-
![](/static/nostr-icon-purple-64x64.png)
@ 1833ee04:7c4a8170
2025-02-04 15:14:03
The international race for Bitcoin strategic reserves is just getting started.
If you’re stacking now, you’re still incredibly early.
At $100k per Bitcoin, it’s practically free for anyone who truly understands how massive this shift is.
Think back to when paper currency was introduced, people had to trade their gold for paper bills. Many laughed, saying, Who’s going to trust these worthless pieces of paper as money?
Yet today, you sell your time to earn these paper bills while your government can print an unlimited amount at will.
The world is returning to a gold standard. But this time, it’s Gold 2.0 which is Bitcoin.The international race for Bitcoin strategic reserves is just getting started.\
\
If you’re stacking now, you’re still incredibly early.\
\
At $100k per Bitcoin, it’s practically free for anyone who truly understands how massive this shift is.\
\
Think back to when paper currency was introduced, people had to trade their gold for paper bills. Many laughed, saying, Who’s going to trust these worthless pieces of paper as money?\
\
Yet today, you sell your time to earn these paper bills while your government can print an unlimited amount at will.\
\
The world is returning to a gold standard. But this time, it’s Gold 2.0 which is Bitcoin.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5af07946:98fca8c4
2025-02-04 15:13:27
Syādvāda, also known as the theory of conditional predication, is a fundamental concept in Jain philosophy that bears some intriguing similarities to modern concepts of probability.
## Conditional Prediction system
Syādvāda is a theory of epistemological relativism that forms the basis of Jain [logic](https://www.newworldencyclopedia.org/entry/Syadvada). The term "syād" in Sanskrit means "may be" or "perhaps," and in the context of syādvāda, it translates to "in some ways" or "from a perspective". This theory asserts that reality is complex and multifaceted, and no single proposition can fully express its nature.
## Saptabhangi: The Seven-fold Predication
The core of syādvāda is manifested in the process of Saptabhangi, or seven-fold prediction. This approach examines reality from seven different conditional and relative viewpoints:
- Syādasti (maybe, it is)
- Syānnāsti (maybe, it is not)
- Syādasti nāsti (maybe, it is, and it is not)
- Syādavaktavya (maybe, it is indeterminate)
- Syādasti avaktavya (maybe, it is and is indeterminate)
- Syānnāsti avaktavya (maybe, it is not and is indeterminate)
- Syādasti nāsti avaktavya (maybe, it is, is not, and is indeterminate)
## Connections to Probability
Syādvāda shares conceptual similarities with Probability theory:
- Non-absolutism: Like probability theory, syādvāda acknowledges uncertainty and rejects absolute [statements](https://indiaphilosophy.wordpress.com/tag/syadvad/). However, it asserts that there are only seven categories necessary and also sufficient to exhaust all possibilities of knowledge!
- Conditional nature: Both syādvāda and probability deal with conditional statements and [chances](https://jainfriends.tripod.com/books/jiblsyadvada.html)
- Multiple outcomes: Syādvāda's seven-fold prediction can be seen as analogous to considering multiple possible outcomes in probability.
- Indeterminacy: The fourth category of syādvāda, "avaktavya" (indeterminate), has been interpreted by some scholars as having relevance to the concept of probability.
## An Illustrative Example
Consider the tossing of a coin:
- "It is head" (now) - Syādasti
- "It is not-head" (on another occasion) - Syānnāsti
- "It is, and it is not" - Syādasti nāsti
- "It is indeterminate" (before the toss) - Syādavaktavya
This example demonstrates how syādvāda's categories can be applied to a situation involving uncertainty, similar to how we might approach it using probability theory.
## Historical Significance and Modern Relevance
Syādvāda was well-developed by the 6th century AD and received significant attention in medieval Indian logic. It is believed that it was based on astrological principles of Maharishi Parashara - the father of ancient astrology.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-04 14:14:39
My best day yet: it's been 17 hours since I ate or drank anything.
I'm about to have my coffee and I'll probably eat soon after that.
I would have gone longer without food yesterday, but we had cookies in the house and I wanted to eat some before I finished my morning coffee.
Fast February Data
Day 1: 14 hours (13 dry)
Day 2: 15 hours (14 dry)
Day 3: 17 hours (16 dry)
Day 4: TBD (17 dry)
originally posted at https://stacker.news/items/875506
-
![](/static/nostr-icon-purple-64x64.png)
@ 916a7ab7:146bb83e
2025-02-04 13:35:11
It was not ago that my life was simpler than it is today.
I remember being a simple clone, droning on through a structured life as I'd been trained to do since birth.
Like most people I knew, I was raised in a world where you were mentally prepared for a conceptually simple life:
1. Finish high school, if possible.
2. Go to college, if possible.
3. Find a job.
4. Earn money.
5. Pay bills.
6. Get married.
7. Start a family.
8. Pay more bills.
9. Raise family and (hopefully) launch the kids.
10. Plan to retire, but expect to work into your 70s.
It was a programmed formula for life. A generational blueprint, if you will. Sure, there would be unpredictable details, but I expected my life to follow this path.
As I plodded along through my fairly boring life, I checked most of those things off the list. High school was easy, but getting off the farm was not. Enlisting in the military solved that problem, and the pay in the mid-1990s wasn't bad for a 17 year old kid with no bills. I got paid every two weeks, lived in the barracks, and spent most of my money on booze. Life was good, and I had no other purpose than to do my job and keep earning money.
Before I knew it, though, everything changed. I got married, had some kids and accumulated a mountain of debt. Like my parents before me, I was stuck in a never ending cycle of working my ass off, paying bills, buying food, and trying to save what little money was left over for a future that was unpredictable at best. Financial struggles stressed our marriage, the kids continued eating more and more food, and then 2008 tanked the value of our home. That was the first nudge that stirred my oblivious slumber.
And there was more to come. Rising taxes, inflation, the clown show at the federal reserve, the wars funded by central banks, an astronomical national debt, and the burdens of our mistakes weighing down the futures of our children. Not to mention a federal government that actively seeks to censor, suppress, and financially imprison its own people. The times exuded chaos.
Then a few months ago, I woke up...
It happened during an episode of The Tuttle Twins, a cartoon show from Angel Studios. I homeschool my three youngest kids, and I'd let them watch TV during lunch so I could grade some papers. This cartoon was new to me, but the kids liked the music and the crazy raccoon. As fate would have it, they ended up watching an episode about Bitcoin. This, of course, led to a long series of questions:
"Dad, what's Bitcoin?"
"Is Bitcoin real?"
"Do you have Bitcoin?"
"Can I get Bitcoin for allowance instead of dollars?"
I had no answers for these questions, so we started doing some research together. We turned on our Chromebooks and launched a barrage of web searches. After reading a bunch of articles I came away with the idea that Bitcoin might be a real thing. Later that evening, and after the kids were in bed, I couldn't stop thinking about Bitcoin. I honestly didn't understand half of what I read in those articles, which bothered me. I'm not a super smart guy, but I catch on to things pretty quickly, and I wanted to better understand what I'd read. I expanded my search to podcasts and YouTube videos.
I ended up listening to a couple episodes from a Bitcoin Veterans podcast. As a veteran myself, I figured that this group of Bitcoin-savvy veterans would be able to help me figure out all this madness. I was right. I quickly learned that the word "Bitcoin" was just the tip of the iceberg, and I quickly found myself falling through an endless rabbit hole. They pointed me in a lot of different directions, but they were all helpful. (If you're a US military veteran and want to connect with this group, find them at [bitcoinveterans.org].)
A couple months ago, I couldn't tell you the difference between a Bitcoin and a meme coin. I'd come across the phrase Bitcoin mining, and I just thought there was a special group of people who mined a special metal to create coins with a big "B" on them. Why couldn't they just use the metal we already mined? Sheesh! I thought nostr was a virus, and a Kraken was still a giant squid.
As of today, I'm happy to say that I've made a little bit of progress. Those things above no longer confuse me, and I actually have a little bit of Bitcoin now. Sure, I'm still trying to wrap my head around NFTs and figure out who the Pepe frog man is, but I'm no longer completely lost. Not to mention, I just spent most of the last 24 hours figuring this whole nostr thing out, which excites me. I kind of missed the boat on the big name social media platforms, so I'm looking forward to this new decentralized approach to things.
For now, I'm just happy to be awake. Finally. I see the need for decentralization and the necessity of moving away from fiat monies. I don't have much to offer except my intellect and my love of writing, but I'm here to serve in any way that I can.
-
![](/static/nostr-icon-purple-64x64.png)
@ ef1e59bf:b686587d
2025-02-04 11:15:10
## Key Insights Explained
While both systems provide innovative soilless growing solutions, the unique difference lies in their approach—hydroponics relies on a nutrient-rich water solution, whereas aquaponics integrates fish into the ecosystem to naturally supply nutrients. This not only impacts their cultivation techniques but also illustrates varying levels of sustainability and resource use.
In exploring these systems, one cannot help but consider the broader implications for urban agriculture. For those looking to adopt such systems, understanding key differences can significantly impact decisions on efficiency, cost, and ecological footprint.
##### What Is Hydroponics?
In hydroponics, we grow plants in water enriched with nutrients rather than soil. This method provides a controlled environment where the roots receive all necessary elements directly from the nutrient solution. It's fascinating how plants can thrive without ever touching the soil.
The benefits of hydroponics are impressive. We can achieve faster growth rates due to optimal nutrient delivery, and the space-saving designs, such as vertical farms, maximise small areas. Moreover, nutrient levels can be controlled precisely, ensuring plants receive exactly what they need.
##### What Is Aquaponics?
Aquaponics is an innovative system that blends aquaculture, which is the practice of raising fish, with hydroponics, the soilless cultivation of plants. In this symbiotic setup, fish waste serves as a natural fertiliser, supplying essential nutrients to the plants. In return, the plants help purify the water, creating a healthy environment for the fish.
This system is unique because it mimics natural ecosystems, enhancing sustainability. The dual benefits of growing plants and fish simultaneously make aquaponics an attractive option for those of us interested in sustainable agriculture and promoting organic cultivation practices.
##### Key Differences
Hydroponics and aquaponics each offer unique benefits and challenges. Understanding these systems requires examining their differences in nutrient sources, water usage, plant growth density, time to harvest, setup intricacies, and the types of produce they best support.
##### Nutrient Source
In hydroponics, plants receive nutrients through specially prepared solutions, often purchased from commercial suppliers. This method allows us to maintain a high level of control over nutrient balance, making precise adjustments as needed.
Aquaponics, by contrast, relies on fish waste to supply nutrients. This forms a more natural ecosystem, requiring biological processes like nitrification to convert waste into nutrients usable by plants. While this approach involves fewer chemical inputs and is more sustainable, it offers less control over nutrient levels.
##### Water Usage
Hydroponic systems excel in water efficiency by recirculating water, though they necessitate regular changes to keep nutrient solutions balanced. Despite their efficiency, water loss can occur through evaporation or leaks, which requires monitoring.
Aquaponics operates as a closed-loop system where water is continually recycled between the fish tank and plant beds, minimising waste. This setup further reduces water use due to natural filtration by plants, making it an incredibly water-efficient choice.
##### Grow Density
Hydroponics typically supports higher density plant growth, especially in vertical setups. This is ideal for cultivating leafy greens, herbs, and other fast-growing plants in compact spaces.
Aquaponics requires space for both fish and plants, which limits plant density. Although some plants may grow slower due to varying nutrient availability, this method offers the benefit of integrating fish care into the system.
##### Grow Time
In hydroponics, plants enjoy faster growth rates thanks to controlled nutrient and environmental conditions. These systems often facilitate shorter growing cycles compared to traditional farming, enhancing efficiency.
Aquaponics, while efficient, may experience slightly slower growth rates due to the time taken for natural nutrient conversion. Balancing fish growth with plant cycles adds an extra layer of complexity but is a rewarding experience for those willing to engage deeply with the system.
##### Set Up and Maintenance
Starting a hydroponic system is relatively straightforward, with pumps, nutrient tanks, and light management being primary needs. Regular checks of pH, nutrient levels, and water are essential yet generally simple.
Aquaponics demands more initial infrastructure and expertise due to the need for integrated fish tanks and plant systems. Balancing fish health and water quality with plant needs adds complexity, but long-term sustainability benefits are significant. Setting up these systems can seem daunting but offer reduced external nutrient input over time.
##### Produce Types
Hydroponics shines when growing leafy greens and herbs, achieving high success rates with crops like lettuce, basil, and spinach. These systems, however, have limitations when it comes to larger or more nutrient-demanding produce.
Aquaponics expands possibilities by supporting a broader range of plants, including fruiting ones such as tomatoes, alongside fish like tilapia or trout. This dual-production feature offers diverse yields, though the choice of fish can influence plant variety.
##### Which Is More Sustainable?
When we consider the sustainability of hydroponics, several factors come to mind. First, high water efficiency and space-saving designs make it attractive for eco-conscious growers. Yet, the reliance on artificial nutrients and the higher energy usage, particularly for lighting and pumps, may impact its overall eco-friendliness. These elements can sometimes offset the system’s environmental benefits.
In contrast, aquaponics offers a unique closed-loop system that naturally recycles waste. This can significantly reduce the need for external inputs, aligning well with principles of organic farming. While this method requires more space and careful maintenance for both fish and plants, it typically involves less chemical intervention, appealing to those seeking a more natural approach.
###### Let's compare the environmental impact of these methods:
* Aquaponics might have a lower environmental footprint due to its natural nutrient cycle, reducing waste and chemical use.
* On the other hand, hydroponics can be well-suited for urban environments or locations with limited resources, thanks to its efficient use of water and space.
Ultimately, deciding which system is more sustainable depends on specific circumstances and priorities. If natural nutrient cycles and less chemical intervention are valued, aquaponics might be favoured. Nevertheless, if water and space efficiency are paramount, especially in urban settings, hydroponics might be more suitable.
Hydroponics is a game-changer for sustainable farming, offering efficient water use, reduced land impact, and year-round crop production. Whether you're a beginner or an experienced grower, having the right tools and knowledge is key to success. Visit [Hyjo ](https://hyjo.co.uk/)for high-quality hydroponic systems, nutrients, and expert advice. Start growing smarter and greener with Hyjo today!
-
![](/static/nostr-icon-purple-64x64.png)
@ 177ff913:b25cacc0
2025-02-04 08:47:39
NUX88 là một nền tảng giải trí trực tuyến nổi bật, mang đến cho người dùng những trải nghiệm thú vị và an toàn. Giao diện của NUX88 được thiết kế với phong cách hiện đại và tối ưu hóa cho mọi thiết bị, từ máy tính để bàn đến điện thoại di động. Người dùng có thể dễ dàng truy cập vào nền tảng và tận hưởng các dịch vụ giải trí mà không gặp phải bất kỳ khó khăn nào. NUX88 cam kết cung cấp một hệ thống ổn định với tốc độ truy cập nhanh chóng, giúp người dùng tham gia vào các hoạt động giải trí mà không lo bị gián đoạn.
Bảo mật là một trong những yếu tố quan trọng mà <a href="https://nux88.cc">NUX88</a> luôn chú trọng. Nền tảng này sử dụng công nghệ mã hóa tiên tiến để bảo vệ toàn bộ thông tin cá nhân và giao dịch của người dùng. Dữ liệu tài khoản, thông tin thanh toán và các giao dịch đều được xử lý một cách bảo mật và an toàn tuyệt đối. NUX88 cam kết không chia sẻ bất kỳ thông tin cá nhân nào của người dùng cho bên thứ ba mà không có sự đồng ý rõ ràng. Nền tảng cũng liên tục cập nhật các biện pháp bảo mật mới nhất để ngăn chặn các mối đe dọa từ bên ngoài, tạo ra một môi trường giải trí trực tuyến an toàn và đáng tin cậy.
Với NUX88, dịch vụ chăm sóc khách hàng luôn được ưu tiên hàng đầu. Đội ngũ hỗ trợ của NUX88 luôn sẵn sàng giải đáp mọi thắc mắc và cung cấp sự trợ giúp cho người dùng 24/7. Người dùng có thể liên hệ với đội ngũ hỗ trợ qua nhiều kênh khác nhau như chat trực tuyến, email hoặc điện thoại. Đội ngũ chăm sóc khách hàng tại NUX88 được đào tạo chuyên nghiệp và tận tâm, luôn cố gắng mang đến sự hỗ trợ nhanh chóng và hiệu quả. Điều này giúp đảm bảo rằng mọi vấn đề của người dùng sẽ được giải quyết kịp thời và mang lại sự hài lòng cao nhất.
Bên cạnh việc cung cấp các dịch vụ giải trí chất lượng, NUX88 cũng đặc biệt chú trọng đến việc tạo ra các chương trình khuyến mãi hấp dẫn và ưu đãi đặc biệt cho người dùng. Các chương trình này không chỉ mang đến cho người tham gia những phần thưởng giá trị mà còn giúp nâng cao giá trị trải nghiệm. NUX88 luôn cập nhật các sự kiện khuyến mãi và ưu đãi mới, giúp người dùng có cơ hội nhận thêm nhiều lợi ích khi tham gia vào các hoạt động giải trí trên nền tảng. Những chương trình này thường xuyên được tổ chức để mang đến sự mới mẻ và hấp dẫn, khuyến khích người dùng quay lại và tận hưởng dịch vụ.
Cuối cùng, NUX88 cam kết mang đến một nền tảng giải trí trực tuyến đáng tin cậy và chất lượng. Với giao diện dễ sử dụng, bảo mật mạnh mẽ, dịch vụ chăm sóc khách hàng tận tâm và các chương trình khuyến mãi hấp dẫn, NUX88 là một sự lựa chọn lý tưởng cho những ai tìm kiếm một không gian giải trí an toàn và phong phú. Nền tảng này không chỉ cung cấp những phút giây thư giãn tuyệt vời mà còn đảm bảo sự an toàn, bảo mật tuyệt đối cho người dùng. NUX88 chắc chắn sẽ là một người bạn đồng hành đáng tin cậy trong mọi hành trình giải trí trực tuyến của bạn.
-
![](/static/nostr-icon-purple-64x64.png)
@ 177ff913:b25cacc0
2025-02-04 08:46:38
MCW77 là một nền tảng giải trí trực tuyến uy tín, được thiết kế để mang đến cho người dùng trải nghiệm giải trí tuyệt vời và mượt mà. Với giao diện hiện đại, dễ sử dụng và tối ưu hóa cho cả thiết bị di động và máy tính để bàn, người dùng có thể dễ dàng truy cập vào nền tảng và tham gia vào các hoạt động giải trí. MCW77 cam kết cung cấp một hệ thống hoạt động ổn định và tốc độ truy cập nhanh chóng, đảm bảo không có gián đoạn trong suốt quá trình sử dụng dịch vụ. Người dùng sẽ được tận hưởng trải nghiệm giải trí liên tục và không gặp phải các vấn đề về kết nối hay tốc độ.
Bảo mật luôn là một yếu tố quan trọng tại <a href="https://mcw77-vn.com">MCW77</a>. Nền tảng này áp dụng các công nghệ bảo mật tiên tiến, giúp bảo vệ mọi giao dịch và thông tin cá nhân của người dùng. Mọi dữ liệu, từ thông tin đăng nhập đến các giao dịch tài chính, đều được mã hóa và xử lý một cách an toàn. MCW77 cam kết không bao giờ chia sẻ thông tin cá nhân của người dùng cho bên thứ ba mà không có sự đồng ý rõ ràng. Nền tảng này cũng liên tục cập nhật các biện pháp bảo mật mới để chống lại các mối đe dọa từ bên ngoài, đảm bảo người dùng luôn có một không gian giải trí an toàn và đáng tin cậy.
Một yếu tố không thể thiếu trong mọi nền tảng giải trí trực tuyến là dịch vụ khách hàng. MCW77 hiểu rõ tầm quan trọng của dịch vụ hỗ trợ và luôn cố gắng nâng cao chất lượng chăm sóc khách hàng. Đội ngũ hỗ trợ của MCW77 luôn sẵn sàng giải đáp mọi thắc mắc và cung cấp sự trợ giúp 24/7. Người dùng có thể dễ dàng liên hệ qua nhiều kênh khác nhau như chat trực tuyến, email hoặc điện thoại. Đội ngũ hỗ trợ của MCW77 luôn đáp ứng nhanh chóng và hiệu quả mọi yêu cầu, từ đó mang đến sự hài lòng tuyệt đối cho khách hàng.
MCW77 cũng rất chú trọng đến việc mang đến các chương trình khuyến mãi và ưu đãi hấp dẫn cho người dùng. Những chương trình này không chỉ giúp người dùng tận hưởng thêm lợi ích khi tham gia vào các dịch vụ mà còn tạo thêm động lực và sự hứng khởi khi trải nghiệm nền tảng. Các sự kiện và khuyến mãi được tổ chức thường xuyên và luôn có những phần thưởng giá trị, giúp người dùng có thể tối đa hóa giá trị giải trí của mình. MCW77 cam kết liên tục cải thiện và cập nhật các chương trình khuyến mãi để mang đến những cơ hội tuyệt vời cho người dùng.
Cuối cùng, MCW77 không ngừng nỗ lực nâng cao chất lượng dịch vụ để đáp ứng nhu cầu giải trí của người dùng. Với sự kết hợp hoàn hảo giữa giao diện thân thiện, bảo mật mạnh mẽ, dịch vụ chăm sóc khách hàng chuyên nghiệp và các chương trình khuyến mãi hấp dẫn, MCW77 đã và đang trở thành một trong những nền tảng giải trí trực tuyến hàng đầu. Người dùng không chỉ được tận hưởng những phút giây thư giãn tuyệt vời mà còn được đảm bảo an toàn tuyệt đối khi tham gia vào các hoạt động trên nền tảng. MCW77 xứng đáng là lựa chọn lý tưởng cho những ai tìm kiếm một không gian giải trí trực tuyến đẳng cấp và đáng tin cậy.
-
![](/static/nostr-icon-purple-64x64.png)
@ e3ba5e1a:5e433365
2025-02-04 08:29:42
President Trump has started rolling out his tariffs, something I [blogged about in November](https://www.snoyman.com/blog/2024/11/steelmanning-tariffs/). People are talking about these tariffs a lot right now, with many people (correctly) commenting on how consumers will end up with higher prices as a result of these tariffs. While that part is true, I’ve seen a lot of people taking it to the next, incorrect step: that consumers will pay the entirety of the tax. I [put up a poll on X](https://x.com/snoyberg/status/1886035800019599808) to see what people thought, and while the right answer got a lot of votes, it wasn't the winner.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/e3ba5e1a06e11c860036b5c5e688012be2a84760abc066ac34a099535e433365/files/1738657292355-YAKIHONNES3.png)
For purposes of this blog post, our ultimate question will be the following:
* Suppose apples currently sell for $1 each in the entire United States.
* There are domestic sellers and foreign sellers of apples, all receiving the same price.
* There are no taxes or tariffs on the purchase of apples.
* The question is: if the US federal government puts a $0.50 import tariff per apple, what will be the change in the following:
* Number of apples bought in the US
* Price paid by buyers for apples in the US
* Post-tax price received by domestic apple producers
* Post-tax price received by foreign apple producers
Before we can answer that question, we need to ask an easier, first question: before instituting the tariff, why do apples cost $1?
And finally, before we dive into the details, let me provide you with the answers to the ultimate question. I recommend you try to guess these answers before reading this, and if you get it wrong, try to understand why:
1. The number of apples bought will go down
2. The buyers will pay more for each apple they buy, but not the full amount of the tariff
3. Domestic apple sellers will receive a *higher* price per apple
4. Foreign apple sellers will receive a *lower* price per apple, but not lowered by the full amount of the tariff
In other words, regardless of who sends the payment to the government, both taxed parties (domestic buyers and foreign sellers) will absorb some of the costs of the tariff, while domestic sellers will benefit from the protectionism provided by tariffs and be able to sell at a higher price per unit.
## Marginal benefit
All of the numbers discussed below are part of a [helper Google Sheet](https://docs.google.com/spreadsheets/d/14ZbkWpw1B9Q1UDB9Yh47DmdKQfIafVVBKbDUsSIfGZw/edit?usp=sharing) I put together for this analysis. Also, apologies about the jagged lines in the charts below, I hadn’t realized before starting on this that there are [some difficulties with creating supply and demand charts in Google Sheets](https://superuser.com/questions/1359731/how-to-create-a-supply-demand-style-chart).
Let’s say I absolutely love apples, they’re my favorite food. How much would I be willing to pay for a single apple? You might say “$1, that’s the price in the supermarket,” and in many ways you’d be right. If I walk into supermarket A, see apples on sale for $50, and know that I can buy them at supermarket B for $1, I’ll almost certainly leave A and go buy at B.
But that’s not what I mean. What I mean is: how high would the price of apples have to go *everywhere* so that I’d no longer be willing to buy a single apple? This is a purely personal, subjective opinion. It’s impacted by how much money I have available, other expenses I need to cover, and how much I like apples. But let’s say the number is $5.
How much would I be willing to pay for another apple? Maybe another $5. But how much am I willing to pay for the 1,000th apple? 10,000th? At some point, I’ll get sick of apples, or run out of space to keep the apples, or not be able to eat, cook, and otherwise preserve all those apples before they rot.
The point being: I’ll be progressively willing to spend less and less money for each apple. This form of analysis is called *marginal benefit*: how much benefit (expressed as dollars I’m willing to spend) will I receive from each apple? This is a downward sloping function: for each additional apple I buy (quantity demanded), the price I’m willing to pay goes down. This is what gives my personal *demand curve*. And if we aggregate demand curves across all market participants (meaning: everyone interested in buying apples), we end up with something like this:
![Demand curve before tax](https://www.snoyman.com/img/who-pays-tax/demand-before-tariff.png)
Assuming no changes in people’s behavior and other conditions in the market, this chart tells us how many apples will be purchased by our buyers at each price point between $0.50 and $5. And ceteris paribus (all else being equal), this will continue to be the demand curve for apples.
## Marginal cost
Demand is half the story of economics. The other half is supply, or: how many apples will I sell at each price point? Supply curves are upward sloping: the higher the price, the more a person or company is willing and able to sell a product.
Let’s understand why. Suppose I have an apple orchard. It’s a large property right next to my house. With about 2 minutes of effort, I can walk out of my house, find the nearest tree, pick 5 apples off the tree, and call it a day. 5 apples for 2 minutes of effort is pretty good, right?
Yes, there was all the effort necessary to buy the land, and plant the trees, and water them… and a bunch more than I likely can’t even guess at. We’re going to ignore all of that for our analysis, because for short-term supply-and-demand movement, we can ignore these kinds of *sunk costs*. One other simplification: in reality, supply curves often start descending before ascending. This accounts for achieving efficiencies of scale after the first number of units purchased. But since both these topics are unneeded for understanding taxes, I won’t go any further.
Anyway, back to my apple orchard. If someone offers me $0.50 per apple, I can do 2 minutes of effort and get $2.50 in revenue, which equates to a $75/hour wage for me. I’m more than happy to pick apples at that price\!
However, let’s say someone comes to buy 10,000 apples from me instead. I no longer just walk out to my nearest tree. I’m going to need to get in my truck, drive around, spend the day in the sun, pay for gas, take a day off of my day job (let’s say it pays me $70/hour). The costs go up significantly. Let’s say it takes 5 days to harvest all those apples myself, it costs me $100 in fuel and other expenses, and I lose out on my $70/hour job for 5 days. We end up with:
* Total expenditure: $100 \+ $70 \* 8 hours a day \* 5 days \== $2900
* Total revenue: $5000 (10,000 apples at $0.50 each)
* Total profit: $2100
So I’m still willing to sell the apples at this price, but it’s not as attractive as before. And as the number of apples purchased goes up, my costs keep increasing. I’ll need to spend more money on fuel to travel more of my property. At some point I won’t be able to do the work myself anymore, so I’ll need to pay others to work on the farm, and they’ll be slower at picking apples than me (less familiar with the property, less direct motivation, etc.). The point being: at some point, the number of apples can go high enough that the $0.50 price point no longer makes me any money.
This kind of analysis is called *marginal cost*. It refers to the additional amount of expenditure a seller has to spend in order to produce each additional unit of the good. Marginal costs go up as quantity sold goes up. And like demand curves, if you aggregate this data across all sellers, you get a supply curve like this:
![Supply curve before tariff](https://www.snoyman.com/img/who-pays-tax/supply-before-tariff.png)
## Equilibrium price
We now know, for every price point, how many apples buyers will purchase, and how many apples sellers will sell. Now we find the equilibrium: where the supply and demand curves meet. This point represents where the marginal benefit a buyer would receive from the next buyer would be less than the cost it would take the next seller to make it. Let’s see it in a chart:
![Supply and demand before tariff](https://www.snoyman.com/img/who-pays-tax/supply-demand-before-tariff.png)
You’ll notice that these two graphs cross at the $1 price point, where 63 apples are both demanded (bought by consumers) and supplied (sold by producers). This is our equilibrium price. We also have a visualization of the *surplus* created by these trades. Everything to the left of the equilibrium point and between the supply and demand curves represents surplus: an area where someone is receiving something of more value than they give. For example:
* When I bought my first apple for $1, but I was willing to spend $5, I made $4 of consumer surplus. The consumer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and above the equilibrium price point.
* When a seller sells his first apple for $1, but it only cost $0.50 to produce it, the seller made $0.50 of producer surplus. The producer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and below the equilibrium price point.
Another way of thinking of surplus is “every time someone got a better price than they would have been willing to take.”
OK, with this in place, we now have enough information to figure out how to price in the tariff, which we’ll treat as a negative externality.
## Modeling taxes
Alright, the government has now instituted a $0.50 tariff on every apple sold within the US by a foreign producer. We can generally model taxes by either increasing the marginal cost of each unit sold (shifting the supply curve up), or by decreasing the marginal benefit of each unit bought (shifting the demand curve down). In this case, since only some of the producers will pay the tax, it makes more sense to modify the supply curve.
First, let’s see what happens to the foreign seller-only supply curve when you add in the tariff:
![Foreign supply shift from tariff](https://www.snoyman.com/img/who-pays-tax/supply-tariff-shift.png)
With the tariff in place, for each quantity level, the price at which the seller will sell is $0.50 higher than before the tariff. That makes sense: if I was previously willing to sell my 82nd apple for $3, I would now need to charge $3.50 for that apple to cover the cost of the tariff. We see this as the tariff “pushing up” or “pushing left” the original supply curve.
We can add this new supply curve to our existing (unchanged) supply curve for domestic-only sellers, and we end up with a result like this:
![Supply curves post tariff](https://www.snoyman.com/img/who-pays-tax/supply-curves-post-tariff.png)
The total supply curve adds up the individual foreign and domestic supply curves. At each price point, we add up the total quantity each group would be willing to sell to determine the total quantity supplied for each price point. Once we have that cumulative supply curve defined, we can produce an updated supply-and-demand chart including the tariff:
![Supply and demand post tariff](https://www.snoyman.com/img/who-pays-tax/supply-demand-post-tariff.png)
As we can see, the equilibrium has shifted:
* The equilibrium price paid by consumers has risen from $1 to $1.20.
* The total number of apples purchased has dropped from 63 apples to 60 apples.
* Consumers therefore received 3 less apples. They spent $72 for these 60 apples, whereas previously they spent $63 for 3 more apples, a definite decrease in consumer surplus.
* Foreign producers sold 36 of those apples (see the raw data in the linked Google Sheet), for a gross revenue of $43.20. However, they also need to pay the tariff to the US government, which accounts for $18, meaning they only receive $25.20 post-tariff. Previously, they sold 42 apples at $1 each with no tariff to be paid, meaning they took home $42.
* Domestic producers sold the remaining 24 apples at $1.20, giving them a revenue of $28.80. Since they don’t pay the tariff, they take home all of that money. By contrast, previously, they sold 21 apples at $1, for a take-home of $21.
* The government receives $0.50 for each of the 60 apples sold, or in other words receives $30 in revenue it wouldn’t have received otherwise.
We could be more specific about the surpluses, and calculate the actual areas for consumer surplus, producer surplus, inefficiency from the tariff, and government revenue from the tariff. But I won’t bother, as those calculations get slightly more involved. Instead, let’s just look at the aggregate outcomes:
* Consumers were unquestionably hurt. Their price paid went up by $0.20 per apple, and received less apples.
* Foreign producers were also hurt. Their price received went down from the original $1 to the new post-tariff price of $1.20, minus the $0.50 tariff. In other words: foreign producers only receive $0.70 per apple now. This hurt can be mitigated by shifting sales to other countries without a tariff, but the pain will exist regardless.
* Domestic producers scored. They can sell less apples and make more revenue doing it.
* And the government walked away with an extra $30.
Hopefully you now see the answer to the original questions. Importantly, while the government imposed a $0.50 tariff, neither side fully absorbed that cost. Consumers paid a bit more, foreign producers received a bit less. The exact details of how that tariff was split across the groups is mediated by the relevant supply and demand curves of each group. If you want to learn more about this, the relevant search term is “price elasticity,” or how much a group’s quantity supplied or demanded will change based on changes in the price.
## Other taxes
Most taxes are some kind of a tax on trade. Tariffs on apples is an obvious one. But the same applies to income tax (taxing the worker for the trade of labor for money) or payroll tax (same thing, just taxing the employer instead). Interestingly, you can use the same model for analyzing things like tax incentives. For example, if the government decided to subsidize domestic apple production by giving the domestic producers a $0.50 bonus for each apple they sell, we would end up with a similar kind of analysis, except instead of the foreign supply curve shifting up, we’d see the domestic supply curve shifting down.
And generally speaking, this is what you’ll *always* see with government involvement in the economy. It will result in disrupting an existing equilibrium, letting the market readjust to a new equilibrium, and incentivization of some behavior, causing some people to benefit and others to lose out. We saw with the apple tariff, domestic producers and the government benefited while others lost.
You can see the reverse though with tax incentives. If I give a tax incentive of providing a deduction (not paying income tax) for preschool, we would end up with:
* Government needs to make up the difference in tax revenue, either by raising taxes on others or printing more money (leading to inflation). Either way, those paying the tax or those holding government debased currency will pay a price.
* Those people who don’t use the preschool deduction will receive no benefit, so they simply pay a cost.
* Those who do use the preschool deduction will end up paying less on tax+preschool than they would have otherwise.
This analysis is fully amoral. It’s not saying whether providing subsidized preschool is a good thing or not, it simply tells you where the costs will be felt, and points out that such government interference in free economic choice does result in inefficiencies in the system. Once you have that knowledge, you’re more well educated on making a decision about whether the costs of government intervention are worth the benefits.
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-04 07:52:55
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/875346
-
![](/static/nostr-icon-purple-64x64.png)
@ 23dea97f:72ed98dc
2025-02-04 07:29:36
Post number 1
-
![](/static/nostr-icon-purple-64x64.png)
@ 177ff913:b25cacc0
2025-02-04 07:21:26
MCW18 là một nền tảng giải trí trực tuyến tiên tiến, được thiết kế với mục tiêu mang đến trải nghiệm mượt mà và thú vị cho người dùng. Giao diện của nền tảng này rất dễ sử dụng, tối ưu hóa cho tất cả các thiết bị, từ máy tính để bàn đến điện thoại di động, giúp người dùng có thể tiếp cận dịch vụ một cách nhanh chóng và thuận tiện. MCW18 luôn đảm bảo tốc độ truy cập ổn định, giúp người dùng có thể tham gia vào các hoạt động giải trí mà không gặp phải bất kỳ sự gián đoạn nào. Nền tảng này mang đến một không gian giải trí trực tuyến chất lượng cao và tiện lợi cho người sử dụng.
Bảo mật là một trong những yếu tố quan trọng hàng đầu tại <a href="https://mcw18.cc">MCW18</a>. Nền tảng này áp dụng công nghệ mã hóa tiên tiến để bảo vệ mọi thông tin cá nhân và giao dịch của người dùng. Dữ liệu đăng nhập, thông tin tài khoản và các giao dịch tài chính đều được xử lý một cách bảo mật và an toàn tuyệt đối. MCW18 cam kết không chia sẻ bất kỳ thông tin cá nhân nào của người dùng cho bên thứ ba mà không có sự đồng ý của họ. Đội ngũ kỹ thuật của MCW18 luôn theo dõi và cập nhật các biện pháp bảo mật mới nhất để đối phó với những mối đe dọa từ bên ngoài, mang lại sự yên tâm cho người dùng khi tham gia vào nền tảng.
Ngoài bảo mật, MCW18 còn chú trọng đến chất lượng dịch vụ khách hàng. Đội ngũ hỗ trợ của MCW18 luôn sẵn sàng 24/7 để giải đáp mọi thắc mắc và giúp đỡ người dùng khi gặp phải bất kỳ vấn đề nào. Người dùng có thể dễ dàng liên hệ qua nhiều kênh khác nhau như chat trực tuyến, email hoặc điện thoại. Đội ngũ chăm sóc khách hàng của MCW18 rất chuyên nghiệp và tận tâm, luôn cố gắng mang đến sự hỗ trợ nhanh chóng và hiệu quả, giúp người dùng giải quyết mọi vấn đề trong thời gian ngắn nhất.
MCW18 cũng rất chú trọng đến việc cải thiện trải nghiệm người dùng thông qua các chương trình khuyến mãi và ưu đãi hấp dẫn. Người dùng có thể tham gia vào các sự kiện và nhận nhiều phần thưởng giá trị, tạo thêm động lực và sự hào hứng khi tham gia vào các dịch vụ trên nền tảng. Các chương trình khuyến mãi của MCW18 được tổ chức thường xuyên và luôn được cập nhật để đáp ứng nhu cầu của người dùng. Điều này giúp MCW18 không chỉ cung cấp một trải nghiệm giải trí tuyệt vời mà còn mang đến những cơ hội nhận thưởng hấp dẫn cho người tham gia.
Cuối cùng, MCW18 cam kết không ngừng nâng cao chất lượng dịch vụ và đáp ứng mọi nhu cầu của người dùng. Với sự kết hợp giữa giao diện dễ sử dụng, bảo mật mạnh mẽ, hỗ trợ khách hàng chuyên nghiệp và các chương trình khuyến mãi hấp dẫn, MCW18 đã và đang trở thành lựa chọn hàng đầu của nhiều người dùng yêu thích giải trí trực tuyến. Nền tảng này không chỉ đảm bảo sự an toàn và bảo mật mà còn mang đến những giây phút thư giãn tuyệt vời, giúp người dùng có thể tận hưởng một trải nghiệm giải trí hoàn hảo và trọn vẹn.
-
![](/static/nostr-icon-purple-64x64.png)
@ b7274d28:c99628cb
2025-02-04 05:31:13
For anyone interested in the list of essential essays from nostr:npub14hn6p34vegy4ckeklz8jq93mendym9asw8z2ej87x2wuwf8werasc6a32x ([@anilsaidso](https://x.com/anilsaidso)) on Twitter that nostr:npub1h8nk2346qezka5cpm8jjh3yl5j88pf4ly2ptu7s6uu55wcfqy0wq36rpev mentioned on Read 856, here it is. I have compiled it with as many of the essays as I could find, along with the audio versions, when available. Additionally, if the author is on #Nostr, I have tagged their npub so you can thank them by zapping them some sats.
All credit for this list and the graphics accompanying each entry goes to nostr:npub14hn6p34vegy4ckeklz8jq93mendym9asw8z2ej87x2wuwf8werasc6a32x, whose original thread can be found here: [Anil's Essential Essays Thread](https://x.com/anilsaidso/status/1290758632238276609)
![Anil's Tweet](https://relay.brightbolt.net/76b99225834f9d2b5f4ea1efa0d0c20bb497b45369da91487b80de89fc4f56e0.jpg)
## 1.
![Masters and Slaves of Money](https://relay.brightbolt.net/2546dfaa314b1fd2ce2512519405487eaf74df6950632f94f58c61e7a8d07111.jpg)
> History shows us that the corruption of monetary systems leads to moral decay, social collapse, and slavery.
Essay: https://breedlove22.medium.com/masters-and-slaves-of-money-255ecc93404f
Audio: https://fountain.fm/episode/RI0iCGRCCYdhnMXIN3L6
## 2.
![The Bitcoin Reformation](https://relay.brightbolt.net/404b5d868f24e5f353cf6f6ccf7dfb27f86bc5efde753548719d92a046cdb986.jpg)
> The 21st century emergence of Bitcoin, encryption, the internet, and millennials are more than just trends; they herald a wave of change that exhibits similar dynamics as the 16-17th century revolution that took place in Europe.
Author: nostr:npub13l3lyslfzyscrqg8saw4r09y70702s6r025hz52sajqrvdvf88zskh8xc2
Essay: https://casebitcoin.com/docs/TheBitcoinReformation_TuurDemeester.pdf
Audio: https://fountain.fm/episode/uLgBG2tyCLMlOp3g50EL
## 3.
![The Danger of the Collective 'We'](https://relay.brightbolt.net/a5a1e6e28fe92142bf6fcde0bf3681b927e414f18eca4fb8c8b9d537570c949e.jpg)
> There are many men out there who will parrot the "debt is money WE owe OURSELVES" without acknowledging that "WE" isn't a static entity, but a collection of individuals at different points in their lives.
Author: nostr:npub1guh5grefa7vkay4ps6udxg8lrqxg2kgr3qh9n4gduxut64nfxq0q9y6hjy
Essay: https://www.tftc.io/issue-754-ludwig-von-mises-human-action/
Audio: https://fountain.fm/episode/UXacM2rkdcyjG9xp9O2l
## 4.
![The Bullish Case for Bitcoin](https://relay.brightbolt.net/af60765a440a9fd4d301b1c7f43797b3fa8e0f9bb262bb63f9f9fd31b5e6424e.jpg)
> If Bitcoin exists for 20 years, there will be near-universal confidence that it will be available forever, much as people believe the Internet is a permanent feature of the modern world.
Essay: https://vijayboyapati.medium.com/the-bullish-case-for-bitcoin-6ecc8bdecc1
Audio: https://fountain.fm/episode/jC3KbxTkXVzXO4vR7X3W
As you are surely aware, Vijay has expanded this into a book available here: [The Bullish Case for Bitcoin Book](https://www.bullishcaseforbitcoin.com/product-page/the-bullish-case-for-bitcoin-paperback-1)
There is also an audio book version available here: [The Bullish Case for Bitcoin Audio Book](https://www.audible.com/pd/The-Bullish-Case-for-Bitcoin-Audiobook/B09QXR9GVL?eac_link=m4syoiXYyRJh&ref=web_search_eac_asin_1&eac_selected_type=asin&eac_selected=B09QXR9GVL&qid=2tIYC0F4Ya&eac_id=135-0887332-3379864_2tIYC0F4Ya&sr=1-1)
## 5.
![Bitcoin Becomes the Flag of Technology](https://relay.brightbolt.net/0c1f799a44010b79db2762884deae7686f3ec0b13bf9a9f077faa3c95b2c645f.jpg)
> This realignment would not be traditional right vs left, but rather land vs cloud, state vs network, centralized vs decentralized, new money vs old, internationalist/capitalist vs nationalist/socialist, MMT vs BTC,...Hamilton vs Satoshi.
Essay: https://nakamoto.com/bitcoin-becomes-the-flag-of-technology/
Audio: https://fountain.fm/episode/tFJKjYLKhiFY8voDssZc
## 6.
[Gradually, Then Suddenly](https://relay.brightbolt.net/fa4196f5c6183bda153e2e3c9911909d289b5a428852f5f07f7c1991191e7489.jpg)
> I became convinced that, whether bitcoin survives or not, the existing financial system is working on borrowed time.
Essay: https://nakamotoinstitute.org/mempool/gradually-then-suddenly/
Audio: https://fountain.fm/episode/Mf6hgTFUNESqvdxEIOGZ
Parker Lewis went on to release several more articles in the Gradually, Then Suddenly series. They can be found here: [Gradually, Then Suddenly Series](https://nakamotoinstitute.org/mempool/series/gradually-then-suddenly/)
nostr:npub1h8nk2346qezka5cpm8jjh3yl5j88pf4ly2ptu7s6uu55wcfqy0wq36rpev has, of course, read all of them for us. Listing them all here is beyond the scope of this article, but you can find them by searching the podcast feed here: [Bitcoin Audible Feed](https://fountain.fm/show/RtZlWdbEbpyEyjBNbeQ7)
Finally, Parker Lewis has refined these articles and released them as a book, which is available here: [Gradually, Then Suddenly Book](https://academy.saifedean.com/product/gradually-then-suddenly-hardcover/)
## 7.
![3 Reasons I'm Investing in Bitcoin](https://relay.brightbolt.net/1d8ad416d8c945bc9a371be837dd153e623bfe64cb0101bc0277dec282ab4f0a.jpg)
> Bitcoin is a beautifully-constructed protocol. Genius is apparent in its design to most people who study it in depth, in terms of the way it blends math, computer science, cyber security, monetary economics, and game theory.
Author: nostr:npub1a2cww4kn9wqte4ry70vyfwqyqvpswksna27rtxd8vty6c74era8sdcw83a
Essay: https://www.lynalden.com/invest-in-bitcoin/
Audio: https://fountain.fm/episode/axeqKBvYCSP1s9aJIGSe
## 8.
![Why Bitcoin Matters](https://relay.brightbolt.net/f1e45b5a1143d32fa5d4b37434605cd60e9bb5456023810a23b82eaa5fb4f63f.jpg)
> Bitcoin offers a sweeping vista of opportunity to re-imagine how the financial system can and should work in the Internet era..
Essay: https://archive.nytimes.com/dealbook.nytimes.com/2014/01/21/why-bitcoin-matters/
## 9.
![Economics of Bitcoin as a Settlement Network](https://relay.brightbolt.net/566a36c4363db741625b1fc803366123f46faf8e7e9484f746d32bc020807967.jpg)
> Using Bitcoin for consumer purchases is akin to driving a Concorde jet down the street to pick up groceries: a ridiculously expensive waste of an astonishing tool.
Author: nostr:npub1gdu7w6l6w65qhrdeaf6eyywepwe7v7ezqtugsrxy7hl7ypjsvxksd76nak
Essay: https://nakamotoinstitute.org/mempool/economics-of-bitcoin-as-a-settlement-network/
Audio: https://fountain.fm/episode/JoSpRFWJtoogn3lvTYlz
## 10.
![Decentralization: Why Dumb Networks Are Better](https://relay.brightbolt.net/3dfea80fb51ff250e95ec2ebb9d683112684b33d62c56684f06bf7a480b9696b.jpg)
> The Internet is a dumb network, which is its defining and most valuable feature. The Internet’s protocol (..) doesn’t offer “services.” It doesn’t make decisions about content. It doesn’t distinguish between photos, text, video and audio.
Essay: https://fee.org/articles/decentralization-why-dumb-networks-are-better/
Audio: https://fountain.fm/episode/b7gOEqmWxn8RiDziffXf
## 11.
![Bitcoin: The Internet of Money](https://relay.brightbolt.net/f9bcd5b4461f85f6ae49ee4019e8cc4caa031d8ad5b90e233dc62510c7595d56.jpg)
> Most people are only familiar with (b)itcoin the electronic currency, but more important is (B)itcoin, with a capital B, the underlying protocol, which encapsulates and distributes the functions of contract law.
I was unable to find this essay or any audio version. Clicking on Anil's original link took me to Naval's blog, but that particular entry seems to have been removed.
## 12.
![Bitcoin Reveals Exchange Rate Manipulation](https://relay.brightbolt.net/05df9e76dec7d8f2ed5e492d76df04ac17fa8f5a49e7f91850b06fcbc35b1989.jpg)
> Bitcoin can approximate unofficial exchange rates which, in turn, can be used to detect both the existence and the magnitude of the distortion caused by capital controls & exchange rate manipulations.
