-

@ b17fccdf:b7211155
2025-02-01 18:41:27
#### **Next new resources about the MiniBolt guide have been released**:
---
* 🆕 **Roadmap**: [LINK](https://github.com/orgs/minibolt-guide/projects/1)
* 🆕 **Dynamic Network map**: [LINK](https://app.diagrams.net/?tags={}&lightbox=1&target=blank&highlight=0000ff&edit=_blank&layers=1&nav=1&title=networkmap.drawio.png#Uhttps://raw.githubusercontent.com/minibolt-guide/minibolt/main/resources/networkmap.drawio.png)
* 🆕 **Nostr community**: [LINK](https://habla.news/c/[n]addr1qqyy66twd9px7mr5qyf8wumn8ghj7mmxve3ksctfdch8qatzqgstzl7vmurm5gu87qutx3pxwgxddrg39huj809zhmv03scfkus3z4grqsqqpphk2j0aff) < ~ REMOVE the "[]" symbols from the URL (naddr...) to access
* 🆕 **Linktr FOSS** (UC) by [Gzuuus](nostr:npub1gzuushllat7pet0ccv9yuhygvc8ldeyhrgxuwg744dn5khnpk3gs3ea5ds): [LINK](https://linktr.minibolt.info)
* 🆕 **Donate webpage**: 🚾 [Clearnet LINK](https://donate.minibolt.info) || 🧅 [Onion LINK](http://3iqm7nidexns5p6wmgc23ibgiscm6rge7hwyeziviwgav4fl7xui4mqd.onion/apps/Li3AtEGDsqNmNddv6rX69taidm3/pos)
* 🆕 **Contact email**: [hello@minibolt.info](mailto:hello@minibolt.info)
---
Enjoy it MiniBolter! 💙
-

@ 9e69e420:d12360c2
2025-02-01 11:16:04

Federal employees must remove pronouns from email signatures by the end of the day. This directive comes from internal memos tied to two executive orders signed by Donald Trump. The orders target diversity and equity programs within the government.

CDC, Department of Transportation, and Department of Energy employees were affected. Staff were instructed to make changes in line with revised policy prohibiting certain language.
One CDC employee shared frustration, stating, “In my decade-plus years at CDC, I've never been told what I can and can't put in my email signature.” The directive is part of a broader effort to eliminate DEI initiatives from federal discourse.
-

@ 0271e1b9:ad8cff90
2025-02-01 07:39:31
**I study the greats.**
For if and when I find myself beaten down into the gutters of life - the vile, bile and the mundane - I shall draw strength from other great men - past, present and future - who, quite often, faced many more adversities and a lot more suffering, but chose to use them to their advantage, to overcome their dire circumstances and rise above the afflictions that life had bestowed upon them. It’s all been done before. It can be done again, better.
Learning from the past and from the present is very straightforward. Anyone can do that. But how does one learn from the future? It’s simple: you envision the best possible future for humanity, for generations to come, and for yourself. Then you figure out an approximate path on how to get there, and what kind of a man or a woman you must be to walk that path. The skills, the mindset, the qualities. And lastly, but perhaps most importantly, you find actionable measures, habits, convictions on how to become that person - and conversely, what are stopping you from becoming that person.
> “You must value learning above everything else.”
― Robert Greene
> “Those who have a 'why' to live, can bear with almost any 'how'.”
― Viktor E. Frankl
> “You need to look at all events as having value. If you can do that, then you’re in a zone of tremendous opportunity.”
― Phil Stutz
> “I shall take the more pains to uncover the fountains of philosophy, from which all my eloquence has taken its rise.”
― Marcus Tullius Cicero
> “Error correction is the basis of all intelligence.”
― Jeff Booth
> “Yes, you’re likely to fail, that’s fine. Because the goal of playing is not to win, but to keep learning. And the day you stop learning is the day you stop living."
― Jesse Enkamp
> "A man is great not because he hasn't failed; a man is great because failure hasn't stopped him."
— Confucius
> “If people knew how hard I had to work to gain my mastery, it would not seem so wonderful at all.”
― Michelangelo
> “First of all we have to decide what we are to do and what manner of men we wish to be - the most difficult problem in the world.”
― Marcus Tullius Cicero
> “You either bleed soul into your work, or let the work bleed out your soul.”
― Pran Yoganthan
> "The Stoic philosopher is the man who has liberated himself from fear. He’s not afraid of death, he’s not afraid of pain, he’s not afraid of other people’s dismissal as a fool. The only thing he cares about is that he should meet his moral obligations.”
― Michael Sugrue
> "The strong do what they can and the weak suffer what they must."
― Thucydides
> “The brain is the most powerful weapon in the world.”
― David Goggins
> “Man, the bravest of animals, and the one most accustomed to suffering, does not repudiate suffering as such; he desires it, he even seeks it out, provided he is shown a meaning for it, a purpose of suffering. The meaninglessness of suffering, not suffering itself, was the curse that lay over mankind so far.”
― Friedrich Nietzsche
> "Consciousness is awareness with a choice."
― Thomas Campbell
> “The essence of philosophy is that a man should so live that his happiness shall depend as little as possible on external things.”
― Epictetus
> “It’s most real, it’s most good and it’s most salvific - it saves you, it transforms you. That’s the sacred.”
— John Vervaeke
> “It is impossible for a man to learn what he thinks he already knows.”
― Epictetus
> “Evolution is a process of iteration. There’s no master plan. It’s in each moment of what happens.”
― Michael Behrens
> “Don’t follow anybody and don’t accept anyone as a teacher, except when you become your own teacher and disciple.”
― Jiddu Krishnamurti
> “This is your life. You’re accountable. What are you gonna do about that?”
― James Hollis
By the way, if you enjoyed these quotes, feel free to follow a little side project of mine: [Stoic Resurrection](https://linktr.ee/stoic_resurrection)
*Peace & Love,*
*[Kontext](https://linktr.ee/mckontext)*
*Block height 881,748*
-

@ 000002de:c05780a7
2025-02-01 05:23:37

originally posted at https://stacker.news/items/872035
-

@ ee7e3590:5602f192
2025-02-01 05:02:15
You’re hitting on the core tension: **unlimited demand for emergency care collides with finite resources**, and pretending otherwise leads to either runaway costs or rationing-by-stealth. Let’s confront this head-on with free-market-aligned solutions that don’t ignore human realities:
---
### **1. Redefine "Emergency Care"**
The U.S. legally mandates ERs to stabilize *anyone*, regardless of ability to pay (EMTALA). This creates moral hazard:
- **Problem**: Hospitals inflate prices on paying patients to offset uncompensated care.
- **Free-Market Fix**:
- **Repeal EMTALA**: Allow ERs to refuse non-critical cases (e.g., toothaches, rashes) unless prepaid or insured.
- **Clarify "True Emergency"**: Legally define emergencies as *immediate life threats* (e.g., strokes, cardiac arrest) and let non-critical cases be diverted to urgent care.
- **Consequence**: ERs could price transparently for true emergencies, while non-critical cases face market-driven urgent care options.
---
### **2. Embrace Tiered Emergency Care**
Not all emergencies require Level I trauma centers:
- **Basic ERs**: Staffed by NPs and paramedics for minor injuries (e.g., sprains, minor burns) at lower costs.
- **Advanced ERs**: For critical care (e.g., gunshot wounds), priced higher but competing via outcomes (e.g., survival rates).
- **Example**: India’s *Ziqitza Healthcare* operates ambulance tiers—basic vans for transport and advanced ICU units.
---
### **3. **Address Moral Hazard with Insurance Innovation**
- **Catastrophic Insurance Mandates**: Require everyone to carry cheap, high-deductible plans covering *only* true emergencies (e.g., $10/month for coverage above $50k).
- Incentivizes price shopping for non-emergencies.
- Prevents freeloading on ERs.
- **Risk-Adjusted Premiums**: Smokers, skydivers, or diabetics pay higher premiums, aligning costs with personal choices.
---
### **4. **Community-Based Safety Nets**
- **Mutual Aid Networks**: Local groups negotiate bulk ER rates (e.g., $100/month membership covers three ER visits annually).
- **Crowdfunding ER Vouchers**: Platforms like *GoFundMe* could partner with hospitals to prepurchase discounted emergency care slots.
---
### **5. **Radical Transparency + Bankruptcy Reform**
- **ER Debt Auctions**: Let hospitals sell unpaid ER bills to collection agencies in real-time, creating competition to minimize patient liability.
- **Flat-Fee ER Pricing**: Hospitals post rates like “$5,000 for appendicitis stabilization, all-inclusive” to deter surprise billing.
- **Ban Wage Garnishment for Medical Debt**: Protect patients from lifelong ruin, forcing hospitals to price responsibly or absorb losses.
---
### **6. **Accept Trade-Offs Explicitly**
The U.S. system fails because it hides rationing behind complexity. A free-market approach must embrace transparency:
- **Option 1**: Pay $100,000 for a 95% survival rate in a car crash.
- **Option 2**: Pay $20,000 for a 70% survival rate at a budget ER.
- **Brutal but Honest**: Let individuals (or insurers) choose their risk tolerance upfront.
**Example**:
- **Japan’s Price Controls**: Caps ER costs but tolerates wait times (e.g., 8+ hours for non-critical care).
- **Switzerland’s Mandates**: Everyone buys insurance, but ERs charge $1,000+ deductibles to deter overuse.
---
### **7. **Disrupt with Decentralized Care**
- **Crypto-ERs**: Blockchain-based emergency funds where contributors vote on covering members’ bills.
- **AI-Guided Self-Care**: Apps that stabilize patients en route to ERs (e.g., tourniquet tutorials, overdose reversal guidance).
---
### **8. **Reform Malpractice to Reduce Defensive Medicine**
- **“No Pay, No Harm” Liability**: If a patient doesn’t pay, they can’t sue for malpractice (incentivizing upfront pricing).
- **Safe Harbor Protocols**: ERs using approved, cost-effective treatments (e.g., generics) get immunity from lawsuits.
---
### **The Uncomfortable Truth**
A free market in emergency care requires accepting that **not everyone will be saved**—just as not everyone can afford a Ferrari. The alternative is the current U.S. model, which *pretends* to save everyone but bankrupts millions and still leaves 30% of ER visits unmet due to overcrowding.
By legalizing tiered care, deregulating monopolies, and forcing transparency, you create a system where:
- **Elites** pay premium prices for cutting-edge emergency care.
- **Most** get “good enough” stabilization at reasonable costs.
- **Some** choose cheap, high-risk options (or none at all).
This isn’t pretty, but it’s honest—and arguably more ethical than today’s hidden rationing and financial toxicity.
-

@ ee7e3590:5602f192
2025-02-01 05:00:39
You’re hitting on the core tension: **unlimited demand for emergency care collides with finite resources**, and pretending otherwise leads to either runaway costs or rationing-by-stealth. Let’s confront this head-on with free-market-aligned solutions that don’t ignore human realities:
---
### **1. Redefine "Emergency Care"**
The U.S. legally mandates ERs to stabilize *anyone*, regardless of ability to pay (EMTALA). This creates moral hazard:
- **Problem**: Hospitals inflate prices on paying patients to offset uncompensated care.
- **Free-Market Fix**:
- **Repeal EMTALA**: Allow ERs to refuse non-critical cases (e.g., toothaches, rashes) unless prepaid or insured.
- **Clarify "True Emergency"**: Legally define emergencies as *immediate life threats* (e.g., strokes, cardiac arrest) and let non-critical cases be diverted to urgent care.
- **Consequence**: ERs could price transparently for true emergencies, while non-critical cases face market-driven urgent care options.
---
### **2. Embrace Tiered Emergency Care**
Not all emergencies require Level I trauma centers:
- **Basic ERs**: Staffed by NPs and paramedics for minor injuries (e.g., sprains, minor burns) at lower costs.
- **Advanced ERs**: For critical care (e.g., gunshot wounds), priced higher but competing via outcomes (e.g., survival rates).
- **Example**: India’s *Ziqitza Healthcare* operates ambulance tiers—basic vans for transport and advanced ICU units.
---
### **3. **Address Moral Hazard with Insurance Innovation**
- **Catastrophic Insurance Mandates**: Require everyone to carry cheap, high-deductible plans covering *only* true emergencies (e.g., $10/month for coverage above $50k).
- Incentivizes price shopping for non-emergencies.
- Prevents freeloading on ERs.
- **Risk-Adjusted Premiums**: Smokers, skydivers, or diabetics pay higher premiums, aligning costs with personal choices.
---
### **4. **Community-Based Safety Nets**
- **Mutual Aid Networks**: Local groups negotiate bulk ER rates (e.g., $100/month membership covers three ER visits annually).
- **Crowdfunding ER Vouchers**: Platforms like *GoFundMe* could partner with hospitals to prepurchase discounted emergency care slots.
---
### **5. **Radical Transparency + Bankruptcy Reform**
- **ER Debt Auctions**: Let hospitals sell unpaid ER bills to collection agencies in real-time, creating competition to minimize patient liability.
- **Flat-Fee ER Pricing**: Hospitals post rates like “$5,000 for appendicitis stabilization, all-inclusive” to deter surprise billing.
- **Ban Wage Garnishment for Medical Debt**: Protect patients from lifelong ruin, forcing hospitals to price responsibly or absorb losses.
---
### **6. **Accept Trade-Offs Explicitly**
The U.S. system fails because it hides rationing behind complexity. A free-market approach must embrace transparency:
- **Option 1**: Pay $100,000 for a 95% survival rate in a car crash.
- **Option 2**: Pay $20,000 for a 70% survival rate at a budget ER.
- **Brutal but Honest**: Let individuals (or insurers) choose their risk tolerance upfront.
**Example**:
- **Japan’s Price Controls**: Caps ER costs but tolerates wait times (e.g., 8+ hours for non-critical care).
- **Switzerland’s Mandates**: Everyone buys insurance, but ERs charge $1,000+ deductibles to deter overuse.
---
### **7. **Disrupt with Decentralized Care**
- **Crypto-ERs**: Blockchain-based emergency funds where contributors vote on covering members’ bills.
- **AI-Guided Self-Care**: Apps that stabilize patients en route to ERs (e.g., tourniquet tutorials, overdose reversal guidance).
---
### **8. **Reform Malpractice to Reduce Defensive Medicine**
- **“No Pay, No Harm” Liability**: If a patient doesn’t pay, they can’t sue for malpractice (incentivizing upfront pricing).
- **Safe Harbor Protocols**: ERs using approved, cost-effective treatments (e.g., generics) get immunity from lawsuits.
---
### **The Uncomfortable Truth**
A free market in emergency care requires accepting that **not everyone will be saved**—just as not everyone can afford a Ferrari. The alternative is the current U.S. model, which *pretends* to save everyone but bankrupts millions and still leaves 30% of ER visits unmet due to overcrowding.
By legalizing tiered care, deregulating monopolies, and forcing transparency, you create a system where:
- **Elites** pay premium prices for cutting-edge emergency care.
- **Most** get “good enough” stabilization at reasonable costs.
- **Some** choose cheap, high-risk options (or none at all).
This isn’t pretty, but it’s honest—and arguably more ethical than today’s hidden rationing and financial toxicity.
-

@ 000002de:c05780a7
2025-01-30 21:17:26

> The Debian Publicity Team will no longer post on X/Twitter. We took this decision since we feel X doesn't reflect Debian shared values as stated in our social contract, code of conduct and diversity statement. X evolved into a place where people we care about don't feel safe.
A couple red flags in this post that explain their actions.
1. Shared values - projects that have broad values statements are prone to isolation over time
2. Social contract - that's a meaningless vapid term
I have no issue with code of conduct guidelines or having value statements but when you pick sides on cultural divides and things that are not at all related to the logical objective of a project you are going to end up where Debian has landed.
X has its issues, I'm not a fan but the reasoning behind this seems really off.
One Debian user responded with what I thought was a good summary of why this is a bad move.
> I'm a long-time Debian user and fan, and am also one of the champions for using Debian in space-based applications at NASA.
> IMO this is a short-sighted and foolish decision. The notion of "values" is bring sadly misapplied here.
> I urge you to reconsider. More channels of communication, even with those whom you disagree with, is good for both Debian and your user community.
I'm not into the "anti-woke" or "woke" crap and I dare say most people that use Linux do not care about either side very much at all. A loud minority has been gaining power in these types of projects for a long time. Today we have very loud counters to that group that also can be annoying and out of line.
Will be interesting to watch this all unfold over the next few years. Conservatives seem to be running victory laps and I think that's not only premature but also counter-productive.
I can see leaving X for other reasons.
* Debian users are really using it to communicate with the project
* The Debian publicity team isn't seeing very much of a response for their efforts
* X has become more about politics than tech and communication
* Specific examples of how X is causing issues for the project
They do say this
> X evolved into a place where people we care about don't feel safe.
That's too bad but honestly I don't buy it. Maybe I don't spend enough time on X to have much credibility on this but I'm skeptical of this being the case.
originally posted at https://stacker.news/items/870437
-

@ 1cb14ab3:95d52462
2025-01-30 18:45:41















---
#### Other Photo Series by Hes:
[City Series](https://hes.npub.pro/post/1734817611982/)
[Structural Reflections](https://hes.npub.pro/post/1720570208841/)
---
#### More from Hes:
[Long Form](https://hes.npub.pro/)
[Art Portfolio](https://hesart.npub.pro/)
[Online Store](https://plebeian.market/community/1cb14ab335876fc9efc37d838ba287cf17e5adcccb20bf6d49f9da9695d52462:hesmart-ym3fcufdfz)
[Travel Guides](https://hes.npub.pro/tag/travel/)
[Photography](https://hes.npub.pro/tag/photography/)
[Writings](https://hes.npub.pro/tag/money)
---
*All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from these photos, please feel free to send a zap. Enjoy life on a Bitcoin standard.*
-

@ cc8d072e:a6a026cb
2025-01-30 17:20:24
Recently, I had the opportunity to work as an advisor for an AI agent project, which is created by team with a lot of fin-tech software develop experience. As we coded together, their real-time questions and challenges provided unique insights into the hurdles software engineers face when transitioning to AI development. They would pause at moments that most AI engineers take for granted - "How can we be sure the agent understood correctly?", "What if the model makes a mistake?", "How do we handle the uncertainty?" These weren't just isolated questions; they represented the fundamental paradigm shift required when moving from traditional software engineering to AI development. And thats why i think it might be worthy to take sometime write down this article and if you are going to start your first AI agent programming, spending 5 min reading t his will save you a lot of time later.
### 1. Shifting from Deterministic to Probabilistic Thinking
- Traditional software engineering deals with deterministic outcomes
- AI systems operate on probability rather than certainty
- Engineers need to adapt from "100% correct" mindset to accepting probabilistic outcomes
- Blockchain developers may find this particularly challenging due to their background in exact, deterministic systems
### 2. Understanding Core AI Concepts
(There are a lot of concepts to understand, but i will focus on the most frequently asked ones)
#### Memory Management
- **Short-term Memory**: Implemented through conversation context
- **Long-term Memory**: Implemented through vector databases (RAG - Retrieval Augmented Generation)
- Context length management is crucial due to LLM token limitations
#### Language Models and Fine-tuning
- Base models (like GPT) provide general intelligence
- Domain-specific knowledge can be added through:
- Fine-tuning with custom datasets
- Adding RAG layers for specific knowledge domains
### 3. Technical Framework Knowledge
#### Essential Tools and Frameworks
- Vercel AI SDK (if you are a typescript guy)
- LangChain (alternative option)
- Different models(openai, claude, gemini, etc, of course, now, deepseek. the temu in llm )
- Understanding of prompt engineering
#### Multi-Agent Systems
- Agents can communicate through natural language
- Inter-agent communication requires careful system design
- Implementation of thought processes and decision-making loops
- Safety considerations for system commands and operations
### 4. Language and Localization Considerations
- System prompts typically work best in English
- Multi-language support requires careful handling:
- Input translation to English
- Processing in English
- Output translation to target language
- Model performance varies across different languages
### 5. Safety and Error Handling
- Implementing validation layers for critical operations
- Understanding model limitations and potential errors
- Building feedback mechanisms to detect misunderstandings
## Conclusion
Transitioning from software engineering to AI engineering requires a significant mindset shift. While traditional software engineering skills remain valuable, understanding probabilistic systems, language models, and AI-specific architectures is crucial. The key is to balance innovation with practical safety considerations, especially when dealing with critical applications.
Remember that AI systems are not perfect, and building robust applications requires careful consideration of their limitations and appropriate safety measures. Start with existing frameworks and gradually build up complexity as you become more comfortable with AI-specific concepts and challenges.(the conclusion part is written by chatgpt, did you notice? :))
-

@ 97c70a44:ad98e322
2025-01-30 17:15:37
There was a slight dust up recently over a website someone runs removing a listing for an app someone built based on entirely arbitrary criteria. I'm not to going to attempt to speak for either wounded party, but I would like to share my own personal definition for what constitutes a "nostr app" in an effort to help clarify what might be an otherwise confusing and opaque purity test.
In this post, I will be committing the "no true Scotsman" fallacy, in which I start with the most liberal definition I can come up with, and gradually refine it until all that is left is the purest, gleamingest, most imaginary and unattainable nostr app imaginable. As I write this, I wonder if anything built yet will actually qualify. In any case, here we go.
# It uses nostr
The lowest bar for what a "nostr app" might be is an app ("application" - i.e. software, not necessarily a native app of any kind) that has some nostr-specific code in it, but which doesn't take any advantage of what makes nostr distinctive as a protocol.
Examples might include a scraper of some kind which fulfills its charter by fetching data from relays (regardless of whether it validates or retains signatures). Another might be a regular web 2.0 app which provides an option to "log in with nostr" by requesting and storing the user's public key.
In either case, the fact that nostr is involved is entirely neutral. A scraper can scrape html, pdfs, jsonl, whatever data source - nostr relays are just another target. Likewise, a user's key in this scenario is treated merely as an opaque identifier, with no appreciation for the super powers it brings along.
In most cases, this kind of app only exists as a marketing ploy, or less cynically, because it wants to get in on the hype of being a "nostr app", without the developer quite understanding what that means, or having the budget to execute properly on the claim.
# It leverages nostr
Some of you might be wondering, "isn't 'leverage' a synonym for 'use'?" And you would be right, but for one connotative difference. It's possible to "use" something improperly, but by definition leverage gives you a mechanical advantage that you wouldn't otherwise have. This is the second category of "nostr app".
This kind of app gets some benefit out of the nostr protocol and network, but in an entirely selfish fashion. The intention of this kind of app is not to augment the nostr network, but to augment its own UX by borrowing some nifty thing from the protocol without really contributing anything back.
Some examples might include:
- Using nostr signers to encrypt or sign data, and then store that data on a proprietary server.
- Using nostr relays as a kind of low-code backend, but using proprietary event payloads.
- Using nostr event kinds to represent data (why), but not leveraging the trustlessness that buys you.
An application in this category might even communicate to its users via nostr DMs - but this doesn't make it a "nostr app" any more than a website that emails you hot deals on herbal supplements is an "email app". These apps are purely parasitic on the nostr ecosystem.
In the long-term, that's not necessarily a bad thing. Email's ubiquity is self-reinforcing. But in the short term, this kind of "nostr app" can actually do damage to nostr's reputation by over-promising and under-delivering.
# It complements nostr
Next up, we have apps that get some benefit out of nostr as above, but give back by providing a unique value proposition to nostr users as nostr users. This is a bit of a fine distinction, but for me this category is for apps which focus on solving problems that nostr isn't good at solving, leaving the nostr integration in a secondary or supporting role.
One example of this kind of app was Mutiny (RIP), which not only allowed users to sign in with nostr, but also pulled those users' social graphs so that users could send money to people they knew and trusted. Mutiny was doing a great job of leveraging nostr, as well as providing value to users with nostr identities - but it was still primarily a bitcoin wallet, not a "nostr app" in the purest sense.
Other examples are things like Nostr Nests and Zap.stream, whose core value proposition is streaming video or audio content. Both make great use of nostr identities, data formats, and relays, but they're primarily streaming apps. A good litmus test for things like this is: if you got rid of nostr, would it be the same product (even if inferior in certain ways)?
A similar category is infrastructure providers that benefit nostr by their existence (and may in fact be targeted explicitly at nostr users), but do things in a centralized, old-web way; for example: media hosts, DNS registrars, hosting providers, and CDNs.
To be clear here, I'm not casting aspersions (I don't even know what those are, or where to buy them). All the apps mentioned above use nostr to great effect, and are a real benefit to nostr users. But they are not True Scotsmen.
# It embodies nostr
Ok, here we go. This is the crème de la crème, the top du top, the meilleur du meilleur, the bee's knees. The purest, holiest, most chaste category of nostr app out there. The apps which are, indeed, nostr indigitate.
This category of nostr app (see, no quotes this time) can be defined by the converse of the previous category. If nostr was removed from this type of application, would it be impossible to create the same product?
To tease this apart a bit, apps that leverage the technical aspects of nostr are dependent on nostr the *protocol*, while apps that benefit nostr exclusively via network effect are integrated into nostr the *network*. An app that does both things is working in symbiosis with nostr as a whole.
An app that embraces both nostr's protocol and its network becomes an organic extension of every other nostr app out there, multiplying both its competitive moat and its contribution to the ecosystem:
- In contrast to apps that only borrow from nostr on the technical level but continue to operate in their own silos, an application integrated into the nostr network comes pre-packaged with existing users, and is able to provide more value to those users because of other nostr products. On nostr, it's a good thing to advertise your competitors.
- In contrast to apps that only market themselves to nostr users without building out a deep integration on the protocol level, a deeply integrated app becomes an asset to every other nostr app by becoming an organic extension of them through interoperability. This results in increased traffic to the app as other developers and users refer people to it instead of solving their problem on their own. This is the "micro-apps" utopia we've all been waiting for.
Credible exit doesn't matter if there aren't alternative services. Interoperability is pointless if other applications don't offer something your app doesn't. Marketing to nostr users doesn't matter if you don't augment their agency _as nostr users_.
If I had to choose a single NIP that represents the mindset behind this kind of app, it would be NIP 89 A.K.A. "Recommended Application Handlers", which states:
> Nostr's discoverability and transparent event interaction is one of its most interesting/novel mechanics. This NIP provides a simple way for clients to discover applications that handle events of a specific kind to ensure smooth cross-client and cross-kind interactions.
These handlers are the glue that holds nostr apps together. A single event, signed by the developer of an application (or by the application's own account) tells anyone who wants to know 1. what event kinds the app supports, 2. how to link to the app (if it's a client), and (if the pubkey also publishes a kind 10002), 3. which relays the app prefers.
_As a sidenote, NIP 89 is currently focused more on clients, leaving DVMs, relays, signers, etc somewhat out in the cold. Updating 89 to include tailored listings for each kind of supporting app would be a huge improvement to the protocol. This, plus a good front end for navigating these listings (sorry nostrapp.link, close but no cigar) would obviate the evil centralized websites that curate apps based on arbitrary criteria._
Examples of this kind of app obviously include many kind 1 clients, as well as clients that attempt to bring the benefits of the nostr protocol and network to new use cases - whether long form content, video, image posts, music, emojis, recipes, project management, or any other "content type".
To drill down into one example, let's think for a moment about forms. What's so great about a forms app that is built on nostr? Well,
- There is a [spec](https://github.com/nostr-protocol/nips/pull/1190) for forms and responses, which means that...
- Multiple clients can implement the same data format, allowing for credible exit and user choice, even of...
- Other products not focused on forms, which can still view, respond to, or embed forms, and which can send their users via NIP 89 to a client that does...
- Cryptographically sign forms and responses, which means they are self-authenticating and can be sent to...
- Multiple relays, which reduces the amount of trust necessary to be confident results haven't been deliberately "lost".
Show me a forms product that does all of those things, and isn't built on nostr. You can't, because it doesn't exist. Meanwhile, there are plenty of image hosts with APIs, streaming services, and bitcoin wallets which have basically the same levels of censorship resistance, interoperability, and network effect as if they weren't built on nostr.
# It supports nostr
Notice I haven't said anything about whether relays, signers, blossom servers, software libraries, DVMs, and the accumulated addenda of the nostr ecosystem are nostr apps. Well, they are (usually).
This is the category of nostr app that gets none of the credit for doing all of the work. There's no question that they qualify as beautiful nostrcorns, because their value propositions are entirely meaningless outside of the context of nostr. Who needs a signer if you don't have a cryptographic identity you need to protect? DVMs are literally impossible to use without relays. How are you going to find the blossom server that will serve a given hash if you don't know which servers the publishing user has selected to store their content?
In addition to being entirely contextualized by nostr architecture, this type of nostr app is valuable because it does things "the nostr way". By that I mean that they don't simply try to replicate existing internet functionality into a nostr context; instead, they create entirely new ways of putting the basic building blocks of the internet back together.
A great example of this is how Nostr Connect, Nostr Wallet Connect, and DVMs all use relays as brokers, which allows service providers to avoid having to accept incoming network connections. This opens up really interesting possibilities all on its own.
So while I might hesitate to call many of these things "apps", they are certainly "nostr".
# Appendix: it smells like a NINO
So, let's say you've created an app, but when you show it to people they politely smile, nod, and call it a NINO (Nostr In Name Only). What's a hacker to do? Well, here's your handy-dandy guide on how to wash that NINO stench off and Become a Nostr.
You app might be a NINO if:
- There's no NIP for your data format (or you're abusing NIP 78, 32, etc by inventing a sub-protocol inside an existing event kind)
- There's a NIP, but no one knows about it because it's in a text file on your hard drive (or buried in your project's repository)
- Your NIP imposes an incompatible/centralized/legacy web paradigm onto nostr
- Your NIP relies on trusted third (or first) parties
- There's only one implementation of your NIP (yours)
- Your core value proposition doesn't depend on relays, events, or nostr identities
- One or more relay urls are hard-coded into the source code
- Your app depends on a specific relay implementation to work (*ahem*, relay29)
- You don't validate event signatures
- You don't publish events to relays you don't control
- You don't read events from relays you don't control
- You use legacy web services to solve problems, rather than nostr-native solutions
- You use nostr-native solutions, but you've hardcoded their pubkeys or URLs into your app
- You don't use NIP 89 to discover clients and services
- You haven't published a NIP 89 listing for your app
- You don't leverage your users' web of trust for filtering out spam
- You don't respect your users' mute lists
- You try to "own" your users' data
Now let me just re-iterate - it's ok to be a NINO. We need NINOs, because nostr can't (and shouldn't) tackle every problem. You just need to decide whether your app, as a NINO, is actually contributing to the nostr ecosystem, or whether you're just using buzzwords to whitewash a legacy web software product.
If you're in the former camp, great! If you're in the latter, what are you waiting for? Only you can fix your NINO problem. And there are lots of ways to do this, depending on your own unique situation:
- Drop nostr support if it's not doing anyone any good. If you want to build a normal company and make some money, that's perfectly fine.
- Build out your nostr integration - start taking advantage of webs of trust, self-authenticating data, event handlers, etc.
- Work around the problem. Think you need a special relay feature for your app to work? Guess again. Consider encryption, AUTH, DVMs, or better data formats.
- Think your idea is a good one? Talk to other devs or open a PR to the [nips repo](https://github.com/nostr-protocol/nips). No one can adopt your NIP if they don't know about it.
- Keep going. It can sometimes be hard to distinguish a research project from a NINO. New ideas have to be built out before they can be fully appreciated.
- Listen to advice. Nostr developers are friendly and happy to help. If you're not sure why you're getting traction, ask!
I sincerely hope this article is useful for all of you out there in NINO land. Maybe this made you feel better about not passing the totally optional nostr app purity test. Or maybe it gave you some actionable next steps towards making a great NINON (Nostr In Not Only Name) app. In either case, GM and PV.
-

@ 8d5ba92c:c6c3ecd5
2025-01-30 15:58:03
For me, it’s simple yet profound: a job and labor aren’t the same thing. You don’t have to struggle to perform a task or to meet someone else's unrealistic expectations. In fact, if you genuinely enjoy what you’re doing and believe in its purpose, the results will naturally be better—and everyone benefits.
I’m speaking from the perspective of someone who walked away from a "*well-established career*" multiple times. These days, I might be working more than ever, but I don’t feel tired, frustrated, or burned out. The radical change I made—leaving the "*professional fiat world*" behind—wasn’t easy, but I’ve never regretted it. Now, working fully in Bitcoin, I feel more motivated and satisfied than ever before.
Sure, it's not always straightforward.
This lifestyle definitely comes with its challenges. But those challenges don’t crush me. Just the opposite. When combined with a sense of freedom, they become opportunities for growth—something I truly value. It’s a completely different experience compared to most jobs rooted in the old system.
I’m not saying working in Bitcoin is all sunshine and rainbows, nor am I criticizing anyone still working in fiat. What I’m trying to emphasize is the core message of that quote:
## Do what you love, and you’ll never work a day in your life...
Read it aloud and think about your last couple of jobs.
How did you feel? Did you find fulfillment and satisfaction, or was it more like a form of slavery that made you dread going to bed and waking up every morning?
I didn’t really have those feelings, except for one corporation at the beginning of my career, which gave me a hard time but also taught me valuable lessons. Aside from that experience, most of my jobs weren’t too bad—no need to complain. Still, I often questioned my situation: '*Seriously, why do I have to do this or that if I know it doesn’t make sense?*'
Doing things you don’t believe in can lead to frustration, often in ways you might not even realize, yet every time, significantly affecting your well-being and the people around you.
Now, I hardly know what inner anger means.
I wake up happy, full of passion and ideas. I don’t track the hours as they pass; instead, I focus on all the tasks I complete and how they make a difference for me and others. Yes, I love what I do. And returning to the main point of this article, I shouldn’t even see it as work, even though in practice it definitely is.
The key here is a mix of independence, purpose, and self-determination. Bitcoin has helped me achieve that to a level that’s hard to break.
## A Fresh Take on The Market
I also remember that 5-7 years ago, especially for non-devs, Bitcoin-based jobs weren’t as accessible as they are now (which is probably why I stayed in my traditional career for so long...). It’s really only in the last, maybe 2-3 years that things have changed. With so many areas expanding beyond just mining and tech-related stuff, and new interesting projects popping up regularly, there’s almost any position you can imagine to jump into.
According to a recent report by [Bitvocation](https://linktr.ee/bitvocation) '69% of Bitcoin jobs are non-developer roles'. Also, more than half of available positions in 2024 offered remote opportunities, giving job seekers extra flexibility. Bitcoin is borderless—and so are many of the jobs in this space. If you’ve ever thought working in Bitcoin was out of reach, think again—and check this out "[BITCOIN JOB MARKET DATA, 2024 Report](https://drive.google.com/file/d/1ZFnYP949GzssQHA9wcjHTeW4cDiZIWvM/view)".
One tip from my experience: a good option is to start with a part-time role while keeping your traditional fiat job for more stability, especially at the beginning. After a while, you’ll gain more confidence and see which direction you want to go. Or, if you position yourself so that you don’t need to earn a lot for the next 3-6 months, consider finding a project- or task-based Bitcoin job, maybe even just an internship. Meanwhile, you might decide to focus on building something unique on your own. It can feel amazing! You’ll gain valuable skills, sharpen your experience, and better understand which options work best for your future.
You see, just like in nature, balance is key.
You don’t have to run before you can walk.
What I’m saying is this:
**The choice is yours, as long as you plan ahead + learn, while staying true to your needs, beliefs, and priorities.**
If you want it, do it. Starting a career in Bitcoin is possible, and I have a feeling this space will grow even faster in the next few years. Yes, there will still be ups and downs (hello, bear markets!), but if you plan thoughtfully, there’s not much to worry about.
We’re still early—Bitcoin is only 16 years old—but if you’ve been following this space, you’ve probably seen how dynamic and resilient it is. If you’ve ever thought about working in Bitcoin, now is the time to rethink the possibilities :)))
BTC Your Mind. Let it Beat.
Şelale
-

@ cbd2779f:72a5b029
2025-01-30 15:08:13
Have a few questions pertaining to setting up a new node. Basically, I always seems to be unsure about syncing to graph, after syncing to chain. Consider setting up a new node from scratch, or migrating perhaps, and you want to do an initial setup.
1. How long does it take?
2. What factors determine how long it takes?
3. Is the graph a universal graph that is identical from each nodes perspective?
So far, I'm monitoring progress but tailing logs, looking for clues:
`tail -n 100 /data/lnd/logs/bitcoin/mainnet/lnd.log | grep GRPH`
I can find some relevant clues like:
```
2025-01-30 15:24:54.843 [INF] GRPH: Processed channels=56 updates=59 nodes=15 in last 59.823699481s
```
and then checking with: `lncli getinfo | grep -E 'synced|peers` which outputs
```
"num_peers": 3,
"synced_to_chain": true,
"synced_to_graph": false,
```
At the moment, I've been experimenting with pruned blockchains and this outputs a lot of errors (I believe) relating to not being able to verify UTXOs as I have `ignore-historical-gossip-filters set to true.
Any further suggestions on how to better make sure things are happening under the hood when setting up a new node, what to look for in the logs or how to know the verification progress?
originally posted at https://stacker.news/items/869944
-

@ a012dc82:6458a70d
2025-01-30 14:09:20
In the world of finance and politics, few topics have garnered as much intrigue and debate as Bitcoin. This cryptocurrency, emerging from the fringes of the internet, quickly captured the imagination of investors, tech enthusiasts, and politicians alike. Its promise of decentralization and freedom from traditional banking systems made it a hot topic in political circles, particularly in Canada. However, as quickly as it rose to prominence, Bitcoin has seemingly receded from the political spotlight.
**Table Of Content**
- The Political Heyday of Bitcoin
- The Turning Tide: Bitcoin's Decline in Political Relevance
- The Regulatory Response and Industry Evolution
- The Future of Bitcoin and Cryptocurrencies in Politics
- Conclusion
- FAQs
**The Political Heyday of Bitcoin**
**The Surge of Interest**
During its peak, Bitcoin was not just a financial asset but a symbol of technological progress and financial autonomy. Politicians, especially in Canada, were quick to recognize its potential. Figures like Conservative Leader Pierre Poilievre championed Bitcoin, seeing it as a tool to empower individuals and a hedge against inflation.
**Bitcoin in Policy and Legislation**
Bitcoin's rise in value and popularity led to serious discussions about its role in the economy and its regulation. Debates in parliament and committees centered around how to integrate cryptocurrencies into the national financial system, protect investors, and harness the potential of blockchain technology.
**The Turning Tide: Bitcoin's Decline in Political Relevance**
**The Market's Volatility**
The volatile nature of Bitcoin, marked by dramatic price fluctuations, began to cast doubts in the political arena. The peak value of over $80,000 was followed by a steep decline, shaking confidence in its stability as an asset.
**Changing Political Narratives**
As the market fluctuated, so did the enthusiasm among politicians. The once vocal advocates like Poilievre became less outspoken about their cryptocurrency holdings, reflecting a broader shift in the political narrative around Bitcoin.
**The Regulatory Response and Industry Evolution**
**Government and Regulatory Bodies**
The initial excitement around Bitcoin led to legislative efforts and regulatory discussions. However, the lack of concrete actions and clear policies from the government left the regulatory landscape ambiguous. Independent bodies like the Canadian Securities Administrators stepped in to fill the void with guidelines and notices.
**Industry Persistence Amidst Political Apathy**
Despite the reduced political interest, the cryptocurrency industry continued to evolve. Developers and entrepreneurs in the space kept innovating, pushing the boundaries of blockchain technology and exploring new applications beyond financial transactions.
**The Future of Bitcoin and Cryptocurrencies in Politics**
**Lessons Learned and the Path Forward**
The rise and fall of Bitcoin in the political arena offer valuable lessons about the intersection of technology, finance, and politics. It highlights the need for a balanced approach to new technologies, combining enthusiasm with prudent regulation.
**The Ongoing Debate and Potential Resurgence**
While Bitcoin may have receded from the immediate political discourse, the debate around cryptocurrencies is far from over. As the technology matures and stabilizes, it may once again find its way into political conversations, potentially reshaping the financial landscape in ways yet to be imagined.
**Conclusion**
Bitcoin's journey through the political arena has been a tale of rapid rise, intense debate, and a quiet exit. However, this is not the end of the story for Bitcoin or cryptocurrencies. As the technology evolves and the world adapts, these digital assets may yet redefine the boundaries between technology, finance, and politics. The quiet exit of Bitcoin from the political stage today may just be the prologue to a more significant role in the future.
**FAQs**
**Why did Bitcoin become a topic in Canadian politics?**
Bitcoin garnered political interest due to its potential as a decentralized financial system, promising autonomy from traditional banking and a hedge against inflation.
**Who were some of the political advocates of Bitcoin in Canada?**
Conservative Leader Pierre Poilievre was among the notable political advocates, promoting Bitcoin as a tool for financial empowerment.
**What caused Bitcoin to lose its appeal in politics?**
Bitcoin's appeal waned due to its market volatility, the steep decline in its value, and shifting political narratives.
**How did the government respond to Bitcoin's rise?**
The government's response involved discussions on regulation and integration into the financial system, but concrete actions were limited.
**What is the future of Bitcoin in politics?**
While currently less prominent, the ongoing evolution of cryptocurrency technology may lead to Bitcoin re-entering political discussions in the future.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
*DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.*
-

