide stances and heel-lift movements to build stability and proprioception.
3. Plyometric Drills: Adapt high leaps into structured plyometric training for explosive power.
4. Barefoot Sessions: Train barefoot periodically to strengthen the feet and improve balance.
Conclusion: Kaalukal as the Foundation of Combat and Health
Kaalukal is not just a relic of ancient martial arts—it’s a scientifically validated system of training that builds strength, balance, and resilience. Its principles are as relevant for modern fighters as they were for warriors on ancient battlefields. By incorporating Kaalukal-inspired movements, athletes can optimize their performance, reduce injury risk, and build a body that will stand the test of time.
Combat, longevity, and health all start from the ground up. The legs are the foundation—train them with purpose, train them with precision, and the results will speak for themselves.
-
![](/static/nostr-icon-purple-64x64.png)
@ a012dc82:6458a70d
2025-01-16 06:13:16
**Table Of Content**
- A Mysterious 911 Call
- The Investigation Begins
- Zhong's Lavish Lifestyle
- The Silk Road Connection
- The Confrontation
- The Shocking Revelation
- The Verdict
- Conclusion
- FAQ
The world of cryptocurrency is filled with tales of overnight millionaires, innovative technology, and unfortunately, crime. One such tale that intertwines all these elements is that of Jimmy Zhong. From being a developer in the early days of Bitcoin to becoming one of its biggest thieves, Zhong's story is a roller-coaster ride that sheds light on the darker corners of the crypto universe. Here's a deeper dive into his intriguing journey.
**A Mysterious 911 Call**
In the college town of Athens, Georgia, the police department is accustomed to handling typical college town crimes. However, on the night of March 13, 2019, they received a call that was anything but ordinary. Jimmy Zhong, a 28-year-old known for his partying habits, was on the line, but not for reasons one might expect. Distressed and panicked, he reported a significant theft of cryptocurrency from his residence. This call, seemingly just another crime report, would soon unravel a web of deceit and expose a decade-long mystery surrounding one of the most significant crypto crimes ever committed.
**The Investigation Begins**
With the local police initially stumped by the intricacies of the crypto world, Zhong sought external help. Enter Robin Martinelli, a private investigator with a reputation for tenacity. As she delved into the case, surveillance footage from Zhong's home revealed a potential suspect who seemed to have intimate knowledge of the premises. This discovery led Martinelli down a path that suggested the thief might be from Zhong's own circle of acquaintances or friends. The very idea was something Zhong found hard to digest, as it hinted at a betrayal from someone he trusted.
**Zhong's Lavish Lifestyle**
Behind the façade of a modest bungalow in Athens, Zhong led a life of luxury that raised many eyebrows. His spending habits painted the picture of a man with deep pockets. From stays at the Ritz Carlton to shopping sprees at Louis Vuitton, from driving a Tesla to owning a lake house filled with extravagant amenities, Zhong's lifestyle was nothing short of opulent. Yet, the source of his wealth remained shrouded in mystery. He often alluded to his early involvement in Bitcoin mining, suggesting he had been part of the crypto revolution since its inception in 2009.
**The Silk Road Connection**
Parallel to Zhong's life of luxury, IRS agents were deep into an investigation of a massive 2012 hack. This hack had seen 50,000 bitcoins stolen from Silk Road, a notorious dark web marketplace. As the years passed, the value of these stolen bitcoins skyrocketed to a staggering $3 billion. The breakthrough in the case came unexpectedly when the hacker, in a momentary lapse, transferred some of the stolen funds to a crypto exchange. The account on this exchange was registered under none other than Jimmy Zhong's name, drawing him into the crosshairs of the investigation.
**The Confrontation**
With growing suspicions, IRS agents, in collaboration with the local police, decided to confront Zhong. They approached him under the pretense of assisting with his reported theft, but their ulterior motive was to probe deeper into Zhong's potential involvement in the Silk Road heist. Their visit to his residence was revealing. Not only did they discover a significant amount of bitcoin on Zhong's laptop, but the manner in which Zhong operated his systems also hinted at a deep familiarity with the crypto world.
**The Shocking Revelation**
The deeper the authorities delved into Zhong's background, the more astonishing the revelations became. It turned out that Zhong wasn't just a casual participant in the Bitcoin community; he was an integral part of its early days. Known as an "original gangster" or OG, Zhong had contributed to Bitcoin's development in its nascent stages. This revelation was both ironic and startling. A person who had been instrumental in shaping Bitcoin had also, allegedly, become one of its most significant adversaries.
**The Verdict**
The culmination of the investigations saw Zhong facing charges of wire fraud. After a guilty plea, he was handed a sentence of a year and a day in federal prison. While the U.S. government managed to seize the stolen bitcoins, the original theft that led Zhong to make that fateful 911 call remains an unsolved mystery to this day.
**Conclusion**
The tale of Jimmy Zhong serves as a stark reminder of the complexities and ambiguities of the cryptocurrency world. It's a realm where the lines between right and wrong can often blur, and where fortunes can be made or lost in mere moments. Zhong's journey from a Bitcoin developer to a billionaire thief is a testament to the unpredictable and often tumultuous world of digital currencies.
**FAQs**
**Who is Jimmy Zhong?**
Jimmy Zhong is a former Bitcoin developer who later became known for his involvement in one of the biggest crypto thefts.
**What was the nature of the crime?**
Zhong was implicated in a 2012 hack where 50,000 bitcoins were stolen from the Silk Road, a dark web marketplace.
**How was he caught?**
A small transactional mistake led investigators to a crypto exchange account registered under Zhong's name, linking him to the stolen bitcoins.
**What was his sentence?**
After pleading guilty to wire fraud, Zhong was sentenced to a year and a day in federal prison.
**Is the original theft from Zhong's home solved?**
No, the theft that led Zhong to make a 911 call in 2019 remains unsolved.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: @croxroadnews**
**Instagram: @croxroadnews.co**
**Youtube: @croxroadnews**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
*DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.*
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-01-16 03:16:12
Will It Scale? Web2 vs. Ethereum, Solana, Lightning, and Aeternity (Part 1: The Basics)
When it comes to scaling, Web2 architectures rely on traditional centralized solutions: adding more servers, deploying load balancers, and utilizing CDNs. But scaling is costly and often inefficient.
Ethereum, the pioneer of DeFi, struggles with scalability due to its Proof-of-Stake (PoS) architecture and high fees, especially during peak times. Meanwhile, Solana boasts high throughput with low fees but has faced criticism for periodic downtime under heavy load. Lightning Network, built on Bitcoin, tackles scalability through off-chain transactions, enabling instant and cheap payments. Aeternity excels with state channels, allowing off-chain interactions while maintaining security and scalability.
When the question is "Will it scale?" Web2 stumbles, Ethereum gets expensive, Solana pushes hard but risks downtime, Lightning remains fast for payments, and Aeternity blends scalability with flexibility for smart contracts and oracles.
---
Will It Overload? Web2 vs. Ethereum, Solana, Lightning, and Aeternity (Part 2: Peak Demand)
Handling peak demand is a nightmare for Web2 systems. Auto-scaling might keep servers running, but the costs skyrocket, and outages can occur during sudden traffic spikes.
Ethereum's block capacity leads to congestion and sky-high gas fees during NFT drops or DeFi booms. Solana offers high throughput, but its monolithic design makes it vulnerable to overload and downtime. Lightning Network shines here, as its off-chain channels ensure seamless microtransactions even during high demand. Aeternity outpaces the rest with its state channel architecture, reducing on-chain congestion and enabling real-time interactions.
Under peak demand, Web2 buckles, Ethereum gets expensive, Solana may stall, Lightning remains reliable for payments, and Aeternity distributes load effortlessly for a seamless experience.
---
Will It Fail? Web2 vs. Ethereum, Solana, Lightning, and Aeternity (Part 3: Single Points of Failure)
Centralized Web2 systems depend on servers and databases, leaving them vulnerable to single points of failure (SPoFs). If a critical server goes down, the entire application can be paralyzed.
In blockchain ecosystems, decentralization minimizes SPoFs. Ethereum boasts strong decentralization but struggles with speed and scalability. Solana, while fast, compromises decentralization by relying on fewer nodes, raising concerns about centralization. Lightning Network is highly resilient for payments, but its reliance on node connectivity means it isn't entirely immune to outages. Aeternity's decentralized nodes and oracles ensure fault tolerance without compromising speed.
When failure isn’t an option, Ethereum resists well but gets slow, Solana risks centralization, Lightning thrives in payments, and Aeternity blends reliability with decentralization.
---
Will It Secure? Web2 vs. Ethereum, Solana, Lightning, and Aeternity (Part 4: Data Integrity)
Web2 security relies on firewalls and centralized databases, making breaches a constant concern. From data leaks to ransomware attacks, Web2 remains highly vulnerable.
Ethereum ensures security through cryptographic validation but suffers from phishing and smart contract exploits. Solana provides low-cost transactions but faces criticism for its centralization risks, which could undermine long-term security. Lightning Network prioritizes secure, private transactions for payments, but its reliance on custodial wallets introduces risks. Aeternity leverages cryptographic security and immutable records for unparalleled data integrity, while its state channels mitigate risks from on-chain congestion.
In the battle for data integrity, Web2 collapses, Ethereum secures with high costs, Solana trades decentralization for speed, Lightning secures payments, and Aeternity balances security with innovation.
---
Will It Innovate? Web2 vs. Ethereum, Solana, Lightning, and Aeternity (Part 5: Futureproofing)
Web2 systems evolve incrementally, hampered by legacy architecture. Meanwhile, blockchain ecosystems are leading the charge in innovation:
Ethereum introduced smart contracts and continues to innovate through layer-2 solutions like Optimism and zkSync.
Solana focuses on speed, catering to high-frequency traders and Web3 games. However, concerns over reliability and centralization linger.
Lightning Network revolutionizes Bitcoin by enabling microtransactions and instant payments, making it a frontrunner for financial applications.
Aeternity takes innovation further with oracles and state channels, enabling seamless real-world data integration and cost-effective, scalable smart contracts.
Web2 struggles to keep up, Ethereum pushes boundaries with layers, Solana races for speed, Lightning dominates payments, and Aeternity innovates across applications.
---
Conclusion: Web2 Cracks, Ethereum, Solana, Lightning, and Aeternity Compete
Each system has its strengths and weaknesses:
Web2 struggles with cost and centralization.
Ethereum leads in decentralization but suffers from congestion and high fees.
Solana offers speed but compromises decentralization.
Lightning Network excels in payments but isn’t built for generalized smart contracts.
Aeternity combines scalability, security, and real-world integration.
So, will it blend? In the end, the future belongs to solutions that balance scalability, security, and decentralization, and Aeternity is positioned to be a key contender in this space.
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-01-16 02:22:51
There was a catch—there was always a catch. The fiat businesses had built empires on sand, parading as indestructible titans while their foundations crumbled beneath them. They were too big to fail, they said, as if saying it loud enough could stop the tide. But the tide didn’t care, and the tide had a name: Bitcoin.
Bitcoin wasn’t the currency of criminals anymore, as the talking heads on television liked to parrot. No, it was the currency of mathematicians, engineers, and anyone else who figured out that trusting a bank to keep your money safe was like trusting a fox to guard your chickens. And while the fiat war machine churned along, chewing up lives with merciless efficiency, its disembodied body was writhing and bleeding out like a wounded ouroboros—an ancient snake devouring its own tail, too consumed by its gluttony to notice its inevitable demise.
The ouroboros wasn’t just dying. It was rotting.
The "Warscape of Disruption" was not kind.
---
The Ouroboros of Fiat
The fiat war machine, that hungry mouth, had always feasted on the lifeblood of ordinary people—wages diluted by inflation, savings eroded by fees, debts stretched out for eternity. The machine’s appetite was insatiable, gnashing and grinding through entire generations. Yet, the tail it chewed wasn’t just a metaphor; it was its own lifeline. Each bite it took to sustain itself weakened the system further, draining liquidity, trust, and time.
The result? A writhing, bleeding beast—a grotesque spectacle of a financial system that couldn’t stop destroying itself even as its days were clearly numbered. Bitcoin, like a sword forged from cryptographic steel, struck at the head of the ouroboros, severing the illusion that the system was sustainable.
---
The Fall of Fiat Empires
Imagine a city under siege. The walls are high, the defenses robust—or so they seem. Inside, the merchants continue their trade as if the invaders outside will simply get bored and leave. But Bitcoin does not leave. Bitcoin is a battering ram, each transaction a blow to the gates. It doesn’t stop, doesn’t sleep, doesn’t even care if it’s raining. The merchants inside—your Fortune 500s, your too-big-to-fails—sit around arguing over their spreadsheets, wondering why their liquidity is drying up.
And liquidity does dry up when your currency is no longer trusted. Why would anyone hold onto a rapidly devaluing asset when Bitcoin offers a deflationary alternative? Why leave wealth in the hands of a financial system designed to siphon it away? Fiat businesses scramble for answers, only to find themselves priced out of relevance.
---
DeFi: The Siege Engines
If Bitcoin is the battering ram, DeFi is the trebuchet, hurling innovations like smart contracts and yield farming over the walls of traditional finance. What once required entire armies of lawyers and brokers can now be executed in seconds on a blockchain. Borrowing, lending, insuring—these were the sacred pillars of fiat finance, and DeFi is smashing them to pieces with algorithms.
But the beauty—or terror, depending on which side you’re on—is that DeFi doesn’t even need to storm the gates. It builds new cities outside the walls, cities without kings or tax collectors, where every transaction is voluntary and transparent. These new cities—protocols like Aave, Uniswap, and MakerDAO—are thriving. Meanwhile, the old cities burn.
---
Critical Analysis: The End of Complacency
The fall of fiat businesses is not just a matter of technological disruption; it is a reckoning. They thrived for decades on inefficiency and opacity, extracting rents from consumers who had no other choice. But now there is a choice, and it is brutally efficient.
Yet, the decimation of fiat businesses raises questions:
1. Regulatory Resistance: Governments will not surrender their economic dominance without a fight. Will they embrace Bitcoin and DeFi, or attempt to stifle it through draconian regulation?
2. Inclusion or Exclusion: While Bitcoin and DeFi promise financial inclusion, their adoption requires technical literacy and access to the internet. Will the transition leave the less fortunate behind?
3. Moral Hazard: As DeFi dismantles gatekeepers, it also removes the safety nets. If everyone becomes their own bank, who will rescue those who make poor financial decisions?
---
The Fiat Future: A Ghost Town
The ouroboros is dying. Its mouth still chews, trying to wring out a few last drops of life from a system that no longer works. Its tail, now bitten to the bone, hangs limp. Fiat businesses are already on life support, relying on bailouts, artificial liquidity injections, and consumer apathy. But this system, like all empires, will fall.
Bitcoin does not care about your quarterly earnings. DeFi does not care about your brand equity. The warscape of the technology landscape will be leveled, and those who fail to adapt will be left behind as relics of a bygone era.
To paraphrase an old soldier, “If we don’t end fiat, fiat will end us.” But maybe that’s not such a bad thing. After all, the only businesses that will truly disappear are the ones that deserve to.
So, as the siege continues, the merchants of fiat have a choice: reinvent or die. But as anyone in DeFi will tell you, the smart money is already on the other side of the wall.
-
![](/static/nostr-icon-purple-64x64.png)
@ 000002de:c05780a7
2025-01-16 00:15:54
I have had the same network setup for a long time now. Unifi stuff just works most of the time. I didn't really pick it. Its not open source and now that I have fiber and have been having some issues with some of the Unifi hardware its time to make the call.
Do I just upgrade with Unifi or start migrating to something more in line with what I value.
So I've been chatting with my very helpful colleges at Red Hat and after mentioning PfSense to them I was told to check out Opnsense instead.
1. I want to slowly move to 10g network gear
2. I need PoE switches that are 10g
3. I want a robust firewall / router
4. I don't really wanna build my router due to time
Currently looking at [Protectli Buyer’s Guide](https://kb.protectli.com/buyers-guide/) who sell hardware that is pre-installed with many options. I haven't decided which one to get yet. I wanna buy with the future in mind though so 10g connections are a must and support for two WAN connection is as well. I'm glad I ran CAT6 in my house years ago instead of cheaping out.