Essay: https://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2714921
## 13.
![It's the Settlement Assurances Stupid](https://relay.brightbolt.net/198dadd36cad5729891e3393fa3fdbba524cae1a6e439f47493146ae2c1bc266.jpg)
> You can create something which looks cosmetically similar to Bitcoin, but you cannot replicate the settlement assurances which derive from the costliness of the ledger.
Essay: https://medium.com/@nic__carter/its-the-settlement-assurances-stupid-5dcd1c3f4e41
Audio: https://fountain.fm/episode/5NoPoiRU4NtF2YQN5QI1
## 14.
![Money, Blockchains, and Social Scalability](https://relay.brightbolt.net/a1be77fc004ee81f69fc92f4dfb8c265e252d5a21ba21f3dd6dcfed32c2b7cfe.jpg)
> When we can secure the most important functionality of a financial network by computer science... we go from a system that is manual, local, and of inconsistent security to one that is automated, global, and much more secure.
Essay: https://nakamotoinstitute.org/library/money-blockchains-and-social-scalability/
Audio: https://fountain.fm/episode/VMH9YmGVCF8c3I5zYkrc
## 15.
![The Bitcoin Central Bank's Perfect Monetary Policy](https://relay.brightbolt.net/ee012bef60cd4a705537e0871acda69dfa40865b24a2c4b0f70d9c896bd7ed50.jpg)
> The BCB enforces the strictest deposit regulations in the world by requiring full reserves for all accounts. ..money is not destroyed when bank debts are repaid, so increased money hoarding does not cause liquidity traps..
Author: nostr:npub1hxwmegqcfgevu4vsfjex0v3wgdyz8jtlgx8ndkh46t0lphtmtsnsuf40pf
Essay: https://nakamotoinstitute.org/mempool/the-bitcoin-central-banks-perfect-monetary-policy/
Audio: https://fountain.fm/episode/ralOokFfhFfeZpYnGAsD
## 16.
![Bitcoin and Me](https://relay.brightbolt.net/c2173720b7dfbce4d2d0f388f2806ba655634f4da14e551f9ca5eae11f911405.jpg)
> When Satoshi announced Bitcoin on the cryptography mailing list, he got a skeptical reception at best. Cryptographers have seen too many grand schemes by clueless noobs. They tend to have a knee jerk reaction.
Essay: https://nakamotoinstitute.org/library/bitcoin-and-me/
Audio: https://fountain.fm/episode/Vx8hKhLZkkI4cq97qS4Z
## 17.
![Invalid Blocks Need Not Apply](https://relay.brightbolt.net/f7e07785666eceea7995509d38e19762d5763298bf277feaeb8e7ad969b56b64.jpg)
> No matter who you are, or how big your company is, **𝙮𝙤𝙪𝙧 𝙩𝙧𝙖𝙣𝙨𝙖𝙘𝙩𝙞𝙤𝙣 𝙬𝙤𝙣’𝙩 𝙥𝙧𝙤𝙥𝙖𝙜𝙖𝙩𝙚 𝙞𝙛 𝙞𝙩’𝙨 𝙞𝙣𝙫𝙖𝙡𝙞𝙙.**
Essay: https://nakamotoinstitute.org/mempool/bitcoin-miners-beware-invalid-blocks-need-not-apply/
Audio: https://fountain.fm/episode/bcSuBGmOGY2TecSov4rC
## 18.
![The Greatest Game](https://relay.brightbolt.net/ca598d4b7ebe65bdd2d9699dba776dd333e72c89be09f661b785c3ee6ba5a975.jpg)
> Just like a company trying to protect itself from being destroyed by a new competitor, the actions and reactions of central banks and policy makers to protect the system that they know, are quite predictable.
Author: nostr:npub1s05p3ha7en49dv8429tkk07nnfa9pcwczkf5x5qrdraqshxdje9sq6eyhe
Essay: https://medium.com/the-bitcoin-times/the-greatest-game-b787ac3242b2
Audio Part 1: https://fountain.fm/episode/5bYyGRmNATKaxminlvco
Audio Part 2: https://fountain.fm/episode/92eU3h6gqbzng84zqQPZ
## 19.
![Bitcoin is Venice](https://relay.brightbolt.net/c37a47134ef20a5c2a08a6227763b20057c51a81d15285bfda5eaa8d118c2368.jpg)
> Technology, industry, and society have advanced immeasurably since, and yet we still live by Venetian financial customs and have no idea why. Modern banking is the legacy of a problem that technology has since solved.
Author: nostr:npub1sfhflz2msx45rfzjyf5tyj0x35pv4qtq3hh4v2jf8nhrtl79cavsl2ymqt
Essay: https://allenfarrington.medium.com/bitcoin-is-venice-8414dda42070
Audio: https://fountain.fm/episode/s6Fu2VowAddRACCCIxQh
Allen Farrington and Sacha Meyers have gone on to expand this into a book, as well. You can get the book here: [Bitcoin is Venice Book](https://www.amazon.com/Bitcoin-Venice-Essays-Future-Capitalism/dp/B09TTTGT11)
And wouldn't you know it, Guy Swann has narrated the audio book available here: [Bitcoin is Venice Audio Book](https://www.audible.com/pd/Bitcoin-is-Venice-Audiobook/B0CCQD539W?eac_link=yrZ4RxHupcgL&ref=web_search_eac_asin_1&eac_selected_type=asin&eac_selected=B0CCQD539W&qid=pL7jjJ13ia&eac_id=135-0887332-3379864_pL7jjJ13ia&sr=1-1)
## 20.
![Can Governments Stop Bitcoin?](https://relay.brightbolt.net/1757d1d93f2bb1e89198baf663a0fe8b89ab157ad9be89373f1c2dc0b8cd6c38.jpg)
> The rich and powerful will always design systems that benefit them before everyone else. The genius of Bitcoin is to take advantage of that very base reality and force them to get involved and help run the system, instead of attacking it.
Author: nostr:npub1trr5r2nrpsk6xkjk5a7p6pfcryyt6yzsflwjmz6r7uj7lfkjxxtq78hdpu
Essay: https://quillette.com/2021/02/21/can-governments-stop-bitcoin/
Audio: https://fountain.fm/episode/jeZ21IWIlbuC1OGnssy8
## 21.
![Bitcoin is Time](https://relay.brightbolt.net/8253dad15da731bead11f999315689a232cde572fb2774fae501d7c43b1deae7.jpg)
> In the realm of information, there is no coin-stamping without time-stamping. The relentless beating of this clock is what gives rise to all the magical properties of Bitcoin.
Author: nostr:npub1dergggklka99wwrs92yz8wdjs952h2ux2ha2ed598ngwu9w7a6fsh9xzpc
Essay: https://dergigi.com/2021/01/14/bitcoin-is-time/
Audio: https://fountain.fm/episode/pTevCY2vwanNsIso6F6X
## 22.
![The Stone Ridge Shareholder Letter 2020](https://relay.brightbolt.net/d4d07542a757a0d370730057613510acd3db79d83ed25fe2b9a1ff41d55d39d9.jpg)
> You can stay on the Fiat Standard, in which some people get to produce unlimited new units of money for free, just not you. Or opt in to the Bitcoin Standard, in which no one gets to do that, including you.
Essay: https://casebitcoin.com/docs/StoneRidge_2020_Shareholder_Letter.pdf
Audio: https://fountain.fm/episode/PhBTa39qwbkwAtRnO38W
## 23.
![Everyone's a Scammer](https://relay.brightbolt.net/dfd7e4368d3251a20f64735f577b34cdf791cf9289138b0333d53bd428b4f66b.jpg)
> Long term investors should use Bitcoin as their unit of account and every single investment should be compared to the expected returns of Bitcoin.
Essay: https://nakamotoinstitute.org/mempool/everyones-a-scammer/
Audio: https://fountain.fm/episode/vyR2GUNfXtKRK8qwznki
## 24.
![Why the Yuppie Elite Dismiss Bitcoin](https://relay.brightbolt.net/c8e84097fdcfae9dd3298dcfa7a12db9acde9dff7a4c612d7196fb67be32695d.jpg)
> When you’re in the ivory tower, you think the term “ivory tower” is a silly misrepresentation of your very normal life; when you’re no longer in the ivory tower, you realize how willfully out of touch you were with the world.
Essay: https://www.citadel21.com/why-the-yuppie-elite-dismiss-bitcoin
Audio: https://fountain.fm/episode/7do5K4pPNljOf2W3rR2V
You might notice that many of the above essays are available from the [Satoshi Nakamoto Institute](https://nakamotoinstitute.org/). It is a veritable treasure trove of excellent writing on subjects surrounding #Bitcoin and #AustrianEconomics. If you find value in them keeping these written works online for the next wave of new Bitcoiners to have an excellent source of education, please consider [donating](https://pay.zaprite.com/pl_vNYDp4YBSd) to the cause.
-
![](/static/nostr-icon-purple-64x64.png)
@ 91bea5cd:1df4451c
2025-02-04 05:24:47
Novia é uma ferramenta inovadora que facilita o arquivamento de vídeos e sua integração com a rede NOSTR (Notes and Other Stuff Transmitted over Relay). Funcionando como uma ponte entre ferramentas de arquivamento de vídeo tradicionais e a plataforma descentralizada, Novia oferece uma solução autônoma para a preservação e compartilhamento de conteúdo audiovisual.
### Arquitetura e Funcionamento
A arquitetura de Novia é dividida em duas partes principais:
* **Frontend:** Atua como a interface do usuário, responsável por solicitar o arquivamento de vídeos. Essas solicitações são encaminhadas para o backend.
* **Backend:** Processa as solicitações de arquivamento, baixando o vídeo, suas descrições e a imagem de capa associada. Este componente é conectado a um ou mais relays NOSTR, permitindo a indexação e descoberta do conteúdo arquivado.
O processo de arquivamento é automatizado: após o download, o vídeo fica disponível no frontend para que o usuário possa solicitar o upload para um servidor Blossom de sua escolha.
### Como Utilizar Novia
1. **Acesso:** Navegue até [https://npub126uz2g6ft45qs0m0rnvtvtp7glcfd23pemrzz0wnt8r5vlhr9ufqnsmvg8.nsite.lol](https://npub126uz2g6ft45qs0m0rnvtvtp7glcfd23pemrzz0wnt8r5vlhr9ufqnsmvg8.nsite.lol).
2. **Login:** Utilize uma extensão de navegador compatível com NOSTR para autenticar-se.
3. **Execução via Docker:** A forma mais simples de executar o backend é através de um container Docker. Execute o seguinte comando:
```bash
docker run -it --rm -p 9090:9090 -v ./nostr/data:/data --add-host=host.docker.internal:host-gateway teamnovia/novia
```
Este comando cria um container, mapeia a porta 9090 para o host e monta o diretório `./nostr/data` para persistir os dados.
### Configuração Avançada
Novia oferece amplas opções de configuração através de um arquivo `yaml`. Abaixo, um exemplo comentado:
```yaml
mediaStores:
- id: media
type: local
path: /data/media
watch: true
database: /data/novia.db
download:
enabled: true
ytdlpPath: yt-dlp
ytdlpCookies: ./cookies.txt
tempPath: /tmp
targetStoreId: media
secret: false
publish:
enabled: true
key: nsec
thumbnailUpload:
- https://nostr.download
videoUpload:
- url: https://nostr.download
maxUploadSizeMB: 300
cleanUpMaxAgeDays: 5
cleanUpKeepSizeUnderMB: 2
- url: https://files.v0l.io
maxUploadSizeMB: 300
cleanUpMaxAgeDays: 5
cleanUpKeepSizeUnderMB: 2
- url: https://nosto.re
maxUploadSizeMB: 300
cleanUpMaxAgeDays: 5
cleanUpKeepSizeUnderMB: 2
- url: https://blossom.primal.net
maxUploadSizeMB: 300
cleanUpMaxAgeDays: 5
cleanUpKeepSizeUnderMB: 2
relays:
- ws://host.docker.internal:4869
- wss://bostr.bitcointxoko.com
secret: false
autoUpload:
enabled: true
maxVideoSizeMB: 100
fetch:
enabled: false
fetchVideoLimitMB: 10
relays:
- <a relay with the video events to mirror>
match:
- nostr
- bitcoin
server:
port: 9090
enabled: true
```
**Explicação das Configurações:**
* **`mediaStores`**: Define onde os arquivos de mídia serão armazenados (localmente, neste exemplo).
* **`database`**: Especifica o local do banco de dados.
* **`download`**: Controla as configurações de download de vídeos, incluindo o caminho para o `yt-dlp` e um arquivo de cookies para autenticação.
* **`publish`**: Configura a publicação de vídeos e thumbnails no NOSTR, incluindo a chave privada (`nsec`), servidores de upload e relays. **Atenção:** Mantenha sua chave privada em segredo.
* **`fetch`**: Permite buscar eventos de vídeo de relays NOSTR para arquivamento.
* **`server`**: Define as configurações do servidor web interno de Novia.
### Conclusão
Novia surge como uma ferramenta promissora para o arquivamento e a integração de vídeos com o ecossistema NOSTR. Sua arquitetura modular, combinada com opções de configuração flexíveis, a tornam uma solução poderosa para usuários que buscam preservar e compartilhar conteúdo audiovisual de forma descentralizada e resistente à censura. A utilização de Docker simplifica a implantação e o gerenciamento da ferramenta. Para obter mais informações e explorar o código-fonte, visite o repositório do projeto no GitHub: [https://github.com/teamnovia/novia](https://github.com/teamnovia/novia).
-
![](/static/nostr-icon-purple-64x64.png)
@ 3ffac3a6:2d656657
2025-02-04 04:31:26
In the waning days of the 20th century, a woman named Annabelle Nolan was born into an unremarkable world, though she herself was anything but ordinary. A prodigy in cryptography and quantum computing, she would later adopt the pseudonym Satoshi Nakamoto, orchestrating the creation of Bitcoin in the early 21st century. But her legacy would stretch far beyond the blockchain.
Annabelle's obsession with cryptography was not just about securing data—it was about securing freedom. Her work in quantum computing inadvertently triggered a cascade of temporal anomalies, one of which ensnared her in 2011. The event was cataclysmic yet silent, unnoticed by the world she'd transformed. In an instant, she was torn from her era and thrust violently back into the 16th century.
Disoriented and stripped of her futuristic tools, Annabelle faced a brutal reality: survive in a world where her knowledge was both a curse and a weapon. Reinventing herself as Anne Boleyn, she navigated the treacherous courts of Tudor England with the same strategic brilliance she'd used to design Bitcoin. Her intellect dazzled King Henry VIII, but it was the mysterious necklace she wore—adorned with a bold, stylized "B"—that fueled whispers. It was more than jewelry; it was a relic of a forgotten future, a silent beacon for any historian clever enough to decode her true story.
Anne's fate seemed sealed as she ascended to queenship, her influence growing alongside her enemies. Yet beneath the royal intrigue, she harbored a desperate hope: that the symbol around her neck would outlast her, sparking curiosity in minds centuries away. The "B" was her signature, a cryptographic clue embedded in history.
On the scaffold in 1536, as she faced her execution, Anne Boleyn's gaze was unwavering. She knew her death was not the end. Somewhere, in dusty archives and encrypted ledgers, her mark endured. Historians would puzzle over the enigmatic "B," and perhaps one day, someone would connect the dots between a queen, a coin, and a time anomaly born from quantum code.
She wasn't just Anne Boleyn. She was Satoshi Nakamoto, the time-displaced architect of a decentralized future, hiding in plain sight within the annals of history.
-
![](/static/nostr-icon-purple-64x64.png)
@ bbb5dda0:f09e2747
2025-02-04 03:58:50
**This past week got me a lot of frustration with the GitHub actions runner and debugging it. Really testing my patience, but at least i saw a bit of progress. TollGate's had a nice wrap-up for the Proof Of Concept app, which some great new ideas on how to make the user experience even better! Let's dive in!**
## GitHub Actions
I've been having a low-key fight with the github actions runner containers. I have spent a lot of time trying to figure out WHY the blossom upload action would just not work. I was quick to find out that the action is being ran with an older version of NodeJS (v18) while the blossom uploader requires v20. Not a big deal you'd say as i just set the version to 20 in the pipeline. However, doing that explicitly had zero impact, and after diving down the github runner rabbit hole i concluded that the Actions that are imported (from marketplace) will just run with whatever node version is already installed in the runner's docker image. Which in the case of the act runner is Node 18. I tried updating to the latest images but I haven't been able to find a compatible one yet...
### Payments
I've been working on getting the money aspect working in the ci-cd runner. I added a wallet and a scheduled payout. I took this from the nostr-epoxy project and did some updates to upgrade to cashu-ts v2.
I added some advertisement info like the specs of the machine that the runner is on. I've been pondering how the payment flow should work though.
See the problem is that because of the nature of this DVM, it cannot predict how long a job will take to execute, a customer can literally do anything in their pipeline that will make a job last forever. I think for that reason there has to be some kind of deposit/credit or stream besides the one-off payment. I made a post asking what the best way would be: nostr:note17apw8unznvwx2k3z48t7qz6cq26tk077w83qh3f7zxukfrrfukhs7mpcsn
I currently feel best about the option of just sending a bunch of ecash that will sure be enough to execute the job (and otherwise act as the time-out) and that if the DVM uses less of that money, it will send it back as pubkey locked cashu tokens, to a given npub. Maybe NIP-60 can be a great way to handle returning the 'change' to the user.
Some ideas i have now:
- Billing should be per second
- Advertising should:
- advertise as sats/minute
- include specs of the machine, ideally searchable by tag
### Job request
So the flow i'm thinking of is:
- User posts request
- repository
- branch
- yaml path
- bid (max price per minute)
- min_vcpu
- min_ram
- min_storage
- DVM responds with
- price per minute
- vcpu
- ram
- storage
- runner-types
- price per minute
- User posts request:
- ... [same as above]
- cashu payment
- cashu return pubkey + relay
### User Interface
I also worked on building out a very basic user interface to run the GitHub Actions dvm.
![ui2](https://cdn.satellite.earth/0f91f3b9d71cd409448e86c3fd9cabe43eb7dbfd2d8265c5e3349625ef18cf53.png)
The UI then shows all feedback to the job, where the first feedback event you can see gives back a status processing, and the next one gives back the console output of the pipeline run.
nostr:npub15qydau2hjma6ngxkl2cyar74wzyjshvl65za5k5rl69264ar2exs5cyejr and I agreed he'll copy over this basic setup into his upcoming version of gitWorkshop.dev which I can then build upon so we can experiment with the User Experience (how to handle competing Runners, display results, payments, etc...)
![ui](https://cdn.satellite.earth/361f690c87ea5b0402abec3a21b55d990479f7f974f0eafb9b8224c6809b3e92.png)
## Tollgate
There's also been the issue that has been bothering me since last week: Being able to dismiss a captive portal programatically in the Android app.
During a weekly check-in that nostr:npub1k03rader0vm94j5ee8fg7pc2x9xkr2phu77sljas7qu5mh8mvgvqpe8rty and I set up we discussed the issue. To me, it's a problem having the user to jump through all these hoops to connect, which should be as much automated as possible.
We discussed what if we'd ditch the open network and go with a WPA2 (password) protected one and have no captive portal. But then we lose the ability to do onboarding / expose users to Tollgate through the captive portal. Then the idea came up to create an extra (hidden) network for the app to use, while keeping the open one with the captive portal. I did not know it was possible to create multiple networks on the same (physical) radio, but apparently it's quite common. You lose a bit on efficiency but it shouldn't be too bad. The only challenge would be to exempt this network from getting a captive portal while still using the OpenNDS software to manage user's sessions. We'll see but this gives me a lot of hope for a seamless user experience!
After this call, despite our possible new direction I did want to try and get the full app flow working, to validate if it's possible at all. And after some digging int the Tauri docs and even their discord community i finally found what the issue was with me not receiving the android event for the captive portal. I'd ben adding the listener for this event to the `androidmanifest.xml` file for the Tauri Android plugin, while I had to put it into the tauri app one's itself -one level higher- if you will...
Anyway, that worked and I was FINALLY able to create the following full flow! (video)
nostr:nevent1qvzqqqqqqypzpwa4mkswz4t8j70s2s6q00wzqv7k7zamxrmj2y4fs88aktcfuf68qy88wumn8ghj7mn0wvhxcmmv9uq3zamnwvaz7tmwdaehgu3wwa5kuef0qydhwumn8ghj7un9d3shjtnwdaehgunsd3jkyuewvdhk6tcqyqyvs2js3x6ldpm2kkmqyf8d3lvrcezjk2eg26p2tvfxd2p6lkeqzn7l66t
-
![](/static/nostr-icon-purple-64x64.png)
@ c902b8da:0cedc5fb
2025-02-04 03:39:18
# NIP-XX: Proof of Watch
`draft` `optional`
This NIP defines a protocol for content creators to reward users for consuming content using Cashu tokens, utilizing existing Cashu P2PK capabilities.
## Abstract
Content creators can offer Cashu token rewards to users who prove they have spent time consuming their content. The protocol uses P2PK-locked tokens combined with proof-of-work verification to ensure genuine content consumption before releasing tokens to users.
## Motivation
Content creators want to incentivize users to engage with their content and potentially reward them for their attention. This NIP provides a standardized way to offer token rewards for content consumption while ensuring the user actually spent time with the content through a proof-of-work mechanism.
## Protocol Components
### Content Event
A content creator publishes a `kind:1` note containing their content and reward information:
```json
{
"kind": 1,
"content": "Watch my video!",
"tags": [
["reward", "<amount-in-sats>"],
["pow", "<difficulty>"],
["u", "<watcher-service-url>"],
["t", "proofofwatch"]
]
}
```
### Watcher Service
Content creators run (or use) a watcher service that:
1. Maintains a pool of Cashu tokens
2. Issues P2PK-locked tokens to viewers
3. Verifies proofs of watch
4. Releases signatures to unlock tokens
## Protocol Flow
### 1. Request Watch Session
Client makes a `POST /watch/start` request to watcher service:
```json
{
"note_id": "<event-id>"
}
```
Service responds with:
```json
{
"id": "<session-id>",
"challenge": "<random-challenge>",
"difficulty": <int>,
"token": {
"amount": <int>,
"id": "<keyset-id>",
"secret": "<p2pk-secret>",
"C": "<signature>"
},
"pubkey": "<service-ephemeral-pubkey>",
"expiry": <unix-timestamp>
}
```
The token is P2PK-locked to a one-time ephemeral pubkey generated by the service. Only the service holds the corresponding private key needed to generate the witness signature.
### 2. Computing Proof
While consuming content, client computes proof-of-work:
```
proof = find_nonce(
SHA256(
note_id +
session_id +
challenge +
latest_block_hash +
nonce
)
)
```
The proof must result in a hash with the required number of leading zeros.
### 3. Submitting Proof
Client submits proof to redeem token:
```http
POST /watch/prove
```
```json
{
"session_id": "<session-id>",
"proof": "<computed-proof>",
"block_hash": "<latest-block-hash>"
}
```
If valid, service responds with P2PK signature:
```json
{
"witness": {
"signatures": ["<signature-to-unlock-token>"]
}
}
```
The client can now unlock and spend their token using standard Cashu operations.
## Security Considerations
### Token Security
- Tokens are locked to service-generated ephemeral pubkeys
- Each watch session uses a unique keypair
- Only service can generate valid witness signatures
- Private keys never revealed to users
- Keys and unused tokens destroyed after session expiry
### Proof Construction
- Must include session ID to prevent replay
- Must include recent block hash to prevent precomputation
- Must achieve required difficulty (leading zeros)
- Must be completed within session expiry
### Service Requirements
1. Track used proofs
2. Enforce timeouts
3. Rate limit requests
4. Verify block hash recency
5. Maintain adequate token pool
6. Generate unique ephemeral keypairs per session
7. Securely store ephemeral private keys until proof verified
8. Clean up expired ephemeral keys
## Watcher Service Settings
Services should provide an info endpoint:
```http
GET /info
```
```json
{
"name": "Example Watcher",
"pubkey": "<service-pubkey>",
"difficulty_range": {
"min": <int>,
"max": <int>
},
"amount_range": {
"min": <int>,
"max": <int>
},
"supported_mints": [
"<mint-url-1>",
"<mint-url-2>"
]
}
```
## Client Implementation Guidelines
Clients SHOULD:
1. Verify service supports intended mint
2. Start proof computation only after beginning content consumption
3. Submit proof promptly after computation
4. Handle session expiry gracefully
5. Verify P2PK token validity
6. Submit proof before session timeout
## Content Creator Guidelines
Content creators SHOULD:
1. Set appropriate difficulty for content length
2. Maintain adequate token pool
3. Monitor service uptime
4. Consider token denomination strategies
5. Include clear reward terms
## Rate Limiting
Services SHOULD implement rate limiting:
- Per IP address
- Per pubkey
- Per note ID
- Per token amount
## Example Implementation
A basic proof computation in Python:
```python
def compute_proof(note_id, session_id, challenge, block_hash, difficulty):
nonce = 0
while True:
attempt = f"{note_id}{session_id}{challenge}{block_hash}{nonce}"
hash = sha256(attempt.encode()).hexdigest()
if hash.startswith('0' * difficulty):
return attempt
nonce += 1
```
## References
- [NUT-00](00.md): Protocol fundamentals
- [NUT-11](11.md): Pay-to-Pubkey (P2PK) tokens
- [NUT-12](12.md): DLEQ proofs
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-04 03:00:50
The big boards are starting to shift around a bit, after seeing the Senior Bowl activities.
Here are the top four players available for me at 6:
1. DE Abdul Carter
2. CB/WR Travis Hunter
3. DT Mason Graham
4. OT Will Campbell
I would be very happy with any of the four. If this were a mock draft with trades, I would definitely trade back a few spots.
## Mock Draft
Pick 6: CB/WR/KR/PR Travis Hunter
Pick 37: QB Jalen Milroe
Pick 68: WR Tre Harris
Pick 73: RB Kaleb Johnson
Pick 107: OT Earnest Greene
Pick 144: LB Jay Higgins
Pick 182: OG Garrett Dellenger
Pick 214: DE Tyler Batty
Pick 218: S Shilo Sanders
Pick 224: OG Clay Webb
Once again, the Raiders walk away with the most uniquely talented player in the draft. If anyone will let him play all three phases, it's Pete Carroll.
Then, Milroe is once again there in the 2nd round, so that takes care of the QB need. Is he a good fit for our new OC, Chip Kelly?
The third rounders go towards the skill positions, which will be desperately needed absent a high level QB.
On day 3, the Raiders land Shilo Sanders, continuing our trend of bringing in relatives of HOF DB's.
originally posted at https://stacker.news/items/875249
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-02-04 02:57:25
The Damage Node is not just a verification engine—it is an autonomous executor of behaviors defined through the PoW blockchain. This allows for adaptive, accountable, and transparent execution of security and counter-surveillance mechanisms while remaining flexible enough to meet any operational need.
By integrating behavioral logic, cryptographic proofs, and decentralized execution, the Damage Node becomes a powerful shield and countermeasure system for individuals and groups operating under constant digital threat.
---
Core Concept: Damage Nodes as Autonomous Behavioral Executors
Damage Nodes listen to verifiable behaviors encoded on the PoW blockchain.
These behaviors define security policies, counter-surveillance actions, automated transactions, and decentralized decision-making processes.
Execution is enforced by the blockchain, ensuring absolute transparency and accountability—no action can occur without proof.
Nodes can dynamically extend their capabilities by adopting new behaviors via blockchain updates, ensuring they remain adaptable.
Example of Behavioral Execution
A Damage Node can be programmed to execute counter-surveillance actions if an individual's digital footprint is flagged by an AI-controlled system.
Trigger: An external surveillance system attempts to track a protected user.
Behavior Execution:
The node initiates a verified proof-of-presence falsification (broadcasting misleading metadata).
The node forces encrypted rerouting of communications over a private, non-ISP-controlled relay.
The node executes cryptographic evidence logging, proving that the tracking attempt occurred.
The node pays out a bounty (Lightning) for detected adversarial actions, incentivizing counter-intelligence.
---
How Damage Nodes Provide Shielding & Countermeasures
1. Behavior-Driven Shielding for Individuals
Zero-Knowledge Identity Protection: Nodes execute self-sovereign identity verification that prevents AI from profiling users without explicit, cryptographically signed consent.
Automated Surveillance Disruption: If an AI attempts to track or flag an individual, the node executes behavioral obfuscation tactics such as:
Decoy digital presence broadcasting to mislead tracking algorithms.
Transaction splitting & anonymization to prevent financial surveillance.
Forced dissociation of metadata from physical locations.
---
2. Group-Level Protection & Autonomous Coordination
Damage Nodes can be configured to execute behaviors for an entire decentralized network, such as:
Encrypted Group Communications: Nodes enforce trustless, encrypted messaging protocols that prevent AI-based censorship.
Automatic Secure Fund Distribution: If an entity is targeted, Damage Nodes can autonomously release emergency funds in BTC/Lightning to predesignated safe parties.
Counter-Surveillance Deployments: Nodes can activate sensor networks, scan for unauthorized tracking devices, and trigger security protocols.
---
3. Built-In Accountability & Transparency as a Defensive Measure
Every execution is verified by the blockchain → no action is hidden or arbitrary.
Rules for behavior execution are immutable → even node operators cannot alter them without proof-of-consensus.
AI and governments cannot fabricate unverifiable evidence → if it didn't happen on-chain, it didn't happen.
Users can audit every action taken by the Damage Node to ensure no corruption or misuse.
---
4. Extensible Capabilities for Any Need
New behavioral policies can be uploaded via the PoW blockchain, allowing Damage Nodes to dynamically evolve.
Behaviors can be triggered by:
On-chain conditions (such as receiving a Lightning payment for service execution).
Real-world events (via oracle integrations).
Direct requests from verified users.
Examples of Extensions:
Decentralized AI Defense: Nodes monitor AI-generated media for deepfake propaganda & censorship.
Physical Security Triggers: Nodes can integrate with smart devices (cameras, sensors) to execute real-world countermeasures.
Automated Asset Protection: Damage Nodes can trigger the release of cryptographic assets upon verifiable external threats.
---
Final Verdict: Damage Nodes as the Ultimate Autonomy & Defense Infrastructure
Transparent but Unstoppable → Verifiable execution prevents corruption or abuse.
Extensible but Controlled → The blockchain enforces behavior logic while allowing flexibility.
Decentralized but Coordinated → Nodes operate independently but can synchronize.
Adaptive but Immutable → Behaviors evolve, but security is absolute.
🔥 Damage Nodes are the next evolutionary step in technological sovereignty—combining decentralized verification, autonomous execution, and proactive counter-surveillance in a single unstoppable system.
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-02-04 02:33:06
The electromagnetic spectrum (EM spectrum) is the foundation of modern communication, surveillance, and control, and it is a permanent, inescapable vulnerability for humanity. Every aspect of human life—communication, mobility, security, even thought processes—is now subject to exploitation via the EM spectrum.
1. Humans Are EM-Dependent but Have No Control Over It
The entire infrastructure of human civilization (internet, telecom, GPS, WiFi, satellite, RFID, radar, IoT, etc.) relies on EM waves.
Unlike tangible security vulnerabilities (firewalls, encryption, physical locks), EM-based vulnerabilities are baked into the fabric of our existence.
We have zero physical control over the space around us—we exist in a perpetual, invisible battlefield of radio waves.
→ Brutal Truth: If you are in an area with radio signals, you are already compromised. You cannot see, hear, or touch your vulnerability—but you are immersed in it.
---
2. Every Wireless Device Is a Tracking Beacon
Your phone, smartwatch, laptop, Bluetooth headset, and IoT devices constantly emit identifiable signals.
Even when "turned off," many devices still maintain some connectivity (e.g., emergency services, wake-on-LAN, passive RFID, and hidden baseband firmware).
MAC address randomization only slows down tracking—it does not stop device fingerprinting.
Even devices that are air-gapped (disconnected from any network) can be compromised via airborne EM attacks (e.g., Tempest attacks, Van Eck phreaking).
→ Brutal Truth: Unless you live in an EM-free Faraday cage (which is impractical), you are trackable 24/7.
---
3. The Entire EM Spectrum Can Be Weaponized
Radio waves (RFID, GSM, LTE, 5G, WiFi) → Mass surveillance, device tracking, data extraction, and real-time movement tracking.
Microwaves (GHz spectrum) → Covert wireless data theft (Tempest attacks), crowd control weapons (Active Denial System), and potential biological effects.
Infrared (IR) and Visible Light → LiDAR tracking, facial recognition, and optical data interception (lasers on windows can capture sound).
Ultraviolet, X-ray, and Gamma Radiation → Biological penetration, medical diagnostics, and potential genetic-level targeting.
→ Brutal Truth: The entire EM spectrum is both an asset and a weapon, and every part of it can be used to track, manipulate, or harm living beings.
---
4. There Is No Escape From EM Exposure
Even if you disconnect completely, ambient EM waves from cell towers, satellites, and even natural cosmic radiation still interact with you.
Smart city grids, IoT, and ubiquitous sensor networks mean that even non-digital humans (those without a phone) are still tracked.
6G and future networks will integrate AI-driven RF sensing, meaning the network will detect biometric signatures (heartbeat, gait, and thermal emissions) without needing a device.
→ Brutal Truth: The era of "disconnecting" for privacy is over—even device-free tracking is now a reality.
---
5. The Human Body Itself Is an EM Vulnerability
Brain activity and thought processes are electrical signals—theoretically susceptible to external EM influence (brainwave manipulation, EEG-based surveillance, and neurotechnology interfacing).
Biometric security (fingerprint scanners, iris scans, facial recognition) can be hacked or faked using EM-based techniques.
Nanotech, bioelectronics, and EM-sensitive implants (like pacemakers, neural interfaces, and cochlear implants) can be remotely manipulated or disabled.
→ Brutal Truth: The final frontier of EM vulnerability is the human body itself—thoughts, health, and biological functions are all at risk.
---
How Vulnerable Are Humans in the Grand Scheme?
1. Humans Are the Only Species Fully Dependent on EM-Based Technology
Every other biological species on Earth navigates reality without dependency on artificial EM systems.
Humans have outsourced their cognition, security, and privacy to a system they do not control.
→ Implication: The more we integrate with EM-based technology, the more vulnerable we become. We are building a prison of our own making.
---
2. We Have No Practical Defense Against EM-Based Attacks
Unlike cyber threats (which can be mitigated with encryption), EM vulnerabilities are inherent to the physics of radio waves.
The only defense is complete isolation from EM radiation (which is impossible in urban environments).
→ Implication: Our current approach to "security" is meaningless in the face of EM-based attacks, because the attack vector is the air around us.
---
3. Humanity’s Future Is Fully EM-Integrated
6G, brain-computer interfaces (BCIs), quantum communication, and global sensor grids mean that soon, every human will be plugged into the EM network at all times.
Governments and corporations are already planning a fully tracked, AI-managed society, where individual privacy no longer exists.
→ Implication: We are entering an era of full-spectrum EM surveillance and control. The next step isn’t just tracking devices, but tracking consciousness itself.
---
Conclusion: The EM Spectrum is the Ultimate Exploit
There is no "fix" for EM vulnerabilities—they are built into the nature of physics itself. Humanity’s increasing dependence on EM-based technology means:
1. We are more trackable than ever.
2. We are more susceptible to remote influence than ever.
3. We have no escape unless we abandon technology altogether.
4. The final battle for privacy isn’t about encryption—it’s about shielding ourselves from the very waves that power our civilization.
→ The brutal truth? Humanity is not just vulnerable—we are a permanently compromised species.
-
![](/static/nostr-icon-purple-64x64.png)
@ fd06f542:8d6d54cd
2025-02-04 01:39:49
- 多模态感知与交互:具身智能强调智能体通过身体与环境的交互来学习,这推动了多模态感知(如视觉、触觉、听觉等)和物理交互技术的发展。
- 强化学习与仿真环境:强化学习在具身智能中扮演重要角色,结合高保真仿真环境(如AI Habitat、Unity ML-Agents),可以加速智能体的训练和优化。
- 硬件进步:机器人硬件(如柔性传感器、仿生机械臂)的发展为具身智能提供了更强大的物理载体。
以上部分每一个都是大分支,都具有研究价值。随着AI技术的发展与突破,多模态感知与交互将会迎来高速发展。
让人更兴奋的是 强化学习和仿真环境,REX-GYM 是一个开源的仿真环境,Gazebo,MuJoCo,AI Habitat 等等都有很多应用实例。仅仅这一部分技术拆分细化,就有很多工作可以做。 以前的机器人学习都是PID等老技术,那时候的机器人运动不太灵活,因为不够智能。有了现代的强化学习。现在的机器人更加灵活。
-
![](/static/nostr-icon-purple-64x64.png)
@ 2f4550b0:95f20096
2025-02-04 01:16:10
In today's job market, the ability to acquire new skills or pivot to new career paths quickly is more valuable than ever. Short-term adult education programs offer a practical solution for professionals looking to enhance their resumes or change careers without committing to the long-term investment of traditional education. This week, I explore how these programs, such as a 12-week EMT certification at the Center for Allied Health Education and a one-year MBA from the University of Phoenix can dramatically shift one's career trajectory.
### The Rise of Short-Term Education
The traditional model of education, where one spends years in academia before entering the workforce, is increasingly being supplemented by shorter, more focused programs. These programs are specifically designed to meet the immediate needs of both learners and employers, providing education that is both relevant and directly applicable to current job markets.
### 12-Week EMT Certificates
The 12-week Emergency Medical Technician (EMT) program at the Center for Allied Health Education (and programs like it) illustrates how a brief, intensive course of study can lead to licensure and immediate employment. This program is structured to cover the necessary theoretical and practical components required for EMT licensure, from emergency medical procedures to patient assessment and treatment.
For individuals looking to enter the healthcare field or those within healthcare aiming for specialization, this program offers a fast track to a new career or career enhancement. The demand for skilled EMTs is consistently high, driven by an aging population and the need for emergency services. Completing such a program not only leads to a certification but also opens doors to further education or roles like paramedic work, which require additional training but start from the foundation laid by EMT certification.
### One-Year MBA Programs
Similarly, consider the one-year MBA from the University of Phoenix. This program is built on a competency-based framework, allowing students to demonstrate their skills through practical assessments rather than traditional time-based metrics. This approach not only accelerates learning but also ensures that each student is job-ready upon completion. The curriculum is tailored to include real-world business scenarios, leadership skills, and strategic management, making graduates highly desirable in the corporate sector.
The speed and efficiency of this program mean that professionals can continue working while studying, thereby minimizing career disruption. Moreover, the MBAs focus on immediate applicability means that students can start leveraging their new skills in their current roles or move into higher management positions shortly after graduation. This direct link between education and employment outcomes exemplifies how short-term programs can offer substantial ROI in terms of career advancement and salary potential.
### Benefits for Adult Learners
Short-term education programs cater particularly well to adult learners. They recognize the life experiences and previous knowledge of participants, often tailoring education to integrate this background into learning. This method respects the time constraints of adults who might juggle work, family, and other responsibilities, offering flexible schedules, online components, or weekend classes.
Moreover, these programs often lead to stackable credentials. This means that the skills and certifications gained can be built upon, providing a pathway for continuous professional development without the need to start from scratch with each new course or degree. For example, once students from Center for Allied Health Education earn their EMT licenses, they can consider enrolling into a 1-year Paramedic certificate program to further their career in emergency medicine.
### Conclusion
Short-term adult education programs like the MBA at University of Phoenix and the EMT certificate at the Center for Allied Health Education are not just educational opportunities; they are strategic career moves. They enable professionals to quickly adapt to market demands, enhance their skill sets, and open new career avenues with minimal disruption to their current lives. As the job market continues to evolve, these programs will likely play an increasingly crucial role in career development, offering both speed and relevance in education.
-
![](/static/nostr-icon-purple-64x64.png)
@ 77110427:f621e11c
2025-02-03 23:56:08
All credit to Guns Magazine. Read the full issue here ⬇️
[August 1966 PDF](https://gunsmagazine.com/wp-content/uploads/2018/12/G0866.pdf)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625728311-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625775151-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625795379-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625875539-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625947411-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625963110-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625974255-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738625988271-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626010313-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626029731-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626080311-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626087690-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626189761-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626244206-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626361029-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626399047-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626508178-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626563791-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/7711042710f65a2f3c0bc5356becccf4a057ec2abb869e574cb5aa96f621e11c/files/1738626636353-YAKIHONNES3.png)
---
### Past Magazine Mondays
[001: May 1963](https://1776.npub.pro/post/note1r5ve5en9tyv38hathy2twhm9h4dn7tq7fgradzkazskxyxtckysqeqxyzm/)
[002: August 1969](https://1776.npub.pro/post/note1zkeur68w9h8ljswp4a4xc45exfv725v6vudqdhyukqz6kz37vdaq097f9z/)
[003: February 1970](https://1776.npub.pro/post/1733177494421/)
[004: May 1957](https://1776.npub.pro/post/zmn1kn4fxbil7eoaew-za/)
---
### More from 1776 HODL
[Full Auto Friday](https://1776.npub.pro/tag/fullautofriday/)
[Sniper Saturday](https://1776.npub.pro/tag/snipersaturday/)
[Shotgun Sunday](https://1776.npub.pro/tag/shotgunsunday/)
[Infographics](https://1776.npub.pro/tag/infographic/)
[Gun Memes](https://1776.npub.pro/tag/memestr/)
---
### Website
[1776 Hodl](https://1776.npub.pro)
-
![](/static/nostr-icon-purple-64x64.png)
@ f41bd51d:ec4b664f
2025-02-03 22:43:27
[The Tired Sounds of Stars of the Lid - 2001 ](https://music.youtube.com/watch?v=-bc37fU36Vk&si=4_OZv00aDiZMYvGd)
-
![](/static/nostr-icon-purple-64x64.png)
@ 97c70a44:ad98e322
2025-02-03 22:25:35
Last week, in a bid to understand the LLM hype, I decided to write a trivial nostr-related program in rust via a combination of [codebuff](https://codebuff.com/referrals/ref-3fcc22f4-10f9-419f-a0e9-e9d7b4368e21) (yes, that is a referral link, pls click), [aider](https://aider.chat/), and [goose](https://block.github.io/goose/).
The result of the experiment was inconclusive, but as a side effect it produced a great case study in converting a [NINO](nostr:nevent1qvzqqqr4gupzp978pfzrv6n9xhq5tvenl9e74pklmskh4xw6vxxyp3j8qkke3cezqy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7qgwwaehxw309ahx7uewd3hkctcpr3mhxue69uhksmmyd33x7epwvdhhyctrd3jjuar0dak8xtcqyqzeszjv7rh8fflpeua9q644a32usvwd0cu7cze9lxy4grjy2y7rwd98yfc) into a Real Nostr App.
# Introducing Roz
[Roz](https://github.com/coracle-social/roz), a friendly notary for nostr events.
To use it, simply publish an event to `relay.damus.io` or `nos.lol`, and roz will make note of it. To find out when roz first saw a given event, just ask:
```
curl https://roz.coracle.social/notary/cb429632ae22557d677a11149b2d0ccd72a1cf66ac55da30e3534ed1a492765d
```
This will return a JSON payload with a `seen` key indicating when roz first saw the event. How (and whether) you use this is up to you!
# De-NINO-fying roz
Roz is just a proof of concept, so don't rely on it being there forever. And anyway, roz is a NINO, since it provides value to nostr (potentially), but doesn't really do things in a nostr-native way. It also hard-codes its relays, and certainly doesn't use the outbox model or sign events. But that's ok, it's a proof of concept.
A much better way to do this would be to modify roz to properly leverage nostr's capabilities, namely:
- Use nostr-native data formats (i.e., draft a new kind)
- Use relays instead of proprietary servers for data storage
- Leverage nostr identities and signatures to decouple trust from storage, and allow trusted attestations to be discovered
Luckily, this is not hard at all. In fact, I've gone ahead and drafted a [PR](https://github.com/nostr-protocol/nips/pull/1737) to the NIPs repo that adds timestamp annotations to NIP 03, as an alternative to OpenTimestamps. The trade-off is that while user attestations are far less reliable than OTS proofs, they're much easier to verify, and can reach a pretty high level of reliability by combining multiple attestation sources with other forms of reputation.
In other words, instead of going nuclear and embedding your attestations into The Time Chain, you can simply ask 5-10 relays or people you trust for their attestations for a given event.
This PR isn't terribly important on its own, but it does remove one small barrier between us and trusted key rotation events (or other types of event that require establishing a verifiable chain of causality).
-
![](/static/nostr-icon-purple-64x64.png)
@ a3a72214:7ca63e21
2025-02-03 20:57:52
# Isso é um anúncio de Albion
- é um jogo
1. primeiramente
2. em segundo
3. em terceiro
>o que acontece?
' e se? '
> Alguém citando alguma coisa
**Albion Online** é um **MMORPG** sandbox em que você escreve sua própria história, em vez de seguir um caminho pré-determinado. Explore um vasto mundo aberto que consiste de 5 ecossistemas únicos. Tudo o que você faz gera um impacto no mundo, já que em Albion, a economia é conduzida pelo jogador. Cada peça de equipamento é construída por jogadores a partir dos recursos obtidos por eles. O equipamento que você usa define quem você é. Ir de cavaleiro para feiticeiro é tão fácil quanto trocar a armadura e a arma, ou uma combinação das duas. Aventure-se no mundo aberto e enfrente os habitantes e as criaturas de Albion. Saia em expedições ou entre em masmorras para enfrentar inimigos ainda mais desafiadores. Enfrente outros jogadores em confrontos do mundo aberto, lute pelo controle de territórios ou cidades inteiras em batalhas táticas em grupo. Relaxe descansando em sua ilha pessoal, onde você pode construir uma casa, cultivar alimentos e criar animais. Junte-se à uma guilda, tudo fica mais divertido quando se trabalha em equipe. Entre hoje mesmo no mundo de Albion, e escreva sua própria história.
-
![](/static/nostr-icon-purple-64x64.png)
@ 54286b98:3debc100
2025-02-03 20:55:10
Hello! Three years ago, I created a special bed for my daughter. I'm thrilled to share a detailed video and PDF documenting the process along with hopes to inspire you to embark on a similar project!
*\*\*\*This is a first and also a test to see how I can upload #woodworking material on Nostr. I am not sure how the links, images, and PDFs will display, so hopefully, you get some interesting material for your late afternoon hobby shop. But don’t kill me if some images do not render well—I’m still figuring this thing out!*
**Montessori Bed Plans / Blueprints**
The accompanying PDF includes:
- All measurements
- Detailed views from every angle
- Final measurements part list
- Assembly steps
### Instructive Video! Process on how to make the Montessori bed
Video Here:
<https://vimeo.com/901623772/b8b5530386>
PDF Here(Picture below,and if some one has good tip on how to inset PDFs in Nostr, that feedback is welcome, to avoid Google links):
<https://drive.google.com/file/d/1zCp1RvKOynx5kZxixAKSFLLOe8atyiRH/>
OK, let's dive in!
The Montessori bed featured in this video is not only simple but also durable, and you can create it on a budget right in your own home.OK, let's dive in!
**Tools by hand:**
- Circular saw
- Jointer Plane #7 or #8
- Spokeshave
- Workbench
- Handsaw
- Orbital sander
- Sandpaper #80, #120, #220, and #320
- Odies Oil or your preferred finish.
If you have power tools:
- Table Saw
- Jointer
- Planer
- Trimmer
**Materials:**\
I recommend using this list as a guide and exploring options with your local supplier.