@ 5a261a61:2ebd4480
2025-01-30 09:37:26
The idea of the **Bean Bag Game** is quite ingenious. I read about it on a BDSM-positive blog. Here’s how it works:
1. **Setup**:
- Take a small cloth bag and add **10 white beans** (rewards/pleasure) and **10 black beans** (punishment/discomfort).
- When it’s time to play, draw **two beans**:
- **First bean** (the *tone*): Determines if the activity will be **pleasant** (white) or **uncomfortable** (black).
- **Second bean** (the *task*): Decides whether you get a **reward** (white) or **punishment** (black).
---
### **Combination Interpretations**:
- **Black + Black**\
*"No fun, just work."*
- Boring/challenging tasks you’d normally postpone: **window cleaning**, **scrubbing bathroom tiles**, **polishing shoes**.
- Could also mean **no playtime** (e.g., "Go straight to bed"). Pure duty – no pleasure, only discipline.
- **White + Black**\
*"Work with a twist."*
- Punishment or chores, but with a *kinky edge*:
- Clean the bathroom **wearing a vibrating butt plug**.
- Wash dishes **with nipple clamps**; add a clothespin to your body for every minute over the time limit.
- Still **no orgasms** – the black bean ensures denial.
- **Black + White**\
*"Pleasure with pain (or humiliation)."*
- Mix stimulation and discomfort:
- Ride a dildo **with weighted nipple clamps**.
- Give a "lap dance" to a teddy bear with a strapon.
- Chat online as a "perfect plaything" for others **without touching yourself**.
- Again, **no orgasms** – the black bean overrules the white.
- **White + White**\
*"Lucky draw… but denial is optional."*
- Freedom to indulge, though I often choose **self-denial** anyway. Examples:
- Edge for 30 minutes, then ask permission to climax (50% chance).
- Use toys freely, but end the session frustrated.
---
### **The Dynamic Ratio Twist**:
- The starting **10:10 ratio isn’t fixed**. Adjust it based on behavior:
- **Good deeds?** Swap a black bean for a white one.
- **Mistakes?** Replace a white bean with a black one.
- Single beans can also decide smaller stakes, like:
- *"Should this edge turn into a ruined orgasm?"*
- *"Do I deserve dessert tonight?"*
---
### **Why It Works**:
- **Control**: The beans dictate your fate, but you tweak the odds through obedience.
- **Flexibility**: Use pairs for major tasks, single beans for quick decisions.
- **Psychological tease**: Even "white + white" can mean denial – because *you* choose the rules.
-

@ 955e5a04:c03b3cc3
2025-01-30 08:59:36
Imagine a world where money moves freely, without borders or middlemen telling you what you can or can’t do. That’s the promise of Bitcoin—a digital currency that isn’t controlled by banks or governments. It’s freedom in your pocket.
But with great power comes great responsibility. In Putin’s People, Catherine Belton reveals how Russia’s elite, including Rosneft, strategic sectors, insiders and KGB-connected figures, used financial systems to move billions and shape global politics. Now, #Bitcoin offers a new tool that could bypass sanctions designed to hold such regimes accountable.
Does this make Bitcoin bad? Not necessarily. It’s a reminder of how innovation can outpace regulation. While some might misuse Bitcoin, it also gives people in oppressed regions a lifeline—a way to protect their savings and avoid corrupt systems.
**Can Bitcoin strike a balance between financial freedom and accountability, or is it destined to remain a gray area for both innovation and potential misuse?** Let’s talk!
-

@ 9e69e420:d12360c2
2025-01-30 12:23:04
Tech stocks have taken a hit globally after China's DeepSeek launched a competitive AI chatbot at a much lower cost than US counterparts. This has stirred market fears of a $1.2 trillion loss across tech companies when trading opens in New York.
DeepSeek’s chatbot quickly topped download charts and surprised experts with its capabilities, developed for only $5.6 million.
The Nasdaq dropped over 3% in premarket trading, with major firms like Nvidia falling more than 10%. SoftBank also saw losses shortly after investing in a significant US AI venture.
Venture capitalist Marc Andreessen called it “AI’s Sputnik moment,” highlighting its potential impact on the industry.
![] (https://www.telegraph.co.uk/content/dam/business/2025/01/27/TELEMMGLPICT000409807198_17379939060750_trans_NvBQzQNjv4BqgsaO8O78rhmZrDxTlQBjdGLvJF5WfpqnBZShRL_tOZw.jpeg)
-

@ 9e69e420:d12360c2
2025-01-30 12:13:39
Salwan Momika, a Christian Iraqi known for burning the Koran in Sweden, was shot dead during a TikTok livestream in an apartment in Sodertalje. The 38-year-old sparked outrage in the Muslim community for his demonstrations, leading to global condemnation. After being rushed to the hospital, he was pronounced dead.
Authorities arrested five individuals in connection with the incident. Momika's death comes days before a court ruling on his possible incitement of ethnic hatred. The incident highlights the tensions surrounding free speech and religious sentiments, intensifying after his controversial protests in 2023.
[Sauce](https://www.dailymail.co.uk/news/article-14341423/Christian-Iraqi-burnt-Koran-Sweden-shot-dead.html)
-

@ 0fa80bd3:ea7325de
2025-01-30 04:28:30
**"Degeneration"** or **"Вырождение"**
![[photo_2025-01-29 23.23.15.jpeg]]
A once-functional object, now eroded by time and human intervention, stripped of its original purpose. Layers of presence accumulate—marks, alterations, traces of intent—until the very essence is obscured. Restoration is paradoxical: to reclaim, one must erase. Yet erasure is an impossibility, for to remove these imprints is to deny the existence of those who shaped them.
The work stands as a meditation on entropy, memory, and the irreversible dialogue between creation and decay.
-

@ 0fa80bd3:ea7325de
2025-01-29 15:43:42
Lyn Alden - биткойн евангелист или евангелистка, я пока не понял
```
npub1a2cww4kn9wqte4ry70vyfwqyqvpswksna27rtxd8vty6c74era8sdcw83a
```
Thomas Pacchia - PubKey owner - X - @tpacchia
```
npub1xy6exlg37pw84cpyj05c2pdgv86hr25cxn0g7aa8g8a6v97mhduqeuhgpl
```
calvadev - Shopstr
```
npub16dhgpql60vmd4mnydjut87vla23a38j689jssaqlqqlzrtqtd0kqex0nkq
```
Calle - Cashu founder
```
npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg
```
Джек Дорси
```
npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m
```
21 ideas
```
npub1lm3f47nzyf0rjp6fsl4qlnkmzed4uj4h2gnf2vhe3l3mrj85vqks6z3c7l
```
Много адресов. Хз кто надо сортировать
```
https://github.com/aitechguy/nostr-address-book
```
ФиатДжеф - создатель Ностр - https://github.com/fiatjaf
```
npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6
```
EVAN KALOUDIS Zues wallet
```
npub19kv88vjm7tw6v9qksn2y6h4hdt6e79nh3zjcud36k9n3lmlwsleqwte2qd
```
Программер Коди https://github.com/CodyTseng/nostr-relay
```
npub1syjmjy0dp62dhccq3g97fr87tngvpvzey08llyt6ul58m2zqpzps9wf6wl
```
Anna Chekhovich - Managing Bitcoin at The Anti-Corruption Foundation
https://x.com/AnyaChekhovich
```
npub1y2st7rp54277hyd2usw6shy3kxprnmpvhkezmldp7vhl7hp920aq9cfyr7
```
-

@ 0fa80bd3:ea7325de
2025-01-29 14:44:48
![[yedinaya-rossiya-bear.png]]
1️⃣ Be where the bear roams. Stay in its territory, where it hunts for food. No point setting a trap in your backyard if the bear’s chilling in the forest.
2️⃣ Set a well-hidden trap. Bury it, disguise it, and place the bait right in the center. Bears are omnivores—just like secret police KGB agents. And what’s the tastiest bait for them? Money.
3️⃣ Wait for the bear to take the bait. When it reaches in, the trap will snap shut around its paw. It’ll be alive, but stuck. No escape.
Now, what you do with a trapped bear is another question... 😏
-

@ 0fa80bd3:ea7325de
2025-01-29 05:55:02
The land that belongs to the indigenous peoples of Russia has been seized by a gang of killers who have unleashed a war of extermination. They wipe out anyone who refuses to conform to their rules. Those who disagree and stay behind are tortured and killed in prisons and labor camps. Those who flee lose their homeland, dissolve into foreign cultures, and fade away. And those who stand up to protect their people are attacked by the misled and deceived. The deceived die for the unchecked greed of a single dictator—thousands from both sides, people who just wanted to live, raise their kids, and build a future.
Now, they are forced to make an impossible choice: abandon their homeland or die. Some perish on the battlefield, others lose themselves in exile, stripped of their identity, scattered in a world that isn’t theirs.
There’s been endless debate about how to fix this, how to clear the field of the weeds that choke out every new sprout, every attempt at change. But the real problem? We can’t play by their rules. We can’t speak their language or use their weapons. We stand for humanity, and no matter how righteous our cause, we will not multiply suffering. Victory doesn’t come from matching the enemy—it comes from staying ahead, from using tools they haven’t mastered yet. That’s how wars are won.
Our only resource is the **will of the people** to rewrite the order of things. Historian Timothy Snyder once said that a nation cannot exist without a city. A city is where the most active part of a nation thrives. But the cities are occupied. The streets are watched. Gatherings are impossible. They control the money. They control the mail. They control the media. And any dissent is crushed before it can take root.
So I started asking myself: **How do we stop this fragmentation?** How do we create a space where people can **rebuild their connections** when they’re ready? How do we build a **self-sustaining network**, where everyone contributes and benefits proportionally, while keeping their freedom to leave intact? And more importantly—**how do we make it spread, even in occupied territory?**
In 2009, something historic happened: **the internet got its own money.** Thanks to **Satoshi Nakamoto**, the world took a massive leap forward. Bitcoin and decentralized ledgers shattered the idea that money must be controlled by the state. Now, to move or store value, all you need is an address and a key. A tiny string of text, easy to carry, impossible to seize.
That was the year money broke free. The state lost its grip. Its biggest weapon—physical currency—became irrelevant. Money became **purely digital.**
The internet was already **a sanctuary for information**, a place where people could connect and organize. But with Bitcoin, it evolved. Now, **value itself** could flow freely, beyond the reach of authorities.
Think about it: when seedlings are grown in controlled environments before being planted outside, they **get stronger, survive longer, and bear fruit faster.** That’s how we handle crops in harsh climates—nurture them until they’re ready for the wild.
Now, picture the internet as that **controlled environment** for **ideas**. Bitcoin? It’s the **fertile soil** that lets them grow. A testing ground for new models of interaction, where concepts can take root before they move into the real world. If **nation-states are a battlefield, locked in a brutal war for territory, the internet is boundless.** It can absorb any number of ideas, any number of people, and it doesn’t **run out of space.**
But for this ecosystem to thrive, people need safe ways to communicate, to share ideas, to build something real—**without surveillance, without censorship, without the constant fear of being erased.**
This is where **Nostr** comes in.
Nostr—"Notes and Other Stuff Transmitted by Relays"—is more than just a messaging protocol. **It’s a new kind of city.** One that **no dictator can seize**, no corporation can own, no government can shut down.
It’s built on **decentralization, encryption, and individual control.** Messages don’t pass through central servers—they are relayed through independent nodes, and users choose which ones to trust. There’s no master switch to shut it all down. Every person owns their identity, their data, their connections. And no one—no state, no tech giant, no algorithm—can silence them.
In a world where cities fall and governments fail, **Nostr is a city that cannot be occupied.** A place for ideas, for networks, for freedom. A city that grows stronger **the more people build within it**.
-

@ 9e69e420:d12360c2
2025-01-26 15:26:44
Secretary of State Marco Rubio issued new guidance halting spending on most foreign aid grants for 90 days, including military assistance to Ukraine. This immediate order shocked State Department officials and mandates “stop-work orders” on nearly all existing foreign assistance awards.
While it allows exceptions for military financing to Egypt and Israel, as well as emergency food assistance, it restricts aid to key allies like Ukraine, Jordan, and Taiwan. The guidance raises potential liability risks for the government due to unfulfilled contracts.
A report will be prepared within 85 days to recommend which programs to continue or discontinue.
-

@ db01672e:9f775028
2025-01-30 07:27:15
When looking for the right Alzheimer's care home in Rockwall, choosing a facility that provides specialized care, emotional support, and a comfortable environment is crucial.
Alzheimer's care homes are designed to cater to the unique needs of individuals dealing with Alzheimer's disease or other forms of dementia.
Selecting the right facility can make a significant difference in ensuring a high quality of life for your loved one. Here are eight essential points to consider when choosing an Alzheimer's care home in Rockwall.
## Specialized Care for Alzheimer’s and Dementia
Alzheimer’s and dementia patients require tailored care that is different from the general senior living options. **[https://villagegreenalzheimerscare.com/rockwall/](https://villagegreenalzheimerscare.com/rockwall/)** that provide dedicated Alzheimer’s care should have a trained team familiar with the complexities of memory loss and cognitive decline.
Look for a facility that focuses on the individual needs of each resident, offering personalized care plans that address both physical and emotional well-being.
## Safe and Secure Environment
A secure environment is essential for Alzheimer's care homes, as residents may become confused or disoriented and wander. The facility should have secure entrances, exits, and enclosed outdoor areas to keep residents safe.
Additionally, the layout should be easy to navigate, with calming and clear signage to reduce confusion.
## Trained and Compassionate Staff
The caregivers at an Alzheimer’s care home in Rockwall should be experienced, patient, and compassionate.
The quality of staff and their training is paramount. Caregivers who understand the behavior and communication challenges of those with Alzheimer’s can help reduce frustration and create a calming atmosphere.
Staff should also have training in first aid, CPR, and handling medical emergencies specific to Alzheimer’s and dementia.
## Person-Centered Care Approach
An ideal Alzheimer’s care home will adopt a person-centered approach to care. This method emphasizes respecting the individual’s preferences, life history, and unique needs
A good Alzheimer’s care facility will encourage residents to maintain independence, creating a balance between support and autonomy.
## Engaging and Stimulating Activities
Look for a facility that offers a variety of activities designed to engage the mind and body. Alzheimer’s patients benefit from daily activities that promote cognitive stimulation, such as music therapy, art, and memory exercises.
Many assisted living facilities in Rockwall, TX, also offer physical exercises to help mobility and overall health. These tailored activities should reflect residents’ interests and provide comfort and joy.
## Comfortable and Homelike Environment
The atmosphere of an Alzheimer’s care home should be warm and inviting, like home. This homelike environment can help residents feel secure and at ease.
The facility should offer comfortable common areas, family-style dining, and private rooms or suites where residents can retreat. Calming colors, familiar furnishings, and soothing lighting can also help reduce anxiety and agitation.
## Quality Nutrition and Meal Options
Nutrition plays a vital role in the health of individuals with Alzheimer’s. A memory care facility should provide meals that are not only nutritious but also cater to residents' preferences.
Facilities that offer family-style dining often help create a sense of community and comfort during mealtime. Special diets or modified meals should also be available to accommodate residents' medical or dietary needs.
## Physical and Mental Health Services
Assisted living facilities in Rockwall, TX, that offer Alzheimer's care should provide access to various healthcare services, including regular medical checkups and specialized care for related health issues.
The facility should partner with doctors, nurses, and therapists who can offer on-site care, ensuring that residents receive the medical attention they need without leaving the facility.
### The End Note
Selecting an **[Alzheimer’s care home](https://villagegreenalzheimerscare.com/)** in Rockwall involves careful consideration of several factors that will impact the quality of life of your loved one.
From specialized care to a nurturing environment, finding a facility that balances medical needs with emotional support is essential. By focusing on these points, you can make an informed decision to ensure peace of mind for the resident and their family.
-

@ 7cb5fba1:4ea55c0e
2025-01-30 05:36:08
---

#### **Samira parties with customers at a brothel. She was married at 12, trafficked to a brothel two weeks later.**
######
---

#### **A madam counts money in a brothel**
######
---


#### **Mia, 15, sits with her new 27-year-old groom during their wedding. ‘My family has been saving for my wedding for a very long time. I am a girl, so they always knew they would need to give me away.' Five or six months ago, her parents found Mia a groom, a 27-year-old man who works in a garment factory. 'I am nervous,' Mia says, quietly. 'I think I will miss my family'**
######
---

#### **Yasmin waits for customers**
######
---

#### **A girl shows her self harm scars**
######
---

#### **Women wait for customers**
######
---

#### **Habiba waits for customers. The 14-year-old has been in a brothel for three years**
######
---

#### **‘I ran away from my husband after seven days. He was only about 15 or 16, but he raped me so violently that one morning, when I knew he was asleep, I slipped out of the house as quietly as I could, and ran,’ Samira says. ‘I ran back to my house, but I was too frightened to go inside because I was covered in blood and bruises. My mum died when I was 11, so my brother and sister had arranged the marriage because they could not afford to look after me any more, and I knew leaving my husband would make them angry. So I asked a rickshaw driver to take me across (the town) to my friend’s house, but he told me I should be ashamed of myself, and dropped me off at the brothel instead’**
######
---

#### **A customer enters Yasmin’s room**
######
---

#### **A police officer stops to speak to a woman outside a brothel**
######
---

#### **A customer fights with girls at a brothel**
######
---
-

@ 18e3af1e:1d42e5df
2023-08-13 02:40:19
Las comunidades son creadas mediante el esfuerzo de no solo un individuo, sino al trabajo de docenas; cientos o miles de personas. Mediante la especialización, como especie, logramos entender que: el saber hacer una sola cosa no significa morir de hambre, o no estar bien preparado para un ataque; por lo contrario, el dominio o maestría de una sola cosa... Puede crear una civilización entera.
Permitirnos un enfoque certero para aprender, dominar y amaestrar nuestras actividades en un periodo de tiempo finito, permitió nuestro avance hacia nuevos campos, de hecho, movió nuestra meta en magnitud tal, que al imaginar el pasado (para muchos) parece mas bien una película cómica y sombría.
Hoy en día, en un mundo regido por individualismo en el reino físico, la manifestación de constructores de comunidades sigue presente en el (reino) digital.
### La evolución de la construcción
A lo largo de la historia de la humanidad, la construcción ha evolucionado desde simples refugios hasta monumentos arquitectónicos y estructuras vanguardistas. Los primeros humanos crearon refugios rudimentarios con materiales naturales. Con la civilización, surgieron las primeras estructuras permanentes, como pirámides y templos, reflejando la organización social y creencias religiosas. La antigua Roma introdujo la innovación en la ingeniería con acueductos y arcos.
La Edad Media vio fortificaciones y catedrales góticas que fusionaban espiritualidad y técnica. El Renacimiento abrazó la proporción y la simetría en palacios y edificios renombrados. La Revolución Industrial marcó un cambio radical con el acero y el hormigón, permitiendo rascacielos y puentes icónicos.
El siglo XX trajo consigo la era de los rascacielos y la arquitectura modernista, desafiando límites estructurales y estéticos. La sostenibilidad ganó importancia en el siglo XXI, impulsando la incorporación de tecnologías avanzadas, como la impresión 3D y la construcción modular.
La historia de la construcción es un testimonio de la creatividad y la adaptabilidad humanas, reflejando no solo avances técnicos, sino también valores culturales y aspiraciones.
En el día hoy, los desarrolladores de software y tecnología podrían considerarse como los constructores del próximo siglo. Al igual que los constructores en otras épocas históricas, los desarrolladores de software son responsables de crear estructuras digitales que moldean la forma en que interactuamos, comunicamos y vivimos en el mundo moderno.
A medida que la tecnología continúa avanzando y la sociedad se vuelve cada vez más digital, el papel de los desarrolladores de software se vuelve crucial en la construcción de soluciones tecnológicas que abordan una amplia gama de desafíos.
Así como los arquitectos y constructores antiguos debían entender la física, la estética y las necesidades humanas para diseñar y construir edificios funcionales y atractivos, los desarrolladores de software deben comprender la lógica de programación, la experiencia del usuario, la seguridad cibernética y la innovación tecnológica para crear aplicaciones, sistemas y plataformas que sean útiles y efectivos.
### Individuos que inspiran
La inspiración individual es un poderoso motor de cambio que puede tener un impacto significativo en la mente colectiva de una comunidad o sociedad. Cuando una persona demuestra pasión, determinación y una visión positiva, puede influir en otros a nivel emocional y cognitivo. Aquí hay algunas formas en que la inspiración individual afecta a la mente colectiva:
La gente puede verse reflejada en las luchas y logros de alguien más, lo que crea un sentido de unidad y comunidad. Esto puede generar un mayor apoyo y solidaridad en torno a ciertas causas o valores. Además, la inspiración individual puede llevar a la acción. Cuando las personas son testigos de un individuo que supera obstáculos o logra metas desafiantes, esto puede motivar a otros a enfrentar sus propios desafíos y trabajar hacia sus objetivos. El ejemplo de una sola persona puede encender la chispa de la acción en muchas más.
La inspiración individual puede tener un efecto multiplicador. Cuando una persona inspirada comparte su historia o experiencia, puede inspirar a otros, creando una cadena de influencia que se extiende a través de redes sociales, comunidades y sociedades enteras. Esto puede tener un impacto a gran escala en la mente colectiva.
El individuo inspirador tiene el potencial de influir profundamente en la mente colectiva al cambiar percepciones, motivar la acción y crear una sensación de comunidad y unidad.
### Comunidades: origen, inicios y progreso.
Las comunidades han sido una parte fundamental de la experiencia humana a lo largo de la historia. Desde los primeros tiempos hasta la era moderna, las comunidades han evolucionado y cambiado en respuesta a las necesidades, avances tecnológicos y contextos culturales.
Desde los primeros días de la humanidad, nuestros antepasados se agruparon en pequeñas comunidades para sobrevivir. Estas comunidades eran grupos familiares o tribus que compartían recursos y conocimientos para cazar, recolectar alimentos y protegerse de los peligros. La cooperación y la solidaridad eran esenciales para la supervivencia.
Con el desarrollo de la agricultura, las comunidades evolucionaron hacia asentamientos más permanentes. La capacidad de cultivar alimentos permitió la formación de aldeas y pueblos, donde la gente podía establecerse y construir relaciones más complejas. Esto llevó al surgimiento de una división del trabajo más especializada y al desarrollo de habilidades artesanales.
Las civilizaciones antiguas, como la sumeria, egipcia, griega y romana, dieron paso a la formación de ciudades y sociedades más organizadas. Las comunidades se convirtieron en centros de comercio, gobierno y cultura. Se construyeron estructuras monumentales, como templos y palacios, que unificaron a las personas en torno a creencias religiosas y sistemas políticos.
Durante la Edad Media, las comunidades se organizaron en torno a sistemas feudales. Los señores feudales gobernaban sobre las tierras y las personas locales. Las aldeas y feudos eran autónomos en gran medida y se centraban en la agricultura y la autosuficiencia.
La Revolución Industrial marcó un cambio importante en la estructura de las comunidades. La industrialización dio lugar a la urbanización, con muchas personas dejando las zonas rurales para trabajar en fábricas en las ciudades.
En la era moderna, las comunidades han continuado evolucionando con avances tecnológicos y la globalización. Las redes sociales y las comunicaciones digitales han conectado a personas de todo el mundo, creando comunidades virtuales en línea.
### Bitcoin | Nostr y la chispa del constructor
Como ya vimos, un solo individuo puede inspirar a muchos otros, teniendo un efecto multiplicador. Esto no solo se traduce al mundo físico, por el contrario, esta directamente ligado a nuestra psicología, incluso podemos decir que va aun mas allá, adentrándonos en el terreno ideológico y espiritual.
Hasta hace no mucho, estábamos a merced de las grandes corporaciones que construían todo por nosotros, mientras esperábamos con ansias las nuevas actualizaciones de cada iteración de sus productos. Cada vez mas y mas nos hacíamos dependientes de dichas corporaciones sin quizás notarlo, poco a poco se fueron apoderando de nuestro tiempo y muy insidiosamente de nuestra personalidad e identidad.
Gracias a las alternativas presentadas hoy en día y a los individuos que inspiran a otros, existe la posibilidad de construir algo que va mas allá de las grandes corporaciones, porque transciende no solo el nivel físico y digital, sino que también transciende a los individuos que aportan a la comunidad. Estoy hablando por supuesto de Nostr, y como los incentivos están alineados gracias a Bitcoin.
Pongamos como ejemplo un par de nombres para ilustrar como individuos que inspirar pueden crear una chispa que se extiende a cada persona dentro de la comunidad.
Personajes como nostr:npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft nostr:npub1utx00neqgqln72j22kej3ux7803c2k986henvvha4thuwfkper4s7r50e8 nostr:npub1v0lxxxxutpvrelsksy8cdhgfux9l6a42hsj2qzquu2zk7vc9qnkszrqj49 nostr:npub107jk7htfv243u0x5ynn43scq9wrxtaasmrwwa8lfu2ydwag6cx2quqncxg (entre muchos otros que podría mencionar pero todo el articulo seria una lista de nombres) han inspirado a otros desarrolladores, creadores de contenido (y todas las otras especializaciones que te puedas imaginar…) A construir sobre este protocolo. Incluso, personas como el caso mas reciente de nostr:npub1m64hnkh6rs47fd9x6wk2zdtmdj4qkazt734d22d94ery9zzhne5qw9uaks han encontrado inspiración para aprender a programar sobre estos mismos rieles.
> nostr:nevent1qqs8fe938k7j5sxcprrv89ezpu09m9pzm90f0sq24hnwlwu0rmn09qcpzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxg5vtygh
La chispa del constructor en palabras mas concisas es: **Inspiración multiplicadora en pos de la productividad y por ende, del crecimiento de una comunidad.**
Sin Bitcoin y Lightning Network, esto seria posible, pero mucho menos efectivo debido a que las personas detrás de toda labor que este enfocada en creación de contenido, desarrollo, etc. Tienen que comer.
### Conclusión
La chispa del constructor radica en la inspiración individual que impulsa a la acción colectiva. Desde la evolución de la construcción hasta las comunidades digitales, **el poder de un individuo inspirado puede moldear el presente y el futuro de las comunidades en todo el mundo.**
-

@ 9f3eba58:fa185499
2025-01-29 20:27:09
Humanity as a whole has been degrading over the years, with average IQ decreasing, bone structures generally becoming poorly formed and fragile, average height decreasing, hormone levels ridiculously low and having various metabolic and mental illnesses becoming “normal”.
“*By 2024, more than 800 million adults were living with diabetes, representing a more than fourfold increase since 1990*”
“\*\**1 in 3 people suffer from insulin resistance and can cause depression*” (\*\*https://olhardigital.com.br/2021/09/24/medicina-e-saude/1-em-cada-3-pessoas-sofre-de-resistencia-a-insulina-e-pode-causar-depressao/)
“*More than 1.3 billion people will have diabetes in the world by 2050*” (https://veja.abril.com.br/saude/mais-de-13-bilhao-de-pessoas-terao-diabetes-no-mundo-ate-2050)
“*A new study released by Lancet, with data from 2022, shows that more than a billion people live with obesity in the world*” (https://www.paho.org/pt/noticias/1-3-2024-uma-em-cada-oito-pessoas-no-mundo-vive-com-obesidade)
All this due to a single factor: diet. I’m not referring to a diet full of processed foods, as this has already been proven to destroy the health of those who eat it. I’m referring to the modern diet, with carbohydrates (from any source, even from fruit) being the main macronutrient, little animal protein and practically no saturated fat of animal origin. This diet implementation has been systematically occurring for decades. Sugar conglomerates seeking profits? Government institutions (after all, they need voters to be stupid and vote for them), evil spiritual interference wanting to destroy or distort their path? I don’t know, I’ll leave the conspiracy theories to you!
The modern diet or diet is extremely inflammatory, and inflammation over a long period of time leads to autoimmune diseases such as diabetes and Hashimoto’s.
Absolutely any food in the plant kingdom will harm you, no matter how asymptomatic it may be. Plants are living beings and do not want to die and be eaten. To defend themselves from this, they did not evolve legs like animals. They specifically developed chemical mechanisms such as *oxalates, phytoalexins, glucosinolates, polyphenols, antinutrients* and many others that act to repel anything that wants to eat them, being fatal (as in the case of mushrooms), causing discomfort and the animal or insect discovering that the plant is not edible, releasing unpleasant smells or, in many cases, a combination of these factors. Not to mention genetically modified foods (almost the entire plant kingdom is genetically modified) that work as a steroid for the plants' defenses. - Lack of focus
- Poor decision-making
- Difficulty in establishing and maintaining relationships
- Difficulty getting pregnant and difficult pregnancy
- Low testosterone (medical reference values are low)
- Alzheimer's
- Diabetes
- Dementia
- Chances of developing autism when mothers do not eat meat and fat properly during pregnancy
- Worsening of the degree of autism when the child does not eat meat and fat (food selectivity)
- Insomnia and other sleep problems
- Lack of energy
- Poorly formed and fragile bone structure
- Lack of willpower
- Depression
- ADHD
Not having full physical and mental capacity harms you in many different ways, these are just a few examples that not only directly impact one person but everyone else around them.
Fortunately, there is an alternative to break out of this cycle of destruction, ***Carnivore Diet***.
I am not here to recommend a diet, eating plan or cure for your health problems, nor can I do so, as I am not a doctor (most doctors don't even know where the pancreas is, a mechanic is more useful in your life than a doctor, but that is a topic for another text.).
I came to present you with logic and facts in a very simplified way, from there you can do your own research and decide what is best for you.
---
## Defining the carnivore diet
Simply put, the carnivore diet is an elimination diet, where carbohydrates (including fruits), vegetable fats (soy, canola, cotton, peanuts, etc.), processed products and any type of plant, be it spices or teas, are completely removed.
### What is allowed on the carnivore diet?
- Animal protein
- Beef, preferably fatty cuts (including offal, liver, heart, kidneys, these cuts have more vitamins than anything else in the world)
- Lamb
- Eggs
- Fish and seafood
- Animal fat
- Butter
- Beef fat and tallow
- Salt
- No... salt does not cause high blood pressure. (explained later about salt and high consumption of saturated fats)
From now on I will list some facts that disprove the false accusations made against \*\*eating exclusively meat and fat.
# “Human beings are omnivores”
*“Our ancestors were gatherers and hunters*"
To determine the proportion of animal foods in our ancestors’ diets, we can look at the amount of δ15 nitrogen in their fossils. By looking at levels of this isotope, researchers can infer where animals reside in the food chain, identifying their protein sources. Herbivores typically have δ15N levels of 3–7 percent, carnivores show levels of 6–12 percent, and omnivores exhibit levels in between. When samples from Neanderthals and early modern humans were analyzed, they showed levels of 12 percent and 13.5 percent, respectively, even higher than those of other known carnivores, such as hyenas and wolves. And from an energy efficiency standpoint, hunting large animals makes the most sense. Gathering plants and chasing small animals provides far fewer calories and nutrients relative to the energy invested. In more recently studied indigenous peoples, we have observed a similar pattern that clearly indicates a preference for animal foods over plant foods. For example, in Vilhjalmur Stefansson’s studies of the Eskimos.
*“…fat, not protein, seemed to play a very important role in hunters’ decisions about which animals (male or female) to kill and which body parts to discard or carry away.”*
Why were our ancestors and more recent indigenous peoples so interested in finding fat? At a very basic level, it was probably about calories. By weight, fat provides more than twice as many calories as protein or carbohydrates. Furthermore, human metabolism makes fat an exceptionally valuable and necessary food. If we think of ourselves as automobiles that need fuel for our metabolic engines, we should not put protein in our gas tank. For best results, our metabolic engine runs most efficiently on fat or carbohydrates.
Eating animal foods has been a vital part of our evolution since the beginning. Katherine Milton, a researcher at UC Berkeley, came to the same conclusion in her paper “The Critical Role Played by Animal Source Foods in Human Evolution,” which states:
“Without routine access to animal-source foods, it is highly unlikely that evolving humans could have achieved their unusually large and complex brains while simultaneously continuing their evolutionary trajectory as large, active, and highly social primates. As human evolution progressed, young children in particular, with their rapidly expanding large brains and higher metabolic and nutritional demands relative to adults, would have benefited from concentrated, high-quality foods such as meat." - https://pubmed.ncbi.nlm.nih.gov/14672286/
Skeletons from Greece and Turkey reveal that 12,000 years ago, the average height of hunter-gatherers was five feet, nine inches for men and five feet, five inches for women. But with the adoption of agriculture, adult height plummeted—ending any hope these poor herders had of dunking a basketball or playing competitive volleyball, if such sports had existed at the time. By 3000 B.C., men in this region of the world were only five feet, three inches tall, and women were five feet, reflecting a massive decline in their overall nutritional status. Many studies in diverse populations show a strong correlation between adult height and nutritional quality. A study analyzing male height in 105 countries came to the following conclusion:
“In taller nations…consumption of plant proteins declines sharply at the expense of animal proteins, especially those from dairy products. Its highest consumption rates can be found in Northern and Central Europe, with the global peak in male height in the Netherlands (184 cm).”
In addition to the decline in height, there is also evidence that Native Americans buried at Dickson Mounds suffered from increased bacterial infections. These infections leave scars on the outer surface of the bone, known as the periosteum, with the tibia being especially susceptible to such damage due to its limited blood flow. Examination of tibias from skeletons found in the mounds shows that after agriculture, the number of such periosteal lesions increased threefold, with a staggering eighty-four percent of bones from this period demonstrating this pathology. The lesions also tended to be more severe and to appear earlier in life in the bones of post-agricultural peoples.
https://onlinelibrary.wiley.com/doi/full/10.1111/j.1747-0080.2007.00194.x
https://pubmed.ncbi.nlm.nih.gov/10702160/
# Cholesterol
Many “doctors” say that consuming saturated fat is harmful to your health, “your veins and arteries will clog with excess fat” “you will have a heart attack if you consume a lot of fat" and many other nonsense, and in exchange recommends that you replace fatty cuts of meat with lean meat and do everything with vegetable oil that causes cancer and makes men effeminate.
Your brain is basically composed of fat and water, your neurons are made and repaired with fat, your cells, the basic unit of life, are composed of fat and protein, many of your hormones, especially sexual ones, are made from fat, there is no logical reason not to consume saturated fat other than several false "scientific articles".
"The power plant of the cell is the mitochondria, which converts what we eat into energy. Ketones are an energy source derived from fat. Mitochondria prefer fat as energy (ketones) because transforming ketones into energy costs the mitochondria half the effort of using sugar (glucose) for energy." - https://pubmed.ncbi.nlm.nih.gov/28178565/
"With the help of saturated fats, calcium is properly stored in our bones. The interaction between calcium, vitamin D, and parathyroid hormone regulates calcium levels in the body. When there are calcium imbalances in the blood, our bones release calcium into the blood to find homeostasis." - https://www.healthpedian.org/the-role-of-calcium-in-the-human-body/
"The body needs cholesterol to support muscle repair and other cellular functions. This is why when there is cardiovascular disease, we see increased amounts of cholesterol in the area. Cholesterol is not there causing the problem, but the boat carrying fat was docked there for cholesterol and other nutrients to help fight the problem. Plaque is the body's attempt to deal with injury within the blood vessels." - *National Library of Medicine, “Cholesterol,” 2019*
"Initially, the Plaque helps blood vessels stay strong and helps the vessels maintain their shape. But with the perpetual cycle of uncontrolled inflammation and leftover debris from cellular repair (cholesterol), over time plaque begins to grow and harden, reducing blood flow and oxygen to the heart. Both inflammation and repair require copious amounts of cholesterol and fats. So the body keeps sending these fatty substances to the site of the plaque — until either repair wins (plaque becomes sclerotic scars in the heart muscle, causing heart failure) or inflammation wins (atherosclerotic heart attack)" - https://pubmed.ncbi.nlm.nih.gov/21250192/
Inflammation in Atherosclerotic Cardiovascular Disease - https://pubmed.ncbi.nlm.nih.gov/21250192/
"Study finds that eating refined carbohydrates led to an increased risk of cardiovascular disease and obesity" - https://pmc.ncbi.nlm.nih.gov/articles/PMC5793267/
# “Meat causes cancer”
Most of the misconceptions that red meat causes cancer come from a report by the World Health Organization's International Agency for Research on Cancer (IARC), which was released in 2015. Unfortunately, this report has been widely misrepresented by the mainstream media and is based on some very questionable interpretations of the science it claims to review.
A closer look at a 2018 report on its findings reveals that only 14 of the 800 studies were considered in its final conclusions—and every single study was observational epidemiology. Why the other 786 were excluded remains a mystery, and this group included many interventional animal studies that clearly did not show a link between red meat and cancer. Of the fourteen epidemiological studies that were included in the IARC report, eight showed no link between meat consumption and the development of colon cancer. Of the remaining six studies, only one showed a statistically significant correlation between meat and cancer.
In epidemiological research, one looks for correlation between two things and the strength of the correlation. Having just one study out of 800 that shows meat causes cancer is a mere fluke and becomes statistically insignificant.
Interestingly, this was a study by Seventh-day Adventists in America — a religious group that advocates a plant-based diet.
# Microbiota and Fiber
I have seen several people and “doctors” saying that eating only meat would destroy your microbiota. And I have come to the conclusion that neither “doctors” nor most people know what a microbiota is.
Microbiota is the set of several types of bacteria (millions) that exist in your stomach with the function of breaking down molecules of certain types of food that the body itself cannot get, fiber for example. Many times through the process of fermentation, which is why you have gas after eating your beloved oatmeal.
People unconsciously believe that the microbiota is something fixed and unchangeable, but guess what… it is not.
Your microbiota is determined by what you eat. If you love eating oatmeal, your microbiota will have a specific set of bacteria that can break down the oat molecule into a size that the body can absorb.
If you follow a carnivorous diet, your microbiota will adapt to digest meat.
### Fiber
Nutritional guidelines recommend large amounts of fiber in our diet, but what they don't tell you is that we only absorb around 6% of all the vegetable fiber we eat. In other words, it's insignificant!
Another argument used by doctors and nutritionists is that it helps you go to the bathroom, but this is also a lie. Fiber doesn't help you evacuate, it forces you to do so. With the huge amount of undigestible food in your stomach (fiber), the intestine begins to force contractions, making this fecal matter go down, making you go to the bathroom.
They also raise the argument that fibers are broken down into short-chain fatty acids, such as butyrate (butyric acid), propionate (propionic acid) and acetate (acetic acid). Butyrate is essential because it is the preferred fuel source for the endothelial cells of the large intestine.
Butter, cream, and cheese contain butyrate in its absorbable form. Butter is the best source of butyric acid, or butyrate. In fact, the origins of the word butyric acid come from the Latin word *butyro*—the same origins as the word butter.
“In 2012, a study in the Journal of Gastroenterology showed that reducing fiber (a precursor to short-chain fatty acids) helped participants with chronic constipation. The study lasted six months, and after two weeks without fiber, these participants were allowed to increase fiber as needed. These participants felt so much relief after two weeks without fiber that they continued without fiber for the entire six-month period. Of the high-fiber, low-fiber, and no-fiber groups, the zero-fiber participants had the highest bowel movement frequency.” - https://pmc.ncbi.nlm.nih.gov/articles/PMC3435786/
### Bioavailability
I said that our body can only absorb 6% of all the fiber we ingest. This is bioavailability, how much the body can absorb nutrients from a given food.
Meat is the most bioavailable food on the planet!
Grains and vegetables are not only not very bioavailable, but they also contain a huge amount of antinutrients. So if you eat a steak with some beans, you will not be able to absorb the nutrients from the beans, and the antinutrients in them will make it impossible to absorb a large amount of nutrients from the steak. https://pubmed.ncbi.nlm.nih.gov/23107545/
# Lack of nutrients and antioxidants in a carnivorous diet
A major concern with the carnivorous diet is the lack of vitamin C, which would consequently lead to scurvy.
Vitamin C plays an important role in the breakdown and transport of glucose into cells. In 2000 and 2001, the recommended daily intake of vitamin C effectively doubled. In fact, every 10 to 15 years, there has been a large increase in the recommended daily intake of vitamin C, as happened in 1974 and 1989. Interestingly, also in 1974, sugar prices became so high that high fructose corn syrup was introduced into the US market. Could the increase in readily available glucose foods and foods with high fructose corn syrup be a reason why we need more vitamin C? The question remains…. But this is not a cause for concern for the carnivore, liver is rich in vitamin C. You could easily reach the daily recommendation with liver or any cut of steak. 200-300g of steak already meets your needs and if the theory that the more sugar you eat, the more vitamin C you will get is true, then the more sugar you will eat is true. C is necessary if true, you could easily exceed the daily requirement.
Meat and seafood are rich in ALL the nutrients that humans need to thrive.
### Antioxidants
It is commonly said that fruits are rich in antioxidants but again this is a hoax, they are actually PRO-oxidants. These are substances that activate the mRF2 pathway of our immune system which causes the body to produce natural antioxidants.
The body produces antioxidants, but many occur naturally in foods, Vitamin C, Vitamin E, Selenium and Manganese are all natural antioxidants.
High concentrations of antioxidants can be harmful. Remember that high concentrations of antioxidants can increase oxidation and even protect against cancer cells.
# Salt
Consuming too much salt does not increase blood pressure and therefore increases the risk of heart disease and stroke. Studies show no evidence that limiting salt intake reduces the risk of heart disease.
A 2011 study found that diets low in salt may actually increase the risk of death from heart attacks and strokes. Most importantly, they do not prevent high blood pressure. https://www.nytimes.com/2011/05/04/health/research/04salt.html
# Sun
This is not a dietary issue specifically, but there are things that can I would like to present that is against common sense when talking about the sun.
It is common sense to say that the sun causes skin cancer and that we should not expose ourselves to it or, if we are exposed to the sun, use sunscreen, but no study proves that using sunscreen protects us from melanoma and basal cell carcinoma. The types of fatal melanomas usually occur in areas of the body that never see the sun, such as the soles of the feet.
https://www.jabfm.org/content/24/6/735
In 1978, the first sunscreen was launched, and the market grew rapidly, along with cases of melanoma.
Several studies show that sunscreens cause leaky gut (one of the main factors in chronic inflammation), hormonal dysfunction and neurological dysfunction.
https://pubmed.ncbi.nlm.nih.gov/31058986/
If your concern when going out in the sun is skin cancer, don't worry, your own body's natural antioxidants will protect you. When they can no longer protect you, your skin starts to burn. (If you have to stay in the sun for work, for example, a good way to protect yourself is to rub coconut oil on your skin or just cover yourself with a few extra layers of thin clothing and a hat).
Sunscreen gives you the false sense of protection by blocking the sunburn, so you stay out longer than your skin can handle, but sunscreens can only block 4% of UVA and UVB rays.
www.westonaprice.org/health-topics/environmental-toxins/sunscreens-the-dark-side-of-avoiding-the-sun/
Interestingly, vitamin D deficiency is linked to increased cancer risks. It's a big contradiction to say that the greatest provider of vit. D causes cancer…
https://med.stanford.edu/news/all-news/2010/10/skin-cancer-patients-more-likely-to-be-deficient-in-vitamin-d-study-finds.html
Important roles of vitamin D:
- **Regulation of Bone Metabolism**
- Facilitates the **absorption of calcium and phosphorus** in the intestine.
- Promotes bone mineralization and prevents diseases such as **osteoporosis**, **rickets** (in children) and **osteomalacia** (in adults).
- **Immune Function**
- Modulates the immune system, helping to reduce inflammation and strengthen the defense against infections, including **colds**, **flu** and other diseases.
- May help reduce the incidence of autoimmune diseases such as **multiple sclerosis** and **rheumatoid arthritis**. - **Muscle Health**
- Contributes to muscle strength and the prevention of weakness, especially in the elderly.
- Reduces the risk of falls and fractures.
- **Cardiovascular Function**
- May help regulate blood pressure and heart function, reducing the risk of cardiovascular disease.
- **Hormonal Balance**
- Influences the production of hormones, including those associated with fertility and the functioning of the endocrine system.
- Plays a role in insulin metabolism and glucose sensitivity.
- **Brain Function and Mental Health**
- Participates in mood regulation, which may reduce the risk of **depression** and improve mental health.
- Has been associated with the prevention of neurodegenerative diseases, such as **Alzheimer's**.
- **Anticancer Role**
- Evidence suggests that vitamin D may inhibit the proliferation of cancer cells, especially in breast, prostate and colon cancers. - **Role in General Metabolism**
- Contributes to metabolic health, regulating cellular growth and repair processes.
---
I tried to present everything in the simplest and most understandable way possible, but there are things that require prior knowledge to truly understand. Below is a list of books that will show you everything I have shown you in a more technical and in-depth way.
### Book Recommendations
https://amzn.to/3EbjVsD
https://amzn.to/4awlnBZ
All of my arguments have studies to validate them. Feel free to read them all and draw your own conclusions about what is best for you and your life.
-

