-
![](/static/nostr-icon-purple-64x64.png)
@ 6ad3e2a3:c90b7740
2025-02-07 08:17:18
When I used to work in fantasy sports, people would ask me questions about their teams, e.g., which players to start, who to drop. What they didn’t realize is I had seven of my own teams to worry about, was already living and dying with my own myriad choices, good and bad, I made every week. The last thing I needed was to make a decision for them, see it go bad and suffer more on their account.
I’d tell them, “You decide, I’ve got my own problems.”
. . .
I don’t know what I’m doing. Ideas which feel like insights come to me, I try to articulate them to my satisfaction and post them (with some editing help from Heather.) Often I feel like I should be producing more work — after all, I don’t have a job any more, I have plenty of time. Walking the dog, exercising, managing your finances, picking up the kid, putting food on the table (literally) is well and good, but fulfilling your duties is not enough. You need to stay in the game. What game is up to each person, but it should be a game you enjoy, one that draws on skills honed over decades by the accident of your particular interests.
. . .
Writing and ideas can’t be produced on demand. I mean they can — and I did it for 22 years on a particular topic — but I don’t mean that kind of writing. I don’t want a schedule. I don’t need more rules, more discipline, more “hacks.” Discipline is like the interest on a 30-year mortgage. Initially it’s most of the payment, but over time it cedes weight to understanding which is like the principal. Discipline without understanding is like an interest-only mortgage. You pay it every month and get nowhere.
Even when insights arrive they can’t always be articulated sufficiently and coherently. Many insights are of the one sentence variety — fine for a social media post, but you can’t send out an email newsletter 10 times per day with one sentence insights. It doesn’t work over that medium.
That’s a dilemma because posting on social media doesn’t feel like proper work. Yes, you’re reaching people, affecting the zeitgeist in whatever small way — but there’s something addictive and unsatisfying about it, like eating candy instead of food. Don’t get me wrong, I stand by my posts (consider them organic, artisanal candy) but shitposting and the immediate feedback received therefrom keeps you only on the periphery. I need to connect with something deeper.
. . .
I’ve spent a lot of time dissecting the various pathologies of the laptop class, of which I’m obviously a part as I literally type this in a coffee shop on my laptop! The need to believe they are empathic and good overwhelming any rational sense-making and basic morals. Men dominating women’s sports, child sex changes, forced injections, criminals running rampant, cities in decay, calls for censorship and funding for foreign wars. The authorities patted them on the back, their peers accepted them and their overlords promoted them so long as they hewed to the narrative.
The freakout we’re presently witnessing is not about the billions in taxpayer money no longer being sent for DEI training in some foreign country, i.e., money-laundering to favored interests and cronies. They’re not really upset FBI agents are being fired, secrets are being revealed, that we are finally making an effort to prevent fentanyl from flowing across the border and killing our fellow citizens. These are good things, and even if you don’t agree, none of it is grounds for the meltdowns I see every day on social media.
What’s really happening is people who were assured they were the “good”, the empathic, the compassionate ones, those who towed the line during covid, got their boosters, wore their masks, “social distanced,” put pronouns in their bios, are being confronted with a terrifying realization: the behaviors and beliefs, to which they so dutifully attached themselves, for which they publicly and stridently advocated, whether online or at Thanksgiving dinner, are no longer being rewarded. In fact, they are being openly ridiculed. Instead of the pat on the back, increasingly Team Good is facing mockery and outright scorn.
There will be no legal consequences. No one will be arrested or put in a camp, delusions of persecution notwithstanding. If you produce real value for a real employer, you are not at risk of being fired. If you insist on perpetuating your derangement on social media you will not be deplatformed or canceled (that only happens to people speaking the truths inconvenient to the powerful.)
No, the reality is in some ways far worse: your entire worldview, on which you staked your self-image, is being dismantled in real time. You are no longer “good,” it’s becoming obvious to most the policies for which you advocated were catastrophic, the politicians for whom you voted deeply cynical and corrupt. The gaping abyss within your being to which you attached this superstructure of self-affirmation is dissolving into thin air. You are not “superior” like you thought, you are just another person suffering and existing like everyone else. And your only choices are to face that daunting reality or cling to a dying and useless paradigm, the end game for which is only madness.
We all want to feel good about ourselves, and like an obese person drugging themselves with high-fructose corn syrup for years, you have gorged on the distorted approbation of a sick society that, unpleasantly for you, is starting to heal. Your first laps around the track, so to speak, are going to hurt a lot.
. . .
I probably went on too long about the laptop class freakout. I have a lot of resentment toward the way they behaved the last five years. But I started this essay with the idea that I have my own problems, and in the end, I am not much different from them.
I want to produce more work, and of higher quality, but to what end? To feel good about my contributions, to have a sense that I am “good.” Maybe it’s not “good” in the lame “I complied with authority, and everyone likes me” kind of way, but it arises from the same source. That source is the emptiness within, wherein we require accolades, dopamine, positive feedback as a kind of justification for our existence. “No, I am not squandering my time on earth, living a comfortable life, I am asking hard questions, connecting with people, sharing hard-won insights. I am useful! I am good! I got my sixth dopamine booster from writing yet another essay!”
. . .
There is an irony in writing this piece. I feel as I type the cathartic nature of expressing these feelings. I am doing something worthwhile, everything is flowing out of me, the minutes are sailing by. I am identifying and solving this thorny problem simultaneously, engaging with the emptiness and dissatisfaction. The solution isn’t in the output, whatever one might think of it, it’s in giving attention to the feelings I’ve squandered too much time avoiding. I feel unworthy not because I do not produce enough work, it turns out, but because I am unwilling to connect with my deepest nature.
. . .
No matter how uneasy you feel, no matter how much fundamental doubt you have about your value as a human being, you can always start where you are. The feeling of unworthiness, the need for an escape, the craving for some kind of reward from your peers or the authorities or whatever easily-consumed carbohydrates you have in the kitchen is simply the present state in which you find yourself. It is not wrong or bad, it just is. And what is can always be examined, observed, given attention. Attending to that discomfort is always within reach.
. . .
The last thing I want to do is write an essay, face a purgatory of sitting down and consciously putting my feelings into words. It’s so much easier to distract oneself with all the news about the world, check 100 times a day the price of bitcoin and my other investments. But purgatory is the only way out of hell. The hell of wanting to succeed, of wanting to become “good.”
For some, that astroturfed worldview they so painstaking affixed to their empty souls is dissolving toward a revelation of the emptiness beneath. And unsurprisingly they are freaking out. But I’ve wasted too much time arguing with them, pointing out the ways in which they’re misinformed, driven by fear and derelict in their basic epistemic responsibilities. If you want to hold onto the lies you were told, knock yourself out. I’ve got my own problems.
-
![](/static/nostr-icon-purple-64x64.png)
@ ec42c765:328c0600
2025-02-05 23:38:12
# カスタム絵文字とは
任意のオリジナル画像を絵文字のように文中に挿入できる機能です。
また、リアクション(Twitterの いいね のような機能)にもカスタム絵文字を使えます。
![image](https://nostrcheck.me/media/lokuyow/b350b17b9176c59ec8c5e8251189a6610d09f2d7d2746f40476c5214e5827d37.webp)
# カスタム絵文字の対応状況(2025/02/06)
![image](https://cdn.nostrcheck.me/ec42c765418b3db9c85abff3a88f4a3bbe57535eebbdc54522041fa5328c0600/e815d627b374aba2467952ac2206b04684912bf4a65e39603e090f0de65b7d6a.webp)
カスタム絵文字を使うためにはカスタム絵文字に対応した[クライアント](https://welcome.nostr-jp.org/tutorial/explore-client.html)を使う必要があります。
※表は一例です。クライアントは他にもたくさんあります。
使っているクライアントが対応していない場合は、クライアントを変更する、対応するまで待つ、開発者に要望を送る(または自分で実装する)などしましょう。
#### 対応クライアント
- [Amethyst](https://play.google.com/store/apps/details?id=com.vitorpamplona.amethyst)
- [FreeFrom](https://freefrom.space/)
- [nostter](https://nostter.app/)
- [Rabbit](https://rabbit.syusui.net/)
- [Lumilumi](https://lumilumi.app/)
- [Nos Haiku](https://nos-haiku.vercel.app/)
- [Snort](https://snort.social/)
- [noStrudel](https://nostrudel.ninja/)
ここではnostterを使って説明していきます。
# 準備
カスタム絵文字を使うための準備です。
- Nostrエクステンション(NIP-07)を導入する
- 使いたいカスタム絵文字をリストに登録する
## Nostrエクステンション(NIP-07)を導入する
Nostrエクステンションは使いたいカスタム絵文字を登録する時に必要になります。
また、環境(パソコン、iPhone、androidなど)によって導入方法が違います。
Nostrエクステンションを導入する端末は、実際にNostrを閲覧する端末と違っても構いません(リスト登録はPC、Nostr閲覧はiPhoneなど)。
Nostrエクステンション(NIP-07)の導入方法は以下のページを参照してください。
[ログイン拡張機能 (NIP-07)を使ってみよう | Welcome to Nostr! ~ Nostrをはじめよう! ~ ](https://welcome.nostr-jp.org/tutorial/nip-07.html)
少し面倒ですが、これを導入しておくとNostr上の様々な場面で役立つのでより快適になります。
## 使いたいカスタム絵文字をリストに登録する
以下のサイトで行います。
[emojito](https://emojito.meme/)
右上の**Get started**からNostrエクステンションでログインしてください。
例として以下のカスタム絵文字を導入してみます。
実際より絵文字が少なく表示されることがありますが、古い状態のデータを取得してしまっているためです。その場合はブラウザの更新ボタンを押してください。
[generalJP | カスタム絵文字](https://emojito.meme/a/naddr1qqykwetwv4exzmz22qqsuamnwvaz7tmev9382tndv5hsyg8vgtrk2svt8kuusk4l7w5g7j3mhet4xhhthhz52gsyr7jn9rqxqqpsgqqqw48qud6u3s)
![image](https://nostrcheck.me/media/lokuyow/a154cf1d4218cc17291ec845d7706a8a4de9db92759881b69c4f2bf766f8a409.webp)
- 右側の**Options**から**Bookmark**を選択
![image](https://nostrcheck.me/media/lokuyow/ad932fe7118d3059e245c3ab410724495a7ccc72fbaec5ed43fef398d20361d1.webp)
これでカスタム絵文字を使用するためのリストに登録できます。
# カスタム絵文字を使用する
例としてブラウザから使えるクライアント nostter から使用してみます。
[nostter](https://nostter.app/)
nostterにNostrエクステンションでログイン、もしくは秘密鍵を入れてログインしてください。
## 文章中に使用
1. **投稿**ボタンを押して投稿ウィンドウを表示
2. **顔😀**のボタンを押し、絵文字ウィンドウを表示
3. ***タブ**を押し、カスタム絵文字一覧を表示
4. カスタム絵文字を選択
5. : 記号に挟まれたアルファベットのショートコードとして挿入される
![image](https://nostrcheck.me/media/lokuyow/2f469e7bd4a8d0ed1d778934c60a36ed077010181361e50f8d31cdb24ae828b1.webp)
この状態で投稿するとカスタム絵文字として表示されます。
カスタム絵文字対応クライアントを使っている他ユーザーにもカスタム絵文字として表示されます。
対応していないクライアントの場合、ショートコードのまま表示されます。
![image](https://nostrcheck.me/media/lokuyow/0701671fdc2352a9181fac49bca23fb59b61ffacf33090d16d14b6243ed9f877.webp)
ショートコードを直接入力することでカスタム絵文字の候補が表示されるのでそこから選択することもできます。
![image](https://nostrcheck.me/media/lokuyow/bc6b142ea9ac3643fa2bf9360c774fc5b2914ff5b2c2210cb75e6846581fd77f.webp)
## リアクションに使用
1. 任意の投稿の**顔😀**のボタンを押し、絵文字ウィンドウを表示
2. ***タブ**を押し、カスタム絵文字一覧を表示
3. カスタム絵文字を選択
![image](https://nostrcheck.me/media/lokuyow/203ffeba4fe9f3754ef394d6b4c8875db54d03c7d7b30b5eb4ac6d290c985639.webp)
カスタム絵文字リアクションを送ることができます。
![image](https://nostrcheck.me/media/lokuyow/729c3a016b7054433a56b093ee4cc6f3431248ace9e2eaa89bacdeececc0e58d.webp)
# カスタム絵文字を探す
先述した[emojito](https://emojito.meme/)からカスタム絵文字を探せます。
例えば任意のユーザーのページ [emojito ロクヨウ](https://emojito.meme/p/npub1a3pvwe2p3v7mnjz6hle63r628wl9w567aw7u23fzqs062v5vqcqqu3sgh3) から探したり、 [emojito Browse all](https://emojito.meme/browse) からnostr全体で最近作成、更新された絵文字を見たりできます。
また、以下のリンクは日本語圏ユーザーが作ったカスタム絵文字を集めたリストです(2025/02/06)
※漏れがあるかもしれません
[日本ユーザー作 カスタム絵文字](https://nostviewstr.vercel.app/npub17hczqvxtfv3w69wr6lxrttnpdekwdwel55mld60fr24zwjuu6utqtj8mjx/10030)
各絵文字セットにある**Open in emojito**のリンクからemojitoに飛び、使用リストに追加できます。
-----------
以上です。
次:Nostrのカスタム絵文字の**作り方**
Yakihonneリンク [Nostrのカスタム絵文字の作り方](https://yakihonne.com/article/_@lokuyow.github.io/1707912490439)
Nostrリンク nostr:naddr1qqxnzdesxuunzv358ycrgveeqgswcsk8v4qck0deepdtluag3a9rh0jh2d0wh0w9g53qg8a9x2xqvqqrqsqqqa28r5psx3
-----------
# 仕様
[NIP-30 Custom Emoji](https://github.com/nostr-protocol/nips/blob/master/30.md)
[NIP-30 カスタム絵文字(和訳)](https://github.com/nostr-jp/nips-ja/blob/main/30.md)
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-07 07:26:07
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/878449
-
![](/static/nostr-icon-purple-64x64.png)
@ 21db9b8a:2a94c796
2025-02-07 07:06:49
Fair warning: This is an explicit and erotic story involving extremely taboo themes that would not allow it to be published on most sites that host erotic stories. But what is Nostr for if not full freedom of speech?
All characters in this story are fictional only. It is not in any way based on true events.
This is also not your average stroke story. It will be released in chapters, and while there ***is*** sexual content in each chapter, there is no full-on sex until late in chapter 4. It is a story of sexual discovery and exploration between young people who have few resources to educate them, but also little to hold back their experimentation.
I hope you enjoy it. If not… Well… You don’t have to host it on your relay, and you can always mute me so you don’t see any more.
***
Dani barreled through the dining room in pursuit of her younger brother, Jake, who sped out the sliding glass door onto the back deck, making a feeble and unsuccessful attempt to close the door behind him as he ran. He had always been faster than Dani over short distances, and his recent growth spurt, just before turning thirteen, had made it that much more difficult to catch him.
"Give them back, you thief!" she shouted after him, taking just enough time to open and fully slide the door closed behind her, in order to avoid incurring her mother's wrath.
It was all the lead her brother needed. He leaped off the deck into the sunlit back yard and sprinted over to one of the tall maple trees at the edge of the lawn. By the time Dani had made it to the yard, her brother was already scurrying up the trunk with her sunglasses gripped between his teeth. Jake was younger than Dani by seventeen months, but he had recently grown to be two full inches taller than her, and he had begun to develop muscle tone to compliment his athleticism. It also helped him climb trees with frustrating ease.
Dani jogged to the base of the maple, which had no limbs for at least the first ten to twelve feet, and glared up at her brother lounging across two of the branches. He was now wearing her sunglasses to further taunt her. The twerp took his role as the annoying younger brother seriously, despite their age difference being relatively small. Dani's other two brothers, ages ten and seven, had thankfully not learned Jake's bad habits and generally left Dani alone, but her oldest brother seemed to make it his mission to infuriate her. It was just for sport, Dani knew, and Jake really was alright to be around most of the time, but let him get bored and it always seemed like she was the one who paid for it.
"Give me a break, Jacob William Hansen!" she demanded, using his full name like their mother often did when she wanted him to know he was in trouble. She shaded her eyes from the early summer sun as she continued to glare up at him. It did not seem to have the same effect as when her mother used it. "When you come down from there, I'll have your hide!"
"You may have my hide, Danielle Elizabeth Hansen,” he mocked, “but you won't have your glasses." With that, he plucked them from his face and hooked them over a smaller branch above him.
"You wouldn't dare leave them up there!" she asserted, not really sure whether he would or not. Jake knew better than to push things too far, but he might not consider abandoning her sunglasses in the limbs of a tree to count as 'too far'.
"What are you going to do? Go tell on me?" Of course, he knew she would not. They had long since stopped tattling on one another. In their household, the tattler often brought as much punishment upon him or herself as the one tattled on, and sometimes more. Instead, Jake and Dani had agreed to settle most matters between themselves, and only bring their parents in when it was more serious, like when Jake had planned to jump off the garage roof onto his skateboard, and Dani just knew he would have cracked open his skull if he had tried it.
"If you want your sunglasses back, you are just going to have to come up here and get them."
"How did you even make it up there?" she demanded. Dani was no slouch at climbing trees most of the time. She liked to play in the woods and didn't mind getting dirty, but the trees she climbed at least had branches close enough to the ground that she could jump up and grab hold of them. This maple had nothing but bare trunk for several feet above her head.
"You didn't see how I did it?" Jake asked. "You just have to wrap your legs around it and use them to hold on. Then grab as high as you can with your arms and pull your legs up higher."
Dani cocked an eyebrow at him dubiously, unsure whether she could mimic the technique. For one, her brother didn't have breasts to contend with, and Dani had been a bit of an early bloomer in that department. At fourteen, she already would have filled out a B-cup bra, if she ever wore anything other than sports bras. The lumps of fatty flesh sticking out from her chest were horribly annoying and always getting in the way. It seemed more than likely that her breasts would do just that while trying to shimmy up the tree as well.
Shrugging to herself she decided to give it a shot. She approached the trunk and wrapped her arms around it as high up as she could reach. She could just barely touch her fingers together on the other side when hugging as closely as her chest would allow. Supporting herself with her arms, she jumped and wrapped her legs around the trunk as well and felt the bark lightly scratching the inside of her thighs and back of her calves. It probably wasn't the best idea to be doing this in her cutoff jeans and a tank top, but it was far too warm out to wear her usual jeans and a hoodie. She would just have to tough her way through it.
Gritting her teeth she pushed her body upward with her legs, which invariably tugged the front of her tank top downward to expose part of her sports bra underneath, then she reached as high as she could with her arms and let her weight settle on them to pull her legs up again. This caused Dani's breasts, which were being crushed between her and the tree, to push upward, partially spilling out of the top of her sports bra and tank top. As predicted, they were getting in the way of things once again.
Dani was far too distracted to think about what kind of display she was putting on for her brother above her, though. As her weight had settled, her crotch had slid against the trunk and caused a pleasurable sensation to well up in her nether-regions. It was a shock to Dani, and she nearly let go of the tree. She'd never felt anything quite like that from “down there” before, and it was distractingly pleasant. She sat frozen in place for a moment, trying to make sense of the feeling.
"Well?" her brother voiced his impatience. "Are you just going to hang there like a koala or are you going to come get your shades?"
Letting out a low, frustrated growl, Dani continued upward, the pleasant sensation in her groin returning each time she slid it against the trunk. What on earth was going on? This was not a situation that should be causing her pleasure whatsoever, let alone down there. Her legs and arms felt like they had several new scrapes from the rough trunk, but her crotch was alight with a dull pleasurable throbbing that Dani had never experienced before. Then again, she'd never thought to rub it against anything before.
As she finally shimmied her way high enough to grab hold of the lower-most branch, Dani was panting from more than the sun's heat and her exertion. Pulling herself up onto the sturdy limb, she hoped her brother didn't notice the flush in her face or the way she self-consciously adjusted her tank top so that it properly covered what it was meant to. Then she looked up to see him holding her sunglasses out to her from the branch he was seated on.
"Not cool, Jake!" she chided, snatching her sunglasses from his hand and inspecting them for damage. Satisfied they were none the worse for wear, she slid them into her dark hair, which was pulled back into a loose ponytail that hung just past her shoulders, so that they rested securely atop her head.
"Oh stop your whining," he brushed off her anger. "You know you needed some motivation to get out of the kitchen. Mom has had you cooped up in there all morning."
"Yeah, that's because it gets too hot to bake in the afternoon, doofus! Don't you want fresh bread for the monstrous sandwich I'm sure you will somehow manage to stuff down your throat for lunch?"
"Fair point," Jake acknowledged. "But aren't you glad to get out and get your blood pumping?"
"No!" Dani retorted. "Look at me!" She held her scraped-up arms out for his inspection. "I blame you for this!"
"Oh come on! You love it!" Jake insisted. "I have seen you laughing off far worse war-wounds than that."
Dani sighed and shook her head at him. He was right, of course. She was known for playing hard. Hard enough to keep up with the boys in the neighborhood, who often used to wrestle her like she was one of them. At least, they had until recently. Since she'd developed breasts they all seemed scared of her. All except Jake, but he was her brother. They had never been awkward with one another, and he still didn't seem to notice that she was a girl, let alone growing into a woman.
For most of their childhood, Jake was the only playmate Dani had, so she had adapted to playing like a boy. Instead of Barbies and tea sets, it had been Legos and Nerf guns, and she had loved every minute of it, even if it did tend to come with a fair share of bruises and scrapes. And sure, Jake could be an absolute pest, but it was mutual antagonism born out of playful sibling affection.
"Fine," she admitted. "It was a welcome rescue from mom's home ec class. But you're still going to owe me for all the scrapes I have from climbing this tree. My legs are even worse than my arms!"
"I'm sure you'll think of some way to get sweet revenge," Jake laughed. "You always do."
Again, he was right. As much as Jake infuriated her with his taunting, teasing, and pranks, Dani could dish it right back at him. That was part of their strange sibling relationship that made it look to all on the outside like they couldn't stand one another, when in reality they were best friends and would do anything for the other when it really mattered.
"Alright, meat-brain," Dani changed the subject, using her favorite pet name for her brother. "Now that we're free of mom's clutches for the afternoon, what should we do with ourselves?"
"I don't know what you're going to do, but when Finn gets home from school, we're going fishing."
Finn was Jake's best friend who lived just a few houses down from them. While Jake, Dani, and their siblings were homeschooled by their mother, Finn went to public school and wouldn't be getting home until mid afternoon. Soon school would be out for the summer, making Jake and Finn nearly inseparable during daylight hours, but that was still a week and a half away, despite the heat wave they were getting in early June, and then Finn's family would be going to summer camp for three weeks, so the boys were taking advantage of as much time as they could get to hang out while they had the chance. Dani knew that she only had a short time while Finn was at camp to have her brother to herself before he would be all but lost to her for three months, since Jake and Finn usually didn't like having her along with them anymore. They had played together for years, but over the last several months, the two boys had started excluding her from their activities.
That left Dani feeling quite alone when Jake and Finn rode their bikes off to wherever they hung out these days. She had no friends of her own in the neighborhood. Her closest female friend, Audrey, lived almost a half-hour away, in a small town to the north, so they only really got to see each other at church, and the occasional planned sleepover.
"Fine, ditch your sister, as usual," Dani complained, rolling her eyes at her brother.
"Don't be like that, Dani," Jake protested. "It's just awkward talking about girls with your sister around, ya know?"
"Like you actually have any girls to talk about!" she teased.
"Maybe not, but a guy can live vicariously through his best friend, can't he?"
"Ha!" Dani scoffed. "I seriously doubt Finley O'Connor has a lineup of girls to give you all the juicy details about, either. At least not any that aren't figments of his imagination."
"You might be surprised."
Was that a blush that suddenly appeared on Jake's face? Had she misjudged Finn? Jake's best friend was not what she would think of as a chick-magnet. He was a bean-pole of a boy with an unkempt mop of red hair topping his head. He had a mouth that was too large for his face that always seemed to be twisted in a mischievous grin, and an over-abundance of freckles that covered every inch of him that Dani had ever seen, which was most of him since he often accompanied their family to go swimming at the river. He did not fit into Dani's definition of attractive, nor any other girl she knew. Not that she knew many other girls well enough to talk about boys with them.
"Whatever you say, meat brain," Dani said, shifting on the branch and dropping to hang beneath it before letting go to allow herself to fall the three or four feet down to the ground. She landed on her feet, bending her legs deeply to absorb the impact, then stood up straight and defiant. Brushing her hands off on the sides of her cutoffs and looking back up at her brother. "I'll just have to figure out how to keep myself occupied, as always."
There was more disappointment in her voice than she had intended. She didn't really want to make him feel bad for leaving her without anyone to hang out with for the afternoon. She could find things to do to keep herself busy. For one, she could help her younger brothers finish up their school work, though that would likely only get her through the first hour after lunchtime or so. The benefit of being homeschooled was that you could easily get all your work done for the day in just a few short hours, instead of being cooped up in a classroom the whole day like the public-schoolers had to endure. Of course, that was also the downside, because you then had to figure out what you would do with all the extra time you had.
Then Dani remembered the pleasurable sensation she had experienced while climbing the tree. That was certainly something she could investigate this afternoon while Jake was off gallivanting with Finn. She wanted to see if that feeling could be repeated, or if it was just some kind of fluke. She wasn't about to go rub her crotch against trees where anyone might see her, though. Perhaps she could find somewhere more discreet to experiment and see if that sensation returned. It had felt SO GOOD! Surely she could find a way to make it happen again.
***
Jake watched as his sister strolled away from the tree back toward the house, her round bottom framed enticingly in her cutoff jeans. He couldn't believe he was looking at her that way; she was his sister after all, not some random girl like the ones Finn liked to show him. Yet, after watching her climb the tree to retrieve her stolen sunglasses from him, Jake could not deny that she possessed every quality that made those girls on Finn's tablet so appealing.
Finn had been sharing pictures of naked and nearly-naked girls with Jake almost since he had gotten the tablet as a Christmas present last year. Well, Jake supposed they were actually women, not girls, since they all looked much older than Dani, and most had more pronounced curves. Then again, that could just be because he was seeing them without their clothes on, while Dani's curves were usually covered up. And Dani definitely did have some curves that Jake could no longer help but notice, especially after the display he had just seen.
From his perch in the branches of the maple tree, Jake had a perfect view down the front of his sister's tank top as she had shimmied her way up the trunk. No, he had not seen her nipples - her sports bra had done it's job of holding them in - but her round breasts pressing up prominently every time she let her weight rest on her arms made it clear that she was no longer the flat-chested little girl he somehow had still thought of her as. He should not have been so naive. He knew his own body had changed drastically, but had not even considered that his sister's was changing as well, let alone that she might just look a lot like the women in those pictures when she took her clothes off.
Jake frowned, noticing that his thoughts had made his dick stiffen in his pants. These were not thoughts he should be having about his sister! Hopefully Finn would have some new pictures to distract him away from thinking of Dani in that context. For that reason and more, Jake looked forward to his friend getting home from school, when the two of them could head out to do some "fishing". Oh, they might do a bit of actual fishing as well, but most of their time would likely be spent at their fort in the woods, well away from any prying eyes, while Finn shared his latest photographic acquisitions.
It would still be a few hours before the bus dropped his friend off where their street connected to the main road, so Jake resigned himself to finding something else to distract him from thoughts of his sister until then. It was too nice a day to expect that he could get away with playing Xbox in the basement game room. His brother, Travis, should be done with his school work by now, though, and always enjoyed tinkering with bikes in the garage with him, so Jake dropped out of the tree and headed toward the house to seek his brother out.
He crossed the back lawn and their dog, Dozer, ran to meet him. He was a massive brute of a dog, being a full-bred Rottweiler, but he was as gentle and loyal as anyone could ask for with the Hansen children. Jake patted the dog's blocky head and rubbed his ears as he strode toward the back deck. He skirted around the left side of the deck and down the concrete stairs to an exterior door that led directly to the basement where he expected he would find his brother.
All of the Hansen boys had rooms in the basement. Jake, as the oldest boy, had his own, while Travis and Aaron shared a room on the opposite end, next to the bathroom, with the game room and stairs up to the front entryway situated conveniently in-between. At age ten, Travis was three years younger than Jake, though he would be turning eleven in the fall, so it was more like two and a half years. Aaron was another three years younger than that, at age seven. The two of them were very close, just like Jake and Dani had always been, but lately Travis had been wanting to spend more time with Jake, whenever the older boy would allow it.
The last of the Hansen children was their adopted sister, Rebecca, who was only two years old. Everyone called her Bec, and she lived in the nursery upstairs next to their parents' master bedroom. Their family had fostered her as an infant, and finally adopted her just last year. Dani had been thrilled to finally have a sister, despite the massive age difference, and couldn't wait to teach the child all about being a girl. Not that Dani really had any clue how to be a girl herself, having grown up with three brothers.
As expected, when Jake opened the door into the basement, which opened into their game room, his younger brother was seated facing him on the couch with an Xbox controller in hand, transfixed by the large flat screen television on the wall. He looked quite a lot like Jake, with his short, brown hair and blue eyes. The younger boy hadn’t yet started to fill out with muscle tone, though, making him look scrawny, with a head too large for his stringy limbs. The effect was particularly humorous when he stood next to Jake.
"You'd better not let mom or dad catch you on that when the sun's out," Jake warned his brother.
"Mom's still busy helping Aaron with his math, and Dad's working on tonight's sermon," Travis assured him. "Besides, I was going to get off in just a few minutes anyway."
"Oh trust me," Jake began, crossing to the couch and sitting next to his brother, to see that he was playing Minecraft. "I know how 'just a few minutes' can turn into several hours without even realizing it. Why don't you come hang out in the garage and we'll get that chain tightened on your bike so it's not always falling off on you."
"Really!?" Travis exclaimed, putting the controller down and turning to Jake with an excited look on his face.
"Of course, runt!" Jake had continued to call his brother the pet name even after Aaron was born, much to Travis' chagrin. "What are big brother's for?"
He wasn't about to tell him that the reason he was suddenly so willing to help his little brother out was to take his mind off of thinking about Dani. Seeing her round breasts pressing out of the top of her tank top had shattered Jake's ability to think of her in practically the same terms as his brothers, or one of his male friends. Now he found himself remembering her long, smooth legs, and round bottom swaying back and forth hypnotically as she had walked back toward the house, and it seemed the more he told himself he shouldn't think of her that way, the harder it was not to.
Travis shut off the Xbox and the two boys marched up the stairs toward the door to the garage. As Jake pulled it open, he heard his mom call out from the dining room. "You boys don't go far! Lunchtime is coming in thirty minutes!"
"Don't worry mom!" Jake called back. "Travis and I will just be in the garage working on his bike!"
He didn't wait for a response before disappearing into the dark and hitting the button on the wall to open the massive roll up door on the two-car garage, allowing the sunlight to flood in. Then he and Travis went to work on the bike, not only tightening the chain, but straightening the handlebars that had been twisted to one side when Travis had crashed into a tree, and replacing one of the pedals that had nearly fallen apart since it was a hand-me-down bike from someone at their church. Travis was thrilled and rode the bike up and down their short driveway and around the cul-de-sac until their mother called them in for lunch.
After scarfing down a massive sandwich, as Dani had predicted, a bag of chips, and a banana, Jake offered to take Travis and Aaron on bike ride to the park and back to pass the time until Finn got home from school. He worried that Dani might want to come, too, but she had disappeared as soon as she was done with lunch without a word. That was highly unusual for her, but not unwelcome since Jake wasn't sure how he would keep himself from ogling her body if she came along.
Thankfully, the bike ride with his younger brothers ate up a fair amount of the afternoon. When the time finally came for Finn to be dropped off, Jake let his mom know where he was going then grabbed his fishing pole and tackle box and hopped on his bike once again to pedal down to the corner where the bus dropped off all the kids that lived on their street. He arrived just as the bus was pulling away, and saw his friend, backpack slung casually across one shoulder, strolling toward him among four other kids from the neighborhood of various ages.
"Jeez Jake!" Finn exclaimed. "You must have been bored out of your mind to meet me right as I got dropped off!"
"Let's just say I'm glad you're finally home," Jake responded, swinging his leg across the back of his bike to dismount and turning it around to walk along side his friend back the direction he had come.
"Yeah, I'm finally free from that prison, even if it is only until tomorrow," Finn joked. "Seriously, though, you usually come find me at home, after I've had a chance to ditch my bag and pack us some snacks. What gives?"
Jake sighed. He certainly wasn't going to tell his friend the real reason he was so eager to hang out with him. What would Finn think of him if he knew he was having dirty thoughts about his own sister?
"It's been a long day, is all," he said finally, and that was partially true. It ***had*** felt exceptionally long. "And we won't be able to stay out long tonight, since I have church."
"Oh that's right, it's Wednesday, so you have to go be an altar boy tonight," Finn teased. "No wonder you want to get your debauchery in ahead of time."
"It's not like that..." Jake protested halfheartedly. "But now that you mention it, do you have any new pictures to share?"
Finn glanced around them to see if any of the other kids who had gotten off the bus were still walking close by, but they had all split off to head to their own homes.
"Dude... I've found us some good ones. You'll have jerk-off material for the next month! Or you would if you had a photographic memory."
"Oh shut it!" Jake said, punching his friend's shoulder. "It's not like your memory is any better."
"Doesn't have to be. I'm the one with the tablet," Finn pointed out as they turned into his driveway and Jake laid his bike down carefully on the front lawn, making sure the fishing gear didn't get damaged.
"You say that now, but just make sure your parents don't catch you with those pictures saved on it," Jake warned.
"Oh, don't worry about that," Finn assured him. "My parent's don't check what I've been doing on it. They only got it for me because they figure it will keep me from being too noisy and disturbing their peace. I doubt they could even figure out how to turn it on."
Finn wasn't exaggerating. His parents were much older than Jake's, and had not grown up with computers. They had both been married before and had adult children from their previous marriages, some of whom had their own kids already. They got together and had Finn and his older brother Scott when they were both in their forties. Now they were in their late fifties and far from being computer literate. The only reason they had an internet connection at all was because it had come with their cable TV plan and Scott had set it up.
"Wait here for a minute," Finn instructed. "I just have to drop off my bag and grab my gear." With that the red head disappeared inside his front door, appearing a few short minutes later with his own fishing pole and tackle box. He'd also changed into shorts and a t-shirt. As he approached, he popped open his tackle box and showed Jake that his tablet was tucked inside, then he retrieved his own bike from the side of the garage and the two boys headed out.
They rode through the park and out of the back of the neighborhood, where it was bordered by logging company land, serviced by a bumpy dirt road. Nearly a mile down the dirt road, they cut into the woods, stowing their bikes in some bushes. The forest was thick here, and full of fallen logs that the boys deftly maneuvered over and around to reach their destination. Barely visible in the undergrowth ahead was a short, vaguely unnaturally shaped structure that was the fort the two of them had constructed the previous summer, and had continued to improve upon since then. It was made entirely of natural materials, a fact that Jake was particularly proud of, and only large enough for three or four to sit in comfortably. They had constructed it by lashing logs together using roots and vines and anything else that would work as cordage, then taking evergreen boughs to create a roof and walls that did a fair job of blocking the wind, though a less fair job of keeping out the rain, as they had discovered the hard way.