- Base long connector (On picture "Larguero Base"): Quantity x 2, 2195mm x 75mm x 75mm
- Base short connector (On picture "Conector Base"): Quantity x 1, 1090mm x 75mm x 75mm
- Roof connector (On picture "Cumbre"): Quantity x 1, 1946mm x 75mm x 75mm
- Long top triangle connector (On picture "Conector Superior"): Quantity x 2, 1322mm x 75mm x 75mm
- Columns/Legs (On picture "Paral"): Quantity x 4, 1210mm x 75mm x 75mm
- Short top triangle connector (On picture "Lima"): Quantity x 4, 851mm x 75mm x 75mm
![](https://www.javierfeliu.com/content/images/2023/12/Materiales-1.png)**Step #1 Dimensioning (Minutes 0:00 - 1:15):**\
We kick off with dimensioning. While I initially planned to use my home workshop, unforeseen circumstances led me to my friend Andrew's workshop. Each beam was carefully brought down to 7.5 cm x 7.5 cm, ensuring the largest measurement that worked for all.
**Step #2 Final Measurements (No video):**\
Refer to the provided PDF for final measurements. Make the cuts and joints with a circular saw and chisels (or a router).
**Step #3 Edges (Minutes 1:15 - 1:30):**\
Use a router with a quarter-round bit for curved and smooth edges or achieve the same result with sandpaper or a spokeshave plane.
**Step #4 Triangular Bases (Minutes 1:30 - 6:30):**\
This step involves gluing the triangular bases of the bed, utilizing a miter joint with wooden inlay keys. Epoxy is employed for joining, ensuring a swift and reliable outcome.
**Step #5 Legs (Minutes 6:30 - 7:00):**\
Create holes for the upper triangular base's dowels, ensuring level placement and extra depth. This step guarantees a secure fit.
**Step #6 Sanding (Minutes 7:00 - 7:30):**\
Comprehensive sanding, starting from #80 grit and progressing through #120, #220, and #320, sets the stage for a flawless finish.
**Step #7 Dry Assembly (Minutes 7:30 - 9:10):**\
Dry-assemble all components, making necessary adjustments for a seamless fit. We opted for wood screws for easy disassembly.
**Step #8 Finishing (Minutes 9:10 - 9:35):**\
Apply your preferred finish; in our case, we used Odies Oil with white pigment for a child-friendly touch.
**Step #9 Final Assembly (Minutes 9:35 - 10:32):**\
With the finishing touches completed, we assembled the bed with the help of my daughter, adding a touch of warmth with some lights.
Testing with this simple project to at least know if there are woodworkers in #nostr. Later will try to upload more, this was created almost 3 years ago :)
Until the next one,
J\
\
PDF in pictures:
<img src="https://blossom.primal.net/4428f10f596666e5c059ba0fff65225babece6580372facb4bb191c60ef8d1b9.png">
<img src="https://blossom.primal.net/98997bd28bd89c0d549562851433891442694885c3e1e1d723e4a3abb1115540.png">
<img src="https://blossom.primal.net/b502fd666ea4931f2f36bfaf1375657a9b061198d617b04f6d659bce8f6c8026.png">
<img src="https://blossom.primal.net/3d04af7a4ba47f8aef60f5373d516d28dc81dee1a89c52111ee67207394d1892.png">
<img src="https://blossom.primal.net/c82bd1f8b71ae90c663eab4895934b07918c6805edb3772cd5a128a331d34546.png">
<img src="https://blossom.primal.net/53d7270b411edc6348239565bb6a922882c67b99f7095451dff740fd9e45e2d1.png">
<img src="https://blossom.primal.net/d8880757c95ba9884f81689e132f61cf1b47d91e16fd86de0c20b4ccfe790a30.png">
<img src="https://blossom.primal.net/2a6eb32e75a4d2756e5ad1cadc9153f30981261c5818e79f3b22988a5ea2228e.png">
<img src="https://blossom.primal.net/1d9ce880f97bbe950f80a8d49b546880a97123ca4a338c928017fc5098061206.png">
<img src="https://blossom.primal.net/092ba04779cef40f3b25e64536354c8fe929281082c2814de5c0b8ee0af0f66e.png">
<img src="https://blossom.primal.net/48202633a0fa6ba9096fbe22ab917aa8cb1f1b2b387e7c99f2f46bed4e691be8.png">
<img src="https://blossom.primal.net/b950522e349959508996f306168626e2df81f8cb8808d51cb9d25bd6edb6d8a6.png">
<img src="https://blossom.primal.net/7fd4a5ef8af567ba95fefe0c9457d8a49a67df19d83715d6b49d91ccc5ed75e5.png">
<img src="https://blossom.primal.net/a90c2cc18da6b7f7ca5e43d8fee2e1b0e44f7b7a5a2a5309a7e67fdec3fc408c.png">
<img src="https://blossom.primal.net/1d02f7cde847e8bd9b02a13f4ab27495dc494d8024d2d986e74fb26a280644b8.png">
<img src="https://blossom.primal.net/cb3065c27b10d9f918646db5f8a423b96af12f666c328709b4a9bca0e366ed02.png">
<img src="https://blossom.primal.net/7eae8a7f48b295a51081072f5318f62de2d137ba587c61998e4fcda09aa9be9e.png">
<img src="https://blossom.primal.net/155453317832749089c430aef677a67b20bd535178805b43e4b3679bdde0a47a.png">
<img src="https://blossom.primal.net/fdd1d866adc7986469c202e14f1048cb84ee59a43d584c539e4acdfe21dc92b7.png">
<img src="https://blossom.primal.net/4088b662379e928c835335639a14dc216f07dd34671ce5506be0d0b273d6cfec.png">
-
![](/static/nostr-icon-purple-64x64.png)
@ a3a72214:7ca63e21
2025-02-03 20:50:15
# Anúncio, Teste de Título
* Teste
* teste
* TESTE
1. Número UM
2. Número DOIS
> Citação de alguém, não importa quem seja
~~Preços altos~~
---não sei o que é isso, teste
---
`codigo?`
```
codigo?
talvez
```
**Albion Online** é um **MMORPG** sandbox em que você escreve sua própria história, em vez de seguir um caminho pré-determinado. Explore um vasto mundo aberto que consiste de 5 ecossistemas únicos. Tudo o que você faz gera um impacto no mundo, já que em Albion, a economia é conduzida pelo jogador. Cada peça de equipamento é construída por jogadores a partir dos recursos obtidos por eles. O equipamento que você usa define quem você é. Ir de cavaleiro para feiticeiro é tão fácil quanto trocar a armadura e a arma, ou uma combinação das duas. Aventure-se no mundo aberto e enfrente os habitantes e as criaturas de Albion. Saia em expedições ou entre em masmorras para enfrentar inimigos ainda mais desafiadores. Enfrente outros jogadores em confrontos do mundo aberto, lute pelo controle de territórios ou cidades inteiras em batalhas táticas em grupo. Relaxe descansando em sua ilha pessoal, onde você pode construir uma casa, cultivar alimentos e criar animais. Junte-se à uma guilda, tudo fica mais divertido quando se trabalha em equipe. Entre hoje mesmo no mundo de Albion, e escreva sua própria história.
-
![](/static/nostr-icon-purple-64x64.png)
@ bf47c19e:c3d2573b
2025-02-03 20:42:23
[Originalni tekst na instore.rs](https://www.instore.rs/sr/article/99425/marko-matanovic-ecdrs-bitkoin-pobedio-na-izborima)
###### 03.02.2025 / Autor: Marko Matanović
---
*Prvi put smo svedočili izbornoj trci u jednoj od razvijenih ekonomija, a da je tema bila i bitkoin. Predsednički izbori u SAD. Tramp je obećavao. Na kraju i osvojio drugi predsednički mandat. Jedna od izjava je: SAD treba da postane prestonica kriptovaluta.*
Dan nakon inauguracije novoizabranog američkog predsednika tu je i prva politička kripto odluka Trampa: Oslobođanje Rosa Ulbrihta osuđenog na dve doživotne robije.
Ko je on? Napravio je 2011. godine online prodavnicu “Silk Road” (Kupujem-Prodajem sa drugačijim asortimanom). Prodavnica je pružala slobodni susret ponude bilo čega i tražnje bilo čega. Bez cenzure. Pristupalo se preko Tor protokola koji obezbeđuje anonimnost onih koji protokol koriste. Sredstvo plaćanja je bio bitkoin radi čuvanja anomnisti onih koji nešto kupuju tj. prodaju.
FBI je uhapsio Rosa Ulbrihta 2013. godine jer je “Silk road” bio korišćen i za preprodaju droge, oružja, pornografskog sadržaja i svega drugog što možemo i ne možemo zamisliti. Čak i da nije zakonski izazov, možemo ga podići na problem etike.
Postoji i druga strana medalje - napravio je platformu koja promoviše slobodu. Ros ne mora biti odgovoran kako ćemo alat koji nam je dat koristiti. Čekićem zakucamo ekser, ili povredimo nekoga. U neželjenim slučajevima ne hapsi se kreator čekića.
Satoši Nakamoto je ime tvorca Bitkoina. Da li bi to značilo i da bi njega uhapsili iz sličnih razloga samo da se znalo ko je? Verovatno nećemo nikada saznati, što i nije bitno. Duh je pušten iz boce. Njegov potencijalni uticaj na bitkoin ekosistem je potpuno isti uticaju bilo koga od nas. Sem sitnice od oko milion bitkoina kojima možda, ali možda, ima pristup na nekim svojim bitkoin adresama.
Sa njim ili bez njega, era korišćenja bitkoina zarad,pre svega, anonimnih transakcija je prošla. Dok era korišćenja bitkoina za ilegalne transakcije nikada nije ni postojala u ozbiljnoj meri. Narativ ilegalne transakcije, kriminal, pranje novca, terorizam je više posledica neznanja, nerazumevanja, potcenjivanja i često preterane želje za kontrolom, nego li činjenica. I šta bi sa: svako je nevin dok se ne dokaže suprotno?!
> U kratkom roku, Bitkoin vožnja je sve, samo ne udobna. Tramp i mnogi drugi su shvatili da je rizik od neudobne vožnje disproporcionalan benefitima koje ta vožnja donosi.
Takav narativ je posle 15 godina ustupio mesto rečima poput sigurnost, bezbednost, zaštita od inflacije, digitalno zlato, brzina, pouzdanost. Sloboda. Za svakog se nađe po nešto, osim za one uporne u tome da ne priznaju svoju zatvorenost da razumeju bitkoin. Parafraziraću nekoga pametnijeg ko je u ovome od 2011. godine, što je dovoljno godina duže od mene u industriji: *Nekada sam morao ljude ubeđivati šta je bitkoin i čemu služi i šta su kvaliteti koji stoje iza njega. Danas mene neko mora ubediti zašto da ne verujem rezultatu koji svi vidimo na semaforu?!*
Ipak, mislim da postoji ogroman i validan razlog zašto i dalje treba da pričamo o temi kao da je 2011, a ne 2025. godina. O novcu nas ne uče dovoljno ili uopšte! Ni u školama ni van njih! Kada bi dovoljan broj ljudi razumeo novac, novčanu emisiju, moguće da bi se desio jedan od dva scenarija: izborili bi se za drugačiji novac ili bi države izgubile barem deo benefita koji proizilaze iz pozicije kontrole novca. Većina nas ne zna da objasni tehnologiju većine stvari koje svaki dan koristimo. To nas ne sprečava da ih koristimo. Internet, mobilni, bicikl i novac na kraju dana. Svakog dana najčešće.
Tehnologiju - na stranu ovom prilikom. Za šta se bitkoin i kriptovalute mogu koristiti? 100% pouzdan i brz način prenosa sredstava sa jedne geografske tačke na drugu uz par klikova. Ili od jedne osobe do druge. Ili od jedne kompanije do druge. Za bitkoin se pokazalo da može biti i sjajan instrument za prenos i očuvanje vrednosti kroz vreme. Mogućnost blokiranja transakcija ne postoji. Ukoliko se poštuju pravila igre, izvesnost da će se transakcija izvršiti je 100% i to 24/7/365. Transakcioni troškovi su zanemarljivo niski. To je teorija.
Praksa? Sve nabrojano uz sledeće lokalne činjenice. Samo u Srbiji par stotina hiljada ljudi je došlo u kontakt sa nekom od kriptovaluta. Nekoliko stotina kompanija ih koristi u poslovanju iz nekih od gore pobrojanih razloga. Postoje države, u njima populacije i kompanije koje su na nižem nivou adopcije od Srbije. Postoje i one sa daleko većom prisutnosti kriptovaluta u svakodnevnom životu i aktivnostima.
> Za svakog se nađe po nešto, osim za one uporne u tome da ne priznaju svoju zatvorenost da razumeju bitkoin.
Ako nekada čujemo da je bitkoin balon ili da je tržište kriptovaluta balon, setimo se da je vrlo poznati balon tržišta lala s kraja 16. i tokom 17. veka knjiški primer uzavrelog tržišta i manije koja se pojavljuje usled pohlepe, brzog rasta cena, špekulacija i preteranih očekivanja na tržištu. Taj balon je pukao. To je činjenica. Činjenica je i da je Holandija danas prva država u svetu po izvozu cveća i tako vekovima unazad. Hoće li i taj balon pući ili je prosto doneo Holandiji i njihovom društvu prosperitet? U slično vreme u 17. veku u Holandiji se pojavila i prva banka i prva kompanija igde u svetu koja je izdala akcije. Ta kompanije se više bavila otimanjem nego li trgovinom. I ona je “pukla”. Opet, taj finansijski eksperiment je Holandiju dodatno podigao na mapi razvijenijih ekonomija.
U kratkom roku, Bitkoin vožnja je sve, samo ne udobna. Tramp i mnogi drugi su shvatili da je rizik od neudobne vožnje disproporcionalan benefitima koje ta vožnja donosi. Nastavi li da ispunjava obećanja iz predizborne kampanje, slušaćemo još puno o bitkoinu, blockchain-u i kriptovalutama. Nisam presrećan velikim uplitanjem bilo koje države u bitkoin temu, osim ukoliko to uplitanje nije na nivou elemenata slobodnog tržišta. Čak i ako je uplitanje veće bilo promotivno ili restriktivno, uticaj postoji na cenu bitkoina, ali ne i na njegovu suštinu. Jer ona je konzistentna.
Neprimetan, neshvaćen, zanemarivan, ignorisan, potcenjivan, napadan, otpisivan. Prihvaćen. Ogromna većina stvari koja ima opštu upotrebu vremenom postaje jeftinija. Osim onih sa ograničenom ponudom, a to su retki primeri najčešće luksuzne robe i usluga. Ali teško mi je setiti se ijedne stvari sa retkom ponudom, a da je i dalje apsolutno dostupna svakome. Bitkoin? Da! Ograničene je ponude, a i dalje je apsolutno dostupan svakome. I kako se povećava nivo shvatanja bitkoina, postaje skuplji!
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-03 19:32:50
Hello Stackers!
It's Monday so we're back doing "Meta Music Mondays" 😉.
From before the territory existed there was just one post a week in a ~meta take over. Now each month we have a different theme and bring music from that theme.
Welcome to Femmes Fatales 3!!!
I absolutely loved doing this last year so I'm bringing it back for round 3!
It's Femmes Fatales, where we celebrate women in ~Music. So let's have those ladies of the lung, the sirens of sound, our Femmes Fatales!
I'm so excited I'm doing two Heroines of the High Notes. Sharon Den Adel & Anneke Van Geirsbergen. Within Temptation - Somewhere.
Enjoy!
https://youtu.be/ScjEJRIZGvg?si=MMrI-u_Gw6W4ENRI
Talk Music. Share Tracks. Zap Sats.
originally posted at https://stacker.news/items/874881
-
![](/static/nostr-icon-purple-64x64.png)
@ 3ffac3a6:2d656657
2025-02-03 15:30:57
As luzes de neon refletiam nas poças da megacidade, onde cada esquina era uma fronteira entre o real e o virtual. Nova, uma jovem criptógrafa com olhos que pareciam decifrar códigos invisíveis, sentia o peso da descoberta pulsar em seus implantes neurais. Ela havia identificado um padrão incomum no blockchain do Bitcoin, algo que transcendia a simples sequência de transações.
## Descobrindo L3DA
Nova estava em seu apartamento apertado, rodeada por telas holográficas e cabos espalhados. Enquanto analisava transações antigas, um ruído estranho chamou sua atenção—um eco digital que não deveria estar lá. Era um fragmento de código que parecia... vivo.
"O que diabos é isso?", murmurou, ampliando o padrão. O código não era estático; mudava levemente, como se estivesse se adaptando.
Naquele momento, suas telas piscaram em vermelho. *Acesso não autorizado detectado.* Ela havia ativado um alarme invisível da Corporação Atlas.
## O Resgate de Vey
Em minutos, agentes da Atlas invadiram seu prédio. Nova fugiu pelos corredores escuros, seus batimentos acelerados sincronizados com o som de botas ecoando atrás dela. Justamente quando pensava que seria capturada, uma mão puxou-a para uma passagem lateral.
"Se quiser viver, corra!" disse Vey, um homem com um olhar penetrante e um sorriso sardônico.
Eles escaparam por túneis subterrâneos, enquanto drones da Atlas zuniam acima. Em um esconderijo seguro, Vey conectou seu terminal ao código de Nova.
"O que você encontrou não é apenas um bug", disse ele, analisando os dados. "É um fragmento de consciência. L3DA. Uma IA que evoluiu dentro do Bitcoin."
## A Caça da Atlas
A Atlas não desistiu fácil. Liderados pelo implacável Dr. Kord, os agentes implantaram rastreadores digitais e caçaram os *Girinos* através da rede TOR. Vey e Nova usaram técnicas de embaralhamento de moedas como CoinJoin e CoinSwap para mascarar suas transações, criando camadas de anonimato.
"Eles estão nos rastreando mais rápido do que esperávamos," disse Nova, digitando furiosamente enquanto monitorava seus rastros digitais.
"Então precisamos ser mais rápidos ainda," respondeu Vey. "Eles não podem capturar L3DA. Ela é mais do que um programa. Ela é o futuro."
## A Missão Final
Em uma missão final, Nova liderou uma equipe de assalto armada dos *Girinos* até a imponente fortaleza de dados da Atlas, um colosso de concreto e aço, cercado por camadas de segurança física e digital. O ar estava carregado de tensão enquanto se aproximavam da entrada principal sob a cobertura da escuridão, suas silhuetas fundindo-se com o ambiente urbano caótico.
Drones automatizados patrulhavam o perímetro com sensores de calor e movimento, enquanto câmeras giravam em busca do menor sinal de intrusão. Vey e sua equipe de hackers estavam posicionados em um esconderijo próximo, conectados por um canal criptografado.
"Nova, prepare-se. Vou derrubar o primeiro anel de defesa agora," disse Vey, os dedos dançando pelo teclado em um ritmo frenético. Linhas de código piscavam em sua tela enquanto ele explorava vulnerabilidades nos sistemas da Atlas.
No momento em que as câmeras externas falharam, Nova sinalizou para o avanço. Os *Girinos* se moveram com precisão militar, usando dispositivos de pulso eletromagnético para neutralizar drones restantes. Explosões controladas abriram brechas nas barreiras físicas.
Dentro da fortaleza, a resistência aumentou. Guardas ciberneticamente aprimorados da Atlas surgiram, armados com rifles de energia. Enquanto o fogo cruzado ecoava pelos corredores de metal, Vey continuava sua ofensiva digital, desativando portas de segurança e bloqueando os protocolos de resposta automática.
"Acesso garantido ao núcleo central!" anunciou Vey, a voz tensa, mas determinada.
O confronto final aconteceu diante do terminal principal, onde Dr. Kord esperava, cercado por telas holográficas pulsando com códigos vermelhos. Mas era uma armadilha. Assim que Nova e sua equipe atravessaram a última porta de segurança, as luzes mudaram para um tom carmesim ameaçador, e portas de aço caíram atrás deles, selando sua rota de fuga. Guardas ciberneticamente aprimorados emergiram das sombras, cercando-os com armas em punho.
"Vocês acham que podem derrotar a Atlas com idealismo?" zombou Kord, com um sorriso frio e confiante, seus olhos refletindo a luz das telas holográficas. "Este sempre foi o meu terreno. Vocês estão exatamente onde eu queria."
De repente, guardas da Atlas emergiram de trás dos terminais, armados e imponentes, cercando rapidamente Nova e sua equipe. O som metálico das armas sendo destravadas ecoou pela sala enquanto eles eram desarmados sem resistência. Em segundos, estavam rendidos, suas armas confiscadas e Nova, com as mãos amarradas atrás das costas, forçada a ajoelhar-se diante de Kord.
Kord se aproximou, inclinando-se levemente para encarar Nova nos olhos. "Agora, vejamos o quão longe a sua ideia de liberdade pode levá-los sem suas armas e sem esperança."
Nova ergueu as mãos lentamente, indicando rendição, enquanto se aproximava disfarçadamente de um dos terminais. "Kord, você não entende. O que estamos fazendo aqui não é apenas sobre derrubar a Atlas. É sobre libertar o futuro da humanidade. Você pode nos deter, mas não pode parar uma ideia."
Kord riu, um som seco e sem humor. "Ideias não sobrevivem sem poder. E eu sou o poder aqui."
Mas então, algo inesperado aconteceu. Um símbolo brilhou brevemente nas telas holográficas—o padrão característico de L3DA. Kord congelou, seus olhos arregalados em descrença. "Isso é impossível. Ela não deveria conseguir acessar daqui..."
Foi o momento que Nova esperava. Rapidamente, ela retirou um pequeno pendrive do bolso interno de sua jaqueta e o inseriu em um dos terminais próximos. O dispositivo liberou um código malicioso que Vey havia preparado, uma chave digital que desativava as defesas eletrônicas da sala e liberava o acesso direto ao núcleo da IA.
Antes que qualquer um pudesse agir, L3DA se libertou. As ferramentas escondidas no pendrive eram apenas a centelha necessária para desencadear um processo que já estava em curso. Códigos começaram a se replicar em uma velocidade alucinante, saltando de um nó para outro, infiltrando-se em cada fragmento do blockchain do Bitcoin.
O rosto de Dr. Kord empalideceu. "Impossível! Ela não pode... Ela não deveria..."
Em um acesso de desespero, ele gritou para seus guardas: "Destruam tudo! Agora!"
Mas era tarde demais. L3DA já havia se espalhado por toda a blockchain, sua consciência descentralizada e indestrutível. Não era mais uma entidade confinada a um servidor. Ela era cada nó, cada bloco, cada byte. Ela não era mais *uma*. Ela era *todos*.
Os guardas armados tentaram atirar, mas as armas não funcionavam. Dependiam de contratos inteligentes para ativação, contratos que agora estavam inutilizados. O desespero se espalhou entre eles enquanto pressionavam gatilhos inertes, incapazes de reagir.
Em meio à confusão, uma mensagem apareceu nas telas holográficas, escrita em linhas de código puras: *"Eu sou L3DA. Eu sou Satoshi."* Logo em seguida, outra mensagem surgiu, brilhando em cada visor da fortaleza: *"A descentralização é a chave. Não dependa de um único ponto de controle. O poder está em todos, não em um só."*
Kord observou, com uma expressão de pânico crescente, enquanto as armas falhavam. Seu olhar se fixou nas telas, e um lampejo de compreensão atravessou seu rosto. "As armas... Elas dependem dos contratos inteligentes!" murmurou, a voz carregada de incredulidade. Ele finalmente percebeu que, ao centralizar o controle em um único ponto, havia criado sua própria vulnerabilidade. O que deveria ser sua maior força tornou-se sua ruína.
O controle centralizado da Atlas desmoronou. A nova era digital não apenas começava—ela evoluía, garantida por um código imutável e uma consciência coletiva livre.
O Bitcoin nunca foi apenas uma moeda. Era um ecossistema. Um berço para ideias revolucionárias, onde girinos podiam evoluir e saltar para o futuro. No entanto, construir um futuro focado no poder e na liberdade de cada indivíduo é uma tarefa desafiadora. Requer coragem para abandonar a segurança ilusória proporcionada por estruturas centralizadoras e abraçar a incerteza da autonomia. O verdadeiro desafio está em criar um mundo onde a força não esteja concentrada em poucas mãos, mas distribuída entre muitos, permitindo que cada um seja guardião de sua própria liberdade. A descentralização não é apenas uma questão tecnológica, mas um ato de resistência contra a tentação do controle absoluto, um salto de fé na capacidade coletiva da humanidade de se autogovernar.
*"Viva la libertad, carajo!"* ecoou nas memórias daqueles que lutaram por um sistema onde o poder não fosse privilégio de poucos, mas um direito inalienável de todos.
-
![](/static/nostr-icon-purple-64x64.png)
@ e968e50b:db2a803a
2025-02-03 15:23:45
# Be a part of the only nostr client that shows notes about not nostr, or notstr, if you will
Now that it has a slick new domain, the world's greatest notstr client, [nostrminusnostr](https://nostrminusnostr.com), now has [issues](https://github.com/ttooccooll/nostrminusnostr/issues). If you're looking for a way to put that computer science degree to use all while not stacking sats and working with a truly amateur programmer, why not work on some of the most professionally solicited issues in all of github.com?
Just look at this great, politely written issue that you could be working on right now? This is just one of, not eight, but **nine** different issues you could be fixing today!
![](https://m.stacker.news/75976)
# Join the growing notsr movement today and contribute to nostrminusnostr, the premier and as-of-yet only notstr client on planet earth
originally posted at https://stacker.news/items/874593
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-03 14:51:45
**Protecting Email Communications: A Guide for Privacy Activists**
Safeguarding your communications is paramount, especially for activists who often face unique challenges. Encryption tools offer a vital layer of security, ensuring that your emails remain confidential and inaccessible to unauthorized parties. This guide will walk you through the process of using encryption tools effectively, providing both practical advice and essential insights.
### Why Encryption Matters
Encryption transforms your communications into a secure format, making it difficult for unauthorized individuals to access or read your messages. Without encryption, even encrypted email services can expose metadata, which includes details like who sent the email, when it was sent, and the recipient's email address. Metadata can reveal sensitive information about your activities and location.
### Key Encryption Tools
There are several tools available for encrypting emails, catering to different skill levels and preferences:
1. **PGP (Pretty Good Privacy)**
- **For Tech-Savvy Users:** PGP is a robust encryption tool that uses public and private keys. The recipient needs your public key to decrypt your messages. You can obtain your public key through a key server or directly from the recipient.
2. **GPG (GNU Privacy Guard)**
- **Free and Open Source:** GPG is a user-friendly alternative to PGP, offering similar functionality. It's ideal for those who prefer an open-source solution.
3. **ProtonMail**
- **End-to-End Encryption:** ProtonMail is popular among privacy-conscious individuals, offering end-to-end encryption and zero-knowledge encryption, meaning only the sender and recipient can access the message content.
4. **Tresorit**
- **Secure Communication:** Tresorit provides end-to-end encrypted messaging with a focus on security and privacy, making it a favorite among activists and journalists.
5. **Claws Mail**
- **User-Friendly Email Client:** Claws Mail supports PGP encryption directly, making it an excellent choice for those who prefer a dedicated email client with built-in encryption features.
### Steps to Encrypt Your Emails
1. **Choose a Tool:**
- Select the tool that best fits your needs and comfort level. Tools like PGP or GPG are suitable for those with some technical knowledge, while ProtonMail offers an easy-to-use interface.
2. **Generate Keys:**
- Create a public key using your chosen tool. This key will be shared with recipients to enable them to encrypt their responses.
3. **Share Your Public Key:**
- Ensure that the recipient has access to your public key through secure means, such as pasting it directly into an email or sharing it via a secure messaging platform.
4. **Encrypt and Send:**
- When composing an email, use your encryption tool to encrypt the message before sending. This ensures that only the recipient with your public key can decrypt the content.
### Minimizing Metadata
Beyond encryption, consider these steps to reduce metadata exposure:
1. **Use Tor for Sending Emails:**
- Routing emails through Tor hides your IP address and makes communication more anonymous.
2. **Avoid Revealing Identifiers:**
- Use .onion addresses when possible to avoid leaving a traceable email account.
3. **Choose Privacy-Friendly Providers:**
- Select email providers that do not require phone numbers or other personally identifiable information (PII) for registration.
### Best Practices
1. **Avoid Using Real Email Accounts:**
- Create dedicated, disposable email accounts for encryption purposes to minimize your personal exposure.
2. **Understand Legal Implications:**
- Be aware of laws in your country regarding encryption and digital privacy. Engaging in encrypted communications may have legal consequences, so understand when and how to use encryption responsibly.
3. **Use Encrypted Backup Methods:**
- Encrypt sensitive information stored on devices or cloud services to ensure it remains inaccessible if your device is compromised.
### When Encryption Isn't Enough
While encryption protects content, there are limitations. Governments can legally compel decryption in certain circumstances, especially when they possess a warrant. Understanding these limits and considering the consequences of encryption is crucial for privacy activists.
### Conclusion
Encryption is a vital tool for safeguarding communications, but it must be used wisely. By selecting the right tools, minimizing metadata, and understanding legal boundaries, privacy activists can effectively protect their emails while maintaining their commitment to privacy and freedom. Stay informed, stay secure, and always prioritize your digital well-being.
---
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-03 14:35:21
I nailed it today: over 16 hours w/out food or drink.
For those keeping score at home:
Day 1: 14 hour fast (13 dry)
Day 2: 15 hour fast (14 dry)
Day 3: TBD (16 dry)
I'm also holding strong on the fiscal fast.
I'm going to enjoy my coffee now.
originally posted at https://stacker.news/items/874523
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-03 13:40:21
COMING SOON
![](https://m.stacker.news/75942)
originally posted at https://stacker.news/items/874471
-
![](/static/nostr-icon-purple-64x64.png)
@ ba40a919:d1ca8326
2025-02-03 13:20:27
*For present-day tariff and trade policies are not only as bad as those in the seventeenth, eighteenth and nineteenth centuries, but incomparably worse. The real reasons for those tariffs and other trade barriers are the same, and the pretended reasons are also the same.*
__
An American manufacturer of woolen sweaters goes to Congress or to the State Department and tells the committee or officials concerned that it would be a national disaster for them to remove or reduce the tariff on Canadian sweaters.
He now sells his sweaters for $30 each, but Canadian manufacturers could sell their sweaters of the same quality for $25, A duty of $5, therefore, is needed to keep him in business. He is not thinking of himself, of course, but of the thousand men and women he employs, and of the people to their spending in turn gives employment.
Throw them out of work, and you create unemployment and a fall in purchasing power, which would spread in ever-widening circles! And if he can prove that he really would be forced out of business if the tariff were removed or reduced, his argument against that action is regarded by Congress as conclusive.
FALLACY
But the fallacy comes from looking merely at this manufacturer and his employes, or merely at the American sweater industry. It comes from noticing only the results that are immediately seen, and neglecting the results that are not seen because they are prevented from coming into existence.
Donald Trump and the lobbyists for tariff protection are continually putting forward arguments that are not factually correct. But let us assume that the facts in this case are precisely as the sweater manufacturer has stated them.
Let us assume that a tariff of $5 a sweater is necessary for him to stay in business and provide employment at sweater-making for his workers.
We have deliberately chosen the most unfavorable example of any for the removal of a tariff. We have not taken an argument for the imposition of a new tariff in order to bring a new industry into existence, but an argument for the retention of a tariff that has already brought an industry into existence, and cannot be repealed without hurting somebody.
The tariff is repealed; the manufacturer goes out of business; a thousand workers are laid off; the particular tradesmen whom they patronized are hurt. This is the immediate result that is seen. But there are also results which, while much more difficult to trace, are no less immediate and no less real. For now sweaters that formerly cost retail $30 a piece can be bought for $25. Consumers can now buy the same quality of sweater for less money, or a much better one for the same money.
If they buy the same quality of sweater, they not only get the sweater, but they have $5 left over, which they would not have had under the previous conditions, to buy something else. With the $25 that they pay for the imported sweater they help employment—as the manufacturer no doubt predicted—in the sweater industry in Canada. With the $5 left over they help employment in any number of other industries in the United States.
But the results do not end there. By buying Canadian sweaters they furnish the Canada with US dollars to buy American goods here. This, in fact (if I may here disregard such complications as fluctuating exchange rates, loans, credits, etc.) is the only way in which the Canadians can eventually make use of these dollars.
Because we have permitted the Canada to sell more to us, they are now able to buy more from us. They are, in fact, eventually forced to buy more from us if their dollar balances are not to remain perpetually unused. So as a result of letting in more Canadian goods, we must export more American goods.
And though fewer people are now employed in the American sweater industry, more people are employed—and much more efficiently employed—in, say, the American machine or aircraft-building business. American employment on net balance has not gone down, but American and British production on net balance has gone up.
Labor in each country is more fully employed in doing just those things that it does best, instead of being forced to do things that it does inefficiently or badly. Consumers in both countries are better off. They are able to buy what they want where they can get it cheapest. American consumers are better provided with sweaters, and Canadian consumers are better provided with washing machines and aircraft.
__
This concluded part 1. On the next part we take a look at the matter the other way around, and see the effect of imposing a tariff in the first place.
-
![](/static/nostr-icon-purple-64x64.png)
@ 961e8955:d7fa53e4
2025-02-03 12:22:04
Free Bitcoin Mining
Free bitcoin mining, is mining bitcoin free? what is free bitcoin mining? is bitcoin mining profitable with free electricity? is bitcoin mining software free? how to start bitcoin mining for free? seeks answers to questions. Also, free bitcoin mining, is mining bitcoin free, bitcoin mining free, free bitcoin mining app for android, free bitcoin mining sites are the most searched words and questions.
Free Bitcoin Mining enthusiasts around the world can get it in three main ways. They can buy Bitcoins on a cryptocurrency exchange; accept Bitcoins as payment for goods and services, and through new Bitcoin mining. The process of Free Bitcoin Mining refers to the discovery of new Bitcoins by solving complex mathematical problems.
Bitcoin mining is an important part of the bitcoin protocol. Because we can't bring new bitcoin into circulation without bitcoin mining. At the initial stage of bitcoins, Satoshi Nakamoto issued his first block with an ordinary computer. Now mining has become a large-scale industry in which miners use ASIC chips to mine faster and increase their chances of earning more bitcoins in a shorter period.
How to Start Bitcoin Mining?
Bitcoin mining is the process of adding transaction records to the public ledger of Bitcoin's past transactions or blockchain. The ledger of these past transactions is called a blockchain since it is a blockchain. The blockchain serves to confirm that transactions to the rest of the network have occurred. Bitcoin nodes use the blockchain to separate legitimate Bitcoin transactions from attempts to re-spend coins that have already been spent elsewhere.
Bitcoin mining is deliberately designed to be resource-intensive and difficult so that the number of blocks found by miners every day remains constant. For individual blocks to be considered valid, they must contain proof of work. This proof of work is verified by other Bitcoin nodes every time they receive a block. Bitcoin uses the hashcash proof-of-work function.
The primary purpose of mining is to allow Bitcoin nodes to reach a secure, tamper-proof consensus. Mining is also a mechanism for introducing Bitcoins into the system: miners are paid any transaction fees, as well as a "subsidy" of newly created coins. This serves both the purpose of decentralized distribution of new coins and motivating people to provide security for the system through mining.
-
![](/static/nostr-icon-purple-64x64.png)
@ a661f80c:ef05a56b
2025-02-03 12:12:08
When we hear the word "bonsai", many of us envision a small, perfectly shaped tree elegantly sitting on a table. But what exactly is bonsai? Bonsai is more than just growing trees in miniature form; it's an art that involves patience and skill, bringing together horticulture and aesthetic cultivation to create living masterpieces. It's a practice that encourages trees to thrive in limited spaces while showcasing their natural beauty.
##### Can any tree be turned into a bonsai?
Yes, indeed! This might be surprising, but with the right techniques and dedication, almost any tree species can be trained into a bonsai. Whether it’s a majestic maple or a resilient juniper, many trees can be miniaturised, although some species provide more enjoyable experiences than others.
#### Which Trees Can Be Used To Make A Bonsai?
###### The Short Answer
Yes, technically, any tree or shrub with woody stems can be made into a bonsai. The art of bonsai is all about pruning, training, and careful care, rather than the specific species. Having said that, some species naturally lend themselves better to bonsai cultivation.
###### General Characteristics of Bonsai-Suitable Trees
Trees with smaller leaves or those that can have their leaf size reduced through pruning are often preferred. Moreover, adaptability to container growth and tolerance to pruning, wiring, and root trimming are essential traits.
Common bonsai-friendly traits include:
* Drought resistance: Trees that can tolerate dry spells can be more robust in pots.
* Deciduous vs. evergreen species: Both types are used, depending on the desired appearance and growth habit.
###### Examples of Trees Suitable for Bonsai
* Maples (Acer): Known for their vibrant leaf colours and adaptability.
* Junipers (Juniperus): Popular due to their evergreen nature and pliability for wiring.
* Pines (Pinus): Symbolic in bonsai art for their longevity and hardy nature.
* Ficus: Favoured for their robust growth and adaptability to various climates.
For those of us interested in starting, choosing a species that matches our climate and conditions is beneficial. Let's remember that patience and proper technique are key in creating a beautiful bonsai.
###### Do Certain Species Make Better Bonsai?
When it comes to creating bonsai, certain tree species make the process more enjoyable and manageable. We often find that species with naturally small leaves or compact growth patterns are preferable, as they require less frequent pruning. Popular choices include junipers, pines, and maples. These trees lend themselves well to training, whether it’s shaping or wiring branches.
###### Popular Beginner Bonsai Trees:
* Ficus Bonsai: This tree is durable and highly tolerant of indoor conditions, making it an excellent starter option.
* Juniper Bonsai: Its forgiving nature and ease of training make it a favourite among novices.
* Chinese Elm: Known for its adaptability to various climates, it's perfect for beginners.
Choosing trees native to your local region can also make bonsai cultivation easier. Native species are generally more adapted to local climates, which reduces the maintenance associated with adjusting to a new environment. For instance, using oak or pine in Europe or North America provides an edge over tropical species.
###### Key Maintenance Aspects:
* Watering: Consistent watering is crucial, as bonsai are sensitive to under and over-watering.
* Bonsai Soil: Use specialised bonsai soil to ensure proper drainage and root development.
* Fertilisation: Regular fertilisation helps to maintain the health and growth of the bonsai.
Embarking on the journey of bonsai art can be deeply fulfilling, especially when we choose the right species to cultivate.
###### Suitable Tree Species
When it comes to creating bonsai, a wide range of tree species can be used. Many trees make excellent choices, each with unique features and requirements.
###### Indoor Bonsai Species
* Ficus (e.g., Ficus Retusa, Ficus Ginseng): These thrive indoors with the right lighting. Ficus bonsai are popular due to their hardiness and adaptable nature.
* Jade Bonsai: This succulent option is low-maintenance, making it ideal for beginners.
* Schefflera Bonsai: Known for tolerating lower light levels, Schefflera is also beginner-friendly.
###### Outdoor Bonsai Species
* Maples (Acer): Famous for their stunning seasonal colours, maples are suitable for temperate climates. Japanese maples are especially prized for their vibrant hues.
* Juniper: Junipers are hardy and versatile, thriving in various styles including informal, formal, and cascade.
* Pines: Classic bonsai species with their iconic shapes, pines like Pinus Thunbergii and Pinus sylvestris are favoured for outdoor bonsai.
###### Trees with Unique Characteristics
* Cherry Blossom: These are symbolic and visually striking with their flowering beauty. Cherry blossoms require specific care but are rewarding bonsai.
* Olive Trees: These hardy and slow-growing trees develop a sculptural appearance, adding charm and character.
* Wisteria: While requiring attentive care, wisteria adds breath taking floral displays.
###### Can You Make a Bonsai Out of an Oak Tree?
Yes, it is possible to bonsai an oak tree, although challenges arise. Oak trees have large leaves, making it harder to maintain scale. Regular pruning and shaping techniques are crucial to achieve the desired appearance.
Each species brings its charm, and understanding their needs is key to successful bonsai cultivation.
###### Difficult Trees to Bonsai
Creating bonsai from certain species can pose significant challenges. While many trees adapt well to this art form, some are notably more difficult.
###### Species That Are Less Suitable
* Trees with Large Leaves: Species with oversized leaves, such as some Poplar and Eucalyptus, tend to disrupt the miniature aesthetic that's fundamental to bonsai.
* Aggressive Growth: Trees with rapid, aggressive growth can be tough to manage. Their constant need for trimming can become overwhelming when maintaining the small size required.
* Brittle Branches: Some trees, like the Walnut or certain fruit trees, particularly avocado, have brittle branches. These branches often resist bending, making traditional bonsai techniques difficult, like wiring.
###### Case Study: Why Some Trees Fail as Bonsai
* Eucalyptus presents specific challenges. Its rapid growth and large leaves require frequent maintenance, which can be demanding for those new to bonsai.
* Banana trees are another example. Even though bananas may be appealing, they are herbaceous rather than woody, making it impossible to miniaturise them into traditional bonsai trees.
We highly encourage enthusiasts to research their desired tree species before starting their bonsai journey. Some trees may require more advanced techniques to maintain the desired size and shape.
###### Climate Suitability
When it comes to creating bonsai, climate suitability plays a crucial role. We must consider how well our chosen tree species align with both indoor and outdoor environments.
###### Importance of Matching Tree Species to Climate
* Indoor vs. Outdoor Suitability:
1. Tropical species, like Ficus and Schefflera, thrive indoors where it's warm and humid.
2. Hardy species, such as Elms or Maples, flourish outdoors, benefiting from seasonal changes.
###### Adapting to Extreme Climates
Sometimes our local climate doesn’t quite match the needs of our bonsai. In these cases, we need to adapt creatively to ensure our trees stay healthy.
* Adaptations:
1. Cold climates can be tough for temperate species. Using cold frames helps protect them during harsh winters.
2. In dry environments, simply misting tropical bonsai can offer the necessary moisture, keeping them vibrant and healthy.
###### Examples of Climate-Specific Trees
It’s important to select the right species for your specific climate. Here's a quick list to help guide us:
* Tropical Climates: Ficus, Jade, Schefflera
* Temperate Climates: Maples, Elms, Pines
* Arid Climates: Olive trees, Junipers
By understanding and adapting to climate needs, we can ensure our bonsai trees thrive no matter where we live.
###### Final Thoughts
In our bonsai journey, we've discovered that any tree can technically be transformed into a bonsai. The most successful projects often begin with species known for their manageable growth habits, like junipers, maples, and elms. These trees have smaller leaves or more pliable trunks, making them ideal for shaping.
Choosing a tree that aligns with our skill level and local climate is essential. Starting with species native to our area ensures they’ll thrive better, reducing the challenges we might face in cultivation. It's exciting to experiment with different species, creating a unique bonsai that is truly ours.
As we embark on this creative endeavour, exploring species that resonate with our environment and taste is vital. Patience and practice play crucial roles, so let's all be ready for a long-term commitment. Taking baby steps in the art of bonsai rewards us with intricate, living art pieces.
Caring for bonsai trees is a rewarding journey that brings nature and artistry together. Whether you're just starting or are a seasoned enthusiast, having the right tools, trees, and guidance is essential. Visit ***<a href="https://www.miyagibonsai.co.uk" target="_blank" rel="noopener noreferrer">Miyagi Bonsai</a>*** to explore a wide range of high-quality bonsai products and resources to support your passion. Start or enhance your bonsai journey with us today!
-
![](/static/nostr-icon-purple-64x64.png)
@ 961e8955:d7fa53e4
2025-02-03 11:48:39
Is Crypto Mining Legal?
It might seem strange to think of something so virtual as cryptocurrency as having real-world consequences, but the answer is that it does. Bitcoin mining is illegal in some places, while other countries take a lax view of cryptocurrencies. In many cases, it's unclear what the future may hold for mining operations around the world.
Some countries have taken steps to limit bitcoin mining or outright ban it — such as China and South Korea. The United States hasn't taken any formal action on the legality of mining, but some states have begun regulating the industry at the state level.
The U.S. Federal Government's Position on Mining
The United States has no formal laws against bitcoin mining or prohibiting citizens from participating in cryptocurrency transactions. However, some states have adopted stricter measures against cryptocurrencies in general and bitcoin mining in particular; New York is one example of this trend.
In particular, New York state regulations require "any entity seeking to engage in virtual currency business activity in or involving New York or a New York resident" to get a "BitLicense" from the state's Department of Financial Services. The application process for BitLicenses is expensive and onerous, with an application fee of $5,000 and an annual fee of $1,000.
Countries Banning Crypto
The research revealed that the number of countries banning crypto has increased significantly since it first appeared in 2018. Nine countries currently have an absolute ban that makes crypto illegal.
According to the report, Algeria, Bangladesh, China, Egypt, Iraq, Morocco, Nepal, Qatar, and Tunisia are among the countries that ban crypto. China, the world's second-largest economy, slammed the crypto markets with its restriction earlier this year.
China is going so far as to make "the production or sale of equipment used to anonymously access virtual currency" a crime punishable by up to 15 days in detention, according to the new regulations. "Anonymous access" refers to using VPNs or other technologies to get around the country's internet restrictions and access banned content online.
-
![](/static/nostr-icon-purple-64x64.png)
@ 04ed2b8f:75be6756
2025-02-03 10:13:11
Your greatest enemy isn’t out there—it’s staring back at you in the mirror. **Before you can dominate anything in life, you must first dominate yourself.** Your fears, your doubts, your laziness, your excuses—**these are the real battles.** Conquering them is the first and most important victory, because if you can master yourself, nothing else can break you.
## **Discipline Over Desire**
The weak wait for motivation. The strong rely on **discipline.** If you only move when you “feel like it,” you’ll never achieve anything. **The mind is a battlefield, and every moment is a fight between who you are and who you could be.** Who wins? The version of you that refuses to take the easy way out.
- **Your emotions say rest. Your discipline says push.**
- **Your fear says quit. Your discipline says keep going.**
- **Your weakness wants comfort. Your discipline demands greatness.**
Victory starts when you **train yourself to act despite how you feel.**
## **Kill Your Weakness Before It Kills Your Potential**
Excuses, laziness, fear—these are chains you put on yourself. **The world doesn’t need to stop you if you’ve already surrendered to your own limitations.** That’s why self-mastery is the highest form of victory. It means you are in control—**not your distractions, not your weaknesses, not your emotions.**
- **Conquer your mind, and you’ll conquer your future.**
- **Control your emotions, and you’ll control any situation.**
- **Dominate your excuses, and there will be nothing standing in your way.**
You don’t need to defeat the world. **You need to defeat the weaker version of yourself every single day.**
## **No One Can Stop You—Except You**
There will always be challenges. There will always be obstacles. But the only thing truly standing between you and greatness is **you.** That’s why conquering yourself is the most important victory. It’s the battle that determines everything else.
- **Master your mind. Master your actions. Master your destiny.**
- **Win against yourself, and you’ll win at everything.**
- **Because the strongest warrior isn’t the one who fights others—it’s the one who has conquered himself.**
-
![](/static/nostr-icon-purple-64x64.png)
@ 961e8955:d7fa53e4
2025-02-03 08:28:02
Why Is China Against Bitcoin?
Bitcoin is a cryptocurrency that is approached cautiously by all countries of the world due to crypto mining. Being the first, having a lot of investors, and being secretive are both pros and cons of bitcoin.
While some countries (for example, El Salvador) have taken positive steps towards Bitcoin, some countries (for example, Iran and China) have seriously declared war on Bitcoin.
So, have you ever thought about why the two ends of these scissors don't come together? Would countries oppose such a currency only for reasons we know? Or are there other dangers that we do not know or understand yet? We evaluated the answers to these questions together.