@ 83279ad2:bd49240d
2025-01-24 09:15:37
備忘録として書きます。意外と時間がかかりました。全体で1時間くらいかかるので気長にやりましょう。
仮想通貨取引所(販売所ではないので、玄人が使えばお得らしい)かつBitcoinの送金手数料が無料(全ての取引所が無料ではない、例えばbitbankは0.0006bitcoinかかる)なので送金元はGMOコインを使います。(注意:GMOコインは0.02ビットコイン以下は全額送金になってしまいます)
今回はカストディアルウォレットのWallet of Satoshiに送金します。
以下手順
1. GMOコインでbitcoinを買います。
2. GMOコインの左のタブから入出金 暗号資産を選択します。
3. 送付のタブを開いて、+新しい宛先を追加するを選択します。
4. 送付先:GMOコイン以外、送付先ウォレット:プライベートウォレット(MetaMaskなど)、受取人:ご本人さま を選んで宛先情報の登録を選ぶと次の画面になります。<br>
5. 宛先名称にwallet of satoshi(これはなんでも良いです わかりやすい名称にしましょう) wallet of satoshiを開いて、受信→Bitcoin On-Chainからアドレスをコピーして、ビットコインアドレスに貼り付けます。<br>
6. 登録するを押します。これで送金先の登録ができました。GMOコインの審査がありますがすぐ終わると思います。
7. ここから送金をします。送付のタブから登録したビットコインの宛先リストwallet of satoshiを選択し、送付数量と送付目的を選択して、2段階認証をします。<br>
8. 実行を押せば終わりです。もうあなたがやることはありません。送金が終わるのを40分くらい眺めるだけです。<br>
8. 取引履歴のタブから今の送金のステータスが見れます。<br>
9. 15分くらい待つとステータスが受付に変わります。<br>
10. 20分くらい待つとトランザクションIDが表示されます。 <br>
<br>この時点からwallet of satoshiにも送金されていることが表示されます。(まだ完了はしていない) <br>

11. ステータスが完了になったら送金終わりです。<br> <br> wallet of satoshiにも反映されます。<br> 
-----------
お疲れ様でした!
-

@ 604e96e0:20279eb2
2023-08-11 18:39:36
notacomment allows you to zap nostr notes when you comment on them. In order to use notacomment, you have to run a script yourself either on your own computer or in the cloud somewhere. To get started open https://github.com/SamSamskies/notacomment in a browser tab.
At this point, I'm sure a lot of you are feeling like this:

Let's breakdown the instructions from the README.
## Prerequisites
Node.js and npm - I suggest installing the latest Node.js LTS version from https://nodejs.org. That should also install npm.
Once installation is complete, open your terminal. On a Mac you can press cmd + spacebar and type in `terminal` to open the terminal. On other platforms, you'll have to ask ChatGPT 😂
.
To verify installation of Node.js type `node -v`. To verify installation type `npm -v`.
It should look something like this:

Leave the terminal open.
## Downloading the code to your computer
The easiest way to download the code is to download the zip file from the GitHub repo. Remember that first link I told you to open? That's the GitHub repo. Click the green button that says `Code` on it and click `Download ZIP` from the menu.

Now unzip the file and then navigate to the folder in the terminal. To navigate to the folder use the `cd` command. If you unzipped the folder in the `Downloads` folder, you can navigate to the folder by typing `cd ~/Downloads/notacomment-main/`.
## Usage With Strike
1. Create an account with Strike if you don't already have one https://strike.me/download/
1. Get a Strike API key with all the payment scopes from https://dashboard.strike.me/
1. Create a .env file and provide NOSTR_NSEC and STRIKE_API_KEY values (see .env.example)
1. Install the dependencies using npm or yarn or whatever your heart desires
1. Make sure you have money in your Strike account
1. Run the script `npm start`
Keep in mind that Strike pays the invoices from your cash balance. This means the payment rounds up to the nearest cent when paying an invoice, so if you set the zap amount to 1 sat, you'll be sending more money to Strike than the person you are zapping with every zap.
## Usage With LNbits
I recommend making a separate wallet from your main LNbits wallet for usage with notacomment in case you accidentally leak the admin key.
1. Create a .env file and provide NOSTR_NSEC, LNBITS_ADMIN_KEY, and LNBITS_URL values (see .env.example)
1. Install the dependencies using npm or yarn or whatever your heart desires
1. Make sure you have sats in your LNbits wallet
1. Run the script `npm start`
## Usage With Nostr Wallet Connect
1. Create a NWC connection string using something like https://nwc.getalby.com/
1. Create a .env file and provide NOSTR_NSEC and NWC_CONNECTION_STRING values (see .env.example)
1. Install the dependencies using npm or yarn or whatever your heart desires
1. Make sure you have sats in your wallet that you generated the NWC connection string with
1. Run the script `npm start`
<br />
<br />
Screenshot of terminal with commands to install dependencies, create .env file, open .env file, and start the script:

-

@ a012dc82:6458a70d
2025-01-29 15:27:17
In an unprecedented development in the realm of digital currencies, the Bitcoin network has achieved a groundbreaking milestone: the count of blockchain addresses possessing over $1,000 in Bitcoin has eclipsed 8 million. This landmark achievement is not just a numerical feat but a testament to the burgeoning confidence and interest in Bitcoin as a viable financial asset. It marks a pivotal shift in the cryptocurrency's journey from a digital novelty to a mainstream financial instrument, capturing the attention of a diverse range of investors, from individual enthusiasts to institutional players. This surge in Bitcoin addresses is a strong indicator of the cryptocurrency's increasing acceptance and its evolving role in reshaping the global financial landscape.
**Table Of Content**
- The Surge in Bitcoin Addresses
- Implications of Growing Bitcoin Addresses
- Bitcoin’s Monetization and Market Dynamics
- Bitcoin's Recent Performance and Market Sentiment
- The Future Outlook of Bitcoin and Digital Currencies
- Conclusion
- FAQs
**The Surge in Bitcoin Addresses**
Recent analytical data provided by Blockware Solutions and Glassnode paints a vivid picture of Bitcoin's rapidly expanding footprint in the digital asset space. The remarkable escalation to over 8 million Bitcoin addresses holding a value exceeding $1,000 each is more than just a statistical anomaly. It represents a collective movement, a growing wave of global participants who are now engaging with Bitcoin either as an investment, a transactional currency, or as a hedge against traditional financial systems. This increase is a reflection of Bitcoin's rising appeal and its growing integration into various financial strategies, transcending traditional market barriers and establishing itself as a significant player in the realm of investment options.
**Implications of Growing Bitcoin Addresses**
The surge in Bitcoin addresses bearing over $1,000 of Bitcoin is far more than a mere statistic; it is an indicator of a paradigm shift in the global financial landscape. This growth signifies not only an increasing embrace of Bitcoin by individual investors but also a broader, more systemic integration into the financial strategies of diverse entities, ranging from small-scale investors to large financial institutions. This trend suggests a growing recognition of Bitcoin's potential as a stable and lucrative asset, challenging traditional perceptions of currency and investment. It heralds a new era where digital assets are increasingly viewed as credible and essential components of diversified investment portfolios.
**Bitcoin’s Monetization and Market Dynamics**
The concept of monetization in the context of Bitcoin has taken on a significant role in this new era of digital finance. The rising number of valuable Bitcoin addresses signals a shift towards viewing Bitcoin not just as a digital token, but as a potent financial asset capable of generating revenue and sustaining value. This notion of monetization, theorized by financial analysts, is becoming a tangible reality as more entities begin to realize the income-generating potential of Bitcoin. Blockware's insights suggest that the trajectory of Bitcoin is not only upwards in terms of value but also expansive, with the potential to attract even more investors seeking to capitalize on this digital gold rush.
**Bitcoin's Recent Performance and Market Sentiment**
Bitcoin's performance in the financial market has recently been nothing short of stellar, with a noticeable upsurge in its value. A significant factor contributing to this trend is the anticipation surrounding the potential approval of Bitcoin exchange-traded funds by the U.S. Securities and Exchange Commission. This speculation has created a ripple effect, invigorating investor sentiment and catalyzing robust activity among large-scale Bitcoin holders, colloquially known as 'whales.' These movements underscore a growing optimism in the market about Bitcoin's legitimacy and potential as a mainstream financial instrument, further cementing its role as a pivotal player in the global economic arena.
**The Future Outlook of Bitcoin and Digital Currencies**
As we witness the remarkable growth in Bitcoin's popularity and acceptance, it's imperative to look ahead and consider the future trajectory of this leading cryptocurrency and its counterparts. This section would delve into the potential long-term implications of the current trends in Bitcoin ownership. It would explore various scenarios, from the continued mainstreaming of Bitcoin to its potential challenges, including regulatory developments and market volatility. Additionally, the potential impact of emerging technologies within the blockchain sphere and their influence on the usability and security of Bitcoin would be examined. The aim is to provide an informed speculation on how Bitcoin's current ascendance might shape not just its own future but also the broader landscape of digital currencies and their role in the evolving global economy.
**Conclusion**
The milestone of 8 million Bitcoin addresses holding over $1,000 each is more than just a landmark in the cryptocurrency's history; it is a harbinger of the evolving role of digital currencies in the global economy. This development is not merely about the appreciation in Bitcoin's value; it signifies a broader shift in the perception and utilization of digital assets. As Bitcoin continues to embed itself into the fabric of global finance, its influence and implications for the future of money and investments are profound, potentially reshaping the financial landscape in ways that are only beginning to be understood.
**FAQs**
**How many Bitcoin addresses now hold over {{text}},000?**
Over 8 million Bitcoin addresses currently hold more than $1,000 in Bitcoin.
**What does the increase in Bitcoin addresses indicate?**
The increase indicates growing confidence in Bitcoin as a viable financial asset and its broader acceptance globally.
**How has Bitcoin's recent market performance been?**
Bitcoin has shown a significant gain, nearly 25% in recent weeks, influenced by optimistic market sentiments.
**What impact could the approval of Bitcoin ETFs have?**
The approval of Bitcoin ETFs by the U.S. SEC could further boost investor confidence and increase Bitcoin's market activity.
**What is the future outlook for Bitcoin and digital currencies?**
The future outlook includes continued mainstream adoption, evolving regulatory landscapes, and potential technological advancements impacting Bitcoin's usability and security.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
*DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.*
-

@ 21ac2956:09d1e2df
2025-01-22 15:27:00
## [kakoi](https://github.com/betonetojp/kakoi) の仕様についてのメモ
### キーボード操作
* 左手での操作に最適化
| キー | 動作 |
|:-|:-|
| ESC | 設定画面 |
| F1 / F12 | ポストバーの表示と非表示 |
| F2 | 時間の表示と非表示 |
| F3 | ユーザーアイコンの表示と非表示 |
| F4 | 名前の表示と非表示 |
| F5 | Geminiによるタイムラインまとめ画面を表示 |
| F9 / Z | コンテンツの折り返し表示の切り替え (余白ダブルクリックでも動作) |
| F10 | ユーザーリストとキーワード通知の設定画面 (余白右クリックでも動作) |
| F11 | メイン画面の表示と非表示 (ポストバー表示) |
| Shift + W | イベント最上行へ移動 |
| W / ↑| イベント選択上移動 |
| S / ↓ | イベント選択下移動 |
| Shift + S | イベント最下行へ移動 |
| A / ← | Webビューを開く (イベントを右クリックでも動作) |
| F / → | リアクションを送信 (イベントをダブルクリックでも動作) |
| 1 ~ 0 | リアクションを選択 |
| R | 返信 |
| B | リポスト |
| Q | 引用 |
| C | Webビューを閉じる |
| Ctrl + Shift + A | メイン画面をアクティブにする |
### タイムライン
* kind:1, 6, 7, 16を取得して表示する
* フォロイーの名前の前には * が付く
### フォローリスト(kind:3)
* 参照のみで更新はしない
* F10 で開くユーザーリストでユーザーを選択し petname セルをクリックすることで未フォローユーザーにもペットネームを設定可能(ローカル保存)
### プロフィール(kind:0)
* F10 で開くユーザーリストでユーザーを選択し picture セルをクリックすることでユーザーのアイコン表示を変更可能(ローカル保存)
### 返信([NIP-10](https://github.com/nostr-protocol/nips/blob/master/10.md) kind:1)
* kakoi のタイムラインに流れるすべてのイベント種に返信可能とする
* スレッドを考慮せず、単一イベントへの単発返信とする
* e タグは marker と返信先 pubkey は設定していない。 relay-url には空文字を設定
```json
["e", "返信先 event-id", ""]
```
* p タグは 返信先 pubkey ひとつだけを指定
### リポスト([NIP-18](https://github.com/nostr-protocol/nips/blob/master/18.md) kind:6 , 16)
* kakoi のタイムラインに流れるすべてのイベント種をリポスト可能
* kind:1はkind:6。その他はkind:16でリポストする
* e タグは relay-url に空文字を設定
```json
["e", "リポスト元 event-id", ""]
```
### 引用([NIP-18](https://github.com/nostr-protocol/nips/blob/master/18.md) kind:1)
* q タグは relay-url に空文字を設定
```json
["q", "引用元 event-id", ""]
```
-

@ 57d1a264:69f1fee1
2025-02-02 00:03:39

Welcome to the latest updated version of **Stacker News Media Kit & Brand Guidelines `v1.2`**, a pivotal location where all the visual elements find place and help us understand how to use them to have our communications cohesive. SN brand identity is built on simplicity, trust, innovation and a taste of Texas's Wild West. With the following guidelines, as [promised](https://stacker.news/items/855556/r/Design_r?commentId=855753), I'll try to outline the essential elements of SN visual language to be easily usable internally and externally.
As third interaction from the previous [discussion](https://stacker.news/items/786223), here below you will find all the media assets in PNG and SVG downloadable from this [zip file](https://nosto.re/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zip). BTW: I've been using **`Nostr`** 🌸 **Blossom Serverservers** [check them out](https://blossomservers.com/), it's a really cool idea! In case the file will be not available we can always upload it in other servers. Just let me know if any issue downloading it, ideally I made three copies available from:
- https://nosto.re/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zip
- https://blossom.poster.place/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zip
- https://nostr.download/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zip
The source file of all these assets still are the same [Figma file](https://www.figma.com/design/ZL3FLItd9j48pzKVi4qlOy/Stacker.News-Media-Kit?node-id=3-16&t=oEbUcC1tmLDRXgdH-0) and the [PenPot file](https://design.penpot.app/#/workspace/7ad540b5-8190-815d-8005-5685b9c670bc/7ad540b5-8190-815d-8005-5685c186216e?page-id=2643bc5a-0d34-80b2-8005-58099eabda41). This last one, has many issues and does not allow yet the same flexibility as Figma. Both files are open for contributions and comments, just need to register a dummy/anonymous account for each of the tools.
> **Note:** To use these assets across SN, just copy-paste the image relative code, i.e.:

# Stacker News Logotype
SN logo is the most recognizable visual identifier of Stacker News. It captures the essence of its brand and is to be used across the platform and other marketing materials **consistently**. Find below all the possible variations and colors. Ideally you should stick with it to maintain SN identity coherent, or propose something new if you feel like. If you have any question on how to place or use the logo, DO ask below, and we'll help sort it out.
| Avatar on transparent BG | Avatar on BG | Logo Extended | Logo Vertical |#|
|---|---|---|---|---|
|  `` |  `` |  ``|  `` |Oil Black|
|  `` |  `` |  `` |  ``| Golden Yellow |
|  `` |  `` |  `` |  ``|With Shadow |
# Stacker News Typography

This is the typography SN had used to create its logo. [Download LightningVolt OpenType Font file.otf](http://honeyanddeath.web.fc2.com/FontFile/honeyanddeath_Lightningvolt.zip) designed by **[Honey&Death](http://honeyanddeath.web.fc2.com/fnt_Lightningvolt.html)**, install it in your computer and play with it.
Typography is essential to identify, increase readability and create consistency of brands. SN uses the default `font-family:sans-serif;` of your device's OS, usually are the most common and already installed in your device: `system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Noto Sans", "Liberation Sans", Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji"`. Those are mostly used for:
# Example Header H1
## Example Header H2
### Example Header H3
#### Example Header H4
##### Example Header H5
**Example paragraph text**
The fonts selected will help to communicate the personality of the brand and provide maximum legibility for both print and screen.
`Example <code>`
For code, the approach is the same. Let's the device OS select its default `monospace` one. For example, on Mac will be one of the following:
```
SFMono-Regular, Menlo, Monaco, Consolas, "Liberation Mono", "Courier New",`
```
# Stacker News Colors
A thoughtfully curated color palette gives SN trust, professionalism, and approachability. Colors play a key role in creating consistent visual experiences through digital and print communications. Make sure you are using the right color codes below:
| # | Name | HEX code | RGB code | HLS |
|---|---|---|---|---|
|  | Bitcoin-only | `#F6911D` | `rgb(246,145,29)` | `hsl(32,92.3%,53.9%)` |
|  | Blackr | `#000000` | `rgb(0,0,0)` | `hsl(0,0%,0%)` |
|  | Dark | `#121214` | `rgb(18,18,20)` | `hsl(240,5.3%,7.5%)` |
|  | Gold | `#FADA5E` | `rgb(250,218,94)` | `hsl(48,94%,67.5%)` |
|  | Gray | `#969696` | `rgb(150,150,150)` | `hsl(0,0%,58.8%)` |
|  | Light | `#F0F0F0` | `rgb(240,240,240)` | `hsl(0,0%,94.1%)` |
|  | Nostrch | `#8C25F4` | `rgb(140,37,244)` | `hsl(270,90.4%,55.1%)` |
|  | Pinkish | `#E685B5` | `rgb(230,133,181)` | `hsl(330,66%,71.2%)` |
|  | Ruby | `#C03221` | `rgb(192,50,33)` | `hsl(6,70.7%,44.1%)` |
|  | Sky Hover | `#007CBE` | `rgb(0,124,190)` | `hsl(201,100%,37.3%)` |
|  | Sky Links | `#2E99D1` | `rgb(46,153,209)` | `hsl(201,63.9%,50%)` |
|  | Sky Visited | `#56798E` | `rgb(86,121,142)` | `hsl(203,24.6%,44.7%)` |
|  | So Fiat | `#5C8001` | `rgb(92,128,1)` | `hsl(77,98.4%,25.3%)` |
# Stacker News Icons
SN utilizes a set of bespoke icons that support its communication internally across the platform. Icons help bring instant, intuitive cues for various types of content and features. We share them here for you so you can use as you wish and satisfy your creative needs.
|  `` |  `` |  `[Bounty](https://m.stacker.news/75607)` |  `[Caret](https://m.stacker.news/75608)` |  `[Cowboy](https://m.stacker.news/75609)` |  `[Sun](https://m.stacker.news/75610)` |
|---|---|---|---|---|---|
|  **`[Edit](https://m.stacker.news/75611)`** |  **`[Gun](https://m.stacker.news/75612)`** |  **`[Horse](https://m.stacker.news/75613)`** |  **`[Info](https://m.stacker.news/75614)`** |  **`[Moon](https://m.stacker.news/75615)`** |  **`[Lightning](https://m.stacker.news/75616)`**|
|  **`[Bald Lost Hat](https://m.stacker.news/75617)`**|  **`[Markdown](https://m.stacker.news/75618)`**|  **`[Nostr](https://m.stacker.news/75619)`**|  **`[Referral](https://m.stacker.news/75620)`**|  **`[Rewards](https://m.stacker.news/75621)`**|  **`[Horse Lost Saddle](https://m.stacker.news/75622)`**|  **`[Search](https://m.stacker.news/75623)`** |
| **`[Shoot](https://m.stacker.news/75624)`** | **`[Texas](https://m.stacker.news/75625)`** |  **`[Upload](https://m.stacker.news/75626)`** |  **`[Zap Zap](https://m.stacker.news/75627)`** |||
# Stacker News Banners
Banners are important visual elements used in our digital platforms and marketing materials. They help to highlight key stories, features or announcements while maintaining our brand aesthetic.
Here below you'll find custom banners for Sn and for individial territories. I try to build those that I follow most, for now @AGORA is the only one that designed its own banners. Comment below if you'd like some banners for your territory!
#### SN Dark background
|970x250|
|---|
| ```|``|``|
|728x90|
|---|
|  `` |
#### SN Gold background
|970x250|
|---|
|`` |
|250x250|300x250|300x600|
|---|---|---|
|`` | `` |`` |
|728x90|
|---|
|`` |
#### SN by @Jon_Hodl
|970x250|
|---|
| `` |
|250x250|300x250|300x600|
|---|---|---|
| `` |  ``| `` |
|728x90|
|---|
|`` |
#### ~AGORA territory
The SN P2P Marketplace
|970x250|
|---|
| `` |
|250x250|300x250|300x600|
|---|---|---|
| `` | ``|``|
|728x90|
|---|
| ``|
#### ~alter_native territory
|970x250|
|---|
| ``|
|250x250|300x250|300x600|
|---|---|---|
|``|``|``|
|728x90|
|---|
|`` |
#### ~bitcoin_beginners
|970x250|
|---|
| `` |
|250x250|300x250|300x600|
|---|---|---|
| ``|``|`` |
|728x90|
|---|
| ``|
#### ~Design territory
|970x250|
|---|
|``|
|250x250|300x250|300x600|
|---|---|---|
|``|``|``|
|728x90|
|---|
|``|
#### ~Music territory
|970x250|
|---|
| ``|
|250x250|300x250|300x600|
|---|---|---|
|``|``|``|
|728x90|
|---|
| ``|
# Anything else we could add?
If you feel something is missing, or you know a better tool to manage this media kit for SN in a collaborative and FOSS way then, DO share it in a comment below
Territory owners [^1], do you need banners for your territory? Feel free to edit the figma file liked above or comment below sharing your needs or ideas, I'll try to do something for you.
By following these guidelines, we ensure consistency and professionalism in every case where Stacker News is represented here internally to stackers or to our audience in the KYC internet, reinforcing SN credibility as a trusted source for data-driven journalism.
[^1]: FYI: @Aardvark @AGORA @anna @antic @AtlantisPleb @Bell_curve @benwehrman @bitcoinplebdev @Bitter @BlokchainB @ch0k1 @davidw @ek @elvismercury @frostdragon @grayruby @HODLR @inverselarp @Jon_Hodl @k00b @marks @MaxAWebster @mega_dreamer @niftynei @nout @OneOneSeven @OT @PlebLab @Public_N_M_E @RDClark @realBitcoinDog @roytheholographicuniverse @siggy47 @softsimon @south_korea_ln @theschoolofbitcoin @TNStacker @UCantDoThatDotNet @Undisciplined
originally posted at https://stacker.news/items/872925
-

@ 6e75f797:a8eee74e
2023-08-07 13:16:42
Last night I started a nostr community multiplayer instance for No Man's Sky [on ZapStream](https://zap.stream/) and before we knew it, we had 4 Nostrichs arriving on the genesis planet to join the fun.

NSM is an deterministic, procedurally generated open universe where players can explore, quest, build, combat and have fun together. Every new system discovered is generated when the first Traveller enters the system making the game a unique experience for any open world gaming fan.
If you fancy joining us in the Nostrverse let me know and I'll friend you in #NMS and on Steam or Epic. If you just want to watch the fun, participate in naming systems, planets, fauna and flora come and hang out in my stream or the stream of [Oceanbee](nostr:npub1wqxxe0cjaxnvmrv4lkvx8d5dlft7ewswyn09w5v7fg7642fgzm7srucxws), [HolgerHatGarKeineNode](nostr:npub1pt0kw36ue3w2g4haxq3wgm6a2fhtptmzsjlc2j2vphtcgle72qesgpjyc6) or [taette](npub1yh0dl6pazf55025qvp860lstpscuy0kj2a5lfhxlk400m968vgpql5vsnd).

### If you already own NMS, feel free to add me!
My NMS friend code is: EMAZ-KMHT-ZPFXP
See you in space Traveller! - TheGrinder
-

@ 9e69e420:d12360c2
2025-01-26 01:31:47
## Chef's notes
# arbitray
- test
- of
- chefs notes
## hedding 2
## Details
- ⏲️ Prep time: 20
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 5
## Ingredients
- Test ingredient
- 2nd test ingredient
## Directions
1. Bake
2. Cool
-

@ 9e69e420:d12360c2
2025-01-25 22:16:54
President Trump plans to withdraw 20,000 U.S. troops from Europe and expects European allies to contribute financially to the remaining military presence. Reported by ANSA, Trump aims to deliver this message to European leaders since taking office. A European diplomat noted, “the costs cannot be borne solely by American taxpayers.”
The Pentagon hasn't commented yet. Trump has previously sought lower troop levels in Europe and had ordered cuts during his first term. The U.S. currently maintains around 65,000 troops in Europe, with total forces reaching 100,000 since the Ukraine invasion. Trump's new approach may shift military focus to the Pacific amid growing concerns about China.
[Sauce](https://www.stripes.com/theaters/europe/2025-01-24/trump-europe-troop-cuts-16590074.html)
-

@ 9e69e420:d12360c2
2025-01-25 14:32:21
| Parameters | Dry Mead | Medium Mead | Sweet Mead |
|------------|-----------|-------------|------------|
| Honey | 2 lbs (900 grams) | 3 lbs (1.36 kg) | 4 lbs (1.81 kg) |
| Yeast | ~0.07 oz (2 grams) | ~0.08 oz (2.5 grams) | ~0.10 oz (3 grams) |
| Fermentation | ~4 weeks | 4 to 6 weeks | 6 to 8 weeks |
| Racking | Fortnight or later | 1 month or after | ~2 months and after |
| Specific Gravity | <1.010 | ~1.01 to ~1.025 | >1.025 |
-

@ 9e69e420:d12360c2
2025-01-23 15:09:56
President Trump has ordered thousands of additional troops to the U.S.-Mexico border as part of an effort to address immigration and security issues. This directive builds on his initial commitment to increase military presence along the border.
Currently, around 2,200 active-duty personnel and approximately 4,500 National Guardsmen are stationed there. The new deployment aims to enhance the capabilities of Joint Task Force-North, allowing troops to assist in operations and provide intelligence support.
Details on specific units remain unclear. The situation is still developing, with updates expected.
[Sauce](https://thepostmillennial.com/breaking-president-trump-orders-thousands-of-troops-to-the-us-border-with-mexico)
-

@ 6be5cc06:5259daf0
2025-01-21 20:58:37
A seguir, veja como instalar e configurar o **Privoxy** no **Pop!_OS**.
---
### **1. Instalar o Tor e o Privoxy**
Abra o terminal e execute:
```bash
sudo apt update
sudo apt install tor privoxy
```
**Explicação:**
- **Tor:** Roteia o tráfego pela rede Tor.
- **Privoxy:** Proxy avançado que intermedia a conexão entre aplicativos e o Tor.
---
### **2. Configurar o Privoxy**
Abra o arquivo de configuração do Privoxy:
```bash
sudo nano /etc/privoxy/config
```
Navegue até a última linha (atalho: **`Ctrl`** + **`/`** depois **`Ctrl`** + **`V`** para navegar diretamente até a última linha) e insira:
```bash
forward-socks5 / 127.0.0.1:9050 .
```
Isso faz com que o **Privoxy** envie todo o tráfego para o **Tor** através da porta **9050**.
Salve (**`CTRL`** + **`O`** e **`Enter`**) e feche (**`CTRL`** + **`X`**) o arquivo.
---
### **3. Iniciar o Tor e o Privoxy**
Agora, inicie e habilite os serviços:
```bash
sudo systemctl start tor
sudo systemctl start privoxy
sudo systemctl enable tor
sudo systemctl enable privoxy
```
**Explicação:**
- **start:** Inicia os serviços.
- **enable:** Faz com que iniciem automaticamente ao ligar o PC.
---
### **4. Configurar o Navegador Firefox**
Para usar a rede **Tor** com o Firefox:
1. Abra o Firefox.
2. Acesse **Configurações** → **Configurar conexão**.
3. Selecione **Configuração manual de proxy**.
4. Configure assim:
- **Proxy HTTP:** `127.0.0.1`
- **Porta:** `8118` (porta padrão do **Privoxy**)
- **Domínio SOCKS (v5):** `127.0.0.1`
- **Porta:** `9050`
5. Marque a opção **"Usar este proxy também em HTTPS"**.
6. Clique em **OK**.
---
### **5. Verificar a Conexão com o Tor**
Abra o navegador e acesse:
```text
https://check.torproject.org/
```
Se aparecer a mensagem **"Congratulations. This browser is configured to use Tor."**, a configuração está correta.
---
### **Dicas Extras**
- **Privoxy** pode ser ajustado para bloquear anúncios e rastreadores.
- Outros aplicativos também podem ser configurados para usar o **Privoxy**.
-

@ 16d11430:61640947
2025-01-21 20:40:22
In a world drowning in Monopoly money, where people celebrate government-mandated inflation as "economic growth," it takes a special kind of clarity—nay, cynicism—to rise above the fiat circus. This is your guide to shedding your fiat f**ks and embracing the serene chaos of sound money, all while laughing at the absurdity of a world gone fiat-mad.
---
1. Don’t Feed the Clowns
You know the clowns I’m talking about: central bankers in their tailored suits and smug smirks, wielding "tools" like interest rates and quantitative easing. Their tools are as real as a magician's wand, conjuring trillions of dollars out of thin air to keep their Ponzi economy afloat.
Rule #1: Don’t engage. If a clown offers you a hot take about the "strength of the dollar," smile, nod, and silently wonder how many cups of coffee their paycheck buys this month. Spoiler: fewer than last month.
---
2. Turn Off the Fiat News
Do you really need another breathless headline about the next trillion-dollar deficit? Or the latest clickbait on why you should care about the stock market's emotional rollercoaster? Mainstream media exists to distract you, to keep you tethered to their illusion of importance.
Turn it off. Replace it with something sound, like the Bitcoin whitepaper. Or Nietzsche. At least Nietzsche knew we were doomed.
---
3. Mock Their Inflationary Gospel
Fiat apologists will tell you that inflation is "necessary" and that 2% a year is a "healthy target." Sure, because a little robbery every year keeps society functioning, right? Ask them this: "If 2% is healthy, why not 20%? Why not 200%? Why not Venezuela?"
Fiat logic is like a bad acid trip: entertaining at first, but it quickly spirals into existential horror.
---
4. Celebrate the Fiat Freakshow
Sometimes, the best way to resist the fiat clown show is to revel in its absurdity. Watch politicians print money like teenagers running up a credit card bill at Hot Topic, then watch the economists applaud it as "stimulus." It’s performance art, really. Andy Warhol could never.
---
5. Build in the Chaos
While the fiat world burns, Bitcoiners build. This is the ultimate "not giving a fiat f**k" move: creating a parallel economy, one satoshi at a time. Run your Lightning node, stack sats, and laugh as the fiat circus consumes itself in a flaming pile of its own debt.
Let them argue about who gets to rearrange the deck chairs on the Titanic. You’re busy designing lifeboats.
---
6. Adopt a Fiat-Free Lifestyle
Fiat-free living means minimizing your entanglement with their clown currency. Buy meat, not ETFs. Trade skills, not IOUs. Tip your barber in Bitcoin and ask if your landlord accepts Lightning. If they say no, chuckle and say, “You’ll learn soon enough.”
Every satoshi spent in the real economy is a slap in the face to the fiat overlords.
---
7. Find the Humor in Collapse
Here’s the thing: the fiat system is unsustainable. You know it, I know it, even the clowns know it. The whole charade is destined to collapse under its own weight. When it does, find solace in the absurdity of it all.
Imagine the central bankers explaining hyperinflation to the public: "Turns out we can't print infinity after all." Pure comedy gold.
---
8. Stay Ruthlessly Optimistic
Despite the doom and gloom, there’s hope. Bitcoin is hope. It’s the lifeboat for humanity, the cheat code to escape the fiat matrix. Cynicism doesn’t mean nihilism; it means seeing the rot for what it is and choosing to build something better.
So, don’t just reject the fiat clown show—replace it. Create a world where money is sound, transactions are sovereign, and wealth is measured in energy, not debt.
---
Final Thought: Burn the Tent Down
Aldous Huxley once envisioned a dystopia where people are so distracted by their own hedonistic consumption that they don’t realize they’re enslaved. Sound familiar? The fiat clown show is Brave New World on steroids, a spectacle designed to keep you pacified while your wealth evaporates.
But here’s the punchline: they can only enslave you if you care. By rejecting their system, you strip them of their power. So let them juggle their debts, inflate their bubbles, and print their trillions. You’ve got Bitcoin, and Bitcoin doesn’t give a fiat f**k.
Welcome to the satirical resistance. Now go stack some sats.
-

@ 9e69e420:d12360c2
2025-01-21 19:31:48
Oregano oil is a potent natural compound that offers numerous scientifically-supported health benefits.
## Active Compounds
The oil's therapeutic properties stem from its key bioactive components:
- Carvacrol and thymol (primary active compounds)
- Polyphenols and other antioxidant
## Antimicrobial Properties
**Bacterial Protection**
The oil demonstrates powerful antibacterial effects, even against antibiotic-resistant strains like MRSA and other harmful bacteria. Studies show it effectively inactivates various pathogenic bacteria without developing resistance.
**Antifungal Effects**
It effectively combats fungal infections, particularly Candida-related conditions like oral thrush, athlete's foot, and nail infections.
## Digestive Health Benefits
Oregano oil supports digestive wellness by:
- Promoting gastric juice secretion and enzyme production
- Helping treat Small Intestinal Bacterial Overgrowth (SIBO)
- Managing digestive discomfort, bloating, and IBS symptoms
## Anti-inflammatory and Antioxidant Effects
The oil provides significant protective benefits through:
- Powerful antioxidant activity that fights free radicals
- Reduction of inflammatory markers in the body
- Protection against oxidative stress-related conditions
## Respiratory Support
It aids respiratory health by:
- Loosening mucus and phlegm
- Suppressing coughs and throat irritation
- Supporting overall respiratory tract function
## Additional Benefits
**Skin Health**
- Improves conditions like psoriasis, acne, and eczema
- Supports wound healing through antibacterial action
- Provides anti-aging benefits through antioxidant properties
**Cardiovascular Health**
Studies show oregano oil may help:
- Reduce LDL (bad) cholesterol levels
- Support overall heart health
**Pain Management**
The oil demonstrates effectiveness in:
- Reducing inflammation-related pain
- Managing muscle discomfort
- Providing topical pain relief
## Safety Note
While oregano oil is generally safe, it's highly concentrated and should be properly diluted before use Consult a healthcare provider before starting supplementation, especially if taking other medications.
-

@ e3168078:10f13b2c
2025-01-21 15:44:45
ノス!
最近Umbrel上のn8nを使ってstacker newsの記事を要約するNostr botを作ってみました。
その際にFirecrawlというスクレイピングのSaaSを使っていたんですがセルフホストできるようなので試してみました。
Firecrawlは動的なページも読めたりマークダウンへの変換をしてくれますが無料プランだと1ヶ月500ページの制限があり、セルフホストすれば気兼ねなく使えます!
今回はUmbrel上のPortainerというアプリを使ってFirecrawlを動かせたのでその記録です。
## 手順
まずはUmbrelにPortainerアプリをインストールします。
Poratinerは今回初めて使ったんですが独自のDockerコンテナをUmbrelで動かす際に推奨されているアプリのようです。

アプリを開いてパスワードの初期設定などを済ませるとダッシュボードが表示されるかと思います。
ここでStackという機能を使ってFirecrawlのDocker composeを一括で取り込むことができます。
新しいStackを作成する画面で以下を入力します。
Repository URL: https://github.com/mendableai/firecrawl
Repository reference: refs/heads/main
Compose path: docker-compose.**yaml** (デフォルトがymlになっててハマりました…)

上記に加えてenv varを設定する必要があるんですがPortainerでは上記の画像下部にあるように "Load Variables from .env file" からenvファイルを選択できます。
[Firecrawlのgithub](https://github.com/mendableai/firecrawl/blob/main/SELF_HOST.md)にあるように apps/api/.env.example をダウンロードし以下の内容を更新しPortainerに取り込ませます。
```
USE_DB_AUTHENTICATION=false
TEST_API_KEY=fc-test-key
```
あとはDeploy the stackを押して少し待つとfirecrawlのセットアップ完了です。
## 確認
動作テストにはUmbrelの設定からAdvanced Settings -> Terminal -> Umbrel OSを開き以下のコマンドを実行ししマークダウンが返って来れば成功です。
```
$ curl -X POST http://localhost:3002/v1/scrape -H 'Authorization: Bearer fc-test-key' -H 'Content-Type: application/json' -d '{
"url": "https://example.com",
"formats": ["markdown"]
}'
{"success":true,"data":{"markdown":"Example Domain\n==============\n\nThis domain is for use in illustrative examples in documents. You may use this domain in literature without prior coordination or asking for permission.\n\n[More information...](https://www.iana.org/domains/example)","metadata":{"title":"Example Domain","ogLocaleAlternate":[],"scrapeId":"7c196348-6561-4ebb-bb8a-9121a29c64b5","viewport":"width=device-width, initial-scale=1","sourceURL":"https://example.com","url":"https://example.com/","statusCode":200}}}
```
またn8n等のUmbrelの他のアプリ(コンテナ)から利用する場合はlocalhostがコンテナ自身になってしまうので別のIP等(172.17.0.1)を使う必要があるのでご注意ください。
([参考](https://community.n8n.io/t/the-service-refused-the-connection-perhaps-it-is-offline-n8n-and-nocodb/33587?utm_source=chatgpt.com))
以上でUmbrel上でのFirecrawlセルフホストができるようになりn8nからも制限なく使えるようになりました。
-