The important thing was, the fort was a place they could reasonably expect to be left alone. Even in hunting season, not many people were wandering these woods, since they were too close to residential neighborhoods to safely shoot a rifle. The logging company that owned the land didn't even seem to have any intention of logging it anytime soon. They might have in years past, but that was before the city had grown so much that all the neighborhoods had sprung up around it. Indeed, the most likely event would be that the logging company would sell the land to a developer and yet another neighborhood would be built. Until then, Jake and his friend could use their fort to hide away and look at dirty pictures on Finn's tablet.
The two of them crawled through the small opening that served as a doorway and Jake was immediately enveloped by the scent of pine and spruce from the boughs laid on the walls, roof, and even the floor of their fort, to make it more comfortable to sit inside. The interior was not tall enough for him to stand, though he could move around on his knees without his head brushing against the roof, and the evergreen boughs were so thickly piled on the walls and roof that the only light within was the meager amount that filtered through the doorway. Jake took a seat with his back to one of the walls while Finn sat beside him and powered up his tablet.
"I have some real babes to show you today, my friend," Finn bragged, punching in his security code so that the tablet allowed him access to his home screen. Then he tapped the icon for the photos app and turned the screen so Jake could see it better.
Inside the dim fort, the tablet seemed to blaze with light as an image filled its screen. The picture was of a stunning blonde with wavy hair hanging loose to her shoulders. She was facing toward the camera as though looking past it into the distance while standing in a mostly empty room, though the background was too blurry to pick out any details. The shot only showed her from the waist up, and she was unbuttoning a pair of white jeans, though it was impossible to tell if they were pants or shorts. The top half of her body was completely bare, and her large breasts stood out proudly above her toned stomach. She was absolutely magnificent! She didn't have the biggest tits out of all the girls Finn had shown him before, but they were more than adequately large, perfectly round, and had similarly rounded areolas tipped with eraser shaped nipples. Her skin was the perfect shade of tan, with no tan-lines whatsoever.
"She's a stunner, right?" Finn asked, seeing Jake's reaction. "Her name's Nata Lee, or at least that's what she calls herself. She's got loads of pictures with her clothes on, but this is one of the only ones I could find where she shows her tits."
"She's a babe, for sure," Jake agreed, still staring at the photo. Finn swiped his finger across the screen and a new photo took the place of the stunning blonde.
Pictured was a young woman with dark blonde hair with a hint of red, tied back in a short ponytail. She was laying completely naked on a white couch with the photo taken from above looking down on her. She was staring straight into the camera, a mischievous smile on her face, with one hand caressing her shoulder and the other pressing in on an ample breast. Her breasts were easily as large as the first girl's, but they seemed to sag more. Her areolas were more oval in shape, and didn't contrast with her skin tone as much. The main attraction, though, was the bottom half of her body, with her legs spread wide to reveal her shaved pussy, it's pink inner folds poking out from between the soft outer lips. She was equally as gorgeous as the first girl, though in a decidedly different way. This girl looked like more fun, while the first looked more serious. The way her hair was tied back in a ponytail made her look younger, too, though there was no way she was anywhere near his age with tits like those. Something about her smile made Jake's cock twitch even more than looking at her naked body. It held the promise of delights he had never dreamed of.
"Another one you approve of, I take it?" Finn asked with a laugh. "Just wait. They get even better."
Swiping the screen again, a close-up image of a shaven pussy and the woman's inner thighs filled the screen. The inner folds of the pussy glistened with moisture and they were parted, revealing an oblong opening into her depths.
"Why is she wet down there?" Jake asked, transfixed by the high resolution close-up that showed her every fold and goose-bump.
"I don't know, maybe she just went pee," Finn replied. "But that's where you stick your dick in." He pointed to the opening.
"Wow..." Jake breathed. "That's crazy..."
Finn swiped the screen again, much to Jake's dismay, but his disappointment at not getting more time to inspect such a detailed image of a pussy evaporated as the next image filled the screen. It was of a brunette with long, dark hair hanging loosely over her shoulder as she leaned against a wall. The shot was taken from an angle to her left side, though not fully a profile shot, and only showed her from the chest up. What was visible was completely exposed, and she had slightly tanned skin and perky breasts that were nowhere near as big as the previous girls’, though they were adequately round, with erect nipples and round areolas that contrasted nicely with her skin tone. Somehow, those breasts were even more alluring to Jake, even though they weren't as large. What shocked and captivated him, though, was her face. Her round nose, full lips with just the hint of a smile, and thin, dark eyebrows hanging just above her sultry eyes, made her look uncannily like an older version of Dani. His sister still possessed a bit more girlish roundness to her cheeks and innocence in her eyes, and usually kept her long hair tied back and out of the way, but there was no denying the strong resemblance. Was this what she would look like with her hair down and a few more years of growing up? This girl's breasts were probably closer to the same size as Dani's, too. Was that what his sister's tits looked like under her shirt and sports bra?
The image had only been on the screen for a few seconds when Finn suddenly swiped it away saying, "Sorry, I thought I had deleted that one."
"What? Why?" Jake asked, looking up from the tablet, which now had a busty redhead filling the screen.
"Because..." Finn hesitated. "That one looks a lot like your sister, and I thought that might be weird."
"Oh..." Jake said, feeling his face turn crimson and suddenly glad that it was too dark in the fort for his friend to see. "I... I hadn't really noticed."
Finn chuckled nervously and said, "I suppose you wouldn't if your attention was on her tits the whole time."
"Right?" Jake agreed, adding his own nervous laugh. Then it suddenly hit him that his friend had been looking at pictures of someone who looked like his sister. "Hey! Why did you have that picture in the first place if you know it looks like Dani?"
"Chill bro!" Finn started, setting the tablet down on the opposite side of him from Jake and putting his hands up defensively. "I am sure that all of these girls look like the sisters of someone we know."
"That's probably true, but this one looks like ***my*** sister, and you ***knew*** it did when you saved it to your tablet!" The heat in Jake's face was growing and he wasn't sure if it was because of his embarrassment or his anger at his friend.
"Look, I can understand why you're mad. You have every right to be the protective brother." Finn edged away from Jake a few inches as he spoke. "But before you pummel me, you have to admit that Dani is hot as fuck, and I am not going to be the only guy to notice."
Jake certainly did ***not*** want to admit that his sister was hot, but then hadn't that been his issue all afternoon? He'd never thought of her in those terms before, but he'd suddenly had her femininity thrust in his face and he had to admit that it was really messing with his perception of her. Now, after seeing a picture of a naked woman who looked uncannily similar to her, it was even harder not to think of Dani as incredibly attractive, or as Finn had put it, "hot as fuck".
The steam had been taken out of his anger, but Jake still wasn't in any mood to hang out with his friend, knowing that Finn had thought of Dani in similar terms as he was reluctantly having to admit he now did as well. Finn was right, of course, and there would probably be loads of guys who would think of his sister that way, but Jake simply wasn't prepared to find her attractive himself, let alone for anyone else to have the same opinion.
"Whatever, man..." Jake said, crawling to the doorway. "I'm going home to get dinner before church tonight. Maybe we can go fishing tomorrow." The tone of his voice made it plain that he didn't plan on it. He emerged from the fort and retrieved his bike from the bushes without even waiting for Finn's reply. How on earth was he going to make sense of his friend's dirty thoughts about his sister if he couldn't even make sense of his own?
***
As Dani rode home from church that night, she thought back on the events of the day. After chasing Jake out of the house to retrieve her sunglasses, and discovering the pleasant sensation in her groin when she rubbed it against the tree while climbing up after him, she had looked forward to finding herself some alone time to see if she could make it happen again. First, though, she had helped tutor her youngest brother, Aaron, with his math, his least favorite subject because he struggled with it so much. Then it had been lunch time and Dani had started to wonder how she could possibly find any time to herself for the afternoon. In a household of five children, there wasn't a lot of alone time to be had, and since her bedroom was right next to the living room on the ground level, she could not expect to get away with hiding in there; certainly not with the sun shining outside. Her mother would ensure that all the children spent ample time outdoors as long as the weather was good, and June had been unseasonably clear and hot so far.
As much as Dani wanted to investigate whether she could reproduce that warm and pleasurable feeling, she couldn't just go rubbing her crotch against objects where anyone might see her. With the privacy of her own room out of the question until later that evening, that left only the tree-house in the back yard, but that was Travis and Aaron's favorite hang-out spot most afternoons. Fortunately, Jake had unwittingly come to the rescue by taking the other boys with him on a bike ride. That in itself was odd. Usually Jake would spend most of the day until Finn got home from school hanging out with her. Yet, today he seemed to have avoided her like the plague after stealing her sunglasses that morning. She decided she would need to find out what that was all about if it continued, but for today it had worked to her advantage, affording her the alone time she craved.
Dani had gone out to the tree-house immediately after her brothers left for their bike ride. It was situated at the back of their property, built around the trunk of another of the massive maple trees, with a ladder leading up to a trap door in its floor. It was not terribly high off the ground, only ten to twelve feet or so, but that was high enough that no one standing on the ground could see inside the small windows. Once inside, Dani knew she could expect near complete privacy, especially since the branches of the tree hid the tree house windows from anyone on the second floor of their home looking toward the back of the property.
Hesitantly, Dani had gone to the trunk of the tree sticking up through the middle of the tree-house floor. It had a slightly larger circumference than the one she had climbed that morning, but she could still wrap her legs all the way around it. She could not do the same with her arms, however, so she leaned back and supported her weight with her hands on the rough planks beneath her. This didn't allow her to move her hips nearly enough to rub herself against the tree, so she let her feet fall to the floor as well. This gave her the freedom of motion she needed, and also allowed her to control how much pressure she exerted as she slid her cutoff jean clad crotch against the tree. The sensation was nearly immediate; a dull, warm pleasure welling up from between her legs. She continued to move her hips up and down, sliding herself against the tree's firm girth, the roughness of the bark dulled by the layers of cloth between it and her skin. The sensation seemed to build with each repeated grinding of her hips, but so did her fatigue. It was hard work to hold her whole body suspended in the air with just her arms and legs while she pumped and ground her groin against the trunk. Soon she was forced to collapse to the floor in exhaustion, despite how good it felt and how much she wanted to keep going.
She needed to find something else she could rub herself against. Something that didn't require her to hold herself up the whole time, but the inside of the tree-house was pretty sparse. There were a couple of beanbag chairs and a small table between them acting as the only furniture, but that was about all, aside from a few action figures and Lego bricks her brothers had left strewn across the floor. She wondered if she might be able to use her own hand instead, and went over to recline in one of the beanbag chairs. Spreading her legs, she placed the palm of her hand on the crotch of her cutoffs and gently rubbed downward and back up. The sensation was pleasant, but not as strong as it had been while rubbing against the tree trunk. She continued to rub herself for several minutes, but the sensation just stayed a dull, pleasurable ache, rather than building upon itself as it had when grinding against something more firm and solid, not to mention more textured, than the palm of her own hand.
Frustrated, Dani had spent the rest of the afternoon playing with their dog and then helped her mother prepare for dinner. Now that she had a bit more time to think about what had happened, though, she wondered if the sensation with her hand might have been stronger if she didn't have the thick fabric of her cutoffs in the way. She would have the perfect opportunity to test that theory not long after getting home, since Wednesday night was her turn to take a shower. Dani liked to take her showers late in the evening, if possible. It always felt good to go to bed fresh and clean, and it was relaxing to brush and dry her long hair, which usually helped her wind down for sleep. The shower would also be the perfect opportunity to be alone and try rubbing herself without any clothing in-between her hand and her vagina, which seemed to be the source of the pleasant sensation.
When their minivan pulled into the garage, the whole family piled out, filed into the house through the door to the main entryway, and split off in various directions. Dani's mother and father went upstairs to put Bec down for bed, her brothers went downstairs to get their pajamas on and brush their teeth, and Dani went through the kitchen and living room to get all the way around to her own bedroom. Once there, she retrieved her shower supplies from atop her vanity across from her bed. Her bathroom doubled as the family and guest bathroom, and was too small for Dani to leave all of her things laying around on the counter like her brothers could in their larger bathroom downstairs. She was allowed to leave her shampoo and body wash in the shower, because it was hidden from guests by the closed shower door. She was also permitted to leave her toothbrush and toothpaste inside the medicine cabinet behind the over-sink mirror. But she had to keep her razor, shaving gel, deodorant, and towels in her own room and take anything she needed with her to use the shower. This resulted in Dani doing as little of her hygiene in the bathroom as she could get away with, using her vanity in her bedroom instead.
Dani brought a towel for her hair, another for her body, and her bathrobe with her as she exited her room and crossed behind the living room couch to the small bathroom beyond. Closing and locking the door behind her, she crossed the room and locked the opposite door as well. Whoever had designed their home had thought it would be convenient to have access to the bathroom from both the living room and the kitchen. In reality it had just been more hassle remembering to lock and unlock both doors instead of just one. Indeed, it had led to more than one awkward encounter when she had forgotten to lock one door or the other before using the toilet, only to have her father or one of her brothers barge in on her by mistake. Having ensured a similarly embarrassing event would not occur this evening, Dani set her things on the small counter next to the sink and began to disrobe, letting each article of clothing fall to the floor. Then she pulled out the hair tie holding her ponytail back and strode naked over to the shower stall. The bathroom was too small to fit a tub, but Dani didn't mind most of the time. If she really wanted to take a bath, her parents would often let her use the massive tub in their master bathroom upstairs, rather than make her use the one in her brothers' bathroom in the basement. Most of the time she just wanted to get clean and be done with it, though, so a shower suited her fine.
She turned on the water and waited for it to get warm enough to step in, then turned it up until it was just this side of scalding, the way she liked it. When the steaming hot water poured over her skin, she let out a deep and relaxed sigh of pleasure, then got her hair thoroughly wet before sudsing it up with shampoo and rinsing it out, enjoying every second of the cleansing heat. Her plans of trying to give herself pleasure again were nearly forgotten as she lost herself in the soothing waters, until she started soaping up her body and she got to washing her more sensitive regions. As her fingers moved through the tuft of hair on the mound above her vagina she remembered that she was going to try to use her hand to rub against her bare skin and see if that made any difference. Dipping her hand lower, she put pressure against her mound and the outer lips of her vagina with her palm of her hand, the water and soap allowing it to slide smoothly along without any noticeable friction. Her body responded with a slight pleasurable ache, encouraging her to continue.
As she slowly rubbed the palm of her hand up and down against her sex, she felt the sensation begin to build upon itself, growing in strength and demand for more. Her hips had begun pressing into the motions of her hand almost of their own accord and Dani was surprised to feel something between the outer folds of her vagina that had grown firm. It was like a shallow ridge with a round nub, protected beneath the folds of skin. Experimentally, she let her palm drift higher over her mound, and ran two of her fingers to either side of the nub. The resulting shudder of pleasure was almost overwhelming, making her legs feel weak so that she had to lean against the shower wall to remain upright. Whatever that was, it felt ***AMAZING***, and was most certainly the source of the pleasurable sensations.
Dani focused her attention on that nub, running her fingers up and down, around, and across it, enjoying every spark of more and more intense pleasure that erupted as a result. She was not prepared for what happened next, as her whole body suddenly went tense involuntarily, and pleasure exploded inside her, pulsing and throbbing through her whole core. She gasped in surprise and bit her lip hard to keep herself from calling out, since she knew her parents were likely watching TV just beyond the bathroom wall. Her legs could not hold her anymore, and she let herself slide down the smooth side of the shower stall, her fingers still gently teasing the center of her pleasure as wave after wave of sensation wracked her body. Each wave eventually seemed smaller and less intense than the last until it finally subsided, leaving behind a satisfied hum of pleasure as Dani's breath came in desperate heaves.
She had no idea what had just happened, but it had been utterly fantastic! She knew instantly that this would be her new shower-time routine, maybe even nightly bedtime routine, from now on. She had no idea she could give herself such pure and intense bliss! Absently, she wondered if her friend Audrey was aware of it. Maybe it was just something unique to Dani, and Audrey would look at her like a weirdo when she asked, but she decided she must find out for sure the next time she had opportunity to hang out with her friend.
When her breathing finally returned to normal, Dani collected herself from the shower floor and finished washing before shutting off the water and grabbing one of her towels. She hoped that her parents hadn't noticed how much longer of a shower she had taken than normal, as she didn't want to try and explain why. She could probably come up with an excuse if she thought about it, but her brain wasn't firing on all cylinders after that incredible experience. As she tied a second towel around her still soaking wet hair, she thought to herself that even though she'd just moments ago enjoyed the deepest pleasure she’d ever felt, she couldn't wait to try it again.
***
Jake lay in his bed trying to focus on reading a book, but found that he could not keep his mind on the task at hand. His brothers had already gone to bed, and he could hear the water running upstairs where his sister still taking a shower. Meanwhile, his parents were probably watching TV in the living room, unless Bec had given them trouble trying to put her down for the night. As one of the oldest two Hansen children, Jake was allowed to stay up later than his younger brothers, but because they were trying to sleep, he was restricted to having quiet time in his room. Normally he'd be fine with that. He enjoyed reading, or drawing, or whittling with his pocketknife, but tonight was different.
All through church, Jake had been distracted from the youth pastor’s message by the image he'd seen on Finn's tablet screen that afternoon. He had nearly forgotten the other pictures, but the one of the woman who looked so much like Dani was firmly lodged in his brain, even though he'd only seen it for a few seconds. The perky breasts with erect nipples jutting out below elegant collar bones and satin smooth skin were burned into his memory, along with that slight, knowing smile and seductive eyes. It was his sister's face, even if obviously more mature and angular. Was there a similar resemblance to his sister's body? He'd probably never know. Dani was just one floor above him, completely naked in the shower, but beyond his gaze. He'd have no excuse to go anywhere near that bathroom to even attempt to catch a glimpse of her. Even if he tried, his sister was always good about locking the door since she lived with three brothers.
Then a thought occurred to him: Dani wouldn't just be undressed in the bathroom for her shower. He'd sat in the living room watching a movie with his parents before and seen her come out of the bathroom wrapped in her robe to scurry across to her bedroom to change into pajamas. That meant she would be naked in her bedroom, too, at least for a short time. Moreover, her bedroom had a window that she always complained was pointless because the only thing she could see out of it was the overgrown rhododendron bush planted outside. It was so big and thick with foliage that she could not even see through it to the side fence between their yard and the forest beyond. For his part, Jake had always retorted that at least she had a window, since his basement bedroom had none. The only thing on that side of the house outside Dani's window was a completely unused space intended for parking an RV, which the Hansens could never afford on their father’s pastor salary. If Jake was quiet about it, he could sneak out the basement door into the back yard, and around to Dani's window. By now it was dark enough that he probably would not be seen, if he was careful. He would have to hurry, though, because he had just heard the shower water stop.
Not wasting any more time thinking about it, he sat up, closed his book, and set it on the bed before throwing on some shoes and a light jacket, since the night air would likely be cool. Then he crept out of his room as quietly as he could to avoid alerting his brothers, in case they were still awake in their bedroom on the opposite side of the game room. The basement was dark, but Jake could easily navigate past the couch and coffee table on his left to the basement's exterior door. He eased it open, stepped outside, and closed it again just as silently, then crept up the concrete stairs to the back lawn.
Alerted to his presence, Dozer gave a low bark of alarm, then noticed it was him and trotted over from his dog house by the fence. Jake gave the big dog a pat then commanded him to go lie down in a stern whisper. The dog obeyed, returning the way he had come to plop down in front of his dog house. Jake let out a sigh of relief and continued around the corner of the house to the side where the rhododendron bush grew in front of Dani's window. The window itself was dark as Jake made his way toward it and he worried that he might have been too slow; that his sister might have already dressed in her pajamas and tucked herself into bed. Determined to confirm if that was the case, he crept closer, easing himself behind the massive bush and resting on his knees before inching his head up to the bottom corner of his sister's window. As his eyes peeked up to peer inside her room, he found that it was too dark to see anything but her window blinds, which were open to allow the sunlight in during the day. Between the blinds, all he could make out was the vague shape of her bed to his right, and her vanity on the opposite wall to his left. Beyond her bed he could make out the strong right angle of her closet door, but no details at all. Not enough to confirm whether his sister was in bed already or not.
Suddenly, a long, vertical sliver of light appeared at the back left end of the room and grew wider as the door was opened, then light flooded his eyes as Dani turned on her bedroom light. Instinctively, Jake ducked below the window, blinking away his light-blindness, then set his resolve and peeked back into his sister's room.
Dani had closed her door and was tossing an armload of her clothes into a hamper next to her vanity. She then hung a towel from the post at the foot of her bed that was farthest from the window and began to unwrap the towel on her head from around her hair, using it to tousle the long locks and help them dry. She then moved closer to the window in order to place this towel on the other post on the opposite corner of the foot of her bed. At last she moved on to what Jake had been waiting for: she undid the tie at the waist of her robe and casually let it fall to the floor.
Jake nearly gasped at the sight of his sister's suddenly naked form. She was absolutely exquisite! Unlike the girl in the photo, she had obvious, though light, tan lines on her legs and shoulders from her cutoffs and tank top that she wore on particularly warm days. Her wet hair hung heavily past her shoulders, brushing against her skin as she moved, bumping enticingly against her breasts. And Dani's breasts were mesmerizing as they jiggled slightly on her chest while she ran her fingers through her wet hair, tossing it behind her. They definitely were not as big as the tits on the first two girls Finn had shown him that afternoon - maybe not even as big as the woman who was Dani's lookalike - but they were perky, round, and firm like only a teenage girl's tits could be, with cute nipples standing out proudly from being exposed to the air.
Jake didn't get a chance to let his gaze drift lower before Dani turned to go take a seat at her vanity, revealing a round, bubble butt for a few precious seconds before she sat down. From his angle at the window, he couldn't see Dani's reflection in her vanity's mirror, but he did get a delicious view of the side of her left breast as she grabbed her hairbrush and began working tangles out of her long hair, causing the round breast to bounce playfully and sway slightly.
He was rooted to the spot as surely as the rhododendron bush beside him as he watched his naked sister brush and dry her hair. Her skin was so perfect, and her proportions so petite, and yet toned and athletic at the same time. He could see the muscles of her arms and shoulders moving beneath her smooth skin, and the graceful slope where her neck met with her torso. How had he never noticed this before? It wasn't as if all of these things had been hidden under her clothing. He had just never paid attention until now.
Finished with her hair, Dani got up from the vanity and strode over to her closet, giving Jake his first look at her pussy with it's clump of bush on the mound above it. That was something he hadn't seen before. All of the vaginas he had seen on Finn's tablet had been bare, but Dani's had hair similar to the fuzz surrounding Jake’s own dick. Her breasts bounced with each step across the room until she turned her back to the window and opened her closet door. Jake enjoyed another glorious viewing of her round ass while she fished clothing out, then she turned and tossed her pajamas onto her bed and bent down facing him, her breasts hanging enticingly in his view for a moment before she straightened, pulling a pair of panties up her legs and over her pussy, hiding it from his gaze. Then she snagged her pajama pants off the bed and pulled them on over her panties, and Jake knew what would be next so he savored a last look at her perfect tits. Dani slipped each of her arms into the sleeves of her pajama top in turn, causing her breasts to sway and jiggle even more before she began to button up the front of the garment. Fully clothed, she turned to close her closet door and Jake could just make out the roundness of her ass from the way the light pajama material clung to her skin.
Her evening routine now concluded, Dani turned on her bedside lamp, crossed toward the door to turn off the ceiling light and returned to her bed in the half darkness. She flung aside the covers and flopped onto her mattress before snuggling in for the night, and Jake knew that was his cue to leave. He wasn't going to get any more of a show, and he'd already gotten more than he had hoped for.
Quietly as he could, he pushed his way out of the rhododendron bush and crept around to the back yard then down the stairs into the basement and across the game room to his own bedroom door, conscious that his wildly attractive sister had just settled in for the night directly above him. He slipped out of his shoes and tossed his jacket to the floor before crawling into his bed, picking up the book he couldn't focus on earlier and placing it on his nightstand. He let himself flop onto his back, his head hitting his pillow, and he stared up at the ceiling re-living every detail of what he had just seen.
He'd just watched his older sister as she went about her evening routine completely naked, and she was drop dead gorgeous! As he thought about her lithe form, his hand naturally wandered down to his dick and began gently stroking it. Soon he was jerking off in earnest and the only images in his head were of Dani. He needed very little imagination to picture her, since her body was so freshly burned into his mind, and it took no time at all before he was ejaculating pulse after pulse of thick cum into a sock that he kept nearby for that purpose.
When he was done, he felt that slight sense of guilt that always followed a jerk-off session, tinged with additional guilt for spying on his sister in the privacy of her room. Yet he already knew that since he'd gotten away with it this time, he would be back again for more. His sister generally showered Monday, Wednesday, and Friday evenings, and that meant he only had two days to wait before he would have another opportunity to see her naked. It was an opportunity he doubted he would ever pass up again.
-
![](/static/nostr-icon-purple-64x64.png)
@ e3ba5e1a:5e433365
2025-02-07 05:25:58
How much does the government cost? Focusing just on the US, we could talk in terms of US dollars spent on the budget each year. But those numbers are so large we can’t really conceptualize them. A more relatable way of talking about this is what percentage of your income goes to the government. Or, even better, what percentage of your productive output is funneled to the government?
A first pass answer would be to look at income tax. If income tax is 30%, you work 30% of the year for the government and 70% for yourself. The problem is that income tax isn’t the only tax. There’s property tax, sales tax, payroll tax (i.e. another income tax), and who knows how many others. In other words, income tax only covers one (large) portion of our taxed income.
But it doesn’t stop there. We can’t forget inflation, the hidden, silent tax that not only erodes your earnings, but destroys your savings. It pulls off the amazing feat of not only taxing you today, but *historically* taxing you. It punishes you for being a prudent person and saving your money. (Which, side note, is why we love saving in Bitcoin.)
You might think we’re done. We’ve covered all the ways the government funds itself: direct taxation and inflation (via money printing). And that part is true. But we haven’t finished looking at the cost. You see, economically speaking, every time you put a tax into a system, you create inefficiencies. The market can no longer perform as well as it did previously. So we have yet another hidden cost: all productive capability in the economy gets worse, because the government needs to push its way in. An easy way to see this is all the tax games companies play to fall into different deductions and exemptions.
It doesn’t stop there either. Now that we’re talking about government-caused inefficiency, we can of course get to regulation. Regulation directly makes things more expensive (by forcing companies to spend time on compliance). It also indirectly makes things more expensive by presenting a barrier to entry for new providers, reducing competition and further hurting consumers.
Surely that’s the end, right? Nope. The government is sucking capital out of the private sector to put into public sector projects. That means the private sector has less capital for investment. People are incentivized not to save due to inflation, which encourages high-time-preference consumerism. This means we get less investment by companies for the future, which defeats the natural tendency of industry to become more efficient over time and pass on the savings to the consumer (via technology-driven deflation, for instance).
I knew all of that two weeks ago, and it hasn’t changed.
There’s one final piece to this puzzle. Many of us suspected it. With the news coming out about USAID and the programs it laundered money to, we’re starting to get even more concrete proof. The government steals our money, inflates it, takes all of that productive capacity we sweated and toiled for… and gives it to people who are actively trying to hurt us, yet again furthering the cost of government.
The cost of government isn’t one number. It’s not quantifiable. The cost of government is losing out on the world where everything becomes better, safer, cheaper, faster, healthier, and more enjoyable, and replacing it with a decaying, eroding society, where the most morally bankrupt people can fleece the rest of us for their livelihoods.
I’m praying that the exposure and toppling of USAID is a major accomplishment, but just one of many more to come. To quote The Two Towers, I hope it “will be like the falling of small stones that starts an avalanche.”