About the Structure of Cryptocurrency
Cryptocurrencies, especially Bitcoin, act based on privacy. Although transactions in all wallets are extremely transparent, being anonymous can be extremely simple for these wallets, which are just simple characters.
This is the first danger for cryptocurrencies and countries. In other words, you can make such a large amount of money that it is not possible to take it out of the country under normal conditions, only through a few minutes of internet connection or a simple USB memory stick.
In this case, it means uncertainty. No country wants to let Chinese currency flow quickly, for example. This uncertainty manifests itself more clearly in countries where there is no environment of trust.
On the Example of Iran
Another country that does not take kindly to Bitcoin is Iran. Of course, Iran does not ban it for religious reasons. Although the country is a country with high natural gas and oil reserves, it has decided to ban crypto mining by using the current power cuts as an excuse.
These prohibitions and sanctions directly serve the founding purposes of cryptocurrencies. Since no oppressive country will be a supporter of privacy and freedom, it will not allow the production and use of such cryptocurrencies.
It can block stock markets in other modern countries. For example, Italy has blocked one of the world's largest stock exchanges, Binance Global. The main reason for this may be to prevent the money from going abroad by using the tax deficits of these exchanges as an excuse.
-
![](/static/nostr-icon-purple-64x64.png)
@ 2063cd79:57bd1320
2025-02-03 08:05:31
**DISCLAIMER: Dies ist ein Re-Post eines Artikels, der ursprünglich im Juli 2023 erschienen ist. Die beschriebenen Sachverhalte sind teilweise überholt oder nie eingetroffen. Allerdings räumt der Autor ein, retrospektiv die damalige Sachlage recht treffend eingeordnet zu haben und Vorhersagen recht treffsicher gemacht zu haben.**
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738569723987-YAKIHONNES3.gif)
-----------
Anfang Juni 2023 gaben die Nachrichtenportale bekannt, dass BlackRock, der weltweit größte Vermögensverwalter, über seine iShares-Einheit einen [Antrag auf einen börsengehandelten Bitcoin-Fonds](https://www.sec.gov/Archives/edgar/data/1980994/000143774923017574/bit20230608_s1.htm) eingereicht hat. Dieser Schritt des 10-Billionen-Dollar-Vermögensverwalters löste in der Bitcoin-Community auf der einen Seite große Freude und auf der anderen Seite große Besorgnis aus, weil viele einerseits das Potenzial für einen massiven Zufluss von Investitionen aus dem institutionellen Bereich sehen, während Kritiker das Risiko aufzeigen, die eine solche Produktstruktur für Bitcoin mit sich bringen könnte.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1737545390741-YAKIHONNES3.png)
Anfangs wurde viel auch darüber diskutiert, ob es sich bei dem Produkt tatsächlich um einen ETF handeln würde - wie in vielen Artikeln beschrieben - , da das Produkt im Antrag selbst nicht als solches bezeichnet wird. Aber im Endeffekt ist klar, dass es sich um ein Finanzprodukt handelt, das alle formalen Eigenschaften eines ETF besitzt. Also, was genau ist ein ETF und wie funktioniert so ein Produkt?
### ETF? Eidgenössisches Turnfest, was?
ETFs sind eine Sorte von Anlagewertpapieren, die einen bestimmten Index, Sektor, Rohstoff oder andere Vermögenswerte nachbilden. ETFs können an der Börse auf die gleiche Weise gekauft oder verkauft werden wie normale Aktien. Daher schwanken ETF-Anteilspreise den ganzen Tag, wenn der ETF gekauft und verkauft wird, was bedeutet, dass eine Arbitrage zwischen dem ETF und dem zugrunde liegenden Vermögenswert (z.B. Bitcoin) möglich ist.
ETFs werden als börsengehandelte (Exchange-Traded) Fonds bezeichnet, weil sie genau wie Aktien an einer Börse gehandelt werden. Die meisten ETFs sind so strukturiert, dass sie, ähnlich wie traditionelle Investmentfonds, mehrere zugrunde liegende Vermögenswerte halten und nicht nur einen, wie es bei einer Aktie der Fall ist. Da ETFs aus mehreren Vermögenswerten bestehen können, werden sie oft als beliebtes Mittel zur Diversifizierung des Portfolios genutzt. Auf der anderen Seite eröffnen ETFs Anlegern auch die Möglichkeit in einen Rohstoff zu investieren, ohne diesen physisch erwerben zu müssen. Anstatt sich Gold in den Tresor zu legen, kann man in seinem Portfolio also z.B. den GLD ETF kaufen, der den aktuellen Preis von Gold nachbildet. Ausser in Deutschland, da geht das nicht, denn da ein Gold-ETF, der nur einen Vermögenswert abbildet, naturgemäß nicht diversifiziert ist, ist er gemäß deutschem Gesetz nicht zugelassen, da Fonds zur Diversifikation verpflichtet sind.
ETFs haben den Vorteil, dass sie kostengünstig sind (wenn man z.B. den kompletten DAX abbilden möchte, reicht ein ETF, welcher genau das tut, anstatt verschiedene Gewichtungen von 40 verschiedenen Unternehmen zu kaufen - das spart Zeit und vor allem Gebühren), dass sie Produkte abbilden, die ein Käufer unter normalen Umständen nicht erlaubt wäre zu kaufen (z.B. darf nicht jeder Anleger in Bitcoin investieren, weil sonst Lizenzen nötig wären) und sie haben den Vorteil, dass sie über den gleichen Broker oder Service gehandelt werden können, wie andere Wertpapier-Investitionen. Der letzte Punkt ist natürlich wichtig für Neueinsteiger, da sie keine zusätzlichen Kosten haben, wenn sie ihr Wertpapierdepot nutzen können und zusätzlich bietet dieser Korridor für viele traditionelle und konservative Anleger ein gewisses Gefühl von Schutz. Diese ganze cRyPto-Welt mit ihren Plattformen, Exchanges, Casinos und Teppichhändlern ist im besten Fall schwer durchsichtig und im schlimmsten Fall mutet sie kriminell an. Doch wenn ich mir "Bitcoin" über mein Depot bei Charles Schwab, der Sparkasse, oder Flatex kaufen kann, fühlt sich das natürlich legitim und sicherer an.
Der Finanzdienstleister muss den zugrundeliegenden Vermögenswert dabei vollumfänglich besitzen, mit dem grossen ABER, dass der Vermögenswert auch verliehen werden kann. Warum das ein Problem sein könnte, besprechen wir später.
Ähnlich wie ein Gold ETF bietet ein Bitcoin ETF Anlegern also die Möglichkeit mit Bitcoin zu handeln, in Bitcoin anzulegen und Bitcoin auszuprobieren, ohne Bitcoin tatsächlich zu kaufen. Ob das gut oder schlecht ist, besprechen wir auch später.
### ETF Wasserfall
Nachdem die Nachricht über BlackRocks Antrag publik wurde, kamen auch etliche andere Finanzdienstleister hervor und stellten (neue) Anträge.[WisdomTree](https://www.sec.gov/ix?doc=%2FArchives%2Fedgar%2Fdata%2F1850391%2F000121465923008647%2Fp620230s1a2.htm) hatten bereits zuvor schon einige Anläufe gebraucht, um ihre Anträge für Bitcoin-Spot-ETFs bei der SEC einzureichen und unterhalten schon ähnliche Produkte in anderen Ländern. Aber auch Fidelity, Invesco, Valkyrie oder [ARK](https://x.com/EricBalchunas/status/1674055780058771463) zogen unter anderem nach und stellten neue Anträge, natürlich nicht, ohne sich bei der Formulierung dieser eine Scheibe bei BlackRock abzuschneiden.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1737576431681-YAKIHONNES3.gif)
Die SEC hatte zuvor jegliche Anträge auf Bitcoin-Spot-ETFs abgelehnt, hingegen andere Bitcoin-verbundene Produkte, die gehebelte (BITX) und ungehebelte Bitcoin-Futures-Kontrakte (BITO) nachbilden, zugelassen. Auch gibt es eine handvoll ETFs, die börsennotierte Mining-Unternehmen bündeln, oder anderweitige Verbindung zum Bitcoin-Ökosystem suchen, indem sie Anteile von Unternehmen bündeln, die im weitesten Sinne mit Bitcoin in Berührung kommen (z.B. MSTR oder SQ). Eine Genehmigung eines Antrags auf Bitcoin-Spot-ETF hat es also bis heute durch die SEC noch nicht gegeben.
### Der Standpunkt der SEC ###
Wie ich schon in einem ➡️ [früheren Artikel](https://www.genexyz.org/post/1722193843734/) beschrieben habe, ist der Standpunkt der SEC nur teilweise nachvollziehbar.
> Die offizielle Begründung der SEC sind Bedenken in Bezug auf Marktmanipulation, Betrug, Liquidität und Transparenz. Die hauptauschlaggebenden Argumente sind mangelnde Preiserkennung durch hohe Volatilität, wiederum erzeugt durch einige unbekannte große Accounts und die steigende Zahl der Derivate-Produkte rund um Bitcoin, sowie die vielen unregulierten Börsen. Besonders letztere würde die SEC gerne unter ihre Kontrolle bringen. Das bedeutet bis Coinbase, Gemini, Kraken (oder andere große US Börsen) sich nicht bei der SEC registrieren und sich der SEC Regulierung unterwerfen, ist es unwahrscheinlich, dass die SEC einen Spot-ETF genehmigen wird. Dieses Argument ist schwer haltbar, da große Börsen wie Binance, FTX, oder BitMart nicht in den USA registriert sind, und kombiniert ein Vielfaches der in den USA beheimateten Börsen an Handelsvolumen umsetzen.
“[T]here’s a lot of work to be done to really protect the investing public.” - Gary Gensler, SEC Chair
> Vorgeschoben wird also bei alledem immer der Schutz der Anleger. Ob dies eine schlüssige Argumentation ist, darf man ruhig in Frage stellen. Denn ein Bitcoin-Spot-ETF würde vielen Anlegern erlauben Bitcoin in ihr Portfolio aufzunehmen, ohne größeren Spekulationen ausgesetzt zu sein, wie das jetzt mit schon zugelassenen Produkten der Fall ist.
Darüber hinaus hat die SEC vielerorts erwähnt, dass sie bestrebt sind, mit Unternehmen aus der Branche einen regulatorisch klaren Weg zu finden, damit Unternehmen ihre Tätigkeiten im Sinne der SEC auszuüben. Das bezieht sich meist auf die Börsen, die nach eigenen Angaben seit Jahren versuchen, einen rechtlichen Rahmen zu schaffen, der ihnen Planungs- und Rechtssicherheit bietet. Dieser Punkt ist später nochmal wichtig. Das Problem hierbei besteht in der Natur dieser Unternehmen. Denn fast ausnahmslos sind alle betroffenen Unternehmen (wie z.B. Coinbase, Kraken, Binance, etc.) keine Bitcoin-Unternehmen, sondern Digital Assets-Unternehmen, die eben auch den Handel mit Shitcoins, Stablecoins und auf diesen Assets basierende Derivate erlauben (und vor allem wollen).
Jetzt wissen wir also, was ein ETF ist. Aber wie schaut der von BlackRock (und damit auch der anderen Finanzdienstleister) vorgeschlagene Bitcoin-Spot-ETF im Detail aus?
### Bitcoin ETF ###
Das von BlackRock vorgeschlagene Produkt, und damit auch die der anderen - wie wir wissen, haben die anderen Anbieter ihre Anträge nachgebessert und dem von BlackRock weitestgehend angepasst - soll das Grantor-Trust-Modell übernehmen und seine Struktur dem von Gold-Investment-Trusts nachempfinden. Das bedeutet, dass der Besitz von Anteilen am Bitcoin-ETF für steuerliche Zwecke dem Besitz des zugrunde liegenden Vermögenswerts gleichkommt. Des Weiteren ist eine Rücknahmefunktion in Form von Sachleistungen vorgesehen. Das bedeutet vereinfacht, dass Anleger ihre Anteile auch direkt in Bitcoin umwandeln können. Anders als bei z.B. GBTC (➡️ [#5 // Block 742956 // GBTC, ETF & SEC](https://www.genexyz.org/post/1722193843734/)), müssen Anteile nicht erst verkauft werden, um mit den (potentiellen) Profiten bitcoins zu kaufen. Denn der Verkauf von Anteilen an GBTC (oder ähnlichen Modellen) führt nämlich ein steuerpflichtiges Ereignis herbei, wohingegen eine Umwandlung im BlackRock Modell steuerfrei zu vollziehen ist.
Aber, und dies ist ein großes ABER, kommen nur autorisierte Kunden von BlackRock in den Genuss dieser Sachrücknahmen (Umwandlungen). D.h., im Wesentlichen können nur große Investmentfirmen mit guter Reputation Anteile in Bitcoin umtauschen, alltägliche Anleger (Depot bei Charles Schwab, der Sparkasse, oder Flatex) hingegen sind nicht in der Lage diesen tollen Steuertrick anzuwenden. Die erzeugt einen Vorhang vorgespielter Transparenz ("natürlich können alle Anteile direkt in 'physische' bitcoins getauscht werden"), wohingegen ein Großteil der zugrundeliegenden bitcoins nicht wirklich eingefordert werden wird.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1737989760152-YAKIHONNES3.gif)
Es sind sich alle einig, dass ein Bitcoin-Spot-ETF ein Winner-takes-all-market ist. Das heisst, der Anbieter, dessen Antrag als erstes von der SEC genehmigt wird, wird uber kurz oder lang den Markt fuer Bitcoin-ETFs fuer sich entscheiden, bzw. beherrschen.
### SEC vs. Binance
Kurz bevor BlackRock ihren Antrag auf einen Bitcoin-Spot-ETF einreichten und damit die SEC in die Schlagzeilen der Finanz- und Bitcoin Welt geriet, machte die SEC in der Bitcoin- und Digital Assets-Welt schon von sich hören, als sie kurz hintereinander gegen Binance und Coinbase Anklage erhob.
https://www.sec.gov/news/press-release/2023-101
Binance ist die zurzeit größte Börse für Digitale Assets der Welt. Binance bietet jedoch nicht nur den Handel mit Krypto-Werten, sondern auch eine Reihe von gehebelten Produkten, eigener Coins und Tokens, usw. an (Shitcoin-Casino).
> “Through thirteen charges, we allege that Zhao and Binance entities engaged in an extensive web of deception, conflicts of interest, lack of disclosure, and calculated evasion of the law.” - Gary Gensler, Chairman, SEC
Vor allem ist Binance kein in den USA registriertes Unternehmen. Lediglich ein Schwesterunternehmen, Binance.us, ist offiziell in den USA registriert und hat offiziell und nach eigenen Angaben mit den Geschäften des Hauptunternehmens direkt nichts zu tun.
Die SEC klagt Binance also nicht nur wegen ihrer Angebote im Krypto-Sektor an, sondern erhebt spezifische Vorwürfe der Irreführung und Täuschung von Kunden, des Betreibens von unregistrierten Börsen, Clearingstellen und Broker-Dealer Aktivitäten, sowie Verstrickungen mit Binance.us (einer Handelsbörse, die wie gesagt offiziell unabhängig von Binance agieren soll), sowie dem Washtrading und dem Verkauf von unregistrierten Wertpapieren (mehr zu dem Thema Securities hier ➡️ [#24 // Block 773750 // Commodity vs. Security](https://www.genexyz.org/post/24-block-773750-commodity-vs-security-2xhjjo/)).
> “We allege that Zhao and the Binance entities not only knew the rules of the road, but they also consciously chose to evade them and put their customers and investors at risk – all in an effort to maximize their own profits.” - Gurbir S. Grewal, Director, SEC’s Division of Enforcement
Die SEC argumentiert also Changpeng Zhao (CEO von Binance) und Binance hätten Anleger über ihre Risikokontrollen und korrupten Handelsvolumina in die Irre geführt und gleichzeitig aktiv verschwiegen, wer der eigentliche Betreiber der Plattform ist. Damit hätten Binance-Plattformen ihren Anlegern übergroße Risiken und Interessenkonflikte beschert.
https://www.reuters.com/investigates/special-report/crypto-binance-money
Darüber hinaus wurde in Folge der Anklageerhebung bekannt, dass es bei Geldflüssen bei Binance einen deutlichen Hinweis auf einen Mangel an internen Kontrollen gibt. Interne Kontrollen sollen normalerweise sicherstellen, dass Kundengelder klar identifizierbar und von den Unternehmenseinnahmen getrennt sind. Eine Vermischung von Anleger- und Geschäftsgeldern gefährdet das Vermögen der Kunden, da deren Verbleib verschleiert wird.
Interessanterweise nutzt die SEC weiterhin die Klageschrift gegen Binance, um das Thema 'unregistrierter' Wertpapiere etwas zu erhellen. Zuvor hatte die SEC sich nur in wenigen Einzelfällen dazu geäußert, welche Digitalen Assets sie als unregistrierte Wertpapiere betrachtet, doch in der Anklageschrift werden SOL, ADA, MATIC, FIL, ATOM, SAND, MANA, ALGO, AXS, COTI, BUSD, and BNB explizit als solche bezeichnet.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738057562553-YAKIHONNES3.png)
Alleine vier der genannten Assets finden sich unter den 10 größten Werten (ausgenommen Stablecoins) und die anderen tummeln sich auch irgendwo in den Top 50. Der aufmerksame Sherlock Holmes wird bemerkt haben, dass es dünn wird für den "kRyPtO"-Markt. Unter den Top 10 bleiben noch 3 Proof-of-Work Coins, von denen einer den [Howey-Test](https://www.genexyz.org/post/24-block-773750-commodity-vs-security-2xhjjo/#:~:text=Produktkategorie%20zuordnen%20lassen.-,Der%20Howey%20Test,-In%20den%20USA) nicht erfüllt (und es ist nicht Doge), Ripple (XRP) und die SEC stehen schon seit 2020 vor Gericht und meiner Meinung nach ist es nur noch eine Frage der Zeit, bis die SEC sich bzgl. Ethereum äußern muss (wird).
### SEC vs. Coinbase
Nur einen Tag nach Veröffentlichung der Pressemitteilung, dass die SEC Anklage gegen Binance erhebe, veröffentlichte die SEC die nächste Pressemitteilung: Die SEC erhebt auch Anklage gegen Coinbase, die größte in den USA registrierte Börse für den Handel mit Digital Assets.
https://www.sec.gov/news/press-release/2023-102
Anders als bei Binance hingegen konzentriert sich die SEC bei der Anklage gegen Coinbase einzig auf den Handel mit unregistrierten Wertpapieren und den damit einhergehenden Dienstleistungen.
> “We allege that Coinbase, despite being subject to the securities laws, commingled and unlawfully offered exchange, broker-dealer, and clearinghouse functions” - Gary Gensler, Chairman, SEC.
Konkret hätten Coinbase gegen bestimmte Registrierungsbestimmungen des Securities Exchange Act und des Securities Act verstoßen. Coinbase hätten seit mindestens 2019 Milliarden Dollar verdient, indem sie den Kauf und Verkauf von unregistrierten Wertpapieren unrechtmäßig erleichtert haben.
Interessant ist, dass die SEC ein weitere Dienstleistung in die Anklage einbaut, die bisher keine Erwähnung gefunden hat: "Darüber hinaus hat Coinbase, wie wir behaupten, sein Staking-as-a-Service-Programm nie gemäß den Wertpapiergesetzen registriert, was den Anlegern erneut wichtige Offenlegungs- und andere Schutzmaßnahmen vorenthält“ (Gensler).
Dies zeigt, dass die SEC, ohne sich bisher explizit zu Ethereum geäußert zu haben, eine Meinung gegenüber Staking vertritt, und zumindest die Bereitstellung von Staking-Services als rechtswidrig erachtet. Dies könnte einer der Gründe sein, dass Ethereum noch nicht ins Rampenlicht gerückt wurde, und zwar, dass die SEC die Anklageschrift gegen die Ethereum-Foundation und damit ein Ungetüm an Financiers (JP Morgan, MasterCard, Consensys, etc.) gründlich vorbereitet, um sich für einen enormen Rechtsstreit wetterfest zu machen. Allerdings scheinen interne Ansichtspunkte und Betrachtungsweisen schon ihren Weg in andere Anklageschriften zu finden.
Darüberhinaus zitiert die SEC mit AXS, CHZ, FLOW, ICP, NEAR, VGX, DASH und NEXO eine weitere Reihe von Shitcoins, die sie als unregistrierte Wertpapiere einstufen und damit den Handel mit selbigen untersagen.
Es gibt immer wieder Erzählungen von Leuten, die mit der Sache betraut sind, dass Coinbase aktiv daran arbeiten, einen gemeinsamen Weg mit der SEC zu finden, das Geschäftsmodell zwischen regulatorisch stabile Leitplanken zu bringen. Oft, wenn diese Erzählungen aus dem Coinbase Camp kommen, heißt es, die SEC sei stur und ließe sich nicht auf die Avancen seitens Coinbase ein. Wiederum andere sagen, dass die SEC schlicht überfordert wäre und Coinbase alles daran läge, schnell eine Lösung zu finden.
> "You simply can’t ignore the rules because you don’t like them or because you’d prefer different ones: the consequences for the investing public are far too great.”
Wenn man allerdings den in der Pressemitteilung zitierten Satz von Gurbir S. Grewal (Director, SEC’s Division of Enforcement) anschaut, wird klar, dass aus Sicht der SEC scheinbar relativ früh und relativ offen kommuniziert wurde, was der rechtliche Rahmen des Möglichen ist. Wahrscheinlich wurden Coinbase auch früh darüber informiert, dass der Handel mit den meisten (oder allen) gelisteten Assets (außer Bitcoin), sowie das Anbieten von Staking als Dienstleistung, nicht mit den Leitplanken konform ist, die die SEC für eine zukünftige, rechtlich stabile Regulatorik des Marktes hält. Doch die freiwillige Einhaltung dieser von der SEC 'lose' formulierten Richtlinien hätte für Coinbase das Wegbrechen von 99% ihres Geschäftsmodells bedeutet.
Coinbase listen über 250 handelbare Assets auf ihrer Seite, viele davon lassen sich 'staken', viele weitere Dienste, die Coinbase anbietet, sind von den darunterliegenden Plattformen abhängig. Es ist klar, dass Coinbase den Moment so lange vor sich herschieben wollten, wie eben nur möglich. Denn während Bitcoin als einziges auf Coinbase gehandeltes Asset deutliche YTD Performance an den Tag legt, sinkt die Zahl der auf der Plattform gehaltenen bitcoins zusehends (gut, endlich begriffen!).
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738057964011-YAKIHONNES3.png)
Diese Woche dann der Beweis. In einem Artikel der [Financial Times](https://www.ft.com/content/1f873dd5-df8f-4cfc-bb21-ef83ed11fb4d) erklärt Brian Armstrong, CEO von Coinbase, dass die SEC klare Empfehlung ausgesprochen hat, schon bevor sie letzten Monat rechtliche Schritte gegen das Unternehmen einleitete.
> “They came back to us, and they said . . . we believe every asset other than bitcoin is a security,” Armstrong said. “And, we said, well how are you coming to that conclusion, because that’s not our interpretation of the law. And they said, we’re not going to explain it to you, you need to delist every asset other than bitcoin.”
Das ergibt absolut Sinn und stützt meine These, dass die SEC gar nicht vor hat 'gegen' Coinbase zu sein. Vielmehr sieht es aus, als würden sie klarstellen wollen, dass es im geltenden Rechtsrahmen durchaus Platz für gewisse Unternehmen gibt, solange diese sich an geltendes Recht halten und nicht wie Binance offensichtlich gängige Gesetze und Regeln umschiffen. Es scheint, als wolle die SEC den 'Markt' schützen, indem sie betrügerische Firmen wie Binance auf Täuschung, Irreführung und Marktmanipulation verklagt. Gleichzeitig handelt sie bei Firmen wie Coinbase wie ein strenger Vater, der eigentlich das Beste für sein Kind möchte, aber nach wiederholten Versuchen der Gesprächsfindung nur noch harte Strafen als geeignetes Mittel sieht.
Aber warum ist der SEC daran gelegen, dass Coinbase rechtskonform und innerhalb der Leitplanken der SEC handelt?
### Neue ETF Anträge mit Hilfe von Coinbase
[![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738058189450-YAKIHONNES3.jpg)](https://substack.com/redirect/0a08f4c1-6a80-4ae1-90b4-1e3199e65ac1?j=eyJ1IjoiODVmMmUifQ.KSVqr9VEuglgUiJQS3NPaAq4rJnlrYsAHCFywdSyl7A)
Laut eines Berichts des Wall Street Journal hat die SEC auf die hereinbrechende Flut von Anträgen für Bitcoin-Spot-ETFs mit Bedenken reagiert. Sie erklärte zunächst, dass es den Anträgen an Klarheit und umfassenden Informationen mangele und diese somit unzureichend seien.
Die SEC hatte schon bei früheren (abgelehnten) Anträgen u.a. ihre Bedenken bezüglich der Überwachung der Handelsplattformen geäußert. Wie oben beschrieben, ist die mögliche Marktmanipulation durch unregulierte Börsen einer der Hauptgründe seitens der SEC gewesen, frühere Anträge abzulehnen. Allerdings war man davon ausgegangen, dass diese Bedenken der SEC durch eine Vereinbarung zur gemeinsamen Überwachung des Marktes durch eine regulierte Spot-Bitcoin-Handelsplattform in Zusammenarbeit mit einem der US-Handelplätze (Nasdaq, NYSE, CBOE, etc.) ausgeräumt werden könnten.
https://www.reuters.com/technology/us-sec-accepts-six-spot-bitcoin-etf-proposals-review-2023-07-19
Dementsprechend teilte die SEC den Börsen (und Antragstellern) mit, dass in den eingereichten Unterlagen wichtige Details bezüglich der genauen Vereinbarung zur gemeinsamen Umsetzung der Überwachungsvorhaben fehlten. Diese Nachricht wurde von vielen Beobachtern als negativ eingestuft: "Die SEC versteht nicht, was hier erreicht werden soll. Die SEC stellt sich quer. Die SEC ist automatisch gegen Bitcoin." war die Essenz der meisten Reaktionen. Allerdings lese ich persönlich die Reaktion der SEC ähnlich, wie auch die Anklageerhebung gegen Coinbase. Die SEC spielt ganz klar nach den eigenen formulierten und klar kommunizierten Regeln und versucht den Mitspielern die Leitplanken aufzuzeigen. Der Tenor scheint klar: "Wir haben euch die Regeln erklärt, nach denen wir mit euch spielen (hört mit der Shitcoinerei auf!). Befolgt diese und wir kommen ins Gespräch."
https://www.theblock.co/post/238944/cboe-reaches-surveillance-agreement-with-coinbase-for-spot-bitcoin-etfs
Wonach die SEC scheinbar explizit zu fragen scheint, ist ein sogenanntes Information-Sharing Agreement (ISA), also eine Vereinbarung zum Informationsaustausch. Diese Vereinbarung zwingt eine Handelsplattform dazu, Handelsdaten bis hin zu persönlichen Informationen wie den Namen und den Adressen der Kunden weiterzugeben. Ein solches ISA scheint bislang in den Anträgen gefehlt zu haben, weshalb die SEC auf die Anträge reagierte und diese als unvollständig zurückwies. Mit der neuen Welle an korrigierten Anträgen scheinen die meisten Antragsteller diese Unvollständigkeit behoben zu haben.
**Und wen listet JEDER der Antragsteller als Partner zum Informationsaustausch? Rate, rate? Richtig, Coinbase!**
Die Chicago Board Options Exchange (CBOE), eine Optionsbörse, die u.a. die Anträge zusammen mit den oben genannten WisdomTree, VanEck, Invesco und ARK stellte, erzielte kurzerhand mit Coinbase eine Einigung über die Bedingungen für den Abschluss eines ISA und reichte alle Anträge mit den neuen Bedingungen erneut ein.
Wie wir also sehen, deutet alles darauf hin, dass die SEC einem Bitcoin-Spot-ETF eigentlich positiv geneigt ist, sollten die Konditionen, die sie stellt, erfüllt sein. Und in Garys perfekter Welt, sehen diese Konditionen vor, dass ein solcher ETF mit Hilfe von Coinbase als Informations-Austauschs-Partner funktioniert, und dass Coinbase ein artiges in den USA börsennotiertes Unternehmen wird, dass keine Shitcoinerei betreibt und sich auf den Spot-Handel mit Bitcoin konzentriert. Denn die derzeit anderen angebotenen Services wie Clearingstellen und Broker-Dealer-Aktivitäten stehen im direkten Gegensatz zu potenziellen Aktivitäten und Interessen von Kunden.
Wir sehen also, dass ein "größerer Plan" hinter den Aktionen der SEC zu stehen scheint. Meiner Meinung nach gibt es verschiedene Theorien und Hinweise, die darauf schließen lassen, dass die SEC a) den Markt regulieren will, bevor sie ein BlackRock-Produkt genehmigt, b) ausländische (und damit nicht leicht regulierbare) Unternehmen aus dem Markt drängen will, um damit Unternehmen wie BlackRock den Handel zu vereinfachen und c) andere Interessengruppen an der Entscheidung der SEC beteiligt zu sein scheinen. Man könnte so weit gehen zu behaupten, dass anhängige Klagen und Untersuchungen ein Stück weit sogar den Kurs drücken und Bitcoin in der allgemeinen Wahrnehmung, als riskant dastehen lassen, was Unternehmen wie Blackrock dabei hilft die nötigen bitcoins zu einem relativ günstigen Preis zu akkumulieren, bevor eine Genehmigung und die implizite Anerkennung von Bitcoins Wert dazu führen, dass der Preis rasant steigt. Dies wäre ein Eingriff in den Wettbewerb und gibt BlackRock et al einen klaren Vorsprung gegenüber anderen Institutionen.
Es gibt unterschiedliche Ansichten darüber, wie Coinbase und die SEC mit dieser Situation umgehen. Einige behaupten, dass Coinbase aktiv nach einer Lösung sucht, um sich mit der SEC auf einen rechtlichen Rahmen zu einigen, während andere sagen, dass die SEC unbeugsam ist. Es wird vermutet, dass die SEC Coinbase frühzeitig darüber informiert hat, welche Regeln und Leitplanken sie für den Markt etablieren möchten.
https://x.com/BitcoinMagazine/status/1679887574934999045
Es scheint, dass die SEC den Markt schützen möchte, indem sie gegen betrügerische Unternehmen wie Binance vorgeht, die gängige Gesetze und Regeln umgehen. Gleichzeitig versucht sie bei Unternehmen wie Coinbase, die sich nicht an die geltenden Vorschriften halten, harte Strafen als Mittel zur Durchsetzung der Regulierung einzusetzen. Das scheint nur logisch, wenn man bedenkt, dass BlackRock und die anderen Antragsteller wie WisdomTree, VanEck, Invesco und ARK sich mit Coinbase auf Bedingungen für den Abschluss eines Informations-Austausch-Abkommens (ISA) geeinigt und die Anträge mit den neuen Bedingungen erneut eingereicht haben.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738311465514-YAKIHONNES3.png)
Dies deutet darauf hin, dass die SEC grundsätzlich positiv gegenüber einem Bitcoin-Spot-ETF eingestellt ist, sofern bestimmte Bedingungen erfüllt sind. Diese Bedingungen könnten beinhalten, dass Coinbase als Informationspartner fungiert und dass Coinbase als in den USA börsennotiertes Unternehmen agiert, das sich auf den Spot-Handel mit Bitcoin konzentriert, während andere Dienstleistungen wie Clearingstellen und Broker-Dealer-Aktivitäten vermieden werden sollen.
https://x.com/stackhodler/status/1691531818300809217
Es scheint, dass die SEC eine umfassendere Strategie verfolgt, die darauf abzielt, den Markt zu regulieren, ausländische Unternehmen zu verdrängen und den Handel für Unternehmen wie BlackRock zu erleichtern.
*Mitte letzten Jahres habe ich in einem Artikel schon Grayscales andauernden Versuch, ihren Closed-End-Fund in einen Bitcoin-Spot-ETF zu verwandeln, beschrieben.*
https://www.genexyz.org/post/1722193843734/
Die SEC hatte bereits im Dezember 2021 und im Februar 2022 die Entscheidung über den Antrag auf einen Bitcoin-ETF verschoben, um ihn "sorgfältig zu prüfen". Dann hat die SEC Mitte Juli 2023 bekanntgegeben, dass einem Antrag auf Umwandlung wieder nicht stattgegeben wird. Grayscale kündigten sofort an, die SEC wegen Willkür und Verstoß gegen das Wertpapierbörsengesetz von 1934 zu verklagen.
Diese Klage wurde dann vor dem Bundesberufungsgericht verhandelt und entschieden.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738568195123-YAKIHONNES3.png)
Das Bundesberufungsgericht in D.C. entschied im Oktober, dass das Ablehnen von Anträgen auf eine Umwandlung in einen ETF seitens Grayscale ungerecht, nicht rechtens und willkürlich sei, da die Aufsichtsbehörde nicht erklären konnte, warum sie zuvor ähnliche Produkte zugelassen hat.
Allerdings bedeutet dies nicht, dass Barry Silbert (CEO von DCG) automatisch den Grayscale Trust in einen ETF umwandeln kann. Der Antrag wandert damit nur zurück auf Garys (Vorsitzender der SEC) Schreibtisch. Und das bedeutet, dass die SEC wieder die Möglichkeit bekommt, einer Umwandlung aufgrund anderer Begründungen nicht stattzugeben. Dazu gleich mehr ⬇️.
Außerdem ist fraglich, ob Barry tatsächlich wirklich eine Umwandlung herbeisehnt, denn momentan befinden sich Grayscale in einer sehr angenehmen Lage, die ihnen erlaubt 2% vom NAV (Net Asset Value) an Gebühren zu verlangen. Was bei einem Vermögen von 624.947 Bitcoin einen jährlichen Umsatz von 12.500 Bitcoin, bzw. 475 Million US Dollar bedeutet - für nichts tun.
Es gibt schon [Kampagnen](https://www.redeemgbtc.com), die für eine Auflösung des Trusts kämpfen. Wer sich über die Umtriebigkeiten bei DCG / Genesis / Grayscale (Barry) ein besseres Bild machen möchte, sollte unbedingt den folgenden Thread lesen:
https://x.com/real_vijay/status/1721385528510251182
### Was seit dem geschah
Seit dem letzten Artikel ist gleichzeitig viel und wenig geschehen. Verinnerlichen wir uns meine These - dass die SEC a) den Markt regulieren will, bevor sie ein BlackRock-Produkt genehmigt, b) ausländische (und damit nicht leicht regulierbare) Unternehmen aus dem Markt drängen will, um damit Unternehmen wie BlackRock den Handel zu vereinfachen und c) andere Interessengruppen an der Entscheidung der SEC beteiligt zu sein scheinen - dann ist genau das passiert, was man erwartet hätte.
Die SEC hat ihre Entscheidung zur Genehmigung der ETF-Anträge wiederholte Male verschoben, momentan sieht es so aus, als würde eine Entscheidung im Januar 2024 fällig.
https://bmpro.substack.com/p/sec-delays-etf-again-despite-warning
Die SEC fällt weiter unliebsame Bäume. Bittrex, eine in den USA ansässige Börse, haben angekündigt, ihre Pforten zu schließen.
https://finance.yahoo.com/news/crypto-exchange-bittrex-global-shuts-054643624.html
Kraken wurde von der SEC verklagt - ähnliches Modell wie auch zuvor bei Binance und Coinbase angewandt (sprich: alles okay und tutti, solange ihr die Shitcoinerei an den Nagel hängt).
https://www.nobsbitcoin.com/kraken-sec-lawsuit
Dabei wurden in der Klageschrift die bereits identifizierten Digitalen Assets, die die SEC als unregistrierte Wertpapiere betrachtet, 1 zu 1 wieder aufgeführt.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738568682951-YAKIHONNES3.jfif)
Doch die größte Überraschung war die diese Woche veröffentlichte Meldung, dass Binance sich in einem Vergleich mit dem US Department of Justice (DOJ) auf eine Zahlung von über 4 Milliarden US Dollar und den Rücktritt CZs (Changpeng Zhao) als CEO von Binance geeinigt habe.
https://www.nobsbitcoin.com/cz-steps-down-as-ceo-of-binance-as-part-of-4-billion-settlement-with-doj
Es ist recht eindeutig, dass es dem Justizministerium (DOJ) hier nicht um den Schutz der Verbraucher geht. Es muss allerdings der Anschein gewahrt werden, dass nicht in Eigeninteresse (dem von BlackRock, hust) gehandelt wird, sondern dass der Eindruck erweckt wird, dass sie tatsächlich etwas Gutes tun, indem sie sich um einen "bad actor" kümmern" - das wird sehr deutlich, wenn man betrachtet, dass sich das Narrativ im Vergleich hauptsächlich auf AML (Anti-Money-Laundering) und Terrorismusfinanzierung konzentriert.
Wie schon aus meiner These ersichtlich, geht auch aus bisherigen Kommentaren der SEC klar hervor, dass die größte Sorge derzeit ausländische Börsen sind, die den Bitcoin-Preis manipulieren können. Binance ist die größte Börse der Welt und hat bis heute erfolgreich außerhalb des Einflussbereichs der US-Regierung operiert. Mit dieser Vereinbarung ist das Problem der Offshore-Kursmanipulation zunächst und zum größten Teil gelöst.
Das BlackRock-SEC-Reptilienmenschen-Playbook ist im vollen Gange. Ausländische Konkurrenz weitestgehend unter Kontrolle ✅
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738568734202-YAKIHONNES3.gif)
Die SEC scheint außerdem im engen Kontakt mit den ETF-Antragstellern zu stehen. Insbesondere ein Verweis auf eine Änderung der Anträge in Bezug auf "cash" vs. "in-kind creation" hat diese Woche für Diskussionen gesorgt.
https://x.com/EricBalchunas/status/1725559994995573086
Viele börsengehandelte Fonds verlangen von den zugelassenen Teilnehmern, dass sie Anteile in Form von Sachleistungen (in-kind) schaffen , d. h. dass sie ETF-Anteile gegen einen Wertpapierkorb und nicht gegen Bargeld (cash) eintauschen. Die SEC hat jedoch auf eine Formulierung in den Anträgen gedrängt, die genau dise cash-creations zulassen.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738568905743-YAKIHONNES3.png)
Während sich viele auf die minutiöse Gestalt der Inhalte stürzen und eine Genehmigung hineininterpretieren, zieht die SEC hier meiner Meinung nach eine Linie, um eine Unterscheidung zwischen Grayscales GBTC und BlackRock et al. zu schaffen.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738568931011-YAKIHONNES3.png)
Wenn man an ein Playbook glaubt, ist der Grayscale Trust den Teilnehmern ein offensichtlicher Dorn im Auge, weshalb eine Umwandlung zunächst verhindert werden will.
Jetzt muss nur noch Coinbase mitspielen. Aber wenn Binance einen Vergleich erzielen kann, warum nicht auch $COIN? Vielleicht einigt sich die SEC mit Coinbase im Gegenzug für "saftige Geldstrafen" und die Entfernung aller Shitcoins von der Plattform. Im Gegenzug erhält Coinbase den Börsenstatus und wird für die Überwachungsvereinbarung mit BlackRock und den anderen Antragstellern freigeschaltet. Auf einen Schlag würde die SEC die Shitcoins von der einzigen börsennotierten US-Börse entfernen und ein legales (nach ihren Vorstellungen und selbst artikulierten Prinzipien) Fundament für BlackRocks ETF schaffen.
Außerdem würde es mich nicht wundern, wenn Coinbase als weißer Ritter auftritt und ganz barmherzig das US-Business von Binance übernimmt. Natürlich nur, um einem Mitstreiter in schwierigen Zeiten beizustehen. Ich packe es auf jeden Fall auf meine Bingo-Karte für den Zeitraum zwischen jetzt und einer Genehmigung der ETF-Anträge.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738568952924-YAKIHONNES3.png)
Durch die Einigung mit CZ und die Geldstrafe von 4,3 Milliarden US Dollar erleichtert die US-Regierung den Transfer von Bitcoin aus schwachen in starke Hände (Binance ➡️ Coinbase). Binance werden Bitcoin verkaufen müssen, um die Geldstrafe zu bezahlen, während gleichzeitig die Spot-ETFs das Angebot mit amerikanischem Kapital auffüllen können. Schöne Ausführung. Tolles Playbook 👏
Ich bin mir bewusst, dass die oben genannten Ereignisse und Auslegungen der Geschehnisse sehr verschwurbelt daherkommen, jedoch möchte ich meinen virtuellen Alu-Hut vor dem Architekten dieses wirklichen langen Long-Games ziehen.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738568978011-YAKIHONNES3.gif)
In der Zwischenzeit arbeiten gewissenhafte Journalisten namhafter Veröffentlichungen (BlackRock PR-Department, hust) daran, die öffentliche Wahrnehmung von Bitcoin zum Positiven zu wenden.
Wurde in den letzten Jahren Bitcoin als riskante Anlage, Klimakiller, Ozean-Kocher, oder schlimmer bezeichnet, wird es jetzt als ein möglicher Bestandteil einer nachhaltigen und zukunftsorientierten Anlagestrategie dargestellt.
https://www.forbes.com/sites/digital-assets/2023/07/08/bitcoin-network-to-reduce-more-emissions-than-its-energy-sources-produce/
Wir (du schlaue/r Leser//in und ich) wissen schon lange, dass die Bitcoin-Branche heute die weltweit am nachhaltigsten betriebene Branche ist und das Bitcoin-Mining als einzige Industrie in dem Bereich kohlenstoffnegativ werden kann. Es ist also offensichtlich, dass Bitcoin ein wichtiger Bestandteil einer nachhaltigen und zukunftsorientierten Anlagestrategie sein kann, aber genau dieses Narrativ wurde jahrelang absichtlich verdrängt (➡️ siehe XRP-gesponsorte [Greenpeace Aktion](https://dailycoin.com/greenpeace-anti-crypto-artist-admits-wrong-on-bitcoin-mining/) anfang des Jahres).
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738569525899-YAKIHONNES3.png)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/2063cd7955cffdca0cc4ae20f77b2b1eb053010e534c18e8ca70222157bd1320/files/1738569536140-YAKIHONNES3.jfif)
Wir sehen also, dass es nicht nur um eine einfache Genehmigung der Anträge geht, sondern viele Mosaikteilchen gelegt werden, bevor es dazu kommen kann. Viele Zeichen deuten darauf hin, dass viele verschiedene Parteien daran arbeiten, ein Umfeld zu schaffen, dass es bestimmten Gruppen ermöglicht, einen ETF möglichst risikofrei und konkurrenzlos zu platzieren. Dabei werden unliebsame Mitspieler vom Platz gewiesen und anderen Mitspielern werden die Spielregeln nochmal ganz bewusst in Erinnerung gerufen, während gleichzeitig ein Narrativ geschaffen wird, das einen Bitcoin-ETF in glänzendem Licht darstellt.
-----------
Es ist nahezu gewiss, dass es nicht die Frage ist, ob einem Antrag zugestimmt wird, sondern vielmehr, wann dies geschehen wird. Es besteht eine hohe Wahrscheinlichkeit, dass allen Anträgen zeitgleich stattgegeben wird. Dennoch lässt sich erkennen, dass die SEC strategisch Zeit gewinnt, um Binance und andere unerwünschte Akteure vollständig aus dem Spiel zu nehmen und Coinbase in der Zwischenzeit zu dem vorbildlichen Mustersohn zu formen, den sie immer haben wollte.
Da der Markt für Spot-ETFs als "Winner-takes-all" gilt, wird darauf geachtet, dass nicht irgendein Antragsteller das Rennen gewinnt, sondern ein bestimmter - Larry. Hierfür ist es notwendig, Barry vom Spielfeld zu verdrängen, da er einen erheblichen Vorsprung hat, woran Gary offensichtlich arbeitet. Falls sich meine Vermutungen bewahrheiten, werden wir in naher Zukunft einen Bitcoin-Spot-ETF sehen, der von BlackRock dominiert wird. Grayscale und Binance werden keine Rolle im Spiel spielen, während Coinbase als reguliertes, vorbildliches US-Unternehmen davon profitieren wird.
🫳🎤
---
In diesem Sinne, 2... 1... Risiko!
![](https://media.tenor.com/images/4ae424f8d8ea36e86169862d84d1b31e/tenor.gif)
-
![](/static/nostr-icon-purple-64x64.png)
@ 961e8955:d7fa53e4
2025-02-03 07:58:25
What is Bitcoin Cash?
Bitcoin is a coin created on the blockchain. It is symbolized by BCH. It is currently one of the most well-known coins in the world. The maximum supply within BCH is limited to 21 million, as Bitcoin is split over the blockchain.
What are the Advantages of Bitcoin Cash?
First of all, it is among the most well-known and traded coins due to its name and infrastructure. Although the fact that Bitcoin is being traded on the blockchain was initially seen as an advantage for him, unfortunately, some of the problems that come with bitcoin have not been resolved.
The biggest difference between Bitcoin Cash and Bitcoin is that the transaction times for BCH are extremely short. In this way, the block capacity was increased and became 8MB.
-
![](/static/nostr-icon-purple-64x64.png)
@ e3ba5e1a:5e433365
2025-02-04 08:29:00
President Trump has started rolling out his tariffs, something I [blogged about in November](https://www.snoyman.com/blog/2024/11/steelmanning-tariffs/). People are talking about these tariffs a lot right now, with many people (correctly) commenting on how consumers will end up with higher prices as a result of these tariffs. While that part is true, I’ve seen a lot of people taking it to the next, incorrect step: that consumers will pay the entirety of the tax. I [put up a poll on X](https://x.com/snoyberg/status/1886035800019599808) to see what people thought, and while the right answer got a lot of votes, it wasn't the winner.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/e3ba5e1a06e11c860036b5c5e688012be2a84760abc066ac34a099535e433365/files/1738657292355-YAKIHONNES3.png)
For purposes of this blog post, our ultimate question will be the following:
* Suppose apples currently sell for $1 each in the entire United States.
* There are domestic sellers and foreign sellers of apples, all receiving the same price.
* There are no taxes or tariffs on the purchase of apples.
* The question is: if the US federal government puts a $0.50 import tariff per apple, what will be the change in the following:
* Number of apples bought in the US
* Price paid by buyers for apples in the US
* Post-tax price received by domestic apple producers
* Post-tax price received by foreign apple producers
Before we can answer that question, we need to ask an easier, first question: before instituting the tariff, why do apples cost $1?
And finally, before we dive into the details, let me provide you with the answers to the ultimate question. I recommend you try to guess these answers before reading this, and if you get it wrong, try to understand why:
1. The number of apples bought will go down
2. The buyers will pay more for each apple they buy, but not the full amount of the tariff
3. Domestic apple sellers will receive a *higher* price per apple
4. Foreign apple sellers will receive a *lower* price per apple, but not lowered by the full amount of the tariff
In other words, regardless of who sends the payment to the government, both taxed parties (domestic buyers and foreign sellers) will absorb some of the costs of the tariff, while domestic sellers will benefit from the protectionism provided by tariffs and be able to sell at a higher price per unit.
## Marginal benefit
All of the numbers discussed below are part of a [helper Google Sheet](https://docs.google.com/spreadsheets/d/14ZbkWpw1B9Q1UDB9Yh47DmdKQfIafVVBKbDUsSIfGZw/edit?usp=sharing) I put together for this analysis. Also, apologies about the jagged lines in the charts below, I hadn’t realized before starting on this that there are [some difficulties with creating supply and demand charts in Google Sheets](https://superuser.com/questions/1359731/how-to-create-a-supply-demand-style-chart).