@ b17fccdf:b7211155
2025-01-21 18:30:13
~ > Available at: [https://minibolt.info](https://minibolt.info)
---
~> It builds on a personal computer with **x86/amd64** architecture processors.
~> It is based on the popular [RaspiBolt v3](https://raspibolt.org) guide.
---
**Those are some of the most relevant changes:**
* Changed OS from Raspberry Pi OS Lite (64-bits) to ***Ubuntu Server LTS*** (Long term support) 64-bit PC (AMD64).
* Changed binaries and signatures of the programs to adapt them to ***x86/amd64 architecture***.
* Deleted unnecessary tools and steps, and added others according to this case of use.
* Some useful authentication logs and monitoring commands were added in the security section.
* Added some interesting parameters in the settings of some services to activate and take advantage of new features.
* Changed I2P, Fulcrum, and ThunderHub guides, to be part of the core guide.
* Added exclusive optimization section of services for slow devices.
---
~ > Complete release notes of the MiniBolt v1: [https://github.com/twofaktor/minibolt/releases/tag/1.0](https://github.com/twofaktor/minibolt/releases/tag/1.0).
~ > Feel free to contribute to the [source code on GitHub](https://github.com/minibolt-guide/minibolt) by opening [issues](https://github.com/minibolt-guide/minibolt/issues), [pull requests](https://github.com/minibolt-guide/minibolt/pulls) or [discussions](https://github.com/orgs/minibolt-guide/discussions).
---
Created by [⚡2 FakTor⚡](nostr:npub1k9luehc8hg3c0upckdzzvusv66x3zt0eyw7290kclrpsndepz92sfcpp63)
-

@ b17fccdf:b7211155
2025-01-21 18:22:51
😱 Did you recently find this signature verification error when you tried to update your MiniBolt repositories with -> `sudo apt update`? 💥🚨👇

🔧 Don't worry, that's because Tor renewed its signing key since it expired last 07/15, just renew your keyring by following the next steps to solve this problem:
~ > [CLICK HERE](https://minibolt.minibolt.info/system/system/privacy#tor-signature-verification-error) < ~
---
Enjoy it MiniBolter!💙
-

@ b17fccdf:b7211155
2025-01-21 18:10:10
**Link to the bonus guide** ~ > [HERE](https://minibolt.minibolt.info/bonus-guides/bitcoin/minibolt-on-testnet) <~
---
Some notes:
ℹ️ For the moment, this guide will touch only the case of an **only testnet mode** situation, in the future, we will study adding the case of configuration to enable the parallel/simultaneous mode (mainnet+testnet in the same device) in an extra section in this guide.
ℹ️ The services mentioned in this guide are those that have been tested using testnet configuration and these worked fine. Later, in the next versions of this guide, we will go to adding other processes to adapt other services to the testnet mode.
---
Enjoy it MiniBolter! 💙
-

@ b17fccdf:b7211155
2025-01-21 18:04:28
Available at: [https://minibolt.info](https://minibolt.info)
---
**Main changes to** the version 1:
* The complete guide has been migrated to the new design visual builder web tool platform [gitbook.com](https://www.gitbook.com/)
* New modern UI (responsive, full width, and better visual items)
* New menu structure for a better user experience
* New visual items to improve the navigation through the web page
* New switch to enable light/dark theme
* Enabled Cloudflare Proxy for maximum protection against attacks and better management of the domain
---
**Other changes:**
* New [MiniBolt Linktr](https://linktr.minibolt.info/) forked of the alternative [FOSS project](https://github.com/gzuuus/linktr) proposed by [Gzuuus](https://twitter.com/gzuuus)
* Changed MiniBolt from a personal project to an [organization](https://github.com/minibolt-guide) so that the project has its own identity
* New email contact address [hello@minibolt.info](mailto:hello@minibolt.info) to receive proposals and give support
* New [resources](https://github.com/minibolt-guide/minibolt/tree/main/resources) folder with the current MiniBolt roadmap, network map diagrams, and others
---
ℹ️ **More info:**
* The new version is available with the known domain: [minibolt.info](https://minibolt.info/) but from now on links associated with the new v2 version were shared using the [v2.minibolt.info](https://v2.minibolt.info/) subdomain due to a GitBook limitation
* The old and deprecated v1 will be still available at a time in the subdomain [v1.minibolt.info](https://v1.minibolt.info/), but is in the roadmap delete it definitely in the future, take note ASAP of all that you need of that version before this happens
* Contributors and collaborators will be able to continue doing PR through code programming or using the design block builder [gitbook.com](https://www.gitbook.com/)
---
[GitHub release](https://github.com/minibolt-guide/minibolt/releases/tag/2.0)
---
Enjoy it MiniBolter! 💙
-

@ b17fccdf:b7211155
2025-01-21 17:58:35
The **router reserves the IP address** of the device **for a time after going out**, but if the device goes out some time, the next time that the device starts, the router could assign a different IP and you could lose access to your node. To avoid this, you need to **set a static IP to your MiniBolt**.
~ > In addition, you can **customize your DNS servers to improve your privacy**, normally your ISP, gives you the router with its own DNS servers set by default, and this does that you expose all of your navigation trackings to your ISP, affecting seriously your privacy.
~ > This bonus guide includes all of the necessary steps to get this and is available ~ > [HERE](https://minibolt.minibolt.info/bonus-guides/system/static-ip-and-custom-dns-servers) < ~
---

---
Enjoy it MiniBolter! 💙
-

@ b17fccdf:b7211155
2025-01-21 17:47:28
Link to the bonus guide ~ > [HERE](https://minibolt.minibolt.info/bonus-guides/system/ssh-keys) < ~
---
Some sections of the guide:
* Generate SSH keys
* Import SSH pubkey
* Connect to the MiniBolt node using SSH keys
* Disable password login
* Disable admin password request
---
Some shortcuts to the Extra sections:
* Disable password login: click ~ > [HERE](https://minibolt.minibolt.info/bonus-guides/system/ssh-keys#disable-password-login) < ~
* Disable admin password request: click ~ > [HERE](https://minibolt.minibolt.info/bonus-guides/system/ssh-keys#disable-admin-password-request-caution) < ~
---
Enjoy it MiniBolter! 💙
-

@ b17fccdf:b7211155
2025-01-21 17:39:34
**Link to the bonus guide** ~ > [HERE](https://minibolt.minibolt.info/bonus-guides/bitcoin/ordisrespector) < ~
---
⏰ Recently added an update that includes a new section **[How to detect Ordinals transactions](https://minibolt.minibolt.info/bonus-guides/bitcoin/ordisrespector#how-to-detect-ordinals-transactions) and [verify Ordisrespector filter works](https://minibolt.minibolt.info/bonus-guides/bitcoin/ordisrespector#check-the-ordisrespector-filter-working-on-your-mempool)** to verify that Ordispector is **filtering and burning Ordinals** correctly 🔥
---
Fuck Ordinals🤡🔫 and enjoy it MiniBolter! 💙
-

@ b17fccdf:b7211155
2025-01-21 17:29:54
Some sections inside of the guide:
* Set up Dynamic DNS
* Wireguard VPN server & client side configurations
* Install & configure the WireGuard VPN Client on a mobile phone
* Configure additional servers & clients
* Use your router’s DDNS preconfigured provider
* Port forwarding on NAT/PAT router
---
Link to the bonus guide [HERE](https://minibolt.minibolt.info/bonus-guides/system/wireguard-vpn)
---
Enjoy it MiniBolter! 💙
-

@ 961e8955:d7fa53e4
2025-02-01 23:20:53
"@YakiHonne community partners successfully convened a seminal Nostr101 meetup in Barnawa, Nigeria! Donning bespoke YakiHonne Nigeria Limited Edition T-shirts, the Purple Army infused the town with infectious energy.
Facilitated by @Olaoluwa Ezekiel Michael, this gathering leveraged YakiHonne's decentralized platform to foster unbridled dialogue, idea exchange, and community engagement.
The event's resounding success underscores the burgeoning demand for decentralized solutions in Africa. This milestone marks the inception of a revolutionary movement, empowering voices and fostering collaboration throughout the continent.
#Nostr #DecentralizedRevolution #Africa #CommunityFirst #YakiHonne"
-

@ 58937958:545e6994
2025-01-13 03:31:48
I made croquettes inspired by Spiral's character "Bitcoin (Puppet)."

The method is the same as making regular croquettes.
I also tried making a version (right) with the arms and legs attached while shaping the filling, but they fell off before I could coat them in flour.

The face is made with seaweed and sliced cheese.
The arms and legs are made with fish cake (hanpen).
I brushed soy sauce on the legs and lightly toasted them in a toaster, which gave them a brown color.

The arms and legs are attached using thin spaghetti.
When I searched for character-themed bentos (kyaraben), I came across the idea of using dried pasta, which made sense.
I used fried spaghetti sticks for attachment.
Here’s Bitcoin Croquette squished into a bento box:

Halving

Notes
- I tried freezing the filling to help it hold its shape, but it backfired. It stuck to the plate and the cooking paper, and once partially thawed, it became way too watery. Freezing might work with better preparation.
- The filling was quite dry when shaping, so it might be better to add a binder (this time, I only used potatoes and sautéed onions).
The shape of Bitcoin Puppet was really easy and fun to make, so I’d love to try creating something else next time!
nostr:nevent1qqsxgpjvf9g9suhzx5asqhvnlvnarl43kuhas8v5g2ryjr9yjjp0z5ctkh5pt
-

@ e0e92e54:d630dfaa
2025-02-01 22:32:51
# When a Client Wants Out…& A Yellow Flag Appears
This week was an interesting one with a client that wants to exit our agreement early.
*(Totally fine. It happens and usually when one or both parties want to part ways, unless it's marriage, then it's at minimum a Yellow Flag if not a Red Flag that should be observed).*
I tend to work with clients that have multiple irons in the fire, hence why they need someone like me to come along side them and provide guidance and help root them in the area they must focus on.
There is a strong parallel with this irregardless of whether it's #business #life or #impact
This client had big goals, but like many business owners, they defaulted to reactionary decisions instead of a structured plan. That’s when the Yellow Flag turned into a pattern I’ve seen before—Random Acts of X.
# The Cost of Random Acts of X
If your solution is:
A. Throw money at it, and/or
B. Fire, Aim, Ready...instead of Ready, Aim, Fire
This WILL result in Random Acts of X (wherein X is whatever your are focused on, ie Marketing...aka Random Acts of Marketing essentially equates to the proverbial "throw spaghetti on the wall")
*Is that really a thing? Like do Italians or some other cultures actually throw spaghetti on the wall to see if it "sticks"? Inquiring minds want to know! 🤷♂️*
As I mentioned, my clients tend to have a lot of things they are trying to accomplish at once. This leads to fragmented efforts and lack luster results.
That being said, I approach everything as a relationship. Afterall, I believe:
### Leadership = Relationships!
With this particular client there was one project he abruptly ended. Again, that's fine...it's their business...
Since I'm there to help them lead well, I reminded them this is a relationship and asked "What's next that you want me to focus on?"
We got on the same page with the new project and not even 2 days later that's where the Yellow Flag appeared in the form of issue A (just throw money at it).
# Shortcuts Lead to Ghost Towns (Buying Followers Won’t Work)
You see, they wanted me to lead a marketing campaign to build relationships with people their company could sponsor. ***BUT*** they just wanted to "buy followers".
When I noticed one of their social accounts has 28k followers and on average *only 14 impressions per post*...
I asked "How's that working out for ya?"
You see folks, **real relationships take time!**
One cannot simply "throw money at it" and expect sound, sustainable results.
***If you’re buying an audience instead of building one, you won’t have a community—you'll have a ghost town.***
## What Fake Engagement Looks Like in Business & Family
Think of it this way...
Imagine all you did in your family's relationships was throw money at it. You just "bought followers" in the form of taking this trip, buying that thing for them; and you totally avoided the time investment the relationship requires?
Sure...you might have been physically there...but **were you present**?
I run into this often with my son. He wants me to watch him play a video game. And during that time together what is he doing? He keeps looking over his shoulder to make sure I'm paying attention to HIM and not clandestinely on my phone.
Same goes for his Basketball...he wants me there rebounding for him...not sitting in a chair idly watching.
# Are You Present or Just Physically There?
Business Owners and Leaders!
Husbands, Wives, and Parents!
People whom desire to have an impact!
**The Process is the Shortcut!**
Play silly games. Win silly prizes.
Intentionally build relationships. Reap rewards forever.
It's...
That...
Simple...
Easy? Not really...especially for someone like me whom is just as keen to spend time in nature or chillaxing with a cup of coffee on the back porch, thinking (and wishing my garden was growing better LOL).
But simple? Yes!
**Create the process, execute the process, refine the process, and repeat.**
# The Process is the Shortcut...
*Your Next Step: Cut the Shortcuts. Build the Process.*
So—where do you need to refine your process today?
💡 **What’s one way you can be more present in a relationship this week?**
💡 **What can you eliminate to move you closer to real impact—instead of just chasing more?**
🔹 Drop your answer below 👇
-----------
***Jason Ansley** is the founder of **Above The Line Leader**, where he provides tailored leadership support and operational expertise to help business owners, entrepreneurs, and leaders thrive.*
***Want to strengthen your leadership and enhance operational excellence?**
Connect with Jason at https://abovethelineleader.com/contact*
*📌 This article first appeared on Nostr. You can also find more Business Leadership Articles and content at:
👉 https://abovethelineleader.com/business-leadership-articles*

-

@ 000002de:c05780a7
2025-01-28 22:10:05
Michael Malice asked this question in a [recent appearance on a YouTube show](https://www.youtube.com/watch?v=cv1TUEVsc98)
> Is Democracy a system that is compatible with freedom or is it antithetical or incompatible with freedom?
What do you think?
And to be clear, the US is a democracy. Yes its a republic but it is one with democratic elections. Saying its a republic isn't saying it isn't a democracy. It is. But if you disagree that's fine. For sake of argument humor me. If you use the republic argument look at the number of tyrannies that are also republics around the world...
Democracy for many is a sacred cow. I'm not a monarchist but many that are like this book. Don't let that turn you off from reading [Democracy: The God That Failed](https://store.mises.org/Democracy-The-God-That-Failed-P240.aspx). Its a good critique of Democracy which is hard to find.
originally posted at https://stacker.news/items/868154
-

@ 36cf8956:89ebd9ed
2025-02-01 23:18:02
We spent over $20B.
Why? To defend you, our ally, on the invocation of NATO Article 5.
Now America slaps us with a depression-threatening trade war and threats of annexation.
Unappreciative, disgraceful. We won’t forget.
originally posted at https://stacker.news/items/872895
-

@ 3f770d65:7a745b24
2023-07-31 12:53:38
The following is a collection of Tweets posted on Twitter that documented my entire heart surgery process, from finding out I had an issue, through the surgery, and finally throughout my recovery process. If Elon decides to remove old and unpaid content, I do not want this part of my life to vanish from the Internet. At the time, it was extremely important for my mental health to talk about this whole process and it was therapeutic in my recovery process, reading all of the responses as all of Bitcoin Twitter was behind my success. Thank you all of your kind words, love, and support during this whole process. May my Tweets live on through nostr.
...
Nov 28, 2021
I had open heart surgery 4 days before my 3rd b-day. I've led a healthy & active life since then, zero issues. I had an echocardiogram last week. The results were not good. Heart valve replacement may be in my near future. I am freaking the fuck out. I'll know more on Dec 6th. 😫
Dec 6, 2021
Update: I had my cardiologist appointment today. He said to not worry for now and continue to exercise and live life. In 3 months get another echo done. He doesn't believe the previous other results since I have zero symptoms and wants to do his own interpretation.
Dec 6, 2021
He said if the other results were correct, I may need valve replacement in 6 months to 3 years. However, he doesn't believe the local hospital's results as I said above. He can't form an opinion just yet. He said not to worry over and over again. For now, I'm staying positive!
Mar 7, 2022
Well, it's been three months. I had my follow up this morning. I have severe pulmonic regurgitation. I now need to speak with a specialist and see what my options are for surgery. Neat. 😭
Apr 12, 2022
Well, it looks like I'll need full open heart surgery again to replace my pulmonic valve. Bonus: I'll be part pig. So, I have that going for me. I was assuming that if I had to have this done it would be much less invasive, so I'm not overly impressed at the moment. 🫤
May 11, 2022
Today I had to get a CT scan of my heart in preparation for the May 27th surgery. All went well. I have no other heart issues. It's looking like I'll be in the hospital for 4-7 days, depending on how fast I recover. I should be fully 100% recovered by the end of August. ❤️
May 20, 2022
My grandfather with me 39 years ago, days after my open heart surgery. He taught me to hunt, fish, golf, and I'm sure taught me a thing or two about drinking beer and partying. 😂 He was a great man. He won't physically be with me next Friday, but I'm sure he'll be watching over.
May 25, 2022
Two more sleeps. My mind is racing with an incredible amount of thoughts and emotions now. It's overwhelming. I love you all. Thanks for all of your replies and DMs over the last couple days, weeks, and months. I appreciate it immensely. ❤️❤️❤️
May 25, 2022
Two more sleeps. My mind is racing with an incredible amount of thoughts and emotions now. It's overwhelming. I love you all. Thanks for all of your replies and DMs over the last couple days, weeks, and months. I appreciate it immensely. ❤️❤️❤️
May 27, 2022
LET'S GO! I am alive and doing well. I was on a ventilator until 8pm. That was horrible. I will read all of the comments that you all posted on Katie's updates. Now I need to rest. They want to get me up and walk at 11pm. 🤯 I love you all and your support had helped so much 🧡🧡
May 28, 2022
The amount of love, compassion, caring, and appreciation from everyone blows my mind. Thanks for all of your comments and DMs. The positivity though all is this has helped me get through dark times and now it's helping me get through pain. You are helping me immensely. 🤯❤️🧡💪
May 28, 2022
Today has been a rough day. Lots of chest pain when breathing. But, I apparently am doing something right, because I have been upgraded to a regular room. No more ICU for this guy! My ICU nurse told my new nurse that I'm strong. ❤️💪🔥
May 29, 2022
Using this to document my journey. Last night was not good at all. I had tachycardia and AFib for hours. It was scary as fuck having my heart beat the way it was at 160bpm. They gave me new medication to bring it down and stop the AFib irregular heartbeat. It's now at 101.
May 29, 2022
I was very scared. Katie was able to come and stay the night with me and be my personal care nurse. That made me feel much better having her here with me. Hopefully the meds continue to do what they're supposed to. Fuck. Anyways, I may not Tweet much today. Love you all. ❤️
May 30, 2022
Today has mostly been a great day progress wise. I ate a lot. I've walked more today than I have previously. My doctor told me I might be going home tomorrow, it all depends on what happens with my last drainage tube. Fingers crossed that it's draining properly now. 💪❤️
May 31, 2022
Morning walk crushed.
Breakfast crushed.
Feeling stronger.
My drainage tube is still draining so we'll see what the surgeon says, but I probably won't be coming home today according to my nurse. It may be another day. Better to be safe. I'm feeling good though. Let's go! 💪💪❤️❤️
Jun 1, 2022
Today's plans: Crush morning walk, crush breakfast, CRUSH MY LAST X-RAY AND HEAD THE HELL HOME! Fingers crossed. 🤞🤞❤️❤️💪💪
Jun 1, 2022
On my morning walk I went into a slight AFib. The nurse and PA said since I hadn't had my morning meds to control that yet, that that could be the cause. They're going to increase meds and monitor me for another 24 hours. That sucks, but again, I'd rather be safe. Ugh.
Jun 2, 2022
GM! I miss my kids. I miss wearing normal clothes. I miss my house. I miss my doggy. I better go home today or I guess I'll just keep working to get well enough to go home. 😂 I'm still progressing forward. I have a chest x-ray scheduled later this morning. Fingers crossed.
Jun 2, 2022
I JUST GOT CLEARED TO HEAD HOME AFTER LUNCH. FUCK YEAH. LET'S GOOOOOO💪💪💪
Jun 2, 2022
I am home! I have some family that needs some loving. Enjoy the rest of your day!
Jun 4, 2022
Last night I slept in bed thanks to a reclining pillow, the first night our living room chair. I was so happy to sleep in my own bed. I walked around our yard about 9 times yesterday. My goal is to do that plus a little more every day. I'm still in a lot of pain, but meds help.
Jun 4, 2022
I still have a long way to go recovery wise, but having Katie and the kids here helping me along the way makes it easier and gives me a reason to keep pushing forward through this. Thanks again for all of your past and future support. You all are fantastic.
Jun 6, 2022
My wife went back to work today. My son and daughter are in charge of taking care of me. My kids are fantastic. They made me breakfast already and helped me check all of my vitals. My daughter really shines here. She's such a little nurse and caretaker. ❤️❤️
Jun 6, 2022
I'm still in pain, but I'm not in as much pain as I was a couple days ago. I'm walking around a little better and a little more every day. I really hate just sitting around and not doing anything, but it's hard to do much else besides watch TV. I am enjoying my patio though. 💪
Jun 16, 2022
It's been a while. It's time to update this thread! I am doing great, IMO. I have lots of energy. I feel great. I can do a lot more than I previously could. I still have a limited range of motion due to my sternum being broken and still healing. i.e. I can't wash my back or legs.
Jun 16, 2022
I started back to work yesterday. I was cleared to do 20 hours this week by my doctor and I'm hoping to be cleared full time next week. I work from home, so if I can sit in front of a TV, I can sit in front of a computer, right?
Jun 16, 2022
My home nurses have been absolutely fantastic.😂 My kids make me breakfast every morning. And I could not have done any of this without my rock star wife. Words can't describe how much she's done for me throughout all of this. I am looking forward to continuing to improve. ♥️
Jun 16, 2022
You all have been absolutely wonderful through all of this too. I appreciate all of your love, support, and check-ins. Seriously. It means more than you know.
I have a check-up at the end of the month to make sure all is well. I'll update again in a couple weeks after that appt.
Jun 28, 2022
My doctor said everything looks great. He said it doesn't look like I had open heart surgery a month ago.💪 He said I have zero restrictions and that I can resume normal life. I can drive and I can go out on my boat! ❤️❤️❤️ I'm so happy right now! 🔥🚀
Jul 15, 2022
I started cardiac rehab this week. After 2 sessions the nurse said I'm on "Week 4" already. She doesn't believe with my initial intake stress test if I'll really be able to improve on it that much. 🤣 TL;DR I am a rock star and kicking ass. Feeling great. Life's great. 😍
Aug 28, 2022
Yesterday was 3 months since my open heart surgery. I'm going great! I'd guess essentially back to normal. My sternum is still not fully healed, that'll take more time, but energy and capability are basically back to what I was like last summer. I'm very happy with the results.
Aug 28, 2022
I'm very happy to be able to exercise daily, go boating on the weekends AND swim and paddleboard. I was annoyed that I couldn't do these things a month ago. I had a cardiologist appt. two weeks ago. He said he hopes the valve lasts me the rest of my life and to see him in a year.
Aug 28, 2022
As a final post to this thread, I want to thank each and every one of you again that commented, liked, shared and DMed me throughout all of this. The love and support from Twitter and the #Bitcoin community was unfathomable. You all made a difference in my life and my recovery.❤️
-

@ 4d4fb5ff:1e821f47
2025-02-01 22:13:43
**Snapshot of a 3D molecular structure.** In bacteria, the enzyme Peptidase E (PepE) is encoded by the gene PEPE. PEPEDASE is an atomic view of PepE enzyme’s spatial architecture based on publicly available scientific data, visually arranged to pay homage to Pepe the Frog. I made this piece in support of Matt Furie’s #SavePepe movement.
<img src="https://i.nostr.build/Lead9.png">
-

@ 58937958:545e6994
2025-01-13 03:19:17
Spiralのキャラクター「ビットコイン(パペット)」のコロッケを作りました

作り方は一般的なコロッケです
試しにタネの状態で手足をくっつけたバージョン(右)も作りましたが
粉をつける前に手足がもげました

顔はのりとスライスチーズ
手足ははんぺんです
足は醤油をつけてトースターで軽く焼いたら茶色になりました

手足はサラスパでくっつけてます
細いスパゲッティ
キャラ弁でググったらサラスパが出てきてなるほどな~と思いました
自分は揚げパスタにして刺しました
弁当箱に押し込まれてるコロッケくん

半減期

メモ
- タネを作った時に形を保たせるために冷凍してみたんですけど逆効果だった(皿とクッキングペーパーにくっついて取れなくなった&半解凍したら水分がすごいことになった)ので冷凍するなら対策が必要そう
- 形作るときにかなりパサパサだったので、つなぎがあった方がいいのかも(今回はじゃがいも&炒めタマネギだけ)
ビットコインくんの形はすごく作りやすくて面白いのでまた何か作りたいなぁと思いました
nostr:nevent1qqsxgpjvf9g9suhzx5asqhvnlvnarl43kuhas8v5g2ryjr9yjjp0z5ctkh5pt
-

@ dca69ce3:5b1492da
2025-01-28 19:42:57
With the rise of protocols like [Nostr](https://nostr.com/) (popular in the Bitcoin community) and the [AT Protocol](https://atproto.com/) (popularized by [BlueSky](https://bsky.app/)), now feels like the perfect time to explore the history of the web and the open philosophy it was built on. As someone involved in the communities and clients using these protocols for the past couple of years, I understand their significance. However, this write-up is my effort to deepen that understanding by examining the emergence and necessity of decentralized protocols.
What I've found is that the history of the open web is a fascinating, intertwined narrative of protocols and the consequences of their creation and adoption. Like many foundational innovations, these technologies often succumb to commercialization and centralization over time. Will this time be different? Only time will tell.
Let's dive in!
## The Philosophy of the Early Internet
The early internet was founded on principles of openness, decentralization, and collaboration, reflecting the technologies, governance structures, and culture of its time.
The ARPANET, the precursor to the internet, was designed to ensure communication could endure even in the face of infrastructure loss--resilient to single points of failure. This concept was particularly vital during the Cold War (late 1940s to late 1980s), a period marked by geopolitical tensions where communication disruptions were a constant concern.
## Protocols of the Open Web
### ARPA and NCP (1969-1980)
The early days of networking saw the creation of NCP (Network Control Protocol), the first protocol used by ARPANET. NCP enabled basic communication between nodes, serving as both a transport and host-to-host communication protocols.
NCP managed communication by establishing and maintaining logical connections between hosts using socket pairs--a local socket number identifying a specific process on the host and a remote socket number identifying the target process on destination host. These socket pairs uniquely identified each logical connection, which supported full-duplex communication, allowing data to flow in both directions simultaneously over the same connection.
While NCP handled host-level communication, low-level packet switching and routing were managed by IMPs (Interface Message Processors). In essence, NCP relied on IMPs to deliver packets between nodes.
Using NCP, ARPANET's earliest nodes--University of California Los Angeles, Stanford Research Institute, University of California Santa Barbara, and the University of Utah--collaborate to share resources and advance computing research. Each institution contributed to the development of the early internet, setting the stage for its evolution into the more modern systems we recognize today.
NCP foundational design enabled use cases still familiar today: remote login, file transfer, time-sharing systems, email, and collaborative tools like document editing. However, its simplicity came with limitations. NCP lacked robust error detection and correction, relying on the underlying network (IMPs) to handle these issues. It also lacked a standardized addressing scheme and error recovery mechanisms, limiting its scalability and reliability. These shortcomings ultimately led to the development of TCP/IP.
### FTP (1971)
In 1971, [RCF 114](https://www.rfc-editor.org/rfc/rfc114), titled "A File Transfer Protocol" by Abhay Bhushan, introduced a standardized method for transferring files between hosts on the ARPANET. Its primary goal was to enable indirect use of remote computers, allowing users to transfer files without the need to log into remote systems directly.
Key features of this early protocol included:
- **Indirect File Access**: Enabled users to transfer files seamlessly across the ARPANET without requiring direct logins to remote systems.
- **Standardized Commands**: Defined a consistent set of commands for file operations, including retrieving, storing, deleting, and listing files, ensuring uniform interactions across diverse systems.
- **Data Type Specification**: Supported the designation of data types and structures to accommodate various file formats, ensuring accurate interpretation during transfers.
- **User Identification Mechanism**: Introduced basic access control through username and password authentication, enhancing security.
- **Error Recovery Procedures**: Included mechanisms for error correction and recovery to maintain data integrity and reliability during transfers.
FTP simplified data and software sharing, becoming a cornerstone of collaboration within academic and research communities.
### Email: The First Killer App (1971)
Email, the internet’s first “killer app,” emerged during the development of NCP and later TCP/IP. Ray Tomlinson invented email in 1971 while working at BBN, a key player in ARPANET’s creation. Before email, communication on the network primarily relied on file sharing. Seeking a more efficient solution, Tomlinson modified CYPNET to send messages across ARPANET, enabling users to communicate between different computers. This innovation popularized the use of the “@” symbol to separate user names from domains.
In 1982, the creation of SMTP (Simple Mail Transfer Protocol) standardized email communication and significantly improved upon Tomlinson’s initial implementation. SMTP introduced several key advancements:
- **Formalized Communication Rules**: Established a standardized protocol for sending emails between servers, which CYPNET lacked.
- **Support for Multiple Recipients**: Enabled sending emails to multiple recipients and distributing messages to mailing lists, a capability absent in Tomlinson’s system.
- **Error Handling**: Provided explicit error codes and responses to diagnose and resolve delivery issues, whereas Tomlinson’s implementation offered only rudimentary error handling.
- **Structured Message Format**: Worked with standards like RFC 822 to define consistent headers (To, From, Subject), replacing the unstructured, ad-hoc metadata of early emails.
- **Scalability**: Designed to accommodate the growing internet, ensuring email functionality expanded as ARPANET evolved into a global network. Tomlinson’s system was tied to ARPANET’s original constraints.
SMTP transformed email from a groundbreaking experiment into a robust, scalable, and universal communication tool, solidifying its place as a cornerstone of internet communication.
### Usenet (1979)
Usenet, created by Tom Truscott and Jim Ellis at Duke University in 1979, was one of the first decentralized systems for sharing messages and fostering online discussions. As a precursor to modern internet forums and social media, Usenet laid the foundation for the social internet as we know it today.
Usenet relied on UUCP (Unix-to-Unix Copy Program) to transfer messages between servers in a peer-to-peer manner, with each server forwarding posts to its neighbors.
Key features and insights from Usenet include:
- **Newsgroups**: Discussions were organized into categories called newsgroups, with a hierarchical naming system (e.g., `comp.sys` for computer systems).
- **Decentralization**: Usenet’s peer-to-peer design required each server to store and propagate messages, eliminating single points of failure and central control. This decentralization, akin to modern protocols like Nostr, aligned with the internet’s ideals of openness and collaboration.
- **Self-Governance**: Without central authority, Usenet communities were often self-moderated, with users establishing their own norms and moderation practices.
Usenet’s decentralization and community-driven structure embodied the spirit of the early internet. However, its culture faced a significant shift in **September 1993**, often referred to as “Eternal September.” This marked the influx of new users when AOL (America Online) granted its subscribers access to Usenet. The term “Eternal September” originated from the annual wave of college students who traditionally joined Usenet each September, requiring time to acclimate to its norms. With the massive influx of AOL users, however, this adjustment period became permanent.
This cultural shift introduced challenges such as increased spam, off-topic posts, and conflicts, disrupting the established norms of Usenet. Over time, these issues led to Usenet losing its prominence as a hub for niche, vibrant discussions, marking the beginning of a broader transition from protocols to platforms.
### TCP/IP (1981-1983)
TCP (Transmission Control Protocol) and IP (Internet Protocol), developed between 1981 and 1983, replaced NCP as the standard protocol for ARPANET, addressing many of its limitations and paving the way for the modern internet.
**TCP** ensured reliable communication by breaking data into packets, checking for errors, and retransmitting lost packets. It reassembled data at the destination, ensuring integrity despite packet loss. TCP also introduced flow and congestion control, allowing networks to adapt transmission rates based on conditions. These features resolved NCP’s lack of robust error handling and basic flow management, enabling networks to scale more effectively.
**IP** provided a unique addressing system (IP addresses) that allowed data to traverse diverse networks. Unlike NCP’s reliance on hardcoded socket pairs, IP made interoperability and routing across heterogeneous networks possible.
The separation of TCP and IP into distinct layers (transport and network) introduced modularity and flexibility, supporting diverse networks and applications. This overcame NCP’s single-layer design, which lacked the versatility needed for the internet’s future growth.
**Inter-networking** was another significant advancement enabled by TCP/IP, allowing multiple networks to connect and function as one. This shift from NCP’s single homogeneous network (ARPANET) to a universal language of interconnected systems established the foundation of the global, decentralized internet we use today.
### DNS (1983)
Introduced in 1983 by Paul Mockapetris, the Domain Name System (DNS) revolutionized how devices on the internet were identified and accessed. It replaced the centralized, cumbersome `HOSTS.TXT` file system with a distributed, hierarchical structure that could scale alongside the rapidly growing internet.
Before DNS, network administrators relied on a single `HOSTS.TXT` file to map human-readable hostnames to IP addresses. This file, managed by the NIC (Network Information Center) at Stanford Research Institute, had to be manually updated and distributed to every system on ARPANET. As the network expanded, this centralized system became a bottleneck, with errors and delays in updates causing significant disruptions. By the early 1980s, maintaining a single centralized file was no longer practical, necessitating a more scalable solution.
DNS addressed these challenges by introducing a hierarchical structure for domain names. Names are organized into a tree-like system, with the root at the top and Top-Level Domains (TLDs) such as .com or .org below it. For example, example.com is divided into levels: com (TLD) and example (Second-Level Domain). This delegation of responsibilities allowed for efficient management and scalability.
DNS also employed a network of distributed servers to store and resolve domain names to IP addresses, eliminating reliance on a single central database. Distributed servers improved reliability, performance, and resilience. DNS servers could cache query results, reducing load and speeding up responses for frequently requested domains. Finally, DNS made the internet far more user-friendly: instead of memorizing numeric IP addresses (e.g., `192.0.2.1`), users could type intuitive domain names (e.g., `example.com`).
By solving the limitations of `HOSTS.TXT` and enhancing usability, DNS became a cornerstone of the modern internet, enabling its global and decentralized nature.
### IRC (1988)
Developed by Jarkko Oikarinen in 1988, Internet Relay Chat (IRC) enabled real-time text communication and played a pivotal role in fostering early online communities. IRC’s innovations built upon earlier protocols and technologies, extending their concepts to create a new paradigm for online interaction.
- **Extending Telnet**: IRC expanded Telnet’s one-to-one communication sessions into multi-user chats within channels, enabling group conversations in real time.
- **Decentralization from Usenet**: IRC adopted Usenet’s decentralized philosophy, applying it to synchronous messaging. Multiple IRC servers could link together to form networks, distributing load and avoiding reliance on a central server.
- **Hierarchical Naming from DNS**: Borrowing from DNS, IRC used a hierarchical naming system for chat channels and users. This allowed intuitive organization, with nicknames and channels globally visible across linked servers.
- **Command-Response Structure**: Inspired by protocols like SMTP and FTP, IRC introduced commands such as /join, /quit, and /msg, simplifying interactions and enabling clients to interpret server messages effectively.
- **Influence of MUDs**: IRC drew from Multi-User Dungeons (MUDs), text-based multiplayer games popular in the 1980s. While MUDs facilitated real-time interactions within virtual worlds, IRC applied the concept to general communication.
Key innovations of IRC included group channels for interaction, flexible user and server configurations, dynamic moderation, and a lightweight protocol. By combining these features, IRC became a cornerstone of real-time online communication, laying the groundwork for modern chat applications.
### HTTP and WWW (1989-1991)
The World Wide Web (WWW) and Hypertext Transfer Protocol (HTTP), introduced by Tim Berners-Lee between 1989 and 1991, revolutionized how information was shared and consumed. These innovations built upon prior technologies, creating the foundation of the modern web.
- **Built on TCP/IP**: HTTP used TCP/IP as its transport layer, ensuring reliable delivery of web content. This interoperability allowed HTTP to function across any device or network supporting TCP/IP, establishing the web as a universal platform.
- **Standardized Resource Addressing**: The introduction of URLs (Uniform Resource Locators), built on DNS, provided a standardized way to locate web resources. URLs combined the protocol (`http://`), domain (`example.com`), and resource path (`/index.html`), enabling precise identification and retrieval of content.
- **Hypertext Implementation**: Berners-Lee implemented hypertext using HTML (Hypertext Markup Language), a simple text-based language for creating web pages. HTML’s support of hyperlinks (`<a>` tags) allowed users to navigate seamlessly between linked resources, turning the web into an interconnected “web” of information. Hypertext, conceptualized by Ted Nelson in the 1960s and seen in systems like NLS and HyperCard, was now available to a global audience.
- Improvement Over FTP: Unlike FTP, which focused on isolated file transfers, HTTP facilitated the retrieval of hyperlinked resources, enabling user-friendly interaction with content and seamless display of linked documents in a browser.
- **Decentralized Architecture**: Inspired by Usenet, the WWW adopted a decentralized design, allowing anyone with a server to host and link content without reliance on a central authority.
- **Structured Metadata**: HTTP extended the use of structured metadata, seen previously in email protocols like SMTP. HTTP headers provided contextual information about requests and responses (e.g., `Content-Type` and `Status Code`), enabling dynamic, interactive communication between clients (browsers) and servers.
**Key Innovations of HTTP and the WWW:**
1. **Stateless Communication Protocol**: HTTP’s stateless design ensured each client-server request was independent, enabling scalability as the web grew.
2. **Cross-Platform Compatibility**: HTTP and HTML were text-based and platform-agnostic, allowing access from any device or operating system.
3. **Interactive Content**: The web unified interactive content (e.g., images, text, and links) into a single environment accessible via a browser.
Together, HTTP and the WWW transformed the internet into a user-friendly, decentralized, and universally accessible medium, laying the groundwork for the web’s exponential growth.
## The Transition from Protocols to Platforms
The shift from the **protocol-driven era** of the open web to the **platform-driven era** marked a profound technological and cultural transformation. Early internet protocols like **TCP/IP**, **DNS**, **HTTP**, **SMTP**, **FTP**, and **Usenet** emphasized decentralization, interoperability, and user empowerment. However, by the mid-1990s, the emergence of proprietary platforms such as AOL, Prodigy, and later Facebook and Google, redefined the internet experience. These platforms offered centralized, user-friendly services but at the cost of openness and decentralization.
The early internet, defined by protocols, empowered individuals and communities to build their own tools and networks. Protocols like **TCP/IP** and **DNS** created a universal framework for connectivity, while decentralized services such as **Usenet** and **IRC** fostered open, self-managed discussions. Tools like **FTP**, **HTTP**, and **SMTP** enabled users to share files, publish content, and communicate freely, embodying the era’s ethos of openness, collaboration, and innovation.
By contrast, the platform-driven internet that emerged in the mid-1990s offered a polished, accessible alternative that abstracted away the technical complexities of the protocol-driven era. Platforms like AOL, Prodigy, and CompuServe created “walled gardens,” restricting users to content and services within their ecosystems. While this made the internet more accessible to non-technical users, it limited their ability to explore and interact with the broader web. Platforms like Facebook and Google later extended this model, becoming dominant gatekeepers for social interaction and information discovery. These centralized platforms hid the complexities of early internet protocols, offering plug-and-play solutions that attracted a general audience. For instance, instead of setting up an FTP server to share files, users could simply upload them to Dropbox or Google Drive. Similarly, proprietary messaging platforms like Facebook Messenger and WhatsApp replaced interoperable protocols such as IRC, locking users into closed ecosystems.
Cultural shifts accompanied these technological changes. In the protocol-driven era, users often acted as both creators and consumers, whether by writing Usenet posts, hosting personal websites, or managing their own email servers. Platforms, however, encouraged a more passive consumption model, with user-generated content controlled within proprietary systems. Trust in gatekeepers grew, with users relying on platforms to curate and deliver information. Search engines like Google became the primary gateway to content, while social platforms dictated social interactions, often reducing individual agency. The communal culture of early internet communities gave way to corporate-driven interactions, as decentralized discussions on Usenet were replaced by centralized forums governed by platform owners. Moreover, the platform era introduced a surveillance-based business model, monetizing user data to serve targeted advertisements—a stark departure from the user-centric and privacy-conscious ethos of the early web.
Despite the dominance of platforms, the foundational protocols of the open web remain critical. **TCP/IP**, **HTTP**, and **DNS** still underpin the internet’s infrastructure, ensuring its basic interoperability. Furthermore, movements like the **fediverse** (e.g., Mastodon), **blockchain-based platforms**, and protocols like **Nostr** aim to revive the ideals of decentralization, user autonomy, and community-driven governance. These efforts reflect a growing desire to reclaim the open and collaborative spirit that defined the early internet.
The transition from protocols to platforms transformed the internet from a decentralized, user-driven network into a centralized, corporate-controlled ecosystem. While platforms made the internet more accessible, they sacrificed openness, user autonomy, and the collaborative ethos of its early days. Revisiting the foundational principles of protocols is crucial for those working to rebuild a more open, equitable internet.
## Closing Thoughts
The evolution from the early decentralized internet to today’s platform-dominated web reflects a shift from protocols that empowered users to systems that prioritize convenience, control, and corporate interests. Early technologies like Usenet, HTTP, and FTP embodied ideals of openness, collaboration, and autonomy, but modern platforms have concentrated power, creating walled gardens and monetizing user data. Yet, the foundational protocols of the internet persist, inspiring new decentralized initiatives like Nostr, Mastodon, and blockchain-based systems. By supporting and adopting applications built on decentralizing protocols, we can reclaim the values of openness, privacy, and user empowerment. Every choice we make—as developers, users, or advocates—shapes the future of the web. Together, we can revive the collaborative spirit of the internet’s origins and help create a more equitable and resilient digital future.
-