After I replace my router / firewall I will want to replace my Unifi switches. I'm considering buying used Cisco switches from eBay.
Anyone have any advice on this plan or advice?
originally posted at https://stacker.news/items/851922
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-01-15 22:03:41
By a Humble Admirer of Reason and Revelation
In an age where the digital and metaphysical intertwine, Bitcoin emerges as more than a mere technological marvel; it beckons us to contemplate the profound relationship between faith and truth. This inquiry, inspired by the works of great philosophers such as Immanuel Kant and Thomas Aquinas, seeks to explore the interplay between Bitcoin, faith, and the divine truth.
---
Faith and Rational Certainty
Faith, in its essence, is often misunderstood. It is not mere blind belief but a rational assent to truths that transcend empirical verification. Immanuel Kant argued that reason sets the boundaries of what we can know, yet it also reveals the necessity of postulating certain truths—God, freedom, and immortality—for the coherence of our moral universe. In Bitcoin, we find a parallel. The network operates on cryptographic principles, open source code, and decentralized consensus mechanisms. Its participants, however, exhibit a form of faith—not in a centralized authority, but in the immutability of its mathematical foundation.
This faith is not irrational but deeply rooted in trust. The nodes and miners who uphold Bitcoin's ledger act in fidelity to its rules, a collective acknowledgment of truth beyond subjective influence. Bitcoin, therefore, embodies a kind of secular faith, where trust in a system replaces reliance on human arbiters.
---
The Immutable Ledger and the Divine Truth
Thomas Aquinas viewed God as the ultimate source of truth, whose divine law orders the cosmos. In Bitcoin, one might see a reflection of this divine order—a man-made system aspiring to transcend corruption, deceit, and centralization. The blockchain is immutable, a ledger where each transaction is sealed in time, immune to revision or manipulation. This echoes the divine truth: unchanging, eternal, and knowable through reason.
Yet Bitcoin also confronts us with a humbling realization. It is not divine; it is a human construct. Its immutability is contingent, not absolute. But in its operation, Bitcoin mirrors humanity's yearning for divine justice—a world where truth cannot be falsified, where accountability is woven into the fabric of existence.
---
The Role of Freedom
Freedom is a cornerstone of both faith and Bitcoin. Kant posited that moral law requires the freedom to act according to reason. Bitcoin, too, is a system predicated on individual freedom: freedom to transact without intermediaries, to store wealth beyond the reach of coercion, and to participate in a global economy unshackled by geographic or political constraints.
This freedom, however, is not anarchic. It is bounded by Bitcoin's rules, much like moral freedom is bound by divine law. The protocol demands adherence to its principles; deviation leads to exclusion. Here, Bitcoin becomes a microcosm of the moral universe, where freedom and law coexist in a delicate balance.
---
Bitcoin as a Test of Faith
Bitcoin also demands faith in the unseen. Its cryptographic foundations are abstract and inaccessible to most. To trust Bitcoin, one must trust the mathematics and the consensus that govern it—a faith akin to the theologian's trust in the coherence of divine revelation. This faith is tested by volatility, uncertainty, and the constant threat of human error or malice. Yet, like the pilgrim who endures trials to affirm their belief, Bitcoin participants persevere, drawn by a vision of a more just and truthful economic order.
---
The Eschatological Impulse
Finally, Bitcoin invites us to consider the eschatological—the end of things and the ultimate fulfillment of truth. In Christian theology, history moves toward a final reconciliation of all things in God. Bitcoin, while temporal, shares an eschatological impulse: it envisions a world where financial systems are no longer instruments of oppression but tools of liberation.
This vision is imperfect, as all human endeavors are. But it gestures toward the divine truth that undergirds all creation: that justice, transparency, and freedom are not merely human aspirations but reflections of a higher order.
---
Conclusion: Faith in the Age of Bitcoin
Bitcoin is not divine, yet it draws us toward the divine truth. It is a testament to human ingenuity and our unrelenting quest for systems that reflect the eternal values of justice and truth. To place faith in Bitcoin is not to worship it but to acknowledge its potential as a tool—a reminder of what humanity can achieve when it aligns its efforts with principles of truth and freedom.
In the end, faith and Bitcoin converge in their reliance on truth. One points us to the heavens, the other to the blockchain, yet both call us to live in fidelity to what is unchanging, just, and true. Thus, Bitcoin becomes not merely a technology but a philosophical and spiritual phenomenon, challenging us to reflect on the relationship between faith, reason, and the divine.
-
![](/static/nostr-icon-purple-64x64.png)
@ bf47c19e:c3d2573b
2025-01-15 21:44:03
[Originalni tekst na ecd.rs](https://ecd.rs/blog/istorija-rudarenja-bitkoina-od-nastanka-blokcejna-do-danas/)
###### 25.08.2020 / Autor: Marko Matanović
---
Istorija rudarenja bitkoina počinje ne toliko davne 2009. godine nastankom Bitkoin-a, odnosno od nastanka blokčejna kao tehnologije. U Satošijevom *[whitepaper-u](https://bitcoin.org/bitcoin.pdf)* spominje se pojam *[Proof-of-Work](https://ecd.rs/faqs/proof-of-work-pow/)* (PoW). U ovom sada već istorijskom dokumentu koji objašnjava funkcionisanje Bitkoin-a navodi se da će se Proof-of-Work sistem koristiti za validaciju blokova u Bitkoin blokčejnu (procesuiranje transakcija), a da bi [blok](https://ecd.rs/faqs/blok/) bio “potvrđen” potrebno je da se izdvoji određena procesorska snaga. U suštini *Proof-of-Work* obezbeđuje sigurnost blokčejna tako što zahteva od korisnika da uloži odredjenu količinu rada kako bi bio nagradjen i omogućava dodavanje novih validnih transakcija u blok.
Da bismo poslali transakciju na Bitkoin mreži potrebno je da platimo određeni transaction fee, tj. naknadu za obradu i [potvrđivanje](https://ecd.rs/faqs/konfirmacijaconfirmation/) same transakcije. Upravo ovaj transaction fee se distribuira rudarima kao podsticaj da rade svoj posao u najboljem interesu i po utvrđenim pravilima sistema, odnosno da koriste svoj hardver radi potvrđivanja (naših) transakcija na mreži. Transakcije sa većim izdvojenim transaction fee-jem će biti brže potvrđene na mreži jer će baš ta transakcija rudarima biti isplativija za potvrđivanje. Osim ove vrste transakcija rudari dobijaju i određenu [nagradu za svaki potvrđeni blok](https://ecd.rs/faqs/blok-nagrada/).
Trenutni block reward je 6.25 BTC-a po potvrđenom bloku. Ovaj iznos se deli među svim rudarima na mreži proporcionalno njihovom učinku, što znači da što je više rudara na mreži to je njihova pojedinačna nagrada manja jer je veća konkurencija. Sem toga što se nagrada smanjuje sa većom konkurencijom povećava se i težina rudarenja. Nagrada za Bitkoin se smanjuje na određenom broju izrudarenih blokova i svaki put je nova nagrada dva puta manja od prethodne. Ovo je u kripto zajednici poznatije kao “*[Bitcoin halving](https://ecd.rs/faqs/halving/)*” koji se odigrava otprilike na svake četiri godine, sa ciljem da svaki put upola umanji inflaciju samog bitkoina kako bi održao/povećao svoju vrednost.
![](https://sp-ao.shortpixel.ai/client/to_auto,q_glossy,ret_img,w_1024/https://ecd.rs/wp-content/uploads/2020/08/Grafik-Cene-bitkoina-i-nagrade-po-bloku-1024x487.png)
*Cene Bitkoina i nagrade po bloku*
Istorija rudarenja bitkoina se može podeliti u nekoliko era koje prate razvoj kripto industrije kao celine. Ove ere se razlikuju po hardveru koji se koristio za rudarenja. Ukoliko se pitate zašto je uopšte bilo potrebno menjati, odnosno pojačavati hardver koji se koristi – razlog je povećanje težine kopanja usled popularizacije kriptovaluta i rudarenja kriptovaluta tokom vremena. Svake godine bio je potreban sve jači i bolji hardver kako bi se rudarenje isplatilo, prvenstveno jer je konkurencija (bila) sve veća, i samim tim više učesnika deli nagradu koja je posledično manja. To uglavnom znači da nam treba jači hardver kako bismo, kao rudari, uradili što veći deo posla na validaciji svakog bloka i maksimalno povećali nagradu koja sledi.
Istorija rudarenja bitkoina uopšteno se može podeliti na nekoliko celina:
– **Era procesora** (2009 – 2010)
– **Era grafičkih kartica** (2010 – 2011)
– **Era FPGA kartica** (2011 – 2013)
– **Era ASIC uređaja** (2013 – 2020)
#### Era procesora (2009 – 2010)
Ovo je početna era rudarenja koju karateriše korišćenje procesora koji se mogu naći u bilo kom laptopu ili desktop računaru. [Prvobitna Satošijeva ideja](https://ecd.rs/blog/idejni-tvorac-bitkoina-misteriozni-satosi-nakamoto/) je bila da svako na mreži koristi svoj procesor za [rudarenje](https://ecd.rs/faqs/kripto-rudarenje/). Na početku ove ere rudarenje je pre svega bio veoma neobičan hobi. Satoši je želeo na taj način da bolje osigura stabilnost i sigurnost mreže. Prvi bitkoini koji su bili iskopani, bili su iskopani upravo pomoću procesora. Korišćen je sličan program kao program za mrežno otključavanje Nokia telefona zbog sličnog principa korišćenja SHA-256 funkcije za enkripciju. Svako ko je želeo je mogao da rudari bitkoin uz pomoć svog laptopa ili desktop računara.
Kako se sve više rudara priključivalo na mrežu i kako je postalo moguće zameniti prve bitkoine za [fiat novac](https://ecd.rs/faqs/fiat-novac/), javio se interesantan problem – procesori koji su u to vreme imali bolje performanse su mogli da izrudare više bitkoina, što ujedno znači da su bili profitabilniji. Sve više rudara je koristilo procesore jačih performansi što je rezultovalo povećanjem težine kopanja. Povećanje težine kopanja je značilo da su procesori slabijih performansi postali još manje isplativi, odnosno da će dobiti proporcionalno manje bitkoina. Ljudi koji su u ovo vreme rudarili na Bitkoin mreži su mogli na mesečnom nivou da zarade i više hiljada bitkoina u zavisnosti od tipa i broja procesora koji su koristili.
Naravno, tada je cena bitkoina bila višestruko manja nego što je sada. Bez obzira na malu cenu, određeni ljudi su uvideli potencijal u rudarenju i krenuli su sa nabavkom sve boljih i boljih procesora. Cilj je bio što isplativije rudarenje bitkoina sa što manjim ulaganjima. Na ovaj način smo dobili prve rudare i potpuno funkcionalnu Bitkoin mrežu.
![](https://sp-ao.shortpixel.ai/client/to_auto,q_glossy,ret_img,w_600/https://ecd.rs/wp-content/uploads/2020/08/AMD-Phenom-II-procesor-iz-2008.-godine.jpg)
*AMD Phenom II procesor iz 2008. godine*
#### Era grafičkih kartica (2010 – 2011)
Kako je potražnja za bitkoinom porasla, a on dostigao cenu od 10 centi u oktobru 2010. godine, pojavili su se prvi rudari koji su koristili grafičke kartice (GPU) za rudarenje umesto procesora. Pojedinci su otkrili da je ovaj način rudarenja mnogo efikasniji od rudarenja procesorom, a vest se brzo raširila. Za relativno kratko vreme težina kopanja je toliko porasla da se uopšte nije isplatilo kopati procesorom. Računari sa dobrom diskretnom grafičkom karticom koja se može koristiti za igranje video igara su ubrzo postale mašine za zaradu nove vrste digitalnog novca.
Tada je u svetu računarstva bila popularna opcija korišćenja dve grafičke kartice za bolje performanse u video igrama i programima koji su bili veoma zahtevni (npr. video produkcija ili 3D modelovanje), tako da je već postojala potrebna infrastruktura za rudarenje sa više grafičkih kartica. Što više grafičkih kartica u računaru to je zarada bila bolja. Ubrzo su se pojavili *[miningrig](https://ecd.rs/faqs/mining-rig/)*-ovi (računari specijalizovani za rudarenje) koji su imali od 4 do 8 grafičkih kartica. U početku ovo su bile po izgledu jako amaterski sklopljene mašine, ali su kasnije poprimile poseban i donekle standardizovan oblik.
![](https://sp-ao.shortpixel.ai/client/to_auto,q_glossy,ret_img,w_768/https://ecd.rs/wp-content/uploads/2020/08/Primer-izgleda-prvih-mining-rig-ova-768x496.jpg)
*Primer izgleda prvih mining rig-ova*
#### Era FPGA kartica (2011 – 2013)
FPGA je skraćeno od field-programmable gate array. Konkretan hardver je dizajniran tako da korisnik može naknadno da ga prilagodi za određeni zadatak. Karakteristika ovih uređaja je brzo izvršavanje konkretne vrste zadataka koje može biti i do dva puta efikasnije od izvršavanja istog zadatka pomoću grafičke kartice. Ovaj potencijal zaintrigirao je rudare tog doba i sredinom 2011. godine otpočelo je korišćenje ovog hardvera za potrebe rudarenja. Obzirom na to da FPGA uređaji nisu toliko jednostavni za korišćenje za razliku od grafičkih kartica i procesora, u početku nije bilo puno ljudi koji su rudarili pomoću ovih uređaja. Kako je softver za rudarenje uz pomoć FPGA uređaja postajao sve dostupniji, rastao je i broj ljudi koji su na ovaj način zarađivali svoje bitkoine.
Naravno, velika efikasnost ovih uređaja i činjenica da daju dva puta bolje rezultate od grafičkih kartica samo je dodatno doprinela povećanju težine kopanja bitkoina, ali nisu FPGA uređaji doveli do toga da [GPU](https://ecd.rs/faqs/gpu/) rudarenje postane istorija rudarenja bitkoina. Do toga su doveli [ASIC](https://ecd.rs/faqs/asic/) uređaji koji su stupili na scenu 2013. godine.
![](https://sp-ao.shortpixel.ai/client/to_auto,q_glossy,ret_img,w_748/https://ecd.rs/wp-content/uploads/2020/08/FPGA-ure%C4%91aj.jpg)
*FPGA uređaj*
#### Era ASIC uređaja (2013 – 2020)
ASIC uređaji su se prvi put pojavili 2013. godine i potpuno su preuzeli scenu rudarenja. Naime, ASIC je skraćeno od application-specific integrated circuit što znači da su ASIC uređaji posebno pravljeni za rešavanje jedne vrste zadatka. Mana ovog pristupa je to što se ASIC uređaji ne mogu koristiti ni za šta drugo osim za rudarenje uz pomoć određenog algoritma. Prednosti ovih uređaja su višestruko bolje performanse i veoma laka instalacija. Nije bilo potrebno razumeti se u hardver za korišćenje ASIC uređaja. Rudari bi samo naručili ove mašine i uključili ih. Odjednom svako je mogao da rudari na Bitkoin mreži uz minimalan trud. To je rezultiralo povećanjem težine kopanja do te mere da su svi prethodno navedeni načini rudarenja postali (skoro) potpuno neisplativi za kopanje bitkoina.
Istorija rudarenja bitkoina pamti nekoliko firmi koje su se bavile prozvodnjom ASIC uređaja među kojima je i današnji gigant Bitmain. Trka za najboljim ASIC uređajem je dovela do gašenja velikog broja firmi jer su samo firme sa kompetentim proizvodom mogle da opstanu na tržištu. Što je veći broj određenog modela bio proizveden, to su troškovi njegove proizvodnje bili manji, tako da manje firme nisu imale puno šanse da opstanu kao ozbiljni konkurenti u ponudi uređaja rudarima.
Prvi ASIC-i su bili u obliku USB uređaja. Bili su bez ventilatora, bez buke i uz minimalnu potrošnju struje. Rudari su ubrzo krenuli da prave prve farme za rudarenje uz pomoć ovih malih uređaja – nekoliko desetina njih povezanih na isti računar uz pomoć USB hub-ova davali su maksimalne performanse. Sa porastom težine kopanja, sve bolji i bolji ASIC-i su zauzimali svoja mesta u garažama i skladištima rudara dok su stari bili prodavani po znatno manjim cenama.