-
![](/static/nostr-icon-purple-64x64.png)
@ 8947a945:9bfcf626
2025-02-07 04:15:17
## สาเหตุที่ผมลาออกจากที่(ทำงาน) ที่ (เคย) เรียกว่า”บ้าน”
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738755645055-YAKIHONNES3.jpeg)
-----------
สวัสดีเพื่อนๆชาว #siamstr ทุกคนครับ ผมเป็นหมอเวชศาสตร์ฉุกเฉิน (Emergency physician ย่อๆว่า EP)ครับ พวกผมมีชื่ออื่นๆเรียกหลายชื่อมาก เช่นหมอเฉพาะทางแผนกฉุกเฉิน, หมอเฉพาะทาง ER หรือหมอ ER
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738755695928-YAKIHONNES3.jpeg)
ผมทำงานในแผนกฉุกเฉิน (emergency room หรือ ER) คนไข้ที่เข้ามาเจอพวกผมมีอาการวิกฤติอันตราย ใกล้ตาย หรือไม่ก็เป็นโรคกลุ่มความเสี่ยงสูงที่อาการกำลังจะแย่ จำเป็นต้องได้รับการรักษาอย่างแม่นยำ รวดเร็วทันที ทำให้คนไข้ปลอดภัย อาการคงที่ ไมแย่ไปกว่านี้ เพิ่มโอกาสรอดชีวิต ก่อนจะส่งไปพบแพทย์เฉพาะทางสาขาอื่นๆ
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738756051752-YAKIHONNES3.jpg)
ทักษะเฉพาะทางของพวกผมที่ถูกฝึกอบรมมา ใช้เวลาเต็มที่ไม่เกิน **10- 15 นาที**ได้คำตอบแล้วครับว่า
- คนไข้ที่อยู่กับผมป่วยด้วยโรคอะไร (Provisional diagnosis)
- มีภาวะอันตรายถึงแก่ชีวิตประเภทไหน (immediate life threatening conditions)
- กู้ชีพรักษา (resuscitation and stabilization) แล้วผลการักษาดีมั้ย อาการคนไข้ดีขึ้นมั้ย
### โรคฉุกเฉินที่ผมเจอเป็นปกติเลยได้แก่
- กลุ่มโรคติดเชื้อในกระแสเลือด (Sepsis)
- โรคหัวใจ ไม่ว่าจะเป็นหัวใจวายน้ำท่วมปอด (congestive heart failure) , โรคกล้ามเนื้อหัวใจขาดเลือดเฉียบพลัน (Acute myocardial infarction หรือ MI)
- โรคหลอดเลือดในสมอง (cerebrovascular disease , CVD หรือที่เรารู้จักกันว่า stroke)
- ผู้ป่วยได้รับสารพิษ (intoxication)
- โรคอื่นๆ ที่ไม่สามารถนั่งรอหมอได้
ด้วยลักษณะเฉพาะของคนไข้ การรักษาจะต้องมี EP และต้องมีเครื่องมือพิเศษ ทำให้ ER เป็น special unit ของรพ.ที่มีความพร้อมตลอด 24 ชั่วโมง
นอกจากหมอ EP เครื่องมือ และทีมพยาบาลแล้ว แนวทางปฏิบัติ (Clinical practice guideline หรือ CPG) ระหว่างแผนกฉุกเฉินกับหมอเฉพาะทางสาขาอื่นๆต้องชัดเจน ไม่เช่นนั้นการประสานงานจะมีปัญหา
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738756347633-YAKIHONNES3.jpg)
ทั้งหมดที่ผมกล่าวมานี้คือ ***"สถานที่ทำงานในอุดมคติที่ EP อยากได้"*** กระบวนการรักษาและส่งต่อคนไข้ราบรื่น ทุกคนคุยภาษาเดียวกัน เข้าใจกัน และแน่นอนครับรพ.แห่งนี้มีทุกอย่างครบ ทุกอย่างถูกทำเอาไว้เป็นแนวทางปฏิบัติชัดเจน มีการซ้อมจำลองเหตุการณ์สถานการณ์ฉุกเฉินต่างๆเป็นประจำ รวมถึงมีการติดตามประเมินผลลัพธ์เป็น KPI ชัดเจน เรียกได้ว่าเข้ามาทำงานที่นี่วันแรกแล้ว “มันใช่เลย”
### บรรยากาศการทำงานระหว่างแผนกก็ดีมาก
> **น้อยมากที่ทีมแพทย์และพยาบาล ER จะเป็นมิตรกับต่างแผนก**
อธิบายเพิ่มเติมหน่อยนะครับ ด้วยเนื้องานที่ต้อง **"เร็ว แม่น จบไวและเด็ดขาด"**
ทำให้บุคคลิกพวกผมมันดูแข็งๆ ดุ พูดเสียงดังและห้วนๆ ดูน่ากลัวสำหรับแผนกอื่น
แต่ที่รพ.แห่งนี้ มีแผนกอื่นมีความเกรงใจ ER เป็นปกติ แต่เจ้าหน้าที่ทั้งรพ.รู้จักกันหมด แยกแยะเรื่องส่วนตัวและเรื่องงานออกจากกันได้ดี ทำให้ช่องว่างความกลัวคนใน ER มันแคบเมื่อเทียบกับหลายๆรพ.ที่ผมเคยเจอมาครับ สำหรับผม ถือว่าดี
เมื่อเวลาผ่านไป ยิ่งรักรพ.แห่งนี้มากขึ้นทุกๆวัน มันเป็นเหมือนบ้าน บรรยากาศสบายเป็นกันเอง ผมได้รับโอกาสความก้าวหน้าทางอาชีพ ได้ขึ้นเป็นกึ่งๆผู้บริหาร รับตำแหน่งหัวหน้าดูแล 3 หน่วยงาน ทีมพยาบาลเลขาที่ช่วยงานผมก็มี data หลังบ้านที่ดีมาก เมื่อรับตำแหน่งแทบจะไม่ต้องริเริ่มอะไรใหม่ แค่ดูแลกำกับติดตาม guideline ที่มีอยู่แล้ว ให้รอบคอบมากยิ่งขึ้น มีปัญหาก็มองหาต้นตอของปัญหา (root cause analysis) แล้วแก้ที่ต้นเหตุ
ผมตั้งใจว่าจะทำงานที่นี่เป็นที่สุดท้ายไปจนแก่ ร่างกายทำงานไม่ไหวถึงจะเลิกอาชีพหมอครับ
-----------
### จุดเปลี่ยนเข้าสู่ยุคตกต่ำ เมื่อธุรกิจส่งต่อทายาทรุ่นที่สอง
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738757173195-YAKIHONNES3.jpg)
ปีที่ผมเข้ามาทำงานปีแรกเป็นช่วงที่เจ้าของรพ.กำลังป่วยหนัก และเสียชีวิตต่อมาไม่นานหลังจากนั้น ผมไม่เคยสัมผัสไม่เคยพูดคุยกับเขา แต่จากคำบอกเล่าของพนักงานที่อยู่มานาน ผมสรุปคุณลักษณะของเจ้าของรพ.ไว้ดังนี้ครับ
- เอาใจใส่รายละเอียด ถึงขั้นไม่ปล่อยผ่านเรื่องเล็กน้อย
- การบัญชีละเอียดยิบ ทุกเม็ดเงินที่เคลื่อนไหว โดยเฉพาะรายจ่ายต้องรู้ที่มาที่ไป รายจ่ายที่ไม่เข้าท่าแต่มีการอนุมัติรายการโดยพละการ โดนด่ายับถึงตาย
- ไม่ลงทุนกับอะไรที่เกินความจำเป็น
- ปกป้องผลประโยชน์ตัวเอง (ก็เขาเป็นเจ้าของ)
- ทุกเช้าเดินดูทุกซอกทุกมุมในรพ.ด้วยตัวเอง ถ้าเห็นอะไรไม่เรียบร้อย จะเข้าไปจัดการทันทีและสอนพนักงานหน้างาน เหมือนสอนลูกตัวเอง
- ใช้เวลาไม่ถึง 5 ปีชำระหนี้จากการระดมทุนในตลาดหลักทรัพย์ ทำให้รพ.ปลอดหนี้
- มีเมตตากับเจ้าหน้าที่ทุกระดับ รวมถึงพนักงานคนขับยานยนต์และเวรเปล
- เป็นคนไหว้พระสวดมนต์ สร้างวัดสร้างสถานปฏิบัติธรรมถวายวัด
และคุณงามความดีอื่นๆอีกมากมายที่ผมรู้ไม่หมด แต่เมื่อถึงช่วงเปลี่ยนผ่านเป็นทายาทรุ่นที่ 2 ขึ้นมารับช่วงต่อ
ทายาทรุ่นที่สองมีจุดยืนชัดเจนว่า **“ไม่เอา”**
คือไม่เอาตัวลงมาบริหารธุรกิจรพ.ของพ่อแม่ รับเฉพาะเงินปันผลจากกำไรของรพ.เท่านั้น ตัวเองมีธุรกิจส่วนตัวที่ต้องดูแล ให้ผู้บริหารชุดที่ทำงานมาตั้งแต่เจ้าของชุดแรกดูแลบริหารงานต่อ
> ### เรื่องนี้ผมมองว่าไม่ผิด มันเป็นสิทธิ์ของเขาครับ
แต่ผลที่ตามมาก็คือวัฒนธรรมองค์กรเปลี่ยน ผมไม่ทราบนอกในหรอกครับว่าในบรรดาผู้บริหารเขาแบ่งพรรคแบ่งพวกกันยังไง แต่ภาพที่ทุกคนเห็นก็คืออำนาจสูงสุดตกอยู่ในมือคนไม่กี่คนที่มีสิทธิ์ขาดในการชี้นำองค์กรได้ มันรุนแรงขนาดที่ว่าผู้บริหารบางคนที่ไม่ใช่ผู้ถือหุ้นใหญ่ ยังมีอำนาจเหนือผู้บริหารบางคนที่เป็น 1 ใน 10 ผู้ถือหุ้นใหญ่ด้วยซ้ำ
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738757714855-YAKIHONNES3.jpg)
เมื่อเวลาผ่านไป การลุถึงอำนาจในการกุมบังเหียนองค์กรแบบเบ็ดเสร็จมันค่อยๆสร้างปัญหาให้กับคนทำงานทีละเล็กทีละน้อย ผมใช้คำเปรียบเทียบที่ล้อไปกับเศรษฐกิจไทย “ต้มกบ” ก็แล้วกันนะครับ
<รูปต้มกบ>
-----------
### แก้วที่เริ่มร้าว
อย่างที่ผมบอกว่าผมเป็นหัวหน้า 3 หน่วยงาน ทุกๆ 1 - 2 เดือนหน่วยงานที่ผมดูแลจะมีการประชุมรายงานผลลัพธ์ KPI ที่เกี่ยวข้องกับการดูแลรักษาผู้ป่วย ผมกล้าบอกได้เลยว่าหมอในรพ.ผมเก่งมาก ให้การรักษาได้ตามมาตรฐานตามทักษะความเชี่ยวชาญของหมอแต่ละท่านได้เป็นอย่างดี สะท้อนออกมาใน KPI ที่ทำได้เกินเป้าหมายที่ 70 - 80% ตลอด KPI บางตัวเข้าเป้า 100% ต่อเนื่องโดยที่ไม่เสียคุณภาพเลยก็มี
แต่แล้ว เมื่อผู้บริหารเห็นตัวเลขที่มันดีมากต่อเนื่องกันนานๆ ผู้บริหารก็โยนโจทย์ลงมาให้แต่ละทีมว่า
> #### จะไม่มีการยอมให้ KPI เข้าเป้า 100% นานเกินไป เพราะมันหมายถึงการไม่คิดจะพัฒนาตัวเอง
ถ้าเป็นศัพท์สมัยนี้คือโดนด่าว่า “ไม่มี growth mindset” แต่ละทีมจะต้องไปออกแบบ KPI ใหม่ หรือไม่ก็ขยับเป้า KPI ให้ทำสำเร็จยากขึ้นเพื่อเป็นการท้าทายตนเอง
… ****คือ เขามองว่า ตัวเองคะแนนต้องไม่เต็มร้อย ต้องมีการรายงาน KPI ที่มี progress เป็นเชิงบวก ถึงจะดีในสายตาเขาครับ**** …
**ผมขอยกตัวอย่างให้เห็นเป็นรูปธรรมจับต้องได้**
เหตุการณ์การกู้ฟื้นคืีนชีพคนไข้ในรพ.(cardiopulmonary resuscitation หรือการทำ CPR)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738758187782-YAKIHONNES3.jpg)
ทีมผมออกแบบ KPI ว่า ถ้าหากมีคนไข้หัวใจหยุดเต้นในรพ.ไม่ว่าจะเป็นพื้นที่ไหน ทีม CPR จะต้องไปถึงตัวคนไข้ภายในเวลา 4 นาที
ตัวเลข 4 นาทีนี้เกิดจากการรวบรวมข้อมูลมา 5 ปี แล้วหาค่าเฉลี่ยว่าตัวเลขที่ท้าทายทีมกำลังพอดีอยู่ตรงไหน ที่ผ่านมาทำได้ 100% มาตลอด และกำลังจะครบ 12 เดือนที่ทางผู้บริหารโยนโจทย์พัฒนา KPI ลงมา
ล่าสุดก็มีคำสั่งให้ปรับ KPI ที่ท้าทายขึ้นครับ
… หมอ … ทำได้ 4 นาทีมาตลอด ผมขอ 3 นาทีได้มั้ย …
ผมอธิบายเหตุผลว่า รพ.ไม่ใช่เล็กๆนะครับ แล้วบางทีคนไข้เกิดเหตุที่ชั้นบนสุดของรพ. ต่อให้ทีมรปภ.ล็อคลิฟท์ไว้รอแล้ว แต่นั่นมันไม่ได้หมายความว่าลิฟท์จะไม่แวะจอดชั้นอื่นๆ แล้วต่อให้ทีมพวกผมไปถึงตัวคนไข้แล้ว มันก็ต้องเตรียมเครื่องมือ, พยาบาลแทงเส้นเพื่อให้ยา, หมอเตรียมใส่ท่อช่วยหายใจ ฯลฯอีกมากมาย ผมว่าถ้าเราขยับ KPI จาก 4 นาทีลงมา 3 นาที มันจะวัดผลอะไรไม่ได้นะครับ
… หมอ ทำไปเถอะ ผมขอ 3 นาทีได้มั้ย…
คือความสมเหตุสมผลมันเริ่มไม่มีแล้วครับ ทีม CPR ของผมไม่ใช่ทีมเดียวที่โดนขยับเป้า KPI ประหลาดๆแบบนี้ หมอทุกแผนกโดนกันอย่างทั่วถึงครับ
### การทำงานมันมีระบบ มี guideline มี protocol ของมันอยู่ บางครั้งผู้บริหารก็เอาตัวลงมาทำให้ระบบรวน
คนไข้ที่เข้า ER มี standard อยู่ครับ ว่าเคสแบบไหนต้องเจอหมอทันที เคสแบบไหนมันพอรอได้ 5 นาที - 10 นาที อะไรก็ว่าไป ผมประสบกับตัวเองครั้งหนึ่งผมให้การรักษาเคสคนไข้ที่เป็น VIP ของผู้บริหารท่านหนึ่ง ที่อาการไม่ได้แย่ ไม่ได้วิกฤติสามารถรอเจอหมอได้ภายใน 15 นาที
- 11.32 คนไข้มาลงทะเบียน
- 11.34 เข้ามาถึง ER
- 11.36 พยาบาลเข้าไปประเมินคนไข้ วัดความดัน ฯลฯ และรายงานผม
ผมสั่งการักษาทันที 11.36 และบอกว่าเดี๋ยวอีก 5 นาทีผมมาประเมินนะ เคสนี้ผมมีแผนของผมอยู่แล้วว่าจะรอดูอะไรที่ 5 นาที
- 11.41 ผมเดินออกมาเห็นคนไข้อาการดีขึ้นแล้ว ผมเลยขอเวลาไปดูประวัติเดิมพวกโรคประจำตัวของคนไข้ ได้ข้อมูลครบ 11.42 (แต่ผู้บริหารดันอยู่แถวๆนั้นพอดี)
ผู้บริหารเจ้าของเคสนี้เป็นหมอ เดินมาเล่าประวัติเพิ่มเติมให้ฟัง ผมก็คุยกับหมอเขา เป็นหมอคุยกับหมอเรื่องอาการคนไข้คุยกันไม่นาน ทุกคน happy ส่งคนไข้ admit อย่างปลอดภัย
วันรุ่งขึ้นกลับโดนผอ.รพ.เรียกพบให้ไปรายงานว่าทำไมเคสนี้ถึงปล่อยให้คนไข้รอนาน ไม่มาดูคนไข้ทันที
…ผมชี้แจง timeline ทั้งหมดให้ฟัง 11.32 11.34 11.36 11.41 ว่าเกิดอะไรขึ้น
ผอ.บอกว่าอ้าว แค่ 5 นาทีเหรอ ก็ไม่ได้นานนี่
ผมก็บอกว่าไม่นานไงครับ ผมสั่งยาตั้งแต่ time zero ที่น้องพยาบาลรายงานผมแล้วด้วยซ้ำ
คุยกันไปคุยกันมาสรุปใจความได้ว่า
“มันไม่ถูกใจหมอ เจ้าของคนไข้ VIP และ ผมก็ผิดอยู่ดีที่ปล่อยให้คนไข้รอ 5 นาที”
แล้วมันจะมี guideline หรือ protocol การรักษาไว้ทำไมครับ ในเมื่อคนระดับผู้บริหารเกิดจะคิดเอาแต่ใจตนเองแหกกฏและแนวทางปฏิบัติของรพ.แล้วด่าว่าหมอทำไม่ถูก แถมเอาตัวลงมาวุ่นวายกระบวนการรักษาด้วย
### Top-down absolute power
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738759769958-YAKIHONNES3.jpg)
> ### "รับฟังปัญหา มีความเห็นต่างเสนอได้ เสนอได้แต่ไม่ฟัง จะเอาแบบเดิม"
เมื่อไหร่ก็ตามที่มีการรายงานปัญหา ผมเชื่อว่ามันมีการรายงานแบบไม่เป็นความจริงซ่อนอยู่มาก ทำให้ผู้บริหารได้รับข้อมูลผิด ไม่ตรงกับความเป็นจริง
ถ้าเป็นผูับริหารที่มีความเฉลียวใจอยู่บ้าง จะต้องทำการพิสูจน์ความจริง (fact check) ก่อนจะฟันธงว่าปัญหาที่แท้จริงมันคืออะไร แล้วออกมาตรการป้องกันหรือแก้ไข อะไรก็ว่าไป แต่สิ่งที่พวกผมเห็นก็คือผู้บริหารไม่เอาตัวลงมา fact check เลยครับ แต่สั่งคำสั่งลงมาเลยโดยที่ไม่รู้ตื้นลึกของปัญหานั้นๆ
ผมเป็นหนึ่งในตัวแทนหมอเข้าร่วมประชุมกับผู้บริหารเดือนละครั้ง พวกผมการวิเคราะห์เหตุการณ์ให้ฟังแบบละเอียด รวมถึงเสนอวิธีการแก้ปัญหาที่ยั่งยืนให้ตัวแทนผู้บริหารรับไว้พิจารณาทุกครั้งที่มีการประชุมกัน แต่ปัญหาคือคนที่ absolute power ไม่เคยมาพบตัวแทนแพทย์เลยซักครั้ง
คนที่ absolute power ไม่เคยลงมาฟังปัญหาจากแพทย์เลย ฟังแต่หน่วยข่าวกรอง(ที่ไม่รู้กรองอะไรเข้าไปบ้าง) แล้วยิงคำสั่งลงมาเลย มีคำพูดสวยหรูว่าถ้าหากเห็นต่างสามารถพูดคุยกันได้ แต่ก็จะยืนยันคำสั่งแบบเดิมอยู่ดี ผลกระทบเกิดมากแค่ไหน ค่อยส่งคำสั่งมาแก้มันเพิ่มทีหลัง
สำหรับหมอที่ทำงานรพ.เอกชน จะมีสัญญาในการทำงานร่วมกับรพ.ในสัญญาระบุชัดเจนว่า หมอ”ไม่ใช่ลูกจ้าง” แต่เป็นหุ้นส่วนทางธุรกิจ (partner) ที่มาขอใช้พื้นที่ในรพ.ในการเปิดคลินิครักษาคนไข้ เงินที่เรียกเก็บจากคนไข้ จะ profit sharing กัน 70/30 หรือ 80/20 ก็แล้วแต่เงื่อนไขของแต่ละรพ. แน่นอนครับ มันมีความไม่ตรงไปตรงมาในการจ่ายเงินผมอยู่ ความเป็น partner นี้เอง ทำให้หมดสิทธิ์ฟ้องร้องรพ.กรณีจ่ายค่าตอบแทนไม่ตรงตามข้อกำหนด สั้นๆก็คือผมได้รับรายได้ต่ำกว่าราคาตลาดที่หมอ EP ควรจะได้ 20% ครับ
ความเป็น partner นั่นหมายความว่าพวกผมจะไม่ได้รับสวัสดิการอะไรมากนัก เวลาป่วยไม่สบายจะมีวงเงินในการรักษาอยู่จำนวนหนึ่ง ถ้าเกินก็ต้องจ่ายเอง อาจจะมีส่วนลดนิดๆหน่อยๆ ไม่มีสิทธิ์ประกันสังคมเพราะไม่ใช่ลูกจ้าง มีสิทธิ์พื้นฐานคือบัตรทอง 30 บาท หมอเอกชนหลายๆคนพึ่งสวัสดิการข้าราชการจากคู่สมรส หรือไม่ก็ต้องซื้อประกันสุขภาพหลายๆฉบับ พูดง่ายๆว่า ต้องเก็บเงินดูแลรักษาตัวเองเมื่อป่วยไม่ต่างจากอาชีพอื่น
ความเป็น partner อีกข้อนึงคือพวกผมไม่สามารถเรียกร้องอะไรได้ถ้าเกิดรพ.ไล่ออก เพราะพวกผมไม่ใช่ลูกจ้าง ไม่มีกฏหมายแรงงานใดๆรองรับ ในขณะที่ลูกจ้างที่มีประกันสังคม หากสูญเสียงาน อาจจะมีเงินเยียวยากี่เดือนอะไรก็ว่าไป ตลอดอาชีพผม ผมเคยเห็นหมอโดนรพ.กลั่นแกล้ง บีบให้ออกแบบไม่เป็นธรรมมาหลายคนแล้ว หมอที่ผมสนิทหรือบางคนเป็นอาจารย์หมอที่สอนผมมาด้วยซ้ำ โดนไล่ออกด้วยปัญหาส่วนตัวกับผู้บริหารก็มี
แต่ด้วยนโยบายคำสั่ง top down absolute power ที่เกิดขึ้นนี้ ผมมองว่ารพ.ปฏิบัติกับพวกผมไม่ใช่ในฐานะ partner อีกต่อไป แต่กลายเป็นนายจ้าง-ลูกจ้าง(employer-employee) หรืออาจจะเป็นอะไรที่ต่ำกว่า employee ก็ได้นะครับ
### ทำไมผมถึงคิดเช่นนั้น??
**เพราะนโยบาย top down absolute power ครับ**
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738764673039-YAKIHONNES3.jpeg)
ถ้าคุณมี partner ทางธุรกิจ ทุกเสียงของ partner คุณน่ะ โคตรมีความสำคัญ เพราะเขาคือคนที่พร้อมจะจมหัวจมท้ายกับคุณได้ ถ้าคุณแฟร์และจริงใจพอนะ คุณทำธุรกิจคุณไม่ได้รู้ทุกเรื่อง ไม่มีทางที่คุณจะเก่งได้ทุกเรื่อง และการที่ได้ partner ที่มาปิดจุดอ่อนของคุณได้ หรือชี้จุดบอดของคุณได้ เตือนสติหรือด่าคุณให้คุณเก่งขึ้นหรือดีขึ้นได้น่ะ เป็นเรื่องโคตรโชคดีเลยนะผมจะบอกให้
แต่นี่อะไร top down ไม่ฟังอะไรใคร เอาสิ่งที่ตัวเองคิดเป็นที่สุด ปรึกษาขอความเห็นพวกผมเป็นบางครั้งพอเป็นพิธี แต่ก็เดินหน้าทำตามแผนในหัวพวกเขาอยู่ดี ผมกับตัวแทนหมอคนอื่นๆก็แซวกันว่า “แล้วจะเรียกพวกเรามาเพื่ออะไร”
งานทำบุญปีใหม่ประจำปี ถ้าคุณเป็นเจ้าของธุรกิจแล้วมี partner คนสำคัญ คุณจะเชิญเขามามั้ยครับ คุณจะเตรียมสถานที่หรือเตรียมอะไรเล็กๆน้อยๆเพื่อเป็นคำขอบคุณมั้ยครับ หรืออย่างน้อยๆเลี้ยงอาหารเขาซักมื้อเป็นการตอบแทนมั้ยครับ แน่นอนครับ ไม่มีอะไรพวกนี้ในงานทำบุญปีใหม่รพ.เลย ตั้งแต่เจ้าของคนเก่าเสียไป บัตรเชิญเข้าร่วมงานทำบุญปีใหม่และรับประทานอาหารพร้อมหน้ากัน (ขอหยาบหน่อยนะครับ) แม่งเชิญทุกคนยกเว้นหมอเว้ย!!! เจ้าหน้าที่เวรเปล พยาบาล นักเทคนิคมีข้าวเที่ยงกินกันมีไอติมมีขนมให้ หมอไม่ได้รับเชิญแต่น้องๆพยาบาลโทรตามหมอแผนกตัวเองขึ้นไปร่วมงาน เมื่อไปถึงของกินแม่งหมดใส่หน้าหมอเลย จะเรียกหมอขึ้นไปทำไมอะไรเหรอ
ผมไม่ได้เห็นแก่กินนะ เพราะผมห่อข้าวจากบ้านมากินเองอยู่แล้ว ต่อให้มีใครมาเชิญผมไปกิน ผมก็ไม่ไปหรอก ผมสละสิทธิ์ให้คนอื่น แต่มันทำให้ผมไม่แน่ใจไง ว่ารพ.มองพวกผมเป็นอะไรที่ต่ำกว่าลูกจ้างหรือเปล่า
อาชีพหมอในรพ.เอกชนในสายตาคนภายนอกดูดีครับ แต่ในความเป็นจริงแล้วหมอทุกคนคือ”ตัวหมากการตลาด” อย่างนึงของรพ.ไม่ได้มีฐานะที่สูงส่งอะไรขนาดนั้น ที่รพ.ทำดีกับหมอ เพราะมันมี profit sharing กันครับ แต่มันก็ไม่ได้ยับเยินแบบนี้ทุกรพ.หรอกครับ รพ.ที่ดีๆที่ดูแลหมอเป็นอย่างดี ให้ความสำคัญกับความต้องการของหมอทุกอย่างมันก็มี … แค่… ผมยังหาไม่เจอเท่านั้นเอง
### รพ.ส่งหมอไปตาย
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738765874230-YAKIHONNES3.jpg)
อันนี้แทบจะเป็นจุดพีคที่สุดของเรื่องเลยครับ ผมอธิบายให้เข้าใจก่อนว่าโดยปกติถ้าคนไข้ได้รับการรักษาแล้วเกิดเหตุอะไรก็ตามแต่แล้วมีข้อร้องเรียนเช่นต้องเสียเงินเยอะ , เจอหมอหลายแผนกทำให้เสียเวลา ไม่พอใจการรักษา หรืออะไรก็แล้วแต่ ในรพ.เอกชนจะมีระบบรับเรื่องการร้องเรียนแล้วส่งรายงานขึ้นไปตามลำดับ ผู้บริหารจะมาเข้ารับฟังปัญหาเหล่านี้ในตอนเช้า (morning brief) ผู้บริหารจะดูว่าข้อร้องเรียนเหล่านี้จะต้องดำเนินการแก้ไขอย่างไร แล้วสั่งการให้ผู้ที่เกี่ยวข้องไปทำ แล้วรอฟังรายงานในวันถัดไป
“หมอ” ถือเป็นบุคคลากรด่านสุดท้ายท้ายที่ต้องออกไปพบคนไข้กรณีคนไข้ร้องเรียน โดยปกติรพ.ปกป้องหมอจนถึงที่สุด มีทีมที่เชี่ยวชาญในการรับฟังปัญหา มีทีมกฏหมายที่เกี่ยวข้อง เป็นคนกลางคอยไกล่เกลี่ยให้ แต่ถ้าเป็นกรณีฟ้องร้องกันรุนแรง อันนั้นถึงจะมีการเชิญหมอมาพบคนไข้ครับ น้อยเคสมากที่ดำเนินไปถึงจุดที่หมอกับคนไข้ต้องมาเจอหน้ากัน
กลับกันที่รพ.แห่งนี้ส่งผมไปตายมันตั้งแต่แรก …
มีคนไข้หนึ่งรายเดินมาโต๊ะลงทะเบียนบอกว่า ต้องการจะมาปรึกษาแพทย์เฉพาะทางด้วยเรื่องอาการปวดท้องเป็นๆหายๆมาหลายเดือน เคยตรวจสุขภาพแล้วสงสัยนิ่วในถุงน้ำดี
แต่ทางรพ.มีนโยบายว่าถ้าหากคนไข้มีอาการแน่นท้องปวดท้องบริเวณเหนือสะดือขึ้นมาจนถึงหน้าอก จะต้องเข้า ER ก่อนเพื่อทำการตรวจคลื่นไฟฟ้าหัวใจ (EKG) และแปลผลโดยหมอ EP ก่อนว่าใช้โรคหัวใจหรือไม่ก่อนที่จะไปพบแพทย์เฉพาะทางสาขาอื่น คนไข้แย้งโต๊ะลงทะเบียนว่าที่ตรวจสุขภาพแล้วสงสัยนิ่วในถุงน้ำดีก็คือที่รพ.แห่งนี้แหละ เปิดประวัติดูได้เลย แต่เจ้าหน้าที่คัดกรองแจ้งว่ามันเปิดดูประวัติไม่ได้ (จริงๆมันเปิดดูได้) จำเป็นต้องทำตามนโยบายให้เข้า ER ก่อน
อธิบายเพิ่มเติมนะครับ สิ่งที่รพ.ทำ เขาเรียกว่า chest pain pathway คือคนไข้ที่มาด้วยอาการเจ็บหน้าอก มีโอาสเสี่ยงที่จะเป็นโรคหัวใจ แต่คนไข้บางคน ไม่ได้มาด้วยอาการแน่นหน้าอก แต่ตอนจบกลายเป็นโรคหัวใจ ไอ้อาการปวดท้องเหนือสะดือมันก็เป็นหนึ่งในสัญญาณเตือนครับ
คนไข้ก็เข้า ER มาเจอผม ผมดูแล้วมันไม่น่าใช่โรคหัวใจ แต่ผมต้องทำตาม guideline ของรพ.คือตรวจ EKG และตรวจเลือดดูค่าหัวใจว่าสูงผิดปกติมั้ย ผมปรากฏว่าปกติ ผมเลยส่งปรึกษาหมอแผนกศัลยกรรมเรื่องสงสัยนิ่วในถุงน้ำดี ทางหมอศัลยกรรมมาส่งตรวจ ultrasound ปรากฏว่าไม่เจอนิ่วในถุงน้ำดี คนไข้ถูกส่งไปพบแผนกทางเดินอาหารสรุปว่าเป็นลำไส้อักเสบ ทั้งหมดนี้คือกระบวนการตรวจค้นหาโรคตามปกติที่หมอเขาทำกันครับ
คนไข้ร้องเรียนรพ.ในวันรุ่งขึ้นดังนี้
ไม่พอใจจุดลงทะเบียนว่าทำไมไม่ส่งเขาไปที่คลินิคทางเดินอาหารตั้งแต่แรก ทำไมต้องให้เข้า ER
เจอค่ารักษาเข้าไปหลักหมื่นต้องการคำชี้แจงจากรพ.
เรื่องนี้ถูกรายงานขึ้น morning brief ครับ
แต่ก่อนที่ผมจะเล่าต่อผมขอให้เพื่อนๆลองคิดหน่อยครับ
ว่าถ้าเพื่อนๆเป็นผู้บริหารที่รับประเด็นร้องเรียนนี้จะ action อย่างไร
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738765691333-YAKIHONNES3.jpeg)
### ผู้บริหารสั่งให้หมอคนแรกที่ตรวจคนไข้โทรไปอธิบายให้คนไข้เข้าใจครับ
หมอคนแรกคือใครล่ะ **ผมไงครับ**
วันนั้นเป็นวันหยุดของผม ผมกำลังทำบุญที่วัดกับครอบครัวอยู่ รับโทรศัพท์จากรพ.ว่า ทางผู้บริหารสั่งให้ผมโทรไปเคลียร์กับคนไข้รายนี้ เพราะเกิดประเด็นร้องเรียน
ผมโทรไปตามคำสั่ง คนไข้ตกใจมากว่าทำไมหมอโทรหาเขาเอง คนไข้ไม่ได้ติดใจอะไรเรื่องของหมอเลย แต่ติดใจแผนกลงทะเบียนว่าทำไมทำกับเขาอย่างนั้น ทำให้เขาต้องเสียเวลาและเสียตังค์เยอะ
### เพื่อนๆคิดยังไงกันครับ
เวลาที่คนไข้ร้องเรียน ผู้บริหารที่ดีจะต้อง fact check ก่อนรึเปล่า แล้วเจาะความต้องการของคนไข้ให้ได้มั้ยว่าเขาร้องเรียนเรื่องอะไร แล้วสั่งคนที่เกี่ยวข้องลงไปดูแล ถ้ามันเกิดเคสฟ้องร้องรุนแรงอันนั้นแหละ จะถึงตัวหมอที่ดูแลรักษา หมอต้องมาพบคนไข้
แต่นี่อะไร … ส่งหมอไปตายตั้งแต่แรก … มันทำให้ผมคิดนะครับขนาดเรื่องหยุมหยิมแค่นี้ยังส่งหมอไปตาย ถ้าหมอถูกฟ้องขึ้นมา รพ.ไม่เอาหมอใส่กุญแจมือยื่นให้เรือนจำแล้วตัวเองลอยตัวไปเลยเรอะ
เหตุการณ์นี้ผมทำตามนโยบายของทางรพ. แต่พอคนไข้ร้องเรียน ไม่ปกป้องหมอ แต่ส่งหมอไปตาย ครับ
เหตุการณ์แบบนี้เกิดกับผม 4 ครั้ง และหมอคนอื่นๆก็โดนอะไรแบบนี้มาเหมือนกันครับ
-----------
### เมื่อบ้าน ไม่อบอุ่นอีกต่อไป
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738766160069-YAKIHONNES3.jpeg)
> #### ผมยอมรับกับเพื่อนๆทุกคนนะครับ ว่ามันยากมากที่ผมจะทำใจยอมรับคำคำนี้ได้
มีช่วงนึง ผมโดนผอ.เรียกคุยบ่อยมาก ด้วยเรื่องไม่เป็นเรื่องแบบนี้ จนผมเครียดมาก จนนอนไม่หลับไป 2 - 3 สัปดาห์ เข้านอนพร้อมครอบครัว สวดมนต์ก่อนนอน ปกติเวลาหลับตานอนผมจะสวดมนต์ในใจไปอีก 2 - 3 จบ แล้วมันจะ auto shutdown หลับดีถึงเช้าครับ ที่เพื่อนๆเห็นผมโพส #gym calisthenic #workout นั่นแหละ คือตื่นไหว มาออกกำลังกาย แต่มันมีบางช่วงที่มันนอนไม่พอ บางทีเที่ยงคืน ตีหนึ่ง ตีสอง นอนๆอยู่ตื่นเองแล้วไม่หลับอีกเลย สภาพแบบนี้ถ้าไปออกกำลังกายตอนเช้ามีหวังทำร้ายร่างกายมากกว่า
หลังจากนั้นไม่นานพอผมเริ่มปล่อยวางเรื่องนี้ได้ ก็มีข่าวร้ายมากระแทกพวกผมแผนก ER อีก เป็นการตัดสินใจจากผู้บริหารแบบไม่คิดหน้าไม่คิดหลัง ไม่คิดถึงผลกระทบต่อคุณภาพชีวิตของแพทย์ EP fulltime ที่ไม่ได้มีผมคนเดียว กระเทือนเป็นวงกว้าง รุนแรงขนาดทำลายชีวิตครอบครัวกันเลยครับ … แต่ผมขอไม่เล่านะครับ …
พวกผมถูกผอ.เรียกไปคุย ให้รับทราบถึงนโยบายเกี่ยวกับการปรับเปลี่ยนรูปแบบการทำงานที่จะส่งผลกระทบต่อวงจรการใช้ชีวิตและชีวิตครอบครัว ครั้งนั้นผมไม่ยอมรับครับ ผมมีข้อมูลทุกอย่างของแผนก ER ในมือ คำสั่งที่ออกมาไม่ได้แก้ปัญหาที่แท้จริงแต่อย่างใด แต่เป็นการแก้ผ้าเอาหน้ารอดแบบสุดๆ ผมแย้งคำสั่งนี้จนผอ.และเลขาผอ.สู้หน้าผมไม่ได้ เพราะผอ.ไม่มีข้อมูลเชิงลึกแบบที่ผมมี และผอ.เองก็รับคำสั่งจาก board บริหารมาอีกทีนึง แกก็ทำได้แค่อึกๆอักๆเท่านั้น
แต่จำได้มั้ยครับ top down absolute power ต่อให้ผมมีข้อมูลข้อเท็จจริงรวมถึงเสนอวิธีแก้ไขที่ยั่งยืนและตรงจุด เขาก็ไม่ฟัง เพราะเขามีภาพในหัวของเขาอยู่แล้วว่าเขาต้องการอะไร ต่อให้เชิญตัวแทนแพทย์มาคุยก็ไม่ฟังอยู่ดี ผมไม่ได้โลกสวยคิดว่าจะเปลี่ยนความคิดของ board บริหารได้
### ผมต้องไปแล้วจากที่นี่ ไม่งั้นเจ็บตัวแน่ๆ
ช่วงเวลานี้แหละครับเสียงเรียกปลุกจากภวังค์ (wake up call) มันชัดเจนแล้วว่า ผมต้องหาเรือสำรอง เพราะเรือลำนี้มันกำลังค่อยจมลงช้าๆ แต่คนบนเรือส่วนใหญ่ยังไม่รู้ตัว “ต้มกบ” แบบที่ผมบอกตอนแรกครับ
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738766271232-YAKIHONNES3.jpeg)
ตอนแรกผมก็ยังไม่แน่ใจ ว่าที่ผมจะไป มันเป็นเพราะเรือลำนี้มันกำลังจมลงแบบที่ผมบอก หรือผมกำลังจะหนีปัญหากันแน่ ผมทบทวนกับตัวเอง คุยกับภรรยา อ่านใจตัวเองแบบใจเป็นกลาง ได้คำตอบชัดเจนครับว่า มันเป็นเวลาวละเรือแล้วจริงๆก่อนที่จะเจ็บตัวไปมากกว่านี้
“ถ้าไปที่ใหม่ ต้องดีกว่าที่เดิม ไปเพื่อไปฝึกพัฒนาตัวเอง ถ้าเป็นแบบนั้นไปได้ แต่ถ้าไปเพื่อหนีปัญหา อย่าไป” ภรรยาผมบอก
ผมและภรรยาโชคดีที่ครอบครัวเราใกล้พระ ใกล้วัด ก็ไปขอปัญญาความสว่างจากหลวงพี่ หลวงน้า พระอาจารย์ ทุกท่านก็ให้ข้อคิดไปในทำนองเดียวกันกับภรรยาผม ผมเลยดำเนินเรื่องเปลี่ยนที่ทำงานครับ
### การสัมภาษณ์งานที่ใหม่ ก็ไม่ง่าย
เพราะนานๆรพ.แห่งนี้จะเปิดรับหมอใหม่ซักทีโดยเฉพาะรับ EP
ผมยื่น resume สมัครงานไป แต่มันเต็มไปด้วยความแน่นอนครับ เพราะทางรพ.ใหม่แจ้งกลับมาว่า ได้รับ resume แล้ว ถ้าหากได้รับการพิจารณา จะติดต่อนัดเข้ามาสัมภาษณ์ รอเวลาประมาณสัปดาห์กว่าๆครับ ก็มีข้อความว่าผมได้รับการพิจารณาทางรพ.จะเชิญมาสัมภาษณ์
ผมเข้าไปสัมภาษณ์ระหว่างสัมภาษณ์มีสัญญาณที่ดีพอสมควร เมื่อสัมภาษณ์เสร็จ ทางรพ.ขอเวลาแจ้งผล 2 สัปดาห์
เพื่อนๆครับ ผมโคตรทรมานเลยครับช่วงที่รอ ไม่ว่าจะเป็นการรอเรียกมาสัมภาษณ์ และ รอแจ้งผล ผมจะเป็นบ้าครับ ใจสั่นเสียวแว้บที่หัวใจทุกวัน วันละหลายๆรอบ บางครั้งชาหน้าอกซ้ายทั้งแถบ เมื่อตอนที่ผมทราบว่าผมผ่านการสัมภาษณ์ ได้รับการคัดเลือกให้เข้ามาร่วมงาน มันเป็นอะไรที่โล่งมาก
-----------
### สิ่งที่เกิดขึ้นภายในหัวของผมตั้งแต่เกิดเรื่องและข้อคิดที่อยากแบ่งปัน
เตลิด ฟุ้งซ่าน กลัว โกรธไม่พอใจ ปรุงแต่ง ขาดสติไม่รู้สึกตัว ปล่อยวางไม่ได้ วนไปวนมาเกิดขึ้นซ้ำแล้วซ้ำอีก จนมันออกอาการมาทางกายครับ ใจสั่น เสียวแว้บที่หัวใจ หน้าอกซ้ายชาไปทั้งแถบ นอนไม่หลับ ปวดหัวบ่อย พฤติกรรมแยกตัวไม่ยุ่งกับใครไม่คุยกับใครเลย ระแวง แล้วมันก็เป็นจังหวะพอดีที่ทางรพ.มีเรื่องขอความเห็นผมในการปรับปรุงคุณภาพ
แต่ละวัน line ผมเด้งไม่ต่ำกว่า 10 รอบ แต่บังเอิญมันจะมีบางช่วงที่ผมโดนผอ.เชิญขึ้นไปคุยเรื่องปัญหาที่ไม่เป็นเรื่องอย่างที่ผมเล่าไปตอนต้นปนมาด้วยครับ คือทุกครั้งที่ line เด้ง ประสาทจะแดกทุกครั้งจนหลอนครับ “กูจะโดนอะไรอีกเนี่ย”
มันหนักขนาดบางครั้งตัวผมช็อตแล้วยืนเอ๋อกินไปเลย กำลังทำงานบ้านกำลังล้างจ้างอยู่มือหยุดไปดื้อๆกลางอากาศ หรือกำลังเดินซื้อของกับครอบครัวอยู่ ผมเกิดอาการหูดับคืออยู่ดีๆก็ไม่ได้ยินเสียงรอบข้าง ภรรยาผมตะโกนเรียกบางทีก็ไม่ได้ยิน อาการหนักจนผมตัดสินใจไปตรวจหูตรวจประสาทการได้ยิน รวมถึงขอคุยกับจิตแพทย์ครับ เพราะมันไม่ไหว
แต่ปรากฏว่าผลการตรวจร่างกายทุกอย่างปกติหมด
ผมยังมีบุญอยู่ครับ ที่ผมและภรรยาปฏิบัติกรรมฐานมาจริงจัง พอจะมีประสบการณ์ทางธรรมมาบ้าง เหตุการณ์นี้มันคือการฝึกภาคสนามของผู้ปฏิบัติกรรมฐานครับ มันคือการโดนลองของ เพื่อดูว่าการฝึกจิตที่ผ่านมา เมื่อมาโดนความเป็นจริงที่โหดร้ายทางโลกกระแทกเข้าแบบติดๆกันไม่ให้พัก จะรอดมั้ย
ผมยังโชคดีที่ยังสามารถควบคุมสิ่งที่ไม่ดีทั้งหลายให้อยู่เฉพาะในหัวได้ ยังไม่โพล่งออกมาเป็นคำพูดที่ทำร้ายใคร และ ยังไม่ทำอะไรรุนแรงเช่นไปทุบหัวคนอื่น
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738837868020-YAKIHONNES3.jpeg)
เรียกว่าเกิดเฉพาะ มโนกรรม ส่วนวจีกรรมและกายกรรม ยังไม่เกิด ในวันที่แย่ขนาดนั้น ผมยังอยู่กับการปฏิบัติดูรู้ลมหายใจ ดูรู้กายเคลื่อนไหว สวดมนต์ นั่งสมาธิ ถวายสังฆทาน สวดมนต์กับลูกและภรรยาทุกวันก่อนนอนไม่ขาด ทางร่างกายก็ออกกำลังกายให้สม่ำเสมอรักษา baseline ความแข็งแรงไว้
หากเพื่อนๆเชื่อเรื่องบาปบุญและกฏแห่งกรรม รวมไปถึงเจ้ากรรมนายเวร
ตัวอย่างของผมอันนี้ก็คือการชดใช้ครับ ช่วงที่ผมก้มหน้าชดใช้กรรมที่ผ่านมา ผมอโหสิและแผ่เมตตาอุทิศบุญกุศลให้แก่ทุกคนที่ทำร้ายผม ผมโกรธครับ แต่เวลาอารมณ์โกรธมันออกมาจนตัวสั่น ใจสั่น เสียวหน้าอก ผมแผ่เมตตาสู้อารมณ์โกรธอันนั้นเลย แรกๆก็ฝืนธรรมชาติตัวเองอยู่ครับ แต่เมื่อทำต่อเนื่องไป ใจมันสงบมันนิ่ง มันเกิดอารมณ์สงสารคนเหล่านั้นที่มาทำร้ายผมมากกว่า เพราะสภาพความเป็นจริงก็คือคนเหล่านั้นที่ทำร้ายผม เขาก็กำลังโดนทวงจากคนของเขาเหมือนกันครับ ดังนั้นผมถึงเลือกที่จะแผ่เมตตาให้ และอธิษฐานภาวนาให้ว่า
**"ผมยินดีน้อมรับการชดใช้ในครั้งนี้ ผมขอไม่โต้ตอบ ชดใช้กันให้เต็มที่ เพื่อว่าเมื่อหมดกรรมกันไปแล้วจะได้ขาดกันไปเลย ไม่ต้องมาจองเวรจองกรรมกันอีก ขอให้มีความสุขและเกิดดวงตาเห็นธรรม"**
เรียกว่าผมรอดมาได้แบบกระอักเลือดเพราะใช้ธรรมะที่ฝึกปฏิบัติมาเป็นที่พึ่งครับ ไม่ได้ไปเรียกร้อง ไปโวยวาย หรือไปโต้ตอบอะไร ในใจมันต้องคิดขุ่นเคืองเป็นเรื่องธรรมดา แต่ให้มันจบอยู่แค่ที่ความคิดครับ ไม่ให้หลุดออกมาเป็นคำพูดหรือการกระทำ ไม่เช่นนั้นการกระทำใหม่จะเกิดขึ้น กลายเป็นการผูกเวรผูกกรรม จองเวรจองกรรมกันไปอีกนาน ไม่จบไม่สิ้น แต่ต้องบอกก่อนว่าผมไม่ได้ไปเพ่งไปกดข่มอารมณ์โกรธขุ่นเคืองใจ พระท่านสอนให้เรา “ดู” “รู้” “เห็น” ทุกสรรพสิ่งที่เกิดขึ้นกับตัวเรา โดยเฉพาะความคิดในหัวเรา
**“ดูมัน เห็นมัน รู้มัน แต่ไม่บ้าไปกับมัน”**
แต่เรื่องธรรมะ ผมเชื่อว่าเพื่อนๆที่ฟังคุณลุงมาตลอด น่าจะเข้าใจคำว่า ธรรมะต้องฝึกต้องปฏิบัติเอง รู้ด้วยตัวเอง เห็นด้วยตัวเอง เข้าใจด้วยตัวเอง
วฺิธีการที่ผมเล่ามานี้ไม่ใช่สูตรสำเร็จ แต่มันคือวิธีการปฏิบัติที่เข้ากับจริตคนแบบผมครับ ผมมีแต่จะต้องฝึกให้ชำนาญขึ้นไปจนกว่าจะตายนั่นแหละครับ
เป็นเวลาเกือบ 10 ปีที่ผมอยู่ที่แห่งนี้ มีประสบการณ์ที่ประเมินมูลค่าไม่ได้เกิดขึ้นมากมาย
- วิกฤติครอบครัวที่ภรรยาเกือบเลิกกับผม [อ่านเพิ่มได้ที่นี่](https://yakihonne.com/naddr1qvzqqqr4gupzpz2849zn00wd9e3dpdqdk4mrdm8rqdz6pa3usp44xzjlr7dlea3xqq2nj7jwdsehwuzrxv6kskz4wenkcwrjdscnq3stzy4)
- การได้ครอบครองอสังหาริมทรัพย์จากน้ำพักน้ำแรงตัวเอง
- การเห็นลูกที่รักป่วยไม่สบาย admit บ่อยมากช่วงเด็กเล็ก
- การรับมือกับโรคระบาด COVID19
- การได้เป็นหัวหน้า 3 หน่วยงาน
- การได้ศึกษาปฏิบัติธรรม รวมถึงการลาบวช
- การได้ทดแทนพระคุณบุพการี [อ่านเพิ่มเติมได้ที่นี่](https://yakihonne.com/naddr1qvzqqqr4gupzpz2849zn00wd9e3dpdqdk4mrdm8rqdz6pa3usp44xzjlr7dlea3xqq257ctc949nge6efpckx7rdx4n57wtrg4dyua0ftzv)
- การได้ช่วยเหลือญาติและผู้มีพระคุณแบบไม่หวังผลตอบแทน
- การได้ connection
การเดินทางสถานที่แห่งนี้ ที่ที่ผม(เคย)เรียกว่าบ้าน มันได้เดินทางมาจนถึงหน้าสุดท้ายของหนังสือเล่มนี้ เป็นธรรมดาที่มันเดินทางมาถึงจุดจบ หวังว่าจะเป็นประโยชน์ ไม่มากก็น้อยนะครับ
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738839012633-YAKIHONNES3.jpeg)
-
![](/static/nostr-icon-purple-64x64.png)
@ 000002de:c05780a7
2025-02-07 03:54:22
I've long been a fan of [Liberty Maniacs](https://libertymaniacs.com/), the site that makes funny political shirts for rebels & liberty lovers but their email today hit me as extra funny.