@ 84b0c46a:417782f5
2025-01-11 01:48:46
nostr:nevent1qvzqqqqqqypzpp9sc34tdxdvxh4jeg5xgu9ctcypmvsg0n00vwfjydkrjaqh0qh4qqs0df2mwnp2q6hm6zjrthkmx3fudwsuwrmgnwrdavpzgjy8nnuqm5cqpd06k
nostr:nevent1qvzqqqqqqypzpp9sc34tdxdvxh4jeg5xgu9ctcypmvsg0n00vwfjydkrjaqh0qh4qqs2muhvnev5367ywuzkhell9my86jlnzhsnuszwl46tnc3fpsx9mtgjkqnu7
nostr:nevent1qvzqqqqqqypzpp9sc34tdxdvxh4jeg5xgu9ctcypmvsg0n00vwfjydkrjaqh0qh4qqsznnkrl8qdwzgp7ry2hc7a77kwhg440gv9xtmvyfawggrpz3rhwvcx4rckf
nostr:nevent1qvzqqqqqqypzpp9sc34tdxdvxh4jeg5xgu9ctcypmvsg0n00vwfjydkrjaqh0qh4qqsyjf80k3djt96qncgvwl2yem09fdqcc0y9l8t657yc9qg2yhmg7kcnua8vn
nostr:nevent1qvzqqqqqqypzpp9sc34tdxdvxh4jeg5xgu9ctcypmvsg0n00vwfjydkrjaqh0qh4qqs0s3lp0w0yclk64j0tpc5fvrulv78g2lfjz3gcgacw9mt6czek26qtqxuck
nostr:nevent1qvzqqqqqqypzpp9sc34tdxdvxh4jeg5xgu9ctcypmvsg0n00vwfjydkrjaqh0qh4qywhwumn8ghj7mn0wd68ytnrdakhq6tvv5kk2unjdaezumn9wsqs6amnwvaz7tmev9382tndv5qjqamnwvaz7tmjv4kxz7fddfczumn0wd68ytnhd9ex2erwv46zu6nsqqs89tst72clc60wse3zq4qfs0976y7areffnhx26atvu6pv58hg6dsxvcc79
nostr:nevent1qvzqqqqqqypzpp9sc34tdxdvxh4jeg5xgu9ctcypmvsg0n00vwfjydkrjaqh0qh4qyxhwumn8ghj77tpvf6jumt9qys8wumn8ghj7un9d3shjtt2wqhxummnw3ezuamfwfjkgmn9wshx5uqpr3mhxue69uhhxun5wfjkccte9e3j6um5v4kxcctj9ehx2aqqyp5k40r3ug02yz5y0tn67tm2lwevuwac54qyw3yyct8n8uzr7pjz2q92pyt
nostr:nevent1qvzqqqqqqypzpp9sc34tdxdvxh4jeg5xgu9ctcypmvsg0n00vwfjydkrjaqh0qh4qyxhwumn8ghj77tpvf6jumt9qys8wumn8ghj7un9d3shjtt2wqhxummnw3ezuamfwfjkgmn9wshx5uqqyp9pennjwq2qk4dxpr440wxqm5cfwah4qccd8la62hantxdelkk82ty9mr8
nostr:nevent1qvzqqqqqqypzpp9sc34tdxdvxh4jeg5xgu9ctcypmvsg0n00vwfjydkrjaqh0qh4qyxhwumn8ghj77tpvf6jumt9qqsz9w30kxzjshwd8sq7jg2hsy2hwqg3zu7gyvxnsyrgfw0ur4rkhsg9v0re4
nostr:nevent1qvzqqqqqqypzpp9sc34tdxdvxh4jeg5xgu9ctcypmvsg0n00vwfjydkrjaqh0qh4qyxhwumn8ghj77tpvf6jumt9qqs8wkx2r8txt9q69c3zvpqs2em2s40nc8tajmcc5l8ngxn8v2ng3sc43xvzu
nostr:nevent1qvzqqqqqqypzpp9sc34tdxdvxh4jeg5xgu9ctcypmvsg0n00vwfjydkrjaqh0qh4qyxhwumn8ghj77tpvf6jumt9qys8wumn8ghj7un9d3shjtt2wqhxummnw3ezuamfwfjkgmn9wshx5uqqyzdkacpjqvv2y79zgvufx9jh39rd7xa8v056rgn4xelmnmrq9u2tuguswek
nostr:nevent1qvzqqqqqqypzpp9sc34tdxdvxh4jeg5xgu9ctcypmvsg0n00vwfjydkrjaqh0qh4qy2hwumn8ghj7mn0wd68ytnyv96xztngv96hxqpqmdtjrs38fv8r20deplrlt8fma54gu43keuzquzks7673a27ud58slunr8y
nostr:nevent1qvzqqqqqqypzpp9sc34tdxdvxh4jeg5xgu9ctcypmvsg0n00vwfjydkrjaqh0qh4qyxhwumn8ghj77tpvf6jumt9qys8wumn8ghj7un9d3shjtt2wqhxummnw3ezuamfwfjkgmn9wshx5uqpr4mhxue69uhkummnw3ezucm0d4cxjmr994jhyun0wghxuet5qqsxzpx2r5hd36pruzn2e58wh947y2t0t205fp5xtstqp5wq0qgcjuq07rqlk
-

@ 78b3c1ed:5033eea9
2025-01-10 12:31:01
※ライトニングノード保有者向け
Alby Hubをインストールした時なんもわからずポチポチしているとMegatlith LSPノードからインバウンドを購入してチャネルを開くことになります。2万sats(2024/12/4 午後7時時点で三千円ほど)かかります。
そこで誰もが思うに違いない
「高いなぁ。だれかタダで無料で私のHubにチャネル開いてくれないかなぁ...」
その願望をかなえる献身的なノードランナー(笑)がAlby Hubへチャネルを開いてあげるための手順書みたいなものがこの記事です。
~~ppmをうんと高くしてぼったくってやりましょう!~~
※AlbyHubにオンチェーン資金が無くてもLNDから開く方法を発見しました。末尾に追記しました。
《これはアンカーアウトプットを利用するタイプのチャネル》
条件
・チャネルを開く側
Clearnet IPアドレスで着信可能であること。Torノードは不可。ノードURIを公開していなくても良い。AlbyHubでピア登録できるClearnet IPアドレスと着信ポートがあればOK。
・開いてもらうAlby Hub側
オンチェーン資金25,000sats以上をデポジットしておく。ないと開けません。
手順
1. [Alby Hub側] オンチェーン資金をデポジット
Hubログイン後の左メニューからNodeを選択。Saving BalanceのDepositを選択。するとbc1qではじまるオンチェーンアドレスが表示される。ここへ送金してオンチェーンをデポジットしておく。
2. [Alby Hub側] 開く側のノードをピア登録
左メニューからNodeを選択。右上のAdvancedからConnected Peersを選択。
右上のConnect Peerを選択。欄にノードURI (ノードID@IPアドレス:着信ポート番号)を入力してConnect。
3. [開く側ノード] AlbyHubを確認、チャネルを開く
ThunderhubやRide-The-Lightningなどを使い、Alby Hubのノードが表示されていることを確認。Hubにエイリアスは無いのでノードIDで表示される。
このノードに対してチャネルを開く。Private channelが望ましいと思われる。
6conf後に開設完了。
終わり!
メモ
- Alby Hubではbase feeは設定可能だがrateが設定できない。そもそもAlby Hubはルーティング向けノードとして設計されてない。セルフカストディアルウォレットです。
- public channelだとchannel_update, channel_announcementがゴシップされるまでHubへ送金できない(no route)。上記の通りウォレットとしてのノードならprivate channelだけにしてルートヒント付きインボイスが発行できるようにしとくのが望ましい。
- LDKにおいて相手からチャネルを開いてもらう場合にオンチェーン資金が必要。相手がチャネルリザーブ無しのチャネルでもOKなら不要。現にメガリスLSPからチャネルを開いてもらう時オンチェーン資金が0satsでも開けているのがその実例。
- オンチェーン資金が必要なのはチャネルタイプがanchorの場合。オンチェーン資金でアンカーアウトプットをCPFPするためみたい。anchorが登場する前のstatic-remotekeyのタイプならオンチェーン資金は不要。
-----------
<ここからが追加>
《これはアンカーアウトプットを利用しないタイプのチャネル》
LNDからチャネルを開くときにstatic remote keyを利用するタイプを指定します。
条件
・チャネルを開く側 ※上記と同様。
・開いてもらうAlby Hub側 無し。
手順
1. [Alby Hub側] 開く側のノードをピア登録
左メニューからNodeを選択。右上のAdvancedからConnected Peersを選択。右上のConnect Peerを選択。欄にノードURI (ノードID@IPアドレス:着信ポート番号)を入力してConnect。
2. [開く側ノード] AlbyHubを確認、チャネルを開く
SSHログイン、UmbrelならLightningのターミナルで以下のコマンドを実行します。
<ノードID>は開きたいAlbyHubのノードIDで置き換えてください。
<チャネルサイズ>は開きたいチャネルの金額、例えば20万satsなら200000としましょう。
<手数料率>はチャネル開設のトランザクションに掛ける手数料率です。mempool. spaceなどで手数料水準を確認して指定しましょう。
--channel_type tweaklessがキモです。デフォルトだとanchorになります。RTLやTHで開くとこのanchorになります。なのでlncli openchannelでやります。
```
lncli openchannel --node_key <ノードID> \
--local_amt <チャネルサイズ> \
--sat_per_vbyte <手数料率> \
--private --channel_type tweakless
```
終わり!
-

@ df173277:4ec96708
2025-01-28 17:49:54
> Maple is an AI chat tool that allows you to have private conversations with a general-purpose AI assistant. Chats are synced automatically between devices so you can pick up where you left off.\
> [Start chatting for free.](https://trymaple.ai/)
We are excited to announce that [Maple AI](https://trymaple.ai/), our groundbreaking end-to-end encrypted AI chat app built on OpenSecret, is now publicly available. After months of beta testing, we are thrilled to bring this innovative technology to the world.
Maple is an AI chat tool that allows you to have private conversations with a general-purpose AI assistant. It can boost your productivity on work tasks such as writing documentation, creating presentations, and drafting emails. You can also use it for personal items like brainstorming ideas, sorting out life's challenges, and tutoring you on difficult coursework. All your chats are synced automatically in a secure way, so you can start on one device and pick up where you left off on another.
#### Why Secure and Private AI?
In today's digital landscape, it is increasingly evident that security and privacy are essential for individuals and organizations alike. Unfortunately, the current state of AI tools falls short. A staggering 48% of organizations enter non-public company information into AI apps, according to a [recent report by Cisco](https://www.cisco.com/c/en/us/about/trust-center/data-privacy-benchmark-study.html#~key-findings). This practice poses significant risks to company security and intellectual property.
Another concern is for journalists, who often work with sensitive information in hostile environments. Journalists need verification that their information remains confidential and protected when researching topics and communicating with sources in various languages. They are left to use underpowered local AI or input their data into potentially compromised cloud services.
At OpenSecret, we believe it is possible to have both the benefits of AI and the assurance of security and privacy. That's why we created Maple, an app that combines AI productivity with the protection of end-to-end encryption. Our platform ensures that your conversations with AI remain confidential, even from us. The power of the cloud meets the privacy of local.
#### How Does It Work?
Our server code is [open source](https://github.com/OpenSecretCloud/opensecret), and we use confidential computing to provide cryptographic proof that the code running on our servers is the same as the open-source code available for review. This process allows you to verify that your conversations are handled securely and privately without relying on trust. We live by the principle of "Don't trust, verify," and we believe this approach is essential for building in the digital age. You can read a more in-depth write-up on our technology later this week on this site.
#### How Much Does It Cost?
We are committed to making Maple AI accessible to everyone, so we offer a range of pricing plans to suit different needs and budgets. [Our Free plan allows for 10 chats per week, while our Starter plan ($5.99/month) and Pro plan ($20/month)](https://trymaple.ai/pricing) offer more comprehensive solutions for individuals and organizations with heavier workloads. We accept credit cards and Bitcoin (10% discount), allowing you to choose your preferred payment method.
- Free: $0
- Starter: $5.99/month
- Pro: $20/month
Our goal with Maple AI is to create a product that is secure through transparency. By combining open-source code, cryptography, and confidential computing, we can create a new standard for AI conversations - one that prioritizes your security and privacy.
Maple has quickly become a daily tool of productivity for our own work and those of our beta testers. We believe it will bring value to you as well. [Sign up now and start chatting privately with AI for free.](https://trymaple.ai/) Your secrets are safe in the open.
#### Are You An App Developer?
You can build an app like Maple. [OpenSecret provides secure auth, private key management, encrypted data sync, private AI, and more.](https://blog.opensecret.cloud/introducing-opensecret/) Our straightforward API behaves like other backends but automatically adds security and privacy. Use it to secure existing apps or brand-new projects. Protect yourself and your users from the liability of hosting personal data by checking out [OpenSecret](https://opensecret.cloud/).
<img src="https://blossom.primal.net/feb746d5e164e89f0d015646286b88237dce4158f8985e3caaf7e427cebde608.png">
Enjoy private AI Chat 🤘
<img src="https://blossom.primal.net/0594ec56e249de2754ea7dfc225a7ebd46bc298b5af168279ce71f17c2afada0.jpg">
-

@ a012dc82:6458a70d
2025-01-28 15:17:03
In the dynamic world of cryptocurrencies, Bitcoin stands as a pioneering force, a digital currency that has revolutionized the concept of money. Central to its operation and success is a term often heard but not always fully understood: the Bitcoin hashrate. This metric is much more than a technical jargon; it's the heartbeat of the Bitcoin network, powering its transactions, securing its blockchain, and influencing its standing in the market. In this exploration, we delve into the depths of the Bitcoin hashrate, unraveling its complexities and revealing its profound impact on the cryptocurrency market. The hashrate is a window into the soul of Bitcoin, offering insights into its health, efficiency, and future potential. It's a story that intertwines technology, economics, and community, painting a vivid picture of Bitcoin's place in the digital age.
**Table Of Content**
- Understanding Bitcoin Hashrate
- The Role of Hashrate in Network Security
- Hashrate and Decentralization
- Economic Implications for Miners
- Impact on Bitcoin's Market Value
- The Future of Bitcoin's Hashrate
- Conclusion
- FAQs
**Understanding Bitcoin Hashrate**
The Bitcoin hashrate is the powerhouse of the Bitcoin network, a measure of the collective computational effort used to mine and process transactions. It's akin to the horsepower of an engine, driving the network forward. Each hash is a solution to a cryptographic puzzle, and the hashrate signifies the speed at which these puzzles are solved. As Bitcoin's popularity soars, so does the hashrate, reflecting an ever-increasing number of miners vying to validate transactions and create new blocks. This growth is not just a testament to Bitcoin's popularity but also a marker of its robustness and resilience in the face of challenges. The hashrate is a dynamic indicator, fluctuating with the ebb and flow of the network's activity, mirroring the collective effort of thousands of miners around the globe. It's a testament to the decentralized nature of Bitcoin, where no single entity controls the network, but rather a collective effort secures it.
**The Role of Hashrate in Network Security**
Bitcoin's security is its cornerstone, and the hashrate is its shield. In the realm of digital currencies, security threats like the 51% attack loom large, where an entity could potentially take control of the network. However, a high hashrate acts as a formidable barrier, making such attacks not just difficult but economically unfeasible. It's a game of numbers; the higher the hashrate, the more distributed the computational power, and the safer the network. This security is not static but a dynamic force that evolves with the network's growth, adapting to new challenges and fortifying Bitcoin's position as a secure digital asset. The hashrate is a beacon of trust, assuring users and investors alike that the network is robust and resistant to manipulation. It's a critical factor in maintaining the integrity of the blockchain, ensuring that transactions are processed securely and reliably.
**Hashrate and Decentralization**
Decentralization is the soul of Bitcoin, and the hashrate is a reflection of this principle. A decentralized network is less prone to manipulation and control by any single entity, and a high hashrate is indicative of a broad, diverse miner base. This diversity is not just a matter of numbers but a testament to the egalitarian ethos of Bitcoin, where anyone, anywhere, can contribute to the network's upkeep. As the hashrate grows, it weaves a stronger web of participants, each adding to the network's resilience and ensuring its democratic nature. The hashrate is a symbol of the power of the collective, a force that transcends geographical and political boundaries, uniting people under the banner of a decentralized financial system. It's a testament to the vision of Bitcoin's creators, a network that is not just secure and efficient but also open and inclusive.
**Economic Implications for Miners**
For miners, the hashrate is a beacon guiding their economic journey. It's a delicate balance of power, cost, and reward. As the hashrate climbs, so does the difficulty of mining, a self-regulating mechanism ensuring the network's stability. Miners must constantly adapt, balancing the costs of advanced hardware and energy against the potential rewards of new Bitcoins and transaction fees. This ever-shifting landscape is not just a challenge but an opportunity for innovation, driving miners to seek more efficient and sustainable ways to contribute to the network. The hashrate is a measure of opportunity and challenge, a dance of economics and technology where miners play a crucial role. It's a dynamic ecosystem where the fittest survive, adapting to the ever-changing landscape of Bitcoin mining.
**Impact on Bitcoin's Market Value**
The hashrate's influence extends beyond the technical realm into the market. While it doesn't directly dictate Bitcoin's price, it's a barometer of network health and investor confidence. A robust hashrate signals a thriving, secure network, attracting investors and bolstering Bitcoin's market position. It's a subtle yet powerful force, shaping perceptions and influencing decisions in the cryptocurrency market. As Bitcoin continues to evolve, the hashrate stands as a key indicator of its vitality and appeal to the market. The hashrate and market value are intertwined in a complex dance, where the health of the network reflects and influences investor sentiment. It's a symbiotic relationship, where each aspect feeds into and strengthens the other.
**The Future of Bitcoin's Hashrate**
As we look to the future, the Bitcoin hashrate remains a critical aspect of the cryptocurrency's journey. It's not just a measure of computational power but a symbol of the network's evolution, a testament to its strength and a predictor of its potential. The hashrate's trajectory mirrors Bitcoin's own path: ever upward, facing challenges, adapting, and growing stronger. It's a journey not just of technology but of community, innovation, and the relentless pursuit of a decentralized financial future. The hashrate is a narrative of progress, a story of how a decentralized network can grow, adapt, and thrive in the ever-changing landscape of digital currencies. It's a beacon of hope and a testament to the power of collective effort in shaping the future of finance.
**Conclusion**
The Bitcoin hashrate is more than a technical metric; it's the lifeblood of the Bitcoin ecosystem. It encapsulates the network's security, decentralization, economic dynamics, and market influence. As Bitcoin continues to navigate the complex landscape of digital currencies, its hashrate will remain a key indicator of its health and success. It's a story of collective effort, technological innovation, and the relentless pursuit of a decentralized, secure financial future. The hashrate is not just a number; it's the pulse of Bitcoin, beating strongly as it leads the charge in the ever-evolving world of cryptocurrencies. It's a symbol of resilience, a testament to the enduring power of a decentralized network, and a beacon of hope for a future where financial systems are open, secure, and accessible to all.
**FAQs**
**What is Bitcoin hashrate?**
The Bitcoin hashrate is the total computational power used to mine and process transactions on the Bitcoin network, measured in hashes per second.
**Why is the Bitcoin hashrate important?**
It's crucial for network security, indicating the difficulty of performing a 51% attack, and reflects the network's decentralization and health.
**How does the hashrate affect Bitcoin miners?**
A higher hashrate increases the difficulty of mining, impacting the profitability and efficiency of mining operations.
**Does the Bitcoin hashrate influence its market value?**
While not directly affecting the price, a strong hashrate can boost investor confidence, potentially influencing Bitcoin's market value.
**Can the Bitcoin hashrate predict the future of the cryptocurrency?**
The hashrate is a key indicator of Bitcoin's health and can provide insights into its future potential and stability.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
*DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.*
-

@ 0463223a:3b14d673
2025-01-28 09:38:30
I still don’t have much of an idea how it all works, even after all these years. I scroll around the web looking for connection and often don’t find it. Building on the theme I wrote before, how some folks are very sure of themselves. I still don’t get it. A critique people had of me in the past was a lack of confidence. That’s a hard thing to deal with as a man. The statement is really saying you’re low status and if only this that and a third, you’d be a decent human. Cheers!
I’m a recluse. There’s been periods of life I’ve been non verbal and I’ve avoided social interaction a lot. On the flip, I got quite good at wiggling records about to make funny noises and this enabled me to involve myself in music in various was, despite never being a ‘proper musician’, you know, like someone who plays a guitar or piano etc. Over a very long time frame I’ve found myself around music makers that I share common interest with, be that Dub, Hip Hop, weird noises etc. It’s funny, I now know some pretty serious players within those genres and count as few as good friends. It’s fucking mental to be honest. I’ve ticked off a number of childhood heroes, probably people you don’t know, some you would’ve definitely heard on radio but wouldn’t know their names.
I like to think I’m quite good at what I do but the confidence thing is still difficult. Had I moved to London in my youth I could've earned a lot more money, especially in the 90s when there was actually a functioning music industry but I know I can’t deal with that level of hectic so I’ve remained in small places by the sea both in the UK and abroad.
I’ve been working on an album for the best part of a year and have 4 tracks I feel happy with, at least I feel they’re a good representation of my abilities and I’ve been very lucky to have a world class player contribute bass on a couple of tracks. I don’t share the talents of my compardres but as one well known musician I toured with said to me, “I know you’re for the band”. A simple statement but that’s what mattered to him. He liked that I gave a shit about how they sounded, despite beating myself up because I often felt I was fucking their sound up big time (I didn’t let on, with the exception of one gig where EVERYTHING went wrong. I went straight to the dressing room after and flung myself at the mercy of the band apologising!).
After many years I’ve found my groove. Now I’m on this protocol called Nostr. It’s a strange place. It’s very niche, made up of money obsessed nutters. I share some of their beliefs but not all. It’s very American (is anywhere online not?) but it’s cool. I’m finding myself there more and more. I quit all major platforms in 2019. I’d learned too much nasty shit to contribute to making the companies richer. It’s weird, many people don’t seem to realise, you can stop using these platforms and they disappear. That’s the only thing giving these people power. Maybe people enjoy being milked for data? Do cows like having their teets clamped for milking? I’ve never got an answer from one…
Prior to that I found some weird internet money thing which is also becoming more popular, even the President of the USA has some (I think, he also has some other funny tokens and appears to be scamming people big time, yet people still really dig him for some reason).
This funny money has given me something I’ve not really had before, at least since I was maybe 10. A sense of security. It’s remarkable how much more mentally stable it can make you. When I lost my last living place (usual landlord BS) I moved in with my now wife and built a shed, filled it with noise making stuff. That wouldn’t have been possible without my anger towards the banks and how our governments gave them a free pass after they fucked us all. Some deep shit happened but that’s a whole other story. This thing internet money seems to be catching on...
Now I watch higher status folks stake their claim on the world. I try to zone them out as best I can, at least when they’re telling me how successful they are for reasons and playing their status games online. I’m much more interested in learning, mostly via audio, I’ve spent more hours listening to people I disagree with online than I can keep track of. I learn what I can from them and do my best to disregard the noise and try to maintain an awareness of my biases.
I don’t want to agree with everyone here. The moment I do, I know I’m doing something wrong.
They’ll be someone reading this, maybe you, thinking this is utter cringe. Fair enough, I’m not here for you, I’m looking for cool noise makers and weird people to hang with. Clearly this is self indulgent bollocks but fuck it, I’ll put it on this Nostr thing anyway.
-

@ 77110427:f621e11c
2025-01-27 18:40:44
All credit to Guns Magazine. Read the full issue here ⬇️
[May 1957 PDF](https://gunsmagazine.com/wp-content/uploads/2018/12/G0557.pdf)
---




















---
### Past Magazine Mondays
[001: May 1963](https://1776.npub.pro/post/note1r5ve5en9tyv38hathy2twhm9h4dn7tq7fgradzkazskxyxtckysqeqxyzm/)
[002: August 1969](https://1776.npub.pro/post/note1zkeur68w9h8ljswp4a4xc45exfv725v6vudqdhyukqz6kz37vdaq097f9z/)
[003: February 1970](https://1776.npub.pro/post/1733177494421/)
---
### More from 1776 HODL
[Full Auto Friday](https://1776.npub.pro/tag/fullautofriday/)
[Sniper Saturday](https://1776.npub.pro/tag/snipersaturday/)
[Shotgun Sunday](https://1776.npub.pro/tag/shotgunsunday/)
[Infographics](https://1776.npub.pro/tag/infographic/)
[Gun Memes](https://1776.npub.pro/tag/memestr/)
---
### Website
[1776 Hodl](https://1776.npub.pro)
-

@ a012dc82:6458a70d
2025-01-27 12:51:47
In the contemporary financial world, Cathie Wood, the founder of ARK Invest, stands out for her innovative investment approaches. Recently, Wood has focused on Bitcoin (BTC), highlighting its potential as a hedge against both inflationary and deflationary economic conditions. This article delves into Wood's perspective, exploring Bitcoin's evolving role in the global financial landscape. We examine its multifaceted nature, not just as a digital currency, but as a strategic asset capable of navigating the complex dynamics of the modern economy. Wood's insights offer a nuanced understanding of Bitcoin's potential in offering stability amidst economic uncertainties.
**Table Of Content**
- Bitcoin's Hedge Potential
- Decentralization: A Key Advantage
- The Banking Crisis and Bitcoin
- Bitcoin vs. Gold
- Institutional Involvement
- Conclusion
- FAQs
**Bitcoin's Hedge Potential**
Cathie Wood's perspective on Bitcoin transcends its usual perception as a mere digital currency. She champions it as a dynamic tool against economic fluctuations, a quality rarely matched by traditional assets. In an era marked by economic instability, Bitcoin stands as a beacon of potential stability. This is particularly notable in its capacity to act as a hedge during inflationary periods, where fiat currencies lose value, and deflationary periods, characterized by increased money value but decreased economic activity. This dual capability positions Bitcoin as a significant asset in diversified portfolios, resonating with Wood's innovative investment philosophy.
**Decentralization: A Key Advantage**
For Wood, Bitcoin's decentralization is a critical advantage. This aspect sets it apart from traditional banking systems, which often grapple with issues of transparency and central control. In Bitcoin's ecosystem, there is a clear absence of counterparty risk, thanks to its decentralized ledger and visible transactions. This transparency assures investors of a level of security and autonomy not found in conventional financial systems. In Wood's view, this decentralization is not just a technical feature but a foundational aspect that provides Bitcoin with a resilience and reliability, crucial in a world where financial systems are increasingly interconnected and vulnerable.
**The Banking Crisis and Bitcoin**
Reflecting on recent financial upheavals, such as the U.S. regional bank crisis and the FTX collapse, Wood sees these events as vindications of Bitcoin's stability and resilience. These crises underscored the inherent risks of centralized financial systems, revealing their fragility under stress. In contrast, Bitcoin demonstrated an impressive resilience, with its value surging during these tumultuous times. This reaction not only highlights Bitcoin's potential as a safe haven but also its capacity to serve as a barometer for the health of the broader financial system.
**Bitcoin vs. Gold**
While gold has traditionally been the go-to asset for hedge investments, Wood argues that Bitcoin has a distinct edge over it. Her preference for Bitcoin stems from its novelty and the increasing interest from younger investors and institutional players. Unlike gold, whose market and demand patterns are well-established, Bitcoin represents an emerging asset class with untapped potential. Wood believes that Bitcoin's journey is just beginning, and its full potential as a hedge asset is yet to be realized, making it a more attractive option for forward-looking investors.
**Institutional Involvement**
Wood's belief in Bitcoin's future is mirrored in ARK Invest's substantial investments in cryptocurrency-related ventures. These investments are not mere speculative plays; they represent a deep conviction in the long-term value of Bitcoin. ARK's pursuit of a spot Bitcoin ETF is a significant move, indicating a belief in the cryptocurrency's viability as a mainstream investment asset. This institutional backing by a leading investment firm not only legitimizes Bitcoin's role in the financial markets but also paves the way for more widespread adoption among traditional investors.
**Conclusion**
Cathie Wood's endorsement of Bitcoin is a compelling narrative in the evolving story of this digital asset. Her insights provide a valuable perspective on Bitcoin's role as a hedge against both inflation and deflation, highlighting its potential in the current economic climate. As we navigate through uncertain financial times, Wood's views offer a guidepost for investors looking to diversify and stabilize their portfolios with innovative assets like Bitcoin.
**FAQs**
**What is Cathie Wood's view on Bitcoin?**
Cathie Wood sees Bitcoin as a viable hedge against both inflation and deflation, highlighting its decentralized nature and resilience.
**Why does Wood prefer Bitcoin over traditional banking systems?**
Wood values Bitcoin's transparency and lack of counterparty risk, contrasting it with the opacity of traditional banking systems.
**How did the banking crisis impact Bitcoin's value?**
The U.S. regional bank crisis and the FTX collapse showed Bitcoin's stability, with its value increasing during these times.
**Why does Wood favor Bitcoin over gold?**
Wood believes Bitcoin has more potential for growth and is more appealing to younger investors and institutions compared to gold.
**What is ARK Invest's involvement in Bitcoin?**
ARK Invest holds significant stakes in cryptocurrency ventures and is pursuing a spot Bitcoin ETF, reflecting a strong belief in Bitcoin's future.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
*DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.*
-

@ cf7ed325:050194cf
2025-01-27 12:39:41
[]()The [Steigenberger Minerva Nile Cruise](https://www.etbtoursegypt.com/tour/Steinberger-Minerva-Nile-Cruise) offers an exceptional way to explore Egypt's ancient wonders while cruising along the timeless Nile River. This luxurious cruise combines modern amenities with traditional Egyptian hospitality, making it an ideal choice for those seeking comfort and adventure. With spacious cabins, fine dining, and various entertainment options, the Steigenberger Minerva promises an unforgettable experience.
While aboard, guests can enjoy a range of excursions to famous sites like the Pyramids of Giza, Luxor Temple, and the Valley of the Kings. The ship provides a perfect base for exploring Egypt’s rich history, from the bustling streets of Cairo to the serene landscapes of Aswan. The cruise features a blend of relaxation and adventure, offering guests an opportunity to unwind while taking in Egypt's stunning scenery.
In addition to the Steigenberger Minerva Nile Cruise, Egypt offers a variety of other luxurious options. For example, the [Farah Nile Cruise](https://www.etbtoursegypt.com/tour/MS-Farah-Nile-Cruise) is known for its elegant design and top-notch service, while the [Gemma Nile Cruise](https://www.etbtoursegypt.com/tour/gemma-nile-cruise) provides a more intimate, boutique experience. The [Movenpick SS Misr Nile Cruise](https://www.etbtoursegypt.com/tour/moevenpick-ss-misr-steamer-nile-cruise) is another excellent choice for those who enjoy a classic, refined atmosphere on the river.
If you’re looking for other luxury cruises, consider the [Nile Capital Nile Cruise](https://www.etbtoursegypt.com/tour/nile-capital-cruise), which combines modern comfort with historical exploration, or the [Movenpick Hamees Nile Cruise](https://www.etbtoursegypt.com/tour/Movenpick-Hamees-Nile-Cruise), a ship that offers a unique blend of luxury and cultural immersion. The Movenpick Lotus Nile Cruise and the [Jaz Regent Nile Cruise](https://www.etbtoursegypt.com/tour/Jaz-Regent-Nile-Cruise) are also popular choices, known for their impeccable service and well-designed cabins.
For a more opulent experience, the [Jaz Crown Jewel Nile Cruise](https://www.etbtoursegypt.com/tour/Jaz-Crown-Jewel-Nile-Cruise) is a top contender, while the [Salacia Nile Cruise](https://www.etbtoursegypt.com/tour/MS-Salacia-Nile-cruise) and Nabilatan Nile Cruise provide a more exclusive atmosphere. Alternatively, the [Tulip Nile Cruise](https://www.etbtoursegypt.com/tour/Tulip-Nile-Cruise-Luxor-Aswan) and [Tia Nile Cruise](https://www.etbtoursegypt.com/tour/ms-tia-nile-cruise) offer comfortable accommodations with excellent amenities.
No matter which cruise you choose, Egypt's Nile River promises an unforgettable journey through history and culture.
🌐 Visit us at www.etbtoursegypt.com
📲 Contact us now! +20 10 21100873
📧 Email: info@etbtours.com
🏢 Company Address: 4 El Lebeny Axis , Nazlet Al Batran , Al Haram, Giza , Egypt
-

@ 0463223a:3b14d673
2025-01-27 10:47:00
I wrote this article back in 2019 but I wanted to see how it stood up today. Since writing this I’ve been diagnosed with autism. However, I question this. For sure I’ve gone through lots of ups and downs in life. Some issues probably due to childhood trauma, others due to drugs etc. but I still ask if is a natural response to bullshit.
I don’t write this to belittle any problems anyone has and the autism spectrum disorder is real (but not disorder to me). When the whole population gets diagnosed as neurodivergent what next?
If you need help, get help. I write this as a person trying to get off the drugs prescribed to me many years ago. Something I’m finding difficult but I will do it…
From 2019
A large part of the adult population in the Western World are mad, mental, bonkers, have lost their marbles and are totally insane. Well, that’s at least according to the World Health Organisation
A recent WHO report stated one in four people in the world will be affected by mental or neurological disorders at some point in their lives. And there’s a very high chance that you, the reader, are completely off your rocker.
Mental Health is the buzzphrase of our times. It’s on the TV, the radio and all over the internet. The UK’s Prime Minister goes on TV to state how big the problem is and just how very seriously she takes it and we’re assured the government are working extremely hard to tackle it. However, the rhetoric never amounts to anything, as anyone seeking genuine help will attest.
Help is hard to come by. Doctors prescribe pills to subdue the wrong thoughts, but nothing else. No long term solutions, just keep taking the pills.
Hundreds of thousands of adults are medicated in this way and now, more worryingly, are many children.
So it’s vital to talk about it. It’s permanently Mentalspeng Awareness Day or Tell Facebacon Your Neurologicalwankfuck Week.
It’s even become quite fashionable, with regular treats from celebrities telling of their darkest moments and how they nearly didn’t get that huge Hollywood deal because they woke up feeling sad and unhappy one winter morning.
If you’re a fruit-loop tell everyone. It will be ok…
Tell them about the time you were going to drive your car off a cliff and ended up in hospital after a particularly long conversation with The Samaritans. Great stuff!
Tell them about the regular, uncontrollable urges to slash yourself with a Stanley knife or any other sharp object close to hand. Awesome!
Tell them about how you smash yourself repeatedly in the head, sometimes with a heavy object, as you can no longer deal with the stress and frustration of being disempowered by situations completely out of your control. Cool!
Tell them how you feel trapped by an increasingly expensive housing market and how you have zero financial security. Brilliant!
Or maybe just tell them that sometimes you can’t get out of bed and you don’t know why or that you panic uncontrollably for no reason. Skills!
Tell the world!
We’re so understanding of mental health issues these days, just raise more awareness and everything will be fine, we’re here for you man/woman! (and yes, we might need to sell this information on to the appropriate persons, future employers, insurance companies or government agencies etc.).
After all, we’re all good people right? Tell everyone you’re mad and they’ll understand. They’ll think of the time you were a dick and they’ll say “Ahh, poor sod, you know he’s a mental don’t you”.
Well frankly no. The world is full of cunts and whilst the people close to you will be sympathetic, as far as wider society goes, you’ll be marked, your position compromised and your word will not be trusted. I mean who knows, maybe you’re delusional, perhaps you’re about to rampage through town wielding a knife or driving your car into a crowded supermarket…
But hold up…. One in every four of us is mental?! Is that really the case? Let’s think about this for a second. When did 25% of the population become a massive neurospeng?
This wasn’t the case 30 years ago, a quarter of the population weren’t mad. There wasn’t the vast array of medications available these days; Prozac, Sertraline, Citralopram, Promethazine, Venlafaxine, Amiltryptaline, to name a few (there are many, many more).
It’s clear that a lot of people aren’t feeling right but how come the suicide rates are higher now than they were 30 years ago? If we’re all so much more aware and well medicated, surely rates would be going down?
Perhaps you were diagnosed as a mental because you responded negatively to events happening around you?
Maybe you’re working increasingly longer hours for less money. Perhaps the terms of your work changed drastically and you no longer feel secure. Maybe you lost jobs because of funding cut backs.
Perhaps you’re in despair because your friend took their own life when their job was cut in an austerity drive.
Suicide is the most horrible thing which ever way you look at it. You strip a person of their purpose and they react with the most extreme act of self violence, causing an unbelievable amount of emotional distress for those left to pick up the pieces… And so we say, “Ahh but you understand, they were mad… They were fucking mental, they lost control of their senses, it such a terrible shame but they were mad you know”.
Bullshit.
The term Mental Health removes all responsibility from the structures creating an environment where people are deemed no longer of value or viable human beings.
But maybe you were angry because you were told by politicians that you need to live within your means, whilst those in large financial institutions increased their wealth exponentially? The world economy crashed in 2008 and there’s no money. Eh? The governments of printed more and more money, but there’s no money for you, you cunt.
Perhaps it was packed aboard a spaceship and is now hurtling towards Mars! (mad people tend to think like this, after all it couldn’t be that the money was stolen).
Maybe you got angry with the blatant corruption from those in public life? Politicians shout loudly that they’re for the people but will pocket pay rises, local council officials bully members of the public and make threats to cut funding .
This can be done with total with total impunity, as the structures put in place to control such actions cover up any wrong doing. You see the powerful can not and will not be challenged. There is no pathway to justice.
When the fire at Grenfell happened, it was clear for all to see that the housing association, council and big business were at fault, but no, blame was heaped on the lone fire officer who had the awful task of managing two lowly fire engines in London’s biggest fire since World War II.
At the time my local Member of Parliament response was “the flats were refurbished to a very high standard”. We shouldn’t lay blame at those in power, we cannot have any fault with the establishment. I bet that poor fire officer was a mental too…
When discussing mental health we’re not talking about a brain injury or unfortunate illness. There’s extreme difficulty coping with the world but it’s not madness and it’s not a delusion.
It’s a natural reaction to bullshit. We’re are completely surrounded by bullshit, on the internet bullshit, on the TV bullshit, in the work place bullshit, from our leaders bullshit etc. etc. The world is running on massive excess levels of bullshit.
And this is the natural emotional response to bullshit.
Mental Health is used to invalidate the anger, freeing the powerful from responsibility and laying blame squarely at the individuals door. In the meantime, piece by piece, the powerful steal everything we’ve ever owned.
So next time someone says to you raise awareness about mental health, maybe tell them to fuck off.
Either that or tell them you’re flying to the Moon to have tea with Kim Jong Un and Barney The Dinosaur.
Fuck mental health.
*Image used without permission of Barney The Dinosaur.
-

@ 97121c7b:30a10e4e
2025-01-27 07:05:52
**test descripties**
c ![data:image/svg+xml;utf8,%3Csvg%20viewBox%3D%22-1.5%20-1.5%208%208%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20fill%3D%22hsl(160%2095%25%2045%25)%22%3E%3Crect%20x%3D%220%22%20y%3D%220%22%20width%3D%221%22%20height%3D%221%22%2F%3E%3Crect%20x%3D%220%22%20y%3D%222%22%20width%3D%221%22%20height%3D%221%22%2F%3E%3Crect%20x%3D%221%22%20y%3D%220%22%20width%3D%221%22%20height%3D%221%22%2F%3E%3Crect%20x%3D%222%22%20y%3D%220%22%20width%3D%221%22%20height%3D%221%22%2F%3E%3Crect%20x%3D%222%22%20y%3D%221%22%20width%3D%221%22%20height%3D%221%22%2F%3E%3Crect%20x%3D%222%22%20y%3D%222%22%20width%3D%221%22%20height%3D%221%22%2F%3E%3Crect%20x%3D%224%22%20y%3D%220%22%20width%3D%221%22%20height%3D%221%22%2F%3E%3Crect%20x%3D%224%22%20y%3D%222%22%20width%3D%221%22%20height%3D%221%22%2F%3E%3Crect%20x%3D%223%22%20y%3D%220%22%20width%3D%221%22%20height%3D%221%22%2F%3E%3C%2Fsvg%3E]()
-

@ 97121c7b:30a10e4e
2025-01-27 06:18:42
here is where the content will be
just a test
-