![](https://sp-ao.shortpixel.ai/client/to_auto,q_glossy,ret_img,w_768/https://ecd.rs/wp-content/uploads/2020/08/Prve-ASIC-farme-768x576.jpg)
*Prve ASIC farme*
ASIC uređaji su se razvijali kako je potreba za sve jačim mašinama rasla. Ova era i dalje traje, a ASIC uređaji danas pružaju nekoliko hiljada puta bolje performanse od prvih procesora koji su bili korišćeni 2009. godine. Nove generacije ASIC-a su uvek veoma isplative, ali treba uzeti u obzir i veoma veliku cenu novih ASIC uređaja kao i činjenicu da novi modeli izlaze na svakih nekoliko meseci što smanjuje profitabilnost starih modela.
![](https://sp-ao.shortpixel.ai/client/to_auto,q_glossy,ret_img,w_768/https://ecd.rs/wp-content/uploads/2020/08/Izgled-dana%C5%A1njeg-ASIC-ure%C4%91aja-768x511.jpg)
*Izgled današnjeg ASIC uređaja*
Ovi uređaji će ostati dominantni na sceni Bitkoin rudarenja i nema naznaka da će se to promeniti u skorije vreme. U sledećem blogu o rudarenju bitkoina i kriptovaluta uopšte ćemo proći kroz način(e) za postavljanje rig-a za rudarenje i trenutno dostupne opcije na domaćem tržištu. Takođe ćemo pokriti određene modele i procene profitabilnosti rudarenja bitkoina u 2020-oj godini.
-
![](/static/nostr-icon-purple-64x64.png)
@ 3ad01248:962d8a07
2025-01-15 19:03:50
I know with the hype around Trump's election victory and the pro-Bitcoin people that he has surrounded himself with as of late, the idea of a Bitcoin Strategy Reserve or BSR is an intoxicating idea among many Bitcoiners.
I don't blame Bitcoiners from being happy about it, how can you not be? After enduring the last 4 years of vicious crackdown, arbitrary rules from the SEC and outright hostility to the Bitcoin community in general it is nice to have an administration that is simply nice to us and wants to leave the community alone to do it own thing.
While I am excited to see what a new Trump administration looks like for Bitcoin over the next four years, I am not onboard with a BSR. I think that the BSR is bad policy and supports the system that we are trying escape from in the first place.
In my opinion I believe a BSR signals to the world that the government doesn't believe in its own currency or its ability to reign their spending problem. Even the mere signaling that America is going to create a BSR has sent other countries scrambling to create one of their own. This is incredibly bad news for the US bond market.
[Who are the buyers of US bonds right now?](https://www.reuters.com/markets/rates-bonds/bond-vigilante-pimco-trims-long-term-us-sovereign-debt-holdings-2024-12-09/) A huge component of the market is foreign governments.[ Even though they have been less willing to buy US bonds over the last couple of decades most governments are still in the market buying up US debt. ](https://wolfstreet.com/2024/10/19/which-foreign-countries-bought-the-recklessly-ballooning-us-debt-increasingly-crucial-question-many-piled-it-up-cleanest-dirty-shirt/)
Now imagine of these foreign buyers start buying Bitcoin in small amounts at first and slowly scale into Bitcoin in a big way once they see the insane price action. They will FINALLY get it and once that happens its over the dollar. This is a gradually then suddenly like moment that no one is ready for at the moment.
So if you take way the foreign buyer of US bonds, who are you left with? The Federal Reserve. Having the Federal Reserve directly buying up government debt is huge sign of monetization of the debt to the world and doesn't bode well for the future of America or the world.
As you can see setting up a BSR would be highly destabilizing in the short term and could create a whole slew of knock on effects that no one is prepared or equipped to deal with.
In addition to destabilizing an already fragile economic environment, why do we want this big ass government to have Bitcoin in the first place? So they can keep on oppressing the working man/woman, crushing innovation and generally being a tick on the back of the private sector? How about we not empower them to keep spying on us and the world.
I want to live in a world where war impose heavy costs on leaders and governments and peace is the default setting of the world. Governments using Bitcoin to prop up their tyrannical ways is not why Bitcoin was created. You know that. I know that. The rest of the world should know that.
Bitcoin was created as an electronic p2p system that allows anyone to transact regardless of artificial borders or political differences. Bitcoin allows anyone to transact globally without the grubby hands of the government trying to take a cut. We need less government, not more.
I'm personally not a fan of governments or big money institutions getting into Bitcoin as I feel its like letting the fox into the hen house but that ship has sailed. The best we can hope for now is to create enough individual adoption that it makes it hard for governments to get a large amount of Bitcoin so they can act as a check on the accumulation of Bitcoin.
HODL culture is needed now more than ever. Don't hand over your Bitcoin to tyrants. Stack sats. HODL. Create the change you want to see in the world.
-
![](/static/nostr-icon-purple-64x64.png)
@ c21b1a6c:0cd4d170
2025-01-15 18:04:31
Hello everyone, as part of the nostr:npub10pensatlcfwktnvjjw2dtem38n6rvw8g6fv73h84cuacxn4c28eqyfn34f grant I have to write a progress report for Formstr, I thought I'll use this opportunity to do a nostr blog! , Something I've been meaning to do for sometime, hopefully I don't bore you.
## Introduction
There was a lot of work ahead of us even before we got the grant, and we tried to tackle it heads on.
We completely changed the underlying mechanism of storing and fetching forms. Whereas previously a form was a kind 0 event, same as a profile event. The form is now created and responded to in the mechanism as outlined in the [Forms NIP](https://github.com/nostr-protocol/nips/pull/1190/files). This had to be done while making sure that none of the older forms broke during the process. The new specification helps streamline the forms usecase to expand to access control, private forms, upgrade to nip44 encryption.
Some of these features existed as Proofs of Concepts prior to this quarters work, the major tasks were to streamline and production-ize them, to be able to release it to the public. We were also joined by nostr:npub1vf6wyw9j38sm96vwfekwvqxucr9jutqrmwdc2qnql79a66al9fzsuvt9ys who along with nostr:npub15gkmu50rcuv6mzevmslyllppwmeqxulnqfak0gwud3hfwmau6mvqqnpfvg helped move the project along.
## How did we spend our time.
Released a major Formstr Update (16/12/204): - [Release PR](https://github.com/abhay-raizada/nostr-forms/pull/157):
This Release Contained The Following Changelog:
- Move Form Creation and Rendering to New Event
- Upgrade Response Encryption to NIP-44.
- Add Ability to create private forms.
- Add ability to send private form access as Gift Wraps.
- Create a new dashboard UI to incorporate new form types.
- Add ability to login to formstr
- Use naddr to encode form Urls instead of pubkey(centralized).
Work done to production-ize these features can be found in the following PRs:
1. [Save forms to local device automatically](https://github.com/abhay-raizada/nostr-forms/pull/176)
2. [Ability to remove participants in Access Control UI](https://github.com/abhay-raizada/nostr-forms/pull/178)
3. [Revamp Responses Page according to NIP-101](https://github.com/abhay-raizada/nostr-forms/pull/181/files)
4. [Add a "My Forms" Section on the dashboard](https://github.com/abhay-raizada/nostr-forms/pull/188)
5. [Add UI for Inserting Images](https://github.com/abhay-raizada/nostr-forms/pull/183)
6. [Using Naddr Instead of pubkey as formId](https://github.com/abhay-raizada/nostr-forms/pull/180)
In addition to these there were multiple bugfixes and patches that I've excluded for brevity.
## Major Challenges
We were in "beta hell" for a long time, even though I had finished rudimentary versions of each of the features in advance (some to test the viability of the forms NIP). Incorporating them into the running version proved to be a challenge. We realized that some of the features required major UI changes, and a lot of new features broke previously working desirable features such as NIP-04 Notifications. A lot of [work](https://github.com/abhay-raizada/nostr-forms/pull/157/commits/4ce6970b09e7728004ccdeb058efb2b58dd96ef0) like this had to be done to ensure formstr brought in new features while continuing to work exactly as old users liked it.
## What's left and what's coming?
From the wish-list items I had committed during the application a few major ones remain:
- Edit Past Forms.
- Paid Surveys.
- Support for NIP-42 Private Relays.
- Conditional Rendering of form fields
- Sections
Of these I'm happy to report that we've already begun work on conditional rendering of fields (https://github.com/abhay-raizada/nostr-forms/pull/199)
## What is de-prioritized?
Going with experiences from quarter 1, we are de-prioritizing Formstr Integrations with 3rd party services like Ollama (Self Sovereign AI) and business tools like Slack, Notion etc. We'll try to get to it, but it's less of a priority compared to other features!
## How the funds were used.
- Paying Individual Contributors for PRs submitted.
- Living Expenses
-
![](/static/nostr-icon-purple-64x64.png)
@ 8b9eb61d:09434328
2025-01-15 17:42:17
As men age, maintaining optimal vitality becomes essential for a fulfilling life. At TESTO - Herbal Vitality, we offer a range of natural solutions designed to help men maintain energy, confidence, and balance. From vitamins that support testosterone to libido supplements in NZ and horny goat weed for men, our products offer natural ways to support male health. In this article, we’ll explore how these supplements can help enhance your well-being.
**How Can Vitamins That Support Testosterone Improve Men’s Health**?
Testosterone is a key hormone that influences many aspects of men’s health, including muscle mass, energy levels, and sexual wellness. As men age, their testosterone levels naturally decrease, which can lead to reduced vitality and performance. To combat this, it’s important to include vitamins that help maintain testosterone levels.
Vitamins such as Vitamin D, Zinc, and Magnesium are crucial for supporting testosterone production. Vitamin D, for example, has been linked to better testosterone levels, while Zinc and Magnesium play important roles in hormone regulation. Our herbal formulations combine these essential nutrients to help men naturally maintain their testosterone levels, supporting long-term vitality and a better quality of life.
Incorporating vitamins that support testosterone into your daily routine can help you feel more energised, maintain physical strength, and improve overall wellness.
**What Are Libido Supplements in NZ and How Can They Benefit You**?
Libido plays a crucial role in maintaining healthy relationships and personal well-being. As men age, their libido can decline due to hormonal changes or stress. This is where libido supplements in NZ come into play. At TESTO, our libido supplements are crafted to naturally support sexual health, enhance performance, and boost energy levels.
Our supplements are made from powerful herbs traditionally used to support male sexual health. These ingredients help improve blood circulation, support hormone balance, and provide a natural energy boost. By choosing libido supplements in NZ, you can promote better sexual health and confidence.
In addition, our libido supplements are safe, effective, and made with high-quality, natural ingredients. They offer an ideal solution for those looking to support their overall well-being and improve performance naturally.
**Why Is Horny Goat Weed for Men So Effective**?
Known for its long history in traditional medicine, horny goat weed is a powerful herb used to enhance stamina, support sexual health, and boost energy levels. It contains icariin, a compound believed to improve blood flow and enhance endurance.
Horny goat weed has been widely used for centuries in Chinese medicine to promote vitality. This herb works by supporting circulation, which helps men feel more energised, both physically and mentally. Whether you're looking to increase stamina during workouts or improve performance in the bedroom, horny goat weed for men offers a natural solution to support your health.
**Why Choose Natural Supplements for Your Health**?
At TESTO - Herbal Vitality, we believe in the power of natural ingredients to support men’s wellness. Our products, including [vitamins that support testosterone](https://www.testo.co.nz/), libido supplements in NZ, and horny goat weed for men, are designed to provide safe, effective solutions for boosting vitality, energy, and sexual health.
By integrating these supplements into your routine, you’re taking steps toward improved wellness and a healthier lifestyle. We use high-quality, natural ingredients to ensure you receive the best possible results without harmful side effects.
Start your journey toward revitalisation with TESTO and enjoy the benefits of natural, holistic wellness. Whether you're aiming to boost your testosterone levels, support your libido, or enhance your overall vitality, we have the right solutions for you.
-
![](/static/nostr-icon-purple-64x64.png)
@ e968e50b:db2a803a
2025-01-15 16:59:56
I feel like I'm just full of newbie questions for stacker news this week. Sorry.
I recently took the killer [pleb devs courses](https://plebdevs.com/) and now confidently feel like I have some programming skills kinda-sorta (the classes are great, but I was starting from 0) under my belt. My end goal was to stick it to the man and be a part of the bitcoin revolution. That said, I've made a couple of projects that I really want to share with more folks, but would like to actually make them into cooler sites.
For my actual long-term business, I've been renting a domain name for decades and never thought too much about it since it was a business expense and I really didn't care what happened to it after I was gone. However, for these fun coding projects, I wanted to get a domain so that everything doesn't end in .onrender or .vercel.app and I assumed that since I was using a more silly name, it'd be cheap to just by something forever. But that doesn't seem to be the case. In fact...as most of you know...but which is news to me, you can't actually buy domains forever at all. Am I correct about this? If so, doesn't that mean the whole decentralized nature of the internet is a sham? I'm feeling very confused and not finding much helpful info.
My goal is to buy a landing page for a bunch of bitcoin-themed games I've built (something like bitcoingames.stupid) and my [nostrminusnostr](https://nostrminusnostr.vercel.app/) client, something like nostrminusnostr.nostr. Anyway, I found some stuff in the range I'd be willing to spend on Vercel, but am just a little confused how domain hosting actually works.
originally posted at https://stacker.news/items/851425
-
![](/static/nostr-icon-purple-64x64.png)
@ f9c0ea75:44e849f4
2025-01-15 16:42:53
Em 2007, o Brasil comemorava o fim da CPMF (Contribuição Provisória sobre Movimentação Financeira), um imposto que, embora "temporário", durou 10 anos e arrecadou centenas de bilhões de reais. Na época, o governo afirmava que a contribuição era necessária para financiar a saúde pública, mas, na prática, foi mais um peso sobre o cidadão e as empresas.
Agora, quase duas décadas depois, o cenário está mudando novamente. O monitoramento financeiro da Receita Federal sobre transações acima de R$ 5 mil e a implementação do DREX, a moeda digital programável do Banco Central, sugerem que o controle sobre o dinheiro nunca foi tão grande.
A pergunta que fica é: será que estamos caminhando para uma nova CPMF, só que digital e automatizada?
---
### **O Passado: CPMF e o Controle Estatal sobre o Dinheiro**
\
A CPMF nasceu sob o pretexto de ser um imposto temporário, com uma alíquota pequena (inicialmente 0,20%, depois 0,38%) que incidiria sobre qualquer movimentação bancária. Seu objetivo oficial era financiar a saúde, mas a verdade é que o governo encontrou nela uma mina de ouro de arrecadação, garantindo bilhões de reais anualmente.
Os problemas começaram a aparecer rapidamente:
1. O custo era repassado aos preços dos produtos e serviços, afetando toda a economia.
2. Empresas e cidadãos pagavam sobre transações repetidas, tornando a carga tributária ainda maior.
3. O dinheiro não foi totalmente para a saúde, sendo usado para tapar buracos no orçamento.
4. A promessa de temporariedade caiu por terra, e a CPMF durou uma década.
5. O governo insistia que não existia outro jeito de arrecadar sem essa cobrança, mas, quando foi extinta, nada desmoronou. Só ficou mais difícil tributar o cidadão sem que ele percebesse.
Agora, vemos novos mecanismos de controle financeiro surgindo. O argumento é o mesmo: transparência, combate à sonegação e otimização da arrecadação. Mas será que é só isso?
---
### **O Presente: Receita Federal Fecha o Cerco sobre Suas Transações**
\
A partir de 2025, qualquer movimentação acima de R$ 5 mil para pessoas físicas e R$ 15 mil para empresas será automaticamente informada à Receita Federal. Isso significa que se você fizer uma transferência maior que esse valor, o governo já saberá sem precisar pedir dados ao banco.
Oficialmente, essa medida não implica na criação de um novo imposto. Mas, se a história nos ensina algo, é que governos não implementam esse nível de monitoramento à toa. Algumas questões que surgem:
- Se não é para tributar, por que monitorar tão de perto?