## Here's what they shared.
To say the last two weeks have been wild would be the understatement of the century.
🔥 DOGE is taking over the Treasury
🔥 USAID got caught laundering money (again)—basically funding everything to the left of Jimmy Carter’s ghost.
🔥 The new AG wants to drop the Epstein list like it’s hot.
🔥 The CIA just casually admitted the government created COVID.
🔥 And oh yeah, the Gulf of Mexico? Not anymore. Welcome to the Gulf of America!
At this point, reality is outpacing satire. But don’t worry, we’re working harder than a WEF escort during Davos week to get these news cycles onto shirts before the next scandal drops.
Not sure if we’ll ever catch up, but damn it, we’re gonna try.
---
I mean, that's pretty good stuff. If you are a marketer or copywriter this is how you do it.
originally posted at https://stacker.news/items/878326
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-07 03:35:34
# The #LightningNetwork introduces the concept of #payment channels. How do these channels work, and how do they enable #bitcoin to #scale while maintaining #security?
originally posted at https://stacker.news/items/878316
-
![](/static/nostr-icon-purple-64x64.png)
@ 6bcc27d2:b67d296e
2025-02-07 03:06:38
This is the test of obsidian nostr writer
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-07 02:59:45
# Bitcoin's blockchain is described as a 'public ledger.' How does this public nature contribute to bitcoin's security and trustlessness, and what role do nodes play in this system?
originally posted at https://stacker.news/items/878295
-
![](/static/nostr-icon-purple-64x64.png)
@ 3eba5ef4:751f23ae
2025-02-07 02:02:37
🍨*Your weekly byte of the latest updates from the Bitcoin ecosystem!*
## Crypto Insights
### Security Crisis Revealed by Bitcoin Mempool Clearance
Recently, several Bitcoin blocks went unfilled as mempools cleared out and transaction fees hit 11-month low. Reduced activity on the network led miners to nearly clear out Bitcoin's pool of unconfirmed transactions. This [post](https://x.com/DaPangDunCrypto/status/1885993450610594293) pointed out that these events highlight a potential security crisis.
### What Has Been Done to Make Bitcoin Quantum-Safe?
According to [Murch's response](https://bitcoin.stackexchange.com/questions/125171/what-exactly-is-being-done-today-to-make-bitcoin-quantum-safe), there is currently no dedicated team within the Bitcoin community working on quantum security. However, related proposals exist, such as [BIP-360: Pay to Quantum Resistant Hash](https://github.com/bitcoin/bips/pull/1670), which aims to introduce a quantum-resistant output type.
### A Variant of Cycling Attacks on Bitcoin Miners' Block Templates Disclosed
Antoine Riard [reported](https://groups.google.com/g/bitcoindev/c/ZspZzO4sBys) a variant of cycling attacks that can censor transaction flows in miners' block templates. This enables attackers to manipulate Bitcoin fee rewards, maximizing their chances of mining blocks on the longest valid chain at the expense of honest miners.
### Hurricash: A Multi-Signature Tool for Shared UTXOs
[Hurricash](https://supertestnet.github.io/hurricash/) is a multi-signature tool that allows multiple users to lock funds in a single UTXO while enabling unilateral exit with their contribution. Any member can spend money from Hurricash on Lightning Network since Hurricash can be a channel factory, or on the base layer via an LN-to-base-layer swap. Similar to [Coinpools](https://bitcoinops.org/en/topics/joinpools/), but Hurricash requires everyone to exit with the same amount as everyone else.
Hurricash aims to address two key issues of the Lightning Network:
- High cost of opening channels (sometimes)
- Privacy concerns about placing channel-opening transactions on the base layer
Advantages of Hurricash:
- No soft fork required
- Computational cost for pool creation grows at O(n^3) instead of O(n!)
- Users can exit at any time, in any order, without coordination
- Unlike Ark, Hurricash has no central coordinator
- Unlike Ark, funds in Hurricash pools are not time-locked, allowing indefinite participation
Check out its [GitHub](https://github.com/supertestnet/hurricash) for the code.
### Fake Channels Are Real: Why Client-Side-Validated Lightning Is Easier Than You Think
Peter Todd [argues](https://petertodd.org/2025/fake-channels-and-rgb-lightning) that intermediary channels in the Lightning Network don’t need to be real. When Alice makes a payment via Alice ↔ Bob ↔ Charlie ↔ David, she only cares if David receives the payment, not whether Bob and Charlie’s channel exists.
This flexibility is particularly useful when using client-side-validated tokens like RGB or Taproot assets. Lightning payments can route through virtual channels, requiring only Alice’s channel to be valid. This eliminates third-party verification and enables users to route transactions with just a few MB of data.
### Implementation of Non-Interactive Single-Round T-of-N Threshold Signature Protocol NOIST
[Burak](https://x.com/brqgoo) successfully implemented a 550/999 NOIST threshold multisig transaction. Check it out on [mempool](https://mempool.space/tx/fe9c93ad23c3f860a5162e54d34154b4401ac51959c25778bda3024960a33218) and watch the [demo video](https://www.youtube.com/watch?v=R3S7C9bNYDc).
NOIST ([GitHub](https://github.com/brollup/brollup/tree/main/src/transmutive/noist)) is a non-interactive, single-round t-of-n threshold signing protocol. It allows multiple untrusted entities to generate a group key and produce signatures in constant time, preventing malicious signers from forcing a re-do. Its output is a 64-byte BIP-340-compatible Schnorr signature. Read [more](https://blog.brollup.org/introducing-noist-a-non-interactive-single-round-t-of-n-threshold-signing-protocol-51225fe513fa) about NOIST.
### Blockstream’s 2024 Year in Review
Blockstream [reviewed](https://blog.blockstream.com/blockstream-update-2024-in-review/) its major developments over the past year, including:
- Multiple Core Lightning updates: such as [dual funding](https://blog.blockstream.com/core-lightning-v24-02-uint-needs-signature/), [BOLT12](https://glossary.blockstream.com/bolt12/?ref=blog.blockstream.com), along with improved performance and accessibility
- BlockStream’s Lightning-as-a-Service (LaaS) [Greenlight](https://blockstream.com/lightning/greenlight/?ref=blog.blockstream.com) integrating with Europe’s leading Bitcoin platform Relai
- Hardware wallet [Jade](https://blockstream.com/jade/) adding Miniscript support and reintroducing Anti-Exfil to counter Dark Skippy attacks
- Revamped Bitcoin desktop wallet [BlockStream Green 2.0](https://blog.blockstream.com/blockstream-green-2-0-a-new-accessible-experience-for-bitcoin-desktop-wallets/)
- Sidechain-based, Bitcoin layer-2 settlement network [Liquid](https://docs.liquid.net/docs/technical-overview) advancements, including: [Liquid Wallet Kit](https://github.com/Blockstream/lwk?ref=blog.blockstream.com), testnet deployment of High-Assurance Smart Contract [Simplicity](https://blog.blockstream.com/en-simplicity-github/), and [ELIP 200](https://blog.blockstream.com/confidentiality-made-affordable-elip-200-unlocks-up-to-90-lower-fees-on-liquid/) reducing transaction fees by up to 90%
### Rizful: A Disposable Lightning Node Setup Tool
[Rizful](http://rizful.com) provides a quick and easy way for users to run their own Lightning nodes in the cloud, enabling instant receipt of zaps and other Lightning payments. Rizful nodes are disposable and fully implement the Nostr Wallet Connect specification, as well as instant inbound and self-managed channels.
### Ark’s Minimally Dependent Wallet SDK for Bitcoin Transactions
Ark released a TypeScript-powered [Wallet SDK](https://blog.arklabs.to/introducing-the-ark-wallet-sdk-d1c77ce61cfc) that simplifies building Bitcoin wallet for both on-chain and off-chain transactions. The SDK follows the [Noble Cryptography](https://paulmillr.com/noble/) approach, minimizing dependencies while supporting Bitcoin and Ark transactions in web applications and mobile wallets—without WebAssembly overhead.
### QuantumLink: Air-Gap-Level Security Over Bluetooth
Foundation introduced [QuantumLink](https://foundation.xyz/2025/01/quantumlink-reinventing-secure-wireless-communication/), a Bluetooth-based protocol that encrypts all data entering or exiting the Bluetooth chip with a quantum-resistant encryption scheme. This achieves a comparable level of air-gap security while maintaining convenience and flexibility.
### Why DeepSeek is a Game Changer for AI x Crypto
The author [argues](https://x.com/tmel0211/status/1884068876604109163) that DeepSeek is a major breakthrough for AI + Crypto due to:
- Breaking the hardware-dependent AI computing model, challenging NVIDIA’s monopoly
- Using reinforcement learning (RL) and reasoning optimization instead of brute-force pre-training paradigm by piling up hardware
- Enabling cost-efficient AI Agent applications
- DeepSeek's open-source approach aligns with the decentralization principles of Crypto.
### Tracking Bitcoin Adoption in the U.S.
[StackStates.com](https://stackstates.com/) provides an overview of state-level legislation on strategic Bitcoin reserves, helping track Bitcoin adoption across the U.S.
## Top Reads on Blockchain and Beyond
### RGB++: A New Approach to Bitcoin Scaling
This [article](https://www.nervos.org/knowledge-base/the-case-for-rgbpp) explains why [RGB++](https://www.rgbppfans.com/) offers a holistic solution that aligns with Bitcoin's original ethos in a landscape where existing scaling efforts often involve significant trade-offs—be it in security, decentralization, or usability.
RGB++’s major advantages:
- **Enhanced Bitcoin Utility**: RGB++ extends Bitcoin beyond a store of value and payment network, enabling decentralized applications, financial instruments, and cross-chain interactions without bridges.
- **Scalability & Efficiency**: Isomorphic binding allows advanced smart contracts without third-party trust, while transaction folding and off-chain asset issuance solve state bloat and boost throughput.
- **Proven & Growing**: RGB++ is already live on mainnet, with increasing adoption among users and dApps.
### How the Zero-Click Deanonymization Attack Works via Cloudflare
The author discovered a unique attack method called the "zero-click deanonymization attack." This exploit allows attackers to pinpoint a target’s location within a 250-mile radius—without any user interaction. If the target has a vulnerable app installed—whether a mobile app or a background service on a computer—the attacker can send a malicious payload to reveal the target’s identity within seconds—the victim does’t even know. He found that hundreds of apps, including Signal, Discord, and Twitter/X, are vulnerable to this attack.
[This article](https://gist.github.com/hackermondev/45a3cdfa52246f1d1201c1e8cdef6117) explains how the attack works through Cloudflare.
### The Dangers of Central Bank Digital Currencies and Their Impact on Financial Independence and Privacy
[This article](https://reason.com/2024/12/18/imf-offers-a-glimpse-at-the-perils-of-central-bank-digital-currencies/) explores the risks of Central Bank Digital Currencies (CBDCs) and their implications for financial independence and privacy. Referring to the International Monetary Fund’s [*CBDC Virtual Handbook*](https://www.imf.org/en/Topics/fintech/central-bank-digital-currency/virtual-handbook), the author explains how CBDCs grant governments unprecedented control over transactions, enabling surveillance, restrictions, and financial coercion. The piece contrasts government-issued digital currencies with decentralized alternatives like Bitcoin, highlighting stark differences in privacy and user freedom.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-07 01:02:09
I don't think I did one of these summary posts last month.
Based on the [predictions](https://stacker.news/items/865017/r/Undisciplined) made by stackers here's what to expect at the end of the season.
**Champion**: Celtics
**MVP**: SGA
**All NBA 1st Team**
C Jokic
F Giannis
F Luka
G Ant
G SGA
These aren't bad, but whoever's sticking with those Ant and Luka picks seriously need to move off of them.
originally posted at https://stacker.news/items/878234
-
![](/static/nostr-icon-purple-64x64.png)
@ df173277:4ec96708
2025-02-07 00:41:34
## **Building Our Confidential Backend on Secure Enclaves**
With our newly released [private and confidential **Maple AI**](https://trymaple.ai/?ref=blog.opensecret.cloud) and the open sourcing of our [**OpenSecret** platform](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud) code, I'm excited to present this technical primer on how we built our confidential compute platform leveraging **secure enclaves**. By combining AWS Nitro enclaves with end-to-end encryption and reproducible builds, our platform gives developers and end users the confidence that user data is protected, even at runtime, and that the code operating on their data has not been tampered with.
## **Auth and Databases Today**
As developers, we live in an era where protecting user data means "encryption at rest," plus some access policies and procedures. Developers typically run servers that:
1. Need to register users (authentication).
2. Collect and process user data in business-specific ways, often on the backend.
Even if data is encrypted at rest, it's commonly unlocked with a single master key or credentials the server holds. This means that data is visible during runtime to the application, system administrators, and potentially to the hosting providers. This scenario makes it difficult (or impossible) to guarantee that sensitive data isn't snooped on, memory-dumped, or used in unauthorized ways (for instance, training AI models behind the scenes).
## **"Just Trust Us" Isn't Good Enough**
In a traditional server architecture, users have to take it on faith that the code handling their data is the same code the operator claims to be running. Behind the scenes, applications can be modified or augmented to forward private information elsewhere, and there is no transparent way for users to verify otherwise. This lack of proof is unsettling, especially for services that process or store highly confidential data.
Administrators, developers, or cloud providers with privileged access can inspect memory in plaintext, attach debuggers, or gain complete visibility into stored information. Hackers who compromise these privileged levels can directly access sensitive data. Even with strict policies or promises of good conduct, the reality is that technical capabilities and misconfigurations can override words on paper. If a server master key can decrypt your data or can be accessed by an insider with root permissions, then "just trust us" loses much of its credibility.
The rise of AI platforms amplifies this dilemma. User data, often full of personal details, gets funneled into large-scale models that might be training or fine-tuning behind the scenes. Relying on vague assurances that "we don't look at your data" is no longer enough to prevent legitimate concerns about privacy and misuse. Now more than ever, providing a **strong, verifiable** guarantee that data remains off-limits, even when actively processed, has become a non-negotiable requirement for trustworthy services.
## **Current Attempts at Securing Data**
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.09.19-PM.png)Current User Experience of E2EE Apps
While properly securing data is not easy, it isn't to say that no one is trying. Some solutions use **end-to-end encryption** (E2EE), where user data is encrypted client-side with a password or passphrase, so not even the server operator can decrypt it. That approach can be quite secure, but it also has its **limitations**:
1. **Key Management Nightmares**: If a user forgets their passphrase, the data is effectively lost, and there's no way to recover it from the developer's side.
2. **Feature Limitations**: Complex server-side operations (like offline/background tasks, AI queries, real-time collaboration, or heavy computation) can't easily happen if the server is never capable of processing decrypted data.
3. **Platform Silos**: Some solutions rely on iCloud, Google Drive, or local device storage. That can hamper multi-device usage or multi-OS compatibility.
Other approaches include self-hosting. However, these either burden users with dev ops overhead or revert to the "trust me" model for the server if you "self-host" on a cloud provider.
## **Secure Enclaves**
### **The Hybrid Approach**
Secure enclaves offer a compelling middle ground. They combine the privacy benefits of keeping data secure from prying admins while still allowing meaningful server-side computation. In a nutshell, an enclave is a protected environment within a machine, isolated at the hardware level, so that even if the OS or server is compromised, the data and code inside the enclave remain hidden.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.21.31-PM.png)App Service Running Inside Secure Enclave
### **High-Level Goal of Enclaves**
Enclaves, also known under the broader umbrella of **confidential computing**, aim to:\
• **Lock down data** so that only authorized code within the enclave can process the original plaintext data.\
• **Deny external inspection** by memory dumping, attaching a debugger, or intercepting plaintext network traffic.\
• **Prove** to external users or services that an enclave is running unmodified, approved code (this is where **remote attestation** comes in).
### **Different Secure Enclave Solutions**
[**AMD SEV**](https://www.amd.com/en/developer/sev.html?ref=blog.opensecret.cloud) **(Secure Encrypted Virtualization)** encrypts an entire virtual machine's memory so that even a compromised hypervisor cannot inspect or modify guest data. Its core concept is "lift-and-shift" security. No application refactoring is required because hardware-based encryption automatically protects the OS and all VM applications. Later enhancements (SEV-ES and SEV-SNP) added encryption of CPU register states and memory integrity protections, further limiting hypervisor tampering. This broad coverage means the guest OS is included in the trusted boundary. AMD SEV has matured into a robust solution for confidential VMs in multi-tenant clouds.
[**Intel TDX**](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html?ref=blog.opensecret.cloud) **(Trust Domain Extensions)** shifts from process-level enclaves to full VM encryption, allowing an entire guest operating system and its applications to run in an isolated "trust domain." Like AMD SEV, Intel TDX encrypts and protects all memory the VM uses from hypervisors or other privileged software, so developers do not need to refactor their code to benefit from hardware-based confidentiality. This broader scope addresses many SGX limitations, such as strict memory bounds and the need to split out enclave-specific logic, and offers a more straightforward "lift-and-shift" path for running existing workloads privately. While SGX is now deprecated, TDX carries forward the core confidential computing principles but applies them at the virtual machine level for more substantial isolation, easier deployment, and the ability to scale up to large, memory-intensive applications.
[**Apple Secure Enclave and Private Compute**](https://security.apple.com/blog/private-cloud-compute/?ref=blog.opensecret.cloud) is a dedicated security coprocessor embedded in most Apple devices (iPhones, iPads, Macs) and now extended to Apple's server-side AI infrastructure. It runs its own microkernel, has hardware-protected memory, and securely manages operations such as biometric authentication, key storage, and cryptographic tasks. Apple's "Private Compute" approach in the cloud brings similar enclave capabilities to server-based AI, enabling on-device-grade privacy even when requests are processed in Apple's data centers.
[**AWS Nitro Enclaves**](https://docs.aws.amazon.com/enclaves/latest/user/nitro-enclave.html?ref=blog.opensecret.cloud) carve out a tightly isolated "mini-VM" from a parent EC2 instance, with its own vCPUs and memory guarded by dedicated Nitro cards. The enclave has no persistent storage and no external network access, significantly reducing the attack surface. Communication with the parent instance occurs over a secure local channel (vsock), and AWS offers hardware-based attestation so that secrets (e.g., encryption keys from AWS KMS) can be accessed only to the correct enclave. This design helps developers protect sensitive data or code even if the main EC2 instance's OS is compromised.
[**NVIDIA GPU TEEs**](https://www.nvidia.com/en-us/data-center/solutions/confidential-computing/?ref=blog.opensecret.cloud) **(Hopper H100 and Blackwell)** extend confidential computing to accelerated workloads by encrypting data in GPU memory and ensuring that even a privileged host cannot view or tamper with it. Data moving between CPU and GPU is encrypted in transit, so sensitive model weights or inputs remain protected during AI training or inference. NVIDIA's hardware and drivers handle secure data paths under the hood, allowing confidential large language model (LLM) workloads and other GPU-accelerated computations to run with minimal performance overhead and strong security guarantees.
### **Key Benefits**
One major advantage of enclaves is their ability to **keep memory completely off-limits** to outside prying eyes. Even administrators who can normally inspect processes at will are blocked from peeking into the enclave's protected memory space. The enclave model is a huge shift in the security model: it prevents casual inspection and defends against sophisticated memory dumping techniques that might otherwise leak secrets or sensitive data.
Another key benefit centers on cryptographic keys that are **never exposed outside the enclave**. Only verified code running inside the enclave environment can run decryption or signing operations, and it can only do so while that specific code is running. This ensures that compromised hosts or rogue processes, even those with high-level privileges, are unable to intercept or misuse the keys because the keys remain strictly within the trusted boundary of the hardware.
Enclaves can also offer the power of **remote attestation**, allowing external clients or systems to confirm that they're speaking to an authentic, untampered enclave. By validating the hardware's integrity measurements and enclave-specific proofs, the remote party can be confident in the underlying security properties, an important guarantee in multi-tenant environments or whenever trust boundaries extend across different organizations and networks.
Beyond that, **reproducible builds** can create a verifiable fingerprint proving which binary runs in the enclave. This is a step above a simple "trust us" approach. Anyone can independently recreate the enclave image and verify the resulting cryptographic hash by using a reproducible build system (for example, [our NixOS-based solution](https://github.com/OpenSecretCloud/opensecret/blob/master/flake.nix?ref=blog.opensecret.cloud)). If it matches, then users and developers know precisely how code handles their data, boosting confidence that no hidden changes exist.
It's worth noting that although enclaves shield you from software devs, cloud providers, and insider threats, you do have to trust the **hardware vendor** (Intel, AMD, Apple, AWS, or NVIDIA) to implement their microcode and firmware securely. The entire enclave model could be theoretically undermined if a CPU maker's root keys or manufacturing process were compromised. Fortunately, these companies undergo extensive audits and firmware validations (often with third-party researchers), and their remote attestation mechanisms allow you to confirm specific firmware versions before trusting an enclave. While this adds a layer of "vendor trust," it's still a far more contained risk than trusting an entire operating system or cloud stack, so enclaves remain a strong step forward in practical, confidential computing.
## **How We Use Secure Enclaves**
Now that we've covered the general idea of enclaves let's look at how we specifically implement them in OpenSecret, our developer platform for handling user auth, private keys, data encryption, and AI workloads.
### **Our Stack: AWS Nitro + Nvidia TEE**
• **AWS Nitro Enclaves for the backend**: All critical logic, authentication, private key management, and data encryption/decryption run inside an AWS Nitro Enclave.
• **Nvidia Trusted Execution for AI**: For large AI inference (such as the Llama 3.3 70B model), we utilize Nvidia's GPU-based TEEs to protect even GPU memory. This means users can feed sensitive data to the AI model **without** exposing it in plaintext to the GPU providers or us as the operator. [Edgeless Systems](https://www.edgeless.systems/?ref=blog.opensecret.cloud) is our Nvidia TEE provider, and due to the power of enclave verification, we don't need to worry about who runs the GPUs. We know requests can't be inspected or tampered with.
### **End-to-End Encryption from Client to Enclave**
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.29.34-PM.png)Client-side Enclave Attestation from Maple AI
Before login or data upload, the user/client verifies the **enclave attestation** from our platform. This process proves that the specific Nitro Enclave is genuine and runs the exact code we've published. You can check this out live on [Maple AI's attestation page](https://trymaple.ai/proof?ref=blog.opensecret.cloud).
Based on the attestation, the client establishes a secure ephemeral communication channel that only that enclave can decrypt. While we take advantage of SSL, it is typically not terminated inside the enclave itself. To ensure there's full encrypted data transfer all the way through to the enclave, we establish this additional handshake based on the attestation document that is used for all API requests during the client session.
From there, the user's credentials, private keys, and data pass through this secure channel directly into the enclave, where they are decrypted and processed according to the user's request.
### **In-Enclave Operations**
At the core of OpenSecret's approach is the conviction that security-critical tasks must happen inside the enclave, where even administrative privileges or hypervisor-level compromise cannot expose plaintext data. This encompasses everything from when a user logs in to creating and managing sensitive cryptographic keys. By confining these operations to a protected hardware boundary, developers can focus on building their applications without worrying about accidental data leaks, insider threats, or malicious attempts to harvest credentials. The enclave becomes the ultimate gatekeeper: it controls how data flows and ensures that nothing escapes in plain form.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.09.22-PM.png)User Auth Methods running inside Enclave
A primary example is **user authentication**. All sign-in workflows, including email/password, OAuth, and upcoming passkey-based methods, are handled entirely within the enclave. As soon as a user's credentials enter our platform through the encrypted channel, they are routed straight into the protected environment, bypassing the host's operating system or any potential snooping channels. From there, authentication and session details remain in the enclave, ensuring that privileged outsiders cannot intercept or modify them. By centralizing these identity flows within a sealed environment, developers can assure their users that no one outside the enclave (including the cloud provider or the app's own sysadmins) can peek at, tamper with, or access sensitive login information.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.07.52-PM.png)Main Enclave Operations in OpenSecret
The same principle applies to **private key management**. Whether keys are created fresh in the enclave or securely transferred into it, they remain sealed away from the rest of the system. Operations like digital signing or content decryption happen only within the hardware boundary, so raw keys never appear in any log, file system, or memory space outside the enclave. Developers retain the functionality they need, such as verifying user actions, encrypting data, or enabling secure transactions without ever exposing keys to a broader (and more vulnerable) attack surface. User backup options exist as well, where the keys can be securely passed to the end user.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.08.04-PM.png)Realtime Encrypted Data Sync on Multiple Devices
Another crucial aspect is **data encryption at rest**. While user data ultimately needs to be stored somewhere outside the enclave, the unencrypted form of that data only exists transiently inside the protected environment. Encryption and decryption routines run within the enclave, which holds the encryption keys strictly in memory under hardware guards. If a user uploads data, it is promptly secured before it leaves the enclave. When data is retrieved, it remains encrypted until it reenters the protected region and is passed back to the user through the secured communication channel. This ensures that even if someone gains access to the underlying storage or intercepts data in transit, they will see only meaningless ciphertext.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.08.13-PM.png)Confidential AI Workloads
Finally, **confidential AI workloads** build upon this same pattern: the Nitro enclave re-encrypts data so it can be processed inside a GPU-based trusted execution environment (TEE) for inference or other advanced computations. Sensitive data, like user-generated text or private documents, never appears in the clear on the host or within GPU memory outside the TEE boundary. When an AI process finishes, only the results are returned to the enclave, which can then relay them securely to the requesting user. By seamlessly chaining enclaves together, from CPU-based Nitro Enclaves to GPU-accelerated TEEs, we can deliver robust, hardware-enforced privacy for virtually any type of server-side or AI-driven operation.
### **Reproducible Builds + Verification**
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.07.58-PM.png)Client verifies enclave attestation document
We build our enclaves on **NixOS** with reproducible builds, ensuring that anyone can verify that the binary we publish is indeed the binary running in the enclave. This build process is essential for proving we haven't snuck in malicious code to exfiltrate data or collect sensitive logs.
Our code is fully open source ([GitHub: OpenSecret](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud)), so you can audit or run it yourself. You can also verify that the cryptographic measurement the build process outputs matches the measurement reported by the enclave during attestation.
## **Putting It All Together**
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.09.09-PM.png)OpenSecret Offering: Private Key Management, Encrypted Sync, Private AI, and Confidential Compute
By weaving secure enclaves into every step, from authentication to data handling to AI inference, we shift the burden of trust away from human policies and onto provable, hardware-based protections. For app developers, you can offer your users robust privacy guarantees without rewriting all your business logic or building an entire security stack from scratch. Whether you're storing user credentials or running complex operations on sensitive data, the enclave approach ensures plaintext remains inaccessible to even the most privileged parties outside the enclave boundary. Developers can focus on building great apps, while OpenSecret handles the cryptographic "lock and key" behind the scenes.
This model provides a secure-by-design environment for industries that demand strict data confidentiality, such as healthcare, fintech, cryptocurrency apps for secure key management, or decentralized identity platforms. Instead of worrying about memory dumps or backend tampering, you can trust that once data enters the enclave, it's sealed off from unauthorized eyes, including from the app developers themselves. And these safeguards don't just apply to niche use cases. Even general-purpose applications that handle login flows and user-generated content stand to benefit, especially as regulatory scrutiny grows around data privacy and insider threats.
Imagine a telehealth startup using OpenSecret enclaves to protect patient information for remote consultations. Not only would patient data remain encrypted at rest, but any AI-driven analytics to assist with diagnoses could be run privately within the enclave, ensuring no one outside the hardware boundary can peek at sensitive health records. A fintech company could similarly isolate confidential financial transactions, preventing even privileged insiders from viewing or tampering with raw transaction details. These real-world implementations give developers a clear path to adopting enclaves for serious privacy and compliance needs without overhauling their infrastructure.
OpenSecret aims to be a **full developer platform** with end-to-end security from day one. By incorporating user authentication, data storage, and GPU-based confidential AI into a single service, we eliminate many of the traditional hurdles in adopting enclaves. No more juggling separate tools for cryptographic key management, compliance controls, and runtime privacy. Instead, you get a unified stack that keeps data encrypted in transit, at rest, and in use.
Our solution also caters to the exploding demand for AI applications: with TEE-enabled GPU workloads, you can securely process sensitive data for text inference without ever exposing raw plaintext or sensitive documents to the host system.