@ 2d71bbd8:0088d52f
2025-01-27 05:14:52
Some say certain events change our lives in such extreme ways that you will remember them as marking a before and an after. We could say that about some chaotic events making the news, or changes sweeping away the known ways of the world, like a new wave of technology. Something more meaningful can happen to each of us, transforming our lives in deeper ways: love.
I remember a time before him, and everything else is life with him.
Love can feel like a ghost arriving with unpredictable timing and difficult to imagine until you live it. Some think it's real though they've never experienced it. Others spend their lifetimes looking for it. Others think it doesn't exist, and that heartbreak is proof of that. Why does love feel so elusive? How do we even recognize what love is, *real* love. I'm recalling a scene in the movie While You Were Sleeping, which asks the question, "When did you fall in love with him?". The answer being the title of the movie. If you've experienced love, when did you know you were in love?
For me, it was a particular moment where he started digging into what I thought about something. We had spent many days exchanging conversations, I don't remember exactly how long. They felt formal, structured, without as much depth to them. It was as if we didn't yet feel free to be ourselves. I don't remember what we were talking about that specific night, but he was genuinely interested in what I was saying. Many can fake conversations, but this was not that. We had a deeper spontaneous conversation, and he continues to do that almost every single day. We are constantly extending the roots of our history.
Our lifetimes may be but dust in the existence of the universe, but, in this brief moment in time (which seems long to us), we have shared more thoughts than I have probably exchanged with most of the people I know, combined. I didn't think that was possible nor bearable, yet it feels comfortable and often cozy, even after all these years. I miss it significantly when we have gotten busy on something else in our lives. I thought it would fall back into the mundane, but it doesn't. It is like magnetic curiosity on fire.
Not a day goes by where I don't wonder how my life became so blessed by his existence. He has been an oasis, as there is no topic we cannot talk about or dive into respectfully and deeply. Life is not an easy clear path we walk on everyday. On days of turmoil, when emotional waves are crashing on the shores of our hearts, it is this ability to tell each other anything that has resolved most of the issues at core. Listening to what we each have to say has granted us an understanding of the situation no one else could have. The listening is the starting foundation, as we build a compilation of moments on it, like blocks on a Bitcoin blockchain that cannot be undone.
We often hear that happiness is the goal for a relationship, but we haven't experienced a relationship until we have walked through the whole range of emotions together. It is in those moments, where we're hanging on to each other for strength, that you realize the power of love. It is the sweetest nectar that carries you forward, even during bitter times.
There is a before and an after, and I feel grateful for living in the after, for as long as life grants us time.
I often wonder about all those little details that make him special to me, but also their opposite, which makes it often into our conversations as we decide what we want our love to be. It is as if we were creating a compass to how to love from understanding the differences between what we value and what we choose to leave out. It is not a ruleset. It works like a protocol.
It may be a cultural aspect of today's society, which favors women who do not speak their mind, but I hardly ever remember anyone being seriously interested in what I was saying. I've sometimes heard the idea of how we look more beautiful when we're quiet. I don't think beauty could be silent, as it lives within the heart, and you would never get to know it if it doesn't have a voice of its own.
I'm very familiar with the faces of people reacting to something a woman says. It takes different shapes. Some are worried about what you might say, even after they've asked for your advice. They can be concerned that your differing patterns of thinking might reveal a truth they are trying hard to conceal or ignore. Yet our thinking as individuals is often lacking in perspective, and we cannot gaze at the forest while being a tree. Humans are meant to be connected, and exchanging information is an important part of that connection.
Another familiar stare are those vacant eyes, similar nowadays to people looking at their phones. Cancel culture is comparable, as it ignores variety of thought, to live within a controlled sphere of what is acceptable, where truth cannot thrive. On social media, you may not see people's faces, but you can feel the coldness of their silence, as if they had turned their back on a part of their humanity. It used to be that we would only experience reactions from people, now it's not only the people but algorithms, bots.... I understand the need to feel comfortable somewhere, but I've learned the beauty of welcoming human thought, and with it heart. It is like staring out into the ocean, and realizing how small we are. A place where you cannot be yourself, and where you are worried about being censored if you speak on specific topics, seems like a lonely one. I'm grateful we have our own little niche of freedom here.
The worst reactions to differing voices are attacks, regardless of what you have to say. It is like that old Aesop's fable "The Man, the Boy, and the Donkey." That large book of fables is engraved in my childhood memories, with most of its fables lost to time, as if it was perpetually open to that one page. I didn't know then just how important it would be to love. Love requires you to be you. No alternative exists, nor would you want one, once you feel the freedom. As he likes to say, "It is those things you think are imperfect and flawed within you, that I love."
I learned early on that people's reactions are often a reflection of inner turmoil, so you always wonder what each person has lived through that has made them react to you so negatively. Some people seem wired for fighting without a conscious awareness of what's behind their fighting, as if they were trolls, forgoing the benefits of working toward similar goals. Others seem to enjoy the attention that comes with the chaos, and the likes from spreading lies. I wish there was a stronger culture of respect and a desire to understand and learn from each other, as I feel the benefits of that everyday with him. It seems strange to gaze at the conversations of people fighting each other to where they've forgotten what started the fight, and they continue fighting over nothing.
The human desire for ignoring differing points of view or bringing them down runs deeper and more widespread than I'd like. It's as if mutual listening has become a lost art. Without listening, knowledge fades away, along with empathy. Social media may be changing part of the culture, though at times it seems to magnify the issues. The existence of nostr, however, gives me hope, as it's core principle is to value human thought and the diverse ways to protect it. I am grateful for how it encourages a building of trust based on verification, shaping the foundation for both identity and communities.
Who are we if we cannot listen to each other. Who are we if we favor silence of what we do not understand or what is different. Could humanity be what it is today if people didn't exchange their voices and built upon them. Who are we if we silence criticism, when it is through constructive criticism that we grow. Would we want silence of what makes us unique to be the norm for those we love and those who will come in future generations, as if we were a single minded machine puppeteered by a few. Without an ability to think and speak freely, we lose the foundation that makes love possible. Without love it is as if we haven't lived.
-

@ bbb5dda0:f09e2747
2025-01-27 03:22:10
At Nostriga in the middle of last year I got introduced to TollGate, a project to resell internet access, I was fascinated and hyped for this to become a thing. Later during SEC-03 I got involved in the development of TollGate and helped work out the idea utilizing Nostr to make the experience of using a TollGate super smooth. That's where the idea started to make a cross-platform app that would autoconnect and start streaming sats to TollGates for internet access.
I'd been working on it here and there and this week I feel like I got in to the developer high (i'm sure some of you know what that feels like) and I just wanted to see the android app work! So as the week moved along I just kept being drawn in. And progress there was! The vision we had during SEC is coming to be a reality very fast.
**TL;DR** There's a demo video at the bottom.
## Quick CI/CD update
I've been talking to DanConwayDev to work together on getting the UI for the pipelines into GitWorkshop, which would be the perfect place for it. He's in the middle of a rewrite, so when that is progressing a bit more we'll cooperate on making this part of it, stay tuned!
## Whoami
I started by creating a service that would run on every TollGate router that a client can use to fetch their own MAC address that's later included in the payment. The MAC address is the anchor for the router to allow/disallow access. The problem we have on Android is that the operating system restricts access to this information. But since we control the router, we can work around it by creating a predictable endpoint that gives us back this answer.
## Beacon frames
Routers use something called Beacon Frames, which are sent out regularly and it is the thing your phone looks at when scanning for wifi networks. It contains the name of the network (SSID) and a whole bunch of other stuff you don't usually see.
We're utilising these beacon frames to add some information specific to tollgates. There is a field in these beacon frames called 'vendor elements'. Which is originally only intended for use by manufacturers of routers. But ofcourse we can utilize them too. Which is exactly what we do.
I eperimented with these beacon frames to see how many of them we can broadcast. It turns out that we're limited to only one of them, but the good news is we can fit up to 249 characters (256 - a few reserved ones) in there.
This is amazing because it will fit everything we need in there.
We put in:
- Nostr npub
- TollGate version
- Gateway IP (required to get around OS limitations)
- allocationType (KiB/Minutes)
- price per 1024 units (eg: 104900 sats per 1024 KiB)
- price units (sat)
So now any tollgate can broadcast this info, which is used by clients to decide wether or not they should connect. And if they do, where the payment should go.
## Suggestions, Suggestions, Suggestions
Unfortunately, Android in the past few years has locked down the wifi api's and we can no longer fully autoconnect to networks. Instead we have to use the 'wifi suggestions' API. As the name implies, it will only suggest a nework to a user using a silent notification that they have to press to actually connect. But alas, we'll work with that and if it's the only user-action required, that's still quite okay.
It took me quite a while to figure out the way the OS handles these suggestions, but eventually I got it to work and was able to get the flow to work!
## Adding the payment
Ok this part doesn't include an actual payment yet, but all the components are in place now for a (semi-)automatic tollgate connection, which is EPIC!
In this version i still manually tap 'connect', but this can and will be automatic soon.
So the steps are as follows (this happens in a few seconds):
- 📲 TollGate App scans for networks and filters for TollGates
- 👤 User taps Connect [to be automated]
- 📲 TollGate App suggests network
- 👤 User taps suggestion notification to connect
- 🤖 Android connects to network
- 📲 TollGate App fetches it's own MAC address (whoami service on router)
- 📲 TollGate App Connects to Nostr relay (running on the router)
- 📲 TollGate App Sends payment
- 🛜 Router receives payment (merchant module)
- 🛜 Router creates session (merchant module)
- 🛜 Router opens the gate for user (valve module)
- 🛜 Router closes the gate for user, when purchase runs out (valve module)
I made this recording, it has a small caveat that at the end the page loaded because I was on 5g, the OS still thought the wifi network had a captive portal open. But there's an API to mark it as dismissed, which we can easily implement. So that's an issue we can overcome!
## Demo video
https://cdn.satellite.earth/ede26976043a0b8edf278ea51aa0c00e721d2134c4e456928192090ea660bda0.mp4
-

@ 76c71aae:3e29cafa
2025-01-26 22:51:16
When I first heard about the DOGE project, I was ready to throw my laptop out the window. The [initial proposal](https://archive.is/nFNp4) read like a Silicon Valley libertarian fever dream - taking Musk's chaotic "move fast and break democracy" Twitter approach and unleashing it on federal agencies. Great, I thought, just what we need: more tech bros thinking they can "optimize" public institutions into oblivion.
But here's the weird thing - when you actually dig into [what DOGE has morphed into](https://www.nextgov.com/people/2025/01/us-digital-service-employees-are-being-re-interviewed-under-doge-transition/402423/), it's basically just USDS with a meme-worthy rebrand. For those not deep in the civic tech weeds, USDS was Obama's attempt to drag government technology out of the 1990s, inspired by the UK's actually-functional GDS program. And let's be real - government tech procurement is an absolute dumpster fire right now. We're talking billions wasted on projects that would make a CS101 student cringe, while the average American has to navigate websites that look like they were designed on GeoCities.
The deeply ironic thing is that Musk - for all his cosplaying as a technocratic messiah following in his grandfather's footsteps of dreaming up an antidemocratic technocratic state - actually has some relevant experience here. SpaceX did figure out how to work with government contracts without producing $500 million paperweights, and Tesla somehow gamed clean vehicle incentives into birthing the first new major car company since we invented radio.
Look, I'm the first to roll my eyes at Musk's wannabe-fascist posting sprees and his perpetual "I'm the main character of capitalism" energy. But speaking as someone who's banged their head against the wall of government technology modernization for years - if he actually focuses on the tech and keeps his brainrot political takes to himself, maybe DOGE could do some good?
Even Jen Pahlka, who basically wrote the book on government digital services, [is cautiously optimistic](https://fedscoop.com/trump-wants-a-doge-an-obama-era-tech-official-has-some-tips/). The services Americans get from their government are objectively terrible, and the procurement system is trapped in an infinite loop of failure. Maybe - and I can't believe I'm typing this - Musk's particular flavor of disruptive tech deployment could help?
Just... please, for the love of all things agile, let's keep him focused on the actual technology and far away from any more attempts to recreate his grandfather's dreams of a technocratic dystopia. We've got enough of those already.
-

@ 0463223a:3b14d673
2025-01-26 13:07:36
Hmm so I heard that in order to improve my brain I should try writing… Ok groovy, I’ll give it a go. In all honesty I don’t know what to write, my brain is a jumble of noise and titbits of random knowledge. I likely know more about sound than the average person but as physics goes, I don’t have anything new or profound to add. Air moves and noises happen. Is there really any more to it? I could write some flowery bollocks about refraction, absorption coefficients and reverberation times, or I could write some out there, arty shit but I don’t think that adds any value to anyone.
A lot of folks online have very strong beliefs in how the world operates or should operate. Whilst their conviction is strong, there’s also is a large percentage of people who totally disagree with them and think the exact opposite is the answer. That’s quite shit isn’t it? Humans have been around for 100,000 years or so and haven’t worked it out. I wonder what makes the internet celeb so certain they’ve got it right when the next internet celeb completely disagrees? I do my best to avoid any of these cunts but despite running to the obscurest social media platforms they still turn up with their profound statements. Meh.
Ideologically I’m leaning toward anarchism but even that seems full of arguments and contradictions and ultimately I don’t think I can be arsed with identifying with any particular ideology. I tried reading some philosophy and struggled with it, although I deep fall into a lovely deep sleep. It’s fair to say I’m not the brightest button in the box. I have a wife, a couple of cats and lots of things that make nosies in my shed. That’s pretty cool right? Well it works for me.
So why write this? I clearly wrote in the first sentence that I’m trying to improve my brain, a brain that’s gone through a number to twists and turns, a lot brain altering substances. I own that, no one forced me to. Beside, George Clinton was still smoking crack aged 80, didn’t do him any harm…
I’m on the 5th paragraph. I don’t feel any smarter yet and each paragraph is getting shorter, having started from a low base. I guess I’m being too high time preference… Might be a while before I launch my Deep Thought podcasts where myself and a guest talk for 500 hours about the philosophy of money and 13 amp plug sockets.
I’ve tortured myself enough. I’m posting this on Nostr where it will never go away.. lol. If you got this far, I congratulate/commiserate you and wish you a wonderful day.
-

@ 599f67f7:21fb3ea9
2025-01-26 11:01:05
## ¿Qué es Blossom?
nostr:nevent1qqspttj39n6ld4plhn4e2mq3utxpju93u4k7w33l3ehxyf0g9lh3f0qpzpmhxue69uhkummnw3ezuamfdejsygzenanl0hmkjnrq8fksvdhpt67xzrdh0h8agltwt5znsmvzr7e74ywgmr72
[Blossom](https://github.com/hzrd149/blossom) significa _Blobs Simply Stored on Media Servers_ (Blobs Simplemente Almacenados en Servidores de Medios). _Blobs_ son fragmentos de datos binarios, como archivos pero sin nombres. En lugar de nombres, se identifican por su hash [sha256](https://es.wikipedia.org/wiki/SHA-2). La ventaja de usar hashes sha256 en lugar de nombres es que los hashes son IDs universales que se pueden calcular a partir del archivo mismo utilizando el algoritmo de hash sha256.
💡 archivo -> sha256 -> hash
Blossom es, por lo tanto, un conjunto de puntos finales HTTP que permiten a los usuarios almacenar y recuperar blobs almacenados en servidores utilizando su identidad nostr.
## ¿Por qué Blossom?
Como mencionamos hace un momento, al usar claves nostr como su identidad, Blossom permite que los datos sean "propiedad" del usuario. Esto simplifica enormemente la cuestión de "qué es spam" para el alojamiento de servidores. Por ejemplo, en nuestro Blossom solo permitimos cargas por miembros de la comunidad verificados que tengan un [NIP-05](https://nips.nostr.com/5) con nosotros.
Los usuarios pueden subir en múltiples servidores de blossom, por ejemplo, uno alojado por su comunidad, uno de pago, otro público y gratuito, para establecer redundancia de sus datos. Los blobs pueden ser [espejados](https://github.com/hzrd149/blossom/blob/master/buds/04.md) entre servidores de blossom, de manera similar a cómo los relays nostr pueden transmitir eventos entre sí. Esto mejora la resistencia a la censura de blossom.
A continuación se muestra una breve tabla de comparación entre torrents, Blossom y servidores CDN centralizados. (Suponiendo que hay muchos seeders para torrents y se utilizan múltiples servidores con Blossom).
| | Torrents | Blossom | CDN Centralizado |
| --------------------------------------------------------------- | -------- | ------- | ---------------- |
| Descentralizado | ✅ | ✅ | ❌ |
| Resistencia a la censura | ✅ | ✅ | ❌ |
| ¿Puedo usarlo para publicar fotos de gatitos en redes sociales? | ❌ | ✅ | ✅ |
## ¿Cómo funciona?
Blossom utiliza varios tipos de eventos nostr para comunicarse con el servidor de medios.
| kind | descripción | BUD |
| ----- | ------------------------------- | ------------------------------------------------------------------ |
| 24242 | Evento de autorización | [BUD01](https://github.com/hzrd149/blossom/blob/master/buds/01.md) |
| 10063 | Lista de Servidores de Usuarios | [BUD03](https://github.com/hzrd149/blossom/blob/master/buds/03.md) |
### kind:24242 - Autorización
Esto es esencialmente lo que ya describimos al usar claves nostr como IDs de usuario. En el evento, el usuario le dice al servidor que quiere subir o eliminar un archivo y lo firma con sus claves nostr. El servidor realiza algunas verificaciones en este evento y luego ejecuta el comando del usuario si todo parece estar bien.
### kind:10063 - Lista de Servidores de Usuarios
Esto es utilizado por el usuario para anunciar a qué servidores de medios está subiendo. De esta manera, cuando el cliente ve esta lista, sabe dónde subir los archivos del usuario. También puede subir en múltiples servidores definidos en la lista para asegurar redundancia. En el lado de recuperación, si por alguna razón uno de los servidores en la lista del usuario está fuera de servicio, o el archivo ya no se puede encontrar allí, el cliente puede usar esta lista para intentar recuperar el archivo de otros servidores en la lista. Dado que los blobs se identifican por sus hashes, el mismo blob tendrá el mismo hash en cualquier servidor de medios. Todo lo que el cliente necesita hacer es cambiar la URL por la de un servidor diferente.
Ahora, además de los conceptos básicos de cómo funciona Blossom, también hay otros tipos de eventos que hacen que Blossom sea aún más interesante.
| kind | descripción |
| ----- | --------------------- |
| 30563 | Blossom Drives |
| 36363 | Listado de Servidores |
| 31963 | Reseña de Servidores |
### kind:30563 - Blossom Drives
Este tipo de evento facilita la organización de blobs en carpetas, como estamos acostumbrados con los drives (piensa en Google Drive, iCloud, Proton Drive, etc.). El evento contiene información sobre la estructura de carpetas y los metadatos del drive.
### kind:36363 y kind:31963 - Listado y Reseña
Estos tipos de eventos permiten a los usuarios descubrir y reseñar servidores de medios a través de nostr. kind:36363 es un listado de servidores que contiene la URL del servidor. kind:31963 es una reseña, donde los usuarios pueden calificar servidores.
## ¿Cómo lo uso?
### Encuentra un servidor
Primero necesitarás elegir un servidor Blossom donde subirás tus archivos. Puedes navegar por los públicos en [blossomservers.com](https://blossomservers.com/). Algunos de ellos son de pago, otros pueden requerir que tus claves nostr estén en una lista blanca.
Luego, puedes ir a la URL de su servidor y probar a subir un archivo pequeño, como una foto. Si estás satisfecho con el servidor (es rápido y aún no te ha fallado), puedes agregarlo a tu Lista de Servidores de Usuarios. Cubriremos brevemente cómo hacer esto en noStrudel y Amethyst (pero solo necesitas hacer esto una vez, una vez que tu lista actualizada esté publicada, los clientes pueden simplemente recuperarla de nostr).
### noStrudel
1. Encuentra Relays en la barra lateral, luego elige Servidores de Medios.
2. Agrega un servidor de medios, o mejor aún, varios.
3. Publica tu lista de servidores. ✅
### Amethyst
1. En la barra lateral, encuentra Servidores multimedia.
2. Bajo Servidores Blossom, agrega tus servidores de medios.
3. Firma y publica. ✅
Ahora, cuando vayas a hacer una publicación y adjuntar una foto, por ejemplo, se subirá en tu servidor blossom.
⚠️ Ten en cuenta que debes suponer que los archivos que subas serán públicos. Aunque puedes proteger un archivo con contraseña, esto no ha sido auditado.
### Blossom Drive
Como mencionamos anteriormente, podemos publicar eventos para organizar nuestros blobs en carpetas. Esto puede ser excelente para compartir archivos con tu equipo, o simplemente para mantener las cosas organizadas.
Para probarlo, ve a [blossom.hzrd149.com](https://blossom.hzrd149.com/) (o nuestra instancia comunitaria en [blossom.bitcointxoko.com](https://blossom.bitcointxoko.com)) e inicia sesión con tu método preferido.
Puedes crear una nueva unidad y agregar blobs desde allí.
### Bouquet
Si usas múltiples servidores para darte redundancia, Bouquet es una buena manera de obtener una visión general de todos tus archivos. Úsalo para subir y navegar por tus medios en diferentes servidores y sincronizar blobs entre ellos.
### Cherry Tree
nostr:nevent1qvzqqqqqqypzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzfmhxue69uhkummnw3e82efwvdhk6tcqyp3065hj9zellakecetfflkgudm5n6xcc9dnetfeacnq90y3yxa5z5gk2q6
Cherry Tree te permite dividir un archivo en fragmentos y luego subirlos en múltiples servidores blossom, y más tarde reensamblarlos en otro lugar.
## Conclusión
Blossom aún está en desarrollo, pero ya hay muchas cosas interesantes que puedes hacer con él para hacerte a ti y a tu comunidad más soberanos. ¡Pruébalo!
Si deseas mantenerte al día sobre el desarrollo de Blossom, sigue a nostr:nprofile1qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzfmhxue69uhkummnw3e82efwvdhk6tcqyqnxs90qeyssm73jf3kt5dtnk997ujw6ggy6j3t0jjzw2yrv6sy22ysu5ka y dale un gran zap por su excelente trabajo.
## Referencias
- [hzrd149/blossom en GitHub](https://github.com/hzrd149/blossom)
- [Blossom Drive](https://github.com/hzrd149/blossom-drive/blob/master/docs/drive.md)
-

@ dbb19ae0:c3f22d5a
2025-01-26 08:43:57
**First** make sure to add this relay wss://relay.momostr.pink in your Nostr [setting](https://primal.net/settings/network)
and **second** follow this [account ](https://nosta.me/npub1pqr3g2gk3vsnrqk9kwfqqcxc6d5cwjr0hyc0nlzz9py5nf92vd9sn02sck)
Soon after an account will be created on bluesky and will mirror your Nostr profile
the address will be like this:
bsky.app/profile/npub1mwce4c8qa2zn9zw9f372syrc9dsnqmyy3jkcmpqkzaze0slj94dqu6nmwy.momostr.pink.ap.brid.gy
And from there keep spreading the good word
originally posted at https://stacker.news/items/825913
-

@ 0ce97fba:4f9081a3
2025-01-26 01:48:00
He walked the decaying streets; his curious expression masked a lifetime of hardship. The city of Bethada spread before him, a tangled maze of buildings and passages clinging to the surface of Mool. This settlement-turned-city once thrived as humanity expanded throughout the galaxy but was now an almost forgotten backwater outpost. A thin crescent of reflected sunlight hugged the horizon as the sun dipped behind the gas giant, casting the lunar city in a soft glow.
“Hey, Mr. Fannec!” A voice from across the street hailed him. The human scowled; he hated being called “Mr. Fannec.” He waved an arm in acknowledgment but didn’t break stride, eager to leave the concrete and steel jungle behind for the day.
Robert Fannec grew up in a crowded housing unit on Mool, raised by his grandmother, while his mother went to work long hours to scrape by. From a young age, he learned that life was difficult and one should take respite where possible. He lived on the outskirts of Bethada City, barely getting by, as he grew up in poverty. His mother worked to exhaustion but failed to improve their living conditions.
“Ya know, Bobby-boy,” said Pete, the local unkempt homeless man whom Robert was friendly with, “This world is reminiscent of a less-than-ideal sandwich, the bread stale and the cheese nothing to write home about. One is left pondering if their hunger is clouding their judgment or if there isn’t much to be thrilled about.”
Robert met the man when he first arrived in Bethada as a young teen; although Robert would not consider them close friends, a particular understanding drove him to keep checking up on the older man. Indeed, life was a struggle for Pete, an elderly citizen, amidst the chaos of the metropolis. Plus, they’d talk about random topics such as music or history during their visits, which made those times personal rather than plain help alone from Robert.
“Couldn’t have said it better myself,” he replied, half-smirking. “One day, we’ll get some fresh ingredients around here.”
“Ha! I’ll believe it when I see it.” Pete laughed, shaking his head.
“Me too, Pete. Me too.” The heaviness of the town’s stagnant air pressed on his back as he nodded and walked down the street.
Robert’s face contorted as he inspected the town. It resembled a knockoff designer watch; instead of shoddy craftsmanship and cheap parts, it had abandoned storefronts and peeling paint. He let out a hearty chuckle at the comparison. As he wandered through the decrepit streets, he wondered what treasures lay beyond these crumbling walls.
“Damn shame,” Robert said, taking in the breathtaking landscape before him. “Nature got the memo about beauty, but Bethada sure didn’t.”
“Hey, Rob.” One of his coworkers waved as they clocked into their shift at the local industrial farm. “You daydreaming again?”
Responding with a grin, Robert shoved his hands into the pockets of his worn coveralls. “Hey, Dave. The way this place looks, it’s a wonder we haven’t all packed up and moved to a better neighborhood.”
“Tell me about it.” Dave chuckled, pulling on his protective gloves. “But then, who’d keep these machines running? They’re almost family, after all.”
“Only if your family is a ragtag group of misfits held together by sheer willpower.” Robert’s eyes crinkled in amusement.
“You got me there.”
The atmosphere was filled with the howl of steam, engines, and other loud machinery as their shifts began; the high-pitched note of pressure released into a valve opening providing a familiar backdrop to their daily lives.
The other workers chattered about their outside lives, which was a welcome distraction from the monotony of work. Family adventures, weekend getaways, and hobbies or creative outlets were among the stories shared to describe how they spent their spare time. Robert kept his distance as snippets of their conversations reached him.
For Robert, the idea of discussing personal matters with his peers was uncomfortable. He struggled to bridge the gap between himself and his co-workers, unable to relate to their shared interests in such pastimes. They were experiences he could never relate to, as he had grown up too fast due to his family’s financial struggles. As a result, he put more effort into getting along with the machines than with his fellow humans. He considered the equipment to be more dependable than any human friend, even if some machines were beyond repair or had been handled in a careless manner. But for him, the genuine excitement started when the work whistle blew, signaling the end of another grueling day.
“About time!” He wiped the sweat off his face. He often daydreamed about heading to the range to take out some frustration.
“Man, you love that shooting range, don’t you?” Dave’s voice had a hint of envy.
“Sure do,” Robert said, shrugging off his coveralls. “It’s the one place where I feel like I’m actually in control and not another cog in this rusted-out machine of a city. I don’t have to worry about life, exes, debt, nothin’.”
“I’m hopeful that one day you’ll be able to leave this place behind. Start off somewhere new.” Dave said, slapping Robert on the back.
“Here’s hoping.” His eyes were locked on the horizon as if he could see himself leaving this hellhole. He was off to the local shooting range, where he could pretend everything still had order.
After almost being run over by a white hover van while crossing the street, Robert arrived at his sanctuary’s shooting range. The aroma of gunpowder, battery acid, and cut grass mingled as he reached his usual spot. Robert found it delightful compared to Bethada City’s typical mildew and burnt leather odor.
“Alright, let’s dance,” he said, loading his trusty rifle with practiced ease. His rifle was a simple affair that allowed Robert to vent his frustrations on targets. He was a decent shot; at least, that is what he thought of himself.
Squeezing the trigger, firing off round after round. The targets quivered under the onslaught—a symphony of destruction played by the percussion section of his life’s dull and sad orchestra.
When he was still a teen, he found abandoned buildings around Bethada. He’d take his rifle and practice shooting at bottles, furniture pieces, walls, and whatever appeared. His mother and grandmother were furious when they found out, but that didn’t stop him from terrorizing bottles and paper targets.
“Take that, you cylindrical bastards,” he said, landing a satisfying shot on the smallest target. He was absorbed in his practice, not thinking about his lackluster life.
His rifle was a standard design of a powered weapon. The long barrel gun accelerated hunks of metal via a magnetic rail system, unlike other, more exotic armaments that used energy to produce high-speed plasma rounds. The sound of a round from this rifle would startle any man.
“Still the targets, if I had to guess,” came a raspy voice behind him. Turning around, Robert saw Pete. His beard was a patchwork quilt of gray and white strands, and his clothes had more holes than fabric.
Pete lived near the range because he realized the people who would frequent such an establishment would be well-armed and well-disciplined, making it a safe spot compared to other less savory locations.
“Ah, Pete, my favorite critic,” Robert joked, setting down his weapon. “What brings you here today?”
“Same thing that always does,” Pete said, scratching his chin. “The sweet sound of gunfire, the scent of ambition, and a hankering for some ol’ fashioned conversation.”
“Still working on that novel?” Robert knew that Pete had been “working” on it for years.
“Indeed, young Robert. Though I fear my magnum opus may never appear in daylight, trapped as it is in the literary purgatory between my brain and the page.”
“Hey, at least it’s got company in there, right?” Robert laughed at his joke. “You’ve got a ton of unwritten works in there, right?”
“True enough,” Pete said, a sparkle in his eyes and tales left untold. “Speaking of company, how’s your aim today? Plan on shootin’ repo-men?”
“Pretty good, if I do say so myself. The grouping on the smallest target isn’t the best I’ve done, but overall, I hit what I’m aiming at.” Ignoring the quip about Robert shooting repo men. Embarrassed that he could not manage money as well as other people. He still wasn’t able to constrain his urges to buy things he couldn’t afford.
“Ah, a prodigy in our midst!” Pete performed a mock bow.
Robert didn’t always know how to handle Pete. So the younger man looked at him with an odd expression.
“You remind me of my son.” A sad smile flickered across Pete’s weathered face. “He was an odd duck, too, always tinkering with machines and dreaming big. He went off to work in the mines when he was a boy. Never saw him again after the collapse.” Pete shrugged, fidgeting with a broken timepiece in his hands.
“Sorry to hear that. How old would he be?”
“About your age, I guess.”
“I bet I would have liked him.”
“I would like to think so, too. You’re both good kids.”
After a brief conversation about Pete being unable to find one of his friends, they exchanged farewells. Robert packed his rifle into his worn bag and exited the street, where he focused on his thoughts and started making his way home.
The sun and planet started to set, and their fading orange light gave the sky a beautiful hue. Robert took in the scenery as he strolled, not paying attention to one of the sleek white hover vans that had become so popular in the past months. It zipped away through the air as he watched before returning to his thoughts on what he would have for dinner.
The building he lived in stood like a weary sentinel at the town’s boundary, a hodgepodge of mismatched bricks and creaking metal that had long ago lost any semblance of architectural grace. Despite its weather-beaten exterior, the residents maintained a veneer of pride, as evidenced by the door with a fresh coat of paint.
Upon entering his small apartment, Robert was greeted by the neutral aroma of cleanliness, not too sterile but not fragrant enough to be noticeable. The scent was as unremarkable as beige. A fragrance that announced, “I am clean and functional, but please don’t expect any frills.”
He lived alone, which was considered a luxury tantamount to owning a solid gold toilet brush. He cherished living alone, deeming it a worthwhile trade-off to sacrifice financial stability for solitude.
His independence was threatened when he received an eviction notification last week. It had been weeks since his rent had been due, and the creditors were no longer in the mood to accept any more late payments. Unless Robert could find a way to earn the money necessary for back-rent and tenancy fees, he would have to pack his belongings and leave his beloved apartment for good.
Robert switched on his computer to search for night jobs but was soon distracted by a video that had popped up. The government shared an informative clip, motivating citizens to be proactive and responsible financially.
Robert recognized a humanoid alien named Damian Krestov, with pale yellow skin and a texture Robert couldn’t place; he didn’t know where the man was from. He almost spoke to Robert as if aware of his situation. Damian spoke about taking responsibility and believing and trusting in yourself when times are demanding because one must never give up hope.
As he spoke, Damian gestured enthusiastically to express himself and emphasize his points. This man believed every word that came from his mouth. After watching out of curiosity, Robert realized that it was all a propaganda video in disguise; he didn’t pay enough attention to understand the actual goal of the ad, but he knew it wasn’t ‘just an ad.’
His green eyes fell on a colored flyer that someone had slipped under his door while he was stretching out his legs. It bore the headline: “Prestigious Shooting Competition on Zorath!” Beneath the flashy text, an illustration portrayed a muscular figure raising a gun in triumph while standing on top of a mountain of defeated foes.
Robert scoffed; he was skeptical of such an over-the-top advertisement, and one delivered on paper door-to-door. Still, a twinge of excitement hit him as he read the details: a grand prize of one million credits and a chance to become a professional shooter, whatever that means. Despite his initial skepticism about the ridiculous flyer, his heart raced at the thought of escaping his less-than-ideal life on Mool, proving his skills, and making enough money to not worry about those debt collectors.
Questions swirled in Robert’s mind, but none could snuff out the flame of hope that had ignited within him. As he crumpled the flyer in his hand, he imagined the look on Pete’s face if he were to win the competition and return to Mool with a million credits and a newfound sense of freedom.
“Who designed this? A five-year-old with a crayon?” Robert scoffed. Yet, despite the ridiculous presentation, he couldn’t ignore the Sub-Lunar Protective Service logo, a shield with ‘SLPS’ stamped in the bottom right corner.
“What is a government agency running a shoot for?” It wasn’t news to Robert that the agency would run events, but it still perplexed him why.
“Alright, Fannec,” he said, attempting to rationalize the situation. “Let’s say this is legit. You’ve spent your whole life shooting targets at the range. You can leave this shit moon and pay off some debts.”
As he weighed the pros and cons, his eyes flicked back to the grand prize: one million credits. With that money, his life could undergo a complete metamorphosis, rescuing him from this decrepit city and launching him into an existence he had only imagined. But was it worth the risk of taking time off work? He was already behind by several weeks’ rent and couldn’t afford time off.
“It’s a risky gamble.” He thought. “But it might be my ticket out of this mess.” He rubbed his temples. “Why couldn’t they have made a normal ad instead of this cartoonish mess? Is this some cruel joke?”
Deep down in his subconscious, he was aware he had already decided. His desire to escape was far more potent than any doubts he might have about the competition’s legitimacy or his abilities.
“Okay,” he said, preparing himself for the decision ahead. “Worst-case scenario, I lose the apartment, and I’m the laughingstock of the city for a while. Best case, I walk away with a million credits, which would pay off all of my debt and buy me a new life somewhere else.”
“Alright, let’s see what kind of mess I’m getting myself into.” Pulling up the competition details on his comm device, he scrolled through the information, his eyebrows furrowing with each new bit of it. “It’s scheduled during storm season on Zorath. Do these event planners even know how to read a weather report?”
The thought of traveling to a distant planet during its tumultuous storm season made Robert’s stomach churn. He had never left Mool before, and while he was confident in his shooting skills, everything else about this trip was uncharted territory.
This kind of shoot requires more than marksmanship. To outsmart his rivals, Robert must think fast and use the landscape and surroundings to gain an advantage. Storms would make that difficult, and Robert didn’t practice a lot of situational shooting. Sniper shooting was his strong suit, which he practiced most.
“At least it’ll be a memorable experience.”
Robert couldn’t shake off his hesitation. His worries extended beyond the storms. He would be up against marksmen who possessed more shooting and life experience. He stopped pacing and stared at his reflection in the window. The city lights of Bethada flickered in the glass, casting a melancholy glow over his face. His eyes were tired but resolute.
The competition didn’t worry him; the entry fee wasn’t refundable. The price was going up soon to encourage more people to register early. He had to decide, and quick.
“I guess if these guys are dumb enough to hold a shooting competition during one of the worst storm seasons in the Confederation, then they’re dumb enough to let me win.”
He chuckled, imagining the event planners huddled over a meteorological terminal, unaware of the impending storm clouds. The United Confederation’s government should have caught such an obvious detail. Perhaps they thought the turbulent weather would excite or challenge the competition. Which would be something that a management or administrative employee would think of.
“Perhaps the storms will scare off some of the competition,” his mind was scrambling with images of seasoned marksmen fleeing in terror from the torrential rains and howling winds. “Yeah, I bet half of ’em will drop out before they even fired the first shot.”
His chest swelled with newfound confidence. Sure, he had never left Mool before, but that didn’t mean he couldn’t hold his own on a strange, stormy planet. After all, he spent countless hours honing his skills at the local shooting range. And he always dreamed of fleeing the drudgery of his dull life in this rundown city on a forgotten moon.
“Alright, enough daydreaming,” he chided himself, shaking off his momentary lapse into fantasy. “Let’s make this official.”
Robert picked up his comm device and navigated to the registration page for the competition. He paused for a moment. The magnitude of the decision he was about to make was massive. He would have to prepare for missing out on some income. Once he registered, there would be no backing out, no second-guessing. The entry fee was substantial, but it would have to be bought on credit, like everything Robert paid for.
With a final deep breath and a surge of determination, Robert tapped the ‘Register’ button on his comm device. A cheerful confirmation message popped up on the screen: “Congratulations! You are now officially registered for the Zorath Shooting Competition!” It was followed by information about equipment checks, times, and locations.
“Well, this will be fun.”
-

@ ec42c765:328c0600
2025-01-26 00:08:54
# カスタム絵文字とは
任意のオリジナル画像を絵文字のように文中に挿入できる機能です。
また、リアクション(Twitterの いいね のような機能)にもカスタム絵文字を使えます。

# カスタム絵文字の対応状況(2024/02/05)

カスタム絵文字を使うためにはカスタム絵文字に対応した[クライアント](https://welcome.nostr-jp.org/tutorial/explore-client.html)を使う必要があります。
※表は一例です。クライアントは他にもたくさんあります。
使っているクライアントが対応していない場合は、クライアントを変更する、対応するまで待つ、開発者に要望を送る(または自分で実装する)などしましょう。
#### 対応クライアント
- [Amethyst](https://play.google.com/store/apps/details?id=com.vitorpamplona.amethyst)
- [FreeFrom](https://freefrom.space/)
- [nostter](https://nostter.app/)
- [Rabbit](https://rabbit.syusui.net/)
- [Snort](https://snort.social/)
- [noStrudel](https://nostrudel.ninja/)
ここではnostterを使って説明していきます。
# 準備
カスタム絵文字を使うための準備です。
- Nostrエクステンション(NIP-07)を導入する
- 使いたいカスタム絵文字をリストに登録する
## Nostrエクステンション(NIP-07)を導入する
Nostrエクステンションは使いたいカスタム絵文字を登録する時に必要になります。
また、環境(パソコン、iPhone、androidなど)によって導入方法が違います。
Nostrエクステンションを導入する端末は、実際にNostrを閲覧する端末と違っても構いません(リスト登録はPC、Nostr閲覧はiPhoneなど)。
Nostrエクステンション(NIP-07)の導入方法は以下のページを参照してください。
[ログイン拡張機能 (NIP-07)を使ってみよう | Welcome to Nostr! ~ Nostrをはじめよう! ~ ](https://welcome.nostr-jp.org/tutorial/nip-07.html)
少し面倒ですが、これを導入しておくとNostr上の様々な場面で役立つのでより快適になります。
## 使いたいカスタム絵文字をリストに登録する
以下のサイトで行います。
[emojito](https://emojito.meme/)
右上の**Get started**からNostrエクステンションでログインしてください。
例として以下のカスタム絵文字を導入してみます。
実際より絵文字が少なく表示されることがありますが、古い状態のデータを取得してしまっているためです。その場合はブラウザの更新ボタンを押してください。
[generalJP | カスタム絵文字](nostr:naddr1qqykwetwv4exzmz22qqs6amnwvaz7tmwdaejumr0dspzpmzzcaj5rzeah8y940ln4z855wa72af4a6aac4zjypql55egcpsqqvzqqqr4fcp4fwv8)

- 右側の**Options**から**Bookmark**を選択

これでカスタム絵文字を使用するためのリストに登録できます。
# カスタム絵文字を使用する
例としてブラウザから使えるクライアント nostter から使用してみます。
[nostter](https://nostter.app/)
nostterにNostrエクステンションでログイン、もしくは秘密鍵を入れてログインしてください。
## 文章中に使用
1. **投稿**ボタンを押して投稿ウィンドウを表示
2. **顔😀**のボタンを押し、絵文字ウィンドウを表示
3. ***タブ**を押し、カスタム絵文字一覧を表示
4. カスタム絵文字を選択
5. : 記号に挟まれたアルファベットのショートコードとして挿入される

この状態で投稿するとカスタム絵文字として表示されます。
カスタム絵文字対応クライアントを使っている他ユーザーにもカスタム絵文字として表示されます。
対応していないクライアントの場合、ショートコードのまま表示されます。