- Se a CPMF foi extinta, por que voltamos a um sistema de rastreamento financeiro tão intrusivo?
- Esse é só um primeiro passo para um imposto automático sobre movimentações digitais?
---
### **O Futuro: DREX e a Automação da Tributação**
\
O DREX, a versão digital do real, será um grande passo para o controle financeiro estatal. Diferente do Pix, que apenas facilita transferências, o DREX permite que o Banco Central programe e rastreie cada centavo movimentado.
E o que isso significa para o cidadão comum?
- Pagamentos e tributações automáticas: um sistema de split payment poderia fazer com que impostos fossem cobrados diretamente na fonte, sem a necessidade de declarações ou boletos.
- Controle total sobre transações: diferente do dinheiro físico, que circula sem monitoramento, o DREX permitirá ao governo rastrear qualquer pagamento, em tempo real.
- Possibilidade de limitação de uso: com uma moeda programável, poderia haver restrições sobre onde, quando e como você pode gastar seu dinheiro.
O Banco Central e a Receita Federal garantem que não há planos de usar o DREX para tributação compulsória, mas a CPMF também começou assim: como algo temporário, necessário e inofensivo.
---
### **Estamos Caminhando para uma Nova CPMF Digital?**
\
Se analisarmos a trajetória do governo na questão tributária, fica claro que:
- Primeiro, nega-se qualquer imposto novo.
- Depois, implementa-se um sistema de monitoramento, supostamente para "combater fraudes".
- Por fim, a tributação é introduzida sob a justificativa de que "não há outra saída". A CPMF só funcionou porque o dinheiro passava pelo sistema bancário e era fácil de rastrear. Agora, com o DREX e o monitoramento da Receita, o governo não precisaria nem de um imposto explícito para tributar transações—ele poderia simplesmente automatizar a cobrança diretamente na moeda digital.
O que antes dependia de aprovação no Congresso e resistência da população, pode agora ser feito com um simples ajuste de software no Banco Central.
O governo diz que isso não está nos planos. Mas se olharmos para trás, essa é exatamente a mesma narrativa que ouvimos antes da CPMF entrar em vigor.
---
### **Seu Dinheiro, Seu Controle?**
\
O Brasil está entrando em uma nova era financeira. O monitoramento de grandes transações e a implementação do DREX podem representar um avanço na transparência e na eficiência econômica, mas também criam um risco real de perda de liberdade financeira e tributação automatizada.
O que aconteceu com a CPMF deve servir de lição: o que começa como uma simples ferramenta de arrecadação pode se transformar em um peso permanente sobre o cidadão.
Se o governo tiver a tecnologia e a infraestrutura para tributar automaticamente, quanto tempo levará até que eles resolvam usá-la?
-
![](/static/nostr-icon-purple-64x64.png)
@ 8d34bd24:414be32b
2025-01-15 16:29:24
Many times people wonder “Why do we have to obey God?” or “Why should we submit to Jesus’s lordship?” or “Why is Jesus the only way to Heaven?” Although there are many reasons, they can all be summarized in Him being our creator.
Today, I was listening to “The End Times” podcast with Mark Hitchcock and he was discussing Revelation chapter 4. Among other things, he read this passage:
> And the four living creatures, each one of them having six wings, are full of eyes around and within; and day and night they do not cease to say,
>
> “**Holy, holy, holy is the Lord God, the Almighty, who was and who is and who is to come**.”
>
> And when the living creatures give glory and honor and thanks to Him who sits on the throne, to Him who lives forever and ever, the twenty-four elders will fall down before Him who sits on the throne, and will worship Him who lives forever and ever, and will cast their crowns before the throne, saying,
>
> “**Worthy are You, our Lord and our God, to receive glory and honor and power; for You created all things, and because of Your will they existed, and were created**.” (Revelation 4:8-11) {emphasis mine}
God deserves our worship and our obedience because He is our creator. As creator, He has the right to command us to obey. Also as creator, He knows what is best for us because He created us and everything around us. He created us with a purpose and we will never know complete joy and peace until we obey Him and work according to the purpose He created us to fulfill.
If God was just a superhero type God, who was stronger and smarter than us, then He wouldn’t have a right to authority over us. Because He created us, He does. People questioning God’s authority to define right and wrong has existed throughout history. Isaiah addressed this complaint in the Old Testament:
> “Woe to the one who quarrels with his Maker—\
> An earthenware vessel among the vessels of earth!\
> Will the clay say to the potter, ‘What are you doing?’\
> Or the thing you are making say, ‘He has no hands’? (Isaiah 45:9)
In the New Testament, Paul goes into even more details on God’s right and authority:
> On the contrary, who are you, O man, who answers back to God? The thing molded will not say to the molder, “Why did you make me like this,” will it? Or does not the potter have a right over the clay, to make from the same lump one vessel for honorable use and another for common use? What if God, although willing to demonstrate His wrath and to make His power known, endured with much patience vessels of wrath prepared for destruction? And He did so to make known the riches of His glory upon vessels of mercy, which He prepared beforehand for glory, even us, whom He also called, not from among Jews only, but also from among Gentiles. (Romans 9:20-24)
The one who creates something has the right to do what he wants with his creation, whether using it for honor, for dishonor, or for destruction. The creator has the right to say how his creation will be used and for what purpose it will be used. No one, especially the created creature, has a right to question that authority. We question God’s authority and His truth because we do not have nearly a high enough view of God.
> **You turn things around!**\
> Shall the potter be considered as equal with the clay,\
> That what is made would say to its maker, “He did not make me”;\
> Or what is formed say to him who formed it, “He has no understanding”? (Isaiah 29:16) {emphasis mine}
Read this verse again. Anyone who is formed, who says to the one who formed it, “*He has not understanding*,” has completely turned their thinking upside down. This is foolish thinking.
God deserves our thanks, our worship, and our obedience because He created us. Without Him we would never have existed. God is good! All of the time!
> “**Worthy are You, our Lord and our God, to receive glory and honor and power; for You created all things, and because of Your will they existed, and were created**.” (Revelation 4:11) {emphasis mine}
Because I see so many people treat God in such a low manner, I tend to accentuate His holiness and His authority. That doesn’t mean that the God of the Bible is a distant taskmaster far away sitting waiting to punish anyone who strays from the exact path He has called them to walk. He is loving, kind, and merciful, too.
God is referred to as Father for a reason. A father of a youngster is feared by the child, but that child also leans on his father for protection, love, and direction. Although the father has the authority and the power to punish or make demands, a loving father does what is best for the child. The best may be a punishment for doing wrong or just allowing the child to fail, but the father’s protecting hand is always there preventing any major harm. The discomfort that is allowed is for the good of the child. It guides the child in the path that will most benefit the child in the long run even if the child is very unhappy with the father’s actions at the moment. Most of the time, when the child grows up, they come to understand and appreciate their parents’ actions. The God of the Bible is the heavenly Father of each and every believer and so much more loving, more wise, and more powerful than any earthly father.
Trust Jesus.\
\
your sister in Christ,
Christy
FYI, Right after writing this post, I read this article on a related subject. It is a hard truth, like the one I shared, but worth embracing, if you have time, check it out
![](https://substackcdn.com/image/fetch/w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2db0efaa-4d4f-431c-b6b9-c7073aca7885_1280x1280.png)[The Not So Political Protestant](https://thenotsopoliticalprotestant.substack.com/p/could-oppression-be-gods-wonderful?utm_source=substack&utm_campaign=post_embed&utm_medium=web)
[Could Oppression Be God's Wonderful Plan for Your Life?](https://thenotsopoliticalprotestant.substack.com/p/could-oppression-be-gods-wonderful?utm_source=substack&utm_campaign=post_embed&utm_medium=web)
[Hey guys, it's Lee. Thanks for stopping by The Not So Political Protestant, a publication dedicated to correcting the course of the American church in regard to politics and its place in the lives of Christians. The Not So Political Protestant is here to call God's people back to sanity and repentance because, as citizens of another world, we should liv…](https://thenotsopoliticalprotestant.substack.com/p/could-oppression-be-gods-wonderful?utm_source=substack&utm_campaign=post_embed&utm_medium=web)
[Read more](https://thenotsopoliticalprotestant.substack.com/p/could-oppression-be-gods-wonderful?utm_source=substack&utm_campaign=post_embed&utm_medium=web)
[a month ago · 3 likes · 3 comments · Lee Lumley](https://thenotsopoliticalprotestant.substack.com/p/could-oppression-be-gods-wonderful?utm_source=substack&utm_campaign=post_embed&utm_medium=web)
Bible verses are NASB (New American Standard Bible) 1995 edition unless otherwise stated
-
![](/static/nostr-icon-purple-64x64.png)
@ 3eacaa76:bac66fe4
2025-01-15 16:25:13
Few days back this track get on Top of list on #wavlake.
It's nice , but not a point. at all.
> The message is clear. like Real Talk should be !
We know, specialy on #nostr, that solutions are available. However, the world is not yet aware of them.
100% of the donations for this remix will be sent to my friend [Yusef]( https://x.com/Yusef_Mahmoud1) who is on the ground and has been providing food, water, and shelter for children in Gaza even before or the psyop with October 07 took a place. Israel has enforced a blockade on Gaza for over decade. And Just past year completly destroyed 90% of land.
Like to the ground , no schools , no hospitals ... hard to find anything what surrvived those daily airstrikes without 1h of pause since 350 days. WTF
It's heartbreaking to see children dying daily in houreds and the lack of action from the public and authorities of other nations. The statistics are alarming, and it's essential to address this issue and find ways to make progress. it's crucial to raise awareness and take action to prevent further tragedies. Let's remember that every child's life is precious and deserves our attention and support.
In most apocaliptic condition , where is-real controling all money supply (check lastest news about banknotes in there) , the #Bitcoin is one and only solution can help them in daily bases. It was helping them before with great succes. Why you ask ? becuse even if they close all platforms You can still send them some sats.
> How fookin cool is that !!
I know it doesn't sound funny.
Those People pushed to the limit , now they have a tool that fulfills exactly what was created for A Peer-to-Peer Electronic Cash System.
```
No Middle man .
```
```
On the middle is only a finger whitch **WE the PEOPLE**
can give to those Scumbagz in Goverments and Banks, Full stop.
```
Many people are only recently realizing the truth about Gaza being an open-air prison from like 75 years. Not 3, not 5 or even 20 ..... but ***seventy five fookin years***.
This music mix was created to share the truth and provoke to critical thinking, which has been lacking for the past decade. and even more.
I wonder why we can watch live streams of the ongoing genocide in 4K HD and stil be silent. not all but many.
Why are we surprised that normies don't understand ***Bitcoin*** and still use **fiat** shit currency? Whitch is fudament of All war crimes. We should ask ourselves.
> Our own ignorance and the banking system are the cancers of this world.
### If we lose Palestine, we will lose much more than we think.
You will be next - One way or another
Thank you for your support, not for me but for those in need who can gain hope from our efforts.
Respect to you all.
![image]( https://yakihonne.s3.ap-east-1.amazonaws.com/3eacaa768326d7dce80f6ee17ada199bebe7eb3c1a60b39b14e0a58bbac66fe4/files/1727022113030-YAKIHONNES3.webp)
[LISTEN HERE]( https://wavlake.com/album/c980c860-9102-49bb-9fef-bdf0a270486d) and suport directly in upper links
#FreePalestine
Thanks
be blessed
MadMunky
-
![](/static/nostr-icon-purple-64x64.png)
@ 6389be64:ef439d32
2025-01-14 01:31:12
Bitcoin is more than money, more than an asset, and more than a store of value. Bitcoin is a Prime Mover, an enabler and it ignites imaginations. It certainly fueled an idea in my mind. The idea integrates sensors, computational prowess, actuated machinery, power conversion, and electronic communications to form an autonomous, machined creature roaming forests and harvesting the most widespread and least energy-dense fuel source available. I call it the Forest Walker and it eats wood, and mines Bitcoin.
I know what you're thinking. Why not just put Bitcoin mining rigs where they belong: in a hosted facility sporting electricity from energy-dense fuels like natural gas, climate-controlled with excellent data piping in and out? Why go to all the trouble building a robot that digests wood creating flammable gasses fueling an engine to run a generator powering Bitcoin miners? It's all about synergy.
Bitcoin mining enables the realization of multiple, seemingly unrelated, yet useful activities. Activities considered un-profitable if not for Bitcoin as the Prime Mover. This is much more than simply mining the greatest asset ever conceived by humankind. It’s about the power of synergy, which Bitcoin plays only one of many roles. The synergy created by this system can stabilize forests' fire ecology while generating multiple income streams. That’s the realistic goal here and requires a brief history of American Forest management before continuing.
# Smokey The Bear
In 1944, the Smokey Bear Wildfire Prevention Campaign began in the United States. “Only YOU can prevent forest fires” remains the refrain of the Ad Council’s longest running campaign. The Ad Council is a U.S. non-profit set up by the American Association of Advertising Agencies and the Association of National Advertisers in 1942. It would seem that the U.S. Department of the Interior was concerned about pesky forest fires and wanted them to stop. So, alongside a national policy of extreme fire suppression they enlisted the entire U.S. population to get onboard via the Ad Council and it worked. Forest fires were almost obliterated and everyone was happy, right? Wrong.
Smokey is a fantastically successful bear so forest fires became so few for so long that the fuel load - dead wood - in forests has become very heavy. So heavy that when a fire happens (and they always happen) it destroys everything in its path because the more fuel there is the hotter that fire becomes. Trees, bushes, shrubs, and all other plant life cannot escape destruction (not to mention homes and businesses). The soil microbiology doesn’t escape either as it is burned away even in deeper soils. To add insult to injury, hydrophobic waxy residues condense on the soil surface, forcing water to travel over the ground rather than through it eroding forest soils. Good job, Smokey. Well done, Sir!
Most terrestrial ecologies are “fire ecologies”. Fire is a part of these systems’ fuel load and pest management. Before we pretended to “manage” millions of acres of forest, fires raged over the world, rarely damaging forests. The fuel load was always too light to generate fires hot enough to moonscape mountainsides. Fires simply burned off the minor amounts of fuel accumulated since the fire before. The lighter heat, smoke, and other combustion gasses suppressed pests, keeping them in check and the smoke condensed into a plant growth accelerant called wood vinegar, not a waxy cap on the soil. These fires also cleared out weak undergrowth, cycled minerals, and thinned the forest canopy, allowing sunlight to penetrate to the forest floor. Without a fire’s heat, many pine tree species can’t sow their seed. The heat is required to open the cones (the seed bearing structure) of Spruce, Cypress, Sequoia, Jack Pine, Lodgepole Pine and many more. Without fire forests can’t have babies. The idea was to protect the forests, and it isn't working.
So, in a world of fire, what does an ally look like and what does it do?
# Meet The Forest Walker
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736817510192-YAKIHONNES3.png)
For the Forest Walker to work as a mobile, autonomous unit, a solid platform that can carry several hundred pounds is required. It so happens this chassis already exists but shelved.
Introducing the Legged Squad Support System (LS3). A joint project between Boston Dynamics, DARPA, and the United States Marine Corps, the quadrupedal robot is the size of a cow, can carry 400 pounds (180 kg) of equipment, negotiate challenging terrain, and operate for 24 hours before needing to refuel. Yes, it had an engine. Abandoned in 2015, the thing was too noisy for military deployment and maintenance "under fire" is never a high-quality idea. However, we can rebuild it to act as a platform for the Forest Walker; albeit with serious alterations. It would need to be bigger, probably. Carry more weight? Definitely. Maybe replace structural metal with carbon fiber and redesign much as 3D printable parts for more effective maintenance.
The original system has a top operational speed of 8 miles per hour. For our purposes, it only needs to move about as fast as a grazing ruminant. Without the hammering vibrations of galloping into battle, shocks of exploding mortars, and drunken soldiers playing "Wrangler of Steel Machines", time between failures should be much longer and the overall energy consumption much lower. The LS3 is a solid platform to build upon. Now it just needs to be pulled out of the mothballs, and completely refitted with outboard equipment.