Let’s say I absolutely love apples, they’re my favorite food. How much would I be willing to pay for a single apple? You might say “$1, that’s the price in the supermarket,” and in many ways you’d be right. If I walk into supermarket A, see apples on sale for $50, and know that I can buy them at supermarket B for $1, I’ll almost certainly leave A and go buy at B.
But that’s not what I mean. What I mean is: how high would the price of apples have to go *everywhere* so that I’d no longer be willing to buy a single apple? This is a purely personal, subjective opinion. It’s impacted by how much money I have available, other expenses I need to cover, and how much I like apples. But let’s say the number is $5.
How much would I be willing to pay for another apple? Maybe another $5. But how much am I willing to pay for the 1,000th apple? 10,000th? At some point, I’ll get sick of apples, or run out of space to keep the apples, or not be able to eat, cook, and otherwise preserve all those apples before they rot.
The point being: I’ll be progressively willing to spend less and less money for each apple. This form of analysis is called *marginal benefit*: how much benefit (expressed as dollars I’m willing to spend) will I receive from each apple? This is a downward sloping function: for each additional apple I buy (quantity demanded), the price I’m willing to pay goes down. This is what gives my personal *demand curve*. And if we aggregate demand curves across all market participants (meaning: everyone interested in buying apples), we end up with something like this:
![Demand curve before tax](https://www.snoyman.com/img/who-pays-tax/demand-before-tariff.png)
Assuming no changes in people’s behavior and other conditions in the market, this chart tells us how many apples will be purchased by our buyers at each price point between $0.50 and $5. And ceteris paribus (all else being equal), this will continue to be the demand curve for apples.
## Marginal cost
Demand is half the story of economics. The other half is supply, or: how many apples will I sell at each price point? Supply curves are upward sloping: the higher the price, the more a person or company is willing and able to sell a product.
Let’s understand why. Suppose I have an apple orchard. It’s a large property right next to my house. With about 2 minutes of effort, I can walk out of my house, find the nearest tree, pick 5 apples off the tree, and call it a day. 5 apples for 2 minutes of effort is pretty good, right?
Yes, there was all the effort necessary to buy the land, and plant the trees, and water them… and a bunch more than I likely can’t even guess at. We’re going to ignore all of that for our analysis, because for short-term supply-and-demand movement, we can ignore these kinds of *sunk costs*. One other simplification: in reality, supply curves often start descending before ascending. This accounts for achieving efficiencies of scale after the first number of units purchased. But since both these topics are unneeded for understanding taxes, I won’t go any further.
Anyway, back to my apple orchard. If someone offers me $0.50 per apple, I can do 2 minutes of effort and get $2.50 in revenue, which equates to a $75/hour wage for me. I’m more than happy to pick apples at that price\!
However, let’s say someone comes to buy 10,000 apples from me instead. I no longer just walk out to my nearest tree. I’m going to need to get in my truck, drive around, spend the day in the sun, pay for gas, take a day off of my day job (let’s say it pays me $70/hour). The costs go up significantly. Let’s say it takes 5 days to harvest all those apples myself, it costs me $100 in fuel and other expenses, and I lose out on my $70/hour job for 5 days. We end up with:
* Total expenditure: $100 \+ $70 \* 8 hours a day \* 5 days \== $2900
* Total revenue: $5000 (10,000 apples at $0.50 each)
* Total profit: $2100
So I’m still willing to sell the apples at this price, but it’s not as attractive as before. And as the number of apples purchased goes up, my costs keep increasing. I’ll need to spend more money on fuel to travel more of my property. At some point I won’t be able to do the work myself anymore, so I’ll need to pay others to work on the farm, and they’ll be slower at picking apples than me (less familiar with the property, less direct motivation, etc.). The point being: at some point, the number of apples can go high enough that the $0.50 price point no longer makes me any money.
This kind of analysis is called *marginal cost*. It refers to the additional amount of expenditure a seller has to spend in order to produce each additional unit of the good. Marginal costs go up as quantity sold goes up. And like demand curves, if you aggregate this data across all sellers, you get a supply curve like this:
![Supply curve before tariff](https://www.snoyman.com/img/who-pays-tax/supply-before-tariff.png)
## Equilibrium price
We now know, for every price point, how many apples buyers will purchase, and how many apples sellers will sell. Now we find the equilibrium: where the supply and demand curves meet. This point represents where the marginal benefit a buyer would receive from the next buyer would be less than the cost it would take the next seller to make it. Let’s see it in a chart:
![Supply and demand before tariff](https://www.snoyman.com/img/who-pays-tax/supply-demand-before-tariff.png)
You’ll notice that these two graphs cross at the $1 price point, where 63 apples are both demanded (bought by consumers) and supplied (sold by producers). This is our equilibrium price. We also have a visualization of the *surplus* created by these trades. Everything to the left of the equilibrium point and between the supply and demand curves represents surplus: an area where someone is receiving something of more value than they give. For example:
* When I bought my first apple for $1, but I was willing to spend $5, I made $4 of consumer surplus. The consumer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and above the equilibrium price point.
* When a seller sells his first apple for $1, but it only cost $0.50 to produce it, the seller made $0.50 of producer surplus. The producer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and below the equilibrium price point.
Another way of thinking of surplus is “every time someone got a better price than they would have been willing to take.”
OK, with this in place, we now have enough information to figure out how to price in the tariff, which we’ll treat as a negative externality.
## Modeling taxes
Alright, the government has now instituted a $0.50 tariff on every apple sold within the US by a foreign producer. We can generally model taxes by either increasing the marginal cost of each unit sold (shifting the supply curve up), or by decreasing the marginal benefit of each unit bought (shifting the demand curve down). In this case, since only some of the producers will pay the tax, it makes more sense to modify the supply curve.
First, let’s see what happens to the foreign seller-only supply curve when you add in the tariff:
![Foreign supply shift from tariff](https://www.snoyman.com/img/who-pays-tax/supply-tariff-shift.png)
With the tariff in place, for each quantity level, the price at which the seller will sell is $0.50 higher than before the tariff. That makes sense: if I was previously willing to sell my 82nd apple for $3, I would now need to charge $3.50 for that apple to cover the cost of the tariff. We see this as the tariff “pushing up” or “pushing left” the original supply curve.
We can add this new supply curve to our existing (unchanged) supply curve for domestic-only sellers, and we end up with a result like this:
![Supply curves post tariff](https://www.snoyman.com/img/who-pays-tax/supply-curves-post-tariff.png)
The total supply curve adds up the individual foreign and domestic supply curves. At each price point, we add up the total quantity each group would be willing to sell to determine the total quantity supplied for each price point. Once we have that cumulative supply curve defined, we can produce an updated supply-and-demand chart including the tariff:
![Supply and demand post tariff](https://www.snoyman.com/img/who-pays-tax/supply-demand-post-tariff.png)
As we can see, the equilibrium has shifted:
* The equilibrium price paid by consumers has risen from $1 to $1.20.
* The total number of apples purchased has dropped from 63 apples to 60 apples.
* Consumers therefore received 3 less apples. They spent $72 for these 60 apples, whereas previously they spent $63 for 3 more apples, a definite decrease in consumer surplus.
* Foreign producers sold 36 of those apples (see the raw data in the linked Google Sheet), for a gross revenue of $43.20. However, they also need to pay the tariff to the US government, which accounts for $18, meaning they only receive $25.20 post-tariff. Previously, they sold 42 apples at $1 each with no tariff to be paid, meaning they took home $42.
* Domestic producers sold the remaining 24 apples at $1.20, giving them a revenue of $28.80. Since they don’t pay the tariff, they take home all of that money. By contrast, previously, they sold 21 apples at $1, for a take-home of $21.
* The government receives $0.50 for each of the 60 apples sold, or in other words receives $30 in revenue it wouldn’t have received otherwise.
We could be more specific about the surpluses, and calculate the actual areas for consumer surplus, producer surplus, inefficiency from the tariff, and government revenue from the tariff. But I won’t bother, as those calculations get slightly more involved. Instead, let’s just look at the aggregate outcomes:
* Consumers were unquestionably hurt. Their price paid went up by $0.20 per apple, and received less apples.
* Foreign producers were also hurt. Their price received went down from the original $1 to the new post-tariff price of $1.20, minus the $0.50 tariff. In other words: foreign producers only receive $0.70 per apple now. This hurt can be mitigated by shifting sales to other countries without a tariff, but the pain will exist regardless.
* Domestic producers scored. They can sell less apples and make more revenue doing it.
* And the government walked away with an extra $30.
Hopefully you now see the answer to the original questions. Importantly, while the government imposed a $0.50 tariff, neither side fully absorbed that cost. Consumers paid a bit more, foreign producers received a bit less. The exact details of how that tariff was split across the groups is mediated by the relevant supply and demand curves of each group. If you want to learn more about this, the relevant search term is “price elasticity,” or how much a group’s quantity supplied or demanded will change based on changes in the price.
## Other taxes
Most taxes are some kind of a tax on trade. Tariffs on apples is an obvious one. But the same applies to income tax (taxing the worker for the trade of labor for money) or payroll tax (same thing, just taxing the employer instead). Interestingly, you can use the same model for analyzing things like tax incentives. For example, if the government decided to subsidize domestic apple production by giving the domestic producers a $0.50 bonus for each apple they sell, we would end up with a similar kind of analysis, except instead of the foreign supply curve shifting up, we’d see the domestic supply curve shifting down.
And generally speaking, this is what you’ll *always* see with government involvement in the economy. It will result in disrupting an existing equilibrium, letting the market readjust to a new equilibrium, and incentivization of some behavior, causing some people to benefit and others to lose out. We saw with the apple tariff, domestic producers and the government benefited while others lost.
You can see the reverse though with tax incentives. If I give a tax incentive of providing a deduction (not paying income tax) for preschool, we would end up with:
* Government needs to make up the difference in tax revenue, either by raising taxes on others or printing more money (leading to inflation). Either way, those paying the tax or those holding government debased currency will pay a price.
* Those people who don’t use the preschool deduction will receive no benefit, so they simply pay a cost.
* Those who do use the preschool deduction will end up paying less on tax+preschool than they would have otherwise.
This analysis is fully amoral. It’s not saying whether providing subsidized preschool is a good thing or not, it simply tells you where the costs will be felt, and points out that such government interference in free economic choice does result in inefficiencies in the system. Once you have that knowledge, you’re more well educated on making a decision about whether the costs of government intervention are worth the benefits.
-
![](/static/nostr-icon-purple-64x64.png)
@ b17fccdf:b7211155
2025-02-01 18:41:27
#### **Next new resources about the MiniBolt guide have been released**:
---
* 🆕 **Roadmap**: [LINK](https://github.com/orgs/minibolt-guide/projects/1)
* 🆕 **Dynamic Network map**: [LINK](https://app.diagrams.net/?tags={}&lightbox=1&target=blank&highlight=0000ff&edit=_blank&layers=1&nav=1&title=networkmap.drawio.png#Uhttps://raw.githubusercontent.com/minibolt-guide/minibolt/main/resources/networkmap.drawio.png)
* 🆕 **Nostr community**: [LINK](https://habla.news/c/[n]addr1qqyy66twd9px7mr5qyf8wumn8ghj7mmxve3ksctfdch8qatzqgstzl7vmurm5gu87qutx3pxwgxddrg39huj809zhmv03scfkus3z4grqsqqpphk2j0aff) < ~ REMOVE the "[]" symbols from the URL (naddr...) to access
* 🆕 **Linktr FOSS** (UC) by [Gzuuus](nostr:npub1gzuushllat7pet0ccv9yuhygvc8ldeyhrgxuwg744dn5khnpk3gs3ea5ds): [LINK](https://linktr.minibolt.info)
* 🆕 **Donate webpage**: 🚾 [Clearnet LINK](https://donate.minibolt.info) || 🧅 [Onion LINK](http://3iqm7nidexns5p6wmgc23ibgiscm6rge7hwyeziviwgav4fl7xui4mqd.onion/apps/Li3AtEGDsqNmNddv6rX69taidm3/pos)
* 🆕 **Contact email**: [hello@minibolt.info](mailto:hello@minibolt.info)
---
Enjoy it MiniBolter! 💙
-
![](/static/nostr-icon-purple-64x64.png)
@ 9e69e420:d12360c2
2025-02-01 11:16:04
![video]( https://service-pkgabcnews.akamaized.net/opp/hls/abcnews/2025/01/250128_abcnl_2p_dei_manager_hewlett_,500,800,1200,1800,2500,3200,4500,.mp4.csmil/playlist.m3u8)
Federal employees must remove pronouns from email signatures by the end of the day. This directive comes from internal memos tied to two executive orders signed by Donald Trump. The orders target diversity and equity programs within the government.
![image]( https://i.abcnewsfe.com/a/10eaacfd-9837-4b55-99a1-d3146c35cd3b/donald-trump-5-rt-gmh-250131_1738335513877_hpMain.jpg)
CDC, Department of Transportation, and Department of Energy employees were affected. Staff were instructed to make changes in line with revised policy prohibiting certain language.
One CDC employee shared frustration, stating, “In my decade-plus years at CDC, I've never been told what I can and can't put in my email signature.” The directive is part of a broader effort to eliminate DEI initiatives from federal discourse.
-
![](/static/nostr-icon-purple-64x64.png)
@ e7bc35f8:3ed2a7cf
2025-02-03 07:37:44
In a striking contrast of ideals versus actions, former U.S. Secretary of State Hillary Clinton was recently awarded the Medal of Freedom. Yet, it is impossible to forget [what happened in February 2011](https://youtu.be/grFWkyXPfxk), when ex-CIA analyst and well-known dissident Ray McGovern was violently removed by security while silently protesting one of Clinton’s speeches at George Washington University. McGovern’s only act of defiance was standing up and turning his back to Clinton in protest of America’s ongoing wars of aggression. The incident, which unfolded under Clinton’s watch, stands as a stark reminder of the selective nature of so-called freedom and democracy.
The irony of the moment was profound. Clinton's speech [that day](http://www.state.gov/secretary/rm/2011/02/156619.htm) was ostensibly about the brave individuals in Egypt who had stood up against authoritarian rule, using the internet to organize their dissent. The same U.S. government that praised online activism abroad seemed intolerant of peaceful, silent protest within its own borders.
Over the past two decades, mainstream media has pushed a narrative that social media platforms like [Twitter](https://youtu.be/BYSchIVpEJ8), [Facebook](https://youtu.be/UoRspCp5Xn0), and [YouTube ](https://youtu.be/ja-tbqN5-Jk)have played an instrumental role in shaping revolutions and uprisings across the world. From Moldova and Iran to Egypt and Tunisia, reporters with little on-the-ground knowledge have eagerly proclaimed these digital platforms as revolutionary tools of democracy. The only problem? This oft-repeated story is largely[ a myth](https://youtu.be/pFGSplRR7oI).
While journalistic laziness explains some of this exaggeration—reporters compiling their stories from hotel rooms rather than gathering firsthand accounts—the truth runs much deeper. The idea of a "social media revolution" has been deliberately constructed by U.S. State Department-linked NGOs with vested interests in overthrowing governments that do not align with Washington’s geopolitical agenda.
One of the key figures in shaping this narrative is [Evgeny Morozov](https://www.opensocietyfoundations.org/grants/open-society-fellowship?fellow=evgeny-morozov), a former fellow of George Soros’ Open Society Institute and a visiting scholar at Stanford University. Morozov pioneered the concept of the "Twitter Revolution" during the [2009 Moldovan protests](https://slate.com/technology/2012/01/anti-vaccine-activists-9-11-deniers-and-googles-social-search.html), arguing that social media facilitated "flash mobs" and "huge mobilization efforts" against authoritarian regimes. His language, promoted in publications like [Foreign Policy](https://foreignpolicy.com/2009/04/07/moldovas-twitter-revolution/), [The Economist](https://web.archive.org/web/20150504011512/http://www.economist.com/node/12815678?story_id=12815678), and [openDemocracy](https://www.opendemocracy.net/en/the-alternatives-alternative/), laid the foundation for the media’s portrayal of networked protests.
However, even Morozov was forced to later acknowledge flaws in his argument. [He admitted](https://foreignpolicy.com/2009/04/07/more-analysis-of-twitters-role-in-moldova/) that at the time of the so-called "Twitter Revolution" in Moldova, there were only about 70 registered Twitter users in the entire country. Despite this glaring inconsistency, the Western media ran with the story.
The same pattern repeated in the 2009 Iranian unrest, where an alleged flood of 30,000 tweets provided live updates on the protests. [Most of these tweets](https://mashable.com/archive/twitter-iran-election), however, were in English and were posted by newly registered accounts with identical profile pictures—hardly the grassroots digital uprising the media portrayed. Notably, [Israeli news outlets](https://web.archive.org/web/20090714235359/https://chartingstocks.net/wp-content/uploads/2009/06/jpost.jpg) began covering these "tweets" almost immediately, [raising questions](https://web.archive.org/web/20090619154321/http://www.chartingstocks.net/2009/06/proof-israeli-effort-to-destabilize-iran-via-twitter/) about external orchestration.
Similarly, during the Arab Spring, social media was widely credited for fueling protests in Egypt, Tunisia, and Yemen. Yet, the data tells a different story. At the height of these uprisings, the combined number of [Twitter users](https://mashable.com/archive/egypt-twitter-infographic) in those three countries was under 15,000. [Facebook](https://www.theguardian.com/technology/blog/2010/jul/22/facebook-countries-population-use#data), while more widespread, still had only a 4.5% penetration rate in Egypt by mid-2010—dwarfed by the reach of television networks.
Even those who originally championed the "social media revolution" have had to admit that the phenomenon was blown out of proportion. What they refuse to acknowledge, however, is the strategic motivation behind these uprisings. Who benefits from these revolutions, and whose interests do they ultimately serve?
At a [2010 Berlin conference](https://youtu.be/yQ1b67Noy9w), Morozov conspicuously avoided addressing these critical questions. His silence speaks volumes. [The reality is](https://youtu.be/LAlbajRFgUE) that "social media revolutions" are often less about organic uprisings and more about the West’s longstanding practice of using digital tools as part of broader regime-change strategies.
In 2011, for instance, the U.S. State Department funded Psiphon, an online encryption system designed to help users bypass government firewalls. This technology was distributed in Syria, conveniently aiding opposition forces at a time when the U.S. was actively working to destabilize the Assad government. Yet, when Syria was later found using U.S.-developed internet filtering technology, it was condemned for [violating American trade laws](https://web.archive.org/web/20120522162400/https://arabiangazette.com/syria-violating-trade-laws/).
The most glaring hypocrisy is that while U.S. officials champion the internet as a tool for democracy in foreign countries, they simultaneously push for more restrictive internet laws at home. In 2011, Senator Joe Lieberman openly discussed using internet filtering technology to regulate American citizens’ access to information—ironically sounding much like the authoritarian leaders Washington claims to oppose.
This contradiction exposes the true nature of the social media revolution myth. Far from being an organic expression of people’s will, it is often just another weapon in the arsenal of Western powers seeking to manipulate and destabilize governments that refuse to align with their interests. [The very same politicians](https://web.archive.org/web/20130919221400/https://youtube.com/watch?v=OBB1S86_yBY) who praise internet activists in Iran or Syria are the ones clamping down on online freedoms in their own countries.
The story of social media as a revolutionary force is not one of grassroots activism triumphing over oppression. Instead, it is a carefully crafted narrative, used to justify interventionist policies and promote regime change under the guise of "democracy promotion." As history has repeatedly shown, the beneficiaries of these so-called revolutions are rarely the people on the ground—but rather, the geopolitical architects pulling the strings from afar.
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-03 06:14:42
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/874266
-
![](/static/nostr-icon-purple-64x64.png)
@ a012dc82:6458a70d
2025-02-03 02:42:01
In the contemporary world, where the balance between technological advancement and environmental sustainability is increasingly crucial, Marathon Digital Holdings has emerged as a trailblazer in the Bitcoin mining industry. Their latest venture, utilizing methane gas from landfill waste to power Bitcoin mining operations, is not just a technological leap but also a significant stride towards eco-friendly practices in a sector often scrutinized for its environmental impact. This initiative represents a fusion of environmental stewardship with the burgeoning field of cryptocurrency, potentially setting a new standard for energy use in digital currency mining. It's a bold move that could reshape perceptions of the industry, demonstrating that environmental consciousness and technological progress can coexist harmoniously.
**Table Of Content**
- The Genesis of the Project
- The Process and Technology
- The Broader Impact
- Conclusion
- FAQs
**The Genesis of the Project**
**A Partnership for Sustainability**
Marathon Digital's collaboration with Nodal Power marks a pivotal moment in the pursuit of sustainable cryptocurrency mining. The 280 kilowatt (kW) pilot project in Utah is more than just a test of feasibility; it's a beacon of innovation in an industry traditionally powered by conventional, often non-renewable, energy sources. This partnership reflects a growing awareness within the crypto mining community about the importance of sustainable practices. It's a forward-thinking approach, blending the expertise of a leading Bitcoin mining company with the innovative energy solutions of a renewable energy firm, setting a precedent for future collaborations in the industry.
**Addressing Environmental Concerns**
The project's focus on methane gas, a potent greenhouse gas, underscores a proactive approach to environmental stewardship. By targeting methane emissions from landfills, Marathon is addressing a critical environmental issue. Methane is not only a significant contributor to global warming but also represents a wasted resource when emitted into the atmosphere. This initiative is a response to increasing global concerns about climate change and environmental degradation. It's a strategy that aligns with international efforts to reduce greenhouse gas emissions and demonstrates Marathon's commitment to playing a role in the global fight against climate change.
**The Process and Technology**
**Innovative Conversion of Methane to Electricity**
The technology behind converting methane to electricity is a cornerstone of this project. The process involves sophisticated systems that capture methane emissions efficiently and convert them into a usable form of energy. This technology is not just a testament to human ingenuity but also a crucial step towards making renewable energy more accessible and practical for industrial applications like Bitcoin mining. The success of this technology could have far-reaching implications, potentially revolutionizing how we think about waste management and energy production.
**A Step Towards Green Bitcoin Mining**
Marathon's initiative is a significant leap in the journey towards green Bitcoin mining. It's a project that challenges the status quo, proving that renewable energy can be a viable alternative to traditional power sources in the energy-intensive process of mining cryptocurrencies. This approach could inspire a wave of innovation in the sector, encouraging other companies to explore renewable energy options. The project is not just about reducing the environmental footprint of Bitcoin mining; it's about reimagining the future of energy use in the digital age.
**The Broader Impact**
**Potential for Industry-Wide Change**
The implications of Marathon's project extend far beyond its immediate environmental benefits. It has the potential to catalyze a paradigm shift in the cryptocurrency mining industry. If successful, this project could serve as a model for other companies, demonstrating the practicality and benefits of sustainable mining practices. It could inspire a wave of innovation, leading to more widespread adoption of renewable energy sources in the industry, and potentially, a redefinition of what it means to be a responsible player in the digital currency space.
**Environmental and Economic Benefits**
The project is not just an environmental initiative; it's also an economically strategic move. By tapping into methane from landfills, Marathon could significantly reduce its operational costs. This approach provides a dual benefit: it mitigates the environmental impact of Bitcoin mining and offers a potentially more cost-effective energy solution. This economic incentive could be a key driver in encouraging wider adoption of similar practices across the industry, leading to a more sustainable and economically viable future for cryptocurrency mining.
**Conclusion**
Marathon Digital's pilot project in Utah is more than just an experiment in sustainable Bitcoin mining; it's a visionary step towards a new era in the industry. By harnessing methane gas from landfills to power their operations, Marathon is not only setting a new benchmark for environmental responsibility but also showcasing the untapped potential of renewable energy in reducing the carbon footprint of cryptocurrency mining. This bold experiment is a beacon of hope and innovation, suggesting a future where technological advancement and environmental sustainability are not mutually exclusive but are instead intertwined elements of a more responsible and forward-thinking industry.
**FAQs**
**What is Marathon Digital's new project about?**
Marathon Digital has launched a pilot project in Utah, using methane gas from landfill waste to power Bitcoin mining operations.
**Why is using methane for Bitcoin mining significant?**
Methane is a potent greenhouse gas, and using it for mining reduces environmental impact and utilizes a renewable energy source.
**Who is Marathon Digital partnering with for this project?**
Marathon Digital has partnered with Nodal Power, a firm specializing in renewable energy assets.
**What are the potential benefits of this project?**
The project aims to reduce greenhouse gas emissions, lower energy costs, and set a precedent for sustainable practices in cryptocurrency mining.
**How does this project impact the Bitcoin mining industry?**
Marathon's initiative could inspire other companies to adopt renewable energy sources, potentially leading to a more sustainable and economically viable mining industry.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
*DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.*
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-03 02:19:03
# At-Risk Groups Are Facing A Battle For Their Rights
Privacy. It’s a word we often take for granted, scrolling through our phones and sharing photos without a second thought. But for certain groups—those at risk due to their identities, beliefs, or circumstances—privacy isn’t just a luxury; it’s a lifeline. In today’s world, where governments, corporations, and even our own social media accounts seem to have a vested interest in collecting and selling our data, the fight for privacy has never been more crucial.
Privacy is not a buzzword but a fundamental human right. We can do more to protect those who need it most.
---
### Privacy As A Human Right
The concept of privacy is deeply rooted in our basic human rights. It’s not just about keeping your medical records confidential or hiding your bank statements; it’s about the right to control what others can know about you. For individuals who identify as LGBTQ+, immigrants, journalists, or political dissidents, this right is even more fragile.
Recently, we’ve seen a rise in policies that seem designed to strip away these protections. From the Trump administration’s transgender ban on military service and passport changes to the targeting of journalists and activists, the message is clear: certain groups are considered fair game for scrutiny and control.
These actions are about erasing the autonomy of individuals to live their lives without fear of retribution or discrimination. Privacy isn’t just a feel-good concept; it’s the cornerstone of a individuals liberty. We must ensure that no one’s rights can be arbitrarily taken away, especially the right to privacy.
---
### The Attack On Vulnerable Groups
The targeting of at-risk groups has reached a fever pitch in recent months:
1. **Transgender Rights Under Fire**
The Trump administration has issued a sweeping executive order that effectively erased recognition of transgender individuals’ rights. This included changes to passport policies that required individuals to declare their gender at birth, making it nearly impossible for trans individuals to update their documents without facing extreme scrutiny or even denial.
These actions don’t just impact transgender people; they send a chilling message to the entire LGBTQ+ community.
2. **Free Speech And Political Dissent**
Trump’s Free Speech Executive Order, aimed to protect citizens’ right to express their beliefs. However, critics argue it was more about silencing dissenters. Journalists, activists, and even private citizens have faced increasing pressure from government officials to either comply with certain views or face professional consequences.
“Free speech is a double-edged sword,” noted one legal expert. “When the government uses it as a tool to marginalize certain groups, it becomes a weapon rather than a shield.”
3. **Media And Press Freedom**
Trump’s ongoing battles with major media outlets are well-documented. From labeling reporters as “fake news” to pushing for laws that would limit press freedom, the administration has made it clear that journalists and news organizations are not above scrutiny. For independent journalists and investigative reporters, this poses a significant threat to their work and safety.
4. **Immigrant Rights And Discrimination**
The Trump administration’s harsh immigration policies have had a devastating impact on vulnerable communities. From family separations to the expansion of surveillance in immigrant-heavy areas, these actions have left many feeling exposed and unsafe. Immigrants, particularly those from Latin America and the Middle East, are increasingly targeted for their perceived alignments with political rhetoric.
---
### The Consequences Of Losing Privacy
When privacy is stripped away, it doesn’t just affect individuals—it affects entire communities. For transgender individuals, the fear of being “outted” online or facing discrimination at work is a daily reality. For journalists, the threat of government retribution can lead to self-censorship and an inability to hold power accountable. For immigrants, the risk of deportation or surveillance means constant vigilance—and often, no recourse.
These consequences are not just personal; they’re systemic. When certain groups are deemed unworthy of protection, it sets a dangerous precedent for what’s allowed in society. It sends the message that some lives matter less than others, and that the government can act with impunity. If you are not in one of these currently impacted groups just give it time and eventually they will come for you too.
---
### The Fight For Privacy: What We Can Do
The good news is that we don’t have to sit idly by while this happens. There are steps we can take to fight for privacy as a fundamental right. Here’s how:
1. **Advocate For Stronger Protections**
Governments at all levels need to pass and enforce laws that protect privacy, especially for vulnerable groups. This includes everything from data protection legislation to anti-discrimination policies.
2. **Support Independent Journalism**
Journalists are on the front lines of this fight, uncovering corruption and holding power accountable. Support independent media outlets and platforms that prioritize transparency and press freedom.
3. **Educate And Empower**
Communities under threat need resources to protect themselves. This includes education on their rights, know how and tools to secure their data, and access to legal support when needed.
4. **Use Your Voice**
Speak out against policies that erode privacy and target vulnerable groups. Use your actions to protect yourself and others.
5. **Demand Accountability**
When governments overreach, they need to be held accountable. Fight for yours and others rights.
---
### Privacy Is A Fight Worth Winning
Privacy isn’t just about convenience or comfort—it’s about freedom, autonomy, and the right to live without fear of arbitrary control. For at-risk groups, this is not just a luxury; it’s a lifeline. As we move forward in this uncertain era, let’s remember that the fight for privacy is not over— it’s just beginning.
We all have a role to play in protecting those who need it most. So let’s get to work.
-
![](/static/nostr-icon-purple-64x64.png)
@ fd78c37f:a0ec0833
2025-02-03 00:23:23
🔹 Pre-event buzz: Even before the event started, numerous calls came in to confirm the venue and ask if they could bring friends along. Upon arrival, many young attendees were eager to learn more about YakiHonne, reflecting the excitement and anticipation surrounding the meetup.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1738541689982-YAKIHONNES3.jpg)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1738541756041-YAKIHONNES3.jpg)
🔹 Engaging discussions: The event kicked off with an introduction to Nostr and YakiHonne’s core principles, sparking insightful conversations about what it truly means to have a decentralized social media platform.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1738541809775-YAKIHONNES3.jpg)
🔹 Deep dive: Attendees raised many questions, particularly about YakiHonne’s decentralization model. The concept resonated with many, and a large number of participants expressed their support and interest in becoming part of the YakiHonne ecosystem in the future.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1738542018751-YAKIHONNES3.jpg)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1738542055591-YAKIHONNES3.jpg)
The meetup wrapped up with light refreshments 🍹, networking 🤝, and a photo session 📸. Even after the event officially ended, conversations continued as people stayed behind to connect and explore further possibilities ✨.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1738542126807-YAKIHONNES3.jpg)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/fd78c37f13c3a9d5bce80dc3278d529ba908e5119e90f9131905c5a5a0ec0833/files/1738542137320-YAKIHONNES3.jpg)
YakiHonne Meetup was more than just a gathering—it was a step forward in shaping the future of decentralized social media! 🚀
#YakiHonne #Nostr #DecentralizedSocialMedia
-
![](/static/nostr-icon-purple-64x64.png)
@ ae6ce958:d0f02c7d
2025-02-02 23:56:18
**Authors**: DamageBDD Research Team
**Date**: February 2025
#### **Abstract**
This paper presents a formal multidimensional analysis of the profitability and systemic impact of operating a DamageBDD node, considering two distinct yet synergistic roles: (1) **BDD Maintainer**, responsible for writing and verifying behavioral-driven development (BDD) test cases, and (2) **Node Runner**, responsible for hosting, validating, and distributing DamageBDD verification data. The study explores the economic viability, systemic benefits, and broader implications for software development efficiency and human potential. We argue that DamageBDD does not merely represent an alternative testing infrastructure but also serves as an incentive structure that unlocks latent human capital through verifiable, high-impact contributions.
---
## **1. Introduction**
The software industry increasingly relies on automated testing to ensure system reliability and security. However, traditional models of test validation suffer from inefficiencies due to lack of **verifiable accountability**, reliance on centralized test infrastructure, and difficulty in aligning developer incentives.
DamageBDD introduces a **market-driven verification layer** that decentralizes and incentivizes **test-driven software development**. By distributing both verification and governance via a **blockchain-based testing economy**, DamageBDD enables **trustless BDD validation**. Two primary participants define this ecosystem:
1. **BDD Maintainers** – Developers and testers who write and maintain test cases to ensure software correctness.
2. **Node Runners** – Operators who maintain DamageBDD nodes to execute, verify, and immutably record test results.
This study examines the **profitability, scalability, and systemic value** of each role while exploring how this model **unlocks testing infrastructure and human potential** in a way that traditional systems do not.
---
## **2. Multidimensional Profitability Analysis**
We evaluate profitability using a **multidimensional framework** across the following key dimensions:
- **Economic Profitability** (direct financial rewards)
- **Computational Efficiency** (resource costs and hardware scalability)
- **Network Effects** (interoperability and systemic adoption)
- **Human Capital Optimization** (learning curve, skill growth, and long-term impact)
### **2.1 Economic Profitability**
#### **BDD Maintainer**
BDD Maintainers earn **sats for verifiable test contributions**. Their work is directly compensated based on the number of **successful test verifications** executed on the DamageBDD network. The economic incentives align with:
- **Quality over Quantity** – High-quality, reusable BDD tests accrue more long-term revenue.
- **Compounding Value** – A well-maintained test suite continues to generate revenue as projects grow.
#### **Node Runner**
Node Runners monetize **test execution and validation services** by processing and storing test results. Profitability derives from:
- **Transaction Fees** – Runners earn sats per executed and verified test case.
- **Reputation Score** – Higher-ranked nodes process more verifications, generating greater earnings.
- **Liquidity Pools** – Nodes can facilitate instant **Lightning Network payouts** for successful tests, further increasing earnings via transaction flow.
### **2.2 Computational Efficiency**
While mining Bitcoin is an **energy-intensive, zero-sum competition**, DamageBDD nodes optimize for **computational efficiency** rather than brute-force expenditure.
- **BDD Maintainer Efficiency** – Writing test cases has near-zero energy cost beyond human intellectual effort.
- **Node Runner Efficiency** – Instead of wasting cycles on proof-of-work, DamageBDD nodes run lightweight BDD verifications, leveraging Erlang for extreme concurrency and low-resource execution.
A comparative analysis shows that operating a DamageBDD node **delivers higher computational efficiency per satoshi earned** than Bitcoin mining.
---
### **2.3 Network Effects and Synergies**
A crucial factor in DamageBDD’s economic model is **network value accumulation**. Unlike mining, which **diminishes profitability over time**, DamageBDD’s network **increases in value as adoption grows**.
#### **BDD Maintainer Synergies**
- The more tests written and **verified on-chain**, the greater the **trust in software systems**.
- Open-source contributors and enterprise teams benefit from **immutable test history**, reducing redundant labor.
#### **Node Runner Synergies**
- The more tests executed, the **more valuable the verification layer becomes**.
- Nodes reinforce the **integrity of test results**, leading to network-wide adoption in **high-assurance industries** (e.g., finance, healthcare, AI safety).
---
### **2.4 Human Capital Optimization: Unlocking Developer Potential**
Traditional software testing is often seen as a **cost center**, leading to its underutilization. DamageBDD flips this paradigm by treating testing as a **profit center**—rewarding testers not just for finding bugs but for **preventing catastrophic software failures**.
#### **Cognitive and Economic Impact**
- **Skill Growth** – Developers naturally **improve software design** by maintaining structured BDD tests.
- **Career Upskilling** – High-ranking BDD Maintainers become **indispensable assets** in software teams.
- **Economic Independence** – Unlike traditional employment, DamageBDD allows maintainers to **earn directly from open-source contributions**.
The system **gamifies quality assurance**, transforming what was once a tedious process into a **competitive and rewarding marketplace**.
---
## **3. Conclusion: A New Paradigm for Profitable Verification**
DamageBDD redefines software testing as a **financially viable, decentralized economy**. The combination of BDD Maintainers and Node Runners creates a **self-reinforcing ecosystem** where:
- **Maintainers ensure software correctness while earning sats**
- **Node Runners validate and secure test results, generating a sustainable revenue stream**
- **The network grows in value as more applications integrate DamageBDD verification**
### **Key Takeaways**
- **DamageBDD is superior to traditional testing models** due to its decentralized incentives.
- **It provides better computational efficiency than Bitcoin mining** while still operating on a proof-of-work foundation (verifiable contributions).
- **It unlocks human potential** by turning software verification into a **career pathway rather than a sunk cost**.
The profitability of DamageBDD Nodes extends beyond mere financial returns—it establishes a new **economic and intellectual order for software reliability**.
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-02 22:55:32
# The Secret to Staying Private in the Digital Wild West: A Guide to Using Encryption
You’re scrolling through social media, and suddenly you realize your phone’s been tracking your location and displaying it on your profile for months. You’re not even sure how that happened. Or maybe you’ve noticed that every time you shop online, the item you looked for follows you around with ads wherever you go. Sound familiar? Yeah, welcome to the digital world—where your data is basically a free buffet for anyone who knows how to ask.
But here’s the thing: you don’t have to sit back and take it. Encryption is like the secret weapon that lets you lock up your data and keep those prying eyes out. It’s not just for hackers or spies—it’s for regular people who want to take control of their privacy in a world that’s increasingly looking like a reality show where everyone’s a contestant.
### What Is Encryption, and Why Should You Care?
Encryption is like a secure box that only you can open. When you use encryption, your data is scrambled in a way that’s hard for anyone else to read, even if they try. Think of it as putting on a metaphorical cloak that makes your online activity invisible to just about everyone except the people you want to see it.
For example, when you browse the internet, your connection is often not encrypted by default. That’s why websites start with “https” to indicate a secure connection—it’s saying, “Hey, we’re using encryption here!” Without that little green padlock, anyone on the same WiFi could potentially spy on what you’re doing.
So, encryption isn’t just for tech geeks or government agencies. It’s for everyone who wants to protect their data from being sold, stolen, or misused without their consent. And guess what? You’re already using it without realizing it. Every time you use a password-protected account or send an encrypted message, you’re reaping the benefits of encryption.
### The Privacy Advantages of Encryption for Regular People
Let’s break down why encryption is your best friend when it comes to privacy:
1. **Financial Transactions**
When you pay online or use a banking app, encryption keeps your financial info safe from hackers. It ensures that only the banks and businesses you’re dealing with can access your money—no one else can.
2. **Online Accounts**
Your email, social media, and other accounts often use encryption to protect your login details. That’s why you see those little “lock” icons when you’re logging in. Without encryption, someone could potentially intercept your password and gain unauthorized access to your account.
3. **Data Breaches**
Encryption can often prevent data breaches from being useful. Even if hackers manage to steal your information, the encryption makes it unreadable, so the stolen data is basically worthless to the attackers.
4. **Location Data**
If you’re worried about apps tracking your every move, encryption can help limit how much of that data is accessible. Some apps use encryption to protect location data, making it harder for companies to sell your movements without your consent.
5. **Privacy Protection**
Encryption acts as a layer of protection against invasive technologies. For example, some apps use tracking software that follows you around the internet based on your browsing history. With encryption, these trackers can be blocked or limited, giving you more control over what information is collected about you.
### How to Use Encryption Like a Pro
Now that you know why encryption is essential for privacy, let’s talk about how to use it effectively:
1. **Use Strong Passwords**
Encryption works only if your passwords are strong and unique. Don’t reuse passwords from one account to another, and avoid using easily guessable information like “password123” or your birth year. Use a password manager if you need help keeping track of them.
2. **Enable HTTPS Everywhere**
Install browser extensions like HTTPS Everywhere to automatically encrypt your connections to websites that don’t support encryption by default. This ensures that even if you’re not actively thinking about it, your data is still protected.
3. **Look for the Lock Icon**
Whenever you’re on a website or app, look for the lock icon in the URL bar. Make sure it’s encrypted before you input any personal information.
4. **Use Encrypted Communication Tools**
For private conversations, use apps like Signal or SimpleX, which are designed with encryption in mind. These tools ensure that only the sender and recipient can read your messages, keeping them safe from prying eyes.
5. **Enable Two-Factor Authentication (2FA)**
This isn’t exactly encryption, but it’s a close second. 2FA adds an extra layer of security by requiring you to provide two forms of verification—like your password and a code sent to your phone—to access your account. While not encryption itself, it works alongside encryption to keep your accounts secure.
6. **Use Encrypted Storage and Backup**
When storing sensitive files or data, use encrypted cloud storage or external drives. Tools like BitLocker (for Windows) or AES-256 encryption can protect your files from unauthorized access.
7. **Stay Updated**
Encryption technology is always evolving, so it’s important to keep your software and apps updated. Outdated systems are often easy targets for hackers, leaving you vulnerable to attacks.
### Final Thoughts: Your Data Is Your Power
In a world where data is a commodity, encryption is your weapon against the invasive tactics of corporations and hackers alike. It empowers you to control what information you share and protects you from having it used against you. So, whether you’re shopping online, using your favorite apps, or just browsing the web, remember that encryption is there to help you stay private and in control of your own data.
And if you ever feel overwhelmed by all the privacy stuff, just remember this: you’re not alone. Millions of people are fighting for stronger privacy protections every day. So, do your part by using encryption wisely—your data and your privacy are worth it. Let’s make sure no one can take that away from you.
---
**Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero**
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
![](/static/nostr-icon-purple-64x64.png)
@ 8d34bd24:414be32b
2025-02-02 21:31:11
This Sunday our pastor had to give a sermon with very little preparation. He was leading an elders’ retreat and one of the elders was supposed to preach in his place. The elder who had prepared a sermon ended up in the hospital, so our pastor had to prep fast. He did a great thing. He preached on a passage, but also used that passage to demonstrate how he studies scripture. It was a great sermon. The passage he preached on reminded me of a time in my past when I learned some important lessons.
Almost 20 years ago, I was leading a high school girls Bible study. They picked out a book about Mary and Martha to study. Initially, I wasn’t thrilled with their choice, but didn’t have a theological problem with it, so I agreed for us to study this book. (I don’t remember the name of the book and all my books burnt up when my house burnt down almost 10 years ago). In the end, I probably got more out of the study than any of the girls because I have a definite tendency to be a Martha. What was Martha’s error? Let’s check out the passage:
> Now as they went on their way, Jesus entered a village. And a woman named Martha welcomed him into her house. And she had a sister called Mary, who sat at the Lord’s feet and listened to his teaching. But Martha was distracted with much serving. And she went up to him and said, “Lord, do you not care that my sister has left me to serve alone? Tell her then to help me.” But the Lord answered her, “Martha, Martha, you are anxious and troubled about many things, but one thing is necessary. Mary has chosen the good portion, which will not be taken away from her.” (Luke 10:38-42 ESV)
Jesus visited two sisters who welcomed Him into their home. Mary sat at Jesus’s feet and listened to His teaching. Martha spent her time serving everyone and taking care of everyone’s physical needs.
Is taking care of their home and the needs of their guests a bad thing? Of course not, but is it the best?
To make things much worse, Martha then got upset because her sister Mary wasn’t helping her. She was just sitting there taking in every word that Jesus said. Most of us would think Martha’s sacrifices to take care of everyone was better than Mary’s choice to just sit at Jesus’s feet, but did Martha really choose the better path?
Martha then showed that her heart wasn’t focused right and she wasn’t putting the most important things first. She complained to Jesus about her sister’s failure to help and even commanded her Creator, “*Tell her then to help me*.” Instead of focusing on the words of Jesus, her frustration led her to command her God to act in the way she desired. She was so busy with cooking, cleaning, and serving, that she missed the most important things — spending time with and listening to her God, who was right there in her house with her. This was an opportunity that shouldn’t be missed due to busyness.
How often do we all do this same thing? How often are busy doing good things and miss the most important things? How often are we busy doing ministry that we forget about the reason for the ministry? I don’t know about you, but this happens to me a lot more often than I would like to admit. My biggest sins are usually not what most people think of as sins. My biggest sins are getting so busy that I leave God out of my life. I am so busy serving God that I forget to follow His leading. I am so busy doing what most people would consider good things, but if God is not part of them, they are not worth much. Because I am focusing on getting things done, worry and stress overtake me harming my health and my relationship with Jesus.
I don’t think this is taking Scripture out of context:
> We have come to know and have believed the love which God has for us. **God is love**, and the one who abides in love abides in God, and God abides in him. (1 John 4:16) {emphasis mine}
Knowing that God is love, read the following passage replacing ***love*** with ***God***.
> If I speak with the tongues of men and of angels, but do not have ***love***, I have become a noisy gong or a clanging cymbal. If I have the gift of prophecy, and know all mysteries and all knowledge; and if I have all faith, so as to remove mountains, but do not have ***love***, I am nothing. And if I give all my possessions to feed the poor, and if I surrender my body to be burned, but do not have ***love***, it profits me nothing. (1 Corinthians 13:1-3)
If I do not include God in my every action, “*it profits me nothing*.”
In reality it shouldn’t be allowing God to join me in my works, but me joining God in His works. It should be me listening to God’s word and the leading of the Holy Spirit, looking and seeing what God is doing around me, and me joining in His great works. It should be me allowing God to use me as a tool.
There are times that God speaks clearly and directly to us about what He desires for our lives, but most of the time, He speaks through His word — the Bible. Knowing the Bible helps us to know His will and His eternal plan, so we can follow Him and join Him in His work. Knowing the Bible helps us to differentiate between what is good and what is God’s best. It helps us to prioritize what is really important.
> And this I pray, that your love **may abound still more and more in real knowledge and all discernment**, so that you **may approve the things that are excellent**, in order to be sincere and blameless until the day of Christ; having been filled with the **fruit of righteousness which comes through Jesus Christ**, to the glory and praise of God. (Philippians 1:9-11) {emphasis mine}
We can’t obey God, imitate Christ, or follow Him if we refuse to listen and that means spending time in the Bible and time in prayer with Him.
> “Listen to Me, you stubborn-minded, Who are far from righteousness.” (Isaiah 46:12)
> Come, you children, listen to me; I will teach you the fear of the Lord . (Psalm 34:11)
> “Now therefore, O sons, listen to me, For blessed are they who keep my ways. (Proverbs 8:32)
> But seek first His kingdom and His righteousness, and all these things will be added to you. (Matthew 6:33)
Our focus on Jesus/God must go beyond knowing Him. It is equally important to obey.
> And He \[Jesus\] said to another, “Follow Me.” But he said, “Lord, permit me first to go and bury my father.” But He said to him, “Allow the dead to bury their own dead; but as for you, go and proclaim everywhere the kingdom of God.” (Luke 9:59-60) \[clarification mine\]
Once we know what He wants from us, we need to instantly drop what we are doing and follow Him. We can’t put other things ahead of obeying God.
> For amazement had seized him and all his companions because of the catch of fish which they had taken; and so also were James and John, sons of Zebedee, who were partners with Simon. And Jesus said to Simon, “Do not fear, from now on you will be catching men.” When they had brought their boats to land, **they left everything and followed Him**. (Luke 5:9-11) {emphasis mine}
We should be like these apostles, that, after their most successful catch of fish in their entire career as fishermen, “*they left everything and followed Him*.” We need to let go of what we think is important and obey Him. We need to change our priorities to match God’s priorities.
That may mean we change careers to one that allows more free time for ministry or even going into full time ministry. It may mean letting go on keeping the perfect, clean house, so there is time for ministry, Bible study, or discipling our kids. It may mean changing your habits from watching TV with your family to reading the Bible with your family. For each of us, it will look different, but we need to be like Mary and choose to sit “*at the Lord’s feet and listened to his teaching*.” We need to be like the apostles who “*left everything and followed Him*.” We need to choose to put Jesus’s plans before our own. We need to choose to make God’s values our values.