ショートコードを直接入力することでカスタム絵文字の候補が表示されるのでそこから選択することもできます。

## リアクションに使用
1. 任意の投稿の**顔😀**のボタンを押し、絵文字ウィンドウを表示
2. ***タブ**を押し、カスタム絵文字一覧を表示
3. カスタム絵文字を選択

カスタム絵文字リアクションを送ることができます。

# カスタム絵文字を探す
先述した[emojito](https://emojito.meme/)からカスタム絵文字を探せます。
例えば任意のユーザーのページ [emojito ロクヨウ](nostr:npub1a3pvwe2p3v7mnjz6hle63r628wl9w567aw7u23fzqs062v5vqcqqu3sgh3) から探したり、 [emojito Browse all](https://emojito.meme/browse) からnostr全体で最近作成、更新された絵文字を見たりできます。
また、以下のリンクは日本語圏ユーザーが作ったカスタム絵文字を集めたリストです(2024/06/30)
※漏れがあるかもしれません
[日本ユーザー作 カスタム絵文字](nostr:npub17hczqvxtfv3w69wr6lxrttnpdekwdwel55mld60fr24zwjuu6utqtj8mjx)
各絵文字セットにある**Open in emojito**のリンクからemojitoに飛び、使用リストに追加できます。
-----------
以上です。
次:Nostrのカスタム絵文字の**作り方**
Yakihonneリンク [Nostrのカスタム絵文字の作り方](https://yakihonne.com/article/_@lokuyow.github.io/1707912490439)
Nostrリンク nostr:naddr1qqxnzdesxuunzv358ycrgveeqgswcsk8v4qck0deepdtluag3a9rh0jh2d0wh0w9g53qg8a9x2xqvqqrqsqqqa28r5psx3
-----------
# 仕様
[NIP-30 Custom Emoji](https://github.com/nostr-protocol/nips/blob/master/30.md)
[NIP-30 カスタム絵文字(和訳)](https://github.com/nostr-jp/nips-ja/blob/main/30.md)
-

@ d3052ca3:d84a170e
2025-01-25 23:17:10
It seems to me that the primary opposition to ecash from bitcoiners comes from the belief that lightning will enable self-custodial micropayments for the masses. Many lightning enthusiasts see ecash as competition that will eliminate this technological outcome (whether they admit it or not).
I understand the motivation for this line of reasoning but I don't see things this way at all. Ecash is a superset of lightning. Cashu literally doesn't have a spec for on-chain transactions (yet!). Everything cashu accomplishes is built on the back of lightning. Standing on the shoulders of giants.
I don't believe that ecash will take away market share from self-custodial lightning because lightning is not a good technology for self-custody. The high overhead costs of running your own node create a natural incentive for a semi-centralized hub and spoke network graph. It just makes economic sense for many users to share a lightning node. It doesn't make economic sense for individuals to bear this cost alone.
This stacker news post is the best writeup on this topic: https://stacker.news/items/379225
It comes from a builder who struggled with these issues for years and learned the shortcomings of the tech first hand. Notice they experimented with ecash as a solution to these problems before they burned out and pivoted to save the company.
Ecash is a superset of lightning. It extends the capability and reach of the lightning network. Without ecash, I don't believe we can achieve bitcoin mass adoption. You can't jam a square peg into a round hole.
We still have a need for self-custody of "small" amounts of bitcoin. I put small in quotes because the block size limit and the fee market it creates impose a fundamental constraint on the minimum practical size of a UTXO. This limit is pegged to the unit of bitcoin. As bitcoin increases in value the minimum size for an on-chain transaction will grow in value as well. You can send $10 worth of bitcoin on-chain today but will this be true in 10 years when the price is much higher? 100 years?
If the current exponential trends hold, we will soon price out the majority of humanity from owning a UTXO. This is bad. Like really bad. "Bitcoin is a failure" bad. This is the motivation for my posts about scaling on-chain usage to 10 billion people. I believe we will need to radically rearchitect bitcoin to achieve this goal.
Lightning is not up to the task. We should leverage lightning for what it's good at: gluing together different self-custodial bitcoin service providers. We should leverage ecash for what it's good at: peer-to-peer electronic cash micropayments. IN ADDITION we also need to start seriously looking at new ideas for scaling self custody to "small" amounts of bitcoin. I am very optimistic that we can solve this problem. There are a number of promising avenues to pursue but I think first we need to move the Overton window ~~beyond the idea of mass adoption of self-custodial lightning~~ regarding on-chain scaling.
Edit: I think the original Overton window statement was incorrect. If on-chain fees stay low then self-custodial lightning or something similar is a much better prospect.
Just my 2 sats...let me know what you think. Keep it civil or be muted.
-

@ 1cb14ab3:95d52462
2025-01-25 23:13:34
***Tree branches. 4' x 4 [Castle Pines, USA. 2016]***
#### Introduction
Sanctuary offers a layered view of resilience, juxtaposing the green expanses of the Sanctuary Golf Course with the majesty of Pikes Peak and the scars of past destruction. Framed by the lens, this work explores the tension between human intervention and nature’s cycles of renewal.
#### Site & Placement
Perched at Daniels Park in Castle Pines, the lens focuses on the rolling terrain of the golf course, leading the eye to the distant peak. The surrounding brush, which once burned in a major fire, adds depth to the narrative of renewal. A bench, positioned for an unobstructed view, invites visitors to sit and reflect on the land’s capacity to heal and endure.
#### Impermanence & Integration
As an ephemeral installation, Sanctuary embodies nature’s cycles of destruction and rebirth. The materials—branches and rock—will eventually decay and return to the earth, a process that mirrors the recovery of the landscape itself after fire. This impermanence underscores the delicate balance between human influence and natural forces.
#### Reflection
Sanctuary serves as a reminder of both the fragility and resilience of the world around us. It invites viewers to pause and consider the interplay of destruction and growth, human and natural, as they gaze upon a scene shaped by both time and transformation
---
## Photos






---
#### More from the 'Earth Lens' Series:
[Earth Lens Series: Artist Statement + List of Works](https://hes.npub.pro/post/1731091744332/)
["Looking Glass" (Earth Lens 001)](https://hes.npub.pro/post/1736304563962/)
["Folsom" (Earth Lens 002)](https://hes.npub.pro/post/1737844073125/)
[COMING SOON: "Platte" (Earth Lens 004)](https://hes.npub.pro/post/1731091744332/)
[COMING SOON: "Grandfather" (Earth Lens 005)](https://hes.npub.pro/post/1731091744332/)
[COMING SOON: "Chongming" (Earth Lens 006)](https://hes.npub.pro/post/1731091744332/)
---
#### More from Hes
[Portfolio](https://hesart.npub.pro)
[Online Store](https://plebeian.market/community/1cb14ab335876fc9efc37d838ba287cf17e5adcccb20bf6d49f9da9695d52462:hesmart-ym3fcufdfz)
[Artist Statements](https://hes.npub.pro/tag/art/)
[Travel Guides](https://hes.npub.pro/tag/travel/)
[Photography](https://hes.npub.pro/tag/photography)
[Writings](https://hes.npub.pro/tag/money)
---
*All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.*
-

@ 1cb14ab3:95d52462
2025-01-25 22:51:08
***Tree branches, Rock. 4' x 4 [Boulder, USA. 2016]***
#### Introduction
From atop Flagstaff Mountain, Folsom frames Boulder’s iconic Folsom Field, a symbol of youth, learning, and community. This lens offers a moment of reflection on the brevity of the college experience and the transient nature of life, inviting viewers to connect with the campus and its fleeting but impactful moments.
#### Site & Placement
The lens is strategically placed to frame the stadium, blending the vibrant life of the campus with Boulder’s vast and enduring natural landscape. The bench, situated 6 feet from the lens, offers a space to sit and contemplate the juxtaposition of permanence and change, of structure and wilderness.
#### Impermanence & Integration
Constructed from branches and rock, Folsom is designed to fade into the mountain landscape after only a short time. Its impermanence echoes the fleeting nature of the college years, reminding viewers that growth and transformation are rooted in moments that pass all too quickly.
#### Reflection
Through its brief presence, Folsom captures the delicate interplay between human experiences and the enduring landscapes that frame them. It invites viewers to celebrate the vibrant present while acknowledging the inevitability of change.
---
## Photos






---
#### More from the 'Earth Lens' Series:
[Earth Lens Series: Artist Statement + List of Works](https://hes.npub.pro/post/1731091744332/)
["Looking Glass" (Earth Lens 001)](https://hes.npub.pro/post/1736304563962/)
[COMING SOON: "Sanctuary" (Earth Lens 003)](https://hes.npub.pro/post/1731091744332/)
[COMING SOON: "Platte" (Earth Lens 004)](https://hes.npub.pro/post/1731091744332/)
[COMING SOON: "Grandfather" (Earth Lens 005)](https://hes.npub.pro/post/1731091744332/)
[COMING SOON: "Chongming" (Earth Lens 006)](https://hes.npub.pro/post/1731091744332/)
---
#### More from Hes
[Portfolio](https://hesart.npub.pro)
[Online Store](https://plebeian.market/community/1cb14ab335876fc9efc37d838ba287cf17e5adcccb20bf6d49f9da9695d52462:hesmart-ym3fcufdfz)
[Artist Statements](https://hes.npub.pro/tag/art/)
[Travel Guides](https://hes.npub.pro/tag/travel/)
[Photography](https://hes.npub.pro/tag/photography)
[Writings](https://hes.npub.pro/tag/money)
---
*All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.*
-

@ b17fccdf:b7211155
2025-01-21 17:19:12
Do you want to use a different disk to store data (blockchain and other databases) independently of the disk of the system?
A step-by-step guide using a secondary disk to store the data (blockchain and other databases) independently of the disk of the system and using the Ubuntu Server guided installation.
---
### **What's changed**
* Rebuilt the [Ubuntu Server installation guide](https://minibolt.minibolt.info/system/system/operating-system#ubuntu-server-installation) based on this bonus guide added.
* Added GIFs to improve the illustration of the steps to follow.
* [Case 1](https://minibolt.minibolt.info/bonus-guides/system/static-ip-and-custom-dns-servers#option-1-at-the-beginning-during-the-ubuntu-server-installation-gui): during the Ubuntu server guided installation.
* [Case 2](https://minibolt.minibolt.info/bonus-guides/system/static-ip-and-custom-dns-servers#option-2-after-ubuntu-server-installation-by-command-line): build it after system installation (by command line).
---
~ > Link to the bonus guide [HERE](https://minibolt.minibolt.info/bonus-guides/system/store-data-secondary-disk)
---
Enjoy it MiniBolter! 💙
-

@ b17fccdf:b7211155
2025-01-21 17:07:47
**Link to the bonus guide** ~> [HERE](https://minibolt.minibolt.info/bonus-guides/bitcoin/btcpay-server) < ~
---
Enjoy it MiniBolter! 💙
-

@ b17fccdf:b7211155
2025-01-21 17:02:21
The past 26 August, Tor [introduced officially](https://blog.torproject.org/introducing-proof-of-work-defense-for-onion-services/) a proof-of-work (PoW) defense for onion services designed to prioritize verified network traffic as a deterrent against denial of service (DoS) attacks.
~ > This feature at the moment, is [deactivate by default](https://gitlab.torproject.org/tpo/core/tor/-/blob/main/doc/man/tor.1.txt#L3117), so you need to follow these steps to activate this on a MiniBolt node:
* Make sure you have the latest version of Tor installed, at the time of writing this post, which is v0.4.8.6. Check your current version by typing
```
tor --version
```
**Example** of expected output:
```
Tor version 0.4.8.6.
This build of Tor is covered by the GNU General Public License (https://www.gnu.org/licenses/gpl-3.0.en.html)
Tor is running on Linux with Libevent 2.1.12-stable, OpenSSL 3.0.9, Zlib 1.2.13, Liblzma 5.4.1, Libzstd N/A and Glibc 2.36 as libc.
Tor compiled with GCC version 12.2.0
```
~ > If you have v0.4.8.X, you are **OK**, if not, type `sudo apt update && sudo apt upgrade` and confirm to update.
* Basic PoW support can be checked by running this command:
```
tor --list-modules
```
Expected output:
```
relay: yes
dirauth: yes
dircache: yes
pow: **yes**
```
~ > If you have `pow: yes`, you are **OK**
* Now go to the torrc file of your MiniBolt and add the parameter to enable PoW for each hidden service added
```
sudo nano /etc/tor/torrc
```
Example:
```
# Hidden Service BTC RPC Explorer
HiddenServiceDir /var/lib/tor/hidden_service_btcrpcexplorer/
HiddenServiceVersion 3
HiddenServicePoWDefensesEnabled 1
HiddenServicePort 80 127.0.0.1:3002
```
~ > Bitcoin Core and LND use the Tor control port to automatically create the hidden service, requiring no action from the user. We have submitted a feature request in the official GitHub repositories to explore the need for the integration of Tor's PoW defense into the automatic creation process of the hidden service. You can follow them at the following links:
* Bitcoin Core: https://github.com/lightningnetwork/lnd/issues/8002
* LND: https://github.com/bitcoin/bitcoin/issues/28499
---
More info:
* https://blog.torproject.org/introducing-proof-of-work-defense-for-onion-services/
* https://gitlab.torproject.org/tpo/onion-services/onion-support/-/wikis/Documentation/PoW-FAQ
---
Enjoy it MiniBolter! 💙
-

@ b17fccdf:b7211155
2025-01-21 16:56:24
It turns out that Ubuntu Linux installations of Ubuntu 23.04, 22.04.3 LTS, and installs done since April 2023 that accepted the Snap version update haven't been following Ubuntu's own recommended security best practices for their security pocket configuration for packages.
A new Subiquity release [was issued](https://github.com/canonical/subiquity/releases/tag/23.09.1) to fix this problem while those on affected Ubuntu systems already installed are recommended to manually edit their `/etc/apt/sources.list` file.
If you didn't install MiniBolt recently, **you are affected by this bug**, and we need to fix that manually if not we want to install all since cero. Anyway, if you installed Minibolt recently, we recommend you review that.
Follow these easy steps to review and fix this:
* Edit the `sources-list` file:
```
sudo nano /etc/apt/sources.list
```
* Search now for every line that includes '-security' (without quotes) (normally at the end of the file) and change the URL to --> http://security.ubuntu.com/ubuntu
~ > For example, from http://es.archive.ubuntu.com/ubuntu (or the extension corresponding to your country) to --> http://security.ubuntu.com/ubuntu
~> Real case, Spain location, **before fix**:
```
deb http://es.archive.ubuntu.com/ubuntu jammy-security main restricted
# deb-src http://es.archive.ubuntu.com/ubuntu jammy-security main restricted
deb http://es.archive.ubuntu.com/ubuntu jammy-security universe
# deb-src http://es.archive.ubuntu.com/ubuntu jammy-security universe
deb http://es.archive.ubuntu.com/ubuntu jammy-security multiverse
# deb-src http://es.archive.ubuntu.com/ubuntu jammy-security multiverse
```
**After fix:**
```
deb http://security.ubuntu.com/ubuntu jammy-security main restricted
# deb-src http://es.archive.ubuntu.com/ubuntu jammy-security main restricted
deb http://security.ubuntu.com/ubuntu jammy-security universe
# deb-src http://es.archive.ubuntu.com/ubuntu jammy-security universe
deb http://security.ubuntu.com/ubuntu jammy-security multiverse
# deb-src http://es.archive.ubuntu.com/ubuntu jammy-security multiverse
```
**Save and exit**
**Note:** If you have already these lines changed, you are not affected by this bug, and is not necessary to do anything. Simply exit the editor by doing Ctrl-X
* Finally, type the next command to refresh the repository pointers:
```
sudo apt update
```
* And optionally take the opportunity to update the system by doing:
```
sudo apt full-upgrade
```
More context:
* https://wiki.ubuntu.com/SecurityTeam/FAQ#What_repositories_and_pockets_should_I_use_to_make_sure_my_systems_are_up_to_date.3F
* https://bugs.launchpad.net/subiquity/+bug/2033977
* https://www.phoronix.com/news/Ubuntu-Security-Pocket-Issue
-

@ b17fccdf:b7211155
2025-01-21 16:49:27
### **What's changed**
* New method for Bitcoin Core signature check, click ~ >[HERE](https://minibolt.minibolt.info/bitcoin/bitcoin/bitcoin-client#signature-check)< ~
* GitHub repo of Bitcoin Core release attestations (Guix), click ~ >[HERE](https://github.com/bitcoin-core/guix.sigs)< ~
---
**History:**
~ > PR that caused the broken and obsolescence of the old signature verification process, click ~ >[HERE](https://github.com/bitcoin/bitcoin/pull/26598)< ~
~ > New GitHub folder of Bitcoin Core repo that stores the signatures, click ~ >[HERE](https://github.com/bitcoin-core/guix.sigs/tree/main/builder-keys)< ~
---
Thanks to nostr:npub1gzuushllat7pet0ccv9yuhygvc8ldeyhrgxuwg744dn5khnpk3gs3ea5ds for building the command that made magic possible 🧙♂️🧡
---
Enjoy it MiniBolter! 💙
-

@ b17fccdf:b7211155
2025-01-21 16:40:01
### **Important notice to MiniBolt node runners:**
~ > It turns out that the I2P devs have opened an issue on the Bitcoin Core GitHub repo commenting that because they gave the option to enable the `notransit=true` parameter in the official documentation:
> [...] If you prefer not to relay any public I2P traffic and only allow I2P traffic from programs connecting through the SAM proxy, e.g. Bitcoin Core, you can set the no transit option to true [...] are having a heavy load on the I2P network since last December 19. Also comment that it is advisable to share as much bandwidth and transit tunnels as we can, to increase anonymity with coverage traffic, by contributing more to the I2p network than we consume.
So they ask that we deactivate that option that you use activated. With all this, he already updated the "Privacy" section by removing that setting.
The steps to delete this configuration once we have already configured it, are the following:
* With the "admin" user, stop i2pd:
```
sudo systemctl stop i2pd
```
* Comment line 93 with "#" at the beginning of it (notransit = true), save and exit
```
sudo nano /var/lib/i2pd/i2pd.conf --line numbers
```
* Start i2pd again:
```
sudo systemctl start i2pd
```
* And that's it, you could take a look at Bitcoin Core to see that it has detected i2pd running again after the reboot with:
```
tail --lines 500 -f /home/bitcoin/.bitcoin/debug.log
```
~ > If you don't see that I2P is up in Bitcoin Core after the restart, `sudo systemctl restart bitcoind` and look again at the logs of the same.
---
More info in the rollback commit, see ~> [HERE](https://github.com/twofaktor/minibolt/commit/99cae67a5150bb5b7deae3674cc958eb31c74a75) < ~
-

@ b17fccdf:b7211155
2025-01-21 16:30:11
> Your MiniBolt is on a home local network, you want to expose it on the public Internet (clearnet) without exposing your public IP, without Firewall rules, without NAT port forwarding, without risk, easy and cheap?
---
Go to the bonus guide by clicking ~ >[HERE](https://minibolt.minibolt.info/bonus-guides/system/cloudflare-tunnel) <~
---
Enjoy it MiniBolter! 💙
-

@ b17fccdf:b7211155
2025-01-21 16:23:44
> Build your nostr relay step by step on your MiniBolt node! (**easily adaptable to other environment**)
No need to trust anyone else! Be sovereign!
~> Go to the bonus guide by clicking ~> [HERE](https://minibolt.minibolt.info/bonus-guides/nostr/nostr-relay)< ~
~> This guide includes a complete [extra section](https://minibolt.minibolt.info/bonus-guides/nostr/nostr-relay#extras-optional) to cover the different processes for using nostr **as a user and relay operator**.
---
PS: The MiniBolt project has its FREE relay, be free to connect by adding to your favorite client the next address: `wss://relay.minibolt.info`
~> Let a review on [noStrudel](https://nostrudel.ninja/#/r/wss%3A%2F%2Frelay.minibolt.info) or [Coracle](https://coracle.social/relays/relay.minibolt.info) of your experience using it.
---
Remember, Nostr is freedom! Stay resilient! 💜 🛡️💪
-

@ b17fccdf:b7211155
2025-01-21 16:15:51
### What's changed
A bonus guide to get a quick overview of the system status with the most relevant data about the services on the main guide.
-----------
#### ➕Additional extra sections (optional) to:
* [Show on login](https://minibolt.minibolt.info/bonus-guides/system/system-overview#show-on-login-optional)
* [Get the channel.db size of an old LND bbolt database backend](https://minibolt.minibolt.info/bonus-guides/system/system-overview#get-the-channel.db-size-of-an-old-lnd-bbolt-database-backend)
* [Use MobaXterm compatibility version](https://minibolt.minibolt.info/bonus-guides/system/system-overview#use-the-mobaxterm-compatibility-version)
🔧 **GitHub PR related**: https://github.com/minibolt-guide/minibolt/pull/97
Σ **Dedicated GitHub repository**: https://github.com/minibolt-guide/system_overview
-----------
#### 🫂Acknowledgments
This is a fork of the [minibolt_info repository](https://github.com/rmnscb/minibolt_info), the main developer of this project is [rmnscb](https://github.com/rmnscb), a member of the MiniBolt community, all the merits go to him. Thank you for your contribution 🧡🫂
-----------
-> [CLICK HERE](https://minibolt.minibolt.info/bonus-guides/system/system-overview) <- to go to the bonus guide
-----------
Enjoy it MiniBolter! 💙
-

@ 1ec45473:d38df139
2025-01-25 20:15:01
### The probability of AGI ending us is negative.
A common tactic among doomers is to state something along the lines of the following:
"If we create AGI, there is some non-zero chance every year, that the AGI will end humanity. Whatever that chance is compounds every year, and is thus unacceptable."
The question I would ask the doomer is **"How do you know that the chance of AGI ending humanity isn't negative?"**
What does it mean for AGI to have a negative chance of ending humanity?
Setting aside AGI for a moment, what is the chance every year that humanity ends from other events, such as nuclear war, solar flares, super-volcanoes, asteroid hits, societal collapse, etc?
How do you even answer this question in a reasonable manner? Well lets look at past data.
Of all species that have existed 99% have gone extinct.
Of our closest 7 relatives from the genus Homo, 100% have gone extinct.
On a higher level looking at civilizational collapse. According to Wikipedia, [virtually all](https://en.wikipedia.org/wiki/Societal_collapse) historical societies have collapsed.
Looking out into the universe, we see no signs of life elsewhere, so if there was life in the past we can assume that they have gone extinct.
It would therefore be reasonable to say that the chance of our extinction is very high even without AGI, well above 90%. Maybe 99%.
You could argue the numbers but at least with these numbers we are using some past data to extrapolate the future, where the doomers are using no data whatsoever to support their numbers.
We can also state, that of all the species and societies that have collapsed in the past, they have done so because they did not yet have the knowledge on how to survive. They didn't know how to create antibiotics, or generate enough energy, or defend themselves from the environment.
What is AGI? AGI is a way to create knowledge. Most all societies in the past have collapsed because they didn't have the knowledge on how to survive, and the doomer argument is that we should slow down our ability to create knowledge, when we know that this has been precisely the problem in the past.
It is a certainty we will all die without more knowledge then we have now. The future death of our sun ensures that.
We have to create the knowledge on how to survive, and that is what AGI does - it creates knowledge.
AGI most certainly has a negative probability of ending humanity.
-

@ dbb19ae0:c3f22d5a
2025-02-01 21:51:44
List of Wordpress articles:
- https://alashazam.wordpress.com/2024/07/01/python-nostr/
- https://alashazam.wordpress.com/2024/07/02/python-nostr-2/
- https://alashazam.wordpress.com/2024/07/03/python-nostr-second-program/
- https://alashazam.wordpress.com/2024/07/04/python-nostr-sdk/
- https://alashazam.wordpress.com/2024/07/04/python-nostr-third-program/
- https://alashazam.wordpress.com/2024/07/05/python-nostr-guessing-the-npub/
- https://alashazam.wordpress.com/2024/07/06/python-nostr_sdk-fetching-metadata/
- https://alashazam.wordpress.com/tag/python/
-----------
```python
#!/usr/bin/env python3
"""
Fetches the joined date from a Nostr profile and calculates the days since account creation.
Usage:
python fetch_joined_date.py [npub]
Arguments:
npub : The public key of the user (in npub format).
Requirements:
- nostr_sdk library
- Python 3.x
Example:
python fetch_joined_date.py npub1...
"""
import argparse
import time
import ssl
import json
import uuid
import logging
from datetime import datetime
from nostr.event import EventKind
from nostr.relay_manager import RelayManager
from nostr.key import PublicKey
from nostr.filter import Filter, Filters
from nostr.message_type import ClientMessageType
# Configure logging
logging.basicConfig(level=logging.INFO, format="%(levelname)s: %(message)s")
RELAY_URL = "wss://relay.damus.io"
def fetch_metadata(npub):
"""Fetches metadata from a Nostr profile given an npub key."""
pub_key = PublicKey.from_npub(npub)
filters = Filters([Filter(authors=[pub_key.hex()], kinds=[EventKind.SET_METADATA])])
subscription_id = uuid.uuid1().hex
request = [ClientMessageType.REQUEST, subscription_id, *filters.to_json_array()]
relay_manager = RelayManager()
relay_manager.add_relay(RELAY_URL)
relay_manager.add_subscription(subscription_id, filters)
try:
relay_manager.open_connections({"cert_reqs": ssl.CERT_NONE})
time.sleep(1) # Allow time for connection
relay_manager.publish_message(json.dumps(request))
time.sleep(1) # Allow time for response
while relay_manager.message_pool.has_events():
event_msg = relay_manager.message_pool.get_event()
metadata = json.loads(event_msg.event.content)
return metadata
except Exception as e:
logging.error(f"Error fetching metadata: {e}")
finally:
relay_manager.close_connections()
return None
def fetch_joined_date(npub):
"""Retrieves the joined date of a Nostr profile and calculates days since creation."""
metadata = fetch_metadata(npub)
if not metadata or "created_at" not in metadata:
logging.warning("Could not retrieve metadata or 'created_at' field is missing.")
return
try:
created_at = int(metadata["created_at"])
created_date = datetime.utcfromtimestamp(created_at)
days_since_creation = (datetime.utcnow() - created_date).days
logging.info(f"Account created on: {created_date.strftime('%Y-%m-%d %H:%M:%S UTC')}")
logging.info(f"Days since account creation: {days_since_creation}")
except (ValueError, TypeError):
logging.error("Invalid 'created_at' timestamp.")
if __name__ == "__main__":
parser = argparse.ArgumentParser(description="Fetch the joined date from a Nostr profile.")
parser.add_argument("npub", type=str, help="The public key of the user (in npub format).")
args = parser.parse_args()
fetch_joined_date(args.npub)
```
-

@ 1ec45473:d38df139
2025-01-25 20:15:01
Preston Pysh posted this event this morning:

Behind the scenes, the nostr event looks like this:
```
Event = {
"id":"a6fa7e1a73ce70c6fb01584a0519fd29788e59d9980402584e7a0af92cf0474a",
"pubkey":"85080d3bad70ccdcd7f74c29a44f55bb85cbcd3dd0cbb957da1d215bdb931204",
"created_at":1724494504,
"kind":1,
"tags":[
[
"p",
"6c237d8b3b120251c38c230c06d9e48f0d3017657c5b65c8c36112eb15c52aeb",
"",
"mention"
],
[
"p",
"77ec966fcd64f901152cad5dc7731c7c831fe22e02e3ae99ff14637e5a48ef9c",
"",
"mention"
],
[
"p",
"c1fc7771f5fa418fd3ac49221a18f19b42ccb7a663da8f04cbbf6c08c80d20b1",
"",
"mention"
],
[
"p",
"50d94fc2d8580c682b071a542f8b1e31a200b0508bab95a33bef0855df281d63",
"",
"mention"
],
[
"p",
"20d88bae0c38e6407279e6a83350a931e714f0135e013ea4a1b14f936b7fead5",
"",
"mention"
],
[
"p",
"273e7880d38d39a7fb238efcf8957a1b5b27e819127a8483e975416a0a90f8d2",
"",
"mention"
],
[
"t",
"BH2024"
]
],
"content":"Awesome Freedom Panel with...",
"sig":"2b64e461cd9f5a7aa8abbcbcfd953536f10a334b631a352cd4124e8e187c71aad08be9aefb6a68e5c060e676d06b61c553e821286ea42489f9e7e7107a1bf79a"
}
```
In nostr, all events have this form, so once you become familiar with the nostr event structure, things become pretty easy.
Look at the "tags" key. There are six "p" tags (pubkey) and one "t" tag (hashtag).
The p tags are public keys of people that are mentioned in the note. The t tags are for hashtags in the note.
It is common when working with NOSTR that you have to extract out certain tags. Here are some examples of how to do that with what are called JavaScript Array Methods:
### Find the first "p" tag element:
```
Event.tags.find(item => item[0] === 'p')
[
'p',
'6c237d8b3b120251c38c230c06d9e48f0d3017657c5b65c8c36112eb15c52aeb',
'',
'mention'
]
```
### Same, but just return the pubkey":
```
Event.tags.find(item => item[0] === 'p')[1]
'6c237d8b3b120251c38c230c06d9e48f0d3017657c5b65c8c36112eb15c52aeb'
```
### Filter the array so I only get "p" tags:
```
Event.tags.filter(item => item[0] === 'p')
[
[
'p',
'6c237d8b3b120251c38c230c06d9e48f0d3017657c5b65c8c36112eb15c52aeb',
'',
'mention'
],
[
'p',
'77ec966fcd64f901152cad5dc7731c7c831fe22e02e3ae99ff14637e5a48ef9c',
'',
'mention'
],
[
'p',
'c1fc7771f5fa418fd3ac49221a18f19b42ccb7a663da8f04cbbf6c08c80d20b1',
'',
'mention'
],
[
'p',
'50d94fc2d8580c682b071a542f8b1e31a200b0508bab95a33bef0855df281d63',
'',
'mention'
],
[
'p',
'20d88bae0c38e6407279e6a83350a931e714f0135e013ea4a1b14f936b7fead5',
'',
'mention'
],
[
'p',
'273e7880d38d39a7fb238efcf8957a1b5b27e819127a8483e975416a0a90f8d2',
'',
'mention'
]
]
```
### Return an array with only the pubkeys in the "p" tags:
```
Event.tags.filter(item => item[0] === 'p').map(item => item[1])
[
'6c237d8b3b120251c38c230c06d9e48f0d3017657c5b65c8c36112eb15c52aeb',
'77ec966fcd64f901152cad5dc7731c7c831fe22e02e3ae99ff14637e5a48ef9c',
'c1fc7771f5fa418fd3ac49221a18f19b42ccb7a663da8f04cbbf6c08c80d20b1',
'50d94fc2d8580c682b071a542f8b1e31a200b0508bab95a33bef0855df281d63',
'20d88bae0c38e6407279e6a83350a931e714f0135e013ea4a1b14f936b7fead5',
'273e7880d38d39a7fb238efcf8957a1b5b27e819127a8483e975416a0a90f8d2'
]
```
-

@ 1ec45473:d38df139
2025-01-25 20:15:01
```
______________
/ /|
/ / |
/____________ / |
| ___________ | |
|| || |
|| #NOSTR || |
|| || |
||___________|| |
| _______ | /
/| (_______) | /
( |_____________|/
\
.=======================.
| :::::::::::::::: ::: |
| ::::::::::::::[] ::: |
| ----------- ::: |
`-----------------------'
```
-

@ 20e17dd0:2ae504d7
2025-02-01 21:14:41
## 1. Hardware Selection
It is important to select adequately the hardware that will be used to build your Node. The Node will be running 24h /7 days and will countain your lightning channels. It is important to use high quality hardware and spend the extra dollars for it.
At the time of building my Node, there was a shortage of Raspberry Pi and I was looking for an optimal alternative. I have decided to go ahead and purchase a used Mac Mini (late 2012).
It is recommended NOT to purchase a Mac Mini newer than 2012 (i.e 2014 and up) because Apple started to solder the RAM to the Logic Board after 2012. The Mac Mini Late 2012 is the last model that is fully customizable with SSD and RAM upgrades.
Here is the list of hardware that will be used in this build:
* 2 x 8G DDR3L Sodim 1600Mhz 1.35V
* 1 x Mac Mini (Late 2012) 2.5Ghz
* 1 x Samsung Evo 870 1Tb SSD ^
^ Note: As discussed earlier, it is important to select hardware of quality. I had initially purchased a low cost 2Tb SSD but it failed while trying to download the Bitcoin blockchain.
##2. Hardware Upgrade
To facilitate the upgrade of the hardware, you will need the proper tools to remove some T6 & T8 screws.
Here are the steps to dismount the few components of the Mac Mini to upgrade the hardware:
1. Unplug the Mac Mini.
2. Turn it upside down with the black cover facing up.
3. Put your thumbs in the 2 grooves of the cover and turn the piece counterclockwise.

4. Remove the cover.
5. Remove 3 x T6 screws holding the fan.

6. Lift the fan and disconnect the connector by pulling gently straight up the wires.
7. Remove 1x T6 screw at the bottom of the shroud (black plastic piece on the left of the fan).

8. Remove the shroud by holding the top right part with your fingers and turning it clockwise.

9. Remove 4 x T8 screws of the grill WIFI cover.

10. The top of the grill is mounted under the Mac Mini case. Lift gently the bottom of the grill and pull towards yourself to remove the grill.
11. Move the grill aside, you do not have to disconnect the WIFI sensor, just be careful.
### 2.1 Upgrading the RAM
The RAM is visible and accessible from the moment you remove the cover. Simply release each RAM by releasing the clips on the side. Once disengaged, the RAM will spring in a 45-degree angle. Remove it and put back the upgraded RAM at a 45 degree angle and push it down for it to clip.
### 2.2 Upgrading the SSD
It is important to note that the Mac Mini has 2 SSD bay. They are referred to as the “upper bay” and “lower bay”. Since we have flipped the Mac Mini upside down to remove the bottom cover, the “upper bay” is located under the “lower bay”.
The “upper bay” is mounted with an expansion kit that holds the SSD in position whereas the “lower bay” SSD is simply resting on top of the “upper bay” SSD.
One important aspect is that the connecting cables for the “lower bay” and “upper bay” SSD are not the same. The “upper bay” SSD connects on the logic board on the right and the “lower bay” SSD cable connects on the left. Removing the “upper bay” SSD requires removing the logic board therefore requires more work. It is recommended to install the new SSD in the “lower” bay. Here are the 2 scenarios:
1.Your Mac Mini has already a Hard Drive installed in the “lower” bay. In that case insert a credit card under the HD and gently pry it upwards. You will be able to slide it out of the bay. The reason to pry it gently is because since there is no “upper” bay drive, The HD is being held in the air by 2 screws on the side that are aligned in 2 holes in the Mac Mini case. Once the HD is removed, transfer the connecting cable and the 2 screws to the new SSD. To put back the new SSD, it is easier to rotate the Mac Mini 90 degree and have the mounting holes at the bottom and use the gravity to get the 2 mounting screws in the holes. After, connect the connector to the logic board.
2. Your Mac Mini has already a Hard Drive installed in the “upper bay”? Leave it there, you do not need mounting screws, but you need a new connecting cable. You will have to buy a “lower bay connector”. Once installed on the SSD, slide the SSD on top of the original one. The connector will plug on the logic board on the left of the “upper bay” SSD connector.
A good preparation would be to go in “Disk Utility” menu on MacOS and search for “upper” or “lower” position before starting to disassemble.
Reassemble everything and you are done.
-