# The Small Branch Chipper
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736817558159-YAKIHONNES3.png)
When I say “Forest fuel load” I mean the dead, carbon containing litter on the forest floor. Duff (leaves), fine-woody debris (small branches), and coarse woody debris (logs) are the fuel that feeds forest fires. Walk through any forest in the United States today and you will see quite a lot of these materials. Too much, as I have described. Some of these fuel loads can be 8 tons per acre in pine and hardwood forests and up to 16 tons per acre at active logging sites. That’s some big wood and the more that collects, the more combustible danger to the forest it represents. It also provides a technically unlimited fuel supply for the Forest Walker system.
The problem is that this detritus has to be chewed into pieces that are easily ingestible by the system for the gasification process (we’ll get to that step in a minute). What we need is a wood chipper attached to the chassis (the LS3); its “mouth”.
A small wood chipper handling material up to 2.5 - 3.0 inches (6.3 - 7.6 cm) in diameter would eliminate a substantial amount of fuel. There is no reason for Forest Walker to remove fallen trees. It wouldn’t have to in order to make a real difference. It need only identify appropriately sized branches and grab them. Once loaded into the chipper’s intake hopper for further processing, the beast can immediately look for more “food”. This is essentially kindling that would help ignite larger logs. If it’s all consumed by Forest Walker, then it’s not present to promote an aggravated conflagration.
I have glossed over an obvious question: How does Forest Walker see and identify branches and such? LiDaR (Light Detection and Ranging) attached to Forest Walker images the local area and feed those data to onboard computers for processing. Maybe AI plays a role. Maybe simple machine learning can do the trick. One thing is for certain: being able to identify a stick and cause robotic appendages to pick it up is not impossible.
Great! We now have a quadrupedal robot autonomously identifying and “eating” dead branches and other light, combustible materials. Whilst strolling through the forest, depleting future fires of combustibles, Forest Walker has already performed a major function of this system: making the forest safer. It's time to convert this low-density fuel into a high-density fuel Forest Walker can leverage. Enter the gasification process.
# The Gassifier
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736817765349-YAKIHONNES3.png)
The gasifier is the heart of the entire system; it’s where low-density fuel becomes the high-density fuel that powers the entire system. Biochar and wood vinegar are process wastes and I’ll discuss why both are powerful soil amendments in a moment, but first, what’s gasification?
Reacting shredded carbonaceous material at high temperatures in a low or no oxygen environment converts the biomass into biochar, wood vinegar, heat, and Synthesis Gas (Syngas). Syngas consists primarily of hydrogen, carbon monoxide, and methane. All of which are extremely useful fuels in a gaseous state. Part of this gas is used to heat the input biomass and keep the reaction temperature constant while the internal combustion engine that drives the generator to produce electrical power consumes the rest.
Critically, this gasification process is “continuous feed”. Forest Walker must intake biomass from the chipper, process it to fuel, and dump the waste (CO2, heat, biochar, and wood vinegar) continuously. It cannot stop. Everything about this system depends upon this continual grazing, digestion, and excretion of wastes just as a ruminal does. And, like a ruminant, all waste products enhance the local environment.
When I first heard of gasification, I didn’t believe that it was real. Running an electric generator from burning wood seemed more akin to “conspiracy fantasy” than science. Not only is gasification real, it’s ancient technology. A man named Dean Clayton first started experiments on gasification in 1699 and in 1901 gasification was used to power a vehicle. By the end of World War II, there were 500,000 Syngas powered vehicles in Germany alone because of fossil fuel rationing during the war. The global gasification market was $480 billion in 2022 and projected to be as much as $700 billion by 2030 (Vantage Market Research). Gasification technology is the best choice to power the Forest Walker because it’s self-contained and we want its waste products.
# Biochar: The Waste
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736817802326-YAKIHONNES3.png)
Biochar (AKA agricultural charcoal) is fairly simple: it’s almost pure, solid carbon that resembles charcoal. Its porous nature packs large surface areas into small, 3 dimensional nuggets. Devoid of most other chemistry, like hydrocarbons (methane) and ash (minerals), biochar is extremely lightweight. Do not confuse it with the charcoal you buy for your grill. Biochar doesn’t make good grilling charcoal because it would burn too rapidly as it does not contain the multitude of flammable components that charcoal does. Biochar has several other good use cases. Water filtration, water retention, nutrient retention, providing habitat for microscopic soil organisms, and carbon sequestration are the main ones that we are concerned with here.
Carbon has an amazing ability to adsorb (substances stick to and accumulate on the surface of an object) manifold chemistries. Water, nutrients, and pollutants tightly bind to carbon in this format. So, biochar makes a respectable filter and acts as a “battery” of water and nutrients in soils. Biochar adsorbs and holds on to seven times its weight in water. Soil containing biochar is more drought resilient than soil without it. Adsorbed nutrients, tightly sequestered alongside water, get released only as plants need them. Plants must excrete protons (H+) from their roots to disgorge water or positively charged nutrients from the biochar's surface; it's an active process.
Biochar’s surface area (where adsorption happens) can be 500 square meters per gram or more. That is 10% larger than an official NBA basketball court for every gram of biochar. Biochar’s abundant surface area builds protective habitats for soil microbes like fungi and bacteria and many are critical for the health and productivity of the soil itself.
The “carbon sequestration” component of biochar comes into play where “carbon credits” are concerned. There is a financial market for carbon. Not leveraging that market for revenue is foolish. I am climate agnostic. All I care about is that once solid carbon is inside the soil, it will stay there for thousands of years, imparting drought resiliency, fertility collection, nutrient buffering, and release for that time span. I simply want as much solid carbon in the soil because of the undeniably positive effects it has, regardless of any climactic considerations.
# Wood Vinegar: More Waste
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736817826910-YAKIHONNES3.png)
Another by-product of the gasification process is wood vinegar (Pyroligneous acid). If you have ever seen Liquid Smoke in the grocery store, then you have seen wood vinegar. Principally composed of acetic acid, acetone, and methanol wood vinegar also contains ~200 other organic compounds. It would seem intuitive that condensed, liquefied wood smoke would at least be bad for the health of all living things if not downright carcinogenic. The counter intuition wins the day, however. Wood vinegar has been used by humans for a very long time to promote digestion, bowel, and liver health; combat diarrhea and vomiting; calm peptic ulcers and regulate cholesterol levels; and a host of other benefits.
For centuries humans have annually burned off hundreds of thousands of square miles of pasture, grassland, forest, and every other conceivable terrestrial ecosystem. Why is this done? After every burn, one thing becomes obvious: the almost supernatural growth these ecosystems exhibit after the burn. How? Wood vinegar is a component of this growth. Even in open burns, smoke condenses and infiltrates the soil. That is when wood vinegar shows its quality.
This stuff beefs up not only general plant growth but seed germination as well and possesses many other qualities that are beneficial to plants. It’s a pesticide, fungicide, promotes beneficial soil microorganisms, enhances nutrient uptake, and imparts disease resistance. I am barely touching a long list of attributes here, but you want wood vinegar in your soil (alongside biochar because it adsorbs wood vinegar as well).
# The Internal Combustion Engine
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736817852201-YAKIHONNES3.png)
Conversion of grazed forage to chemical, then mechanical, and then electrical energy completes the cycle. The ICE (Internal Combustion Engine) converts the gaseous fuel output from the gasifier to mechanical energy, heat, water vapor, and CO2. It’s the mechanical energy of a rotating drive shaft that we want. That rotation drives the electric generator, which is the heartbeat we need to bring this monster to life. Luckily for us, combined internal combustion engine and generator packages are ubiquitous, delivering a defined energy output given a constant fuel input. It’s the simplest part of the system.
The obvious question here is whether the amount of syngas provided by the gasification process will provide enough energy to generate enough electrons to run the entire system or not. While I have no doubt the energy produced will run Forest Walker's main systems the question is really about the electrons left over. Will it be enough to run the Bitcoin mining aspect of the system? Everything is a budget.
# CO2 Production For Growth
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736817873011-YAKIHONNES3.png)
Plants are lollipops. No matter if it’s a tree or a bush or a shrubbery, the entire thing is mostly sugar in various formats but mostly long chain carbohydrates like lignin and cellulose. Plants need three things to make sugar: CO2, H2O and light. In a forest, where tree densities can be quite high, CO2 availability becomes a limiting growth factor. It’d be in the forest interests to have more available CO2 providing for various sugar formation providing the organism with food and structure.
An odd thing about tree leaves, the openings that allow gasses like the ever searched for CO2 are on the bottom of the leaf (these are called stomata). Not many stomata are topside. This suggests that trees and bushes have evolved to find gasses like CO2 from below, not above and this further suggests CO2 might be in higher concentrations nearer the soil.
The soil life (bacterial, fungi etc.) is constantly producing enormous amounts of CO2 and it would stay in the soil forever (eventually killing the very soil life that produces it) if not for tidal forces. Water is everywhere and whether in pools, lakes, oceans or distributed in “moist” soils water moves towards to the moon. The water in the soil and also in the water tables below the soil rise toward the surface every day. When the water rises, it expels the accumulated gasses in the soil into the atmosphere and it’s mostly CO2. It’s a good bet on how leaves developed high populations of stomata on the underside of leaves. As the water relaxes (the tide goes out) it sucks oxygenated air back into the soil to continue the functions of soil life respiration. The soil “breathes” albeit slowly.
The gasses produced by the Forest Walker’s internal combustion engine consist primarily of CO2 and H2O. Combusting sugars produce the same gasses that are needed to construct the sugars because the universe is funny like that. The Forest Walker is constantly laying down these critical construction elements right where the trees need them: close to the ground to be gobbled up by the trees.
# The Branch Drones
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736817903556-YAKIHONNES3.png)
During the last ice age, giant mammals populated North America - forests and otherwise. Mastodons, woolly mammoths, rhinos, short-faced bears, steppe bison, caribou, musk ox, giant beavers, camels, gigantic ground-dwelling sloths, glyptodons, and dire wolves were everywhere. Many were ten to fifteen feet tall. As they crashed through forests, they would effectively cleave off dead side-branches of trees, halting the spread of a ground-based fire migrating into the tree crown ("laddering") which is a death knell for a forest.
These animals are all extinct now and forests no longer have any manner of pruning services. But, if we build drones fitted with cutting implements like saws and loppers, optical cameras and AI trained to discern dead branches from living ones, these drones could effectively take over pruning services by identifying, cutting, and dropping to the forest floor, dead branches. The dropped branches simply get collected by the Forest Walker as part of its continual mission.
The drones dock on the back of the Forest Walker to recharge their batteries when low. The whole scene would look like a grazing cow with some flies bothering it. This activity breaks the link between a relatively cool ground based fire and the tree crowns and is a vital element in forest fire control.
# The Bitcoin Miner
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736817919076-YAKIHONNES3.png)
Mining is one of four monetary incentive models, making this system a possibility for development. The other three are US Dept. of the Interior, township, county, and electrical utility company easement contracts for fuel load management, global carbon credits trading, and data set sales. All the above depends on obvious questions getting answered. I will list some obvious ones, but this is not an engineering document and is not the place for spreadsheets. How much Bitcoin one Forest Walker can mine depends on everything else. What amount of biomass can we process? Will that biomass flow enough Syngas to keep the lights on? Can the chassis support enough mining ASICs and supporting infrastructure? What does that weigh and will it affect field performance? How much power can the AC generator produce?
Other questions that are more philosophical persist. Even if a single Forest Walker can only mine scant amounts of BTC per day, that pales to how much fuel material it can process into biochar. We are talking about millions upon millions of forested acres in need of fuel load management. What can a single Forest Walker do? I am not thinking in singular terms. The Forest Walker must operate as a fleet. What could 50 do? 500?
What is it worth providing a service to the world by managing forest fuel loads? Providing proof of work to the global monetary system? Seeding soil with drought and nutrient resilience by the excretion, over time, of carbon by the ton? What did the last forest fire cost?
# The Mesh Network
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736817962167-YAKIHONNES3.png)
What could be better than one bitcoin mining, carbon sequestering, forest fire squelching, soil amending behemoth? Thousands of them, but then they would need to be able to talk to each other to coordinate position, data handling, etc. Fitted with a mesh networking device, like goTenna or Meshtastic LoRa equipment enables each Forest Walker to communicate with each other.
Now we have an interconnected fleet of Forest Walkers relaying data to each other and more importantly, aggregating all of that to the last link in the chain for uplink. Well, at least Bitcoin mining data. Since block data is lightweight, transmission of these data via mesh networking in fairly close quartered environs is more than doable. So, how does data transmit to the Bitcoin Network? How do the Forest Walkers get the previous block data necessary to execute on mining?
# Back To The Chain
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736817983991-YAKIHONNES3.png)
Getting Bitcoin block data to and from the network is the last puzzle piece. The standing presumption here is that wherever a Forest Walker fleet is operating, it is NOT within cell tower range. We further presume that the nearest Walmart Wi-Fi is hours away. Enter the Blockstream Satellite or something like it.
A separate, ground-based drone will have two jobs: To stay as close to the nearest Forest Walker as it can and to provide an antennae for either terrestrial or orbital data uplink. Bitcoin-centric data is transmitted to the "uplink drone" via the mesh networked transmitters and then sent on to the uplink and the whole flow goes in the opposite direction as well; many to one and one to many.
We cannot transmit data to the Blockstream satellite, and it will be up to Blockstream and companies like it to provide uplink capabilities in the future and I don't doubt they will. Starlink you say? What’s stopping that company from filtering out block data? Nothing because it’s Starlink’s system and they could decide to censor these data. It seems we may have a problem sending and receiving Bitcoin data in back country environs.
But, then again, the utility of this system in staunching the fuel load that creates forest fires is extremely useful around forested communities and many have fiber, Wi-Fi and cell towers. These communities could be a welcoming ground zero for first deployments of the Forest Walker system by the home and business owners seeking fire repression. In the best way, Bitcoin subsidizes the safety of the communities.
# Sensor Packages
### LiDaR
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736818012307-YAKIHONNES3.png)
The benefit of having a Forest Walker fleet strolling through the forest is the never ending opportunity for data gathering. A plethora of deployable sensors gathering hyper-accurate data on everything from temperature to topography is yet another revenue generator. Data is valuable and the Forest Walker could generate data sales to various government entities and private concerns.
LiDaR (Light Detection and Ranging) can map topography, perform biomass assessment, comparative soil erosion analysis, etc. It so happens that the Forest Walker’s ability to “see,” to navigate about its surroundings, is LiDaR driven and since it’s already being used, we can get double duty by harvesting that data for later use. By using a laser to send out light pulses and measuring the time it takes for the reflection of those pulses to return, very detailed data sets incrementally build up. Eventually, as enough data about a certain area becomes available, the data becomes useful and valuable.
Forestry concerns, both private and public, often use LiDaR to build 3D models of tree stands to assess the amount of harvest-able lumber in entire sections of forest. Consulting companies offering these services charge anywhere from several hundred to several thousand dollars per square kilometer for such services. A Forest Walker generating such assessments on the fly while performing its other functions is a multi-disciplinary approach to revenue generation.
### pH, Soil Moisture, and Cation Exchange Sensing
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736818037057-YAKIHONNES3.png)
The Forest Walker is quadrupedal, so there are four contact points to the soil. Why not get a pH data point for every step it takes? We can also gather soil moisture data and cation exchange capacities at unheard of densities because of sampling occurring on the fly during commission of the system’s other duties. No one is going to build a machine to do pH testing of vast tracts of forest soils, but that doesn’t make the data collected from such an endeavor valueless. Since the Forest Walker serves many functions at once, a multitude of data products can add to the return on investment component.
### Weather Data
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736818057965-YAKIHONNES3.png)
Temperature, humidity, pressure, and even data like evapotranspiration gathered at high densities on broad acre scales have untold value and because the sensors are lightweight and don’t require large power budgets, they come along for the ride at little cost. But, just like the old mantra, “gas, grass, or ass, nobody rides for free”, these sensors provide potential revenue benefits just by them being present.
I’ve touched on just a few data genres here. In fact, the question for universities, governmental bodies, and other institutions becomes, “How much will you pay us to attach your sensor payload to the Forest Walker?”