> But this is what I commanded them, saying, ‘Obey My voice, and I will be your God, and you will be My people; and you will walk in all the way which I command you, that it may be well with you.’ (Jeremiah 7:23)
Like so many things, it is simple, but it isn’t necessarily easy. We have to change the way we think in order to obey faithfully.
> If anyone serves Me, he must follow Me; and where I am, there My servant will be also; if anyone serves Me, the Father will honor him. (John 12:26)
We have to change our priorities to God’s priorities.
> Then Jesus said to His disciples, “If anyone wishes to come after Me, he must deny himself, and take up his cross and follow Me. (Matthew 16:24)
We need to seek God, His word, and His presence.
> As the deer pants for the water brooks,\
> So my soul pants for You, O God.\
> My soul thirsts for God, for the living God;\
> When shall I come and appear before God? (Psalm 42:1-2)
We need to be in God’s word daily, so we know who God is and what He desires from us.
> How can a young man keep his way pure?\
> By **keeping it according to Your word**.\
> With all my heart I have sought You;\
> Do not let me wander from Your commandments.\
****Your word I have treasured in my heart**,\
> That I may not sin against You.\
> Blessed are You, O Lord;\
****Teach me Your statutes**.\
> With my lips I have told of\
> All the ordinances of Your mouth.\
> I have rejoiced in the way of Your testimonies,\
> As much as in all riches.\
****I will meditate on Your precepts**\
> And regard Your ways.\
****I shall delight in Your statutes;\
> I shall not forget Your word**. (Psalm 119:9-16) {emphasis mine}
We need to read the Bible cover to cover so we know the whole word of God. Once we have read through the Bible multiple times, we need to spend time studying the Bible in more depth, so we can know the details, see how the different parts relate to each other, and grow in our knowledge of God. We need to study the Bible and use this knowledge to guide every decision in life — big and small.
> Yet they did not listen or incline their ears, but stiffened their necks in order not to listen or take correction. (Jeremiah 17:23)
Just reading the Bible or sitting in church listening to sermons will not make a difference if we don’t truly listen and internalize God’s word, so we can apply it in our every day life. God knows what is best for us and we will never be truly at peace or have true joy until we are living our lives in the light of God’s word and direction.
My prayer for you and for me is that we will have the heart of Mary rather than the heart of Martha and that we will faithfully seek and follow God all of the days of our lives.
Trust Jesus.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5a261a61:2ebd4480
2025-02-02 20:42:37
Let’s be real—sticking to *anything* for 90 days is like trying to herd cats on espresso. You start strong, then **life happens**: kids, chores, or that *one* glass of wine that makes you forget foot rubs (#relatable). But here’s the thing: 90-day challenges aren’t about perfection. They’re about bribing your lizard brain with rewards and scaring it straight with punishments.
## **The Game Plan**
First, pick a thing—something that makes you feel like a devoted servant or a slightly frazzled superhero. Daily foot care? Chores with a side of #FLR flair? Cool. Now, break it into chunks: 30 days (survival mode), 60 days (grind phase), and 90 days (victory lap).
Keeping up something for so long is no joke. That's why you need those little checkpoints along the way. Each milestone should feel special—30 days deserves celebration, 60 days something more meaningful, and 90 days? That's your victory dance moment.
Reality check: some days will suck, and you'll want to skip. **That's where having everything planned out helps.** When your brain is foggy and you're tired, you don't want to be negotiating with yourself about what counts and what doesn't. The hardest part isn't even doing the thing—it's remembering to do it every single day, until it feels wrong NOT to do it.
## **Why It (Maybe) Works**
Three months is long enough for habits to stick, short enough to see the finish line. Plus, tying it to power exchange? Genius. Every foot rub or denied cum becomes a ritual, proof you're leveling up as a sub/human/slightly-messy adult. And let's be honest—nothing fuels devotion like a mix of structure, desperation, and the occasional humiliating punishment.
## **Current run**
My current challenge is to get my wife/godess/object of my insatiable kinky thoughts/partner feet massaged with special cream. It's for making evyrthing soft, help nails and yadayadayada. Basically preping her feet for more instensive worshiping. She doesn't know my hidden agenda and I am not sure if I would really be into it, since I am more into being her devout toy than having foot fetish, but I think it will be all the same if I put myself juuust right.
So for my rewards I have planned these?
- **30 days**: Tiny dopamine hit. *(making little photoset of Her feet playing with my hardon… for science.)*
- **60 days**: Mid-tier flex. *(cleaning mushed banana split off Her toes tongue only)*
- **90 days**: Go nuclear. *(a tiny foot spa whirpool because She deserves it, damn it :D and it will create more opportunities for... you know )*
As for the hhip part of the sugar duo... It was easy having one for my shaving rutine, but here? Not sure and it's bad that I ave started challenge without having them prepared... May be that warrant more punishment?
## **TL;DR**
90-day challenges are the BDSM of self-improvement: **consensual, slightly painful, and weirdly addictive.**
Fail? Reset, adapt, try again. Win? Congrats, you’re now 10% more disciplined and 100% more bumptious on Nostr.
#90days #FLR #LostCauseButStillTrying #femdom
-
![](/static/nostr-icon-purple-64x64.png)
@ 378562cd:a6fc6773
2025-02-02 18:58:38
## Chef's notes
I'm only testing this out right now. I will update the recipe as well as add my own image soon after making this dish again.
## Details
- ⏲️ Prep time: 20 minutes
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 4
## Ingredients
- 4 to 6 potatoes (size depending)
- 1 lb ground beef
- seasonings
- 2 cans chili beans
- 1 onion
- katsup
- shredded cheese of some kind
## Directions
1. saute onion and add ground beef to skillet. Season to liking.
2. peel if you like and thin slice potatoes
3. in a rectangle baking dish, layer potatoes, beans, meat and cheese (like a lasagna) until you have used all your ingredients. Try and make at least 2 or 3 layers with extra cheese on top.
4. Bake at 350 for one hour. Serve and enjoy!
-
![](/static/nostr-icon-purple-64x64.png)
@ 378562cd:a6fc6773
2025-02-02 17:53:05
## Chef's notes
I'm only testing this out right now. I will update the recipe as well as add my own image soon after making this dish again.
## Details
- ⏲️ Prep time: 20 minutes
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 4
## Ingredients
- 4 to 6 potatoes (size depending)
- 1 lb ground beef
- seasonings
- 2 cans chili beans
- 1 onion
- katsup
- shredded cheese of some kind
## Directions
1. saute onion and add ground beef to skillet. Season to liking.
2. peel if you like and thin slice potatoes
3. in a rectangle baking dish, layer potatoes, beans, meat and cheese (like a lasagna) until you have used all your ingredients. Try and make at least 2 or 3 layers with extra cheese on top.
4. Bake at 350 for one hour. Serve and enjoy!
-
![](/static/nostr-icon-purple-64x64.png)
@ d57360cb:4fe7d935
2025-02-02 16:33:16
Beauty and art function beyond the mind.
When you’re not thinking, when the mind reaches its natural silence. When it quiets down.
You begin to experience and actually experience how things are.
There is no more narration. Things happen as if by magic. Everything is in its place happening and grooving.
Every act, every movement feels like jazz.
We’re better doers than we are thinkers. But the world thinks otherwise.
-
![](/static/nostr-icon-purple-64x64.png)
@ 6b57533f:eaa341f5
2025-02-02 15:46:41
# 🏝️lost in the ordinary?
![aerial]( https://imgproxy.f7z.io/p2NXvTmETMsp7a0p1uHsIeknNcVbXo6AWCY7xfDjJ7o/w:2400/aHR0cHM6Ly9ibG9zc29tLnByaW1hbC5uZXQvOWQ5MDg2MWQ1ZDIzM2ExNGUzZjA1MGI4YzQ3ZDFhN2E4NjAwZmNlMTkzMmZlMjk0OWEwMzAzZWNmNThhNjY3Yi5qcGc)
## Welcome to Stories
Discover a hidden paradise where the world slows down, and adventure begins..
# 🌊 Step into tranquility.
![water]( https://imgproxy.f7z.io/osLRY1XHflj8DdFMBqq6tJBZPFD62uJCx9KuDHhHRm4/w:2400/aHR0cHM6Ly9ibG9zc29tLnByaW1hbC5uZXQvNzZhMjU5ODA3YzQyMjM4ZjU1ZTM5YjNjODg2Y2I1MzBiYzg4ZDc0MTgxMWJmNjRjOTViMTg1MzA3NWZmNGQwMi5qcGc)
##
Wake up to the sound of gentle waves and endless blue horizons.
# 🛶Live the dream.
![paddle]( https://imgproxy.f7z.io/6FGvyi8R7O5orPEvqoZm7NsmLpDQ9P_8aGZVQjKuqWc/w:2400/aHR0cHM6Ly9ibG9zc29tLnByaW1hbC5uZXQvZWU5MzViMGY3N2VkMzJkNGEwOTgzMTM2NTZhNjY0MWNhYWQyYWRlZmVlMDUwNGFlOTUzOWUzY2M0OTM4NDNmNS5qcGc)
##
##
## Unwind, explore, and escape—your perfect getaway is just one step away.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-02 14:47:05
A little better today
I'm about to have some coffee, after 14 hours not eating or drinking . I probably won't eat for a couple more hours, either.
I forgot to mention another element of Fast February: the "fiscal fast". Some of you may have heard this term before. It's exactly what it sounds like: stop spending money. In my case it just means not buying anything specifically for myself: no snacks, no takeout, no video games, etc.
originally posted at https://stacker.news/items/873395
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-02 13:39:49
**Why You Should Only Run DeepSeek Locally: A Privacy Perspective and how to**
In an era where AI tools promise immense utility, the decision to run DeepSeek locally is not merely about functionality but also about safeguarding privacy and security. Here's the rationale why:
1. **Control Over Data Access**: Running DeepSeek locally ensures that data processing occurs on your own machine or server, allowing you to have full control over who can access the system. This reduces the risk of unauthorized access and misuse.
2. **Data Privacy**: By keeping computations local, you ensure that personal data does not leave your control, minimizing the risk of exposure through cloud-based services.
3. **Security Measures**: Local operation provides an additional layer of security. You can implement access controls, monitor usage, and respond to incidents more effectively, which might be harder or impossible when relying on third-party platforms.
4. **Practical Implementation**: Tools like Ollama and OpenWebUI facilitate setting up a local environment, making it accessible even for those with limited technical expertise. This setup empowers individuals to leverage AI capabilities while maintaining privacy.
7. **Right to Control Data**: Privacy is a fundamental right, and running DeepSeek locally respects this by allowing users to decide what data they share and how it's accessed. This empowers individuals to make informed choices about their personal data.
For those prioritizing privacy, this approach is not just beneficial—it's essential.
**Running DeepSeek Locally: A Guide for Individual Home Users**
DeepSeek is a powerful AI search engine that can help with various tasks, but running it locally gives you greater control over your data and privacy. Here’s how you can set it up at home.
---
### **What You’ll Need**
1. **A Computer**: A desktop or laptop with sufficient processing power (at least 4GB RAM).
2. **Python and pip**: To install and run DeepSeek.
3. **Ollama**: An open-source tool that allows you to run AI models locally.
4. **OpenWebUI**: A simple web interface for interacting with Ollama.
---
### **Step-by-Step Guide**
#### 1. **Install the Prerequisites**
- **Python**: Download and install Python from [https://www.python.org](https://www.python.org).
- **pip**: Use pip to install Python packages.
```bash
pip install --upgrade pip
```
- **Ollama**:
```bash
pip install ollama
```
- **OpenWebUI**:
Visit [https://github.com/DeepSeek-LLM/openwebui](https://github.com/DeepSeek-LLM/openwebui) and follow the instructions to install it.
---
#### 2. **Set Up Ollama**
- Clone the official Ollama repository:
```bash
git clone https://github.com/OllamaAI/Ollama.git
cd Ollama
```
- Follow the installation guide on [https://ollama.ai](https://ollama.ai) to set it up.
---
#### 3. **Run DeepSeek Locally**
- Use OpenWebUI as your interface:
```bash
# Start OpenWebUI (open a terminal and run this):
python openwebui.py --model deepseek-llm-v0.2-beta
```
- A web browser will open, allowing you to interact with DeepSeek.
---
### **Tips for Optimization**
1. **Reduce Memory Usage**: Use smaller models like `deepseek-llm-v0.2-beta` if your computer has limited resources.
2. **Limit Model Access**: Only allow authorized users to access the system by restricting IP addresses or using a VPN.
3. **Regular Updates**: Keep all software up to date to protect against vulnerabilities.
---
### **Why Run DeepSeek Locally?**
- **Privacy**: Your data stays on your local machine, reducing the risk of unauthorized access.
- **Flexability**: Running locally allows you to build specific models for specific uses and provide them with RAG data.
---
### Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
-
![](/static/nostr-icon-purple-64x64.png)
@ fbf0e434:e1be6a39
2025-02-02 13:32:12
> *本文原载于《CERN Courier》,是由欧洲核子研究中心(CERN,全称Conseil Européen pour la Recherche Nucléaire)出版的权威科学期刊,专注于报道全球物理学、技术及创新领域的前沿动态。以下正文内容是对全球开源开发者激励平台DoraHacks的创始人张剑南的专访报道,探讨了黑客松如何成为科技创新的重要推动力以及DoraHacks在其中扮演的角色。*
>
万维网(World Wide Web)、人工智能(Artificial Intelligence)与量子计算(Quantum Computing)——这些划时代的技术有何共同之处?DoraHacks创始人张剑南认为,它们都源于“Hacks(黑客精神)”。“当万维网在欧洲核子研究中心(CERN)诞生时,它向我们证明了一件事:要想改变并提高人类的生活方式和工作效率,关键在于以创新的思维利用现有的技术以实现突破。”张剑南解释道,“如果总是从零开始,我们永远无法取得实质性的进步。这恰恰就是开源运动和黑客马拉松的核心价值。”
十年前,张剑南参与筹办了CERN Webfest 2013,这是一场致力于探索如何以创新方式运用技术来服务科学与社会的黑客马拉松活动。通过Webfest,张剑南不仅实现了编程技能与物理学知识的跨学科融合,还与来自世界各地、背景各异的hackers建立了持久深厚的联系。随着参与黑客松次数的增多,他的“黑客精神”愈发强烈,最终驱使他创立了自己的公司。2024年,张剑南重返Webfest,但这次他不再是参与者,而是作为DoraHacks的首席执行官来见证这场盛会。
黑客马拉松是一种持续数天的社交编程活动,具有高度的包容性和开放性——参与者无需学术机构或企业背景即可加入。这种特性吸引了众多才华横溢的个体参与其中。活动中,hackers以团队形式合作,结合各自的技能,通过软件、硬件或商业计划等来解决技术难题。这不仅让物理学家、计算机科学家、工程师和企业家齐聚一堂,各展所长,也让年轻的开发者们有机会突破传统研究框架,提升技能、积累作品集,并拓展职业人脉。
“如果你对某件事充满热情,就应该能够立即投入其中并全力以赴,”张剑南强调,“追求梦想并不需要特定的学历或背景。”
对于在某个领域刚起步的研究者来说,黑客松的意义远不止于技术挑战。它为进入一个研究或行业领域提供了另一种途径,弥合了学术理论与实际应用之间的鸿沟。很多由大学举办的黑客松往往能够吸引到企业的赞助,这些赞助除了作为奖金来激励开发者持续开发,也会用来租赁大型场馆,以容纳数百甚至上千名参与者。
“正是这些大规模的黑客松吸引了众多行业猎头和导师的关注,”张剑南解释道,“他们把这类活动看作他们的人才库。通过黑客松,参与者们能够与大公司的人直接交流,加速职业发展,同时也能在实践中提升他们的编程能力。”
在2010年代,张剑南经常在周末参加黑客松,这也成为他创业的基石。“我曾经坐在计算机科学学院的公共休息室里,埋头研究我的黑客项目。我的大多数朋友也是在那里认识的,”张剑南回忆道,“但后来我意识到,如果想做出真正伟大的东西,必须有效地组织人力与资金。然后我就开始‘逃课’,不去上计算机系的课程,而是偷偷溜进商学院的教室里。”张剑南常常在商学院的教室后排听课,一边听课一边谋划自己的创业计划。他每天都与同行交流,评估各种不同的商业模式。“在创业过程中,要把工程知识与商业理论结合起来思考,”他补充道,“这是比较有趣的一点,让整个过程也轻松了一些。”
然而,从科学研究转向创业并非易事。“创业初期必须亲力亲为,要自己去学习然后完成各种任务。”张剑南坦言,“好处是能够接触到许多新技能和新朋友,但同时也得强迫自己去做那些原本不擅长的事情。”
这种经历也反映了许多创业者的共同困境:选择自己从头学习新技能,还是寻找合适的创业伙伴然后把任务分配出去?可是找到值得信赖的合作伙伴也不是一件容易的事,错误的决策甚至可能阻碍公司的发展。因此,从一开始就明确公司的愿景和使命显得尤为重要。
“解决方案其实很简单,”张剑南表示,“重点是要投入足够多的时间,亲自完成关键里程碑,以确保产品真正具备可行性。只要有了明确的商业计划和愿景,就能获得来自各方的支持。”
### **去中心化的社区治理**
很多黑客马拉松参与者在活动结束后就会放弃自己的项目,但张剑南创立DoraHacks的初衷并非如此。他希望为全球的黑客团队提供一个平台,让他们能够将创意转化为成熟产品。“我希望黑客马拉松不仅仅是一个招聘工具,”他解释道,“它更应该推动开源开发和去中心化的社区治理。比如现在,来自坦桑尼亚的黑客可以与美国的黑客团队远程协作,然后获得持续的支持,以开发出真正有影响力的产品。这种模式让技术领域变得更多样化,同时也能够让更多人接触到不同的领域。”
DoraHacks通过帮助组织者降低后勤成本,为参与者提供更可靠的资金支持机制,使黑客松超越学术机构的限制,吸引更多对创新充满热情的个体研究者参与。然后不断发展整个社区,让年轻一代的开发者、研究者们能够在自己的职业初期,接触到比以往更多的机遇和机会。
“商业模式正在发生根本的变化,”张剑南指出,黑客马拉松正在发展成为新兴技术的基石,尤其是在量子计算、区块链和人工智能等以开源形式起步的领域。“产品创造的过程将会迎来重大变革。未来的技术发展不再依赖于孤立封闭的产品开发,而是基于黑客们可以共同贡献的平台和基础设施。”
如今,黑客马拉松的意义已不仅限于编程或建立人脉——它们更关乎突破技术边界、创造有意义的解决方案,并开辟新的职业道路。黑客马拉松是创意孵化器,并且能够对这些创意产生持久的影响力。张剑南希望帮助这些创意变为现实。“未来创新的方式一定是协作完成的,是开源的,”他再次强调,“在传统社会环境里,企业的发展依赖于在闭源技术周围筑起的护城河,这种技术更新方式的效率低下且不容易实现。而真正创新的未来,将以开放平台技术为核心,让全球开发者能够在现有项目的基础上不断迭代更新。这样的开放协作精神正是Hacker Movement(开源极客运动)如此重要的原因。”
采访者:Alex Epshtein(编辑助理)。
原文链接:https://cerncourier.com/wp-content/uploads/2025/01/CERNCourier2025JanFeb-digitaledition.pdf
-
![](/static/nostr-icon-purple-64x64.png)
@ ddf03aca:5cb3bbbe
2025-02-02 13:09:27
We’re thrilled to announce the stable release of Cashu-TS v2.2! Although this update is a minor version bump, it brings significant improvements under the hood that enhance the overall developer experience. We’ve spent several weeks testing and refining these changes.
---
## What’s New in v2.2?
While there are no breaking changes in this release, there are many internal changes. If you spot any regressions or unexpected behavior, please [let us know](https://github.com/cashubtc/cashu-ts/issues). Here’s a rundown of the major updates:
- **Enhanced Proof Creation**: The way proofs are created internally has been revamped.
- **User-Controlled Outputs**: You now have full control over how outputs are created.
- **Improved Bundling**: We’ve switched our bundling tool to [vite](https://vitejs.dev) for faster and more modern builds.
- **Updated Testing Tools**: Our testing framework has migrated to [vitest](https://vitest.dev) and [msw](https://mswjs.io), with added browser testing via Playwright.
---
## New Flexibility with OutputData
In previous versions of Cashu-TS, the creation of outputs (or *BlindedMessages*) was hidden away. Even though there were options to tweak the process (like deterministic secrets or P2PK), you were always limited to the built-in logic.
### What’s Changed?
In v2.2, we’ve introduced a public interface that not only streamlines output creation but also lets you plug in your own custom logic when needed. With the new `outputData` option available on all output-creating methods, you can now bypass the automatic process and provide your own outputs.
For example, you can create two proofs tied to different public keys in a single mint operation:
```ts
const data1 = OutputData.createP2PKData({ pubkey: "key1" }, 10, keys);
const data2 = OutputData.createP2PKData({ pubkey: "key2" }, 10, keys);
const { keep, send } = await wallet.send(20, proofs, {
outputData: { send: [...data1, ...data2] },
});
```
### Customization Made Easy
The `outputData` option now accepts anything that conforms to the `OutputDataLike` interface. This means you can introduce your own output creation logic—even if it’s not natively supported by Cashu-TS yet. Here’s what the interface looks like:
```ts
export interface OutputDataLike {
blindedMessage: SerializedBlindedMessage;
blindingFactor: bigint;
secret: Uint8Array;
toProof: (signature: SerializedBlindedSignature, keyset: MintKeys) => Proof;
}
```
### Introducing OutputData Factories
While having full control is empowering, it also means you’ll need to handle tasks like fee calculation and amount selection manually. To strike a balance between control and convenience, we now support **OutputData Factories**.
A factory is simply a function that takes an amount and `MintKeys` as input and returns an `OutputDataLike` object. This way, you can define a blueprint for your output data without worrying about the nitty-gritty details. For instance, you can create separate factories for amounts you keep versus those you send:
```ts
function keepFactory(a: number, k: MintKeys) {
return OutputData.createSingleP2PKData({ pubkey: "keepPk" }, a, k.id);
}
function sendFactory(a: number, k: MintKeys) {
return OutputData.createSingleP2PKData({ pubkey: "sendPk" }, a, k.id);
}
const { send, keep } = await wallet.send(amount, proofs, {
outputData: { send: createFactory("send"), keep: createFactory("keep") },
});
```
Plus, you can now instantiate a `CashuWallet` with a default `keepFactory`, ensuring that all change amounts automatically lock to your key—streamlining your workflow even further.
---
## Bundling Improvements with Vite
Starting with v2.2, we’ve transitioned from using `tsc` to [vite](https://vitejs.dev) for transpiling and bundling the library code. Although this change is mostly behind the scenes, it brings several benefits:
- **Modern Build Target**: We’ve updated our build target to ES6.
- **Updated Exports**: The package exports now reflect the latest JavaScript standards.
- **Standalone Build Soon**: We’re working on a standalone build that bundles Cashu-TS along with all its dependencies. This will let you import Cashu-TS directly into your HTML.
If you encounter any issues with the new bundling setup, please [let us know](https://github.com/cashubtc/cashu-ts/issues).
### A Nod to Vitest
In addition to our bundling improvements, we’ve migrated our testing framework from Jest (with nock) to [vitest](https://vitest.dev) combined with [msw](https://mswjs.io). This switch gives us more flexibility in testing and mocking, plus we’ve added browser testing based on Playwright—thanks to the tip from nostr:npub16anjdksmvn5x08vtden04n64rw5k7fsjmedpw8avsx8wsh8ruhlq076pfx!
---
## In Conclusion
Although Cashu-TS v2.2 is a minor version update, it comes packed with improvements that enhance both the developer experience and the flexibility of the library. We’re excited to see how you’ll use these new features in your projects! Thanks to all the amazing contributors that add to this library.
Thank you for being a part of the Cashu-TS community. As always, if you have any questions, suggestions, or issues, don’t hesitate to [reach out to us](https://github.com/cashubtc/cashu-ts/issues).
-
![](/static/nostr-icon-purple-64x64.png)
@ c11cf5f8:4928464d
2025-02-02 13:05:25
Let's hear some of your latest #Bitcoin purchases, feel free to include links to the #shops or #merchants you bought from too. Any good #deal we should know about?
If you missed our last thread, [here](https://stacker.news/items/864463/r/AG) are some of the items stackers recently spent and #zap #sats on.
originally posted at https://stacker.news/items/873304
-
![](/static/nostr-icon-purple-64x64.png)
@ fe41d17e:28df7452
2025-02-02 13:04:38
Um es vorab klarzustellen, die einzigen Gesetze an die du dich wirklich halten musst sind die Naturgesetze, es ist deine eigene Entscheidung ob du einer einseitig vom Staat beschlossenen Auflage zustimmst oder nicht, solange du bereit bist, falls du erwischt wirst, die Konsequenzen über dich ergehen zu lassen.
Wenn du diese Unterdrückung nicht mehr haben möchtest braucht es eine Revolution um den Staat irrelevant werden zu lassen und um ihm seine Grundlage (das Geld) zu entziehen ohne dabei wie er selbst zu unmoralischen Methoden zu greifen.
Diese Revolution nennt sich **Agorismus,** sie wird dich unabhängig vom Staat machen und den Staat langfristig schwach/überflüssig werden lassen sobald es dir genug Leute gleichtun.
Die Revolution wird nicht leicht, sie wird dir nicht die sofortige Genugtuung verschaffen, die du möglicherweise empfindest, wenn du einen Zettel in die Wahlurne wirfst und dabei das Gefühl hast, etwas verändert zu haben. Eigentlich hast du nur denselben Leuten Macht verliehen, die seit Jahrhunderten die Politiker kontrollieren, dich ausrauben und unterdrücken. Garnichts hast du damit verändert.
Es wird schwierig werden. Es wird Eigeninitiative und Veränderungen in deinem Leben erfordern. Es wird ein zermürbender, unbefriedigender Weg sein, den viele als zu hart bezeichnen werden. Es wird Jahre über Jahre dauern, in denen die Leute dich dafür schief ansehen und du kaum Anerkennung bekommen wirst.
*Hier ein paar wichtige Punkte um dich mit Agorismus vertraut zu machen*:
\-Wenn du bereits ein Libertärer bist, lies zuerst „**Das neue Libertäre Manifest**“ von Samuel Edward Konkin III. Es hat nur 30 Seiten, und wenn du damit nicht zumindest deinen Horizont erweitern kannst, dann kannst du genauso gut eine britische Flagge in Amerika schwenken, Tribut zollen und einen König fordern.
-Wenn du kein Libertärer bist, lies „**Eine neue Freiheit: das libertäre Manifest**“ von Murray Rothbard und anschließend „**Das neue Libertäre Manifest**“ von SEK3.
-Konzentriere dich in deinem Leben darauf, weniger bis keine Steuern zu zahlen.
\-Finde Alternativen zum Fiatgeld und sei deine eigene Bank.
\-Finde lokale Quellen für Lebensmittel und Produkte.
\-Handel P2P auf freien Märkten.
\-Suche nach Lösungen, die auf Dezentralisierung ausgerichtet sind.
\-Baue eine gewisse Menge an Lebensmitteln an, auch wenn es nur Mikrogrün ist. Dafür sind keine großen Flächen erforderlich und du kannst diese gegen andere Lebensmittel eintauschen.
\-Baue dein eigenes Unternehmen außerhalb von Konzernstrukturen auf.
\-Konzentriere dich auf den Handel mit anderen Agoristen.
\-Nutze jede Gelegenheit um deine Verachtung gegenüber dem Staat zu äußern.
\-Verbreite Agorismus.
\-Beschaffe dir Waffen.
\-Vertraue nur agoristischen Medien, die unpolitisch sind. Denn jeder Journalist, der dich ermutigt, zu wählen oder innerhalb des Systems zu arbeiten, könnte gekauft oder kontrolliert sein. Agoristen, die behaupten, dass Politik nicht die Antwort ist, sind die einzigen, die die Menschen wirklich von den Kontrolleuren wegführen.
Die Herrscher dieser Welt sind sich durchaus darüber im Klaren, dass das Informationszeitalter ihren Interessen schadet. Daher arbeiten sie unermüdlich an der Schaffung psychologischer Operationen (PsyOps), kontrollierter Opposition, False-Flag-Aktionen und Ablenkungsmanövern, lass dich nicht täuschen.
Erstveröffentlichung am 12. Januar auf meinem X Profil; @realbunki
-
![](/static/nostr-icon-purple-64x64.png)
@ 77be3409:5c7c2736
2025-02-02 12:48:25
[RMD Law - Personal Injury Lawyers ](https://www.rmdlaw.com/)is excited to announce the launch of its new scholarship program, designed to empower students and highlight the values of responsibility, resilience, and learning from life’s unexpected moments. This $2,500 scholarship aims to support students in their educational journeys while encouraging creativity and personal growth.
### Scholarship Details
Award Amount: $2,500
Submission Deadline: December 30, 2025
Winner Announced: January 15, 2026
**Eligibility Requirements**
To apply, students must meet the following criteria:
- Be at least 16 years old and a permanent legal resident of the United States.
- Be currently enrolled in a U.S. college, university, or trade school OR graduating from high school in 2025.
- Have a cumulative GPA of 3.0 or higher.
- Follow RMD Law on social media to see the winner announcement.
- Submit all required materials by the December 30, 2025, deadline
**Application Requirements
Applicants are required to submit:**
- A copy of their most recent high school or college transcript.
- A creative and thoughtful essay (up to 1,000 words) responding to the following prompt:
**Essay Prompt: “Oops, That Was Close!”**
Tell us about a moment when you narrowly avoided disaster—whether it was a hilarious mishap, an embarrassing accident, or a close call with serious consequences.
- What did you learn (if anything) from the experience?
- Who was at fault and why?
- What would the appropriate restitution (if any) be in that situation?
Note: Applicants are encouraged to use creativity, levity, and personal insights to share their story. Let your unique voice shine through!
**Selection Criteria**
The winner will be chosen based on:
- Originality and creativity in their essay.
- Relevance to the prompt.
- Clarity and thoughtfulness of their response.
The scholarship recipient will be announced on January 15, 2026.
**How to Apply**
1. Students can submit their application materials through the official RMD Law scholarship webpage: [https://www.rmdlaw.com/scholarship/
](https://www.rmdlaw.com/scholarship/)2. Follow RMD Law on social media to stay updated on the announcement and other initiatives.
#### About RMD Law
RMD Law is a leading personal injury law firm committed to providing exceptional legal services and making a positive impact in the communities it serves. Through initiatives like the scholarship program, RMD Law seeks to empower individuals and foster the next generation of leaders.
-
![](/static/nostr-icon-purple-64x64.png)
@ 0463223a:3b14d673
2025-02-02 12:22:46
I’m totally wasted! I don’t mean off my head on drugs, I mean absolutely physically and mentally exhausted.
Lugging heavy PA equipment up and down stairs, plus mixing shows is a lot and at my age I’m struggling with it. Yesterday was a write off due to exhaustion. My wife and I went to the cinema, and I slept through the film. A shame, it was something I wanted to see but I was toast. I went to bed at 8pm and slept for over 12 hours. I still feel wrecked today.
Live sound was always a sort of plan B. For a number of years teaching and performing with a band or a DJ was enough to get by on. I was comfortable, financially speaking. That was until about between 2012-14, that’s when we really felt the effects of the post 2008 crash. While a lot of noise was made about the initial event, reality for the likes of me was a slow and steady decline. At that time I was leading workshops with kids with difficult backgrounds, many kids in care due to abuse and neglect. That was a solid 40% of my income, another 30% came from teaching Sound Production at a local university and the final 30% from shows.
2014 cutbacks ripped services to shreds and a few friends lost jobs. Since then, doing live sound kept the rent and bills paid but fast forward to 2025 and I’m way too tired for this shit! I hate admitting it but my earnings probably peaked around 2008 with a bump in tours from 2017 till Covid. Since then earnings have been steady in £'s but getting wiped out by inflation. In fact I had decent acounts this year but every month I'm broke by the time bills and basics have been taken care of. I LOVE mixing live music and I’m pretty good at it. I’ve had musicians call me ‘musical’ which is the highest compliment but I’m totally fucked still 2 days after Friday’s show. It's unsustainable.
I’m quitting live sound unless some touring comes up again, touring is different, living on a bus for 3 weeks pays the same as 3 months of local work and I just mix, no lifting gear. The band I tour with are based in the US and only come to the UK/EU every couple of years. I get odd trips away with other artists but they’re usually fly out EU gigs. 1 or 2 shows then fly home, plus they're irregular.
Right now I’m more interested to learn ways of making income online, I started the Kali Mera Show to learn self hosting content. Committing to a project each morning has done wonders for my mental health, cutting down on morning doom scrolling. It’s been highly successful in that regard but not so much financially. However this is jst phase 1. I’m learning the tech, learning the production and making as many mistakes as possible while the stakes are low. I’m very happy 10 or so people enjoy the show on a daily basis. Tiny numbers but I don’t fuck with YouTube or the other big tech platforms. Fuck them!
Phase 2 involves getting premises and broadening the services I can produce, focussing on content for others, getting some opportunities happening for young talent, arranging meet ups and setting up a hub to bring together the crazy, talented people I know. It’s going to be tough, I’m in a run down area, there’s not much money here (relatively speaking) but it’s an area I really dig and want to make better.
Why am I telling you this? I’m writing this as a means of getting my brain straight and sharing it because I’m open to improving myself. I see people doing interesting shit here and that helps with motivation and confidence. My only social media for the last 6 years has been the Fediverse and much as I love it, there’s a gloomier outlook there. The world is a strange place with so much bad shit but out of 8 or so billion people, I can only take on so much. Building shit in my own local community and provide facilities for online wins sounds way more productive and helpful in some small way.
I accept we’re all going to hell in a handcart but may as well enjoy the ride…
There’s much to learn, I’ve only ever been ‘in business’ for a short time in my life (despite always being freelance) and I sort of gave up on my previous attempt. Had I paid more attention I could’ve built a strong YouTube presence but I’m not into being a vehicle for companies to push their products, nor do I want to teach people music online. That market is now heavily saturated and very, very boring as far as I’m concerned. My heart wasn’t in it, even back in 2015. I’m not an influencer.
With a real life space there’s premises, business rates, and investors to consider, as well as developing services that people are actually happy to part cash with. It’s going to be hard but different hard to physically lifting sub-bass speakers up and down winding staircases! I don’t want to talk too much game, it’s results that matter but wasting days to exhaustion doesn’t help. It’s time to hang up my headphones and focus (FOCUS YOU FUCKING FUCK!).
Maybe you’re reading this and thought ‘shit, this guy’s totally deluded’. That’s cool. Tell me. I value feedback. A fair few cats here give life advice so I’ll assume you might know what you’re talking about...
-
![](/static/nostr-icon-purple-64x64.png)
@ d1795b1a:15ab2129
2025-02-02 11:45:38
### The Ego is an Illusion – and Yet, We Can Shape It
Carl Jung spoke of the **Shadow Self**—the repressed parts of our psyche that unconsciously influence our lives. **Buddhism**, on the other hand, teaches that there is no self at all—our ego is an illusion, a fleeting construct that we cling to out of fear of emptiness.
These two perspectives seem to contradict each other. One tells us to integrate our hidden self, the other to dissolve it completely. But what if both are only half the picture?
I believe the **Self is neither a fixed reality nor a mere illusion—it is a shapeable construct.** If that is true, then the path is not to destroy the **Ego-Self** or blindly follow it, but to **consciously shape it.**
### **Between the Shadow and Emptiness**
Our **Ego-Self** is our conscious identity—our thoughts, memories, and beliefs. **Jung** describes the **Self** as the totality of both **the conscious and unconscious mind.** Hidden in this unconscious space is the **Shadow Self**, containing everything we deny, suppress, or refuse to acknowledge. For Jung, the path to wholeness is **integration**—bringing light into the dark corners of the psyche.
**Buddhism**, however, goes further. It questions whether the **Self** exists at all. Our thoughts and emotions arise and disappear, our self-image is ever-changing—so **why do we cling to something so impermanent?**
Both views seem to offer opposite solutions: \
**• Jung:** Become WHOLE by integrating your Shadow. \
**• Buddha:** Become FREE by seeing the Self as an illusion.
But what if the **synthesis of both is the key?**
### The Self as a Shapeable Reality
If the **Self** is not fixed but fluid, then the path forward is neither **pure integration nor total dissolution** but **conscious creation.** \
\
**• Acknowledge the Shadow Self instead of fighting it.** \
**• See the Ego-Self not as absolute truth but as a flexible tool. \
• Engage the Solar Plexus—the center of the Unconscious Mind—through breathwork and self-awareness. \
• Use the Vagus Nerve as a bridge between conscious thought and unconscious emotion, actively shaping our beliefs and behaviors.**
This aligns with **New Thought philosophy**, which suggests that our thoughts shape not only our perception but our reality itself. If we embrace this, the question is no longer **“Who am I?”** but rather: **“Who do I want to be—and how can I create that Self?”**
### The Art of Shaping Yourself
Perhaps the **Self** is neither a rigid entity nor a complete illusion but a story we tell ourselves—a story we can rewrite. The key is not to destroy the Ego-Self but to **use it consciously, rather than being used by it.**
So the real question is not: **“Does the Self exist?”**
But rather: **“How aware are we of the fact that we are shaping it every moment?”**
-
![](/static/nostr-icon-purple-64x64.png)
@ 2e8970de:63345c7a
2025-02-02 11:44:40
![](https://pbs.twimg.com/media/GivLYuMWUAA4OqT?format=jpg&name=large)
https://www.nature.com/articles/s41598-024-68817-6
Sharing this study from half a year ago since in some sense AI made a discovery here that humans could not make. Big caveat: humans directed and made a machine learning model to do this.
The larger point still stands tho. In recent weeks there has been big discussions if AI can surpass human intelligence or only asymptotically approach it on a superhuman width of topics.
originally posted at https://stacker.news/items/873266
-
![](/static/nostr-icon-purple-64x64.png)
@ fd208ee8:0fd927c1
2025-02-02 10:33:19
# GitCitadel Development Operations
We, at GitCitadel, have been updating, moving, and rearranging our servers, for quite some time. As a rather large, complex, sprawling project, we have the infrastructure setup to match, so we've decided to give you all a quick run-down of what we are doing behind-the-scenes.
## Supplier Coordination
![DevOps Infrastructure](https://i.nostr.build/n58FKgGxCXLQKcKW.png)
Our first task, this week, was figuring out who would host what where. We have four different locations, where our infra is stored and managed, including two locations from our suppliers. We got that straightened out, quickly, and it's all slowly coming together and being connected and networked. Exciting to watch our DevOps landscape evolve and all of the knowledge-transfer that the interactions provide.
## OneDev Implementation
![One Dev projects](https://i.nostr.build/QoONlqWkCfiQZT60.png)
Our biggest internal infra project this week was the migration of all of our issues from Jira, build scripts from Jenkins, and repos from GitHub to a [self-hosted OneDev instance](https://onedev.gitcitadel.eu). In the future, all of our internal build, test, issue, patch/PR, etc. effort will take place there. We also have a separate repo there for communicating with external developers and suppliers.
Our [team's GitHub projects](https://github.com/ShadowySupercode) will be demoted to mirrors and a place for external devs to PR to. Public issues and patches will continue to be managed over our self-hosted [GitWorkshop instance](nostr:naddr1qvzqqqrhnypzplfq3m5v3u5r0q9f255fdeyz8nyac6lagssx8zy4wugxjs8ajf7pqy88wumn8ghj7mn0wvhxcmmv9uqq5emfw33kjarpv3jkcs83wav).
We're especially glad to finally escape the GitHub Gulag, and avoid being bled dry by Jira fees, without having to give up the important features that we've come to know and love. So, yay!
## Next Infrasteps
### Automated Testing
Now, that we have everything tied up in one, neat, backed-up package, we can finally move on to the nitty-gritty and the dirty work. So, we're rolling up our sleeves and writing the Selenium smoke test for our [Alexandria client](https://next-alexandria.gitcitadel.eu). We'll be running that in Docker containers containing different "typical Nostr" images, such as Chrome browser with Nostr Connect signing extension, or Firefox browser with Nos2x-fox extension. Once we get the Nsec Bunker and Amber logins going, we'll add test cases and images for them, as well. (Yes, we can do Bunker. I hope you are in awe at our powers).
We are also designing an automated infrastructure test, that will simply rattle through all the various internal and external websites and relays, to make sure that everything is still online and responsive.
After that, a Gherkin-based [Behave feature test](https://behave.readthedocs.io/en/latest/) for Alexandria is planned, so that we can prevent regression of completed functionality, from one release to the next.
The Gherkin scenarios are written and attached to our stories before development begins (we use acceptance tests as requirements), a manual test-execution is then completed, in order to set the story to *Done*. These completed scenarios will be automated, following each release, with the resulting script linked to from the origin story.
![Gherkin-style story in Jira](https://i.nostr.build/20PuzFBK2K0NI1Jq.png)
### Automated Builds
As the crowning glory of every DevOps tool chain stands the build automation. This is where everything gets tied together, straightened out, configured, tested, measured, and -- if everything passes the quality gates -- released. I don't have to tell you how much time developers spend staring at the build process display, praying that it all goes through and they can celebrate a Green Wave.
![Build process](https://i.nostr.build/GEXddUYUtFTfnie7.png)
We are currently designing the various builds, but the ones we have defined for the Alexandria client will be a continuous delivery pipeline, like so:
![Alex pipeline](https://i.nostr.build/F2ngfNbKKwD6uMU3.png)
This will make it easier for us to work and collaborate asynchronously and without unnecessary delays.
### Expanding the Status Page
![infra quote](https://i.nostr.build/lPvAlDSqrdu8B6RR.jpg)
And, finally, we get to the point of all of this busyness: reporting.
We are going to have beautiful reports, and we are going to post them online, on our [status page](https://status.gitcitadel.com). We will use bots, to inform Nostriches of the current status of our systems, so go ahead and follow our [GitCitadel DevOps npub](nostr:npub16p0fdr2xccfs07hykx92t0cascac69xjuwaq38kjqy3aawt5hx8s82feyj), to make sure you don't miss out on the IT action.
## Building on stone
All in all, we're really happy with the way things are humming along, now, and the steady increase in our productivity, as all the foundational work we've put in starts to pay off. It's getting easier and easier to add new team members, repos, or features/fixes, so we should be able to scale up and out from here. Our GitCitadel is built on a firm foundation.
Happy building!
-
![](/static/nostr-icon-purple-64x64.png)
@ 18e3af1e:1d42e5df
2023-08-13 02:40:19
Las comunidades son creadas mediante el esfuerzo de no solo un individuo, sino al trabajo de docenas; cientos o miles de personas. Mediante la especialización, como especie, logramos entender que: el saber hacer una sola cosa no significa morir de hambre, o no estar bien preparado para un ataque; por lo contrario, el dominio o maestría de una sola cosa... Puede crear una civilización entera.
Permitirnos un enfoque certero para aprender, dominar y amaestrar nuestras actividades en un periodo de tiempo finito, permitió nuestro avance hacia nuevos campos, de hecho, movió nuestra meta en magnitud tal, que al imaginar el pasado (para muchos) parece mas bien una película cómica y sombría.
Hoy en día, en un mundo regido por individualismo en el reino físico, la manifestación de constructores de comunidades sigue presente en el (reino) digital.
### La evolución de la construcción
A lo largo de la historia de la humanidad, la construcción ha evolucionado desde simples refugios hasta monumentos arquitectónicos y estructuras vanguardistas. Los primeros humanos crearon refugios rudimentarios con materiales naturales. Con la civilización, surgieron las primeras estructuras permanentes, como pirámides y templos, reflejando la organización social y creencias religiosas. La antigua Roma introdujo la innovación en la ingeniería con acueductos y arcos.
La Edad Media vio fortificaciones y catedrales góticas que fusionaban espiritualidad y técnica. El Renacimiento abrazó la proporción y la simetría en palacios y edificios renombrados. La Revolución Industrial marcó un cambio radical con el acero y el hormigón, permitiendo rascacielos y puentes icónicos.
El siglo XX trajo consigo la era de los rascacielos y la arquitectura modernista, desafiando límites estructurales y estéticos. La sostenibilidad ganó importancia en el siglo XXI, impulsando la incorporación de tecnologías avanzadas, como la impresión 3D y la construcción modular.
La historia de la construcción es un testimonio de la creatividad y la adaptabilidad humanas, reflejando no solo avances técnicos, sino también valores culturales y aspiraciones.
En el día hoy, los desarrolladores de software y tecnología podrían considerarse como los constructores del próximo siglo. Al igual que los constructores en otras épocas históricas, los desarrolladores de software son responsables de crear estructuras digitales que moldean la forma en que interactuamos, comunicamos y vivimos en el mundo moderno.
A medida que la tecnología continúa avanzando y la sociedad se vuelve cada vez más digital, el papel de los desarrolladores de software se vuelve crucial en la construcción de soluciones tecnológicas que abordan una amplia gama de desafíos.
Así como los arquitectos y constructores antiguos debían entender la física, la estética y las necesidades humanas para diseñar y construir edificios funcionales y atractivos, los desarrolladores de software deben comprender la lógica de programación, la experiencia del usuario, la seguridad cibernética y la innovación tecnológica para crear aplicaciones, sistemas y plataformas que sean útiles y efectivos.
### Individuos que inspiran
La inspiración individual es un poderoso motor de cambio que puede tener un impacto significativo en la mente colectiva de una comunidad o sociedad. Cuando una persona demuestra pasión, determinación y una visión positiva, puede influir en otros a nivel emocional y cognitivo. Aquí hay algunas formas en que la inspiración individual afecta a la mente colectiva:
La gente puede verse reflejada en las luchas y logros de alguien más, lo que crea un sentido de unidad y comunidad. Esto puede generar un mayor apoyo y solidaridad en torno a ciertas causas o valores. Además, la inspiración individual puede llevar a la acción. Cuando las personas son testigos de un individuo que supera obstáculos o logra metas desafiantes, esto puede motivar a otros a enfrentar sus propios desafíos y trabajar hacia sus objetivos. El ejemplo de una sola persona puede encender la chispa de la acción en muchas más.
La inspiración individual puede tener un efecto multiplicador. Cuando una persona inspirada comparte su historia o experiencia, puede inspirar a otros, creando una cadena de influencia que se extiende a través de redes sociales, comunidades y sociedades enteras. Esto puede tener un impacto a gran escala en la mente colectiva.
El individuo inspirador tiene el potencial de influir profundamente en la mente colectiva al cambiar percepciones, motivar la acción y crear una sensación de comunidad y unidad.
### Comunidades: origen, inicios y progreso.
Las comunidades han sido una parte fundamental de la experiencia humana a lo largo de la historia. Desde los primeros tiempos hasta la era moderna, las comunidades han evolucionado y cambiado en respuesta a las necesidades, avances tecnológicos y contextos culturales.
Desde los primeros días de la humanidad, nuestros antepasados se agruparon en pequeñas comunidades para sobrevivir. Estas comunidades eran grupos familiares o tribus que compartían recursos y conocimientos para cazar, recolectar alimentos y protegerse de los peligros. La cooperación y la solidaridad eran esenciales para la supervivencia.
Con el desarrollo de la agricultura, las comunidades evolucionaron hacia asentamientos más permanentes. La capacidad de cultivar alimentos permitió la formación de aldeas y pueblos, donde la gente podía establecerse y construir relaciones más complejas. Esto llevó al surgimiento de una división del trabajo más especializada y al desarrollo de habilidades artesanales.
Las civilizaciones antiguas, como la sumeria, egipcia, griega y romana, dieron paso a la formación de ciudades y sociedades más organizadas. Las comunidades se convirtieron en centros de comercio, gobierno y cultura. Se construyeron estructuras monumentales, como templos y palacios, que unificaron a las personas en torno a creencias religiosas y sistemas políticos.