@ 6be5cc06:5259daf0
2025-01-21 01:51:46
## Bitcoin: Um sistema de dinheiro eletrônico direto entre pessoas.
Satoshi Nakamoto
satoshin@gmx.com
www.bitcoin.org
---
### Resumo
O Bitcoin é uma forma de dinheiro digital que permite pagamentos diretos entre pessoas, sem a necessidade de um banco ou instituição financeira. Ele resolve um problema chamado **gasto duplo**, que ocorre quando alguém tenta gastar o mesmo dinheiro duas vezes. Para evitar isso, o Bitcoin usa uma rede descentralizada onde todos trabalham juntos para verificar e registrar as transações.
As transações são registradas em um livro público chamado **blockchain**, protegido por uma técnica chamada **Prova de Trabalho**. Essa técnica cria uma cadeia de registros que não pode ser alterada sem refazer todo o trabalho já feito. Essa cadeia é mantida pelos computadores que participam da rede, e a mais longa é considerada a verdadeira.
Enquanto a maior parte do poder computacional da rede for controlada por participantes honestos, o sistema continuará funcionando de forma segura. A rede é flexível, permitindo que qualquer pessoa entre ou saia a qualquer momento, sempre confiando na cadeia mais longa como prova do que aconteceu.
---
### 1. Introdução
Hoje, quase todos os pagamentos feitos pela internet dependem de bancos ou empresas como processadores de pagamento (cartões de crédito, por exemplo) para funcionar. Embora esse sistema seja útil, ele tem problemas importantes porque é baseado em **confiança**.
Primeiro, essas empresas podem reverter pagamentos, o que é útil em caso de erros, mas cria custos e incertezas. Isso faz com que pequenas transações, como pagar centavos por um serviço, se tornem inviáveis. Além disso, os comerciantes são obrigados a desconfiar dos clientes, pedindo informações extras e aceitando fraudes como algo inevitável.
Esses problemas não existem no dinheiro físico, como o papel-moeda, onde o pagamento é final e direto entre as partes. No entanto, não temos como enviar dinheiro físico pela internet sem depender de um intermediário confiável.
O que precisamos é de um **sistema de pagamento eletrônico baseado em provas matemáticas**, não em confiança. Esse sistema permitiria que qualquer pessoa enviasse dinheiro diretamente para outra, sem depender de bancos ou processadores de pagamento. Além disso, as transações seriam irreversíveis, protegendo vendedores contra fraudes, mas mantendo a possibilidade de soluções para disputas legítimas.
Neste documento, apresentamos o **Bitcoin**, que resolve o problema do gasto duplo usando uma rede descentralizada. Essa rede cria um registro público e protegido por cálculos matemáticos, que garante a ordem das transações. Enquanto a maior parte da rede for controlada por pessoas honestas, o sistema será seguro contra ataques.
---
### 2. Transações
Para entender como funciona o Bitcoin, é importante saber como as transações são realizadas. Imagine que você quer transferir uma "moeda digital" para outra pessoa. No sistema do Bitcoin, essa "moeda" é representada por uma sequência de registros que mostram quem é o atual dono. Para transferi-la, você adiciona um novo registro comprovando que agora ela pertence ao próximo dono. Esse registro é protegido por um tipo especial de assinatura digital.
#### O que é uma assinatura digital?
Uma assinatura digital é como uma senha secreta, mas muito mais segura. No Bitcoin, cada usuário tem duas chaves: uma "chave privada", que é secreta e serve para criar a assinatura, e uma "chave pública", que pode ser compartilhada com todos e é usada para verificar se a assinatura é válida. Quando você transfere uma moeda, usa sua chave privada para assinar a transação, provando que você é o dono. A próxima pessoa pode usar sua chave pública para confirmar isso.
#### Como funciona na prática?
Cada "moeda" no Bitcoin é, na verdade, uma cadeia de assinaturas digitais. Vamos imaginar o seguinte cenário:
1. A moeda está com o Dono 0 (você). Para transferi-la ao Dono 1, você assina digitalmente a transação com sua chave privada. Essa assinatura inclui o código da transação anterior (chamado de "hash") e a chave pública do Dono 1.
2. Quando o Dono 1 quiser transferir a moeda ao Dono 2, ele assinará a transação seguinte com sua própria chave privada, incluindo também o hash da transação anterior e a chave pública do Dono 2.
3. Esse processo continua, formando uma "cadeia" de transações. Qualquer pessoa pode verificar essa cadeia para confirmar quem é o atual dono da moeda.
#### Resolvendo o problema do gasto duplo
Um grande desafio com moedas digitais é o "gasto duplo", que é quando uma mesma moeda é usada em mais de uma transação. Para evitar isso, muitos sistemas antigos dependiam de uma entidade central confiável, como uma casa da moeda, que verificava todas as transações. No entanto, isso criava um ponto único de falha e centralizava o controle do dinheiro.
O Bitcoin resolve esse problema de forma inovadora: ele usa uma rede descentralizada onde todos os participantes (os "nós") têm acesso a um registro completo de todas as transações. Cada nó verifica se as transações são válidas e se a moeda não foi gasta duas vezes. Quando a maioria dos nós concorda com a validade de uma transação, ela é registrada permanentemente na blockchain.
#### Por que isso é importante?
Essa solução elimina a necessidade de confiar em uma única entidade para gerenciar o dinheiro, permitindo que qualquer pessoa no mundo use o Bitcoin sem precisar de permissão de terceiros. Além disso, ela garante que o sistema seja seguro e resistente a fraudes.
---
### 3. Servidor Timestamp
Para assegurar que as transações sejam realizadas de forma segura e transparente, o sistema Bitcoin utiliza algo chamado de "servidor de registro de tempo" (timestamp). Esse servidor funciona como um registro público que organiza as transações em uma ordem específica.
Ele faz isso agrupando várias transações em blocos e criando um código único chamado "hash". Esse hash é como uma impressão digital que representa todo o conteúdo do bloco. O hash de cada bloco é amplamente divulgado, como se fosse publicado em um jornal ou em um fórum público.
Esse processo garante que cada bloco de transações tenha um registro de quando foi criado e que ele existia naquele momento. Além disso, cada novo bloco criado contém o hash do bloco anterior, formando uma cadeia contínua de blocos conectados — conhecida como blockchain.
Com isso, se alguém tentar alterar qualquer informação em um bloco anterior, o hash desse bloco mudará e não corresponderá ao hash armazenado no bloco seguinte. Essa característica torna a cadeia muito segura, pois qualquer tentativa de fraude seria imediatamente detectada.
O sistema de timestamps é essencial para provar a ordem cronológica das transações e garantir que cada uma delas seja única e autêntica. Dessa forma, ele reforça a segurança e a confiança na rede Bitcoin.
---
### 4. Prova-de-Trabalho
Para implementar o registro de tempo distribuído no sistema Bitcoin, utilizamos um mecanismo chamado prova-de-trabalho. Esse sistema é semelhante ao Hashcash, desenvolvido por Adam Back, e baseia-se na criação de um código único, o "hash", por meio de um processo computacionalmente exigente.
A prova-de-trabalho envolve encontrar um valor especial que, quando processado junto com as informações do bloco, gere um hash que comece com uma quantidade específica de zeros. Esse valor especial é chamado de "nonce". Encontrar o nonce correto exige um esforço significativo do computador, porque envolve tentativas repetidas até que a condição seja satisfeita.
Esse processo é importante porque torna extremamente difícil alterar qualquer informação registrada em um bloco. Se alguém tentar mudar algo em um bloco, seria necessário refazer o trabalho de computação não apenas para aquele bloco, mas também para todos os blocos que vêm depois dele. Isso garante a segurança e a imutabilidade da blockchain.
A prova-de-trabalho também resolve o problema de decidir qual cadeia de blocos é a válida quando há múltiplas cadeias competindo. A decisão é feita pela cadeia mais longa, pois ela representa o maior esforço computacional já realizado. Isso impede que qualquer indivíduo ou grupo controle a rede, desde que a maioria do poder de processamento seja mantida por participantes honestos.
Para garantir que o sistema permaneça eficiente e equilibrado, a dificuldade da prova-de-trabalho é ajustada automaticamente ao longo do tempo. Se novos blocos estiverem sendo gerados rapidamente, a dificuldade aumenta; se estiverem sendo gerados muito lentamente, a dificuldade diminui. Esse ajuste assegura que novos blocos sejam criados aproximadamente a cada 10 minutos, mantendo o sistema estável e funcional.
---
### 5. Rede
A rede Bitcoin é o coração do sistema e funciona de maneira distribuída, conectando vários participantes (ou nós) para garantir o registro e a validação das transações. Os passos para operar essa rede são:
1. **Transmissão de Transações**: Quando alguém realiza uma nova transação, ela é enviada para todos os nós da rede. Isso é feito para garantir que todos estejam cientes da operação e possam validá-la.
2. **Coleta de Transações em Blocos**: Cada nó agrupa as novas transações recebidas em um "bloco". Este bloco será preparado para ser adicionado à cadeia de blocos (a blockchain).
3. **Prova-de-Trabalho**: Os nós competem para resolver a prova-de-trabalho do bloco, utilizando poder computacional para encontrar um hash válido. Esse processo é como resolver um quebra-cabeça matemático difícil.
4. **Envio do Bloco Resolvido**: Quando um nó encontra a solução para o bloco (a prova-de-trabalho), ele compartilha esse bloco com todos os outros nós na rede.
5. **Validação do Bloco**: Cada nó verifica o bloco recebido para garantir que todas as transações nele contidas sejam válidas e que nenhuma moeda tenha sido gasta duas vezes. Apenas blocos válidos são aceitos.
6. **Construção do Próximo Bloco**: Os nós que aceitaram o bloco começam a trabalhar na criação do próximo bloco, utilizando o hash do bloco aceito como base (hash anterior). Isso mantém a continuidade da cadeia.
#### Resolução de Conflitos e Escolha da Cadeia Mais Longa
Os nós sempre priorizam a cadeia mais longa, pois ela representa o maior esforço computacional já realizado, garantindo maior segurança. Se dois blocos diferentes forem compartilhados simultaneamente, os nós trabalharão no primeiro bloco recebido, mas guardarão o outro como uma alternativa. Caso o segundo bloco eventualmente forme uma cadeia mais longa (ou seja, tenha mais blocos subsequentes), os nós mudarão para essa nova cadeia.
#### Tolerância a Falhas
A rede é robusta e pode lidar com mensagens que não chegam a todos os nós. Uma transação não precisa alcançar todos os nós de imediato; basta que chegue a um número suficiente deles para ser incluída em um bloco. Da mesma forma, se um nó não receber um bloco em tempo hábil, ele pode solicitá-lo ao perceber que está faltando quando o próximo bloco é recebido.
Esse mecanismo descentralizado permite que a rede Bitcoin funcione de maneira segura, confiável e resiliente, sem depender de uma autoridade central.
---
### 6. Incentivo
O incentivo é um dos pilares fundamentais que sustenta o funcionamento da rede Bitcoin, garantindo que os participantes (nós) continuem operando de forma honesta e contribuindo com recursos computacionais. Ele é estruturado em duas partes principais: a recompensa por mineração e as taxas de transação.
#### Recompensa por Mineração
Por convenção, o primeiro registro em cada bloco é uma transação especial que cria novas moedas e as atribui ao criador do bloco. Essa recompensa incentiva os mineradores a dedicarem poder computacional para apoiar a rede. Como não há uma autoridade central para emitir moedas, essa é a maneira pela qual novas moedas entram em circulação. Esse processo pode ser comparado ao trabalho de garimpeiros, que utilizam recursos para colocar mais ouro em circulação. No caso do Bitcoin, o "recurso" consiste no tempo de CPU e na energia elétrica consumida para resolver a prova-de-trabalho.
#### Taxas de Transação
Além da recompensa por mineração, os mineradores também podem ser incentivados pelas taxas de transação. Se uma transação utiliza menos valor de saída do que o valor de entrada, a diferença é tratada como uma taxa, que é adicionada à recompensa do bloco contendo essa transação. Com o passar do tempo e à medida que o número de moedas em circulação atinge o limite predeterminado, essas taxas de transação se tornam a principal fonte de incentivo, substituindo gradualmente a emissão de novas moedas. Isso permite que o sistema opere sem inflação, uma vez que o número total de moedas permanece fixo.
#### Incentivo à Honestidade
O design do incentivo também busca garantir que os participantes da rede mantenham um comportamento honesto. Para um atacante que consiga reunir mais poder computacional do que o restante da rede, ele enfrentaria duas escolhas:
1. Usar esse poder para fraudar o sistema, como reverter transações e roubar pagamentos.
2. Seguir as regras do sistema, criando novos blocos e recebendo recompensas legítimas.
A lógica econômica favorece a segunda opção, pois um comportamento desonesto prejudicaria a confiança no sistema, diminuindo o valor de todas as moedas, incluindo aquelas que o próprio atacante possui. Jogar dentro das regras não apenas maximiza o retorno financeiro, mas também preserva a validade e a integridade do sistema.
Esse mecanismo garante que os incentivos econômicos estejam alinhados com o objetivo de manter a rede segura, descentralizada e funcional ao longo do tempo.
---
### 7. Recuperação do Espaço em Disco
Depois que uma moeda passa a estar protegida por muitos blocos na cadeia, as informações sobre as transações antigas que a geraram podem ser descartadas para economizar espaço em disco. Para que isso seja possível sem comprometer a segurança, as transações são organizadas em uma estrutura chamada "árvore de Merkle". Essa árvore funciona como um resumo das transações: em vez de armazenar todas elas, guarda apenas um "hash raiz", que é como uma assinatura compacta que representa todo o grupo de transações.
Os blocos antigos podem, então, ser simplificados, removendo as partes desnecessárias dessa árvore. Apenas a raiz do hash precisa ser mantida no cabeçalho do bloco, garantindo que a integridade dos dados seja preservada, mesmo que detalhes específicos sejam descartados.
Para exemplificar: imagine que você tenha vários recibos de compra. Em vez de guardar todos os recibos, você cria um documento e lista apenas o valor total de cada um. Mesmo que os recibos originais sejam descartados, ainda é possível verificar a soma com base nos valores armazenados.
Além disso, o espaço ocupado pelos blocos em si é muito pequeno. Cada bloco sem transações ocupa apenas cerca de 80 bytes. Isso significa que, mesmo com blocos sendo gerados a cada 10 minutos, o crescimento anual em espaço necessário é insignificante: apenas 4,2 MB por ano. Com a capacidade de armazenamento dos computadores crescendo a cada ano, esse espaço continuará sendo trivial, garantindo que a rede possa operar de forma eficiente sem problemas de armazenamento, mesmo a longo prazo.
---
### 8. Verificação de Pagamento Simplificada
É possível confirmar pagamentos sem a necessidade de operar um nó completo da rede. Para isso, o usuário precisa apenas de uma cópia dos cabeçalhos dos blocos da cadeia mais longa (ou seja, a cadeia com maior esforço de trabalho acumulado). Ele pode verificar a validade de uma transação ao consultar os nós da rede até obter a confirmação de que tem a cadeia mais longa. Para isso, utiliza-se o ramo Merkle, que conecta a transação ao bloco em que ela foi registrada.
Entretanto, o método simplificado possui limitações: ele não pode confirmar uma transação isoladamente, mas sim assegurar que ela ocupa um lugar específico na cadeia mais longa. Dessa forma, se um nó da rede aprova a transação, os blocos subsequentes reforçam essa aceitação.
A verificação simplificada é confiável enquanto a maioria dos nós da rede for honesta. Contudo, ela se torna vulnerável caso a rede seja dominada por um invasor. Nesse cenário, um atacante poderia fabricar transações fraudulentas que enganariam o usuário temporariamente até que o invasor obtivesse controle completo da rede.
Uma estratégia para mitigar esse risco é configurar alertas nos softwares de nós completos. Esses alertas identificam blocos inválidos, sugerindo ao usuário baixar o bloco completo para confirmar qualquer inconsistência. Para maior segurança, empresas que realizam pagamentos frequentes podem preferir operar seus próprios nós, reduzindo riscos e permitindo uma verificação mais direta e confiável.
---
### 9. Combinando e Dividindo Valor
No sistema Bitcoin, cada unidade de valor é tratada como uma "moeda" individual, mas gerenciar cada centavo como uma transação separada seria impraticável. Para resolver isso, o Bitcoin permite que valores sejam combinados ou divididos em transações, facilitando pagamentos de qualquer valor.
#### Entradas e Saídas
Cada transação no Bitcoin é composta por:
- **Entradas**: Representam os valores recebidos em transações anteriores.
- **Saídas**: Correspondem aos valores enviados, divididos entre os destinatários e, eventualmente, o troco para o remetente.
Normalmente, uma transação contém:
- Uma única entrada com valor suficiente para cobrir o pagamento.
- Ou várias entradas combinadas para atingir o valor necessário.
O valor total das saídas nunca excede o das entradas, e a diferença (se houver) pode ser retornada ao remetente como **troco**.
#### Exemplo Prático
Imagine que você tem duas entradas:
1. 0,03 BTC
2. 0,07 BTC
Se deseja enviar 0,08 BTC para alguém, a transação terá:
- **Entrada**: As duas entradas combinadas (0,03 + 0,07 BTC = 0,10 BTC).
- **Saídas**: Uma para o destinatário (0,08 BTC) e outra como troco para você (0,02 BTC).
Essa flexibilidade permite que o sistema funcione sem precisar manipular cada unidade mínima individualmente.
#### Difusão e Simplificação
A difusão de transações, onde uma depende de várias anteriores e assim por diante, não representa um problema. Não é necessário armazenar ou verificar o histórico completo de uma transação para utilizá-la, já que o registro na blockchain garante sua integridade.
---
### 10. Privacidade
O modelo bancário tradicional oferece um certo nível de privacidade, limitando o acesso às informações financeiras apenas às partes envolvidas e a um terceiro confiável (como bancos ou instituições financeiras). No entanto, o Bitcoin opera de forma diferente, pois todas as transações são publicamente registradas na blockchain. Apesar disso, a privacidade pode ser mantida utilizando **chaves públicas anônimas**, que desvinculam diretamente as transações das identidades das partes envolvidas.
#### Fluxo de Informação
- No **modelo tradicional**, as transações passam por um terceiro confiável que conhece tanto o remetente quanto o destinatário.
- No **Bitcoin**, as transações são anunciadas publicamente, mas sem revelar diretamente as identidades das partes. Isso é comparável a dados divulgados por bolsas de valores, onde informações como o tempo e o tamanho das negociações (a "fita") são públicas, mas as identidades das partes não.
#### Protegendo a Privacidade
Para aumentar a privacidade no Bitcoin, são adotadas as seguintes práticas:
1. **Chaves Públicas Anônimas**: Cada transação utiliza um par de chaves diferentes, dificultando a associação com um proprietário único.
2. **Prevenção de Ligação**: Ao usar chaves novas para cada transação, reduz-se a possibilidade de links evidentes entre múltiplas transações realizadas pelo mesmo usuário.
#### Riscos de Ligação
Embora a privacidade seja fortalecida, alguns riscos permanecem:
- Transações **multi-entrada** podem revelar que todas as entradas pertencem ao mesmo proprietário, caso sejam necessárias para somar o valor total.
- O proprietário da chave pode ser identificado indiretamente por transações anteriores que estejam conectadas.
---
### 11. Cálculos
Imagine que temos um sistema onde as pessoas (ou computadores) competem para adicionar informações novas (blocos) a um grande registro público (a cadeia de blocos ou blockchain). Este registro é como um livro contábil compartilhado, onde todos podem verificar o que está escrito.
Agora, vamos pensar em um cenário: um atacante quer enganar o sistema. Ele quer mudar informações já registradas para beneficiar a si mesmo, por exemplo, desfazendo um pagamento que já fez. Para isso, ele precisa criar uma versão alternativa do livro contábil (a cadeia de blocos dele) e convencer todos os outros participantes de que essa versão é a verdadeira.
Mas isso é extremamente difícil.
#### Como o Ataque Funciona
Quando um novo bloco é adicionado à cadeia, ele depende de cálculos complexos que levam tempo e esforço. Esses cálculos são como um grande quebra-cabeça que precisa ser resolvido.
- Os “bons jogadores” (nós honestos) estão sempre trabalhando juntos para resolver esses quebra-cabeças e adicionar novos blocos à cadeia verdadeira.
- O atacante, por outro lado, precisa resolver quebra-cabeças sozinho, tentando “alcançar” a cadeia honesta para que sua versão alternativa pareça válida.
Se a cadeia honesta já está vários blocos à frente, o atacante começa em desvantagem, e o sistema está projetado para que a dificuldade de alcançá-los aumente rapidamente.
#### A Corrida Entre Cadeias
Você pode imaginar isso como uma corrida. A cada bloco novo que os jogadores honestos adicionam à cadeia verdadeira, eles se distanciam mais do atacante. Para vencer, o atacante teria que resolver os quebra-cabeças mais rápido que todos os outros jogadores honestos juntos.
Suponha que:
- A rede honesta tem **80% do poder computacional** (ou seja, resolve 8 de cada 10 quebra-cabeças).
- O atacante tem **20% do poder computacional** (ou seja, resolve 2 de cada 10 quebra-cabeças).
Cada vez que a rede honesta adiciona um bloco, o atacante tem que "correr atrás" e resolver mais quebra-cabeças para alcançar.
#### Por Que o Ataque Fica Cada Vez Mais Improvável?
Vamos usar uma fórmula simples para mostrar como as chances de sucesso do atacante diminuem conforme ele precisa "alcançar" mais blocos:
P = (q/p)^z
- **q** é o poder computacional do atacante (20%, ou 0,2).
- **p** é o poder computacional da rede honesta (80%, ou 0,8).
- **z** é a diferença de blocos entre a cadeia honesta e a cadeia do atacante.
Se o atacante está 5 blocos atrás (z = 5):
P = (0,2 / 0,8)^5 = (0,25)^5 = 0,00098, (ou, 0,098%)
Isso significa que o atacante tem menos de 0,1% de chance de sucesso — ou seja, é muito improvável.
Se ele estiver 10 blocos atrás (z = 10):
P = (0,2 / 0,8)^10 = (0,25)^10 = 0,000000095, (ou, 0,0000095%).
Neste caso, as chances de sucesso são praticamente **nulas**.
#### Um Exemplo Simples
Se você jogar uma moeda, a chance de cair “cara” é de 50%. Mas se precisar de 10 caras seguidas, sua chance já é bem menor. Se precisar de 20 caras seguidas, é quase impossível.
No caso do Bitcoin, o atacante precisa de muito mais do que 20 caras seguidas. Ele precisa resolver quebra-cabeças extremamente difíceis e alcançar os jogadores honestos que estão sempre à frente. Isso faz com que o ataque seja inviável na prática.
#### Por Que Tudo Isso é Seguro?
- **A probabilidade de sucesso do atacante diminui exponencialmente.** Isso significa que, quanto mais tempo passa, menor é a chance de ele conseguir enganar o sistema.
- **A cadeia verdadeira (honesta) está protegida pela força da rede.** Cada novo bloco que os jogadores honestos adicionam à cadeia torna mais difícil para o atacante alcançar.
#### E Se o Atacante Tentar Continuar?
O atacante poderia continuar tentando indefinidamente, mas ele estaria gastando muito tempo e energia sem conseguir nada. Enquanto isso, os jogadores honestos estão sempre adicionando novos blocos, tornando o trabalho do atacante ainda mais inútil.
Assim, o sistema garante que a cadeia verdadeira seja extremamente segura e que ataques sejam, na prática, impossíveis de ter sucesso.
---
### 12. Conclusão
Propusemos um sistema de transações eletrônicas que elimina a necessidade de confiança, baseando-se em assinaturas digitais e em uma rede peer-to-peer que utiliza prova de trabalho. Isso resolve o problema do gasto duplo, criando um histórico público de transações imutável, desde que a maioria do poder computacional permaneça sob controle dos participantes honestos.
A rede funciona de forma simples e descentralizada, com nós independentes que não precisam de identificação ou coordenação direta. Eles entram e saem livremente, aceitando a cadeia de prova de trabalho como registro do que ocorreu durante sua ausência. As decisões são tomadas por meio do poder de CPU, validando blocos legítimos, estendendo a cadeia e rejeitando os inválidos.
Com este mecanismo de consenso, todas as regras e incentivos necessários para o funcionamento seguro e eficiente do sistema são garantidos.
---
Faça o download do whitepaper original em português:
https://bitcoin.org/files/bitcoin-paper/bitcoin_pt_br.pdf
-

@ 3f770d65:7a745b24
2025-01-19 21:48:49
The recent shutdown of TikTok in the United States due to a potential government ban serves as a stark reminder how fragile centralized platforms truly are under the surface. While these platforms offer convenience, a more polished user experience, and connectivity, they are ultimately beholden to governments, corporations, and other authorities. This makes them vulnerable to censorship, regulation, and outright bans. In contrast, Nostr represents a shift in how we approach online communication and content sharing. Built on the principles of decentralization and user choice, Nostr cannot be banned, because it is not a platform—it is a protocol.
**PROTOCOLS, NOT PLATFORMS.**
At the heart of Nostr's philosophy is **user choice**, a feature that fundamentally sets it apart from legacy platforms. In centralized systems, the user experience is dictated by a single person or governing entity. If the platform decides to filter, censor, or ban specific users or content, individuals are left with little action to rectify the situation. They must either accept the changes or abandon the platform entirely, often at the cost of losing their social connections, their data, and their identity.
What's happening with TikTok could never happen on Nostr. With Nostr, the dynamics are completely different. Because it is a protocol, not a platform, no single entity controls the ecosystem. Instead, the protocol enables a network of applications and relays that users can freely choose from. If a particular application or relay implements policies that a user disagrees with, such as censorship, filtering, or even government enforced banning, they are not trapped or abandoned. They have the freedom to move to another application or relay with minimal effort.
**THIS IS POWERFUL.**
Take, for example, the case of a relay that decides to censor specific content. On a legacy platform, this would result in frustration and a loss of access for users. On Nostr, however, users can simply connect to a different relay that does not impose such restrictions. Similarly, if an application introduces features or policies that users dislike, they can migrate to a different application that better suits their preferences, all while retaining their identity and social connections.
The same principles apply to government bans and censorship. A government can ban a specific application or even multiple applications, just as it can block one relay or several relays. China has implemented both tactics, yet Chinese users continue to exist and actively participate on Nostr, demonstrating Nostr's ability to resistant censorship.
How? Simply, it turns into a game of whack-a-mole. When one relay is censored, another quickly takes its place. When one application is banned, another emerges. Users can also bypass these obstacles by running their own relays and applications directly from their homes or personal devices, eliminating reliance on larger entities or organizations and ensuring continuous access.
**AGAIN, THIS IS POWERUFL.**
Nostr's open and decentralized design makes it resistant to the kinds of government intervention that led to TikTok's outages this weekend and potential future ban in the next 90 days. There is no central server to target, no company to regulate, and no single point of failure. (Insert your CEO jokes here). As long as there are individuals running relays and applications, users continue creating notes and sending zaps.
Platforms like TikTok can be silenced with the stroke of a pen, leaving millions of users disconnected and abandoned. Social communication should not be silenced so incredibly easily. No one should have that much power over social interactions.
Will we on-board a massive wave of TikTokers in the coming hours or days? I don't know.
TikTokers may not be ready for Nostr yet, and honestly, Nostr may not be ready for them either. The ecosystem still lacks the completely polished applications, tools, and services they’re accustomed to. This is where we say "we're still early". They may not be early adopters like the current Nostr user base. Until we bridge that gap, they’ll likely move to the next centralized platform, only to face another government ban or round of censorship in the future. But eventually, there will come a tipping point, a moment when they’ve had enough. When that time comes, I hope we’re prepared. If we’re not, we risk missing a tremendous opportunity to onboard people who genuinely need Nostr’s freedom.
Until then, to all of the Nostr developers out there, keep up the great work and keep building. Your hard work and determination is needed.
###
-

@ cff1720e:15c7e2b2
2025-01-19 17:48:02
**Einleitung**\
\
Schwierige Dinge einfach zu erklären ist der Anspruch von ELI5 (explain me like I'm 5). Das ist in unserer hoch technisierten Welt dringend erforderlich, denn nur mit dem Verständnis der Technologien können wir sie richtig einsetzen und weiter entwickeln.\
Ich starte meine Serie mit Nostr, einem relativ neuen Internet-Protokoll. Was zum Teufel ist ein Internet-Protokoll? Formal beschrieben sind es internationale Standards, die dafür sorgen, dass das Internet seit über 30 Jahren ziemlich gut funktioniert. Es ist die Sprache, in der sich die Rechner miteinander unterhalten und die auch Sie täglich nutzen, vermutlich ohne es bewusst wahrzunehmen. http(s) transportiert ihre Anfrage an einen Server (z.B. Amazon), und html sorgt dafür, dass aus den gelieferten Daten eine schöne Seite auf ihrem Bildschirm entsteht. Eine Mail wird mit smtp an den Mailserver gesendet und mit imap von ihm abgerufen, und da alle den Standard verwenden, funktioniert das mit jeder App auf jedem Betriebssystem und mit jedem Mail-Provider. Und mit einer Mail-Adresse wie <roland@pareto.space> können sie sogar jederzeit umziehen, egal wohin. **Cool, das ist state of the art!** Aber warum funktioniert das z.B. bei Chat nicht, gibt es da kein Protokoll? Doch, es heißt IRC (Internet Relay Chat → merken sie sich den Namen), aber es wird so gut wie nicht verwendet. Die Gründe dafür sind nicht technischer Natur, vielmehr wurden mit Apps wie Facebook, Twitter, WhatsApp, Telegram, Instagram, TikTok u.a. bewusst Inkompatibilitäten und Nutzerabhängigkeiten geschaffen um Profite zu maximieren.

**Warum Nostr?**
Da das Standard-Protokoll nicht genutzt wird, hat jede App ihr eigenes, und wir brauchen eine handvoll Apps um uns mit allen Bekannten auszutauschen. Eine Mobilfunknummer ist Voraussetzung für jedes Konto, damit können die App-Hersteller die Nutzer umfassend tracken und mit dem Verkauf der Informationen bis zu 30 USD je Konto und Monat verdienen. Der Nutzer ist nicht mehr Kunde, er ist das Produkt! Der Werbe-SPAM ist noch das kleinste Problem bei diesem Geschäftsmodell. Server mit Millionen von Nutzerdaten sind ein “honey pot”, dementsprechend oft werden sie gehackt und die Zugangsdaten verkauft. 2024 wurde auch der Twitter-Account vom damaligen Präsidenten Joe Biden gehackt, niemand wusste mehr wer die Nachrichten verfasst hat (vorher auch nicht), d.h. die Authentizität der Inhalte ist bei keinem dieser Anbieter gewährleistet. Im selben Jahr wurde der Telegram-Gründer in Frankreich in Beugehaft genommen, weil er sich geweigert hatte Hintertüren in seine Software einzubauen. Nun kann zum Schutz **"unserer Demokratie”** praktisch jeder mitlesen, was sie mit wem an Informationen austauschen, z.B. darüber welches Shampoo bestimmte Politiker verwenden.

Und wer tatsächlich glaubt er könne Meinungsfreiheit auf sozialen Medien praktizieren, findet sich schnell in der Situation von Donald Trump wieder (seinerzeit amtierender Präsident), dem sein Twitter-Konto 2021 abgeschaltet wurde (Cancel-Culture). Die Nutzerdaten, also ihr Profil, ihre Kontakte, Dokumente, Bilder, Videos und Audiofiles - gehören ihnen ohnehin nicht mehr sondern sind Eigentum des Plattform-Betreibers; lesen sie sich mal die AGB's durch. Aber nein, keine gute Idee, das sind hunderte Seiten und sie werden permanent geändert. Alle nutzen also Apps, deren Technik sie nicht verstehen, deren Regeln sie nicht kennen, wo sie keine Rechte haben und die ihnen die Resultate ihres Handelns stehlen. Was würde wohl der Fünfjährige sagen, wenn ihm seine ältere Schwester anbieten würde, alle seine Spielzeuge zu “verwalten” und dann auszuhändigen wenn er brav ist? “Du spinnst wohl”, und damit beweist der Knirps mehr Vernunft als die Mehrzahl der Erwachsenen. \
\
**Resümee:** keine Standards, keine Daten, keine Rechte = keine Zukunft!

\
**Wie funktioniert Nostr?**
Die Entwickler von Nostr haben erkannt dass sich das Server-Client-Konzept in ein Master-Slave-Konzept verwandelt hatte. Der Master ist ein Synonym für Zentralisierung und wird zum **“single point of failure”**, der zwangsläufig Systeme dysfunktional macht. In einem verteilten Peer2Peer-System gibt es keine Master mehr sondern nur gleichberechtigte Knoten (Relays), auf denen die Informationen gespeichert werden. Indem man Informationen auf mehreren Relays redundant speichert, ist das System in jeglicher Hinsicht resilienter. Nicht nur die Natur verwendet dieses Prinzip seit Jahrmillionen erfolgreich, auch das Internet wurde so konzipiert (das ARPAnet wurde vom US-Militär für den Einsatz in Kriegsfällen unter massiven Störungen entwickelt). Alle Nostr-Daten liegen auf Relays und der Nutzer kann wählen zwischen öffentlichen (zumeist kostenlosen) und privaten Relays, z.B. für geschlossene Gruppen oder zum Zwecke von Daten-Archivierung. Da Dokumente auf mehreren Relays gespeichert sind, werden statt URL's (Locator) eindeutige Dokumentnamen (URI's = Identifier) verwendet, broken Links sind damit Vergangenheit und Löschungen / Verluste ebenfalls.\
\
Jedes Dokument (Event genannt) wird vom Besitzer signiert, es ist damit authentisch und fälschungssicher und kann nur vom Ersteller gelöscht werden. Dafür wird ein Schlüsselpaar verwendet bestehend aus privatem (nsec) und öffentlichem Schlüssel (npub) wie aus der Mailverschlüsselung (PGP) bekannt. Das repräsentiert eine Nostr-Identität, die um Bild, Namen, Bio und eine lesbare Nostr-Adresse ergänzt werden kann (z.B. <roland@pareto.space> ), mehr braucht es nicht um alle Ressourcen des Nostr-Ökosystems zu nutzen. Und das besteht inzwischen aus über hundert Apps mit unterschiedlichen Fokussierungen, z.B. für persönliche verschlüsselte Nachrichten (DM → OxChat), Kurznachrichten (Damus, Primal), Blogbeiträge (Pareto), Meetups (Joinstr), Gruppen (Groups), Bilder (Olas), Videos (Amethyst), Audio-Chat (Nostr Nests), Audio-Streams (Tunestr), Video-Streams (Zap.Stream), Marktplätze (Shopstr) u.v.a.m. Die Anmeldung erfolgt mit einem Klick (single sign on) und den Apps stehen ALLE Nutzerdaten zur Verfügung (Profil, Daten, Kontakte, Social Graph → Follower, Bookmarks, Comments, etc.), im Gegensatz zu den fragmentierten Datensilos der Gegenwart.\
\
**Resümee:** ein offener Standard, alle Daten, alle Rechte = große Zukunft!

\
**Warum ist Nostr die Zukunft des Internet?**
“Baue Dein Haus nicht auf einem fremden Grundstück” gilt auch im Internet - für alle App-Entwickler, Künstler, Journalisten und Nutzer, denn auch ihre Daten sind werthaltig. Nostr garantiert das Eigentum an den Daten, und überwindet ihre Fragmentierung. Weder die Nutzung noch die kreativen Freiheiten werden durch maßlose Lizenz- und Nutzungsbedingungen eingeschränkt. Aus passiven Nutzern werden durch Interaktion aktive Teilnehmer, Co-Creatoren in einer Sharing-Ökonomie **(Value4Value)**. OpenSource schafft endlich wieder Vertrauen in die Software und ihre Anbieter. Offene Standards ermöglichen den Entwicklern mehr Kooperation und schnellere Entwicklung, für die Anwender garantieren sie Wahlfreiheit. Womit wir letztmalig zu unserem Fünfjährigen zurückkehren. Kinder lieben Lego über alles, am meisten die Maxi-Box “Classic”, weil sie damit ihre Phantasie im Kombinieren voll ausleben können. Erwachsene schenken ihnen dann die viel zu teuren Themenpakete, mit denen man nur eine Lösung nach Anleitung bauen kann. “Was stimmt nur mit meinen Eltern nicht, wann sind die denn falsch abgebogen?" fragt sich der Nachwuchs zu Recht. Das Image lässt sich aber wieder aufpolieren, wenn sie ihren Kindern Nostr zeigen, denn die Vorteile verstehen sogar Fünfjährige.

\
**Das neue Internet ist dezentral. Das neue Internet ist selbstbestimmt. Nostr ist das neue Internet.**
<https://nostr.net/> \
<https://start.njump.me/>
**Hier das Interview zum Thema mit Radio Berliner Morgenröte**
<https://www.podbean.com/ew/pb-yxc36-17bb4be>
-

@ 9e69e420:d12360c2
2025-01-19 04:48:31
A new report from the National Sports Shooting Foundation (NSSF) shows that civilian firearm possession exceeded 490 million in 2022. The total from 1990 to 2022 is estimated at 491.3 million firearms. In 2022, over ten million firearms were domestically produced, leading to a total of 16,045,911 firearms available in the U.S. market.
Of these, 9,873,136 were handguns, 4,195,192 were rifles, and 1,977,583 were shotguns. Handgun availability aligns with the concealed carry and self-defense market, as all states allow concealed carry, with 29 having constitutional carry laws.
-

@ f9cf4e94:96abc355
2025-01-18 06:09:50
Para esse exemplo iremos usar:
| Nome | Imagem | Descrição |
| --------------- | ------------------------------------------------------------ | ------------------------------------------------------------ |
| Raspberry PI B+ |  | **Cortex-A53 (ARMv8) 64-bit a 1.4GHz e 1 GB de SDRAM LPDDR2,** |
| Pen drive |  | **16Gb** |
Recomendo que use o **Ubuntu Server** para essa instalação. Você pode baixar o Ubuntu para Raspberry Pi [aqui]( https://ubuntu.com/download/raspberry-pi). O passo a passo para a instalação do Ubuntu no Raspberry Pi está disponível [aqui]( https://ubuntu.com/tutorials/how-to-install-ubuntu-on-your-raspberry-pi). **Não instale um desktop** (como xubuntu, lubuntu, xfce, etc.).
---
## Passo 1: Atualizar o Sistema 🖥️
Primeiro, atualize seu sistema e instale o Tor:
```bash
apt update
apt install tor
```
---
## Passo 2: Criar o Arquivo de Serviço `nrs.service` 🔧
Crie o arquivo de serviço que vai gerenciar o servidor Nostr. Você pode fazer isso com o seguinte conteúdo:
```unit
[Unit]
Description=Nostr Relay Server Service
After=network.target
[Service]
Type=simple
WorkingDirectory=/opt/nrs
ExecStart=/opt/nrs/nrs-arm64
Restart=on-failure
[Install]
WantedBy=multi-user.target
```
---
## Passo 3: Baixar o Binário do Nostr 🚀
Baixe o binário mais recente do Nostr [aqui no GitHub]( https://github.com/gabrielmoura/SimpleNosrtRelay/releases).
---
## Passo 4: Criar as Pastas Necessárias 📂
Agora, crie as pastas para o aplicativo e o pendrive:
```bash
mkdir -p /opt/nrs /mnt/edriver
```
---
## Passo 5: Listar os Dispositivos Conectados 🔌
Para saber qual dispositivo você vai usar, liste todos os dispositivos conectados:
```bash
lsblk
```
---
## Passo 6: Formatando o Pendrive 💾
Escolha o pendrive correto (por exemplo, `/dev/sda`) e formate-o:
```bash
mkfs.vfat /dev/sda
```
---
## Passo 7: Montar o Pendrive 💻
Monte o pendrive na pasta `/mnt/edriver`:
```bash
mount /dev/sda /mnt/edriver
```
---
## Passo 8: Verificar UUID dos Dispositivos 📋
Para garantir que o sistema monte o pendrive automaticamente, liste os UUID dos dispositivos conectados:
```bash
blkid
```
---
## Passo 9: Alterar o `fstab` para Montar o Pendrive Automáticamente 📝
Abra o arquivo `/etc/fstab` e adicione uma linha para o pendrive, com o UUID que você obteve no passo anterior. A linha deve ficar assim:
```fstab
UUID=9c9008f8-f852 /mnt/edriver vfat defaults 0 0
```
---
## Passo 10: Copiar o Binário para a Pasta Correta 📥
Agora, copie o binário baixado para a pasta `/opt/nrs`:
```bash
cp nrs-arm64 /opt/nrs
```
---
## Passo 11: Criar o Arquivo de Configuração 🛠️
Crie o arquivo de configuração com o seguinte conteúdo e salve-o em `/opt/nrs/config.yaml`:
```yaml
app_env: production
info:
name: Nostr Relay Server
description: Nostr Relay Server
pub_key: ""
contact: ""
url: http://localhost:3334
icon: https://external-content.duckduckgo.com/iu/?u= https://public.bnbstatic.com/image/cms/crawler/COINCU_NEWS/image-495-1024x569.png
base_path: /mnt/edriver
negentropy: true
```
---
## Passo 12: Copiar o Serviço para o Diretório de Systemd ⚙️
Agora, copie o arquivo `nrs.service` para o diretório `/etc/systemd/system/`:
```bash
cp nrs.service /etc/systemd/system/
```
Recarregue os serviços e inicie o serviço `nrs`:
```bash
systemctl daemon-reload
systemctl enable --now nrs.service
```
---
## Passo 13: Configurar o Tor 🌐
Abra o arquivo de configuração do Tor `/var/lib/tor/torrc` e adicione a seguinte linha:
```torrc
HiddenServiceDir /var/lib/tor/nostr_server/
HiddenServicePort 80 127.0.0.1:3334
```
---
## Passo 14: Habilitar e Iniciar o Tor 🧅
Agora, ative e inicie o serviço Tor:
```bash
systemctl enable --now tor.service
```
O Tor irá gerar um endereço `.onion` para o seu servidor Nostr. Você pode encontrá-lo no arquivo `/var/lib/tor/nostr_server/hostname`.
---
## Observações ⚠️
- Com essa configuração, **os dados serão salvos no pendrive**, enquanto o binário ficará no cartão SD do Raspberry Pi.
- O endereço `.onion` do seu servidor Nostr será algo como: `ws://y3t5t5wgwjif<exemplo>h42zy7ih6iwbyd.onion`.
---
Agora, seu servidor Nostr deve estar configurado e funcionando com Tor! 🥳
Se este artigo e as informações aqui contidas forem úteis para você, convidamos a considerar uma doação ao autor como forma de reconhecimento e incentivo à produção de novos conteúdos.
-

@ 6389be64:ef439d32
2025-01-16 15:44:06
## Black Locust can grow up to 170 ft tall
## Grows 3-4 ft. per year
## Native to North America
## Cold hardy in zones 3 to 8

## Firewood
- BLT wood, on a pound for pound basis is roughly half that of Anthracite Coal
- Since its growth is fast, firewood can be plentiful
## Timber

- Rot resistant due to a naturally produced robinin in the wood
- 100 year life span in full soil contact! (better than cedar performance)
- Fence posts
- Outdoor furniture
- Outdoor decking
- Sustainable due to its fast growth and spread
- Can be coppiced (cut to the ground)
- Can be pollarded (cut above ground)
- Its dense wood makes durable tool handles, boxes (tool), and furniture
- The wood is tougher than hickory, which is tougher than hard maple, which is tougher than oak.
- A very low rate of expansion and contraction
- Hardwood flooring
- The highest tensile beam strength of any American tree
- The wood is beautiful
## Legume
- Nitrogen fixer
- Fixes the same amount of nitrogen per acre as is needed for 200-bushel/acre corn
- Black walnuts inter-planted with locust as “nurse” trees were shown to rapidly increase their growth [[Clark, Paul M., and Robert D. Williams. (1978) Black walnut growth increased when interplanted with nitrogen-fixing shrubs and trees. Proceedings of the Indiana Academy of Science, vol. 88, pp. 88-91.]]
## Bees

- The edible flower clusters are also a top food source for honey bees
## Shade Provider

- Its light, airy overstory provides dappled shade
- Planted on the west side of a garden it provides relief during the hottest part of the day
- (nitrogen provider)
- Planted on the west side of a house, its quick growth soon shades that side from the sun
## Wind-break

- Fast growth plus it's feathery foliage reduces wind for animals, crops, and shelters
## Fodder
- Over 20% crude protein
- 4.1 kcal/g of energy
- Baertsche, S.R, M.T. Yokoyama, and J.W. Hanover (1986) Short rotation, hardwood tree biomass as potential ruminant feed-chemical composition, nylon bag ruminal degradation and ensilement of selected species. J. Animal Sci. 63 2028-2043
-

@ b8851a06:9b120ba1
2025-01-14 15:28:32
## **It Begins with a Click**
It starts with a click: *“Do you agree to our terms and conditions?”*\
You scroll, you click, you comply. A harmless act, right? But what if every click was a surrender? What if every "yes" was another link in the chain binding you to a life where freedom requires approval?
This is the age of permission. Every aspect of your life is mediated by gatekeepers. Governments demand forms, corporations demand clicks, and algorithms demand obedience. You’re free, of course, as long as you play by the rules. But who writes the rules? Who decides what’s allowed? Who owns your life?
---
## **Welcome to Digital Serfdom**
We once imagined the internet as a digital frontier—a vast, open space where ideas could flow freely and innovation would know no bounds. But instead of creating a decentralized utopia, we built a new feudal system.
- Your data? Owned by the lords of Big Tech.
- Your money? Controlled by banks and bureaucrats who can freeze it on a whim.
- Your thoughts? Filtered by algorithms that reward conformity and punish dissent.
The modern internet is a land of serfs and lords, and guess who’s doing the farming? You. Every time you agree to the terms, accept the permissions, or let an algorithm decide for you, you till the fields of a system designed to control, not liberate.
They don’t call it control, of course. They call it *“protection.”* They say, “We’re keeping you safe,” as they build a cage so big you can’t see the bars.
---
## **Freedom in Chains**
But let’s be honest: we’re not just victims of this system—we’re participants. We’ve traded freedom for convenience, sovereignty for security. It’s easier to click “I Agree” than to read the fine print. It’s easier to let someone else hold your money than to take responsibility for it yourself. It’s easier to live a life of quiet compliance than to risk the chaos of true independence.
We tell ourselves it’s no big deal. What’s one click? What’s one form? But the permissions pile up. The chains grow heavier. And one day, you wake up and realize you’re free to do exactly what the system allows—and nothing more.
---
## **The Great Unpermissioning**
It doesn’t have to be this way. You don’t need their approval. You don’t need their systems. You don’t need their permission.
The Great Unpermissioning is not a movement—it’s a mindset. It’s the refusal to accept a life mediated by gatekeepers. It’s the quiet rebellion of saying, *“No.”* It’s the realization that the freedom you seek won’t be granted—it must be reclaimed.
- **Stop asking.** Permission is their tool. Refusal is your weapon.
- **Start building.** Embrace tools that decentralize power: Bitcoin, encryption, open-source software, decentralized communication. Build systems they can’t control.
- **Stand firm.** They’ll tell you it’s dangerous. They’ll call you a radical. But remember: the most dangerous thing you can do is comply.
The path won’t be easy. Freedom never is. But it will be worth it.
---
## **The New Frontier**
The age of permission has turned us into digital serfs, but there’s a new frontier on the horizon. It’s a world where you control your money, your data, your decisions. It’s a world of encryption, anonymity, and sovereignty. It’s a world built not on permission but on principles.
This world won’t be given to you. You have to build it. You have to fight for it. And it starts with one simple act: refusing to comply.
---
## **A Final Word**
They promised us safety, but what they delivered was submission. The age of permission has enslaved us to the mundane, the monitored, and the mediocre. The Great Unpermissioning isn’t about tearing down the old world—it’s about walking away from it.
You don’t need to wait for their approval. You don’t need to ask for their permission. The freedom you’re looking for is already yours. Permission is their power—refusal is yours.