# Noise Suppression
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736818076725-YAKIHONNES3.png)
Only you can prevent Metallica filling the surrounds with 120 dB of sound. Easy enough, just turn the car stereo off. But what of a fleet of 50 Forest Walkers operating in the backcountry or near a township? 500? 5000? Each one has a wood chipper, an internal combustion engine, hydraulic pumps, actuators, and more cooling fans than you can shake a stick at. It’s a walking, screaming fire-breathing dragon operating continuously, day and night, twenty-four hours a day, three hundred sixty-five days a year. The sound will negatively affect all living things and that impacts behaviors. Serious engineering consideration and prowess must deliver a silencing blow to the major issue of noise.
It would be foolish to think that a fleet of Forest Walkers could be silent, but if not a major design consideration, then the entire idea is dead on arrival. Townships would not allow them to operate even if they solved the problem of widespread fuel load and neither would governmental entities, and rightly so. Nothing, not man nor beast, would want to be subjected to an eternal, infernal scream even if it were to end within days as the fleet moved further away after consuming what it could. Noise and heat are the only real pollutants of this system; taking noise seriously from the beginning is paramount.
# Fire Safety
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736818111311-YAKIHONNES3.png)
A “fire-breathing dragon” is not the worst description of the Forest Walker. It eats wood, combusts it at very high temperatures and excretes carbon; and it does so in an extremely flammable environment. Bad mix for one Forest Walker, worse for many. One must take extreme pains to ensure that during normal operation, a Forest Walker could fall over, walk through tinder dry brush, or get pounded into the ground by a meteorite from Krypton and it wouldn’t destroy epic swaths of trees and baby deer. I envision an ultimate test of a prototype to include dowsing it in grain alcohol while it’s wrapped up in toilet paper like a pledge at a fraternity party. If it runs for 72 hours and doesn’t set everything on fire, then maybe outside entities won’t be fearful of something that walks around forests with a constant fire in its belly.
# The Wrap
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/6389be6491e7b693e9f368ece88fcd145f07c068d2c1bbae4247b9b5ef439d32/files/1736818144087-YAKIHONNES3.png)
How we think about what can be done with and adjacent to Bitcoin is at least as important as Bitcoin’s economic standing itself. For those who will tell me that this entire idea is without merit, I say, “OK, fine. You can come up with something, too.” What can we plug Bitcoin into that, like a battery, makes something that does not work, work? That’s the lesson I get from this entire exercise. No one was ever going to hire teams of humans to go out and "clean the forest". There's no money in that. The data collection and sales from such an endeavor might provide revenues over the break-even point but investment demands Alpha in this day and age. But, plug Bitcoin into an almost viable system and, voilà! We tip the scales to achieve lift-off.
Let’s face it, we haven’t scratched the surface of Bitcoin’s forcing function on our minds. Not because it’s Bitcoin, but because of what that invention means. The question that pushes me to approach things this way is, “what can we create that one system’s waste is another system’s feedstock?” The Forest Walker system’s only real waste is the conversion of low entropy energy (wood and syngas) into high entropy energy (heat and noise). All other output is beneficial to humanity.
Bitcoin, I believe, is the first product of a new mode of human imagination. An imagination newly forged over the past few millennia of being lied to, stolen from, distracted and otherwise mis-allocated to a black hole of the nonsensical. We are waking up.
What I have presented is not science fiction. Everything I have described here is well within the realm of possibility. The question is one of viability, at least in terms of the detritus of the old world we find ourselves departing from. This system would take a non-trivial amount of time and resources to develop. I think the system would garner extensive long-term contracts from those who have the most to lose from wildfires, the most to gain from hyperaccurate data sets, and, of course, securing the most precious asset in the world. Many may not see it that way, for they seek Alpha and are therefore blind to other possibilities. Others will see only the possibilities; of thinking in a new way, of looking at things differently, and dreaming of what comes next.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5bdb0e24:0ccbebd7
2025-01-15 15:44:04
I am a huge fan of Flatpak applications on Linux. I like how they work. I like how easy they are to install. I like how you can control their permissions with such granularity. Etc.
Well now, I have yet another reason to love Flatpaks: easy installation reproducibility. Let me show you what I mean.
---
Let's say you have been using Flatpaks for a while, and you have all the apps you could want installed on your system.
Then, for whatever reason, you have to set up an OS on a new machine. For example, it could be that a new version of Ubuntu is about to drop, and you want to install it from scratch on your laptop.
Well, now you can easily install all the Flatpaks that you use and love on that new OS with just a few commands.
First, on your current machine, we want to list out all the installed Flatpaks. But, we don't want to just do it with a `flatpak list`, because that gives us too much information.
All we want right now is a list of the Application IDs. We can do that with the following command:
```
flatpak list --app --columns application
```
Now, this is great, and we can just manually copy and paste this list into a text file if we want.
Instead, what we are going to do is take that output and redirect it to a file with the output redirection operator. We are going to call that output something like "flatpaks.txt" or something else unimportant, because we need to rename the file in the next step.
```
flatpak list --app --columns application > flatpaks.txt
```
Great! Now, we have a text file of every Flatpak we currently have installed on our system. Next, we need to format it, so we can easily input the contents of the text file into the command line for install at a later time.
We can easily format this file appropriately with the next command and output the contents into a new text file. In my experience, if we try to overwrite the contents of the first file, the command won't work. Here's how to do it:
```
cat flatpaks.txt | tr '\n' ' ' | sed 's/ $/\n/' > flatpakinstalls.txt
```
Now, this is technically a few commands, and when broken down they simply say "take this file's contents, replace the new lines with spaces, remove the trailing space at the end of the line, and write this new output to a new file." Regular expressions are wild.
The last thing you'll want to do is delete the original file, since now you have two:
```
rm flatpaks.txt
```
With that, you have a clean text file containing all the Flatpaks installed on your system that you can reference on any other machine. But, we can actually do this a little better.
With all of that out of the way, we can take that three or four-step process and boil it down to one simple copy pasta command thanks to the and operator, `&&`:
```
flatpak list --app --columns application > flatpaks.txt && cat flatpaks.txt | tr '\n' ' ' | sed 's/ $/\n/' > flatpakinstalls.txt && rm flatpaks.txt
```
That's it! Easy as pie.
Just keep this file backed up and safe. Then, after you are done installing your new OS, you'll need to make sure Flatpak is set up and ready by following the official Flatpak documentation.
After that, you can move this text file over to that machine, copy the contents, and paste them after the `flatpak install` command to quickly and effortlessly reproduce the Flatpak setup you had on your old installation.
Hope you find this as helpful as I do.
-
![](/static/nostr-icon-purple-64x64.png)
@ 17538dc2:71ed77c4
2025-01-13 18:17:24
Sci-Hub 2024 year end review is translated to English by Kagi Translate from Russian. Original text can be found in Sci-Hub's telegram channel https://t.me/freescience.
### RESULTS OF 2024
First. The project received donations totaling 2 million dollars in meme coins.
The project is actively used by many students in China, which is why a group of Sci-Hub fans has emerged there. As far as I understand, the organizer of the group is actively interested in the topic of cryptocurrencies (even wrote a book). Somewhere in mid-November, the Chinese launched a meme coin in honor of the Sci-Hub project. At its peak, the coin's price reached 5 cents, and now it is somewhere around 1-2 cents. This means that the exchange rate of the Sci-Hub cryptocurrency is now almost equal to the ruble exchange rate (100 to one or so).
In general, I converted part of these donations into normal, traditional cryptocurrency (like Bitcoin) and paid for servers several months in advance. The other part is still sitting in meme coins—I hope that the token will still grow in price (there is a promotion plan). Of course, this is risky, but Sci-Hub is a project that is not afraid of risk. Therefore, anyone who wants to invest in Sci-Hub by purchasing this token can do so here: www.coingecko.com/en/coins/sci-hub
Second. A dissertation on the topic of open scientific knowledge has been defended at the Institute of Philosophy.
For those interested in the history and philosophy of science, I defended a dissertation in April at the Institute of Philosophy on the topic that scientific knowledge should be open (otherwise, it is strange to call it scientific at all). The work shows that open communication is one of the basic traditional values of science when considering science as a social institution. In other words, journals that charge for access to scientific articles are a kind of 'non-traditional orientation journals.'
Moreover, openness is an important prerequisite for rationality. Rationality is not limited to the criterion of falsification (hello Popper); it is a much more complex concept.
You can familiarize yourself with the text of the dissertation here: web.archive.org/web/20240425100014/https://iphras.ru/page26414303.htm (I provide the link through the web archive because the Institute's website, strangely enough, is glitching again at the time of writing this post).
All criticism and comments (as well as praise) regarding the dissertation can be sent to my email.
Third. Work has begun on a new declaration of open access to scientific knowledge.
Currently, all discussions on the topic of open science are conducted within the frameworks defined by the so-called BBB declarations back in 2001-2003. Within these frameworks, two main types of open access are recognized: gold, meaning open journals with an author-pays model, and green, which refers to repositories like the well-known arXiv. We can also add the so-called diamond open access, which includes open journals that are free for both authors and readers.
However, since 2003, internet technologies have advanced significantly. Today, we can already talk about such types of open access as blue (through academic social networks) or red (your beloved Sci-Hub). It is time to adopt a new declaration of open access to scientific knowledge that corresponds to the current state of scientific and technological progress.
A preliminary version of the declaration can be read and signed here: open.science.do
We will be more actively engaged in this in the coming year. Signing the declaration is an important step towards recognizing access to scientific knowledge through sites like Sci-Hub or Libgen as completely legal and ceasing to pursue them—first in the former USSR, and then in all countries of the world.
Fourth. In 2024, about one billion articles were downloaded through Sci-Hub. Despite the fact that this is unfiltered statistics, the fact remains: the popularity of the project has not decreased but only grown, despite the fact that Sci-Hub has not been updated for quite a long time. Of course, this does not mean that the site will not be updated at all now—just that the patient is more alive than dead (no matter how much some haters might wish otherwise).
The cause of open access to scientific knowledge will definitely prevail—because good always triumphs over evil.
In the new year, I wish all scientists new discoveries and large grants. Happy New Year, comrades!
-
![](/static/nostr-icon-purple-64x64.png)
@ 5bdb0e24:0ccbebd7
2025-01-15 15:29:59
In infosec, there is a seemingly never ending list of acronyms any cyber professional must be familiar with in order to work efficiently and effectively. One of those is a common vulnerability known as IDOR.
IDOR stands for Insecure Direct Object Reference, and it's a type of vulnerability that can have serious implications for the security of web applications if not properly addressed. But what is it exactly?
## What is IDOR?
---
IDOR is a security vulnerability that occurs when an application exposes internal implementation objects to users without proper authorization checks. In simpler terms, it means that an attacker can manipulate parameters in the application's URL or form fields to access unauthorized data or functionality.
Ok, that's a mouthful, so let's break it down further.
## How Does IDOR Work?
---
To understand how IDOR works, consider a scenario where a web application reveals information about what you're accessing or viewing via the URL. For example, a user profile page may have a URL like the following: `https://example.com/profile?id=123`.
In a secure application, the server would verify that the user has the necessary permissions to access the profile with ID 123. However, in the case of an IDOR vulnerability, an attacker could change the ID parameter in the URL to something like `https://example.com/profile?id=456` to access a different user's profile, potentially exposing sensitive customer information.
The consequences of an IDOR vulnerability go beyond unauthorized access to customer information as well. Attackers could gain access to other sensitive data, such as financial records, administrative functions, or other business related data. This can lead to data breaches, privacy violations, and reputational damage to the organization.
## Preventing IDOR Attacks
---
Preventing IDOR attacks requires a proactive approach to security. Here are some basic best practices to mitigate theses attacks:
1. Implement Proper Access Controls: Ensure that all user requests are properly authenticated and authorized before granting access to resources.
2. Use Indirect Object References: Instead of exposing internal object references directly in URLs, use indirect references that are mapped to internal objects on the server side.
3. Validate User Input: Sanitize and validate all user input to prevent malicious manipulation of parameters.
4. Employ Role-Based Access Control: Implement role-based access control to restrict users' access to only the resources they are authorized to view or modify.
5. Regular Security Audits: Conduct regular security audits and penetration testing to identify and remediate potential IDOR vulnerabilities.
IDOR is a critical security issue that requires proactive measures to mitigate. By understanding how IDOR works and implementing various security controls, organizations can safeguard their web applications against potential threats and ensure the confidentiality, integrity, and availability of their data.
-
![](/static/nostr-icon-purple-64x64.png)
@ df173277:4ec96708
2025-01-09 17:02:52
> OpenSecret is a backend for app developers that turns private encryption on by default. When sensitive data is readable only by the user, it protects both the user and the developer, creating a more free and open internet. We'll be launching in 2025. [Join our waitlist to get early access.](https://opensecret.cloud)
In today's digital age, personal data is both an asset and a liability. With the rise of data breaches and cyber attacks, individuals and companies struggle to protect sensitive information. The consequences of a data breach can be devastating, resulting in financial losses, reputational damage, and compromised user trust. In 2023, the average data breach cost was $5 million, with some resulting in losses of over $1 billion.
![](https://blog.opensecret.cloud/content/images/2024/11/image-3-1-1-1.png)Meanwhile, individuals face problems related to identity theft, personal safety, and public embarrassment. Think about the apps on your phone, even the one you're using to read this. How much data have you trusted to other people, and how would it feel if that data were leaked online?
Thankfully, some incredibly talented cypherpunks years ago gave the world cryptography. We can encrypt data, rendering it a secret between two people. So why then do we have data breaches?
> Cryptography at scale is hard.
#### The Cloud
The cloud has revolutionized how we store and process data, but it has limitations. While cloud providers offer encryption, it mainly protects data in transit. Once data is stored in the cloud, it's often encrypted with a shared key, which can be accessed by employees, third-party vendors, or compromised by hackers.
The solution is to generate a personal encryption password for each user, make sure they write it down, and, most importantly, hope they don't lose it. If the password is lost, the data is forever unreadable. That can be overwhelming, leading to low app usage.
> Private key encryption needs a UX upgrade.
## Enter OpenSecret
OpenSecret is a developer platform that enables encryption by default. Our platform provides a suite of security tools for app developers, including private key management, encrypted sync, private AI, and confidential compute.
Every user has a private vault for their data, which means only they can read it. Developers are free to store less sensitive data in a shared manner because there is still a need to aggregate data across the system.
![](https://blog.opensecret.cloud/content/images/2024/11/opensecret-four-pillars-features.png)
### Private Key Management
Private key management is the superpower that enables personal encryption per user. When each user has a unique private key, their data can be truly private. Typically, using a private key is a challenging experience for the user because they must write down a long autogenerated number or phrase of 12-24 words. If they lose it, their data is gone.
OpenSecret uses secure enclaves to make private keys as easy as an everyday login experience that users are familiar with. Instead of managing a complicated key, the user logs in with an email address or a social media account.
The developer doesn't have to manage private keys and can focus on the app's user experience. The user doesn't have to worry about losing a private key and can jump into using your app.
![](https://blog.opensecret.cloud/content/images/2024/11/login-1.png)
### Encrypted Sync
With user keys safely managed, we can synchronize user data to every device while maintaining privacy. The user does not need to do complicated things like scanning QR codes from one device to the next. Just log in and go.
The user wins because the data is available on all their devices. The developer wins because only the user can read the data, so it isn't a liability to them.
### Private AI
Artificial intelligence is here and making its way into everything. The true power of AI is unleashed when it can act on personal and company data. The current options are to run your own AI locally on an underpowered machine or to trust a third party with your data, hoping they don't read it or use it for anything.
OpenSecret combines the power of cloud computing with the privacy and security of a machine running on your desk.
**Check out Maple AI**\
Try private AI for yourself! We built an app built with this service called [Maple AI](https://trymaple.ai). It is an AI chat that is 100% private in a verifiable manner. Give it your innermost thoughts or embarrassing ideas; we can't judge you. We built Maple using OpenSecret, which means you have a private key that is automatically managed for you, and your chat history is synchronized to all your devices. [Learn more about Maple AI - Private chat in the announcement post.](https://blog.opensecret.cloud/maple-ai-private-encrypted-chat/)
![](https://blog.opensecret.cloud/content/images/2024/11/maple-ai-4.png)
### Confidential Compute
Confidential computing is a game-changer for data security. It's like the secure hardware that powers Apple Pay and Google Pay on your phone but in the cloud. Users can verify through a process called attestation that their data is handled appropriately. OpenSecret can help you run your own custom app backend code that would benefit from the security of an enclave.