The result is a new generation of apps that deliver advanced functionality, like real-time encrypted data sync or AI-driven insights, while preserving user privacy and meeting strict regulatory requirements. You don't have to rely on empty "trust us" promises because hardware enclaves, remote attestation, and reproducible builds collectively guarantee the code is running untampered. In short, OpenSecret offers the building blocks needed to create truly confidential services and experiences, allowing you to innovate while ensuring data protection remains ironclad.
## **Things to Come**
We're excited to build on our enclaved approach. Here's what's on our roadmap:
• **Production Launch**: We're using this in production now with [Maple AI](https://trymaple.ai/?ref=blog.opensecret.cloud) and have a developer preview playground up and running. We'll have the developer environment ready for production in a few months.\
• **Multi-Tenant Support**: Our platform currently works for single tenants, but we're opening this up so developers can onboard without needing a dedicated instance.\
• **Self-Serve Frontend**: A dev-friendly portal for provisioning apps, connecting OAuth or email providers, and managing users.\
• **External Key Signing Options**: Integrations with custom hardware security modules (HSMs) or customer-ran key managers that can only process data upon verifying the enclave attestation.\
• **Confidential Computing as a Service**: We'll expand our platform so that other developers can quickly create enclaves for specialized workloads without dealing with the complexities of Nitro or GPU TEEs.\
• **Additional SDKs**: In addition to our [JavaScript client-side SDK](https://github.com/OpenSecretCloud/OpenSecret-SDK?ref=blog.opensecret.cloud), we plan to launch official support for Rust, Python, Swift, Java, Go, and more.\
• **AI API Proxy with Attestation/Encryption**: We already provide an easy way to [access a Private AI through Maple AI](https://trymaple.ai/?ref=blog.opensecret.cloud), but we'd like to open this up more for existing tools and developers. We'll provide a proxy server that users can run on their local machines or servers that properly handle encryption to our OpenAI-compatible API.
## **Getting Started**
Ready to see enclaves in action? Here's how to dive in:\
1. **Run OpenSecret**: Check out our open-source repository at [OpenSecret on GitHub](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud). You can run your own enclaved environment or try it out locally with Docker.\
2. **Review Our SDK**: Our [JavaScript client SDK](https://github.com/OpenSecretCloud/OpenSecret-SDK?ref=blog.opensecret.cloud) makes it easy to handle sign-ins, put/get encrypted data, sign with user private keys, etc. It handles attestation verification and encryption under the hood, making the API integration seamless.\
3. **Play with Maple AI**: Try out [Maple AI](https://blog.opensecret.cloud/maple-ai-private-encrypted-chat/) as an example of an AI app built directly on OpenSecret. Your queries are encrypted end to end, and the Llama model sees them only inside the TEE.\
4. **Developer Preview**: Contact us if you want an invite to our early dev platform. We'll guide you through our SDK and give you access to the preview server. We'd love to build with you and incorporate your feedback as we develop this further.
## **Conclusion**
By merging secure enclaves (AWS Nitro and Nvidia GPU TEEs), user authentication, private key management, and an end-to-end verifiable encrypted approach, **OpenSecret** provides a powerful platform where we protect user data during collection, storage, and processing. Whether it's for standard user management, handling private cryptographic keys, or powering AI inference, the technology ensures that **no one**, not even us or the cloud provider, can snoop on data in use.
**We believe** this is the future of trustworthy computing in the cloud. And it's **all open source**, so you don't have to just take our word for it: you can see and verify everything yourself.
Do you have questions, feedback, or a use case you'd like to test out? Come join us on [GitHub](https://github.com/OpenSecretCloud?ref=blog.opensecret.cloud), [Discord](https://discord.gg/ch2gjZAMGy?ref=blog.opensecret.cloud), or email us for a developer preview. We can't wait to see what you build!
*Thank you for reading, and welcome to the era of enclaved computing.*
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-07 00:39:21
# Details on how to use a Burner Phone
Mobile phones are needed for communications when out in the world but they are a nightmare for privacy and security as detailed in <MISSIVE /07> especially when it comes to surveillance risks. This is more of a hands on guide for how to mitigate those risks.
Burner phones as the name describes is a use and "burn" device either for a single operation or for a longer period if proper precautions are taken. In case you are unaware what I mean by a burner phone; cell phones can be purchased from big box stores, gas stations, and kiosks in cash without a contract. They are usually not very expense and enable you to buy prepaid cards to use for phone and internet service.
Getting a Burner Phone:
1. Best to use a store out of town but not mandatory.
2. Do not take any electronics with you, especially another phone.
3. Park down the street in another parking lot near the store and walk over. Be mindful of security cameras.
4. Cover any tattoos or identifying marks. Wear a hat and a medical mask. (Thank you covid)
5. Use cash only to buy.
6. Leave, do not shop or buy anything else.
Setting up Burner Phone:
1. Go somewhere with free public WIFI (Starbucks, Library, whatever)
2. Do not take any electronics with you, especially another phone.
3. Open package and follow directions to activate using the public WIFI access.
4. Choose a random area code during setup.
5. Create a new random gmail account. (Do not reuse accounts or names)
6. Download and install a VPN, Signal or SimpleX, Firefox Focus Browser, Tor if needed. Delete any other unnecessary apps.
7. Change phone settings (see list)
8. Turn off and remove battery if able to (becoming harder to find) or put into a Faraday Bag.
9. Destroy packaging that came with the phone.
Phone Settings:
1. Turn off hotspot and tethering. Enable Always on VPN and Block Connections without VPN. Set DNS to automatic.
2. Turn off bluetooth and WIFI.
3. Disable all notifications, notification history, notifications on lock screen, and emergency alerts.
4. Turn off all sounds and vibrations.
5. Turn off Find my Device. Setup screen lock with password. (No bio)
6. Toggle everything in privacy: no permissions, turn off microphone, turn off usage and diagnostics, etc
7. Set Use Location to off.
8. Under Languages & Input > Virtual Keyboard > Gboard > Advanced: disable usage statistics, personalizing, and improve voice and typing for everyone.
Using a Burner Phone:
1. Never sign into any account associated with your real identity.
2. Never use it to contact anyone associated with your real identity.
3. Time and distance between burner phone and any other cell phone you own.
i.e. A hour has passed and several miles from when you use and had on the other device.
4. When not in use the battery is removed or in a Faraday Bag.
5. Always use a VPN and always use private search and browser set to delete upon closing (Firefox Focus default).
6. Never actually call or text from the phone. You only want to use SimpleX or Signal for communications.
7. Do not save anything (files, pictures, history) on the phone, especially if incriminating.
8. Do not take it with you or use unless necessary.
9. When in doubt, burn it and get another one.
10. Never carry over names, accounts, whatever from old burner phone to new burner phone.
Burning a phone:
1. Factory reset the device.
2. Remove and destroy the SIM card.
3. Remove the battery because lithium batteries can explode. (may have to take it apart)
4. Smash internals.
5. Burn remains or drown in water. (Throw it in the river)
As long as you are careful to never identify yourself with the burner phone the only surveillance they can do is know that a phone was used or in a location but not who it belongs to. Be aware that if you are caught with it on your person any information or contacts on the phone may get compromised. Be mindful what you put on it.
-
![](/static/nostr-icon-purple-64x64.png)
@ b8851a06:9b120ba1
2025-02-06 22:46:54
When Your Bitcoin Stash Saves Your Earnings Report: The Accounting Shift Every Business Needs to Understand
**Tesla’s Q4 2024 earnings were a wreck—revenue down, costs up. But thanks to Bitcoin, the financial airbags deployed so effectively that no one’s talking about the crash.
**
Let’s Be Clear:
This isn’t about praising Tesla or Elon Musk (we’ll leave that to fan accounts). It’s about dissecting how a simple accounting rule change turned Bitcoin into a corporate financial shock absorber. The numbers reveal a playbook any business can replicate.
The “Aha” Moment: Accounting Rules Meet Digital Gold
(Why This Matters for Main Street Businesses)
The Problem Before 2025:
Companies had to report Bitcoin like a cursed family heirloom—you could only tell people when its value dropped, never when it gained. Imagine having to value your house at its lowest sale price in the neighborhood, even while yours was freshly renovated.
The 2025 Fix:
New rules let companies report Bitcoin like stocks—current value, gains and losses included. Suddenly, that digital gold in the treasury vault gets to shine.
Why This Changes Everything:
• For Tesla: Their $184M Bitcoin stash got revalued to $1.076B → $600M paper gain
• For Your Business: Bitcoin isn’t just an asset; it’s an earnings hedge
For Tesla, Bitcoin turned a bad quarter into a balanced one. For your business, it’s the difference between surviving a downturn and thriving through one.
Tesla’s Numbers Decoded: Bitcoin as Financial CPR
The Crash:
• Automotive revenue ↓ 8%
• Operating expenses ↑ 9%
• Missed revenue targets by $1.5B
The Airbag:
• Bitcoin gain: $600M
• EPS boost: 23% of total earnings
• Balance sheet upgrade: 484% Bitcoin value increase
The Takeaway:
Bitcoin didn’t fix Tesla’s car business—it kept their financials on life support while they work on repairs.
The Business Owner’s Guide to Bitcoin Airbags
(No Tech Jargon, Just Street Smarts)
1. Your New Financial Shock Absorber
• Old Way: Keep cash reserves losing 4-7% annually to inflation
• Bitcoin Way: Treasury that grows while parked
Real Math:
$10M Treasury Allocation
Year 1:
- Cash: $9.6M (after 4% inflation loss)
- Bitcoin: $15.4M (54% avg annual growth*)
2. The “Get Out of Jail Free” Card
When core business stumbles (like Tesla’s did):
• Bitcoin gains offset operational losses
• Buys time for turnaround strategies
3. Shareholder Whisperer
That Bitcoin gain isn’t just numbers—it’s storytelling fuel:
• “Our innovative treasury strategy delivered $600M in non-operational income”
• Beats explaining another quarter of declining sales
Building Your Bitcoin Safety Net
A Step-by-Step Playbook
Step 1: Treasury Triage
• Allocate 5-10% of cash reserves to Bitcoin
• Not speculation—modern balance sheet insurance
Step 2: Accounting Alignment
Work with your CFO to:
• Implement FASB-compliant reporting
• Train teams on quarterly revaluations
Step 3: Strategic Deployment
• Hold through volatility cycles
• Treat gains as bonus liquidity for:
• R&D funding
• Debt reduction
• Opportunistic acquisitions
Pro Tip: Start small—even a 1% Bitcoin allocation creates optionality without material risk.
Objection Busters: What Skeptics Miss
“But Bitcoin’s Too Volatile!”
Cash is guaranteed to lose value. Bitcoin at least gives you a fighting chance.
“We’re Not Tech Bros!”
• Bitcoin isn’t tech—it’s digital real estate
• The network effect is its tenant base
“Accounting’s Too Complex!”
• Modern tools automate revaluations
• Takes less time than managing foreign currency hedges
The Future of Corporate Treasuries
(Why Early Adopters Win)
2025’s Landscape:
• First movers already reaping benefits
• Late adopters face inflationary erosion
Your Move:
• Conduct treasury health check
• Model Bitcoin allocation scenarios
• Implement phased adoption
Final Word:
Tesla’s story isn’t about “crypto” moonshots—it’s about modern financial engineering. The new accounting rules have turned Bitcoin into a Swiss Army knife for corporate treasuries:
• Blade 1: Inflation hedge
• Blade 2: Earnings supplement
• Blade 3: Strategic reserve asset
The question isn’t whether Bitcoin belongs on corporate balance sheets—it’s how much value your business will leave on the table by ignoring this tool.
Your Competitors Won’t Wait—Why Should You?
→ [Free Treasury Health Assessment]( https://neowealth.xyz/code)
→ [Bitcoin Accounting Implementation Guide
]( https://neowealth.xyz/services)
Let [www.NeoWealth.xyz]( https://neowealth.xyz/) assist you– Modern Treasury Solutions for Pragmatic Leaders
#Nostr Footnotes:
Data Sources: #Tesla Q4 2024 Earnings Report, FASB Accounting Standards Update 2023-08, Bitcoin Historical Returns Analysis (2015-2024)
Past performance ≠ future results.
#Bitcoin not #Crypto
-
![](/static/nostr-icon-purple-64x64.png)
@ c2827524:5f45b2f7
2025-02-06 22:07:53
#### Social media e condivisioni anche da mobile?
#### Certamente sì, con i **client per i dispositivi Android**.
![zapstore.dev](https://i.nostr.build/O8jQvuZa1qTt5pat.png)
## Zapstore: client Nostr in un posto solo
Zapstore non c'era e lo hanno inventato.
È lo store dal quale si scaricano i client #Nostr per i dispositivi mobili.
Permissionless è la chiave: non serve attendere che gli store "ufficiali" mettano a disposizione l'ultima release e nemmeno che la comunità di f-droid compili i sorgenti.
Gli sviluppatori di client per Android aggiornano Zapstore e il gioco è fatto!
[Zapstore si scarica direttamente dal sito ufficiale](https://zapstore.dev/).
Al primo download è consigliato seguire le istruzioni per verificare lo sha256 del file apk, prima di installarlo sul proprio dispositivo.
## Universo N.O.S.T.R.
Una volta installato e aperto zapstore, **l'universo Nostr si apre in tutto il suo splendore**.
Tra i primi suggerimenti si dovrebbe trovare Amber ma, se non compare, basta cercare nella casella di ricerca.
![](https://i.nostr.build/xhYG3ZSOkJoUTspl.jpg)
Dopodiché Amber viene presentato in primo piano
![](https://i.nostr.build/RT084h0oVouWUqY9.jpg)
Basta cliccare sulla presentaione e compare in basso il tasto ***Install***
![](https://i.nostr.build/FCNqxIbctRGYi0cM.jpg)
Zapstore esorta a fare le proprie ricerche per controllare la versione, sviluppatore e le caratteristiche dell'app che si va ad installare.
Quando si è verificato bene, cliccare su ***Trust and install app***
![](https://i.nostr.build/k1R9PmfItAWPmGwb.jpg)
Lasciare installare e alla fine Android chiede l'autorizzazione all'installazione.
Come sempre, se è la prima volta che si usa uno store "non ufficiale", si dovrà anche autorizzare dalle impostazioni generali del dispositivo, cui si accede automaticamente
![](https://i.nostr.build/j7v2Q9v23nap2CUw.jpg)
Non resta che cliccare in basso su ***Open*** per lanciare Amber
![](https://i.nostr.build/VF3OI1YfCge1hyHg.jpg)
Amber è l'app che firmerà tutti gli eventi che si pubblicheranno su Nostr. Come app è anche in grado di generare una nuova coppia di chiavi.
Presupponendo di aver già un profilo attivo ed impostato, magari [creato seguendo il tutorial precedente](https://laura.npub.pro/post/z3dxkkdooerzzyv_oqy6b/), qui si deve cliccare su ***Use your private key***
![](https://i.nostr.build/TNYS3g1zJxGmjLXp.jpg)
La chiave privata può essere copiata/incollata o scansionata agendo sull'iconcina stilizzata del QR code. Una volta importata si deve proseguire cliccando ***Next***
![](https://i.nostr.build/UoKDXpyBq62kLYC2.jpg)
Impostare come far firmare Amber, approvando la firma per eventi semplici o farlo manualmente ogni singola volta, poi confermare cliccando ***Finish***
![](https://i.nostr.build/nsXVMb3N6MnCiuRG.jpg)
Amber è pronto a firmare eventi, note and other stuff che ogni utente vorrà pubblicare.
Manca solo il/i client che si desidera utilizzare.
Aggiungerne uno cliccando sul "+" in basso a destra
![](https://i.nostr.build/twoeSfuLbAJmXzhh.jpg)
## Amethyst
Amethyst è il client per Android forse più completo, aggiornato ed efficiente del mondo Android. Se c'è un client ottimo per iniziare, [è proprio Amethyst](https://github.com/vitorpamplona/amethyst).
Se non compare tra i suggerimenti della home di Amber, cercarlo e scegliere ***Install***
![](https://i.nostr.build/id0Fpnpj2JcSbQvK.jpg)
Tra il download e l'apertura di Amethyst, c'è il passaggio della verifica dell'integrità del file apk, che Amber svolge al posto dell'utente
![](https://i.nostr.build/b2sP4Y56gNoBobAA.jpg)
Quando la verifica è terminata, basta aprire Amethyst cliccando in basso su ***Open***
![](https://i.nostr.build/OBb3Rogt0Dfkoydn.jpg)
Accettare i ToS per evienziare i pulsanti di login
![](https://i.nostr.build/ahjj8d37PQDdmHsl.jpg)
e scegliere ***Login with Amber***
![](https://i.nostr.build/804X9b00AFr2sZlE.jpg)
Scegliere quali privilegi consentire ad Amber, che vengono mostrati in una lista e terminare cliccando su ***Grant Permissions***
![](https://i.nostr.build/OiHQXTEqhfeBQmJ7.jpg)
Da questo momento in poi sarà Amber a firmare le note con la chiave privata dell'utente.
Alle nostriche resta solo il compito di dare spazio alla creatività e usare Amethyst per condividere post.
![](https://i.nostr.build/fChOPyQpzNlgXGev.jpg)
La pubblicazione avviene cliccando ***Post*** su Amethyst e, a seconda dei permessi concessi ad Amber, la nota verrà propagata.
Ad esempio: se si è scelto di approvare manualmente ogni post, Amber mostra il menu di conferma.
![](https://i.nostr.build/OaY8GR0YpyceROSU.jpg)
Approvare manualmente ogni post è, all'inizio, un bel modo di utilizzare Amber, perché facilita la conoscenza della natura degli eventi che si stanno postando.
---
## I settings di Amber
Uno sguardo ai menu e alle impostazioni di Amber è doveroso.
Non ci sono accorgimenti particolari, ma è sempre un'ottima abitudine conoscere ed esplorare i menu delle app che si vanno ad utilizzare.
Dalla home di Amber, sono visibili in basso e si trovano - in ordine -
* ***Incoming Request***, dove appariranno le richieste di approvazione per firmare le note
![](https://i.nostr.build/hRKTkHwPtFZBTY9k.jpg)
* ***Settings***, per tutte le impostazioni generali di sicurezza, uso con Orbot, rivedere le scelte di firma ***Sign Policy*** ecc
![](https://i.nostr.build/OE1CAavB5JymCykh.jpg)
approvare il controllo biometrico per la firma, se impostato sul dispositivo
![](https://i.nostr.build/QRS7usy1SlWmYPkj.jpg)
e dare un'occhiata e un test ai relay che si son scelti
![](https://i.nostr.build/EhTo1VhNT4zyrmhP.jpg)
#### Non manca nient'altro. Solo postare ed eslorare i client più belli e aggiornarli da Zapstore
---
## Per info
* https://nostree.me/laura@cosanostr.com
* https://laura.npub.pro/
* https://t.me/bitcoincampus
* https://planb.network
-
![](/static/nostr-icon-purple-64x64.png)
@ 000002de:c05780a7
2025-02-06 18:47:45
I stand by my non-stance that the cowboy credit thing is OK. Using services like MiniBits and CoinOSis OK and using your own node is OK. There are tradeoffs of each. I've been using these eCash hosted / custodial services for over a month now. They work fine most of the time. NWC works most of the time but there are growing pains with the volume of small transactions hitting these services.
I'm gonna try turning it all off for a week starting today. Just use CCs. I mean its kinda like old school SN right?
Next I'd like to really make an effort to go the other way and use a self sovereign stack. I've tried that before with SN and it didn't work for me. Pretty sure I was just too busy and didn't have time to work out the kinks in my setup.
I think cowboy credits are the easiest option by far. No issues really except you aren't dealing with sats. It doesn't feel the same and it isn't the same. I'm wondering how it will hit me as I use them though.
originally posted at https://stacker.news/items/877936
-
![](/static/nostr-icon-purple-64x64.png)
@ d57360cb:4fe7d935
2025-02-06 18:31:30
Mindfulness often has the misconception that by practicing you can stop your mind from thinking and obtain an empty mind.
While one can definitely achieve moments of emptiness in thinking, this view that emptiness is the goal can be the very obstacle in your way leading to frustration with the practice.
If we adjust our perspective and see mindfulness as learning to accept the situations we find ourselves in and adjust to them rather than fighting them, we achieve a kind of grace under pressure.
The thoughts are part of the practice, just like cars on the road are part of driving, or the danger of a punch is always a threat to a boxer.
The difference between the novice and the seasoned is one has accepted and acclimated to the realities of the situation instead of fighting them, in this one finds freedom.
-
![](/static/nostr-icon-purple-64x64.png)
@ 876c2d06:5b86e2af
2025-02-06 18:08:52
Kimsa6868 là một nền tảng giải trí kỹ thuật số hiện đại, mang đến trải nghiệm tối ưu với giao diện thân thiện và dễ sử dụng. Người dùng có thể truy cập trên nhiều thiết bị khác nhau như máy tính, điện thoại di động và máy tính bảng mà không gặp bất kỳ trở ngại nào. Hệ thống được thiết kế thông minh giúp tốc độ xử lý nhanh, ổn định, đảm bảo sự mượt mà trong quá trình sử dụng. Kimsa6868 luôn đặt sự thuận tiện của người dùng lên hàng đầu, tạo ra một không gian giải trí linh hoạt, đáp ứng nhu cầu của mọi đối tượng.
Một trong những điểm nổi bật nhất của <a href="https://kimsa6868.cc
">KIMSA6868</a> chính là kho nội dung đa dạng và phong phú, liên tục được cập nhật để mang đến sự mới mẻ. Hình ảnh chất lượng cao, âm thanh sống động cùng với hiệu ứng sắc nét giúp người dùng có những trải nghiệm chân thực và hấp dẫn. Nền tảng này không ngừng đổi mới và cải tiến công nghệ nhằm mang đến sự lôi cuốn hơn trong từng nội dung, đảm bảo sự hài lòng cho mọi người dùng. Kimsa6868 không chỉ mang đến những trải nghiệm giải trí thú vị mà còn giúp người dùng khám phá nhiều nội dung hấp dẫn khác nhau.
Bên cạnh kho nội dung đặc sắc, Kimsa6868 đặc biệt chú trọng đến tính bảo mật và an toàn thông tin cho người dùng. Hệ thống được trang bị công nghệ mã hóa tiên tiến, giúp bảo vệ dữ liệu cá nhân một cách tối đa. Mọi hoạt động truy cập đều được kiểm soát chặt chẽ nhằm ngăn chặn rủi ro và đảm bảo sự riêng tư tuyệt đối. Chính sách bảo mật chặt chẽ của Kimsa6868 đã giúp nền tảng này xây dựng được lòng tin vững chắc từ cộng đồng người dùng, tạo nên một môi trường an toàn và minh bạch.
Ngoài ra, Kimsa6868 sở hữu đội ngũ hỗ trợ khách hàng chuyên nghiệp, hoạt động 24/7 để đảm bảo mọi thắc mắc và yêu cầu của người dùng được giải đáp kịp thời. Với phương châm đặt trải nghiệm khách hàng lên hàng đầu, Kimsa6868 cam kết mang đến dịch vụ chăm sóc tận tâm, giúp người dùng có thể yên tâm tận hưởng mọi tiện ích trên nền tảng. Đội ngũ hỗ trợ luôn sẵn sàng giúp đỡ, giải quyết các vấn đề nhanh chóng, mang đến sự thuận tiện và hài lòng tối đa.
Nhờ những ưu điểm vượt trội về công nghệ, nội dung đa dạng, bảo mật chặt chẽ và dịch vụ chăm sóc khách hàng chuyên nghiệp, Kimsa6868 đã trở thành một trong những nền tảng giải trí hàng đầu hiện nay. Sự kết hợp giữa hiện đại, tiện lợi và chất lượng cao đã giúp nền tảng này tạo dựng được vị thế vững chắc trên thị trường. Nếu bạn đang tìm kiếm một không gian giải trí toàn diện, an toàn và hấp dẫn, Kimsa6868 chắc chắn sẽ là sự lựa chọn lý tưởng dành cho bạn.
-
![](/static/nostr-icon-purple-64x64.png)
@ 876c2d06:5b86e2af
2025-02-06 18:07:00
Nohu56 là một nền tảng giải trí kỹ thuật số tiên tiến, mang đến trải nghiệm mượt mà với công nghệ hiện đại và giao diện thân thiện. Người dùng có thể dễ dàng truy cập trên mọi thiết bị như máy tính, điện thoại hoặc máy tính bảng mà không gặp bất kỳ trở ngại nào. Hệ thống được tối ưu hóa để đảm bảo tốc độ xử lý nhanh, giúp quá trình sử dụng diễn ra trơn tru, không gián đoạn. Sự linh hoạt này cho phép người dùng tận hưởng mọi tính năng một cách tiện lợi, bất kể họ đang ở đâu.
Một trong những điểm thu hút nhất của <a href="https://nohu56.link">NOHU56</a> chính là kho nội dung phong phú, đa dạng và không ngừng được cập nhật. Hình ảnh sắc nét, âm thanh sống động kết hợp với hiệu ứng chân thực mang đến trải nghiệm giải trí lôi cuốn. Nền tảng này không chỉ đảm bảo chất lượng nội dung mà còn luôn đổi mới để mang lại sự mới mẻ và hấp dẫn cho người dùng. Dù bạn yêu thích phong cách cổ điển hay hiện đại, Nohu56 đều có thể đáp ứng mọi nhu cầu, giúp bạn luôn cảm thấy hứng thú mỗi khi truy cập.
Bên cạnh việc cung cấp nội dung chất lượng, Nohu56 đặc biệt chú trọng đến yếu tố bảo mật và quyền riêng tư. Hệ thống được trang bị công nghệ bảo mật tiên tiến, đảm bảo thông tin cá nhân của người dùng luôn được bảo vệ tối đa. Mọi hoạt động truy cập đều được mã hóa để ngăn chặn rủi ro và đảm bảo an toàn tuyệt đối. Chính sách bảo mật chặt chẽ giúp người dùng yên tâm tận hưởng trải nghiệm mà không cần lo lắng về các vấn đề liên quan đến dữ liệu cá nhân.
Ngoài ra, Nohu56 còn sở hữu đội ngũ chăm sóc khách hàng chuyên nghiệp, hoạt động 24/7 để hỗ trợ và giải đáp mọi thắc mắc một cách nhanh chóng. Với phương châm đặt người dùng làm trung tâm, nền tảng luôn đảm bảo rằng mọi yêu cầu đều được xử lý kịp thời. Dịch vụ chăm sóc tận tâm này giúp tạo dựng sự tin tưởng và gắn kết lâu dài giữa Nohu56 và cộng đồng người dùng. Bất cứ khi nào gặp vấn đề, bạn đều có thể nhận được sự trợ giúp một cách dễ dàng.
Với sự kết hợp giữa công nghệ tiên tiến, nội dung chất lượng cao, bảo mật an toàn và dịch vụ khách hàng chuyên nghiệp, Nohu56 đã khẳng định được vị thế vững chắc trên thị trường giải trí số. Không ngừng cải tiến và nâng cấp, nền tảng này mang đến một không gian trải nghiệm hiện đại, hấp dẫn và đáng tin cậy. Nếu bạn đang tìm kiếm một điểm đến giải trí toàn diện, tiện lợi và an toàn, Nohu56 chắc chắn là lựa chọn hoàn hảo dành cho bạn.
-
![](/static/nostr-icon-purple-64x64.png)
@ e3ba5e1a:5e433365
2025-02-05 17:47:16
I got into a [friendly discussion](https://x.com/snoyberg/status/1887007888117252142) on X regarding health insurance. The specific question was how to deal with health insurance companies (presumably unfairly) denying claims? My answer, as usual: get government out of it!
The US healthcare system is essentially the worst of both worlds:
* Unlike full single payer, individuals incur high costs
* Unlike a true free market, regulation causes increases in costs and decreases competition among insurers
I'm firmly on the side of moving towards the free market. (And I say that as someone living under a single payer system now.) Here's what I would do:
* Get rid of tax incentives that make health insurance tied to your employer, giving individuals back proper freedom of choice.
* Reduce regulations significantly.
* In the short term, some people will still get rejected claims and other obnoxious behavior from insurance companies. We address that in two ways:
1. Due to reduced regulations, new insurance companies will be able to enter the market offering more reliable coverage and better rates, and people will flock to them because they have the freedom to make their own choices.
2. Sue the asses off of companies that reject claims unfairly. And ideally, as one of the few legitimate roles of government in all this, institute new laws that limit the ability of fine print to allow insurers to escape their responsibilities. (I'm hesitant that the latter will happen due to the incestuous relationship between Congress/regulators and insurers, but I can hope.)
Will this magically fix everything overnight like politicians normally promise? No. But it will allow the market to return to a healthy state. And I don't think it will take long (order of magnitude: 5-10 years) for it to come together, but that's just speculation.
And since there's a high correlation between those who believe government can fix problems by taking more control and demanding that only credentialed experts weigh in on a topic (both points I strongly disagree with BTW): I'm a trained actuary and worked in the insurance industry, and have directly seen how government regulation reduces competition, raises prices, and harms consumers.
And my final point: I don't think any prior art would be a good comparison for deregulation in the US, it's such a different market than any other country in the world for so many reasons that lessons wouldn't really translate. Nonetheless, I asked Grok for some empirical data on this, and at best the results of deregulation could be called "mixed," but likely more accurately "uncertain, confused, and subject to whatever interpretation anyone wants to apply."
https://x.com/i/grok/share/Zc8yOdrN8lS275hXJ92uwq98M
-
![](/static/nostr-icon-purple-64x64.png)
@ 876c2d06:5b86e2af
2025-02-06 18:05:52
Kimsa6868 là một nền tảng giải trí kỹ thuật số tiên tiến, mang đến trải nghiệm mượt mà và tiện lợi cho người dùng. Với giao diện hiện đại, thân thiện và dễ sử dụng, nền tảng này giúp người dùng dễ dàng thao tác trên mọi thiết bị, từ máy tính, điện thoại đến máy tính bảng. Công nghệ tiên tiến được áp dụng nhằm đảm bảo tốc độ xử lý nhanh chóng, giúp người dùng có thể truy cập mọi lúc, mọi nơi mà không gặp bất kỳ gián đoạn nào. Kimsa6868 không ngừng cải tiến hệ thống để mang đến những trải nghiệm tối ưu nhất.
Điểm nổi bật của <a href="https://kimsa6868.online">KIMSA6868</a> chính là kho nội dung phong phú, đa dạng và chất lượng cao, luôn được cập nhật thường xuyên để đáp ứng nhu cầu của người dùng. Hình ảnh sắc nét, âm thanh sống động cùng hiệu ứng chân thực giúp tạo nên không gian giải trí hấp dẫn, mang lại cảm giác lôi cuốn ngay từ những lần trải nghiệm đầu tiên. Không chỉ tập trung vào việc nâng cao chất lượng nội dung, nền tảng còn không ngừng đổi mới công nghệ nhằm tạo ra những tính năng hiện đại, giúp người dùng có thêm nhiều sự lựa chọn phù hợp với sở thích của mình.
Bên cạnh nội dung hấp dẫn, Kimsa6868 đặc biệt chú trọng đến yếu tố bảo mật và an toàn thông tin. Hệ thống áp dụng các công nghệ bảo mật tiên tiến, đảm bảo dữ liệu cá nhân của người dùng được bảo vệ tối đa. Mọi hoạt động truy cập đều được mã hóa nhằm ngăn chặn rủi ro, mang lại sự yên tâm tuyệt đối cho người dùng. Việc đảm bảo an toàn và minh bạch trong mọi thao tác đã giúp Kimsa6868 trở thành một nền tảng uy tín, được đông đảo người dùng tin tưởng và lựa chọn.
Ngoài ra, Kimsa6868 sở hữu đội ngũ chăm sóc khách hàng chuyên nghiệp, luôn sẵn sàng hỗ trợ 24/7 để giải đáp mọi thắc mắc. Với phương châm đặt trải nghiệm người dùng lên hàng đầu, đội ngũ hỗ trợ luôn sẵn sàng tiếp nhận và xử lý nhanh chóng mọi yêu cầu. Người dùng có thể dễ dàng liên hệ để nhận được sự trợ giúp tận tình, đảm bảo quá trình trải nghiệm không bị gián đoạn. Sự tận tâm và chuyên nghiệp của đội ngũ hỗ trợ là một trong những yếu tố giúp Kimsa6868 khẳng định vị thế vững chắc trên thị trường.
Với những ưu điểm vượt trội về công nghệ, nội dung, bảo mật và dịch vụ chăm sóc khách hàng, Kimsa6868 đã trở thành một trong những nền tảng giải trí kỹ thuật số hàng đầu hiện nay. Sự kết hợp giữa giao diện hiện đại, tốc độ xử lý nhanh và dịch vụ chuyên nghiệp đã giúp nền tảng này chiếm được lòng tin của đông đảo người dùng. Nếu bạn đang tìm kiếm một không gian giải trí chất lượng, an toàn và tiện lợi, Kimsa6868 chắc chắn sẽ là một lựa chọn hoàn hảo.
-
![](/static/nostr-icon-purple-64x64.png)
@ 2e8970de:63345c7a
2025-02-06 17:05:48
![](https://pbs.twimg.com/media/Gik8btRbYAEvIh4?format=jpg&name=medium)
> Tough math teachers get lower ratings from students, because students like them less. However, students get better grades with the tough teachers than with laxer teachers. Reason #167 why student evaluations of teaching aren’t particularly useful.
https://www.stevestewartwilliams.com/p/implicit-bias-training-the-psychology
originally posted at https://stacker.news/items/877830
-
![](/static/nostr-icon-purple-64x64.png)
@ 89ccea93:df4e00b7
2025-02-06 16:28:15
**[Original Post](https://expatriotic.me/robosats/)**
## Why use RoboSats
### 1. Lightning Fast
* LN Hodl invoices serve as bonds & escrows for high assurance and speed.
### 2. Absolutely Private
* Best privacy practices by default.
* Simple and KYC-free.
* You will generate a random Robot avatar for a single use.
* The exchange is Tor-only.
### 3. Open Source
* RoboSats is fully open source. - [Github](https://github.com/RoboSats/robosats)
*I'm going to use the Tor Browser on desktop for this guide. But the android app is essentially identical. So the flow should be the same.*
```I prefer Bisq for buying as I can get really good deals. Plus the use of a larger deposit helps to secure things. However, Bisq is onchain only, so in a higher fee environment, it could get pricey. RoboSats however is using lightning.```
*BTW, for Bisq if the miner fees get higher, check out a [Monero based fork](https://github.com/retoaccess1/haveno-reto) where you can pay the deposit in Monero, as this will help with miner fees. Plus generally speaking, and especially in a high fee environment, Monero fees should be lower.*
## Step 1 - Download or use in Tor browser
1. Use <http://robodexarjwtfryec556cjdz3dfa7u47saek6lkftnkgshvgg2kcumqd.onion/> for use in Tor Browser
2. Download APK from Github and check signature to make sure it's signed with the Reckless-Satoshi [PGP key](https://keys.openpgp.org/vks/v1/by-fingerprint/B4AB5F19113D4125DDF217739C4585B561315571) (if this is something you know how to do. Explaining it is outside the purview of this article) - <https://github.com/RoboSats/robosats/releases/>
## Step 2 - Roll a Robot
*Image 1 - GARAGE tab*
![](https://m.stacker.news/76350)
1. For regular mode click "*🚀START*". A robot will be given to you. You'll be prompted to save a unique string that will help you log back in to that specific robot. Helpful if you initiate a trade. If you wanted to make an order directly, I recommend you skip step one and go to directly to step two.