Durante la Edad Media, las comunidades se organizaron en torno a sistemas feudales. Los señores feudales gobernaban sobre las tierras y las personas locales. Las aldeas y feudos eran autónomos en gran medida y se centraban en la agricultura y la autosuficiencia.
La Revolución Industrial marcó un cambio importante en la estructura de las comunidades. La industrialización dio lugar a la urbanización, con muchas personas dejando las zonas rurales para trabajar en fábricas en las ciudades.
En la era moderna, las comunidades han continuado evolucionando con avances tecnológicos y la globalización. Las redes sociales y las comunicaciones digitales han conectado a personas de todo el mundo, creando comunidades virtuales en línea.
### Bitcoin | Nostr y la chispa del constructor
Como ya vimos, un solo individuo puede inspirar a muchos otros, teniendo un efecto multiplicador. Esto no solo se traduce al mundo físico, por el contrario, esta directamente ligado a nuestra psicología, incluso podemos decir que va aun mas allá, adentrándonos en el terreno ideológico y espiritual.
Hasta hace no mucho, estábamos a merced de las grandes corporaciones que construían todo por nosotros, mientras esperábamos con ansias las nuevas actualizaciones de cada iteración de sus productos. Cada vez mas y mas nos hacíamos dependientes de dichas corporaciones sin quizás notarlo, poco a poco se fueron apoderando de nuestro tiempo y muy insidiosamente de nuestra personalidad e identidad.
Gracias a las alternativas presentadas hoy en día y a los individuos que inspiran a otros, existe la posibilidad de construir algo que va mas allá de las grandes corporaciones, porque transciende no solo el nivel físico y digital, sino que también transciende a los individuos que aportan a la comunidad. Estoy hablando por supuesto de Nostr, y como los incentivos están alineados gracias a Bitcoin.
Pongamos como ejemplo un par de nombres para ilustrar como individuos que inspirar pueden crear una chispa que se extiende a cada persona dentro de la comunidad.
Personajes como nostr:npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft nostr:npub1utx00neqgqln72j22kej3ux7803c2k986henvvha4thuwfkper4s7r50e8 nostr:npub1v0lxxxxutpvrelsksy8cdhgfux9l6a42hsj2qzquu2zk7vc9qnkszrqj49 nostr:npub107jk7htfv243u0x5ynn43scq9wrxtaasmrwwa8lfu2ydwag6cx2quqncxg (entre muchos otros que podría mencionar pero todo el articulo seria una lista de nombres) han inspirado a otros desarrolladores, creadores de contenido (y todas las otras especializaciones que te puedas imaginar…) A construir sobre este protocolo. Incluso, personas como el caso mas reciente de nostr:npub1m64hnkh6rs47fd9x6wk2zdtmdj4qkazt734d22d94ery9zzhne5qw9uaks han encontrado inspiración para aprender a programar sobre estos mismos rieles.
> nostr:nevent1qqs8fe938k7j5sxcprrv89ezpu09m9pzm90f0sq24hnwlwu0rmn09qcpzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxg5vtygh
La chispa del constructor en palabras mas concisas es: **Inspiración multiplicadora en pos de la productividad y por ende, del crecimiento de una comunidad.**
Sin Bitcoin y Lightning Network, esto seria posible, pero mucho menos efectivo debido a que las personas detrás de toda labor que este enfocada en creación de contenido, desarrollo, etc. Tienen que comer.
### Conclusión
La chispa del constructor radica en la inspiración individual que impulsa a la acción colectiva. Desde la evolución de la construcción hasta las comunidades digitales, **el poder de un individuo inspirado puede moldear el presente y el futuro de las comunidades en todo el mundo.**
-
![](/static/nostr-icon-purple-64x64.png)
@ 006532cb:fd8f28b4
2025-02-02 09:50:56
I am new to #NOSTR and not a #Dev; however, npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn's [article](https://njump.me/naddr1qvzqqqr4gupzp978pfzrv6n9xhq5tvenl9e74pklmskh4xw6vxxyp3j8qkke3cezqyw8wumn8ghj76r0v3kxymmy9e3k7unpvdkx2tn5dahkcue0qy88wumn8ghj7mn0wvhxcmmv9uqq6vfhxvurydfhxq6nwvfj8q4tttqv) inspired me to research and understand further. As a result, I have condensed my learnings into 10 bullet points that seem to embody the spirit of being a nostrich and the qualities we should all strive for when engaging with one another making software choices and avoiding NINO's.
1. **You shall not compromise on security:** Prioritize the security and integrity of user data, using best practices and Nostr's built-in features to protect against unauthorized access and malicious activity.
2. **You shall prioritize user agency:** Respect users' mute lists, use their web of trust to filter out spam, and prioritize user control over their data.
3. **You shall be decentralized and open:** Do not hardcode relay URLs or depend on specific relay implementations, ensuring that your platform is truly decentralized and open.
4. **You shall leverage Nostr's technical aspects:** Take advantage of Nostr's features, such as self-authenticating data, event handlers, and relays, to build a robust and decentralized platform.
5. **You shall use native Nostr solutions:** Prefer Nostr-native solutions to solve problems, rather than relying on legacy web services, promoting a more decentralized and resilient ecosystem.
6. **You shall prioritize interoperability:** Implement NIP 89 (Recommended Application Handlers) to enable seamless interactions with other Nostr apps, promoting a unified and decentralized ecosystem.
7. **You shall engage with the community:** Share knowledge, contribute to the growth of the ecosystem, and collaborate with other Nostr developers to promote a unified and thriving community.
8. **You shall be transparent and accountable:** Be transparent in your development processes, and accountable for your actions and decisions, promoting trust and confidence in the Nostr ecosystem.
9. **You shall innovate and evolve:** Continuously innovate and improve your platform, staying up-to-date with the latest developments in the Nostr protocol and ecosystem, to ensure the best possible experience for users.
10. **Embody Nostr:** Your application should truly represent the Nostr protocol, using its features and network to provide unique value to users.
I am excited for the future. In Eric S. Raymond's book "The Cathedral and the Bazaar" he comments;
> "...and the robust doesn't care too much"
Nostr embodies the spirit of the Bazaar, a vibrant and eclectic marketplace where the robust thrive, all are welcomed and empowered to become strong.
/GN!
-
![](/static/nostr-icon-purple-64x64.png)
@ 63e047aa:2e1ae74f
2025-02-02 09:00:46
In this blog post, I will walk you through the process of integrating Nostr login functionality into my Rails application using the Nos2x extension. This involved modifying the Devise User model, adding a new route to handle Nostr users, and integrating JavaScript to enhance the login experience.
## Overview
Nostr is a decentralized protocol that allows users to authenticate without relying on traditional email/password combinations. By leveraging the Nos2x extension, I was able to implement Nostr login seamlessly. Here’s how I did it.
## Step 1: Adding Asynchronous Nostr client in Ruby
```bash
bundle add nostr
```
## Step 2: Modifying the Devise User Model
The first step was to modify the Devise User model to allow empty email validation. This is crucial because Nostr users may not have an email address. I updated the `User` model as follows:
```ruby
class User < ApplicationRecord
# Include default devise modules. Others available are:
# :confirmable, :lockable, :timeoutable, :trackable, :registerable and :omniauthable
devise :database_authenticatable, :registerable,
:recoverable, :rememberable # Removed :validatable
# Validations
validates :nostr_public_key, presence: true, uniqueness: true, allow_blank: true
validates :email, uniqueness: true, allow_blank: true # Make email optional
validates :password, length: { minimum: 6 }, allow_blank: true # Make password optional but enforce length if provided
# Conditional validation for email and password
validates :email, presence: true, unless: :nostr_public_key_present?
validates :password, presence: true, unless: :nostr_public_key_present?
private
def nostr_public_key_present?
nostr_public_key.present?
end
end
```
By adding this validation, I ensured that users logging in via Nostr would not be required to provide an email address.
## Step 3: Adding a New Route for Nostr Users
Next, I needed to create a new route to handle the login process for Nostr users. I added the following route to my `config/routes.rb` file:
```ruby
Rails.application.routes.draw do
# Other existing routes...
post 'users/nostr_login', to: 'users#nostr_login', as: 'nostr_login'
end
```
This route points to a new action in the `UsersController` that will manage the authentication process for Nostr users.
## Step 4: Implementing the Nostr Login Action
In the `UsersController`, I implemented the `nostr_signup` action to handle the login logic:
```ruby
# app/controllers/users_controller.rb
class UsersController < ApplicationController
# Custom error handling for CSRF token verification failure
rescue_from ActionController::InvalidAuthenticityToken do |exception|
render json: { error: "Can't verify CSRF token authenticity." }, status: :unprocessable_entity
end
def nostr_signup
nostr_signed_event = params[:signed_event]
if not nostr_signed_event
render json: { success: false, error: "No signed event provided." }, status: :unprocessable_entity
return
end
public_key = nostr_signed_event[:pubkey]
content = nostr_signed_event[:content]
kind = nostr_signed_event[:kind]
csrf_token = request.headers['X-CSRF-Token']
tags_hash = tags.to_h
challenge_value = tags_hash["challenge"]
relay_value = tags_hash["relay"]
expected_relay_value = ENV.fetch('NOSTR_AUTH_RELAY_URL', 'wss://relay.primal.net')
# Check if the challenge_value and relay_value are matching or if kind is valid
if challenge_value != csrf_token || kind != 22242 || relay_value != expected_relay_value
return render json: { success: false, error: "Invalid event provided." }, status: :unprocessable_entity
end
nostr_event = Nostr::Event.new(
content: content,
id: nostr_signed_event[:id],
created_at: nostr_signed_event[:created_at],
kind: kind,
pubkey: public_key,
sig: nostr_signed_event[:sig],
tags: nostr_signed_event[:tags]
)
# Validate the event's signature
unless nostr_event.verify_signature
render json: { success: false, error: "Invalid event signature." }, status: :unprocessable_entity
return
end
user = User.find_or_initialize_by(nostr_public_key: public_key)
...
end
private
def nostr_signup_params
params.permit(signed_event: [:id, :kind, :content, :tags, :created_at, :pubkey, :sig])
end
end
```
This action will handle the authentication process and create a new user if they do not already exist.
## Step 5: Integrating JavaScript for Nostr Login
To enhance the user experience, I added a link for Nostr login on the Devise login page. I included the following JavaScript code to handle the Nostr login process:
```javascript
document.addEventListener("turbo:load", function () {
if (isNostrAvailable() && !document.getElementById('nostr-signup')) {
createNostrSignupButton();
}
});
// Function to check if Nostr is available
function isNostrAvailable() {
return window.nostr && typeof window.nostr.getPublicKey === 'function';
}
// Function to create and append the Nostr signup button
function createNostrSignupButton() {
event.preventDefault();
const button = document.createElement('button');
button.id = "nostr-signup";
button.onclick = function(event) {
event.preventDefault();
nostrSignupHandler();
};
button.type = "submit";
button.textContent = "<%= t('nostr.with_extension') %>";
const actionsDiv = document.querySelector('.actions');
if (actionsDiv) {
actionsDiv.appendChild(button);
}
}
async function nostrSignupHandler() {
try {
const publicKey = await window.nostr.getPublicKey();
if (!publicKey) {
alert("Sign-up failed. No public key.");
}
token = document.querySelector('meta[name="csrf-token"]').getAttribute("content");
const event = {
"created_at": Math.floor(Date.now() / 1000),
"content": "",
"tags": [
[
"relay",
"<%= ENV['NOSTR_AUTH_RELAY_URL'] || 'wss://relay.primal.net' %>"
],
[
"challenge",
token
]
],
"kind": 22242,
"pubkey": publicKey
};
// Sign the event
const signedEvent = await window.nostr.signEvent(event);
if (!signedEvent) {
alert("Sign-up failed. Event not signed.");
}
const response = await fetch("/nostr_signup", {
method: "POST",
headers: {
"Content-Type": "application/json",
"X-CSRF-Token": token,
},
body: JSON.stringify({ "signed_event": signedEvent }),
});
...
```
## Conclusion
By following these steps, I successfully integrated Nostr login functionality into my Rails application using the Nos2x extension. This not only enhances the user experience by providing a decentralized login option but also aligns with modern authentication practices.
Feel free to reach out if you have any questions or need further assistance with implementing Nostr login in your own applications!
If you want to see it in action, go ahead to [Medical Dictionary - Login Page](https://medical.inarchives.com/users/sign_in) for example. You will need to be on a desktop browser with a Nostr Extension installed.
Happy coding!
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-02 08:18:39
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/873174
-
![](/static/nostr-icon-purple-64x64.png)
@ 83279ad2:bd49240d
2025-01-24 09:15:37
備忘録として書きます。意外と時間がかかりました。全体で1時間くらいかかるので気長にやりましょう。
仮想通貨取引所(販売所ではないので、玄人が使えばお得らしい)かつBitcoinの送金手数料が無料(全ての取引所が無料ではない、例えばbitbankは0.0006bitcoinかかる)なので送金元はGMOコインを使います。(注意:GMOコインは0.02ビットコイン以下は全額送金になってしまいます)
今回はカストディアルウォレットのWallet of Satoshiに送金します。
以下手順
1. GMOコインでbitcoinを買います。
2. GMOコインの左のタブから入出金 暗号資産を選択します。
3. 送付のタブを開いて、+新しい宛先を追加するを選択します。
4. 送付先:GMOコイン以外、送付先ウォレット:プライベートウォレット(MetaMaskなど)、受取人:ご本人さま を選んで宛先情報の登録を選ぶと次の画面になります。<br>![image](https://yakihonne.s3.ap-east-1.amazonaws.com/83279ad28eec4785e2139dc529a9650fdbb424366d4645e5c2824f7cbd49240d/files/1737704778253-YAKIHONNES3.png)
5. 宛先名称にwallet of satoshi(これはなんでも良いです わかりやすい名称にしましょう) wallet of satoshiを開いて、受信→Bitcoin On-Chainからアドレスをコピーして、ビットコインアドレスに貼り付けます。<br>![image](https://yakihonne.s3.ap-east-1.amazonaws.com/83279ad28eec4785e2139dc529a9650fdbb424366d4645e5c2824f7cbd49240d/files/1737704940581-YAKIHONNES3.jpeg)
6. 登録するを押します。これで送金先の登録ができました。GMOコインの審査がありますがすぐ終わると思います。
7. ここから送金をします。送付のタブから登録したビットコインの宛先リストwallet of satoshiを選択し、送付数量と送付目的を選択して、2段階認証をします。<br>![image](https://yakihonne.s3.ap-east-1.amazonaws.com/83279ad28eec4785e2139dc529a9650fdbb424366d4645e5c2824f7cbd49240d/files/1737705486578-YAKIHONNES3.png)
8. 実行を押せば終わりです。もうあなたがやることはありません。送金が終わるのを40分くらい眺めるだけです。<br>![image](https://yakihonne.s3.ap-east-1.amazonaws.com/83279ad28eec4785e2139dc529a9650fdbb424366d4645e5c2824f7cbd49240d/files/1737705645474-YAKIHONNES3.png)
8. 取引履歴のタブから今の送金のステータスが見れます。<br>![image](https://yakihonne.s3.ap-east-1.amazonaws.com/83279ad28eec4785e2139dc529a9650fdbb424366d4645e5c2824f7cbd49240d/files/1737705739728-YAKIHONNES3.png)
9. 15分くらい待つとステータスが受付に変わります。<br>![image](https://yakihonne.s3.ap-east-1.amazonaws.com/83279ad28eec4785e2139dc529a9650fdbb424366d4645e5c2824f7cbd49240d/files/1737707383395-YAKIHONNES3.png)
10. 20分くらい待つとトランザクションIDが表示されます。 <br>
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/83279ad28eec4785e2139dc529a9650fdbb424366d4645e5c2824f7cbd49240d/files/1737707821058-YAKIHONNES3.png)<br>この時点からwallet of satoshiにも送金されていることが表示されます。(まだ完了はしていない) <br>
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/83279ad28eec4785e2139dc529a9650fdbb424366d4645e5c2824f7cbd49240d/files/1737707900309-YAKIHONNES3.jpeg)
11. ステータスが完了になったら送金終わりです。<br> ![image](https://yakihonne.s3.ap-east-1.amazonaws.com/83279ad28eec4785e2139dc529a9650fdbb424366d4645e5c2824f7cbd49240d/files/1737708834517-YAKIHONNES3.png)<br> wallet of satoshiにも反映されます。<br> ![image](https://yakihonne.s3.ap-east-1.amazonaws.com/83279ad28eec4785e2139dc529a9650fdbb424366d4645e5c2824f7cbd49240d/files/1737708958588-YAKIHONNES3.jpeg)
-----------
お疲れ様でした!
-
![](/static/nostr-icon-purple-64x64.png)
@ 63e047aa:2e1ae74f
2025-02-02 08:12:53
**We have not lived the longest period of peace in history yet, but we will live the longest period of peace in history!**
In a world often defined by conflict, power struggles, and competition for resources, we are constantly searching for ways to build a more peaceful and just society. While most people look at Bitcoin as a financial asset or a tool for decentralizing wealth, I believe its potential reaches far beyond economics. Bitcoin might offer humanity something even greater—a new foundation for **peace**.
## Moving Beyond Conflict: A New Kind of Power
Throughout history, wars have been fought over control—control of land, resources, economies, and the power to enforce rules. In contrast, Bitcoin's decentralized structure removes the need for such centralized control. No single entity governs Bitcoin, and no one can wield unchecked power over the system. The proof-of-work mechanism ensures security and fairness without the need for violence, coercion, or centralized oversight.
As **Jason Lowery** suggests in his work on Bitcoin as a form of power projection, Bitcoin can be seen as a new kind of digital deterrent, one that allows nations to secure their interests without the need for traditional force or military conflict. This shift in power could give rise to a new form of diplomacy, one built on transparency, equal access, and mutual trust. In a world where no single nation or group can manipulate the economic system, we reduce the incentives for conflict.
## Bitcoin as a Tool for Transparency and Trust
At its core, Bitcoin is a trustless system—no one needs to trust a central authority to ensure fairness. Instead, cryptography and mathematics guarantee the security of the network. This system of transparency could extend far beyond finance, offering a new way for people, governments, and organizations to interact without fear of manipulation or corruption.
By removing the need for intermediaries, Bitcoin could pave the way for global cooperation, where each party can act with confidence in a system that cannot be easily undermined. It creates a level playing field, not just economically but also in terms of information sharing and governance.
## Beyond National Defense: A Vision for Peace
Jason Lowery’s exploration of Bitcoin as a strategic defense tool highlights the ways it can serve as a power projection system for nations, offering a new form of security and sovereignty. But I believe this is just the beginning. What if Bitcoin could give nations and individuals a means to engage peacefully?
By empowering people to own their wealth and secure their assets without relying on central banks or governments, Bitcoin could weaken the structures that fuel geopolitical conflicts. When control is decentralized, and power is more evenly distributed, we may find fewer reasons to engage in war.
## A New Way Forward
Imagine a world where peace is not dictated by the threat of force or control over resources but by the mutual benefit of a decentralized system that serves everyone equally. Bitcoin, in this light, becomes more than a financial innovation—it becomes a blueprint for how we might move toward a more peaceful and just world.
Satoshi Nakamoto may not have intended Bitcoin to be a pathway to peace, but the potential is there. As Jason Lowery highlights, Bitcoin's decentralized nature could evolve into a critical part of how nations secure their futures in the digital age. What if we embraced it, not just as a store of value but as a new foundation for how we build trust, security, and cooperation?
I believe that Bitcoin represents more than just financial freedom—it offers us a chance to rethink the systems that have governed our world for centuries. It gives us the opportunity to engage with each other in a way that fosters peace, not conflict. Most importantly, nations would not need to fight over who holds the most Bitcoin—because in a truly decentralized and transparent system, it is not about accumulating more. It simply needs to be adopted, and by doing so, the value it creates can be shared equally, reinforcing the principles of cooperation and global harmony. Redefining peace through decentralized, secure systems like Bitcoin might just be one of the most significant shifts in human history.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21ac2956:09d1e2df
2025-01-22 15:27:00
## [kakoi](https://github.com/betonetojp/kakoi) の仕様についてのメモ
### キーボード操作
* 左手での操作に最適化
| キー | 動作 |
|:-|:-|
| ESC | 設定画面 |
| F1 / F12 | ポストバーの表示と非表示 |
| F2 | 時間の表示と非表示 |
| F3 | ユーザーアイコンの表示と非表示 |
| F4 | 名前の表示と非表示 |
| F5 | Geminiによるタイムラインまとめ画面を表示 |
| F9 / Z | コンテンツの折り返し表示の切り替え (余白ダブルクリックでも動作) |
| F10 | ユーザーリストとキーワード通知の設定画面 (余白右クリックでも動作) |
| F11 | メイン画面の表示と非表示 (ポストバー表示) |
| Shift + W | イベント最上行へ移動 |
| W / ↑| イベント選択上移動 |
| S / ↓ | イベント選択下移動 |
| Shift + S | イベント最下行へ移動 |
| A / ← | Webビューを開く (イベントを右クリックでも動作) |
| F / → | リアクションを送信 (イベントをダブルクリックでも動作) |
| 1 ~ 0 | リアクションを選択 |
| R | 返信 |
| B | リポスト |
| Q | 引用 |
| C | Webビューを閉じる |
| Ctrl + Shift + A | メイン画面をアクティブにする |
### タイムライン
* kind:1, 6, 7, 16を取得して表示する
* フォロイーの名前の前には * が付く
### フォローリスト(kind:3)
* 参照のみで更新はしない
* F10 で開くユーザーリストでユーザーを選択し petname セルをクリックすることで未フォローユーザーにもペットネームを設定可能(ローカル保存)
### プロフィール(kind:0)
* F10 で開くユーザーリストでユーザーを選択し picture セルをクリックすることでユーザーのアイコン表示を変更可能(ローカル保存)
### 返信([NIP-10](https://github.com/nostr-protocol/nips/blob/master/10.md) kind:1)
* kakoi のタイムラインに流れるすべてのイベント種に返信可能とする
* スレッドを考慮せず、単一イベントへの単発返信とする
* e タグは marker と返信先 pubkey は設定していない。 relay-url には空文字を設定
```json
["e", "返信先 event-id", ""]
```
* p タグは 返信先 pubkey ひとつだけを指定
### リポスト([NIP-18](https://github.com/nostr-protocol/nips/blob/master/18.md) kind:6 , 16)
* kakoi のタイムラインに流れるすべてのイベント種をリポスト可能
* kind:1はkind:6。その他はkind:16でリポストする
* e タグは relay-url に空文字を設定
```json
["e", "リポスト元 event-id", ""]
```
### 引用([NIP-18](https://github.com/nostr-protocol/nips/blob/master/18.md) kind:1)
* q タグは relay-url に空文字を設定
```json
["q", "引用元 event-id", ""]
```
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-02 05:47:57
Hey there, as a result of the recent [SN Media Kit](https://stacker.news/items/872925/r/Design_r) updated, I'll try to create few simple marketing assets for ~Stackers_Stocks territory to be spread across the web.
Feel free to share in the comments below:
- Few visual references you'd like the assets to be inspired on
- If visuals are not your thing, a description of your idea will help too
- A slogan, or some words/concepts that express the territory's values
@BlokchainB you start, let's see how we go!
originally posted at https://stacker.news/items/873112
-
![](/static/nostr-icon-purple-64x64.png)
@ 604e96e0:20279eb2
2023-08-11 18:39:36
notacomment allows you to zap nostr notes when you comment on them. In order to use notacomment, you have to run a script yourself either on your own computer or in the cloud somewhere. To get started open https://github.com/SamSamskies/notacomment in a browser tab.
At this point, I'm sure a lot of you are feeling like this:
![angry black kid meme - how tf do i use notacomment](https://i.imgflip.com/7titzm.jpg)
Let's breakdown the instructions from the README.
## Prerequisites
Node.js and npm - I suggest installing the latest Node.js LTS version from https://nodejs.org. That should also install npm.
Once installation is complete, open your terminal. On a Mac you can press cmd + spacebar and type in `terminal` to open the terminal. On other platforms, you'll have to ask ChatGPT 😂
.
To verify installation of Node.js type `node -v`. To verify installation type `npm -v`.
It should look something like this:
![screenshot of terminal verifying installation](https://cdn.nostr.build/i/e4eb75654317d5cd097b94a4d7abfecafa086bf54761edfcd6d6443db3dd06fe.png)
Leave the terminal open.
## Downloading the code to your computer
The easiest way to download the code is to download the zip file from the GitHub repo. Remember that first link I told you to open? That's the GitHub repo. Click the green button that says `Code` on it and click `Download ZIP` from the menu.
![screenshot of where to click to download the code](https://cdn.nostr.build/i/987c9c2357bc07251ec94ba5a7747bea14a1ae5f1c4e1282864016beea34f2e3.png)
Now unzip the file and then navigate to the folder in the terminal. To navigate to the folder use the `cd` command. If you unzipped the folder in the `Downloads` folder, you can navigate to the folder by typing `cd ~/Downloads/notacomment-main/`.
## Usage With Strike
1. Create an account with Strike if you don't already have one https://strike.me/download/
1. Get a Strike API key with all the payment scopes from https://dashboard.strike.me/
1. Create a .env file and provide NOSTR_NSEC and STRIKE_API_KEY values (see .env.example)
1. Install the dependencies using npm or yarn or whatever your heart desires
1. Make sure you have money in your Strike account
1. Run the script `npm start`
Keep in mind that Strike pays the invoices from your cash balance. This means the payment rounds up to the nearest cent when paying an invoice, so if you set the zap amount to 1 sat, you'll be sending more money to Strike than the person you are zapping with every zap.
## Usage With LNbits
I recommend making a separate wallet from your main LNbits wallet for usage with notacomment in case you accidentally leak the admin key.
1. Create a .env file and provide NOSTR_NSEC, LNBITS_ADMIN_KEY, and LNBITS_URL values (see .env.example)
1. Install the dependencies using npm or yarn or whatever your heart desires
1. Make sure you have sats in your LNbits wallet
1. Run the script `npm start`
## Usage With Nostr Wallet Connect
1. Create a NWC connection string using something like https://nwc.getalby.com/
1. Create a .env file and provide NOSTR_NSEC and NWC_CONNECTION_STRING values (see .env.example)
1. Install the dependencies using npm or yarn or whatever your heart desires
1. Make sure you have sats in your wallet that you generated the NWC connection string with
1. Run the script `npm start`
<br />
<br />
Screenshot of terminal with commands to install dependencies, create .env file, open .env file, and start the script:
![screenshot of terminal with install commands and script running](https://cdn.nostr.build/i/03c4048775c9a13dd262c60a8a2629e374eacf30adc6513c941da9f58ba1cfd4.png)
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-02 05:36:57
Hey there, as a result of the recent [SN Media Kit](https://stacker.news/items/872925/r/Design_r) updated, I'll try to create few simple marketing assets for ~Construction_and_Engineering territory to be spread across the web.
Feel free to share in the comments below:
- Few visual references you'd like the assets to be inspired on
- If visuals are not your thing, a description of your idea will help too
- A slogan, or some words/concepts that express the territory's values
@BlokchainB you start, let's see how we go!
originally posted at https://stacker.news/items/873104
-
![](/static/nostr-icon-purple-64x64.png)
@ e3168078:10f13b2c
2025-01-21 15:44:45
ノス!
最近Umbrel上のn8nを使ってstacker newsの記事を要約するNostr botを作ってみました。
その際にFirecrawlというスクレイピングのSaaSを使っていたんですがセルフホストできるようなので試してみました。
Firecrawlは動的なページも読めたりマークダウンへの変換をしてくれますが無料プランだと1ヶ月500ページの制限があり、セルフホストすれば気兼ねなく使えます!
今回はUmbrel上のPortainerというアプリを使ってFirecrawlを動かせたのでその記録です。
## 手順
まずはUmbrelにPortainerアプリをインストールします。
Poratinerは今回初めて使ったんですが独自のDockerコンテナをUmbrelで動かす際に推奨されているアプリのようです。
![portainer](https://cdn.satellite.earth/be69ccc7abef5ee7b675570c6425542953de6416f68d125866fdb9c21b575d1b.png)
アプリを開いてパスワードの初期設定などを済ませるとダッシュボードが表示されるかと思います。
ここでStackという機能を使ってFirecrawlのDocker composeを一括で取り込むことができます。
新しいStackを作成する画面で以下を入力します。
Repository URL: https://github.com/mendableai/firecrawl
Repository reference: refs/heads/main
Compose path: docker-compose.**yaml** (デフォルトがymlになっててハマりました…)
![create stack](https://cdn.satellite.earth/46c3626d54bd2d77d71ee5ea6a8ce9bcc76356fc0da7a95ff1860f280bfe0eac.png)
上記に加えてenv varを設定する必要があるんですがPortainerでは上記の画像下部にあるように "Load Variables from .env file" からenvファイルを選択できます。
[Firecrawlのgithub](https://github.com/mendableai/firecrawl/blob/main/SELF_HOST.md)にあるように apps/api/.env.example をダウンロードし以下の内容を更新しPortainerに取り込ませます。
```
USE_DB_AUTHENTICATION=false
TEST_API_KEY=fc-test-key
```
あとはDeploy the stackを押して少し待つとfirecrawlのセットアップ完了です。
## 確認
動作テストにはUmbrelの設定からAdvanced Settings -> Terminal -> Umbrel OSを開き以下のコマンドを実行ししマークダウンが返って来れば成功です。
```
$ curl -X POST http://localhost:3002/v1/scrape -H 'Authorization: Bearer fc-test-key' -H 'Content-Type: application/json' -d '{
"url": "https://example.com",
"formats": ["markdown"]
}'
{"success":true,"data":{"markdown":"Example Domain\n==============\n\nThis domain is for use in illustrative examples in documents. You may use this domain in literature without prior coordination or asking for permission.\n\n[More information...](https://www.iana.org/domains/example)","metadata":{"title":"Example Domain","ogLocaleAlternate":[],"scrapeId":"7c196348-6561-4ebb-bb8a-9121a29c64b5","viewport":"width=device-width, initial-scale=1","sourceURL":"https://example.com","url":"https://example.com/","statusCode":200}}}
```
またn8n等のUmbrelの他のアプリ(コンテナ)から利用する場合はlocalhostがコンテナ自身になってしまうので別のIP等(172.17.0.1)を使う必要があるのでご注意ください。
([参考](https://community.n8n.io/t/the-service-refused-the-connection-perhaps-it-is-offline-n8n-and-nocodb/33587?utm_source=chatgpt.com))
以上でUmbrel上でのFirecrawlセルフホストができるようになりn8nからも制限なく使えるようになりました。
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-02 03:16:40
**Why Privacy Matters and How to Protect It**
Privacy is about control. It’s not about hiding yourself but deciding what others can see about you. Just as you don’t share everything when buying a magazine, technology shouldn’t force you to reveal more than needed.
Why Privacy is Important
1. Personal Control:
Privacy lets you choose what parts of your life are visible. You shouldn’t have to share everything just to use a service.
2. Security Against Exploitation:
Without privacy, people and groups can be targeted by companies or governments. This abuse can lead to data breaches or unnecessary surveillance.
3. Building Trust:
Privacy is key to trust in relationships and communities. When your info is safe, you can transact and communicate without fear of misuse.
**How to Protect Your Privacy**
1. Think Before You Share: Only share what’s necessary and know why you’re doing it.
2. Use Encryption: Encrypt sensitive communications like emails or messages.
3. Control Data Sharing: Avoid oversharing personal details online.
4. Enable Privacy Tools: Use VPNs or privacy settings on social media to shield your data.
5. Be Mindful of Metadata: Understand that metadata (like location data) can reveal more about you than the content itself.
6. Support Privacy-Focused Brands: Choose services that prioritize privacy, like encrypted messaging apps.
7. Read Privacy Policies: Know what data you’re sharing and with whom. 8. Tools like privacy.io can help visualize your digital footprint.
9. Block Trackers: Use tools like DoNotTrackMe or uBlock Origin to stop trackers from collecting your data.
**Conclusion**
Protecting privacy is a vital step in safeguarding your personal freedoms. By taking proactive measures, you can control what information is accessible and ensure that your rights are respected. Remember, you are your own best advocate for privacy—trust no one but yourself to protect your data and identity.
Join the movement to champion privacy as a fundamental human right. Advocate for stronger laws and encourage others to take action, so we can all enjoy safer, more secure digital environments.
-
![](/static/nostr-icon-purple-64x64.png)
@ 6e75f797:a8eee74e
2023-08-07 13:16:42
Last night I started a nostr community multiplayer instance for No Man's Sky [on ZapStream](https://zap.stream/) and before we knew it, we had 4 Nostrichs arriving on the genesis planet to join the fun.
![nostrverse 01](https://m.primal.net/HHzf.jpg)
NSM is an deterministic, procedurally generated open universe where players can explore, quest, build, combat and have fun together. Every new system discovered is generated when the first Traveller enters the system making the game a unique experience for any open world gaming fan.
If you fancy joining us in the Nostrverse let me know and I'll friend you in #NMS and on Steam or Epic. If you just want to watch the fun, participate in naming systems, planets, fauna and flora come and hang out in my stream or the stream of [Oceanbee](nostr:npub1wqxxe0cjaxnvmrv4lkvx8d5dlft7ewswyn09w5v7fg7642fgzm7srucxws), [HolgerHatGarKeineNode](nostr:npub1pt0kw36ue3w2g4haxq3wgm6a2fhtptmzsjlc2j2vphtcgle72qesgpjyc6) or [taette](npub1yh0dl6pazf55025qvp860lstpscuy0kj2a5lfhxlk400m968vgpql5vsnd).
![nostrverse 02](https://m.primal.net/HHzg.jpg)
### If you already own NMS, feel free to add me!
My NMS friend code is: EMAZ-KMHT-ZPFXP
See you in space Traveller! - TheGrinder
-
![](/static/nostr-icon-purple-64x64.png)
@ 9e5a3a1a:ed414e8d
2025-02-02 00:51:34
(deleted)
-
![](/static/nostr-icon-purple-64x64.png)
@ 97c70a44:ad98e322
2025-01-30 17:15:37
There was a slight dust up recently over a website someone runs removing a listing for an app someone built based on entirely arbitrary criteria. I'm not to going to attempt to speak for either wounded party, but I would like to share my own personal definition for what constitutes a "nostr app" in an effort to help clarify what might be an otherwise confusing and opaque purity test.
In this post, I will be committing the "no true Scotsman" fallacy, in which I start with the most liberal definition I can come up with, and gradually refine it until all that is left is the purest, gleamingest, most imaginary and unattainable nostr app imaginable. As I write this, I wonder if anything built yet will actually qualify. In any case, here we go.
# It uses nostr
The lowest bar for what a "nostr app" might be is an app ("application" - i.e. software, not necessarily a native app of any kind) that has some nostr-specific code in it, but which doesn't take any advantage of what makes nostr distinctive as a protocol.
Examples might include a scraper of some kind which fulfills its charter by fetching data from relays (regardless of whether it validates or retains signatures). Another might be a regular web 2.0 app which provides an option to "log in with nostr" by requesting and storing the user's public key.
In either case, the fact that nostr is involved is entirely neutral. A scraper can scrape html, pdfs, jsonl, whatever data source - nostr relays are just another target. Likewise, a user's key in this scenario is treated merely as an opaque identifier, with no appreciation for the super powers it brings along.
In most cases, this kind of app only exists as a marketing ploy, or less cynically, because it wants to get in on the hype of being a "nostr app", without the developer quite understanding what that means, or having the budget to execute properly on the claim.
# It leverages nostr
Some of you might be wondering, "isn't 'leverage' a synonym for 'use'?" And you would be right, but for one connotative difference. It's possible to "use" something improperly, but by definition leverage gives you a mechanical advantage that you wouldn't otherwise have. This is the second category of "nostr app".
This kind of app gets some benefit out of the nostr protocol and network, but in an entirely selfish fashion. The intention of this kind of app is not to augment the nostr network, but to augment its own UX by borrowing some nifty thing from the protocol without really contributing anything back.
Some examples might include:
- Using nostr signers to encrypt or sign data, and then store that data on a proprietary server.
- Using nostr relays as a kind of low-code backend, but using proprietary event payloads.
- Using nostr event kinds to represent data (why), but not leveraging the trustlessness that buys you.
An application in this category might even communicate to its users via nostr DMs - but this doesn't make it a "nostr app" any more than a website that emails you hot deals on herbal supplements is an "email app". These apps are purely parasitic on the nostr ecosystem.
In the long-term, that's not necessarily a bad thing. Email's ubiquity is self-reinforcing. But in the short term, this kind of "nostr app" can actually do damage to nostr's reputation by over-promising and under-delivering.
# It complements nostr
Next up, we have apps that get some benefit out of nostr as above, but give back by providing a unique value proposition to nostr users as nostr users. This is a bit of a fine distinction, but for me this category is for apps which focus on solving problems that nostr isn't good at solving, leaving the nostr integration in a secondary or supporting role.
One example of this kind of app was Mutiny (RIP), which not only allowed users to sign in with nostr, but also pulled those users' social graphs so that users could send money to people they knew and trusted. Mutiny was doing a great job of leveraging nostr, as well as providing value to users with nostr identities - but it was still primarily a bitcoin wallet, not a "nostr app" in the purest sense.
Other examples are things like Nostr Nests and Zap.stream, whose core value proposition is streaming video or audio content. Both make great use of nostr identities, data formats, and relays, but they're primarily streaming apps. A good litmus test for things like this is: if you got rid of nostr, would it be the same product (even if inferior in certain ways)?
A similar category is infrastructure providers that benefit nostr by their existence (and may in fact be targeted explicitly at nostr users), but do things in a centralized, old-web way; for example: media hosts, DNS registrars, hosting providers, and CDNs.
To be clear here, I'm not casting aspersions (I don't even know what those are, or where to buy them). All the apps mentioned above use nostr to great effect, and are a real benefit to nostr users. But they are not True Scotsmen.
# It embodies nostr
Ok, here we go. This is the crème de la crème, the top du top, the meilleur du meilleur, the bee's knees. The purest, holiest, most chaste category of nostr app out there. The apps which are, indeed, nostr indigitate.
This category of nostr app (see, no quotes this time) can be defined by the converse of the previous category. If nostr was removed from this type of application, would it be impossible to create the same product?
To tease this apart a bit, apps that leverage the technical aspects of nostr are dependent on nostr the *protocol*, while apps that benefit nostr exclusively via network effect are integrated into nostr the *network*. An app that does both things is working in symbiosis with nostr as a whole.
An app that embraces both nostr's protocol and its network becomes an organic extension of every other nostr app out there, multiplying both its competitive moat and its contribution to the ecosystem:
- In contrast to apps that only borrow from nostr on the technical level but continue to operate in their own silos, an application integrated into the nostr network comes pre-packaged with existing users, and is able to provide more value to those users because of other nostr products. On nostr, it's a good thing to advertise your competitors.
- In contrast to apps that only market themselves to nostr users without building out a deep integration on the protocol level, a deeply integrated app becomes an asset to every other nostr app by becoming an organic extension of them through interoperability. This results in increased traffic to the app as other developers and users refer people to it instead of solving their problem on their own. This is the "micro-apps" utopia we've all been waiting for.
Credible exit doesn't matter if there aren't alternative services. Interoperability is pointless if other applications don't offer something your app doesn't. Marketing to nostr users doesn't matter if you don't augment their agency _as nostr users_.
If I had to choose a single NIP that represents the mindset behind this kind of app, it would be NIP 89 A.K.A. "Recommended Application Handlers", which states:
> Nostr's discoverability and transparent event interaction is one of its most interesting/novel mechanics. This NIP provides a simple way for clients to discover applications that handle events of a specific kind to ensure smooth cross-client and cross-kind interactions.
These handlers are the glue that holds nostr apps together. A single event, signed by the developer of an application (or by the application's own account) tells anyone who wants to know 1. what event kinds the app supports, 2. how to link to the app (if it's a client), and (if the pubkey also publishes a kind 10002), 3. which relays the app prefers.
_As a sidenote, NIP 89 is currently focused more on clients, leaving DVMs, relays, signers, etc somewhat out in the cold. Updating 89 to include tailored listings for each kind of supporting app would be a huge improvement to the protocol. This, plus a good front end for navigating these listings (sorry nostrapp.link, close but no cigar) would obviate the evil centralized websites that curate apps based on arbitrary criteria._
Examples of this kind of app obviously include many kind 1 clients, as well as clients that attempt to bring the benefits of the nostr protocol and network to new use cases - whether long form content, video, image posts, music, emojis, recipes, project management, or any other "content type".
To drill down into one example, let's think for a moment about forms. What's so great about a forms app that is built on nostr? Well,
- There is a [spec](https://github.com/nostr-protocol/nips/pull/1190) for forms and responses, which means that...
- Multiple clients can implement the same data format, allowing for credible exit and user choice, even of...
- Other products not focused on forms, which can still view, respond to, or embed forms, and which can send their users via NIP 89 to a client that does...
- Cryptographically sign forms and responses, which means they are self-authenticating and can be sent to...
- Multiple relays, which reduces the amount of trust necessary to be confident results haven't been deliberately "lost".
Show me a forms product that does all of those things, and isn't built on nostr. You can't, because it doesn't exist. Meanwhile, there are plenty of image hosts with APIs, streaming services, and bitcoin wallets which have basically the same levels of censorship resistance, interoperability, and network effect as if they weren't built on nostr.
# It supports nostr
Notice I haven't said anything about whether relays, signers, blossom servers, software libraries, DVMs, and the accumulated addenda of the nostr ecosystem are nostr apps. Well, they are (usually).
This is the category of nostr app that gets none of the credit for doing all of the work. There's no question that they qualify as beautiful nostrcorns, because their value propositions are entirely meaningless outside of the context of nostr. Who needs a signer if you don't have a cryptographic identity you need to protect? DVMs are literally impossible to use without relays. How are you going to find the blossom server that will serve a given hash if you don't know which servers the publishing user has selected to store their content?
In addition to being entirely contextualized by nostr architecture, this type of nostr app is valuable because it does things "the nostr way". By that I mean that they don't simply try to replicate existing internet functionality into a nostr context; instead, they create entirely new ways of putting the basic building blocks of the internet back together.
A great example of this is how Nostr Connect, Nostr Wallet Connect, and DVMs all use relays as brokers, which allows service providers to avoid having to accept incoming network connections. This opens up really interesting possibilities all on its own.
So while I might hesitate to call many of these things "apps", they are certainly "nostr".
# Appendix: it smells like a NINO
So, let's say you've created an app, but when you show it to people they politely smile, nod, and call it a NINO (Nostr In Name Only). What's a hacker to do? Well, here's your handy-dandy guide on how to wash that NINO stench off and Become a Nostr.
You app might be a NINO if:
- There's no NIP for your data format (or you're abusing NIP 78, 32, etc by inventing a sub-protocol inside an existing event kind)
- There's a NIP, but no one knows about it because it's in a text file on your hard drive (or buried in your project's repository)
- Your NIP imposes an incompatible/centralized/legacy web paradigm onto nostr
- Your NIP relies on trusted third (or first) parties
- There's only one implementation of your NIP (yours)
- Your core value proposition doesn't depend on relays, events, or nostr identities
- One or more relay urls are hard-coded into the source code
- Your app depends on a specific relay implementation to work (*ahem*, relay29)
- You don't validate event signatures
- You don't publish events to relays you don't control
- You don't read events from relays you don't control
- You use legacy web services to solve problems, rather than nostr-native solutions
- You use nostr-native solutions, but you've hardcoded their pubkeys or URLs into your app
- You don't use NIP 89 to discover clients and services
- You haven't published a NIP 89 listing for your app
- You don't leverage your users' web of trust for filtering out spam
- You don't respect your users' mute lists
- You try to "own" your users' data
Now let me just re-iterate - it's ok to be a NINO. We need NINOs, because nostr can't (and shouldn't) tackle every problem. You just need to decide whether your app, as a NINO, is actually contributing to the nostr ecosystem, or whether you're just using buzzwords to whitewash a legacy web software product.
If you're in the former camp, great! If you're in the latter, what are you waiting for? Only you can fix your NINO problem. And there are lots of ways to do this, depending on your own unique situation:
- Drop nostr support if it's not doing anyone any good. If you want to build a normal company and make some money, that's perfectly fine.
- Build out your nostr integration - start taking advantage of webs of trust, self-authenticating data, event handlers, etc.
- Work around the problem. Think you need a special relay feature for your app to work? Guess again. Consider encryption, AUTH, DVMs, or better data formats.
- Think your idea is a good one? Talk to other devs or open a PR to the [nips repo](https://github.com/nostr-protocol/nips). No one can adopt your NIP if they don't know about it.
- Keep going. It can sometimes be hard to distinguish a research project from a NINO. New ideas have to be built out before they can be fully appreciated.
- Listen to advice. Nostr developers are friendly and happy to help. If you're not sure why you're getting traction, ask!
I sincerely hope this article is useful for all of you out there in NINO land. Maybe this made you feel better about not passing the totally optional nostr app purity test. Or maybe it gave you some actionable next steps towards making a great NINON (Nostr In Not Only Name) app. In either case, GM and PV.
-
![](/static/nostr-icon-purple-64x64.png)
@ 9e69e420:d12360c2
2025-01-30 12:23:04
Tech stocks have taken a hit globally after China's DeepSeek launched a competitive AI chatbot at a much lower cost than US counterparts. This has stirred market fears of a $1.2 trillion loss across tech companies when trading opens in New York.
DeepSeek’s chatbot quickly topped download charts and surprised experts with its capabilities, developed for only $5.6 million.
The Nasdaq dropped over 3% in premarket trading, with major firms like Nvidia falling more than 10%. SoftBank also saw losses shortly after investing in a significant US AI venture.
Venture capitalist Marc Andreessen called it “AI’s Sputnik moment,” highlighting its potential impact on the industry.
![] (https://www.telegraph.co.uk/content/dam/business/2025/01/27/TELEMMGLPICT000409807198_17379939060750_trans_NvBQzQNjv4BqgsaO8O78rhmZrDxTlQBjdGLvJF5WfpqnBZShRL_tOZw.jpeg)
-
![](/static/nostr-icon-purple-64x64.png)
@ 9e69e420:d12360c2
2025-01-30 12:13:39
Salwan Momika, a Christian Iraqi known for burning the Koran in Sweden, was shot dead during a TikTok livestream in an apartment in Sodertalje. The 38-year-old sparked outrage in the Muslim community for his demonstrations, leading to global condemnation. After being rushed to the hospital, he was pronounced dead.
Authorities arrested five individuals in connection with the incident. Momika's death comes days before a court ruling on his possible incitement of ethnic hatred. The incident highlights the tensions surrounding free speech and religious sentiments, intensifying after his controversial protests in 2023.
[Sauce](https://www.dailymail.co.uk/news/article-14341423/Christian-Iraqi-burnt-Koran-Sweden-shot-dead.html)
-
![](/static/nostr-icon-purple-64x64.png)
@ 0fa80bd3:ea7325de
2025-01-30 04:28:30
**"Degeneration"** or **"Вырождение"**
![[photo_2025-01-29 23.23.15.jpeg]]
A once-functional object, now eroded by time and human intervention, stripped of its original purpose. Layers of presence accumulate—marks, alterations, traces of intent—until the very essence is obscured. Restoration is paradoxical: to reclaim, one must erase. Yet erasure is an impossibility, for to remove these imprints is to deny the existence of those who shaped them.
The work stands as a meditation on entropy, memory, and the irreversible dialogue between creation and decay.