It's the new version of that lock on your web browser. When you see it, you know you're secure.
![](https://blog.opensecret.cloud/content/images/2024/11/verified.png)
#### **But do we want our secrets to be open?**
OpenSecret renders a data breach practically useless. If hackers get into the backend, they enter a virtual hallway of locked private vaults. The leaked data would be gibberish, a secret in the open that is unreadable.
On the topic of openness, OpenSecret uses the power of open source to enable trust in the service. We publish our code in the open, and, using attestation, anyone can verify that private data is being handled as expected. This openness also provides developers with a backup option to safely and securely export their data.
> Don't trust, verify.
### **Join the Movement**
We're currently building out OpenSecret, and we invite you to join us on the journey. Our platform can work with your existing stack, and you can pick and choose the features you need. If you want to build apps with encryption enabled, [send us a message to get early access.](https://opensecret.cloud)
Users and companies deserve better encryption and privacy.\
Together, let's make that a reality.
[![Get Early Access](https://blog.opensecret.cloud/content/images/2024/11/get-early-access-3.png)](https://opensecret.cloud)
-
![](/static/nostr-icon-purple-64x64.png)
@ 5bdb0e24:0ccbebd7
2025-01-15 15:22:03
In cybersecurity, there is a buzzword I've seen some confusion about online recently. It's called zero trust, and though it sounds like vague corporate-ese at first, it actually represents a necessary approach to digital security.
Cyber threats are constantly evolving, and IT professionals need to be prepared for the worst at all times. Zero trust is a valid part of defense in depth and the principle of least privilege within a network or series of networks. But what exactly does that mean?
Well, historically, cyber professionals relied on perimeter defenses like firewalls to determine trust, assuming that everything inside the network was trustworthy. Zero trust challenges this notion by requiring strict identity verification for every user and device trying to access resources, regardless of their location.
You'll often hear the term "never trust, always verify" when talking about zero trust. Practically, this means that every user and device must authenticate their identity before accessing the resources on the network, ensuring that only authorized individuals can access sensitive data.
It also means users are granted the minimum level of access required to perform their tasks (the principle of least privilege I mentioned a second ago). This not only limits the potential damage that can be caused in case of a security breach, but it impedes insider threats from doing even more damage than would be possible otherwise.
Zero trust also makes it harder for attackers to move laterally within a network by implementing network segmentation. This divides larger networks up into smaller pieces, isolating each segment, and protecting them from threats in other segments.
Effectively implementing these steps is not a set it and forget it kind of thing either. Zero trust requires continuous monitoring of user and device behavior to detect anomalies or suspicious activities that may indicate security threats. Proper implementation takes the "never trust" part to the extreme.
In other words, zero trust means that organizations don't blindly trust their employees and internal networks. Threats can come from anywhere, including within, and implementing various controls to mitigate these risks can significantly enhance an organization's security posture and enable them to better protect all constituents involved.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5bdb0e24:0ccbebd7
2025-01-15 15:11:28
The internet is a dangerous place, full of vulnerabilities attackers leverage to malicious ends. One of the more common vulnerabilities that websites face is cross-site scripting (XSS) attacks. XSS attacks can have serious consequences, ranging from stealing sensitive information to defacing websites. Without wasting any time, let's jump into what XSS is, how it works, and how to mitigate it on your websites.
## What is Cross-Site Scripting (XSS)?
---
XSS is a type of injection security vulnerability typically found in web applications, and it exploits the trust users have in websites. It occurs when an attacker injects malicious scripts into web pages via input fields, URLs, or even cookies.
When a user visits a compromised page, the injected script is executed in the user's browser, allowing the attacker to carry out various malicious activities. This works because the scripts are assumed to have come from a trusted source. When executed, they can steal sensitive information, hijack user sessions, or deface the website.
## Types of XSS Attacks
---
There are three types of XSS:
1. **Stored XSS**: The malicious script is stored on the server and executed whenever a user accesses the compromised page.
2. **Reflected XSS**: The malicious script is reflected off a web server and executed in the user's browser.
3. **DOM-based XSS**: The attack occurs in the Document Object Model (DOM) of the web page, allowing the attacker to manipulate the page's content.
## Preventing XSS Attacks
---
There are several ways to mitigate XSS, some examples include the following:
1. **Input Validation**: Validate and sanitize all user input to prevent the injection of malicious scripts.
2. **Output Encoding**: Encode user input before displaying it on the web page to prevent script execution.
3. **Content Security Policy (CSP)**: Implement a CSP to restrict the sources from which scripts can be loaded on your website.
4. **Use HTTPS**: Ensure that your website uses HTTPS to encrypt data transmitted between the server and the user's browser.
## Conclusion
---
Cross-site scripting attacks pose a significant threat to web security. By understanding how XSS works and implementing best practices to prevent such attacks, you can safeguard your website and protect your users' sensitive information. Stay vigilant, stay informed, and stay secure in the ever-evolving landscape of web security.
-
![](/static/nostr-icon-purple-64x64.png)
@ f88e6629:e5254dd5
2025-01-08 20:08:17
- Send a transaction, and the recipient uses the coin for another payment. You then merge these two transactions together and save on fees. 🔥
![Transaction merge](https://github.com/user-attachments/assets/c113b688-d144-4f6f-9986-c7873656ba4f)
If you have a Trezor, you can try this out on: https://coiner-mu.vercel.app/
_But be cautious. This is a hobby project without any guarantee._
<img width="1772" alt="Screenshot 2025-01-08 at 20 14 17" src="https://github.com/user-attachments/assets/36412edb-9c62-4c5f-8f82-b41c118a3aa6" />
## How does it work?
1. Connect Trezor, enter the passphrase, and select an account.
2. The application display your coins, pending transactions, and descendant transactions.
4. Then app shows you how much you can save by merging all transactions and removing duplicate information.
5. Finally, you can sign and broadcast this more efficient transaction
-
![](/static/nostr-icon-purple-64x64.png)
@ 2e8970de:63345c7a
2025-01-15 15:10:45
![](https://pbs.twimg.com/media/GhV0qZLX0AA6uwb?format=png&name=900x900)
https://www.pewresearch.org/short-reads/2025/01/08/share-of-us-adults-living-without-a-romantic-partner-has-ticked-down-in-recent-years/
> he share of U.S. adults who are not living with a spouse or partner has modestly declined since 2019. In 2023, 42% of adults were unpartnered, down from 44% in 2019, according to a new Pew Research Center analysis of Census Bureau data.
> However, certain demographic groups are more likely than others to be unpartnered, as of 2023
originally posted at https://stacker.news/items/851235
-
![](/static/nostr-icon-purple-64x64.png)
@ 23b0e2f8:d8af76fc
2025-01-08 18:17:52
## **Necessário**
- Um Android que você não use mais (a câmera deve estar funcionando).
- Um cartão microSD (opcional, usado apenas uma vez).
- Um dispositivo para acompanhar seus fundos (provavelmente você já tem um).
## **Algumas coisas que você precisa saber**
- O dispositivo servirá como um assinador. Qualquer movimentação só será efetuada após ser assinada por ele.
- O cartão microSD será usado para transferir o APK do Electrum e garantir que o aparelho não terá contato com outras fontes de dados externas após sua formatação. Contudo, é possível usar um cabo USB para o mesmo propósito.
- A ideia é deixar sua chave privada em um dispositivo offline, que ficará desligado em 99% do tempo. Você poderá acompanhar seus fundos em outro dispositivo conectado à internet, como seu celular ou computador pessoal.
---
## **O tutorial será dividido em dois módulos:**
- Módulo 1 - Criando uma carteira fria/assinador.
- Módulo 2 - Configurando um dispositivo para visualizar seus fundos e assinando transações com o assinador.
---
## **No final, teremos:**
- Uma carteira fria que também servirá como assinador.
- Um dispositivo para acompanhar os fundos da carteira.
![Conteúdo final](https://i.imgur.com/7ktryvP.png)
---
## **Módulo 1 - Criando uma carteira fria/assinador**
1. Baixe o APK do Electrum na aba de **downloads** em <https://electrum.org/>. Fique à vontade para [verificar as assinaturas](https://electrum.readthedocs.io/en/latest/gpg-check.html) do software, garantindo sua autenticidade.
2. Formate o cartão microSD e coloque o APK do Electrum nele. Caso não tenha um cartão microSD, pule este passo.
![Formatação](https://i.imgur.com/n5LN67e.png)
3. Retire os chips e acessórios do aparelho que será usado como assinador, formate-o e aguarde a inicialização.
![Formatação](https://i.imgur.com/yalfte6.png)
4. Durante a inicialização, pule a etapa de conexão ao Wi-Fi e rejeite todas as solicitações de conexão. Após isso, você pode desinstalar aplicativos desnecessários, pois precisará apenas do Electrum. Certifique-se de que Wi-Fi, Bluetooth e dados móveis estejam desligados. Você também pode ativar o **modo avião**.\
*(Curiosidade: algumas pessoas optam por abrir o aparelho e danificar a antena do Wi-Fi/Bluetooth, impossibilitando essas funcionalidades.)*
![Modo avião](https://i.imgur.com/mQw0atg.png)
5. Insira o cartão microSD com o APK do Electrum no dispositivo e instale-o. Será necessário permitir instalações de fontes não oficiais.
![Instalação](https://i.imgur.com/brZHnYr.png)
6. No Electrum, crie uma carteira padrão e gere suas palavras-chave (seed). Anote-as em um local seguro. Caso algo aconteça com seu assinador, essas palavras permitirão o acesso aos seus fundos novamente. *(Aqui entra seu método pessoal de backup.)*
![Palavras-chave](https://i.imgur.com/hS4YQ8d.png)
---
## **Módulo 2 - Configurando um dispositivo para visualizar seus fundos e assinando transações com o assinador.**
1. Criar uma carteira **somente leitura** em outro dispositivo, como seu celular ou computador pessoal, é uma etapa bastante simples. Para este tutorial, usaremos outro smartphone Android com Electrum. Instale o Electrum a partir da aba de downloads em <https://electrum.org/> ou da própria Play Store. *(ATENÇÃO: O Electrum não existe oficialmente para iPhone. Desconfie se encontrar algum.)*
2. Após instalar o Electrum, crie uma carteira padrão, mas desta vez escolha a opção **Usar uma chave mestra**.
![Chave mestra](https://i.imgur.com/x5WpHpn.png)
3. Agora, no assinador que criamos no primeiro módulo, exporte sua chave pública: vá em **Carteira > Detalhes da carteira > Compartilhar chave mestra pública**.
![Exportação](https://i.imgur.com/YrYlL2p.png)
4. Escaneie o QR gerado da chave pública com o dispositivo de consulta. Assim, ele poderá acompanhar seus fundos, mas sem permissão para movimentá-los.
5. Para receber fundos, envie Bitcoin para um dos endereços gerados pela sua carteira: **Carteira > Addresses/Coins**.
6. Para movimentar fundos, crie uma transação no dispositivo de consulta. Como ele não possui a chave privada, será necessário assiná-la com o dispositivo assinador.
![Transação não assinada](https://i.imgur.com/MxhQZZx.jpeg)
7. No assinador, escaneie a transação não assinada, confirme os detalhes, assine e compartilhe. Será gerado outro QR, desta vez com a transação já assinada.
![Assinando](https://i.imgur.com/vNGtvGC.png)
8. No dispositivo de consulta, escaneie o QR da transação assinada e transmita-a para a rede.
---
## **Conclusão**
**Pontos positivos do setup:**
- **Simplicidade:** Basta um dispositivo Android antigo.
- **Flexibilidade:** Funciona como uma ótima carteira fria, ideal para holders.
**Pontos negativos do setup:**
- **Padronização:** Não utiliza seeds no padrão BIP-39, você sempre precisará usar o electrum.
- **Interface:** A aparência do Electrum pode parecer antiquada para alguns usuários.
Nesse ponto, temos uma carteira fria que também serve para assinar transações. O fluxo de assinar uma transação se torna: ***Gerar uma transação não assinada > Escanear o QR da transação não assinada > Conferir e assinar essa transação com o assinador > Gerar QR da transação assinada > Escanear a transação assinada com qualquer outro dispositivo que possa transmiti-la para a rede.***
Como alguns devem saber, uma transação assinada de Bitcoin é praticamente impossível de ser fraudada. Em um cenário catastrófico, você pode mesmo que sem internet, repassar essa transação assinada para alguém que tenha acesso à rede por qualquer meio de comunicação. Mesmo que não queiramos que isso aconteça um dia, esse setup acaba por tornar essa prática possível.
---
-
![](/static/nostr-icon-purple-64x64.png)
@ 5bdb0e24:0ccbebd7
2025-01-15 14:58:45
In the ever-evolving world of cybersecurity, understanding the various vulnerabilities that can be exploited by attackers is crucial for maintaining robust defenses. One such vulnerability that poses a significant risk is Local File Inclusion (LFI). This blog post aims to demystify LFI, explaining what it is, how it can be exploited, and what measures can be taken to prevent it.
## What is Local File Inclusion (LFI)?
---
Local File Inclusion is a type of web application vulnerability that allows an attacker to access files from the server where the application is hosted. This can be achieved by exploiting poorly written code in the web application that processes user input. Essentially, if an application allows users to specify a file to be included, and it doesn't properly sanitize the input, attackers can manipulate this input to include arbitrary files from the server.
LFI vulnerabilities often arise in applications that use scripts like PHP, where the `include`, `require`, `include_once`, and `require_once` functions are used to include files dynamically. When these functions are used improperly, they can become a gateway for attackers.
## How Does LFI Work?
---
To understand how LFI works, let's consider a simple example. Here we see a PHP script that uses user input to include different page templates:
```php
<?php
$page = $_GET['page'];
include("pages/" . $page . ".php");
?>
```
If the application fails to properly validate the `page` parameter from user input, an attacker could manipulate it by inserting paths that lead to unintended files:
```
http://example.com/index.php?page=../../etc/passwd
```
In this scenario, if not properly secured, the attacker could potentially read sensitive system files like `/etc/passwd` on Unix-based systems.
## Impacts of LFI Vulnerabilities
---
LFI vulnerabilities can have severe consequences, including but not limited to the following:
1\. **Information Disclosure**: Attackers can gain access to sensitive files, such as configuration files, passwords, and application source code.\
2. **Remote Code Execution**: In some cases, attackers can leverage LFI to execute arbitrary code on the server, especially if they can upload malicious files to the server.\
3. **Access to Internal Systems**: Attackers may use LFI to pivot and access other systems within the network, potentially leading to broader compromises.
## Preventing LFI Vulnerabilities
---
Preventing LFI vulnerabilities requires a combination of secure coding practices and proper input validation. Here are some key measures to take:
1\. **Input Validation**: Always validate and sanitize user inputs. Ensure that the input corresponds to the expected format and type, and reject any suspicious or malformed input.\
\
2. **Whitelist Files**: Instead of allowing arbitrary file inclusion, use a whitelist of allowable files that can be included. This restricts the files that can be included to a predefined set.\
\
3. **Avoid User-Controlled File Paths**: Where possible, avoid using user input directly in file paths. If it is necessary, use predefined directories and filenames.\
\
4. **Use Built-In Functions**: Utilize built-in functions and libraries that handle file inclusions more securely. For example, PHP’s `filter_input()` can help sanitize input data.\
\
5. **Principle of Least Privilege**: Ensure that the web server and application run with the least privileges necessary, minimizing the impact of a potential compromise.\
\
6. **Security Testing**: Regularly conduct security testing, including code reviews and penetration testing, to identify and fix vulnerabilities.
## Conclusion
---
Local File Inclusion is a potent vulnerability that can lead to significant security breaches if left unchecked. By understanding how LFI works and implementing robust security measures, developers and administrators can protect their applications from being exploited.