*Image 2 - Start menu*
![](https://m.stacker.news/76353)
*Image 3 - After rolling a robot*
![](https://m.stacker.news/76352)
*Image 4 - Prompted to browse or make an order.*
![](https://m.stacker.news/76362)
2. If you want to make create an order, skip down to "*➡️ FAST GENERATE ORDER*"
*Image 2 - Start menu*
![](https://m.stacker.news/76353)
*Image 5 - FAST GENERATE ORDER*
![](https://m.stacker.news/76354)
## Step 3 - Go to the OFFERS tab
*Image 6 - OFFERS tab*
![](https://m.stacker.news/76391)
1. Select BUY/SELL depending on your need.
2. Select currency. Just look for the "**🌎 ANY**" and pick your currency from the drop down menu.
3. Filter payment method by clicking "**METHOD**" and selecting one of the options, or simply start typing and watch your option pop up.
4. Click "*Premium*" until it sorts from the lowest premium to the highest.
## Step 4 - Select/Create an offer
*Image 7 - taking an offer*
![](https://m.stacker.news/76395)
1. Take the order (or make one) and if the person had a range, put in how much bitcoin you wish to buy.
2. Click take order
## Step 5 - Receiving the bitcoin
1. Pay a small deposit to lock in the order
*Image 8 - taking order*
![](https://m.stacker.news/76398)
2. Paste in a LN invoice for the amount of LN sats to be received. (see Addendum #2)
3. Pay using fiat method preselected
4. Bitcoin is paid out of escrow and into the LN invoice that you gave.
## Addendum
1. Use this for more help - <https://learn.robosats.com/>
2. If you don't wish to receive in lighting, then in Step 5, instead of your own LN invoice, use one from https://boltz.exchange/swap. You can do this natively in RoboSats, but they charge an arm and a leg.
originally posted at https://stacker.news/items/877796
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-06 16:14:00
I would have done about an hour better today, but my hatred of food waste got the best of me. My daughter wanted the crusts cut off of her toast and, since no one else was going to eat them, I gobbled them up.
That was the last thing I ate, yesterday, though, and I didn't eat or drink anything for the next 16 hours. Still pretty good.
## Score Card
Day 1: 14 hour fast (13 dry)
Day 2: 15 hour fast (14 dry)
Day 3: 17 hours (16 dry)
Day 4: 18 hours (17 dry)
Day 5: 18 hours (16 dry)
Day 6: TBD (16 dry)
originally posted at https://stacker.news/items/877787
-
![](/static/nostr-icon-purple-64x64.png)
@ fdc85145:e465bf18
2025-02-06 16:13:36
Preserve your vehicle's paint with our high-quality [paint protection film](https://www.autoandmarinedetailing.co.nz/paint-protection-film-auckland) at Auto and Marine Detailing. This transparent film acts as a shield against scratches, rock chips, and harmful UV rays. Custom-fit to your car, it ensures complete coverage without altering its appearance. Our team provides expert installation, so your vehicle remains in pristine condition, retaining its value for years to come.
-
![](/static/nostr-icon-purple-64x64.png)
@ f6b1e489:f1c91bc4
2025-02-06 15:59:52
# Psychedelics and Bitcoin
Almost everyone who gets into bitcoin at some point realizes how it destroys your mental models of the world. You start questioning the _status quo_ and experience a serious rewiring of the brain. This can be confusing and frightening at first. But in hindsight it is mostly viewed as positive and people end up being a different, better person. Less focussed on hedonistic consumption, more focussed on long term health and wealth.
# Rewiring the Brain
I realized that psychedelics (like LSD or Psilocybin) and learning Bitcoin had a similar effect on my brain. The closest to my head-over-heels experience down the Bitcoin rabbithole were my experiences with LSD long before I discovered Bitcoin. Both shaped my life in an unexpected but positive way. I can´t talk about psychedelic experiences with most of my family, similar as with Bitcoin. They just don´t get it. And at this point I won´t bother trying to explain it anymore.
# Volatility
Then there is the volatility aspect. Psychedelic trips can be quite volatile, you never know what to expect. There is always some level of loss of control and you have to be fine with it. Similar with Bitcoin: You have to be able to stand the ups and downs, one day feeling like a genius, being full of doubt the next day.
# Questioning Authority
There are also some historical and cultural parallels between the spread of LSD in the 60s and Bitcoin today. In the 1960s Timothy Leary coined the term "_Turn on, tune in, drop out_". Large parts of the youth counterculture discovered the freeing effect of LSD on the mind and said "Fuck it, we´re not gonna participate in your wars". They challenged authority and the societal norms. Today, bitcoiners find the freedom of Bitcoin. They like to opt out of the system and say "Fuck it, we´re not gonna participate in your bullshit any longer". Passionate, freedom-loving communities have formed around both phenomena.
What are your thoughts on this? Do you have similar experiences? Did I miss anything?
originally posted at https://stacker.news/items/877770
-
![](/static/nostr-icon-purple-64x64.png)
@ fd208ee8:0fd927c1
2025-02-06 15:58:38
## Beginning at the start
In my previous article, [The Establishment](https://next-alexandria.gitcitadel.eu/publication?d=the-gitcitadel-blog-the-establishment-3-by-stella-v-1), I answered the question: "How do we form a company?" I realize, now, that I was getting a bit ahead, of myself, as the precursor to a *company* is a *team*, and many people struggle to form teams. So, I will go back to the beginning, and then you can read both articles to the end, and then stop.
## The Initiation
The first, and most-difficult step of team formation, is *the initiation*. We know that it must be the most-difficult, as it's the step that carries the highest potential reward, and it's the step that is tried-and-failed most often. (Some people, like Elon Musk or Donald Trump, are born Initiators with excellent follow-through, but this archetype is exceedingly thin on the ground because it requires you to be mildly autistic, have barely-throttled ADHD, and/or tend to megalomania, also popularly known as "toxic masculinity", "CEO personality", or "being a successful military officer".)
Someone needs to form a useful, attractive Vision and then motivate other people to help them achieve it. That sounds really easy, but it's actually brutally difficult because
* You have to come up with an idea that is coherent, plausible, and inspiring.
* You have to be able to communicate that idea to other people and make it appealing to them, by tying it into their own personal goals and desires.
* You have to be able to hone and reformulate that idea, constantly, to correct it or to re-motivate the other team members.
* You have to defend the idea against detractors, naysayers, and trolls, and you have to do it so vociferously, that it will erode your own popularity among those who disagree with you and open you to personal attacks.
* You have to be able to focus on the idea, yourself, for a long stretch of time, and not allow yourself to get bored, lazy, or distracted.
![Ein Bock](https://upload.wikimedia.org/wikipedia/commons/thumb/1/1a/Schafbock_Bretonisches_Zwergschaf.JPG/1200px-Schafbock_Bretonisches_Zwergschaf.JPG)
So, just do and be all of those things, and then initiate the team, with the method I will name the *Hatbock Method*. It is so named because of the classic, German initiation ritual, in which an Initiator stands up, loudly defines their Vision and calls into a group "Wer hat Bock?" (roughly, "Who has the hunger/desire?") and whoever responds with "Ich hab Bock." (roughly, "Yes, I hunger for this.") is a part of the team.
Then the Initiator says, "Okay, everyone with the hunger, let's sit down together, and discuss this some more." (This "sitting" is literally called a "seating", or "Sitzung", which is the German word for "meeting".)
## The Sitting
We now get to the second most difficult part of team formation: figuring out *where to sit*. Most teams get this wrong, repeatedly, and many teams dissolve or fracture under the difficulty of this momentous decision. You would think organizing yourselves online would make this easier ("Oh, we'll just meet online!"), but the number of places available for sitting online are limitless. You can talk your whole Vision into the ground, with laborous discussions and migrations between Chachi, OxChat, Telegram, SimpleX, Slack, Discord, WhatsApp, GitHub, Teams, Coracle, Matrix... you get the idea.
Try to keep in mind that the Vision is more important than the seating area, and go with the flow. Simply, find someplace and go there. Worry about it again, at a later date. Don't lose momentum. Sit down and start discussing the Vision, *immediately*.
![Sitzbank](https://muenchenunterwegs.de/content/2239/ratschbankerlclhm-nagy.jpg)
Now, this next bit is very important:
> Do not let anyone outside your team influence where you sit!
...unless they are providing your team with some good, service, or income, that makes choosing their preferred location the superior choice.
This is the German *Stammtisch* principle, where a host encourages you to come sit down, regularly, in some particular place, because your sitting there provides them with some benefit: they can overhear your conversations, get you to test out their seating area, sell you refreshments, etc. Your choice of seating, in other words, is a valuable good, and you should only "sell" it to someone who rewards you in measure. They have to reward you because their preferred seating area wasn't your immediate and obvious choice, so there was probably something unappealing or uncertain about the seating area.
## Plan it in
Once you've sat down, and finished your rough draft of the Vision, you need to figure out *when to sit*. This is the third most-difficult part of team formation. (Yes, don't worry, it gets easier as it goes along.)
The most popular plan is the Wirsehenuns Plan (roughly, "We'll see each other, around.") This can work quite well, if you just want to have a loose collaboration, that calls itself together in an ad hoc fashion, when a team member feels the need. Also known as "@ me, bros".
It's not a great plan for more intensive collaboration, as that tends to need a certain amount of velocity, to actually happen, as the speed of movement has a centrifugal effect on the tasks. Team momentum, in other words, creates a sort of gravity, that keeps the team together as a unit. So, for deeper teamwork, I would recommend the Stammtisch variant: name a place and date/time, when you will next meet. Preferably, on a rotating schedule: daily, weekly, last Thursday of the month, etc.
And then meet there and then. And discuss amongst yourselves. Set clear, short-term tasks (and assign them to particular people!), medium-term strategies, and longer-term goals. *Write everything down.* Anything not written down, is a suggestion, not an assigned task.
If you find your Stammtisch becoming increasingly rewarding and productive, and your goals start moving closer and closer into sight, then you might want to formalize your team structure further, [as a company](https://next-alexandria.gitcitadel.eu/publication?d=the-gitcitadel-blog-the-establishment-3-by-stella-v-1).
-
![](/static/nostr-icon-purple-64x64.png)
@ 52adc2ef:9f4bc0ba
2025-02-06 14:39:36
ใครบอก“คนเก่งกว้าง”ไม่ประสบความสำเร็จ
มาเข้าใจเทคนิค เก่งกว้าง เพื่อประสบความสำเร็จกัน
เราว่าทุกคนคงเคยโดนปลูกฝังมาว่า ชีวิตเราต้องเรียนรู้ให้เก่งเฉพาะด้านไปเลย
ถึงประสบความสำเร็จ
แต่เราเป็นคนนึงที่ไม่ได้มีความเก่งเฉพาะด้านขนาดนั้น (คิดว่าส่วนใหญ่เหมือนกัน)
กระทั่งมาอ่านหนังสือ **`*How to be better at (almost) everything*`**
ได้เจออีกมุมมองว่า ทุกทักษะสามารถนำมาประยุกต์ใช้เเละสามารถพาเรามีข้อได้เปรียบมากกว่า
คนเก่งลึก ไม่ได้บอกคนเก่งลึกไม่ดีนะครับ เเต่จะชี้ไปว่าเก่งกว้างก็มีข้อดีของมัน
### การเก่งกว้าง
1.ไม่จำเป็นต้องเก่งเป็น The Best ก็สามารถประสบความสำเร็จได้
2.การรู้หลายทักษะสามรถที่จะ adopt ในการทำสิ่งใหม่ได้ เหมือนเเซนวิส
ที่ต้องมี ขนมปัง ผักต่างๆ เนื้อสัตว์ ประกอบเข้าด้วยกัน
3.เเละเมื่อเรามี skill ต่างๆที่หลากหลาย จะทำให้คู่แข่งของเราน้อยลง
เช่น เพื่อนๆเป็นนักวิ่งที่เก่งมาก เเต่ไม่ถึงกับเก่งที่สุดในรุ่นก็ได้
เเต่ถ้ามีทักษะการการเขียน
เราว่าจะสามารถถ่ายทอดเเละสื่อสารได้ดีกว่า นักวิ่งที่อาจจะวิ่งเก่งกว่าเรา
เเละสามารถให้คนรู้จักเราได้มากกว่า
4.เเละเมื่อเรามีทักษะที่สนใจเเล้ว
คนเราเปลี่ยนเเปลงตัวเองได้ เกิดจากสิ่งที่เราทำมากกว่าสิ่งที่เรารับ
เพราะต้องฝึกฝนเพื่อให้เกิดการเปลี่ยนแปลง
### อิสระในการเลือก
การมีอิสระในการเลือก เป็นสิ่งที่ทุกคนต้องการอยู่เเล้ว เเต่ในเมื่อเรามีสิทธิ์เลือก
จะทำให้เราไม่ focus
กับสิ่งที่ทำ เเต่การเป็นอิสระต้องเก่งก่อน หรือเรียกว่า
**`อิสระความเป็นเลิศ`**
ตัวอย่างเช่น
เราอยากจะเล่นกีต้าร์ อาจจะฝึกเล่น คอร์ดต่างๆ ฝึกไล่สเกล picking ลูกเล่น
ถ้าเราเเค่มีอิสระที่จะเลือกเล่นก็อาจได้เเค่ตีคอร์ด ร้องเพลง แค่นั้น
เเต่ถ้าเรามีอิสระความเป็นเลิศ เมื่อเราฝึกสิ่งที่ยากเก่งกว่าคนทั่วไป
(เดี๋ยวจะบอกว่าควรฝึกมากเท่าไหร่) เราจะมีอิสระในการทำสิ่งนั้นๆ
เราจะสามารถเล่นได้อย่างอิสระอย่างแท้จริง สามารถที่จะคิด หรือ หยิบลูกเล่นต่างๆมาใช้ เพราะ เราจะรู้ว่าเทคนิคนี้ควรใช้ตรงไหน รู้ทั้งหมดก่อนเพื่อที่จะได้เลือกใช้
เชื่อเถอะ ความสุขเกิดจากการฝึกฝนเเละลงมือทำ
### กฎ 5 ข้อของคนเก่งกว้าง
**1.เรียนรู้หลายๆทักษะเเละนำทักษะทั้งหมดมารวมกัน**
เช่น เพื่อนๆเล่นกีต้าร์เก่งเเบบ เทพสุดๆ เเต่ไม่มีทักษะ การขายตัวเอง
ต้องพึ่งพาคนอื่นในการหางานเเสดงต่างๆ
กลับกันถ้าเล่นเก่งประมาณนึง เเละเล่นำด้หลายหลาย มีทักษะการขาย ที่เรียนรู้มา
ก็มีโอกาสที่เราจะได้งานเเละเป็นที่รู้จักมากกว่า
**2.Focus ฝึกฝนเพื่อเก่งระยะสั้น**
การจะมีทักษะใหม่เพิ่มเข้ามา บางคนกลัวว่าทักษะเดิมที่อยู่เเล้วจะไม่พัฒนา
เเต่ต้องพัฒนาทักษะใหม่โดยยอมเสียทักษะเดิมไปนิดหน่อย เพื่อพัฒนาเอาทักษะมาใช้ร่วมกัน
**3.เก่งในทักษะนั้นๆ อย่างน้อย 80%**
มาตรวัดคือ เมื่อเราฝึกฝนสิ่งนั้นเเล้ว การใช้เวลาในการฝึกฝนมากกว่าผลลัพธ์ที่ออกมา
เเสดงว่าเราถึงจุดที่ทบทวนทักษะของตัวเองว่า ควร focus ทักษะอื่นๆมั้ย
เช่น ยกน้ำหนัก เราจะยกได้มากขึ้นในช่วงๆเเรก เเต่เมื่อถึงจุดนึง ที่ไม่ว่าเราเพิ่มน้ำหนักเข้า
เพียงเล็กน้อย เรากลับใช้เวลามากในการฝึกฝน
**4.Focus เเต่ทักษะที่จำเป็นตามเป้าหมาย**
เราต้องหาประโยชน์ที่เราจะฝึกฝนในทักษะนั้นๆ โดยตัดส่วนที่ไม่จำเป็นออกไปก่อน
เช่น ฝึกเล่นกีต้าร์ที่มีท่อน solo ยากๆ ให้อยากท่อนฝึก เเต่ละช่วงให้เก่ง เเละ ค่อยfocus ในส่วนต่อไป
**5.เพิ่มระดับความยาก**
ถ้าอยากจะเพิ่มทักษะใดๆก็ตาม ต้องเพิ่มระดับความยาก
เป็นไปไม่ได้เลยเเม้เราจะมีวินัยในการฝึก เเต่เหมือนเดิมทุกวัน
ไม่มีทางที่เราจะเก่งมากขึ้น
### ทักษะสำหรับคนเก่งกว้าง
การจะเก่งกว้างนั้นต้องมีักษะพื้นฐานที่จำเป็นด้วย
1. ทักษะพื้นฐาน เช่น ทักษะการใช้เหตุผล ทักษะการโน้มน้าว
เป็นสิ่งพื้นฐานที่คนเราทุกคนควรต้องมี
2. ทักษะที่เราสนใจ
ถ้าเรามีสิ่งที่เราสนใจ เราสามารถฝึกฝนมันได้ดีมากขึ้น
3. ทักษะการขาย
เป็นสิ่งที่ขาดไม่ได้เลย เพราะเมื่อเพื่อนๆมีความสามารถ ควรที่จะให้คนอื่นรับรู้
ของคุณค่าสิ่งที่คุณมี
เมื่อเราทราบเเล้วมาเราควรต้องมีทักษะอะไรบ้าง
**`ระเบียบวินัย`**
- คือ การทำตามคำสั่งของตัวเอง โดยมีเเรงบัลดาลใจจากสิ่งที่ไม่ได้ชอบ
- สามารถเพิ่มความมั่นใจให้แก่เราได้ ตอนเริ่มต้นในการเริ่มต้นทักษะ เราจะไม่มีความมั่นใจเลย
เพราะเราไม่เก่งมากพอ เเต่เมื่อเราทำจนเกิดผลลัพธ์ ความมั่นใจและระเบียบวินัยจะตามมา
- เพิ่ม Passion จากที่เราทำสิ่งที่ไม่ถนัดหรือไม่ชอบ เเต่เริ่มได้ skill เราจะเริ่มสนุกเเละมีความหลงใหลในทักษะนั้นๆ
**`สมาธิ`**
- โดยธรรมชาติ จะมี ”`แรงต้าน`” เพื่อที่จะทำให้เราพ่ายแพ้ต่อสิ่งที่เราตั้งใจหรือ Focus
- สมาธิ หมายถึง การควบคุมสิ่งที่คิดในหัวตัวเองได้ เช่น เริ่มมีเเรงบัลดาลใจในการเขียน
เเต่ก็อาจจะมี comment เเย่ๆ ที่เราต้องไปตอบโต้ก่อน ทำให้จากความตั้งใจเดิมของเรานั้นเสียไป
**`การโน้มน้าว`**
- ต้องหาเหตุผลสิ่งที่เราเชื่อเเละยึดมั่นในการให้เหตุผลสิ่งนั้นๆ
- การโน้มน้าวความโน้มน้าวกับคนที่เห็นด้วยกับเพื่อนๆ ซึ่งนั้นสามารถสร้างความสุขให้เค้าได้
- เเต่เมื่อคุณโน้มน้าวกับคนที่ไม่เห็นด้วยกับเพื่อนๆ ไม่มีทางแน่ๆที่เค้าจะฟัง
**`เหตุผล`**
- การมีเหตุผลคือ การที่เราสามารถที่จะเเสดงจุดยืนของตัวเองได้
**`ความเชื่อ`**
- ความเชื่ออยากจะเชื่อในสิ่งที่เป็นวิทยาศาสตร์ หรือ สิ่งเหนือธรรมชาติ ก็ได้
ถ้ามีเหตุผลที่ดีในการเชื่อ เท่านั้นพอ
- คนเราไม่สามารถที่จะพิสุจน์เรื่องเหนือธรรมชาติได้ ถ้าสิ่งนั้นอยู่เหนือธรรมชาติ
หมายความว่า อยู่เหนือขอบเขตของวิทยาศาสตร์ไปแล้ว ไม่สามารถที่จะเอาหลักการวิทยาศาสตร์มาคุยได้
- “ความทุกข์ยาก จำเป็นในการสร้างคุณค่าของมนุษย์”
### ค้นหาทักษะที่ชอบ
เมื่อพบทักษะที่สนใจจริงๆเเล้ว ควรต้องฝึกฝน เเค่คุณชอบหรือให้ความสำคัญกับมันมากพอ
คุณก็จะมีเวลาในการฝึกซ้อมกับมัน
อย่าลืม Focus เเต่การฝึกทักษะจำเป็น
การทำสิ่งที่ชอบ มีความสุข เเละดีต่อผู้อื่น นั้นคือการดำเนินชีวิตที่ถูกต้อง
เเละอย่าท้อ งานทุกชิ้นเกิดจากส่วนย่อยหลายๆส่วนประกอบกัน
เหมือนเเต่งเพลงโดยนำทำนองง่ายๆมาประกอบกันจนซับซ้อน
### ทักษะที่เรามี ต้องสร้างประโยชน์แก่สังคม
โดยทั่วไปเเล้วมนุษย์เราตัดสินใจในลักษณะเดียวกันคือ
**`สิ่งนั้นมีประโยชน์หรือส้รางความสุขแก่ตนเอง`**
- เมื่อการตัดสินใจเป็นแบบนี้ ทำให้เศรฐกิจโตที่โตได้ เพราะ ทุกคนในสังคมมอบประโยชน์ให้แก่กัน
- หมั่นสังเกต เเละ เรียนรู้ จากตลาดว่า ผู้คนใช้จ่ายไปกับอะไร เเละ หาว่าทักษะของเรานั้น
ให้ประโยชน์อะไรกับผู้คนเหล่านั้นได้บ้าง
- ***ทักษะการขายสำคัญมากกก***
- เพื่อนๆจะมีความสุข เมื่อสิ่งที่ทำนั้นยากเเละมีความหมาย
> *สุดท้ายเตือนตัวเองว่า
เหตุผลเเรกที่เราเริ่มทำอะไรบางอย่างคืออะไร
อย่าลืมความรู้สึกตอนนั้น*
>
-
![](/static/nostr-icon-purple-64x64.png)
@ f1989a96:bcaaf2c1
2025-02-06 14:01:03
Good morning, readers!
In India, the central bank has taken a significant step toward launching its central bank digital currency (CBDC), the digital rupee. In partnership with fintech firms Mobikwik and Cred, the digital rupee is now available to 180 million users through a new “e₹ wallet,” a CBDC wallet app designed for public use. Predictably, the CBDC comes with tight restrictions, including limits on payment amounts and frequency and extensive personal data collection, raising concerns over financial privacy.
In open-source news, HRF is pleased to announce a collaboration with MIT for the 2025 MIT Bitcoin Expo. This two-day freedom-focused event will explore how Bitcoin and adjacent freedom tech can help combat financial surveillance and repression under authoritarian regimes through expert speakers, panels, workshops, and more. Elsewhere, Joltz became the first self-custodial wallet to support Taproot Assets, enabling access to stable digital dollars on a decentralized network for activists, dissidents, and others in difficult political environments.
We conclude with an extensive guide from Area Bitcoin, a Brazilian education hub, thoroughly examining Brazil’s DREX CBDC and its implications for financial freedom and human rights in Brazil and beyond.
**Now, let’s dive right in!**
### [**Subscribe Here**](https://mailchi.mp/hrf.org/financial-freedom-newsletter?mc_cid=bf652c0a5a)
## **GLOBAL NEWS**
#### **India | Central Bank Partners with Fintech Firms to Pilot Launch CBDC**
The Reserve Bank of India (RBI) [partnered](https://www.businesstoday.in/personal-finance/news/story/mobikwik-cred-join-hands-with-rbi-to-fully-launch-cbdc-ers-for-android-check-features-usage-462318-2025-01-28) with fintech firms MobiKwik and Cred, alongside Yes Bank, to expand the digital rupee, India’s CBDC. With a combined user base of [180 million,](https://www.ledgerinsights.com/fintech-wallets-go-live-in-digital-rupee-cbdc-pilot/) Mobikwik and Cred will act as entry points for public access to the CBDC through their new “e₹ wallet” CBDC app. However, the app mandates video verification and imposes significant restrictions. For instance, a daily transaction cap of ₹50,000 ($577) and ₹10,000 ($115) limit per transaction. The RBI’s decision to embed the digital rupee within existing fintech firms to boost adoption leaves few avenues for financial privacy and freedom as the Indian state [pushes](https://www.lowyinstitute.org/the-interpreter/india-s-plan-world-without-cash) further towards a cashless economy.
#### **El Salvador | Lawmakers Scale Back Bitcoin Legal Tender Law**
El Salvador’s congress [amended](https://www.reuters.com/world/americas/lawmakers-el-salvador-rush-new-bitcoin-reform-after-imf-deal-2025-01-30/) its Bitcoin law, making private sector acceptance of Bitcoin voluntary. The reform follows a $1.4 billion loan agreement with the International Monetary Fund (IMF) that wanted to limit the government’s, citizens’, and economies’ exposure to Bitcoin. Salvadoran lawmaker Elisa Rosales [said](https://www.reuters.com/world/americas/lawmakers-el-salvador-rush-new-bitcoin-reform-after-imf-deal-2025-01-30/) the latest reform guarantees Bitcoin’s “permanence as legal tender” while facilitating its “practical implementation.” But, John Dennehy, founder of the civil society organization [Mi Primer Bitcoin](https://es.myfirstbitcoin.io/), [explained](https://x.com/jdennehy_writes/status/1885346352621617615) that the reform removed “all references of bitcoin as money or legal tender, plus the actual conditions, such as the government accepting bitcoin for things such as taxes, are now prohibited.” The future of freedom technology in El Salvador will be worth monitoring closely as the regime continues to erode protections on civil liberties.
#### **Nigeria | Regime Hikes Telecom Tariffs for Citizens**
In Nigeria, the regime approved a [50% increase](https://thenationonlineng.net/50-tariff-hike-a-necessary-step-or-a-burden-for-nigerians/) in telecom tariffs, further straining citizens already grappling with financial instability. Call rates will rise from 11 to 16.50 naira per minute ($0.0074 to $0.011) and SMS charges from 4 to 6 naira ($0.0026 to $0.004), exacerbating three-decade-high inflation as the ripple effects spread through the economy. Telecom companies justify the price hike as necessary for the sector’s survival amid the naira’s ongoing [devaluation](https://www.bloomberg.com/news/articles/2024-09-13/why-nigeria-s-naira-currency-ngn-usd-slumped-and-why-it-matters). [Deolu Ogunbanjo](https://www.linkedin.com/in/deolu-ogunbanjo-62b5a18b/?originalSubdomain=ng), president of the National Association of Telecoms Subscribers, however, [argues](https://thenationonlineng.net/50-tariff-hike-a-necessary-step-or-a-burden-for-nigerians/) that “this decision shows the government cares more about protecting profits than protecting people.” For Nigerians relying on mobile networks for work, banking, and daily communications, the increased costs will make phone services less accessible, putting even more pressure on civil society under an authoritarian government.
#### **Nicaragua | Inter-American Court of Human Rights Rules Against Ortega**
In Nicaragua, where the financial repression of individuals, opposition, and civil society is widespread, the Inter-American Court of Human Rights [ruled](https://havanatimes.org/news/inter-american-human-rights-court-rules-against-nicaragua/) that Daniel Ortega’s reelections since 2011 were illegitimate. This ruling “is the legal confirmation that there is no legitimate president in Nicaragua, but rather a dictator who has usurped power,” [said](https://havanatimes.org/news/inter-american-human-rights-court-rules-against-nicaragua/) Jaime Aparicio, a Bolivian lawyer, [adding](https://havanatimes.org/news/inter-american-human-rights-court-rules-against-nicaragua/) that “this is the first time that there is a legal precedent determining the illegality of Ortega’s presidency.” In a country where the regime systematically [freezes](https://www.reuters.com/world/americas/nicaragua-govt-accuses-catholic-church-money-laundering-freezes-accounts-2023-05-27/) bank accounts, seizes assets, and [shuts down](https://www.catholicnewsagency.com/news/261539/nicaraguan-dictatorship-shuts-down-more-organizations-including-dominican-nuns) nonprofits to silence dissent, this verdict sets a critical legal precedent against the abuse of state power to secure reelection. While the court lacks enforcement, its ruling strengthens legal challenges to Ortega’s rule and could provide a foundation for future actions against electoral fraud and authoritarian control.
#### **Webinar Series for Nonprofits | Become Unstoppable**
In an era where financial control is weaponized against dissent, the ability to transact freely is more important than ever. For activists and nonprofits operating under oppressive regimes, Bitcoin can offer a way to resist censorship, protect funds, and remain operational.
Join HRF for a free, three-day webinar from March **17–19**, led by Anna Chekhovich, HRF’s Bitcoin nonprofit adoption lead and financial freedom expert at the Anti-Corruption Foundation. The sessions will run daily from **10:30 a.m. to 12:00 p.m. EDT** and are designed specifically to teach human rights defenders and nonprofit organizations how to integrate Bitcoin into their work to challenge state censorship and confiscation in a beginner-friendly way.
### [Register Here](https://docs.google.com/forms/d/e/1FAIpQLSf0sjqwSFQo8HGMsWIIDRyhx34TsoonOSTfYoWSy-aaBbLeSw/viewform)
## BITCOIN AND FREEDOM TECH NEWS
#### **MIT | 2025 Bitcoin Expo**
HRF is partnering with [MIT](https://www.mit.edu/) to host the [2025 MIT Bitcoin Expo](https://mitbtcexpo.org/), a two-day event from April 5-6 at the Stata Center, exploring Bitcoin and freedom technologies as tools for privacy, financial sovereignty, and civil liberties — especially for people living under authoritarian regimes. Now in its 12th year, the expo features keynotes, panels, technical workshops, and hackathons. It brings together developers, activists, students, and researchers to dive into privacy, self-sovereignty, and decentralization. Attendees will also gain hands-on experience and engage in meaningful discussions on the real-world impact of freedom technologies. Learn more about the expo and get your tickets [here](https://mitbtcexpo.org/)**.**
#### **Bitcoin Mining | Two Blocks Mined by Solo Miners This Week**
This week, two solo miners successfully mined Bitcoin blocks, marking a rare and significant event. The first block was [solved](https://x.com/FutureBit/status/1884740065223495821) through a collaborative effort led by the [256 Foundation](https://256foundation.org/) (where 300+ participants [pooled](https://crypto.news/solo-miner-solving-a-block-and-getting-3-146-btc/) their hashrate for a fundraising event). The second block was [mined](https://x.com/SoloSatoshi/status/1885418398345269572) independently through [solo.ckpool](https://solo.ckpool.org/) by a miner using hashrate equivalent to thousands of BitAxe devices, a type of open-source home mining hardware. The news shows that independent miners can still compete outside of large [mining pools](https://river.com/learn/terms/m/mining-pool/). These events reaffirm Bitcoin’s decentralization and censorship resistance, proving that solo mining remains viable with the proper coordination and infrastructure, which is especially key as solo mining can be done privately and quietly under tyrannical regimes.
#### **Joltz Wallet | First Self-Custodial Wallet to Support Taproot Assets**
Joltz has [launched](https://x.com/joltz_btc/status/1885097351108243487) the first self-custodial wallet for [Taproot Assets](https://docs.lightning.engineering/the-lightning-network/taproot-assets), enabling users to hold and transact stablecoins like USDT (Tether) directly on Bitcoin — without intermediaries. Unlike custodial solutions, Joltz ensures users retain full control over their funds while enabling BTC-to-USDT swaps through a user-friendly interface. This could expand access to stable money — particularly for activists and nonprofits in volatile markets in search of digital dollars. However, stablecoins still carry centralization and censorship risks, as issuers like Tether can freeze funds or be beholden to regulatory demands.
#### **Olas | New Updates Enhance Accessibility and Features**
[Olas](https://github.com/pablof7z/olas), an Instagram-like Nostr client built by [Pablof7z](https://github.com/pablof7z), [released](https://github.com/pablof7z/olas/releases/tag/0.2.0) a new update for iOS and Android. The update introduces multiple images per post, Instagram-style filters, and improved video playback. It also enhances its Nostr-native wallet functionality so users can more fluidly receive Bitcoin tips and payments. The client also made Nostr Wallet Connect (NWC), a protocol that allows apps to interact with Bitcoin Lightning wallets, more reliable for end users. Nostr clients like Olas may prove to be a useful tool for censorship-resistant communications on social networks among activists worldwide and stand as a stark contrast to centralized, permissioned alternatives.
#### **OpenSats | Announces Ninth Wave of Bitcoin Grants**
[OpenSats](http://opensats.org), a public nonprofit supporting open-source Bitcoin projects, [announced](https://opensats.org/blog/ninth-wave-of-bitcoin-grants) its ninth wave of Bitcoin grants advancing financial freedom and privacy. Among the recipients, [Nutstash](https://www.nutstash.app/), a multi-platform Cashu ecash wallet, enables private, censorship-resistant Bitcoin transactions — critical for human rights defenders. Another grantee, [El Tor](https://devpost.com/software/el-tor), is developing a fork of the [Tor Network](https://www.torproject.org/) integrated with Bitcoin's Lightning Network, aiming to enhance online privacy for activists and dissidents. HRF welcomes OpenSats’ continued support for decentralized tools in an increasingly surveilled world.
#### **bitcoin++ | Upcoming Bitcoin Developer Conference**
Bitcoin developers and freedom tech enthusiasts will [gather](https://btcplusplus.dev/conf/floripa) in Florianopolis, Brazil, from Feb. 19-22, 2025, for the special “hacking edition” [bitcoin++](https://btcplusplus.dev/) conference. Unlike past bitcoin++ events, which focused on single topics like scripting or ecash, this event will feature hands-on development to enhance Bitcoin’s privacy, scalability, and censorship resistance. Attendees will participate in workshops, live coding challenges, and technical discussions. HRF will help the event include attendees from authoritarian regimes in Latin America. Learn more about the conference or buy tickets [here](https://btcplusplus.dev/conf/floripa).
## RECOMMENDED CONTENT
#### **The Risks of the DREX Central Bank Digital Currency by Area Bitcoin**
In this [article](https://blog.areabitcoin.co/cbdc-drex/), [Area Bitcoin](https://www.areabitcoin.co/), a Brazilian Bitcoin education hub, examines [DREX](https://cbdctracker.hrf.org/currency/brazil), Brazil’s central bank digital currency (CBDC), and its threat to Brazilians’ financial autonomy. DREX operates as a token on a centralized, permissioned blockchain that grants officials sweeping surveillance and control over individual financial activity. Further, its strict Know-Your-Customer (KYC) and Anti-Money Laundering (AML) measures erode financial privacy. Area Bitcoin [warns](https://blog.areabitcoin.co/cbdc-drex/), “By embracing it, we risk surrendering our personal data, the fruits of our labor, and even generational wealth to political and bureaucratic oversight.”
*If this article was forwarded to you and you enjoyed reading it, please consider subscribing to the Financial Freedom Report [here](https://mailchi.mp/hrf.org/financial-freedom-newsletter?mc_cid=bf652c0a5a).*
*Support the newsletter by donating bitcoin to HRF’s Financial Freedom program [via BTCPay](https://hrf.org/btc).*\
*Want to contribute to the newsletter? Submit tips, stories, news, and ideas by emailing us at ffreport @ [hrf.org](http://hrf.org/)*
*The Bitcoin Development Fund (BDF) is accepting grant proposals on an ongoing basis. The Bitcoin Development Fund is looking to support Bitcoin developers, community builders, and educators. Submit proposals [here](https://forms.monday.com/forms/57019f8829449d9e729d9e3545a237ea?r=use1)*.