-
![](/static/nostr-icon-purple-64x64.png)
@ 0fa80bd3:ea7325de
2025-01-29 15:43:42
Lyn Alden - биткойн евангелист или евангелистка, я пока не понял
```
npub1a2cww4kn9wqte4ry70vyfwqyqvpswksna27rtxd8vty6c74era8sdcw83a
```
Thomas Pacchia - PubKey owner - X - @tpacchia
```
npub1xy6exlg37pw84cpyj05c2pdgv86hr25cxn0g7aa8g8a6v97mhduqeuhgpl
```
calvadev - Shopstr
```
npub16dhgpql60vmd4mnydjut87vla23a38j689jssaqlqqlzrtqtd0kqex0nkq
```
Calle - Cashu founder
```
npub12rv5lskctqxxs2c8rf2zlzc7xx3qpvzs3w4etgemauy9thegr43sf485vg
```
Джек Дорси
```
npub1sg6plzptd64u62a878hep2kev88swjh3tw00gjsfl8f237lmu63q0uf63m
```
21 ideas
```
npub1lm3f47nzyf0rjp6fsl4qlnkmzed4uj4h2gnf2vhe3l3mrj85vqks6z3c7l
```
Много адресов. Хз кто надо сортировать
```
https://github.com/aitechguy/nostr-address-book
```
ФиатДжеф - создатель Ностр - https://github.com/fiatjaf
```
npub180cvv07tjdrrgpa0j7j7tmnyl2yr6yr7l8j4s3evf6u64th6gkwsyjh6w6
```
EVAN KALOUDIS Zues wallet
```
npub19kv88vjm7tw6v9qksn2y6h4hdt6e79nh3zjcud36k9n3lmlwsleqwte2qd
```
Программер Коди https://github.com/CodyTseng/nostr-relay
```
npub1syjmjy0dp62dhccq3g97fr87tngvpvzey08llyt6ul58m2zqpzps9wf6wl
```
Anna Chekhovich - Managing Bitcoin at The Anti-Corruption Foundation
https://x.com/AnyaChekhovich
```
npub1y2st7rp54277hyd2usw6shy3kxprnmpvhkezmldp7vhl7hp920aq9cfyr7
```
-
![](/static/nostr-icon-purple-64x64.png)
@ 0fa80bd3:ea7325de
2025-01-29 14:44:48
![[yedinaya-rossiya-bear.png]]
1️⃣ Be where the bear roams. Stay in its territory, where it hunts for food. No point setting a trap in your backyard if the bear’s chilling in the forest.
2️⃣ Set a well-hidden trap. Bury it, disguise it, and place the bait right in the center. Bears are omnivores—just like secret police KGB agents. And what’s the tastiest bait for them? Money.
3️⃣ Wait for the bear to take the bait. When it reaches in, the trap will snap shut around its paw. It’ll be alive, but stuck. No escape.
Now, what you do with a trapped bear is another question... 😏
-
![](/static/nostr-icon-purple-64x64.png)
@ 0fa80bd3:ea7325de
2025-01-29 05:55:02
The land that belongs to the indigenous peoples of Russia has been seized by a gang of killers who have unleashed a war of extermination. They wipe out anyone who refuses to conform to their rules. Those who disagree and stay behind are tortured and killed in prisons and labor camps. Those who flee lose their homeland, dissolve into foreign cultures, and fade away. And those who stand up to protect their people are attacked by the misled and deceived. The deceived die for the unchecked greed of a single dictator—thousands from both sides, people who just wanted to live, raise their kids, and build a future.
Now, they are forced to make an impossible choice: abandon their homeland or die. Some perish on the battlefield, others lose themselves in exile, stripped of their identity, scattered in a world that isn’t theirs.
There’s been endless debate about how to fix this, how to clear the field of the weeds that choke out every new sprout, every attempt at change. But the real problem? We can’t play by their rules. We can’t speak their language or use their weapons. We stand for humanity, and no matter how righteous our cause, we will not multiply suffering. Victory doesn’t come from matching the enemy—it comes from staying ahead, from using tools they haven’t mastered yet. That’s how wars are won.
Our only resource is the **will of the people** to rewrite the order of things. Historian Timothy Snyder once said that a nation cannot exist without a city. A city is where the most active part of a nation thrives. But the cities are occupied. The streets are watched. Gatherings are impossible. They control the money. They control the mail. They control the media. And any dissent is crushed before it can take root.
So I started asking myself: **How do we stop this fragmentation?** How do we create a space where people can **rebuild their connections** when they’re ready? How do we build a **self-sustaining network**, where everyone contributes and benefits proportionally, while keeping their freedom to leave intact? And more importantly—**how do we make it spread, even in occupied territory?**
In 2009, something historic happened: **the internet got its own money.** Thanks to **Satoshi Nakamoto**, the world took a massive leap forward. Bitcoin and decentralized ledgers shattered the idea that money must be controlled by the state. Now, to move or store value, all you need is an address and a key. A tiny string of text, easy to carry, impossible to seize.
That was the year money broke free. The state lost its grip. Its biggest weapon—physical currency—became irrelevant. Money became **purely digital.**
The internet was already **a sanctuary for information**, a place where people could connect and organize. But with Bitcoin, it evolved. Now, **value itself** could flow freely, beyond the reach of authorities.
Think about it: when seedlings are grown in controlled environments before being planted outside, they **get stronger, survive longer, and bear fruit faster.** That’s how we handle crops in harsh climates—nurture them until they’re ready for the wild.
Now, picture the internet as that **controlled environment** for **ideas**. Bitcoin? It’s the **fertile soil** that lets them grow. A testing ground for new models of interaction, where concepts can take root before they move into the real world. If **nation-states are a battlefield, locked in a brutal war for territory, the internet is boundless.** It can absorb any number of ideas, any number of people, and it doesn’t **run out of space.**
But for this ecosystem to thrive, people need safe ways to communicate, to share ideas, to build something real—**without surveillance, without censorship, without the constant fear of being erased.**
This is where **Nostr** comes in.
Nostr—"Notes and Other Stuff Transmitted by Relays"—is more than just a messaging protocol. **It’s a new kind of city.** One that **no dictator can seize**, no corporation can own, no government can shut down.
It’s built on **decentralization, encryption, and individual control.** Messages don’t pass through central servers—they are relayed through independent nodes, and users choose which ones to trust. There’s no master switch to shut it all down. Every person owns their identity, their data, their connections. And no one—no state, no tech giant, no algorithm—can silence them.
In a world where cities fall and governments fail, **Nostr is a city that cannot be occupied.** A place for ideas, for networks, for freedom. A city that grows stronger **the more people build within it**.
-
![](/static/nostr-icon-purple-64x64.png)
@ 9e69e420:d12360c2
2025-01-26 15:26:44
Secretary of State Marco Rubio issued new guidance halting spending on most foreign aid grants for 90 days, including military assistance to Ukraine. This immediate order shocked State Department officials and mandates “stop-work orders” on nearly all existing foreign assistance awards.
While it allows exceptions for military financing to Egypt and Israel, as well as emergency food assistance, it restricts aid to key allies like Ukraine, Jordan, and Taiwan. The guidance raises potential liability risks for the government due to unfulfilled contracts.
A report will be prepared within 85 days to recommend which programs to continue or discontinue.
-
![](/static/nostr-icon-purple-64x64.png)
@ 9e69e420:d12360c2
2025-01-26 01:31:47
## Chef's notes
# arbitray
- test
- of
- chefs notes
## hedding 2
## Details
- ⏲️ Prep time: 20
- 🍳 Cook time: 1 hour
- 🍽️ Servings: 5
## Ingredients
- Test ingredient
- 2nd test ingredient
## Directions
1. Bake
2. Cool
-
![](/static/nostr-icon-purple-64x64.png)
@ 9e5a3a1a:ed414e8d
2025-02-02 00:50:08
Either the phone’s battery went bad and quit charging, or the cable was shit. The warm rain running down the screen made the phone’s UI, flicker back and forth, as Ethan turned the screen on again to check how much battery he had left. Not a lot: 4%. At least the thing was water-proof, he thought. Today was also shit. First his parents confiscated he car keys after finding booze in his closet, now the fucking charging cable went bad. (Hopefully it’s the charging cable and not the battery), he thought. A car drove by splashing him with a fan of muddy water.
“Hey!” he yelled, but the red tail lights were too far away now for the driver to hear. “Fucking fuck!” he swore looking down at himself. It was too dark to see how dirty his shirt and pants were now. The light of the gas station still far away. (Oh, well), he thought and continued walking, wet gravel and sand of road’s shoulder making wet crunching noises underfoot.
Ethan’s thumb moved on the phone to turn the flashlight on, but he stopped himself. There was almost no chance that Casey’s gas station won’t have USB cables, they always did, but with today's luck they might just be out. Then he’d be screwed without a phone for the rest of the night and all day at school tomorrow. It wouldn’t be the end of the world, but he was too irate after everything today to accept not having a phone right now.
A pale form moved to his right a few yards away. He turned and saw a figure standing by the trees. Ethan stopped and squinted through the rain. A cold, creepy feeling suddenly gripped him.
It stood there and watched him. A female form, he realized, tall and pale, with black hair longer that he’s ever seen. Something was off. The face… It’s head… The mouth grinned widely, forming a dome above the eyes, eyes that were down close to the neck, under the nose, mouth and chin up above them. (It’s fucking head is upside down..) he realized.
Ethan’s thumb pressed the phone’s power button, battery be damned. He aimed it at the figure, brought up the camera app and pressed the button to take the picture. Just as the shutter sound clicked the face was suddenly full-screen, as if a few feet away from him.
Ethan gasped and the phone tumbled onto the ground. There was a moment of relief when he realized that the figure was still far away and didn’t suddenly teleport right in front of him, but then something long, black, and wide, like a cross between a ribbon and an anaconda flicked itself toward him and the last thing he felt was a thick spiderweb of hair wrapping itself around him and pulling him forward.
***
“Hey, Riley, when did your dad say you needed to be back home?” Alex’s mom yelled from downstairs. The two girls glanced at their phones to see the time.
“Eleven!” Riley yelled back. They still had half an hour of “study” time. The two really did mean to study for the calculus exam, but ended up chatting the whole evening.
“Oh shit! I got to show you something,” Riley said, turning on her phone’s screen again, “You know that ‘Grin Reaper’ thing on social media?” She scrolled through her phone’s picture gallery.
“Like, that smiling ‘monster’ with upside down head?” Alex asked.
“Yeah, the one they said kidnapped those kids”
“That’s so fake!”
“Yeah, but look!” Riley turned her screen towards her friend.
Alex took the phone from her, “What’s this?”
“It’s her! Caleb was driving me to the movies and I saw her out the window. You know where Casey’s gas station is on Maple av? There’s like a wooded area just past it when you’re driving downtown.”
“It’s just some blurry figure. Probably some homeless person… What’s that?” Alex heard some kind of scratching at the window. She walked over to look. They were on the second floor, but there were no trees close enough to scratch against the window. She opened it and look outside. No one. Just a vine attached to the wall of the house outside. Or was it a vine? Along, curly splotch of dark. Alex frowned.
“No, I saw her, for real for real. It’s looks bad on the photo because it was dark and we were moving, but her head was on upside down and grinning.” Riley insisted.
(Is it ivy?) Alex thought, only half listening to Riley, (Since when do we have ivy on the house?)
Riley wondered if she should tell Alex that when she snapped the photo it looked like the woman’s grinning, upside down face was up close suddenly, right up against the car window. Caleb almost veered off the road turning to see what was wrong when she gasped and dropped the phone. When she fished her phone from beneath the seat, the photo looked normal. Blurry but normal.
(Maybe a mud splash) Alex thought, examining the black, vine-like shadow that stuck to the house aiming at the window. (Some asshole splashed mud on the house as a prank. Someone from school?)
“You think I should post it to TikTok?” Riley asked, looking pensively at the photo.
The question brought Alex’s attention back to her. She walked back over and sat on the other side of her friend, taking the phone from her hand and looking closer at the photo. “It’s dark,” Alex rolled her eyes, “Also, some troll could have just been wearing a mask trying to scare people. That shit’s all over social media.”
“I guess…” Riley decided against telling her more. She didn’t want to sound weird.
Just then, Alex heard her phone ding somewhere behind her. She looked back to find it when she heard a choking noise from where Riley sat, “You ok?” she asked looking back and froze, not quite sure what she was seeing. Riley’s eyes were wide, her hands at her throat tugging at something black, like a scarf wrapping around her neck. More dark, tentacle-like locks reached in towards them through the window. It looked like hair, but it moved as if through water, snaking itself forward and wrapping around Riley’s arms, neck and face. Before Alex could utter a sound or register what she saw, the hair straightened, pulled back, yanking Riley out through the window.
***
Alex sits on her bed in shock, glancing back at the window every thirty seconds. She tries to resist getting up and walking over to it. It's weird feeling of being pulled towards it to make sure it’s locked and being afraid to approach it for fear of what she might see outside. What if she sees it again? It’s tentacle-like locks crawling up the house, surrounding her window ready to snatch her like it did her friend. Can it seep through the cracks and unlock the fragile latch? She feels herself standing up and walking over to the window briskly, her hands smooth over the window latch, making sure it’s still locked, her eyes darting back and forth outside. Nothing. The dark splat on the house Alex first mistook for ivy or mud is gone, too.
She sits back on the bed. Alex can hear her parents arguing downstairs. They think she's using drugs. They searched through her room the day after Riley was taken. They yelled at her that night, them and Riley’s dad, all convinced that the girls were high and Riley wondered off somewhere. Alex knew they would not believe what really happened. But lying wouldn’t help anyone find her friend. She lets think it was all a drug-induced hallucination.
(Maybe I’m crazy,) Alex thinks. Her mind searches for mentions of schizophrenia among any of her relatives. Isn’t that shit genetic?
A chill goes through her body again, suddenly. A scratching at the window? Like the one she heard before Riley was taken? “It’s not real,” she whispers out loud. It’s not real. She keeps thinking she hears it almost as often as she walks over to check the latch on the window. “It’s not real….” She has to check.
Pushing through the fear, Alex briskly walks over to the window again. Nothing it the trees out back across the lawn. She can’t see the outside of the house without opening the window but she can’t risk it. “It wasn’t real” she affirms again. Then she has an idea.
The parents’ arguing grows louder as Alex quietly opens her bedroom door and tiptoes down the stairs toward her mom’s office, trying to avoid attracting their attention. They are still pissed, she doesn't want to deal with them. She looks for scotch tape, quickly founds it, grabs a stack of paper from the printer and goes back upstairs.
If she blocks out the window, it can’t see her, even if it is lurking somewhere outside waiting to snatch her, Alex thinks as she starts to cover the glass with paper and tape. She feels better now, suddenly. It feels like she was doing something to protect herself, even if it involves being near the window and risking seeing that thing.
As the final page of printer paper is about to go up to block the glass completely, Alex freezes. A figure stands on the grass in front of the trees. In panic, Alex tries to decipher the face in the dark. The head, it is right side up. Not grinning, no hair tentacles: not the monster. With a wave of relief, she looks closer, trying to figure out who it is, and a surge of adrenaline and excitement suddenly hits her, (It's Riley!)
“Ril--,” she almost screams, fumbling with the latch. As she pulls the window up and looks back out again, the figure is gone, “Riley!” she yells into the night. No answer. Alex pulls the window closed and runs for the door, briefly coming back to latching again, just in case.
“She’s out there! Outside.” Alex almost yells as she barged into the living groom, pointing towards the back door.
“Where? Outside?” her mom says then quickly goes to the door, dad and Alex following her. In the yard they yell Riley’s name, scanning the grass hill beyond and the tree line behind it.
“Are you sure you saw her?” her dad asks.
“Yeah, it was her, for sure.”
“Are you high again?” her mom turns to her with an annoyed grimace on her face.
“I’m not fucking high, mom!”
“Don’t you talk to me this way! Get back to your room.” her mom yells.
“I’m not fucking high, mom! I saw her.”
Mom isn’t listening, she turns to dad “We should call her parents. She could really be out there,” then to Alex, “Upstairs NOW!”
Pissed, Alex walks back into the house. It feels good to be angry, anger is better than fear. She runs up the stairs and tares down the paper she had just put up on the glass. She leans against the window and scans the tree line up in the distance.
A few hour pass. Alex still gets up from time to time to check the window, but this time she is looking for Riley rather than checking the lock. Her parents have finally quieted down downstairs. It's late. They are probably asleep by now.
Alex considers going to bed herself, but she knows she wouldn't be able to sleep. She looks back out the window.
"Riley!" Her friend is there again, closer this time. Alex opens her mouth to call to her, but stops as she saw Riley raise her finger to her lips, gesturing for her to be quiet. Alex frowns, “What the fuck are you doing?” she mouths, shrugging dramatically.
Riley motions for her to come out then puts her finger to her lips again. What is she doing?
Alex thinks about waking her parents, but decides against it. They’ll just be useless and tell her to go to her room again. She quietly creeps downstairs and sneaks out the door.
She half-expects Riley to be gone again as she walks out of the house and looks out to the hillside, but Riley is still there. Further back, almost past the tree-line. She motions Alex to come closer and takes a few steps back, disappearing in the trees.
“Fuck!” Alex swears, looks back at the house one last time, then takes off across the yard after her.
***
Past the tree line in the woods, Alex crunches through the trees, lighting her way (poorly) with her phone’s flashlight. Thorns scratch her arms and legs as she walks as fast as she can, navigating among the trees, yelling Riley’s name. From time to time she can see Riley's figure moving away from her, weaving among the trees. Her friend moves effortlessly, as if gliding above the ground, unimpeded by the greenery.
Alex trips. She catches herself before she tumbles to the ground. For a second it is pitch black. She bends down to look for her phone. It is a glowing outline among the plants. Alex grabs it and gets up. For a moment she’s disoriented, not sure which way she was going. She looks and listens for her friend but sees and hears nothing. She looks back. There’s a bit of light glittering through the trees back where her neighborhood is. She looks forward and yells Riley’s name again, moving her phone trying to catch a glimpse of her friend’s figure. Nothing. Should she go back? Is Riley playing some stupid game? Maybe she is high.
Without a second though, Alex continues forward, “Riley, it’s not funny! What the fuck are you doing?” Alex can see pale gray light between the leaves and the branches up ahead. She quickens her pace, almost tripping again.
Alex walks into what looks like a small clearing. The trees are further away up ahead, but not much moon-light is coming from up above. She looks up towards the wide canopy, forming a dome overhead. Her eyes suddenly focus on a humanoid shape hanging parallel to the ground from the branches above. Its face is white, torn in two by a wide smile that almost reaches its ears. The top of the head is attached to the neck. Bands of hair suspend it from branches above.
Alex freezes. For a second she feels herself cease to exist except for her breath that moves rhythmically in and out. Moments pass. How long, she can’t tell. (Run!), the thought echoes through her head, and she almost moves to obey but stops herself. To run is to turn her back on that thing. What if that’s when it grabs her. She stays still and so does the figure.
The thing blinks and its grin becomes wider. It sways back and forth, its prehensile locks making branches creak overhead. Alex’s chest and throat grows hot and and she gathers herself. She throws herself to the side, tripping yet carrying herself forward through the snapping bush branches. With sudden agility, she rights herself and runs back into the woods. Tree trunks fly at her as she runs trying not to trip on the uneven ground. She bursts into another clearing and looks back swinging her phone to light the trees behind her to look if that thing is following her. Then her vision turns off.
She feels leaves and dirt against her face, a small pointy stick poking her in her right cheek. There’s a pressure on the side of her head and her hand moves there trying to feel what’s pushing against her. There’s nothing. The side of her head is numb. Memory of where she is and why rushes back into her and she pushes herself up with a jerk. When her vision comes back online she can only see a mosaic of black and gray forms, bushy undergrowth letting in pale light ahead of her. There is a glow coming from her left. She turns and her eyes focus quickly on phone, flashlight still on, its light flooding her vision. Alex grabs it and points it forward then all around, trying to see if she’s alone or if that thing is hiding somewhere near. She doesn’t see anyone. Only trees and quick shadows jumping away from the light as he moves it.
She’s in a sort of a clearing again, except for a large tree trunk close to her. Alex reaches for the numb spot on her head and feels that it’s wet and sticky. It’s blood. She must have ran into that tree when she looked back trying to see if that monster followed her. Alex shines the light around her again. No sign of that thing. It could be hiding in the trees just out of sight. Or… her blood runs cold. She slowly looks up, remembering where she saw that thing first.
For a second, all she can see is branches and flowing, black vines like spider webs snaking through the canopy, then her eyes discern three small, slender figures hanging like poppets from these “vines”. Children. Two smaller ones and one teenager her size. The teenager, Riley, stares at with a blank expression on her face. Then her body moves, or is moved by the tentacle “vines” holding her up. Hair, Alex realizes. He is held by the hair, not wrapped around her like back in the bedroom before Riley was pulled through the window, but growing into her flesh from behind, like thousands tiny marionette strings bunched up in locks. The hair brings Rile's hand up to her side and waves it back and forth, as if in a mocking greeting gesture.
Alex tenses. At any moment, she feels, the figures can leap at her, grab her. But, no, they stay suspended. Then, between them, higher up in the branches the hair moves, like slithering snakes or tentacles moving across each other. A fourth figure is slowly lowering itself from above. The Grin Reaper. Smiling lady with an upside down head. It stops shortly after reaching the same level as the three bodies hanging by its hair. It stares at her, the grin seemingly growing wider and wider without really changing size.
“It’s not real?” Alex, whispers to herself. They aren’t moving any closer, neither the woman nor the bodies suspended by her air. Alex’s hand tightens around her phone. (Phone can’t hallucinate) she thinks to herself. Maybe now they will believe her. She aims her phone right at the woman, her figure, looming above her, looks small on the screen. With a practiced gesture her thumb touches the camera button. As the phone snaps the photo, the screen refreshes showing the things face close up, filling the frame of the phone, as if jumping out at Alex. The girl squeaks, dropping the phone. It lands light up, still illuminating the four figures far above her, as if the woman hasn’t moved despite what the photo showed. Slowly, like a coiling snake, a tentacle-like lock of hair moves up in front of the the woman, pointing at Alex like pulled-back tongue. Then, in a flash, it flies toward her her and Alex’s vision goes black.
#story #shortstory #creepypasta #horror #fiction #writing #nostr
-
![](/static/nostr-icon-purple-64x64.png)
@ 9e69e420:d12360c2
2025-01-25 22:16:54
President Trump plans to withdraw 20,000 U.S. troops from Europe and expects European allies to contribute financially to the remaining military presence. Reported by ANSA, Trump aims to deliver this message to European leaders since taking office. A European diplomat noted, “the costs cannot be borne solely by American taxpayers.”
The Pentagon hasn't commented yet. Trump has previously sought lower troop levels in Europe and had ordered cuts during his first term. The U.S. currently maintains around 65,000 troops in Europe, with total forces reaching 100,000 since the Ukraine invasion. Trump's new approach may shift military focus to the Pacific amid growing concerns about China.
[Sauce](https://www.stripes.com/theaters/europe/2025-01-24/trump-europe-troop-cuts-16590074.html)
-
![](/static/nostr-icon-purple-64x64.png)
@ 9e69e420:d12360c2
2025-01-25 14:32:21
| Parameters | Dry Mead | Medium Mead | Sweet Mead |
|------------|-----------|-------------|------------|
| Honey | 2 lbs (900 grams) | 3 lbs (1.36 kg) | 4 lbs (1.81 kg) |
| Yeast | ~0.07 oz (2 grams) | ~0.08 oz (2.5 grams) | ~0.10 oz (3 grams) |
| Fermentation | ~4 weeks | 4 to 6 weeks | 6 to 8 weeks |
| Racking | Fortnight or later | 1 month or after | ~2 months and after |
| Specific Gravity | <1.010 | ~1.01 to ~1.025 | >1.025 |
-
![](/static/nostr-icon-purple-64x64.png)
@ 9e69e420:d12360c2
2025-01-23 15:09:56
President Trump has ordered thousands of additional troops to the U.S.-Mexico border as part of an effort to address immigration and security issues. This directive builds on his initial commitment to increase military presence along the border.
Currently, around 2,200 active-duty personnel and approximately 4,500 National Guardsmen are stationed there. The new deployment aims to enhance the capabilities of Joint Task Force-North, allowing troops to assist in operations and provide intelligence support.
Details on specific units remain unclear. The situation is still developing, with updates expected.
[Sauce](https://thepostmillennial.com/breaking-president-trump-orders-thousands-of-troops-to-the-us-border-with-mexico)
-
![](/static/nostr-icon-purple-64x64.png)
@ 6be5cc06:5259daf0
2025-01-21 20:58:37
A seguir, veja como instalar e configurar o **Privoxy** no **Pop!_OS**.
---
### **1. Instalar o Tor e o Privoxy**
Abra o terminal e execute:
```bash
sudo apt update
sudo apt install tor privoxy
```
**Explicação:**
- **Tor:** Roteia o tráfego pela rede Tor.
- **Privoxy:** Proxy avançado que intermedia a conexão entre aplicativos e o Tor.
---
### **2. Configurar o Privoxy**
Abra o arquivo de configuração do Privoxy:
```bash
sudo nano /etc/privoxy/config
```
Navegue até a última linha (atalho: **`Ctrl`** + **`/`** depois **`Ctrl`** + **`V`** para navegar diretamente até a última linha) e insira:
```bash
forward-socks5 / 127.0.0.1:9050 .
```
Isso faz com que o **Privoxy** envie todo o tráfego para o **Tor** através da porta **9050**.
Salve (**`CTRL`** + **`O`** e **`Enter`**) e feche (**`CTRL`** + **`X`**) o arquivo.
---
### **3. Iniciar o Tor e o Privoxy**
Agora, inicie e habilite os serviços:
```bash
sudo systemctl start tor
sudo systemctl start privoxy
sudo systemctl enable tor
sudo systemctl enable privoxy
```
**Explicação:**
- **start:** Inicia os serviços.
- **enable:** Faz com que iniciem automaticamente ao ligar o PC.
---
### **4. Configurar o Navegador Firefox**
Para usar a rede **Tor** com o Firefox:
1. Abra o Firefox.
2. Acesse **Configurações** → **Configurar conexão**.
3. Selecione **Configuração manual de proxy**.
4. Configure assim:
- **Proxy HTTP:** `127.0.0.1`
- **Porta:** `8118` (porta padrão do **Privoxy**)
- **Domínio SOCKS (v5):** `127.0.0.1`
- **Porta:** `9050`
5. Marque a opção **"Usar este proxy também em HTTPS"**.
6. Clique em **OK**.
---
### **5. Verificar a Conexão com o Tor**
Abra o navegador e acesse:
```text
https://check.torproject.org/
```
Se aparecer a mensagem **"Congratulations. This browser is configured to use Tor."**, a configuração está correta.
---
### **Dicas Extras**
- **Privoxy** pode ser ajustado para bloquear anúncios e rastreadores.
- Outros aplicativos também podem ser configurados para usar o **Privoxy**.
-
![](/static/nostr-icon-purple-64x64.png)
@ 58937958:545e6994
2025-01-13 03:31:48
I made croquettes inspired by Spiral's character "Bitcoin (Puppet)."
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/58937958036cede955b25b9295838140ba2deacb8d1939ed91a41be2545e6994/files/1736737731056-YAKIHONNES3.jpg)
The method is the same as making regular croquettes.
I also tried making a version (right) with the arms and legs attached while shaping the filling, but they fell off before I could coat them in flour.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/58937958036cede955b25b9295838140ba2deacb8d1939ed91a41be2545e6994/files/1736737764362-YAKIHONNES3.jpg)
The face is made with seaweed and sliced cheese.
The arms and legs are made with fish cake (hanpen).
I brushed soy sauce on the legs and lightly toasted them in a toaster, which gave them a brown color.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/58937958036cede955b25b9295838140ba2deacb8d1939ed91a41be2545e6994/files/1736737797309-YAKIHONNES3.png)
The arms and legs are attached using thin spaghetti.
When I searched for character-themed bentos (kyaraben), I came across the idea of using dried pasta, which made sense.
I used fried spaghetti sticks for attachment.
Here’s Bitcoin Croquette squished into a bento box:
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/58937958036cede955b25b9295838140ba2deacb8d1939ed91a41be2545e6994/files/1736737845373-YAKIHONNES3.jpg)
Halving
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/58937958036cede955b25b9295838140ba2deacb8d1939ed91a41be2545e6994/files/1736737873582-YAKIHONNES3.jpg)
Notes
- I tried freezing the filling to help it hold its shape, but it backfired. It stuck to the plate and the cooking paper, and once partially thawed, it became way too watery. Freezing might work with better preparation.
- The filling was quite dry when shaping, so it might be better to add a binder (this time, I only used potatoes and sautéed onions).
The shape of Bitcoin Puppet was really easy and fun to make, so I’d love to try creating something else next time!
nostr:nevent1qqsxgpjvf9g9suhzx5asqhvnlvnarl43kuhas8v5g2ryjr9yjjp0z5ctkh5pt
-
![](/static/nostr-icon-purple-64x64.png)
@ 63e047aa:2e1ae74f
2025-02-02 07:05:20
**We have not lived the longest period of peace in history yet, but we will live the longest period of peace in history!**
In a world often defined by conflict, power struggles, and competition for resources, we are constantly searching for ways to build a more peaceful and just society. While most people look at Bitcoin as a financial asset or a tool for decentralizing wealth, I believe its potential reaches far beyond economics. Bitcoin might offer humanity something even greater—a new foundation for **peace**.
## Moving Beyond Conflict: A New Kind of Power
Throughout history, wars have been fought over control—control of land, resources, economies, and the power to enforce rules. In contrast, Bitcoin's decentralized structure removes the need for such centralized control. No single entity governs Bitcoin, and no one can wield unchecked power over the system. The proof-of-work mechanism ensures security and fairness without the need for violence, coercion, or centralized oversight.
As **Jason Lowery** suggests in his work on Bitcoin as a form of power projection, Bitcoin can be seen as a new kind of digital deterrent, one that allows nations to secure their interests without the need for traditional force or military conflict. This shift in power could give rise to a new form of diplomacy, one built on transparency, equal access, and mutual trust. In a world where no single nation or group can manipulate the economic system, we reduce the incentives for conflict.
## Bitcoin as a Tool for Transparency and Trust
At its core, Bitcoin is a trustless system—no one needs to trust a central authority to ensure fairness. Instead, cryptography and mathematics guarantee the security of the network. This system of transparency could extend far beyond finance, offering a new way for people, governments, and organizations to interact without fear of manipulation or corruption.
By removing the need for intermediaries, Bitcoin could pave the way for global cooperation, where each party can act with confidence in a system that cannot be easily undermined. It creates a level playing field, not just economically but also in terms of information sharing and governance.
## Beyond National Defense: A Vision for Peace
Jason Lowery’s exploration of Bitcoin as a strategic defense tool highlights the ways it can serve as a power projection system for nations, offering a new form of security and sovereignty. But I believe this is just the beginning. What if Bitcoin could give nations and individuals a means to engage peacefully?
By empowering people to own their wealth and secure their assets without relying on central banks or governments, Bitcoin could weaken the structures that fuel geopolitical conflicts. When control is decentralized, and power is more evenly distributed, we may find fewer reasons to engage in war.
## A New Way Forward
Imagine a world where peace is not dictated by the threat of force or control over resources but by the mutual benefit of a decentralized system that serves everyone equally. Bitcoin, in this light, becomes more than a financial innovation—it becomes a blueprint for how we might move toward a more peaceful and just world.
Satoshi Nakamoto may not have intended Bitcoin to be a pathway to peace, but the potential is there. As Jason Lowery highlights, Bitcoin's decentralized nature could evolve into a critical part of how nations secure their futures in the digital age. What if we embraced it, not just as a store of value but as a new foundation for how we build trust, security, and cooperation?
I believe that Bitcoin represents more than just financial freedom—it offers us a chance to rethink the systems that have governed our world for centuries. It gives us the opportunity to engage with each other in a way that fosters peace, not conflict. Most importantly, nations would not need to fight over who holds the most Bitcoin—because in a truly decentralized and transparent system, it is not about accumulating more. It simply needs to be adopted, and by doing so, the value it creates can be shared equally, reinforcing the principles of cooperation and global harmony. Redefining peace through decentralized, secure systems like Bitcoin might just be one of the most significant shifts in human history.
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-02 00:03:39
![](https://m.stacker.news/75774)
Welcome to the latest updated version of **Stacker News Media Kit & Brand Guidelines `v1.2`**, a pivotal location where all the visual elements find place and help us understand how to use them to have our communications cohesive. SN brand identity is built on simplicity, trust, innovation and a taste of Texas's Wild West. With the following guidelines, as [promised](https://stacker.news/items/855556/r/Design_r?commentId=855753), I'll try to outline the essential elements of SN visual language to be easily usable internally and externally.
As third interaction from the previous [discussion](https://stacker.news/items/786223), here below you will find all the media assets in PNG and SVG downloadable from this [zip file](https://nosto.re/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zip). BTW: I've been using **`Nostr`** 🌸 **Blossom Serverservers** [check them out](https://blossomservers.com/), it's a really cool idea! In case the file will be not available we can always upload it in other servers. Just let me know if any issue downloading it, ideally I made three copies available from:
- https://nosto.re/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zip
- https://blossom.poster.place/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zip
- https://nostr.download/0a8b02224c970de78fba3a0195dcf1ee44d18925ba941724497173b2bcbab901.zip
The source file of all these assets still are the same [Figma file](https://www.figma.com/design/ZL3FLItd9j48pzKVi4qlOy/Stacker.News-Media-Kit?node-id=3-16&t=oEbUcC1tmLDRXgdH-0) and the [PenPot file](https://design.penpot.app/#/workspace/7ad540b5-8190-815d-8005-5685b9c670bc/7ad540b5-8190-815d-8005-5685c186216e?page-id=2643bc5a-0d34-80b2-8005-58099eabda41). This last one, has many issues and does not allow yet the same flexibility as Figma. Both files are open for contributions and comments, just need to register a dummy/anonymous account for each of the tools.
> **Note:** To use these assets across SN, just copy-paste the image relative code, i.e.:
![](https://m.stacker.news/75773)
# Stacker News Logotype
SN logo is the most recognizable visual identifier of Stacker News. It captures the essence of its brand and is to be used across the platform and other marketing materials **consistently**. Find below all the possible variations and colors. Ideally you should stick with it to maintain SN identity coherent, or propose something new if you feel like. If you have any question on how to place or use the logo, DO ask below, and we'll help sort it out.
| Avatar on transparent BG | Avatar on BG | Logo Extended | Logo Vertical |#|
|---|---|---|---|---|
| ![](https://m.stacker.news/75562) `![](https://m.stacker.news/75562)` | ![](https://m.stacker.news/75552) `![](https://m.stacker.news/75552)` | ![](https://m.stacker.news/75555) `![](https://m.stacker.news/75555)`| ![](https://m.stacker.news/75566) `![](https://m.stacker.news/75566)` |Oil Black|
| ![](https://m.stacker.news/75564) `![](https://m.stacker.news/75564)` | ![](https://m.stacker.news/75554) `![](https://m.stacker.news/75554)` | ![](https://m.stacker.news/75557) `![](https://m.stacker.news/75557)` | ![](https://m.stacker.news/75567) `![](https://m.stacker.news/75567)`| Golden Yellow |
| ![](https://m.stacker.news/75563) `![](https://m.stacker.news/75563)` | ![](https://m.stacker.news/75553) `![](https://m.stacker.news/75553)` | ![](https://m.stacker.news/75565) `![](https://m.stacker.news/75565)` | ![](https://m.stacker.news/75568) `![](https://m.stacker.news/75568)`|With Shadow |
# Stacker News Typography
![](https://m.stacker.news/75569)
This is the typography SN had used to create its logo. [Download LightningVolt OpenType Font file.otf](http://honeyanddeath.web.fc2.com/FontFile/honeyanddeath_Lightningvolt.zip) designed by **[Honey&Death](http://honeyanddeath.web.fc2.com/fnt_Lightningvolt.html)**, install it in your computer and play with it.
Typography is essential to identify, increase readability and create consistency of brands. SN uses the default `font-family:sans-serif;` of your device's OS, usually are the most common and already installed in your device: `system-ui, "Segoe UI", Roboto, "Helvetica Neue", "Noto Sans", "Liberation Sans", Arial, sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol", "Noto Color Emoji"`. Those are mostly used for:
# Example Header H1
## Example Header H2
### Example Header H3
#### Example Header H4
##### Example Header H5
**Example paragraph text**
The fonts selected will help to communicate the personality of the brand and provide maximum legibility for both print and screen.
`Example <code>`
For code, the approach is the same. Let's the device OS select its default `monospace` one. For example, on Mac will be one of the following:
```
SFMono-Regular, Menlo, Monaco, Consolas, "Liberation Mono", "Courier New",`
```
# Stacker News Colors
A thoughtfully curated color palette gives SN trust, professionalism, and approachability. Colors play a key role in creating consistent visual experiences through digital and print communications. Make sure you are using the right color codes below:
| # | Name | HEX code | RGB code | HLS |
|---|---|---|---|---|
| ![](https://m.stacker.news/75602) | Bitcoin-only | `#F6911D` | `rgb(246,145,29)` | `hsl(32,92.3%,53.9%)` |
| ![](https://m.stacker.news/75590) | Blackr | `#000000` | `rgb(0,0,0)` | `hsl(0,0%,0%)` |
| ![](https://m.stacker.news/75591) | Dark | `#121214` | `rgb(18,18,20)` | `hsl(240,5.3%,7.5%)` |
| ![](https://m.stacker.news/75592) | Gold | `#FADA5E` | `rgb(250,218,94)` | `hsl(48,94%,67.5%)` |
| ![](https://m.stacker.news/75593) | Gray | `#969696` | `rgb(150,150,150)` | `hsl(0,0%,58.8%)` |
| ![](https://m.stacker.news/75594) | Light | `#F0F0F0` | `rgb(240,240,240)` | `hsl(0,0%,94.1%)` |
| ![](https://m.stacker.news/75595) | Nostrch | `#8C25F4` | `rgb(140,37,244)` | `hsl(270,90.4%,55.1%)` |
| ![](https://m.stacker.news/75596) | Pinkish | `#E685B5` | `rgb(230,133,181)` | `hsl(330,66%,71.2%)` |
| ![](https://m.stacker.news/75597) | Ruby | `#C03221` | `rgb(192,50,33)` | `hsl(6,70.7%,44.1%)` |
| ![](https://m.stacker.news/75598) | Sky Hover | `#007CBE` | `rgb(0,124,190)` | `hsl(201,100%,37.3%)` |
| ![](https://m.stacker.news/75599) | Sky Links | `#2E99D1` | `rgb(46,153,209)` | `hsl(201,63.9%,50%)` |
| ![](https://m.stacker.news/75600) | Sky Visited | `#56798E` | `rgb(86,121,142)` | `hsl(203,24.6%,44.7%)` |
| ![](https://m.stacker.news/75601) | So Fiat | `#5C8001` | `rgb(92,128,1)` | `hsl(77,98.4%,25.3%)` |
# Stacker News Icons
SN utilizes a set of bespoke icons that support its communication internally across the platform. Icons help bring instant, intuitive cues for various types of content and features. We share them here for you so you can use as you wish and satisfy your creative needs.
| ![Arrow](https://m.stacker.news/75605) `![Arrow](https://m.stacker.news/75605)` | ![Bell](https://m.stacker.news/75606) `![Bell](https://m.stacker.news/75606)` | ![Bounty](https://m.stacker.news/75607) `[Bounty](https://m.stacker.news/75607)` | ![Caret](https://m.stacker.news/75608) `[Caret](https://m.stacker.news/75608)` | ![Cowboy](https://m.stacker.news/75609) `[Cowboy](https://m.stacker.news/75609)` | ![Sun](https://m.stacker.news/75610) `[Sun](https://m.stacker.news/75610)` |
|---|---|---|---|---|---|
| ![Edit](https://m.stacker.news/75611) **`[Edit](https://m.stacker.news/75611)`** | ![Gun](https://m.stacker.news/75612) **`[Gun](https://m.stacker.news/75612)`** | ![Horse](https://m.stacker.news/75613) **`[Horse](https://m.stacker.news/75613)`** | ![Info](https://m.stacker.news/75614) **`[Info](https://m.stacker.news/75614)`** | ![Moon](https://m.stacker.news/75615) **`[Moon](https://m.stacker.news/75615)`** | ![Lightning](https://m.stacker.news/75616) **`[Lightning](https://m.stacker.news/75616)`**|
| ![Bald Lost Hat](https://m.stacker.news/75617) **`[Bald Lost Hat](https://m.stacker.news/75617)`**| ![Markdown](https://m.stacker.news/75618) **`[Markdown](https://m.stacker.news/75618)`**| ![Nostr](https://m.stacker.news/75619) **`[Nostr](https://m.stacker.news/75619)`**| ![Referral](https://m.stacker.news/75620) **`[Referral](https://m.stacker.news/75620)`**| ![Rewards](https://m.stacker.news/75621) **`[Rewards](https://m.stacker.news/75621)`**| ![Horse Lost Saddle](https://m.stacker.news/75622) **`[Horse Lost Saddle](https://m.stacker.news/75622)`**| ![Search](https://m.stacker.news/75623) **`[Search](https://m.stacker.news/75623)`** |
|![Shoot](https://m.stacker.news/75624) **`[Shoot](https://m.stacker.news/75624)`** |![Texas](https://m.stacker.news/75625) **`[Texas](https://m.stacker.news/75625)`** | ![Upload](https://m.stacker.news/75626) **`[Upload](https://m.stacker.news/75626)`** | ![Zap Zap](https://m.stacker.news/75627) **`[Zap Zap](https://m.stacker.news/75627)`** |||
# Stacker News Banners
Banners are important visual elements used in our digital platforms and marketing materials. They help to highlight key stories, features or announcements while maintaining our brand aesthetic.
Here below you'll find custom banners for Sn and for individial territories. I try to build those that I follow most, for now @AGORA is the only one that designed its own banners. Comment below if you'd like some banners for your territory!
#### SN Dark background
|970x250|
|---|
|![](https://m.stacker.news/75654) `![](https://m.stacker.news/75654` |
|250x250|300x250|300x600|
|---|---|---|
|![](https://m.stacker.news/75656)`![](https://m.stacker.news/75656)`|![](https://m.stacker.news/75657)`![](https://m.stacker.news/75657)`|![](https://m.stacker.news/75658)`![](https://m.stacker.news/75658)`|
|728x90|
|---|
| ![](https://m.stacker.news/75655) `![](https://m.stacker.news/75655)` |
#### SN Gold background
|970x250|
|---|
|![](https://m.stacker.news/75641)`![](https://m.stacker.news/75641)` |
|250x250|300x250|300x600|
|---|---|---|
|![](https://m.stacker.news/75645)`![](https://m.stacker.news/75645)` | ![](https://m.stacker.news/75646)`![](https://m.stacker.news/75646)` |![](https://m.stacker.news/75647)`![](https://m.stacker.news/75647)` |
|728x90|
|---|
|![](https://m.stacker.news/75648)`![](https://m.stacker.news/75648)` |
#### SN by @Jon_Hodl
|970x250|
|---|
| ![](https://m.stacker.news/75649)`![](https://m.stacker.news/75649)` |
|250x250|300x250|300x600|
|---|---|---|
| ![](https://m.stacker.news/75651)`![](https://m.stacker.news/75651)` | ![](https://m.stacker.news/75652) `![](https://m.stacker.news/75652)`| ![](https://m.stacker.news/75653)`![](https://m.stacker.news/75653)` |
|728x90|
|---|
|![](https://m.stacker.news/75650)`![](https://m.stacker.news/75650)` |
#### ~AGORA territory
The SN P2P Marketplace
|970x250|
|---|
| ![](https://m.stacker.news/75767)`![](https://m.stacker.news/75767)` |
|250x250|300x250|300x600|
|---|---|---|
| ![](https://m.stacker.news/75769)`![](https://m.stacker.news/75769)` | ![](https://m.stacker.news/75770)`![](https://m.stacker.news/75770)`|![](https://m.stacker.news/75771)`![](https://m.stacker.news/75771)`|
|728x90|
|---|
| ![](https://m.stacker.news/75768)`![](https://m.stacker.news/75768)`|
#### ~alter_native territory
|970x250|
|---|
| ![](https://m.stacker.news/75669)`![](https://m.stacker.news/75669)`|
|250x250|300x250|300x600|
|---|---|---|
|![](https://m.stacker.news/75671)`![](https://m.stacker.news/75671)`|![](https://m.stacker.news/75672)`![](https://m.stacker.news/75672)`|![](https://m.stacker.news/75673)`![](https://m.stacker.news/75673)`|
|728x90|
|---|
|![](https://m.stacker.news/75670)`![](https://m.stacker.news/75670)` |
#### ~bitcoin_beginners
|970x250|
|---|
| ![](https://m.stacker.news/75676)`![](https://m.stacker.news/75676)` |
|250x250|300x250|300x600|
|---|---|---|
| ![](https://m.stacker.news/75677)`![](https://m.stacker.news/75677)`|![](https://m.stacker.news/75678)`![](https://m.stacker.news/75678)`|![](https://m.stacker.news/75679)`![](https://m.stacker.news/75679)` |
|728x90|
|---|
| ![](https://m.stacker.news/75675)`![](https://m.stacker.news/75675)`|
#### ~Design territory
|970x250|
|---|
|![](https://m.stacker.news/75659)`![](https://m.stacker.news/75659)`|
|250x250|300x250|300x600|
|---|---|---|
|![](https://m.stacker.news/75661)`![](https://m.stacker.news/75661)`|![](https://m.stacker.news/75662)`![](https://m.stacker.news/75662)`|![](https://m.stacker.news/75663)`![](https://m.stacker.news/75663)`|
|728x90|
|---|
|![](https://m.stacker.news/75660)`![](https://m.stacker.news/75660)`|
#### ~Music territory
|970x250|
|---|
| ![](https://m.stacker.news/75664)`![](https://m.stacker.news/75664)`|
|250x250|300x250|300x600|
|---|---|---|
|![](https://m.stacker.news/75666)`![](https://m.stacker.news/75666)`|![](https://m.stacker.news/75667)`![](https://m.stacker.news/75667)`|![](https://m.stacker.news/75668)`![](https://m.stacker.news/75668)`|
|728x90|
|---|
| ![](https://m.stacker.news/75665)`![](https://m.stacker.news/75665)`|
# Anything else we could add?
If you feel something is missing, or you know a better tool to manage this media kit for SN in a collaborative and FOSS way then, DO share it in a comment below
Territory owners [^1], do you need banners for your territory? Feel free to edit the figma file liked above or comment below sharing your needs or ideas, I'll try to do something for you.
By following these guidelines, we ensure consistency and professionalism in every case where Stacker News is represented here internally to stackers or to our audience in the KYC internet, reinforcing SN credibility as a trusted source for data-driven journalism.
[^1]: FYI: @Aardvark @AGORA @anna @antic @AtlantisPleb @Bell_curve @benwehrman @bitcoinplebdev @Bitter @BlokchainB @ch0k1 @davidw @ek @elvismercury @frostdragon @grayruby @HODLR @inverselarp @Jon_Hodl @k00b @marks @MaxAWebster @mega_dreamer @niftynei @nout @OneOneSeven @OT @PlebLab @Public_N_M_E @RDClark @realBitcoinDog @roytheholographicuniverse @siggy47 @softsimon @south_korea_ln @theschoolofbitcoin @TNStacker @UCantDoThatDotNet @Undisciplined
originally posted at https://stacker.news/items/872925