Ensuring that user inputs are properly validated and sanitized, using whitelists, and adhering to the principle of least privilege are fundamental steps in safeguarding against LFI attacks. Regular security assessments and staying informed about the latest security practices will further bolster defenses against this and other vulnerabilities.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5af07946:98fca8c4
2025-01-15 14:46:36
A river must have two banks. A day has no meaning without a night. Even a narrative manifests amidst the story of a hero and a villain. Science is the study of the dualities - to put them to a greater use. Every time we get a better appreciation of a duality, we expound a new branch of science. For example Chemistry is built on the idea of "charge" duality. Particle physics is an outcome of magnetic duality (also called spin). The digital duality (0 and 1) is the basis for the computer science. Not only proven science, every thought has a dualistic outlook - a yes or a no - to be or not to be!
Our own anatomy is a mirror image as if two halves are sealed together - one on left and another on the right - two hands, two legs, two ears. Even the brains are split into left and right lobes. Leonardo da Vinci was trying to find the code of life in the parity symmetry of the Vitruvian Man. The physical duality of our anatomy led to most discoveries in ancient medicine of Suśruta and Charka - long before Leonardo. It is believed they were looking for a singularity amidst the duality of every other aspect of human body - an island in the river of life. And since they found only one heart in every mammal, they assumed god must live on this island.
In Vedic science , the study of dualities is known as Dwait. On the other hand, Vaidik philosophy believes the observer that sits amidst dualities is same across all of them - a singular observer - Adwait - an island between two banks of a river. The island underscores the nature, shape and the existence of that "perpetual" that dualities bind for conscious[^consciousness] experience? That Avykta (inexpressible knowledge) that dualities bind, is known as Tattva[^Tattva]. It binds itself into the knots (of evolving dualities) to gain answer to just one question - who am I? What is my own true shape (Swa-roopa). If one could know the answer to this question, dualities automatically shatter. They vanish because they are rendered unnecessary!
[^consciousness]: Conscious experience: is summation of Dwait and Adwait. In our geometric perception, it is easier to visualize a duality as a dimension - a one-dimensional line that goes from the object to its mirror image. The images may be merged in each other - as in case of atomic particles; or at perceived distances as in case of our reflection in a mirror. The important thing, however, is the one that sits at the surface of the mirror - in the middle - to see two images - one on the left and another on the right - one up and another down and infinite other angles. Millions of dimensions may intersect at this focal point. More intersections - greater the resolution of perception -> higher degree of conscious experience. A computer is lower in consciousness because it has only one dimension to resolve - from digital zero to a digital one. In Vaidik Science, the fifty significant traits (Vritties) are considered the prime dimensions of human experience measured through five senses. If digital duality enabled experiences such as internet, it is not hard to imagine how evolved conscious experience could be based on five senses playing with fifty traits. Yes, it can render the experience of our physical world, the seasons, the green expanses, rivers, buildings, gadgets - but that is only a fraction of what we are capable of. There are infinitely many more experiences that lie hidden in the realm of emotions. Yet senses only observe the chiral imagery. They find it hard to navigate the emotions, besides being grossly unaware of the observer that sits amidst this chaos. What is it that creates this beautiful tapestry? - sometimes layered over each other's like an onion; and other times existing on the same plane of conscious experience, and who is the observer? What is that "one" that sits within inseparable dipoles of a magnet? What exactly is that "unseen" that runs between an anode and a cathode ? Spirituality (Nyaan), is the careful study of that "one" staying put amidst the dualities always shuttling like a ping pong ball. Can it ever get to the rest? Or the idea of conscious life is to merely lock this incessant rhythm ? If so, to what avail?
[^Tattva]: Tattva: This "one", as per practitioners of spirituality, is the only real "element" - Tattva - the most elementary particle. Rest everything is just an expression of Tattva on account of complex wrinkles of dualities folded unto themselves. Tattva is neither unconscious or conscious. Consciousness is improvement in our sensory apparatus to approach this "one". The very reason of manifestation is to know, to understand what is there? Since it is the study of the "one", there are obviously no branches of "Spirituality". It is simply knowing "who am I?". The difference if at all, exists in the path to ascertain this truth. There are many possible paths. Some harder, some smarter - but the end goal is same - who am I? Tattva exists before the physical perception is born; and even after the cession the physical experience. For example, the written and the spoken are two reflections of the same word - they both carry the same meaning. Though a "word" has no physical existence unless it is spoken or written down, yet we know what a "word" means even before we say it or write it. In fact, we can't give a word a physical expression unless we already know the meaning. In essence, we understand the "knowledge" that a word captures irrespective of its physical manifestation. Thus, "knowledge" is the closest to describe that unseen in this physical world. Likewise, all dualities are reflections of a "single truth" hidden from sensory observations. It exists unattached, and yet it remains inseparable from the multitude of dualities it reflects ! For lack of a better word, Vedic Science uses the term Atma for it - it literally means "me". In mathematics, the word for this one is numeral "One" - yes, we call it "unity"! Unity is part of every number, every measurement, yet no one knows the shape of a unit - when measuring distance, this one is a meter, when measuring weight it becomes a kilo - it stays put in every measure, yet it stays indeterminate. You can say one cow, or one bird, and you know what they mean but no one knows what "one" stands for on its own! It is embedded in every number, every artifact and every observation. Many people try to explain Atma as "Energy" or "Electricity". Since it is hard to explain Atma with physical metaphors, I tend to use the word "knowledge". Partly because Energy is tied to physical matter and Electricity is limited to the motion of electrons. More importantly they have strict scientific definitions somewhat hindering the introduction of alternative approaches. That said, the choices are endless, and they are all valid based on the context. Similarly, the dualities are described differently based on the contexts. One may see the knots of dualities as the motherly cradle of manifestation - others may see them as a root cause of pain and confusion. But none may doubt their multidimensional omnipresence. In particle physics, duality is called "Parity Symmetry", In Vedic science, the faction that upholds "duality" as the only truth is known as Dwait - dualism. Dwait believes the "manifested" is nothing but the complex knots of many dualities in many dimensions. The "creation" is infinite manifestations of these knots (Karma Bandhana). It, thus, says that the liberation is all about gradual untying of these knots. The process of untying the knots of duality is called Karm-kshya - sacrificing the Karmas (that led to these knots in the first place) i.e. renunciation - weeding out dualities! It does agree that in this physical world, it is not possible to untie all the knots for human body too is a complex assimilation of uncountable knots, yet it asserts that as soon as our net "knot formation" gets negative - means we break more bonds than we create - the journey becomes a "hope of freedom". After initial jitters, the path becomes pleasurable though it appears insanely difficult (as well as counterintuitive) to the external world. For example, a person on the path of "minimalism" is naturally happy because she has found the taste of freedom - at the same time her network appreciates her for her sacrifices; often times wondering how she lives on so less ! As per Dvaita, the final freedom with exit from the physical world is thus the only objective goal - It is called Nirvana. Thus, there is no God, no observer. But it fails to answer what is it that we are trying to free up? What is the state of being in Nirvana? If Nirvana is all about giving up this beautiful experience, then Nirvana must be a very boring place! Adwait thus is the unyielding faith in singular underlying field, and a conscious ignorance of dualities as mere emergent sensory distractions. The singular truth is the thing that manifests amidst innumerable knotted dualities. Unlike the ideas of Quantum Mechanics, the "manifest" is neither a "given" nor an accident - it takes repetitive actions (Karma) to unveil one observable "truth". An "island" is thus the truth of a river's labour as much as a narrative is a writer's vociferous flow over dualities of the plot. This process of manifestation and its continuous evolution, as per Adwait, is Yazna - the modus operandi of Vishnu. And the consciousness that evolves (to seek the answer to the profound question) is Vishnu itself. The Sanskrit word Vishnu has two syllables - Vish comes from Vishisht, which means special and Anu means the smallest indestructible particle - special because it sits amidst all dualities and strives for continuous evolution of conscious experience to resolve the dualities. To an untrained eye - Dwait and Adwait may appear as the sides of the same coin, but there is vast difference in constructs that follow. Dwait seeks renunciation whereas Adwait celebrates the life, and it's growth. Vaidik approach thus is NOT to run away; it is to continuously struggle and fight to seek the ultimate object.
-
![](/static/nostr-icon-purple-64x64.png)
@ 0861144c:e68a1caf
2025-01-15 13:16:46
When I started using Bitcoin back in 2014, the first thing I wanted to do was start programming. Having no prior background in this, I chose [freeCodeCamp](https://freecodecamp.org/) as my development tool, and when I began writing my first lines of JavaScript, I realized it was much deeper than I cared to admit.
**My dream was to work directly with Bitcoin.**.
That didn’t stop me from pursuing my goals. While discipline wasn’t my ally at the time, research was my main weapon. I discovered [the free self-paced courses from Chaincode Labs](https://chaincode.gitbook.io/seminars), which provide all the necessary tools to get started as a Bitcoin or Lightning Network developer.
I also gave up on those along the way, but this time it was because they required much more than I had imagined—a radical shift in how I approached things and, above all, something I wasn’t ready to commit to at the time: discipline and dedication. When I was on the verge of throwing in the towel, putting everything I knew about Bitcoin into the "freezer," I had a revealing conversation with a friend who remains anonymous to this day. It was during the pandemic, on one of those calls, that the conversation took a significant turn.
*"I just want to work with Bitcoin and get paid in Bitcoin. I swear, I’ve looked everywhere and can’t find a way to connect with anything,"* I told him, to which there was a pause before he replied:
*"You’re already working with Bitcoin. What more are you looking for?"*
I couldn’t grasp what he meant and asked for a more detailed explanation.
*"Look,"* he said, *"you’re trying to publish a book for free, but people often send you money or cryptos that you convert to Bitcoin."* I nodded in agreement.
*"Then what you’re doing is working and buying Bitcoin. Think about it: what you’re doing takes time—your work, I mean. Your work takes time, and your time is valued in Guaraníes. You’ve told me a thousand times how the Guaraní loses value and that you don’t want to save in Guaraníes anymore. So, you turn to Bitcoin. What you’re really doing is buying Bitcoin to protect your work because, as things stand, it seems like we won’t be retiring anytime soon. Instead of letting your savings melt away, you’ve decided to work and convert it into Bitcoin, which, according to you, is the hardest currency with the least depreciation. Can you see how you’re already accepting Bitcoin? You’re already working with Bitcoin, even if your job pays you in Guaraníes."*
#### My aha moment
I was stunned. It was one of those _aha_ moments where you don’t even know how to explain what you’re doing until someone else spells it out perfectly. His explanation was so spot-on that it was almost scary. I realized that my quest shouldn’t be about finding a way to fit into the gears of Bitcoin core programming. That doesn’t mean I’ve given up on the hope of programming someday; it just means it’s currently on pause.
It also means that, just like me, you have skills—soft or hard—that are valued in money. That money can be converted into Bitcoin, and without even realizing it, without intending to, you’re already participating in the Bitcoin ecosystem, protecting your money from inflation.
My first message of the year, dear reader, is this: use Bitcoin without resorting to tricks or learning new skills. Instead, do what you’re best at today and convert a small fraction into satoshis.
Does it work? Yes.
Will it make you a millionaire? No.
Will you be better off? Much better.
Since you're read it all, [take this meme](https://primal.net/e/note13fe8ymwu89qymnme3mmppulq82nly6uq2pufwx8uazcjznejsmvqzkkwur):
![](https://m.stacker.news/73089)
originally posted at https://stacker.news/items/851104
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:43:52
Book **[Tirupati to Tiruvannamalai cab](https://cabbazar.com/taxi/cab/tirupati-to-tiruvannamalai)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:42:14
Book **[Mumbai to Nagpur cab](https://cabbazar.com/taxi/cab/mumbai-to-nagpur)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:41:58
Book **[Kaithal to Delhi cab](https://cabbazar.com/taxi/cab/kaithal-to-delhi)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:41:40
Book **[Hisar to Delhi cab](https://cabbazar.com/taxi/hisar-to-delhi)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:41:25
Book **[Delhi to Hisar cab](https://cabbazar.com/taxi/delhi-to-hisar)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:32:54
Book **[Pune to Allahabad cab](https://cabbazar.com/taxi/cab/pune-to-allahabad)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:32:38
Hire **[taxi in Rishikesh](https://cabbazar.com/city/rishikesh)** at best price. Book local and outstation cab in Nagpur. Confirmed cab, Real time driver details. Price starts ₹1900
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:32:20
Hire **[taxi in Nagpur](https://cabbazar.com/city/nagpur)** at best price. Book local and outstation cab in Nagpur. Confirmed cab, Real time driver details. Price starts ₹1600
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:32:02
Hire **[taxi in Coimbatore](https://cabbazar.com/city/coimbatore)** at best price. Book local and outstation cab in Coimbatore. Confirmed cab, Real time driver details. Price starts ₹1800
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:31:45
Hire **[taxi in Ahmedabad](https://cabbazar.com/city/ahmedabad)** at best price. Book local and outstation cab in Ahmedabad. Confirmed cab, Real time driver details. Price starts ₹1300
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:31:30
Hire **[taxi in Mumbai](https://cabbazar.com/city/mumbai)** at best price. Book local and outstation cab in Mumbai. Confirmed cab, Real time driver details. Price starts ₹1800
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:31:08
Book **[Jamshedpur to Ranchi cab](https://cabbazar.com/taxi/jamshedpur-to-ranchi)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:30:46
Book **[Jamshedpur to Kolkata cab](https://cabbazar.com/taxi/jamshedpur-to-kolkata)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:30:23
Book **[Ranchi to Tatanagar cab](https://cabbazar.com/taxi/cab/ranchi-to-tatanagar)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:30:09
Book **[Mysore to Kushalnagar cab](https://cabbazar.com/taxi/cab/mysore-to-kushalnagar)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:29:51
Book **[Mysore to Coorg cab](https://cabbazar.com/taxi/mysore-to-coorg)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:29:35
Book **[Chennai to Yercaud cab](https://cabbazar.com/taxi/chennai-to-yercaud)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:29:18
Book **[Chennai to Villupuram cab](https://cabbazar.com/taxi/chennai-to-villupuram)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:29:03
Book **[Chennai to Thanjavur cab](https://cabbazar.com/taxi/chennai-to-thanjavur)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:28:38
Book **[Chennai to Panruti cab](https://cabbazar.com/taxi/cab/chennai-to-panruti)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:28:20
Book **[Chennai to Dindigul cab](https://cabbazar.com/taxi/cab/chennai-to-dindigul)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:28:03
Book **[Chennai to Chittoor cab](https://cabbazar.com/taxi/cab/chennai-to-chittoor)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:27:47
Book **[Ooty to Mysore cab](https://cabbazar.com/taxi/ooty-to-mysore)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:27:31
Book **[Mettupalayam to Ooty cab](https://cabbazar.com/taxi/mettupalayam-to-ooty)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:27:15
Book **[Ooty to Mettupalayam cab](https://cabbazar.com/taxi/cab/ooty-to-mettupalayam)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:26:58
Book **[Coimbatore to Karur cab](https://cabbazar.com/taxi/cab/coimbatore-to-karur)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way drop taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:26:38
Book **[Coimbatore to Erode cab](https://cabbazar.com/taxi/coimbatore-to-erode)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:26:24
Book **[Coimbatore to Dindigul cab](https://cabbazar.com/taxi/cab/coimbatore-to-dindigul)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:26:06
Book **[Coimbatore to Bangalore cab](https://cabbazar.com/taxi/coimbatore-to-bengaluru)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:25:50
Book **[Coimbatore to Chennai cab](https://cabbazar.com/taxi/cab/coimbatore-to-chennai)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:25:34
Book **[Villupuram to Pondicherry cab](https://cabbazar.com/taxi/villupuram-to-pondicherry)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:25:18
Book **[Pondicherry to Villupuram cab](https://cabbazar.com/taxi/pondicherry-to-villupuram)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 11:24:48
Book **[Pondicherry to Chennai cab](https://cabbazar.com/taxi/pondicherry-to-chennai)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21c71bfa:e28fa0f6
2025-01-15 10:59:47
Book **[Vellore to Chennai cab](https://cabbazar.com/taxi/vellore-to-chennai)** online at best price. CabBazar provides car rental services for all cab types AC, Non AC, Hatchback, SUV, Sedan, Innova and Tempo Traveller. Both One way taxi and round trip cab available at lowest price. Price starts Rs. 9/Km.