[**Subscribe to newsletter**](http://financialfreedomreport.org/)
[**Apply for a grant**](https://forms.monday.com/forms/57019f8829449d9e729d9e3545a237ea?r=use1&mc_cid=39c1c9b7e8&mc_eid=778e9876e3)
[**Support our work**](https://hrf.org/btc?mc_cid=39c1c9b7e8&mc_eid=778e9876e3)
[**Visit our website**](https://hrf.org/programs/financial-freedom/)
-
![](/static/nostr-icon-purple-64x64.png)
@ baa2d142:a83c4194
2025-02-06 12:59:50
In crypto innovation often builds on what came before. Liquid Staking Derivatives (LSDs) have been a pivotal development, reshaping how users earn yield in the decentralized space. But as the industry evolves, so do the demands of users and the limitations of existing systems. That’s where Cicada Foundation’s Liquid Yield Derivatives (LYDs) step in, it’s a next-generation approach to yield that doesn’t just adapt to the future but defines it.
**What Are LSDs and Why Do They Matter?**
LSDs introduced a breakthrough concept: earning rewards while keeping assets liquid. They allow users to stake tokens without locking them up, providing access to liquidity while still benefiting from staking rewards. This innovation unlocked significant opportunities, enabling DeFi users to put their assets to work without tying them down.
But LSDs have a critical flaw. The reliance on staking and re-staking creates cycles that are, at times, unsustainable. Inflationary rewards can dilute long-term value, and the pressure to keep staking introduces risk into the system. While LSDs have pushed the boundaries of what’s possible, the crypto industry has outgrown them.
**Enter LYDs: The Future of Yield**
Cicada Foundation’s Liquid Yield Derivatives (LYDs) take the best of LSDs and enhance them, addressing their challenges while introducing new possibilities. LYDs are built around three principles: sustainability, flexibility, and real yield.
1. Sustainability Over Speculation
Unlike LSDs, which often rely on inflationary rewards, LYDs are backed by tangible revenue streams like real-world assets and protocol income. This ensures that yields are not only substantial but also sustainable, protecting long-term value for users.
2. Flexibility Without Compromise
LYDs eliminate the need for staking or locking assets. Users retain full control and liquidity while still earning yield. This means no more tying up funds, no more staking cycles, just simple, accessible growth.
3. Real Yield, Real Impact
The yield generated by LYDs is rooted in real-world value, not speculative tokenomics. This creates a reliable foundation for growth, benefiting both individual investors and the broader ecosystem.
**Why LYDs Are the Next Evolution**
LSDs were a necessary step in the evolution of decentralized finance. They broke down barriers and proved that users could earn without giving up liquidity. But LYDs represent a leap forward. They’re not just an improvement; they’re a rethinking of how yield should work.
Think of LSDs as the beta version of yield generation: exciting, functional, but with room for improvement. LYDs are the fully realized product, addressing the cracks in the foundation and building a system that’s stronger, more reliable, and ready for the future.
**The Cicada Foundation’s Vision**
Cicada Foundation didn’t just create LYDs to compete with LSDs, it created them to solve the challenges that LSDs couldn’t overcome. Users demand more from their investments, LYDs deliver by focusing on sustainability and adaptability.
Liquid Staking Derivatives showed us what’s possible. Liquid Yield Derivatives show us what’s next. With LYDs, Cicada Foundation has redefined how users think about yield offering a solution that’s not only smarter but built to last. It’s time to leave staking cycles behind and embrace a future where growth doesn’t come at the cost of sustainability.
*Welcome to the era of LYDs. Welcome to Cicada.*
-
![](/static/nostr-icon-purple-64x64.png)
@ cf7ed325:050194cf
2025-02-06 12:28:27
The [TIA Nile Cruise](https://www.etbtoursegypt.com/tour/ms-tia-nile-cruise) offers a fantastic way to experience Egypt’s timeless beauty, as it takes you on an unforgettable journey along the majestic Nile River. Whether you’re a history buff, an adventure seeker, or simply looking for a relaxing getaway, this cruise offers something for everyone.
One of the standout features of this cruise is its luxurious accommodations, combining modern amenities with the charm of traditional Egyptian hospitality. As you sail through Egypt’s most iconic landmarks, such as the Valley of the Kings, the Pyramids of Giza, and the temples of Karnak and Luxor, the comfort of the TIA Nile Cruise ensures that every moment is enjoyable.
If you’re exploring other options, there are many other high-end Nile cruises that offer similarly unforgettable experiences. The [Gemma Nile Cruise](https://www.etbtoursegypt.com/tour/gemma-nile-cruise) is one of the most popular alternatives, offering luxury and sophistication while cruising through the heart of Egypt. It’s perfect for those seeking an elegant escape with premium service and spectacular views.
Another excellent choice is the [Sonesta Sun Goddess Nile Cruise](https://www.etbtoursegypt.com/tour/sonesta-sun-goddess-nile-cruise), which provides a combination of relaxed luxury and top-notch service. Guests can enjoy stunning views of Egypt’s famous landmarks, along with a variety of recreational facilities on board.
For those looking for something extra special, the [Sonesta Star Goddess Nile Cruise](https://www.etbtoursegypt.com/tour/Sonesta-Star-Goddess-Nile-Cruise) and the [Sonesta Moon Goddess Nile Cruise](https://www.etbtoursegypt.com/tour/Sonesta-Moon-Goddess-Nile-cruise) are both fantastic options, offering spacious rooms and exceptional service. These cruises ensure that guests have an unparalleled experience as they explore the wonders of Egypt.
The [Sonesta Nile Goddess Nile Cruise](https://www.etbtoursegypt.com/tour/Sonesta-Nile-Goddess-Cruise-tours) is another luxurious option, known for its elegance and comfort. It offers an array of gourmet dining options and entertainment for an all-around memorable trip.
Lastly, the [Sonesta George Nile Cruise](https://www.etbtoursegypt.com/tour/Sonesta-St-George-Nile-Cruise) promises an exceptional cruising experience with modern amenities and stunning Nile views. Whichever cruise you choose, you can be sure that your journey along the Nile will be unforgettable, filled with adventure, culture, and relaxation.
🌐 Visit us at www.etbtoursegypt.com
📲 Contact us now! +20 10 21100873
📧 For Booking and Inquiries: info@etbtours.com
🏢 Company Address: 4 El Lebeny Axis , Nazlet Al Batran , Al Haram, Giza , Egypt
-
![](/static/nostr-icon-purple-64x64.png)
@ 4506e04e:8c16ba04
2025-02-06 12:11:10
This spec aims to build a client application that enables patients to securely store and access their medical data using the Nostr protocol while ensuring only authorized doctors can write medical records. All data is end-to-end encrypted (E2EE) before being stored on Nostr relays, preventing unauthorized access. Patients can grant or revoke doctors’ write permissions, and all medical updates are encrypted with the patient’s public key, ensuring only they can read them. An audit log keeps track of all doctors (identified by their npubs) who have accessed or modified the patient’s data. This solution provides privacy, security, and transparency while leveraging decentralized, zero-trust storage on Nostr. 🚀
---
## **1️⃣ Core Architecture**
### **Client Application (Mobile - Patient)**
- **Stores only encrypted medical data** (no write permissions).
- Allows **temporary read access** to the patient.
- Maintains an **audit log of npubs** (medical staff) who wrote/modified data.
### **Client Application (Mobile - Doctor)**
- **Writes new medical records** and encrypts them with the patient’s **npub**.
- Submits encrypted records to Nostr relays.
- Can view past records that they (or other authorized doctors) have written.
### **Nostr Relays**
- Store **only encrypted medical records** (relays cannot read them).
- Act as a **communication layer** between doctors and the patient.
---
## **2️⃣ How It Works (End-to-End Workflow)**
### **👨⚕️ Writing/Updating Medical Data (Doctor)**
1. The doctor inputs new medical records into their mobile app.
2. The data is **encrypted using the patient’s npub** (so only the patient can read it).
3. The encrypted record is published to **Nostr relays**.
4. The patient’s app detects the update and decrypts the data locally for viewing.
### **👩⚕️ Managing Doctor Access (Patient)**
1. The patient manually **grants or revokes access** to doctors via their app.
2. If a doctor is **granted access**, they can write new records.
3. The patient **cannot modify or delete medical records**, only read them.
### **🔑 Secure Key Exchange for Read Access**
1. The doctor **encrypts records** with the patient’s **npub**.
2. The patient uses their **nsec** (private key) to decrypt and read the data.
3. Other unauthorized parties (including relays) **cannot decrypt the data**.
### **📜 Access Logging**
- Every **write operation** (new or modified medical record) is **logged in the patient’s app**.
- The log includes:
- **npub of the doctor** who made the update.
- **Timestamp of the update**.
- **Hash of the encrypted record** for verification.
---
## **3️⃣ Security Measures**
✅ **Doctors Can Write, Patients Can Only Read**
- Only **authorized doctors** can submit medical data.
- Patients can only **view** (not modify) their records.
✅ **End-to-End Encryption**
- Data is **encrypted before transmission**, ensuring no unauthorized access.
✅ **Zero-Trust Storage**
- Nostr relays **store encrypted records** that are useless without the decryption key.
✅ **Audit Log for Transparency**
- Patients can track **who wrote or modified** their records.
✅ **No Long-Term Access Without Authorization**
- The patient can revoke a doctor’s **write permissions** anytime.
---
## **4️⃣ Technology Stack**
- **Frontend (Mobile App)**
- **Flutter (Dart)** or **React Native (JavaScript/TypeScript)**
- Secure local storage for audit logs (**EncryptedSharedPreferences** on Android, **Keychain** on iOS)
- **Cryptography**
- **ECC (Elliptic Curve Cryptography)** for **key exchange** (Nostr encryption model)
- **AES-256** for **encrypting medical records** (written by doctors)
- **Networking & Storage**
- **Nostr Protocol** (NIPs 04 for encrypted DMs, NIP 33 for event-based access control)
- **Multi-Relay Storage** (for redundancy)
---
## **5️⃣ Potential Challenges & Solutions**
### **🔹 Patient Cannot Edit Records**
- Patients might want to **annotate or request corrections** on their records.
- Solution: Allow a **separate encrypted channel** for patient feedback.
### **🔹 Doctor Write Permissions Management**
- A UI is needed for patients to **approve/revoke doctor access** easily.
- Solution: Implement a **simple approval system** in the mobile app.
### **🔹 Relay Availability**
- Solution: Store records **on multiple relays** for redundancy.
---
This design ensures that **only authorized doctors can write data**, while **patients have full visibility and control over access**. 🚀
***I'm looking for a co-founder to build this. I've got the experienced and cost-efficient team who can build this. DM me for details.***
-
![](/static/nostr-icon-purple-64x64.png)
@ c1301dca:8efcc835
2025-02-06 11:34:08
Hiring the right sales talent is one of the most crucial decisions a company can make. A strong sales team drives revenue, builds relationships, and contributes to business success. However, making the wrong hire can lead to costly mistakes—high turnover, poor morale, and missed sales targets. This is where Prehire psychological assessments come in, offering a powerful tool to help companies make better, more informed hiring decisions.
At its core, a [**Prehire psychological assessment**](https://www.velocity-sales.com/prehire-selection) helps employers look beyond resumes, experience, and qualifications. It digs deeper into potential candidates' behavioural traits, cognitive abilities, and intrinsic motivations. This deeper understanding enables companies to select candidates who are skilled and aligned with the job demands and the company's culture.
## 1. Improved Candidate Fit for the Role
A common challenge in sales hiring is finding candidates perfect for the role and the team. Sales positions often require specific skills, such as persistence, emotional intelligence, problem-solving abilities, and the ability to perform under pressure. Traditional hiring methods focus heavily on qualifications and experience, but these don't always provide insight into how a candidate will handle the job demands.
Prehire psychological assessments go further by assessing a candidate's cognitive capabilities and personality traits. For example, a candidate might have an impressive sales background but struggle with resilience when facing rejection or high-pressure situations. A proper psychological assessment identifies these qualities, allowing companies to choose candidates naturally inclined to thrive in sales environments.
## 2. Reducing Turnover Rates
Turnover is one of the biggest challenges in the sales industry and can be costly. When employees leave, the company faces recruitment costs, training costs, and lost revenue. Moreover, high turnover can negatively impact team morale, lowering performance across the board.
Prehire psychological assessments help reduce turnover by identifying candidates more likely to stay long-term. The assessments examine intrinsic motivation—whether candidates are genuinely passionate about the role and aligned with the company's mission. Candidates naturally aligned with the job and organisation are more likely to stay engaged, satisfied, and committed. This reduces the risk of early departures and creates a more stable, high-performing team.
## 3. Enhancing Sales Performance
Sales roles can be highly demanding, requiring individuals to stay motivated, favourable, and productive even during tough times. A candidate's ability to handle stress, maintain enthusiasm, and stay focused on goals can significantly influence their performance.
Psychological assessments provide valuable insights into how candidates will react under pressure, how resilient they are, and how well they manage stress. By understanding a candidate's psychological profile, employers can select individuals better equipped to deal with the highs and lows of a sales career. These candidates are more likely to stay motivated, adapt to challenges, and maintain consistent performance.
## 4. Cultural Fit and Team Harmony
A key factor in any successful team is how well team members work together. A salesperson who excels individually but clashes with the company culture can cause disruptions within the team. Similarly, a candidate who struggles to adapt to the sales team's dynamic can lower overall performance and morale.
Prehire psychological assessments evaluate how candidates will fit within the existing team culture. These assessments measure interpersonal skills, emotional intelligence, and adaptability, which are critical in a sales environment. By selecting candidates who align with the team's dynamics and values, companies foster a more collaborative and cohesive work environment, ultimately boosting morale and improving overall sales performance.
### Boost sales and reduce turnover with the right hire—Prehire Psychological Assessments!
The right sales talent is more critical than ever. In a competitive landscape, Prehire psychological assessments provide a deeper, more nuanced view of candidates, helping businesses make better decisions that lead to higher retention rates, improved morale, and more robust sales performance. By understanding candidates more deeply, companies can reduce turnover, ensure better cultural fit, and ultimately create a more effective and motivated sales team
Velocity Sales Consulting specialises in helping businesses enhance their **[Candidate selection process consulting](https://www.velocity-sales.com)** through scientifically backed prehire psychological assessments. Our expert consulting services ensure your sales hiring decisions are data-driven, informed, and tailored to help your company succeed.
-
![](/static/nostr-icon-purple-64x64.png)
@ 044da344:073a8a0e
2025-02-06 11:30:19
Nachdem ich in diesem Jahr schon die [Schweiz](https://www.freie-medienakademie.de/medien-plus/die-afd-spricht-englisch) gewürdigt habe und den renitenten [Osten](https://www.freie-medienakademie.de/medien-plus/resonanz-aus-dem-osten), wird es Zeit, nach Österreich zu schauen. Wien, Hannes Hofbauer, Promedia. Für mich eine Dreifaltigkeit, seit ich im September 2021 bei der [Zukunftskonferenz](https://www.manova.news/artikel/weil-es-anders-geht) war. Auf den Straßen der Stadt lief mein altes Leben davon. Der Wien-Marathon, geplant eigentlich für April 2020 und für mich seinerzeit ein Fixpunkt im Kalender, weil ich glaubte, besser in Form zu sein als je zuvor. Den Startplatz hatte ich unter Protest zurückgegeben, nachdem die Organisatoren per Rundmail dazu aufriefen, sich doch bitte die Spritze zu holen. Die Zeit reiche sogar noch für zwei. Mitten im Training wohlgemerkt, wenn das Immunsystem ohnehin permanent im Keller ist und nicht mal eine Rotznase in der Nähe verkraftet. Für Rekorde war es an jenem Septembersonntag dann ohnehin viel zu heiß.
Also zur Zukunftskonferenz, die es eigentlich gar nicht hätte geben dürfen. Jedenfalls für mich nicht. Kein Zertifikat, nirgends. Von jenseits der Grenze schien Wien damals eine uneinnehmbare Festung zu sein für alle, die ohne Maske einreiten wollen. Die Impfpflicht war zwar noch nicht beschlossen, aber die veröffentlichte Stimmung ließ kaum Zweifel, dass das kommen würde. In Wien, das habe ich damals gelernt, geht trotzdem immer was. Kein Hotel ohne Test? Dann wohnst Du eben privat, lieber Michael. Und wenn wir Hunger haben, finden wir immer einen Griechen oder jemanden vom Balkan.
![1.00](https://route96.pareto.space/bbb972484fbaa47130a70b6e2e09f2203b5b8cbbbe67ab69f0bef789ea471701.webp)
Wien spielt auch im neuen Buch von Hannes Hofbauer eine Rolle. Eine kleine, okay, und beim Blick auf Cover und Titel auch nicht unbedingt zu erwarten. Russland heute, sagen alle optischen Signale. Wirtschaftskrieg, Sanktionen, ein neues Schloss aus Eisen. Hofbauer wäre aber nicht Hofbauer, wenn er es bei den letzten paar Jahren belassen würde. Wie schon in seinem Buch über [Zensur](https://medienblog.hypotheses.org/10635) taucht er in die Geschichte ein und kommt so über die Hanse und Maria Theresia, über den unseligen Gutsverwalter Charles Boykott und Woodrow Wilson zwangsläufig auch zur Embargopolitik des Westens im Kalten Krieg. COCOM. Eine dieser Abkürzungen, die auch ausgeschrieben nicht verraten, was wirklich dahintersteckt. „Koordinationsausschuss für Ost-West-Handel“, sagt Wikipedia. Der Zeitzeuge Michael Meyen erinnert sich an eine DDR-Jugend, in der er sehnsüchtig auf das Weihnachtspaket aus dem Westen wartete. Vielleicht gibt es ja diesmal Taschenrechner, Quarzuhr oder irgendetwas anderes von dem, was sonst nur im Intershop liegt. Wien, sagt Hannes Hofbauer, war ein „Hotspot“ des Ost-Schmuggels. Einer der Orte, über die das gehandelt wurde, was nicht auf den schwarzen COCOM-Listen stand und so eigentlich auch nicht in mein Kinderzimmer kommen konnte. Die Quellen dieses Hotspots: Familienbande, Tradition und eine Position zwischen den großen Mächten.
Vermutlich ist es deshalb kein Zufall, dass ein Buch wie dieses aus Österreich kommt. Hannes Hofbauer muss nicht groß herausstreichen, dass er sich auskennt im Osten Europas. Seine Bücher sprechen so für sich, dass ein paar zarte Hinweise genügen. Frühjahr 1990, kurz nach der Eröffnung von McDonalds am Puschkin-Platz in Moskau. Eine lange Schlange, erinnert sich Hofbauer. „Den Geschmack des Westens“ probieren (S. 214). Heute sind die 825 Standorte verkauft. Der neue Betreiber hatte vorher Erfolg in Sibirien und sagt jetzt auf Russisch: „Wkusno i totschka“. Lecker und Punkt.
Damit ist ein Teil der Geschichte schon erzählt. Die Russen haben reagiert und den „härtesten Wirtschaftskrieg, den der Westen seit 1945 führt“, ins Leere laufen lassen (S. 203). BRICS und der Trend weg vom Dollar, die Umstellung der Landwirtschaft, die Weizen-Rekordernte 2024 und die Obst-Importe aus der Türkei. „Das westliche Sanktionsregime hat die Welt verändert“, sagt Hannes Hofbauer – aber anders als gedacht (S. 221). Damit sind nicht nur die Verluste gemeint, für die hier McDonalds steht, oder der Push für die russische Wirtschaft, sondern auch der „schleichende Wandel von der russländischen zur russisch-nationalen Identität“. *Russki mir* heißt das Schlagwort, das auf Zusammenhalt zielt. Russische Welt, Rechtsruck und Kirchenmacht inklusive (S. 238).
Zu Hofbauers Geschichte gehören aber auch, wie sollte es bei einem Historiker anders sein, die langen Linien, die Scharmützel mit dem Irak und Libyen, die die „Dollar-Zwangsjacke“ abstreifen wollten (S. 65), und der Rechtsbruch, der stets damit verbunden ist, irgendwelche „Bestimmungen“ gegen Länder durchzusetzen, die jemand mit Allmachtsphantasien gerade als „Bösewicht und Unruhestifter“ ausgemacht hat (S. 14). „Schießkrieg und Wirtschaftskrieg hängen eng zusammen“ (S. 17): Diese Formel hat Woodrow Wilson, seinerzeit US-Präsident, schon im September 1919 in das kollektive Weltgedächtnis geschrieben. Möge der Krieg auch barbarisch sein, so sei doch der Boykott „ein unendlich viel schrecklicheres Kriegsinstrument“ (S. 9). Das erklärt COCOM. Das erklärt „Amerikas Kampf gegen russische Energie für Europa“, den Hannes Hofbauer schon 1960 beginnen lässt (S. 53). Das erklärt auch das Kontaktschuld-Prinzip, das ich im Dezember 2019 live auf Kuba erleben durfte. Dunkle Städte beim Anflug, Warten an den Tankstellen und der Zweifel, ob es etwas werden würde mit einer Vortragstour so ganz ohne Benzin. Dann endlich ein Schiff am Horizont. Wer in Havanna anlegt, so habe ich gelernt, ist für US-Häfen tabu. Die Kubaner sind damals nicht verhungert, immerhin. Aber gut ging es ihnen trotzdem nicht.
„Russland ruinieren“: Bei Hannes Hofbauer beginnt dieses Kapitel 2009 – mit dem Versuch, über die Idee „Östliche Partnerschaft“ sechs Staaten aus dem Dunstkreis Moskaus zu lösen (S. 81). Moldawien, Georgien, Armenien, die Ukraine, Belarus, Aserbaidschan. Wir wissen, wie das ausgegangen ist. Wir wissen auch, wie und warum die Spirale weitergedreht wurde. Geopolitischer Wahn, der Kampf um kulturelle Deutungshoheit, wunderbar nachzulesen im Promedia-Buch von [Hauke Ritz](https://www.freie-medienakademie.de/medien-plus/die-macht-der-ideen), dazu der „Kampf um das große Geschäft“ (S. 104) und natürlich um das große Geld, der hier und jetzt selbst russische Auslandsvermögen nicht zu verschonen scheint, obwohl doch Eigentum ein Fetisch ist, der nicht einmal Straftätern entzogen werden kann (S. 133).
Hannes Hofbauer verlässt den Hochsitz des Chronisten hin und wieder, um auf Menschen zu schauen, die zu Kollateralschäden geworden sind. Jozef Hambálek, ein slowakischer Motorradfahrer, der seinen Ministerpräsidenten brauchte, um von der Sanktionsliste gestrichen zu werden. So-yoen Schröder-Kim, fristlos entlassen, weil sie am 9. Mai 2023 mit ihrem Mann, Ex-Bundeskanzler, in der russischen Botschaft war. Justus Frantz, einst Klassikstar und heute Persona non grata, weil er nicht von alten Freunden und großer Kunst lassen wollte. Hofbauer spricht von einem „Russland-Hass“, der bei den Volksvertretern der EU „paranoide Züge“ trage, und von einer „kolonialen Attitüde moralischer Überlegenheit“ (S. 127). Er zeigt die Folgen jenseits der Wirtschaft. Kultur, Olympia, Wissenschaft, private Reisen. Die Zensur natürlich – nötig allein schon deshalb, damit die „russische Erzählung“ unsichtbar wird (S. 160). Und er hat eine Anekdote, die exemplarisch zeigt, warum das alles so gekommen ist. Ort: Das *Heute-Journal* im ZDF 2014. Anwesende: Claus Kleber und Joe Kaeser, seinerzeit Siemens-Chef und gerade zufrieden zurück aus Russland, wo er Putin getroffen hatte und den Gazprom-Chef. Der Leser ahnt, was kommt. Ein Verhör. Was haben Sie sich dabei gedacht, Herr Kaeser? Hannes Hofbauer sagt, dass dem Wirtschaftsboss erst in diesem Moment klar geworden sei, worauf die deutsche Politik hinauslief, und er zu Kreuze gekrochen sei (S. 235). Der Rest ist Geschichte – für alle Zeiten festgehalten in diesem Buch.
\
[Freie Akademie für Medien & Journalismus](https://www.freie-medienakademie.de/)
-
![](/static/nostr-icon-purple-64x64.png)
@ 91bea5cd:1df4451c
2025-02-04 17:24:50
### Definição de ULID:
Timestamp 48 bits, Aleatoriedade 80 bits
Sendo Timestamp 48 bits inteiro, tempo UNIX em milissegundos, Não ficará sem espaço até o ano 10889 d.C.
e Aleatoriedade 80 bits, Fonte criptograficamente segura de aleatoriedade, se possível.
#### Gerar ULID
```sql
CREATE EXTENSION IF NOT EXISTS pgcrypto;
CREATE FUNCTION generate_ulid()
RETURNS TEXT
AS $$
DECLARE
-- Crockford's Base32
encoding BYTEA = '0123456789ABCDEFGHJKMNPQRSTVWXYZ';
timestamp BYTEA = E'\\000\\000\\000\\000\\000\\000';
output TEXT = '';
unix_time BIGINT;
ulid BYTEA;
BEGIN
-- 6 timestamp bytes
unix_time = (EXTRACT(EPOCH FROM CLOCK_TIMESTAMP()) * 1000)::BIGINT;
timestamp = SET_BYTE(timestamp, 0, (unix_time >> 40)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 1, (unix_time >> 32)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 2, (unix_time >> 24)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 3, (unix_time >> 16)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 4, (unix_time >> 8)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 5, unix_time::BIT(8)::INTEGER);
-- 10 entropy bytes
ulid = timestamp || gen_random_bytes(10);
-- Encode the timestamp
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 224) >> 5));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 1) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 1) & 7) << 2) | ((GET_BYTE(ulid, 2) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 2) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 2) & 1) << 4) | ((GET_BYTE(ulid, 3) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 3) & 15) << 1) | ((GET_BYTE(ulid, 4) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 4) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 4) & 3) << 3) | ((GET_BYTE(ulid, 5) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 5) & 31)));
-- Encode the entropy
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 6) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 6) & 7) << 2) | ((GET_BYTE(ulid, 7) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 7) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 7) & 1) << 4) | ((GET_BYTE(ulid, 8) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 8) & 15) << 1) | ((GET_BYTE(ulid, 9) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 9) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 9) & 3) << 3) | ((GET_BYTE(ulid, 10) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 10) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 11) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 11) & 7) << 2) | ((GET_BYTE(ulid, 12) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 12) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 12) & 1) << 4) | ((GET_BYTE(ulid, 13) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 13) & 15) << 1) | ((GET_BYTE(ulid, 14) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 14) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 14) & 3) << 3) | ((GET_BYTE(ulid, 15) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 15) & 31)));
RETURN output;
END
$$
LANGUAGE plpgsql
VOLATILE;
```
#### ULID TO UUID
```sql
CREATE OR REPLACE FUNCTION parse_ulid(ulid text) RETURNS bytea AS $$
DECLARE
-- 16byte
bytes bytea = E'\\x00000000 00000000 00000000 00000000';
v char[];
-- Allow for O(1) lookup of index values
dec integer[] = ARRAY[
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 0, 1, 2,
3, 4, 5, 6, 7, 8, 9, 255, 255, 255,
255, 255, 255, 255, 10, 11, 12, 13, 14, 15,
16, 17, 1, 18, 19, 1, 20, 21, 0, 22,
23, 24, 25, 26, 255, 27, 28, 29, 30, 31,
255, 255, 255, 255, 255, 255, 10, 11, 12, 13,
14, 15, 16, 17, 1, 18, 19, 1, 20, 21,
0, 22, 23, 24, 25, 26, 255, 27, 28, 29,
30, 31
];
BEGIN
IF NOT ulid ~* '^[0-7][0-9ABCDEFGHJKMNPQRSTVWXYZ]{25}$' THEN
RAISE EXCEPTION 'Invalid ULID: %', ulid;
END IF;
v = regexp_split_to_array(ulid, '');
-- 6 bytes timestamp (48 bits)
bytes = SET_BYTE(bytes, 0, (dec[ASCII(v[1])] << 5) | dec[ASCII(v[2])]);
bytes = SET_BYTE(bytes, 1, (dec[ASCII(v[3])] << 3) | (dec[ASCII(v[4])] >> 2));
bytes = SET_BYTE(bytes, 2, (dec[ASCII(v[4])] << 6) | (dec[ASCII(v[5])] << 1) | (dec[ASCII(v[6])] >> 4));
bytes = SET_BYTE(bytes, 3, (dec[ASCII(v[6])] << 4) | (dec[ASCII(v[7])] >> 1));
bytes = SET_BYTE(bytes, 4, (dec[ASCII(v[7])] << 7) | (dec[ASCII(v[8])] << 2) | (dec[ASCII(v[9])] >> 3));
bytes = SET_BYTE(bytes, 5, (dec[ASCII(v[9])] << 5) | dec[ASCII(v[10])]);
-- 10 bytes of entropy (80 bits);
bytes = SET_BYTE(bytes, 6, (dec[ASCII(v[11])] << 3) | (dec[ASCII(v[12])] >> 2));
bytes = SET_BYTE(bytes, 7, (dec[ASCII(v[12])] << 6) | (dec[ASCII(v[13])] << 1) | (dec[ASCII(v[14])] >> 4));
bytes = SET_BYTE(bytes, 8, (dec[ASCII(v[14])] << 4) | (dec[ASCII(v[15])] >> 1));
bytes = SET_BYTE(bytes, 9, (dec[ASCII(v[15])] << 7) | (dec[ASCII(v[16])] << 2) | (dec[ASCII(v[17])] >> 3));
bytes = SET_BYTE(bytes, 10, (dec[ASCII(v[17])] << 5) | dec[ASCII(v[18])]);
bytes = SET_BYTE(bytes, 11, (dec[ASCII(v[19])] << 3) | (dec[ASCII(v[20])] >> 2));
bytes = SET_BYTE(bytes, 12, (dec[ASCII(v[20])] << 6) | (dec[ASCII(v[21])] << 1) | (dec[ASCII(v[22])] >> 4));
bytes = SET_BYTE(bytes, 13, (dec[ASCII(v[22])] << 4) | (dec[ASCII(v[23])] >> 1));
bytes = SET_BYTE(bytes, 14, (dec[ASCII(v[23])] << 7) | (dec[ASCII(v[24])] << 2) | (dec[ASCII(v[25])] >> 3));
bytes = SET_BYTE(bytes, 15, (dec[ASCII(v[25])] << 5) | dec[ASCII(v[26])]);
RETURN bytes;
END
$$
LANGUAGE plpgsql
IMMUTABLE;
CREATE OR REPLACE FUNCTION ulid_to_uuid(ulid text) RETURNS uuid AS $$
BEGIN
RETURN encode(parse_ulid(ulid), 'hex')::uuid;
END
$$
LANGUAGE plpgsql
IMMUTABLE;
```
#### UUID to ULID
```sql
CREATE OR REPLACE FUNCTION uuid_to_ulid(id uuid) RETURNS text AS $$
DECLARE
encoding bytea = '0123456789ABCDEFGHJKMNPQRSTVWXYZ';
output text = '';
uuid_bytes bytea = uuid_send(id);
BEGIN
-- Encode the timestamp
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 224) >> 5));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 1) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 1) & 7) << 2) | ((GET_BYTE(uuid_bytes, 2) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 2) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 2) & 1) << 4) | ((GET_BYTE(uuid_bytes, 3) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 3) & 15) << 1) | ((GET_BYTE(uuid_bytes, 4) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 4) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 4) & 3) << 3) | ((GET_BYTE(uuid_bytes, 5) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 5) & 31)));
-- Encode the entropy
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 6) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 6) & 7) << 2) | ((GET_BYTE(uuid_bytes, 7) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 7) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 7) & 1) << 4) | ((GET_BYTE(uuid_bytes, 8) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 8) & 15) << 1) | ((GET_BYTE(uuid_bytes, 9) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 9) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 9) & 3) << 3) | ((GET_BYTE(uuid_bytes, 10) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 10) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 11) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 11) & 7) << 2) | ((GET_BYTE(uuid_bytes, 12) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 12) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 12) & 1) << 4) | ((GET_BYTE(uuid_bytes, 13) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 13) & 15) << 1) | ((GET_BYTE(uuid_bytes, 14) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 14) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 14) & 3) << 3) | ((GET_BYTE(uuid_bytes, 15) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 15) & 31)));
RETURN output;
END
$$
LANGUAGE plpgsql
IMMUTABLE;
```
#### Gera 11 Digitos aleatórios: YBKXG0CKTH4
```sql
-- Cria a extensão pgcrypto para gerar uuid
CREATE EXTENSION IF NOT EXISTS pgcrypto;
-- Cria a função para gerar ULID
CREATE OR REPLACE FUNCTION gen_lrandom()
RETURNS TEXT AS $$
DECLARE
ts_millis BIGINT;
ts_chars TEXT;
random_bytes BYTEA;
random_chars TEXT;
base32_chars TEXT := '0123456789ABCDEFGHJKMNPQRSTVWXYZ';
i INT;
BEGIN
-- Pega o timestamp em milissegundos
ts_millis := FLOOR(EXTRACT(EPOCH FROM clock_timestamp()) * 1000)::BIGINT;
-- Converte o timestamp para base32
ts_chars := '';
FOR i IN REVERSE 0..11 LOOP
ts_chars := ts_chars || substr(base32_chars, ((ts_millis >> (5 * i)) & 31) + 1, 1);
END LOOP;
-- Gera 10 bytes aleatórios e converte para base32
random_bytes := gen_random_bytes(10);
random_chars := '';
FOR i IN 0..9 LOOP
random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) >> 3) & 31) + 1, 1);
IF i < 9 THEN
random_chars := random_chars || substr(base32_chars, (((get_byte(random_bytes, i) & 7) << 2) | (get_byte(random_bytes, i + 1) >> 6)) & 31 + 1, 1);
ELSE
random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) & 7) << 2) + 1, 1);
END IF;
END LOOP;
-- Concatena o timestamp e os caracteres aleatórios
RETURN ts_chars || random_chars;
END;
$$ LANGUAGE plpgsql;
```
#### Exemplo de USO
```sql
-- Criação da extensão caso não exista
CREATE EXTENSION
IF
NOT EXISTS pgcrypto;
-- Criação da tabela pessoas
CREATE TABLE pessoas ( ID UUID DEFAULT gen_random_uuid ( ) PRIMARY KEY, nome TEXT NOT NULL );
-- Busca Pessoa na tabela
SELECT
*
FROM
"pessoas"
WHERE
uuid_to_ulid ( ID ) = '252FAC9F3V8EF80SSDK8PXW02F';
```
### Fontes
- https://github.com/scoville/pgsql-ulid
- https://github.com/geckoboard/pgulid
-
![](/static/nostr-icon-purple-64x64.png)
@ 89ccea93:df4e00b7
2025-02-06 11:20:49
I've opened a ~monero territory.
I kept wanting to post things about or tangential to monero and didn't know where to shove them.
Obviously ~bitcoin isn't the right place.
And ~cryptocurrency didn't feel right, since for me, as a bitcoiner, monero is in a unique position. It doesn't seem to fit under the larger basket of cryptocurrencies. Many of which are scams/self-enrichment schemes. Ahem, XRP.
Or just poorly implemented and pre-mined. Ahem, ETH.
I don't know a lot about monero actually, but I use it and like it and think it has a place in a bitcoiners arsenal in resisting government infringements and resisting pervasive privacy shit-holes like the chain anal companies. Even Coinbase has their own proprietary chain anal. It's disgusting. They don't want us to have privacy. And many people play right into their hands by handing over their ID card and picture of their face to get bitcoins when you can get it anonymously. But I digress.
Use the territory, or don't.
But if you do, then welcome.
originally posted at https://stacker.news/items/877547
-
![](/static/nostr-icon-purple-64x64.png)
@ e373ca41:b82abcc5
2025-02-06 09:25:07
*This article by Milosz Matuschek first appeared in German in* ***["Freischwebende Intelligenz".](https://www.freischwebende-intelligenz.org/p/usaid-and-co-die-ersten-kopfe-der)***
*In my first multi-part Corona series,* *[The Corona Complex](https://www.freischwebende-intelligenz.org/p/coronakomplex?utm_source=publication-search), I focused on the early inconsistencies of the "pandemic." In The Corona Connection, I will explore the key players involved in this event over multiple installments.*
*It’s not yet spring, but the bud of truth is already breaking through the icy layer of lies. You can cover the truth with as much PR, manipulation, and propaganda as you want—it will only turn into compost. Because truth is rooted in something; it’s a living organism, while lies are rotting waste. The coming weeks and months will be enlightening.*
### The USAID Front Organization
The grand cleanup led by Musk & Trump is in full swing. In the U.S., the agency USAID is currently being dismantled amid protests from employees. [As of Friday, February 7, nearly all staff members have lost their jobs.](https://www.usaid.gov) What does this mean?
*Der Spiegel* referred to USAID as a "development agency" and reported that a nervous Bill Gates now wants to [call Trump](https://www.spiegel.de/wirtschaft/unternehmen/bill-gates-zu-stopp-der-us-auslandshilfen-donald-trump-hat-mir-seine-telefonnummer-gegeben-a-fafae10c-3163-43ea-96a4-f218050d658a) "to save lives." The *NZZ* euphemistically describes USAID as an "independent development aid agency." Seeing "AID" in the name, people think of humanitarian efforts—Bob Geldof, compassionate nuns, and "Bread for the World."
In reality, USAID ("United States Agency for International Development" – claim: "From the American People") is far from just a food distribution service (although it does that too). Primarily, it serves as a [covert, rapid-response intelligence force for operations such as regime change, astroturfing, and targeted executions](https://foundationforfreedomonline.com/usaid-internal-documents-reveal-government-plot-to-promote-censorship-initiatives/)—expanding new business models for the U.S. empire. They are the enforcers who move in before "peace, democracy, and reconstruction" are declared.
USAID was heavily involved in Ukraine, providing $5 billion in funding, as Robert Kennedy Jr. recently stated in an interview. The agency throws money around freely, financing both the GAVI vaccine alliance and the World Economic Forum—because, of course, these are the world's most "needy" causes.
<https://x.com/ShadowofEzra/status/1886153128757629157>
### The PREDICT Program
It gets even stranger. Under the so-called PREDICT program, significant funding was allocated to research coronaviruses in bats. This research was conducted in collaboration with the Wuhan Institute of Virology (WIV) and included gain-of-function experiments. In 2017, the NIH lifted a previously imposed moratorium on funding such research, paving the way for its resumption and expansion, including international partnerships like the one with WIV.
USAID spent about $200 million in taxpayer money on bat virus research, with approximately $50 million going directly to WIV. Despite being a publicly funded science program, PREDICT's administrators have largely refused to release sensitive details about its research. Peter Daszak, who received substantial funding ([now cut off](https://oversight.house.gov/release/breaking-hhs-formally-debars-ecohealth-alliance-dr-peter-daszak-after-covid-select-reveals-pandemic-era-wrongdoing/)), even ignored some subpoenas. Officials shared information with taxpayers only reluctantly and in minimal amounts.
<https://x.com/KanekoaTheGreat/status/1886098345938284813>
A 2023 investigation by the *[White Coat Waste Project](https://blog.whitecoatwaste.org/2023/06/15/covid-origin-wcw-investigation-proves-u-s-govt-funded-patient-zero/)*, following a public records request, revealed that U.S. taxpayer dollars—through the NIH and USAID—flowed to the Wuhan Institute of Virology. These funds supported gain-of-function experiments in which viruses were genetically modified to increase their transmissibility or virulence. The program ended in 2019.
### The Mystery of Ben Hu
One of the most explosive revelations was the identification of Ben Hu, a lead researcher at WIV, as a potential "Patient Zero." Reports indicate that he developed COVID-like symptoms as early as November 2019—before the first officially recognized cases. Hu was deeply involved in the gain-of-function experiments funded by U.S. taxpayer money.
Looking further back, the picture becomes clearer. As early as 2012, USAID funds were used to capture bats in caves, including those in Mojiang, where [several miners died from a deadly respiratory illness](https://pubmed.ncbi.nlm.nih.gov/33194988/). The infection was reportedly caused by bat droppings.
<https://x.com/TheSeeker268/status/1886469590701760960>
Too many coincidences are piling up: The virus strain from back then, RaTG13, has striking similarities to SARS-CoV-2. Fauci’s pardon dates back to as early as 2014. A significant portion of funding from both Fauci and USAID went to Peter Daszak’s EcoHealth Alliance. Daszak in 2016 gave surprisingly candid responses regarding gain-of-function research.
<https://x.com/mazemoore/status/1883378918687719725>
The director of the CDC, Robert Redfield, had already pointed out in previous hearings that [U.S. public funds were used for research in Wuhan.](https://x.com/KanekoaTheGreat/status/1886126884108554352)
So, to summarize here quickly, adding a question:
* A CIA front organization was catching sick bats in a previous outbreak zone of deadly respiratory diseases in China (e.g., Mojiang caves) in 2012.
* It funded tens of millions of dollars' worth of research to enhance the pathogenicity of coronaviruses in Wuhan.
* It transferred money to Chinese military-medical institutions.
* Wuhan researcher Ben Hu fell mysteriously ill and became Patient Zero.
So here’s the question: Isn't a natural origin of the virus the most obvious explanation in the world?
***
ADVERTISEMENT:
*Looking for the easiest way to buy Bitcoin and store it yourself? The **[Relai app](https://relai.app/de/?af_xp=custom\&source_caller=ui\&pid=INFLUENCER\&is_retargeting=true\&af_click_lookback=7d\&shortlink=eo5zpzew\&af_channel=branded_url\&af_inactivity_window=30d\&c=Milosz%20Matuszek)** is the No. 1 crypto start-up and No. 2 of all fintech start-ups in Switzerland. **[Here you can buy Bitcoin](https://relai.app/de/?af_xp=custom\&source_caller=ui\&pid=INFLUENCER\&is_retargeting=true\&af_click_lookback=7d\&shortlink=eo5zpzew\&af_channel=branded_url\&af_inactivity_window=30d\&c=Milosz%20Matuszek)** in just a few steps and also set up savings plans. Nobody has access to your Bitcoin except you. With the referral code MILOSZ you save on fees (no financial advice). Disclaimer due to regulatory issues: The services of the Relai App are hereby only recommended to inhabitants of Switzerland or Italy.*
![1.00](https://route96.pareto.space/fd780f3b3d66fc821c5d24b63041394534fe1c23c38f32480d118b41d4e62b9c.webp "1.00")
*Need more security? The **[Trezor wallets](https://trezor.io/trezor-safe-5-bitcoin-only?transaction_id=102e192a206d1585e56a2fddef6d83\&offer_id=238\&affiliate_id=35234)** are recommended and easy to use, others are available in the **[store](https://trezor.io/?transaction_id=102bc85bdca2733287749c7f879ebd\&offer_id=133\&affiliate_id=35234)**. Need more advice? Book an **[introductory meeting](https://trezor.io/trezor-expert-session?transaction_id=1020e18dad0aa4b1186289fd22e90f\&offer_id=241\&affiliate_id=35234)** with a wallet expert.*
***
#### Who still believes in a natural origin of COVID-19?
The official narrative worldwide is that the virus originated naturally—perhaps from someone consuming or handling a bat at a wet market near WIV. Yet, neither the sick animal nor the first human case of "natural transmission" has ever been identified.
At the same time, intelligence-backed "nudging" units worked preemptively to discredit vaccine skeptics and bolster "Trusted News Initiatives" and fact-checking programs. [Even the CIA director has now suggested that COVID may have originated in a lab.](https://apnews.com/article/covid-cia-trump-china-pandemic-lab-leak-9ab7e84c626fed68ca13c8d2e453dde1) And he likely knows exactly why.
One thing is certain: The theory of natural zoonotic transmission in COVID-19 has been obliterated. It was the PR stunt of the century. A joint effort by the CIA and China—who else could pull off such a grand deception?
These revelations are making the players behind the "Corona Connection" increasingly visible: a network of CIA-China partnerships, NGOs, the media apparatus, corrupt politicians, and willing, unscrupulous, or even outright sociopathic scientists.
![1.00](https://route96.pareto.space/0cd0fb88ef333ebd291abb116ab1409b839cb24e26d33703c5dcb2f16be4256a.webp "(Screenshot from a joint program on AI & Health)")
As these connections come to light over the next months and years, the consequences for those involved—and for society at large—will be immense. We are approaching a moment of societal reckoning. A house of cards can only stand for so long before it collapses.
In Germany, Christian Drosten was one of the most aggressive proponents of the "conspiracy theory" label, frequently using it to discredit critics. As one of the main gatekeepers of the COVID narrative, he played a key role in shaping the scientific community’s response. His most steadfast domestic opponent was Hamburg physicist Roland Wiesendanger.
[Drosten was one of the most outspoken propagandists of the zoonosis theory—while simultaneously working as its chief cover-up artist and deflector. He often portrayed himself as the misunderstood victim.](https://www.freischwebende-intelligenz.org/p/wanted-drosten-luege?utm_source=publication-search)
This is what happens when the desire for recognition and power overshadows any sense of medical ethics. Now, serious questions arise about his role: What did he know about the research in Wuhan? Was he aware of USAID’s funding? Given that Charité (his institution) received grants from Bill Gates and that his PCR test was immediately declared the global gold standard, it seems unlikely that he knew nothing.
This demands an investigative committee and legal proceedings.
In the coming weeks and months, many more connections will be uncovered, fully exposing the "Corona Connection."
The era of silence is over.
And so is the era of immunity.
***
This article was written with the **[Pareto-client](https://pareto.space/read?category=global)** on Nostr. Check it out!
***Join the marketplace of ideas!** We are building a publishing ecosystem on Nostr for citizen-journalism, starting with a client for blogging and newsletter distribution. Sound money and sound information should finally be in the hands of the people, right? Want to learn more about the [Pareto Project](https://pareto.space/en)? Zap me, if you want to contribute (all Zaps go to the project).*
![1.00](https://route96.pareto.space/9dd3c85d28c584e9dcca03be9e3bf6c5099fd410d2650a681963abb8be3806bf.webp "1.00")
*Are you a publication or journalist and want to be part of it, test us, migrate your content to Nostr? Write to **<team@pareto.space>***
**Not yet on** **[Nostr](https://nostr.com/)** **and want the full experience?** Easy onboarding via **[Nosta.me.](https://nosta.me/create/welcome)**
![1.00](https://route96.pareto.space/de62a916479bd755673eaeb275143f02c1bbc7e5f3fd35697dbbfb0d4510f47a.webp "1.00")
-
![](/static/nostr-icon-purple-64x64.png)
@ 89ccea93:df4e00b7
2025-02-06 08:55:27
![](https://m.stacker.news/76316)
<https://www.merriam-webster.com/dictionary/shill>
I question the intellectual honesty of someone using the word "shill" to describe a Monero user.
I used to hang out in DeFi circles and we had a robust understanding of the word shill. Basically it was someone financially motivated to get you do do a certain behavior.
`Use platform X, buy token Y etc and get some benefit.`
When in reality, they wanted you to pump the liquidity so they could dump on you.
I don't see the same thing being true for Monero users.
A Monero user is someone who wants one thing. Privacy. That's literally it.
A Monero user doesn't want to get rich. Using Monero usually means they're taking a financial hit as Bitcoin is a better SoV. There is literally no financial gain to the Monero user if someone else uses it.
It shouldn't really be debatable then that for the purpose above, privacy, Monero surpasses Bitcoin.
But! Lightning!!
To which I reply, so what? Lightning is okay, but it's not a panacea.
It's UX is clunky at best. And perfect privacy is not a default. Many Lightning users are trusting their privacy and IP to a third party when they use it custodially.
But a one-to-one comparision of Monero privacy to Lightning privacy is effectively impossible because of how many different ways there are to interact with and use Lightning. Monero privacy is extremely quantifiable. Lightning privacy is a bit more ethereal. And this post isn't the place to go into that. I just made a sister post in the ~privacy territory.
originally posted at https://stacker.news/items/877476
-
![](/static/nostr-icon-purple-64x64.png)
@ 75869cfa:76819987
2025-02-06 08:03:59
**GM, Nostriches!**
The Nostr Review is a biweekly newsletter focused on Nostr statistics, protocol updates, exciting programs, the long-form content ecosystem, and key events happening in the Nostr-verse. If you’re interested, join me in covering updates from the Nostr ecosystem!
**Quick review:**
In the past two weeks, Nostr statistics indicate over 245,000 daily trusted pubkey events.The number of new users has seen a significant increase. Profiles with contact list amount is reflecting a nearly 40% growth. Pubkeys writing events and profiles with a bio have both increased by over 20%.More than 10 million events have been published, posts and reposts are representing a significant decrease. Total Zap activity stands at approximately 20 million, marking a 200% increase.
Additionally, 26 pull requests were submitted to the Nostr protocol, with 6 merged. A total of 45 Nostr projects were tracked, with 10 releasing product updates, and over 400 long-form articles were published, 32% focusing on Bitcoin and Nostr. During this period, 6 notable events took place, and 1 significant event is upcoming.
**Nostr Statistics**
---
Based on user activity, the total daily trusted pubkeys writing events is about 245,000, representing a slight 4.7% increase compared to the previous period. Daily activity peaked at 20932 events, with a low of approximately 16682.
The number of new users has seen a significant increase. Profiles with a contact list amount to approximately 16,000, reflecting a nearly 40% growth compared to the previous period. Pubkeys writing events and profiles with a bio have both increased by over 20%.
Regarding event publishing, the total number of note events published is about 10 million. Posts remain the most dominant in terms of volume, totaling approximately 1.3 million, reflecting a notable decrease of 34%. Reposts are showing an decrease of approximately 43%, while reactions have experienced a slight 25% decline.
For zap activity, the total zap amount is about 20 million, showing a significant increase of over 200% compared to the previous period.
In terms of relay usage, the top five relays by user count are: wss://bostr.bitcointxoko.com/, wss://n.posto.us.kg/, wss://relay.nostr.band/, wss://bostr.lightningspore.com/, wss://freespeech.casa/
Data source: https://stats.nostr.band/
**NIPs**
---
**[New NIP: Nostr BLE Signing Device Protocol](https://github.com/nostr-protocol/nips/pull/1706)**
nostr:npub1794vv7hl7y6q2qw0y7m7h60rpphmvt5h7pzt5sr78z6assj6w0eqagwjhd is proposing that This PR is to introduce support for signing and encryption/decryption on hardware based Nostr Signing Devices over BLE.
**[A4 Citations and references to internal and external sources](https://github.com/nostr-protocol/nips/pull/1708)**
nostr:npub1l5sga6xg72phsz5422ykujprejwud075ggrr3z2hwyrfgr7eylqstegx9z defines how Nostr references should work and events for documenting sources material, within and without of Nostr.For clarification, the “quote” mentioned in the NIP are not Nostr-style quotes or highlights, but rather in-line insertions of material, within a research paper or other academic work.The most obvious implementation of ex-event citations is in NIP-62 Curated Publications, such as research papers.Then you could create one citation and link it inline or as a footnote, in shortened form, and have it appear in full-format in at the end of the publication and have it displayed in full-format on hover, and clicking on it, in the main text, would take you to the endnote-style entry at the end. And from there, you could search Nostr (and/or the Internet) for other papers with a similar or related citation.
**[NIP-A2: Account delegation via kind-0](https://github.com/nostr-protocol/nips/pull/1709)**
[reis](https://github.com/1l0) defines how to use kind-0 for account delegation. The clients responsible for account management create and post the delegator kind-0 event. A user can utilize the delegatee account listed in their own delegator event. If a user creates a delegatee kind-0 event and it is valid, it is considered to represent the same identity with a different key pair.
**[NIP-B1](https://github.com/nostr-protocol/nips/pull/1710)**
nostr:npub1gcxzte5zlkncx26j68ez60fzkvtkm9e0vrwdcvsjakxf9mu9qewqlfnj5z defines defines kind:25 as a simple plaintext note that is limited to 210 visible characters.The .content property contains some human-readable text. Clients MUST force outgoing .content to be less or equal to 210 characters and crop all incoming events to the same amount. Relays MUST also not accept content with over 210 chars, considering the rules below.Markup languages such as markdown MUST NOT be used. Replies to kind:25 MUST use NIP-22 comments while applying the same content rules as defined here. Reactions MUST use NIP-25 with a k tag to 25. Clients MUST only download and display reactions that include the k tag in notifications. Zap Events MUST also include the k tag of the source event. Clients MUST only render zaps that include the k tag in notifications.
**[Add NIP-4A Event Onion Routing](https://github.com/nostr-protocol/nips/pull/1713)**
nostr:npub1jy2pa43vcr3jkwny2f9edsx0cdavzkcwqcla4qqyf03y66nxlgrq3m9p6d is proposing that onion routing is a key missing piece to client privacy and would be extremely valuable in high value, low bandwidth use cases like bitcoin transaction collaboration.he restarts onion routing discussion here with a bare bones proposal which attempts to grab the best parts from the ones above, plus use the most modern practices (e.g. NIP-44).Added a regular event kind since it allows a sender to disrupt time-based deanonymization.NIP-89 could maybe still be used as a way for peers to recommend a router, it feels like an abuse to finagle onion routing specifics into NIP-89 events. Added a replaceable announcement event.
**[Propose NIP for bounties backed by zap-native, trusted escrow agents](https://github.com/nostr-protocol/nips/pull/1714)**
nostr:npub19ma2w9dmk3kat0nt0k5dwuqzvmg3va9ezwup0zkakhpwv0vcwvcsg8axkl is proposing that a new set of Kinds for supporting bounties backed by trusted escrow agents over Nostr and Lightning. He has referred to it as NIP-3400 because I'm not sure how to propose new NIPs.This NIP defines event kinds and structure for facilitating Lightning Network escrow services and bounties on Nostr. It enables escrow agents to register their services and users to create, accept, and resolve bounty tasks using Lightning Network payments through Nostr zaps.
**[NIP-29 unleashed](https://github.com/nostr-protocol/nips/pull/1716)**
nostr:npub177sl65jrhf5v4gyku64t40scgnul5c4hjc2mfhfun7gpu5nm32rsn6rnds is proposing that removes all the RPC stuff from NIP-29, instead admins publish group state and, fi the relay accepts it, ti resigns the same payload with it. This also opens the door for arbitrary group states which will make NIP-29 more usable.
**[NIP-800: Define BDD Payload Execution Protocol (because 800 and BDD are a match made in alphanumeric heaven)](https://github.com/nostr-protocol/nips/pull/1717)**
[asyncmind0](https://github.com/asyncmind0) is proposing that while breaking convention by jumping to NIP-800, the alphanumeric and visual similarity between "800" and "BDD" is too perfect to ignore. This synchronicity aligns with the purpose of the protocol, making it instantly memorable and symbolically representative of the structured nature of BDD itself. Some conventions are worth bending for elegance.
**[NIP-101 - Decentralized Trust System for Nostr](https://github.com/nostr-protocol/nips/pull/1718)**
[papiche](https://github.com/papiche) is proposing that designed to improve content filtering and moderation on the Nostr network through a decentralized and user-driven trust model.The key highlights of this proposal include: New Event Kind (Kind 33): Allows users to rate others with trust scores ranging from -100 to 100, enabling dynamic trust-based filtering. Client-Side Trust Calculations: Uses direct and indirect trust ratings to calculate trust scores, mimicking real-world relationships. Configurable Feed Filtering: Users can set trust thresholds to hide or display content based on their preferences. Transparency and Decentralization: Ratings are public, verifiable, and entirely user-controlled, avoiding reliance on central authorities.
**[Re-write NIP 89 to accommodate relays/dvms](https://github.com/nostr-protocol/nips/pull/1728)**
[Staab](https://github.com/staab) added a new kind for DVMs for a few reasons. The first reason is DVMs aren't really clients in the same way as software with a UI is. It would be valid for a client to specialize in generating kind 5300 requests and displaying kind 6300 events. If such a listing existed, there would be ambiguity about what was a DVM and what was a client, since "handling" here is overloaded. The second reason is Implicit in the current (31990) spec is that DVMs need to publish a kind 10002 list of relays. But since multiple app handlers may be published by the same pubkey (which might belong to a normal user), we've now overloaded the kind 10002 relays to be both for personal use and service fulfillment.and he added a new kind for relays because there has been some talk recently about addressing relays by pubkey rather than by url, since there may be multiple ways of addressing a single relay (clear net, onion, etc). A "relay handler" listing would be a first step toward enabling this.
**Notable Projects**
---
**[Flotilla](https://yakihonne.com/notes/nevent1qqsfcp84wjwske0x22vh0qu6mkteparl4dt43d6tsktnudwz2euy9kczyztuwzjyxe4x2dwpgken87tna2rdlhpd02va5cvvgrrywpddnr3jyqcyqqqqqqgh4yn5g)**
nostr:npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn
new Flotilla released to web, zapstore, and Google Play
* Improve room and data loading
* Use @welshman/editor
* Drop support for legacy event kinds
* Add support for back button navigation on android
* Remove note to self page (still available via chat)
* Improve chat conversation search
* Change how reply UI works
**[Damus 1.12](https://yakihonne.com/article/naddr1qqjrjvtxvc6nwcee95unvv3e956rsef495unxep495ekzv3exa3kycnpx56nvq3q8m76awca3y37hkvuneavuw6pjj4525fw90necxmadrvjg0sdy6qsxpqqqp65w2r5vyn)**
nostr:npub18m76awca3y37hkvuneavuw6pjj4525fw90necxmadrvjg0sdy6qsngq955
* Render Gif and video files while composing posts
* Add profile info text in stretchable banner with follow button
* Paste Gif image similar to jpeg and png files
* Improved UX around the label for searching words
* Improved accessibility support on some elements
* Fixed issue where the "next" button would appear hidden and hard to click on the create account view
* Fix non scrollable wallet screen
* Fixed suggested users category titles to be localizable
* Fixed more issues
**[Yakihonne](https://yakihonne.com/notes/nevent1qqs2nrvrhypwvqdmjd9aq7z3y2mcg2yjp8ztvzvflchdl969pxsqacszyqsfsmac8em4m9k33r99e803pnndvylqadl9w69q7zcjkd7d4ssmxqcyqqqqqqgg6vglk)**
nostr:npub1yzvxlwp7wawed5vgefwfmugvumtp8c8t0etk3g8sky4n0ndvyxesnxrf8q
**Web v4.3.0:**
* Yakihonne wallet name customization for newly created wallets.
* Option to toggle between collapsed or expanded notes in the feed for a personalized experience.
* Notification preferences can now be managed directly from the settings page.
* Quick access to your profile with the newly added profile button.
* Native poll rendering and voting functionality within notes.
* Bug fixes and performance optimizations for improved reliability.
**Mobile v1.6.4:**
* Yakihonne wallet name customization for newly created wallets.
* Option to toggle between collapsed or expanded notes in the feed for a personalized experience.
* Notification can now be customized and managed.
* Notification content is now rendered.
* Zap polls are now rendered inside notes.
* Private messages are optimized and enhanced.
* Urls are now previewed in a clean way inside notes.
* Variety of bugs have been fixed.
**[Olas](https://yakihonne.com/notes/nevent1qqspwvafemvmthp2f6qh67h3zt0xftvwzfsrx626rn3fmx8lph83stczyrafsj7hmweg9ur7zmn6apajdg48hxuskujx53rhrux0ttjcqx84yqcyqqqqqqg4smsd0)**
nostr:npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft
New release of Olas, the instagram-like client, is now out! Both on iOS and Android.
* Multiple images per post 📸
* Pause videos when switching away from the video feed
* Instagram-like filters! 🎨
* Nostr-native wallet improvements
* NWC reliability improvements
* Notification fixes
* Fix loading reactions and comments
* Small onboarding improvements
* Tons of under-the-hood optimizations
* Setting to toggle between displaying posts squared or full-length.
**[Fountain 1.1.14](https://yakihonne.com/notes/nevent1qqsd9q6rc6wtql3l0rzpvg95sqxnyav99u65l3an676sxfq7amdgrjqzypjn3yj7h7mxraqcmrraqa97ut52l4mcwqwa3yrsctdfxm2hre2uxqcyqqqqqqgpj28fp)**
nostr:npub1v5ufyh4lkeslgxxcclg8f0hzazhaw7rsrhvfquxzm2fk64c72hps45n0v5
* Nostr connect improvements
* Fixed bug where playback position was not being saved correctly
* Fixed bug where downloads were being automatically deleted
* Fixed bug where OPML import was failing on iOS 18
* Fixed bug where playlist items did not display the correct state
* Fixed bug where items disappeared from the user library when editing a playlist
* Fixed bug where player was being minimised when scrolling show notes
* Fixed deposit flow when entering via menu
* Fixed transcript page navigation and transcript errors on player
* Fixed crash when logging out
* Added ability to switch between NIP55 and nsec
* Added the ability to seek while paused
**[DEG mods](https://yakihonne.com/notes/nevent1qqs0zr98qkvqjm5sx3q9ec0staskachvfcw7r3eaewvxxxuaszd87hgzyr6t78a4h297sw0hp3enzue7xz0hszpzkvglv0spl8wg4wa59rud2qcyqqqqqqgp6qw7r)**
nostr:npub17jl3ldd6305rnacvwvchx03snauqsg4nz8mruq0emj9thdpglr2sst825x
* Advanced commenting system
* Tipping popup design change for better clarity of the tip-split process
* User WoT and its filter now behave correctly
* Zap/Tipping now works again
* The "Above 18?" popup now triggers on the direct link of an NSFW post
* Games that weren't there before, for mods in '(Unlisted Game)', are now available.
* Games DB list clean-up and additions
**[Amber 3.2.1](https://yakihonne.com/article/naddr1qqgxzv3exuurxwf4vgunvvnyxpjrwq3qam3ermkr250dywukzqnaug64cred3x5jht6f3kdhfp3h0rgtjlpqxpqqqp65w3yctdt)**
nostr:npub1am3ermkr250dywukzqnaug64cred3x5jht6f3kdhfp3h0rgtjlpqecxrv7
* Add some details when signing a contact list
* Refactor check for logged in account
* After granting notification permissions show the notification
**[Futr v0.2.1](https://yakihonne.com/notes/nevent1qqs878c8cfc028qtnmxtmxq8hx7kkx4gedvdagghrs85x7llenxquxszyqace9awj2r0qyjncnug6sk3d6zcclyj2yat7tecy5d07uf4zj7wvqcyqqqqqqghxapdy)**
nostr:npub18wxf0t5jsmcpy57ylzx595twskx8eyj382lj7wp9rtlhzdg5hnnqvt4xra
- Enhanced contact filtering with support for all name fields (petname, display name, username)
- Improved contact list layout and fixed visual glitches when filtering
- Optimized memory usage by implementing Loader components
- Adjusted follow list item height for better screen space utilization
- Fixed overlapping contacts when filtering the list
- Resolved undefined data access issues in the UI
- Improved profile updates to properly refresh the follows list
- Reduced debug logging noise across the application
- Removed unnecessary ListView caching for better performance
**[ZEUS v0.9.5](https://yakihonne.com/notes/nevent1qqswapu62mseqnjrgar8h4w3c4mwsxwgmgxpktun7m0m4mnh0r4gdwgzyq6d9af8fuv43lxjevjx8k474h0c5g0cft8yysw63zqz80c9ejqf2qcyqqqqqqgvz03vn)**
nostr:npub10r8xl2njyepcw2zwv3a6dyufj4e4ajx86hz6v4ehu4gnpupxxp7stjt2p8
* Embedded LND: Seed: allow export of HD seed (export to external wallets like Sparrow)
* CLNRest: add ability to use all funds for channel open
* Activity list: performance improvements
* Improve display of memos + keysend messages
* Automatically include routing hints if node has only unannounced channels
* Wallets list: better highlighting of active mode
* Enhanced on-chain receive workflow and address type selection
**[Citrine 0.7.1](https://yakihonne.com/article/naddr1qqgrjcfcxvekxcmrx9jnwvpcxyenqq3qhqlxlq57nvlq70ugmsmu9y5lmyc5k2lh5w7y85j7dgsr5u7zwavqxpqqqp65wz5p589)**
nostr:npub1hqlxlq57nvlq70ugmsmu9y5lmyc5k2lh5w7y85j7dgsr5u7zwavq5agspw
* Add the restore follows button back
* Show notification when backing up database
* Listen for pokey broadcasts
**Long-Form Content Eco**
---
In the past two weeks, more than 400 long-form articles have been published, including over 84 articles on Bitcoin and more than 42 related to Nostr, accounting for 32% of the total content.
These articles about Nostr mainly explore the concept and development of the decentralized social media protocol, its potential to disrupt traditional platforms, and how it empowers users with more control over their data and online identities. Topics like key recovery, wallet integration, and customization underscore Nostr's focus on user autonomy and digital freedom. The articles also highlight the platform's growth, its adaptability to various use cases (such as for Bitcoin integration), and the importance of open-source contributions. Nostr's ability to address issues like deplatforming, privacy, and censorship resistance is discussed alongside practical guides for users, developers, and businesses looking to leverage the protocol. Through tutorials, reviews, and discussions on philosophical aspects, these writings present Nostr as an evolving ecosystem with the potential to reshape social media and digital communication for the better.
The Bitcoin articles discuss various aspects of Bitcoin’s impact on both the financial and technological landscapes, exploring its role in decentralization, economic freedom, and global systems. They delve into the philosophical underpinnings of Bitcoin, including the challenges and opportunities posed by institutional custody, Bitcoin maximalism, and the clash with fiat systems. Topics such as the rise of Bitcoin mining, its implications for national security, and the transformative potential of the Lightning Network are explored. Several articles also highlight Bitcoin’s ability to empower individuals, offering financial sovereignty and addressing issues like mental health, economic growth, and cross-border transactions. The articles emphasize the importance of patience, understanding, and innovation in Bitcoin’s growth, underscoring its potential to reshape traditional systems, overcome centralized power, and provide alternatives in the face of global economic instability. Furthermore, the discussions extend to Bitcoin’s integration in various sectors, including education, business, and the technical community, while also evaluating its long-term viability and role in the future of finance.
Thankyou, nostr:npub18ams6ewn5aj2n3wt2qawzglx9mr4nzksxhvrdc4gzrecw7n5tvjqctp424 nostr:npub1da7m2ksdj24995hm8afv88pjpvzt6t9vh70mg8t52yjwtxza3vjszyar58 nostr:npub12zqf55l7l9vsg5f6ssx5pq4f9dzu6hcmnepkm8ftj25fecy379jqkq99h8 nostr:npub1g8ag22auywa5c5de6w9ujenpyhrrp9qq8sjzram02xldttmmwurqfd0hqk nostr:npub1elchyrnhhvrg7r4m6wyae4ggytw34jxj4s9s7hcgqzhfu9w8u2eq9s58z4 nostr:npub12zqf55l7l9vsg5f6ssx5pq4f9dzu6hcmnepkm8ftj25fecy379jqkq99h8 nostr:npub1mgvwnpsqgrem7jfcwm7pdvdfz2h95mm04r23t8pau2uzxwsdnpgs0gpdjc nostr:npub17xvf49kht23cddxgw92rvfktkd3vqvjgkgsdexh9847wl0927tqsrhc9as nostr:npub1a3pvwe2p3v7mnjz6hle63r628wl9w567aw7u23fzqs062v5vqcqqu3sgh3 nostr:npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn
and others, for your work. Enriching Nostr’s long-form content ecosystem is crucial.
**Nostriches Global Meet Ups**
---
Recently, several Nostr events have been hosted in different countries.
* **[The YakiHonne Meetup](https://yakihonne.com/article/naddr1qq2kse6ydpgxwu6424kkkntwg4ez6umvtax4qq3ql4uvxlcncw5at08gphpj0r2jnw5s3eg3n6g0jyceqhz6tg8vpqesxpqqqp65wm9gwzd)** took place on January 31 in Barnawa, bringing together an enthusiastic audience to explore the future of decentralized social media. The event featured an introduction to Nostr and YakiHonne’s core principles, sparking engaging discussions about decentralization. The meetup concluded with networking, refreshments, and a photo session, with many staying behind to continue the conversation.
* **[The YakiHonne Community Weekly Call](https://yakihonne.com/notes/nevent1qqsp6twvtnc80uhvss50n9fkj4a2f2hedwy5hrfy7djersqpneclltgzyqsfsmac8em4m9k33r99e803pnndvylqadl9w69q7zcjkd7d4ssmxqcyqqqqqqg0lcj2g)** took place on Sunday, January 26th, 2025. The session featured engaging discussions, an interactive Q&A segment, and a lucky draw with a top prize of 2,100 sats.
**[The Austin Bitcoin Design Club event](https://)** was held on January 30, 2025, at Bitcoin Commons. The event aimed to enhance Bitcoin design through education, participation, and a positive atmosphere, encouraging attendees to bring laptops for design critiques. The event was hosted by nostr:npub1p4kg8zxukpym3h20erfa3samj00rm2gt4q5wfuyu3tg0x3jg3gesvncxf8
* **[The Bitcoin City Team Hackathon](https://x.com/bitcoinindo21/status/1867339698282140063)** took place online via Discord from January 10 to January 31, 2025. Participants collaborated to build a fun, interactive visualization of live Bitcoin and Lightning transactions, helping people worldwide learn about Bitcoin. The event featured a 10,000,000 IDR prize, sponsored by Blink and Bitcoin Indonesia.
* **[The Bitcoin Circular Economy Summit](https://x.com/BitcoinEkasi/status/1869794679497338916)** took place from January 27-29, 2025, in El Zonte, El Salvador. This exclusive, invitation-only event brought together 15+ global Bitcoin circular economy communities, focusing on leadership training, Bitcoin education, and community networking. The summit aimed to foster global Bitcoin adoption and economic development. Additionally, it happened right before the PlanB Forum on January 30-31, offering attendees more opportunities for engagement and collaboration.
* **[The Adopting Bitcoin Cape Town 2025 conference](https://x.com/AdoptingBTCcpt/status/1800605346576425407)** took place on January 24-25, 2025, at Workshop17 in Cape Town's Waterfront. The event focused on how Bitcoin can reshape the financial system and revitalize communities against the backdrop of South Africa's ongoing decline in governance and infrastructure. It featured dozens of prominent figures from the Bitcoin ecosystem, including nostr:npub1dnzzyhmewrzkh862z7z2shwmhh5htx0rvkagepj2fkgst9ptwg3qj4x52h nostr:npub1k5f85zx0xdskyayqpfpc0zq6n7vwqjuuxugkayk72fgynp34cs3qfcvqg2 nostr:npub1empusn0uefqn5ymjj8f9xleaajufpxyjhu0d97yedjppdf2xw4uq6nr7fl nostr:npub16v6zr28ae067lmjf9vfnk2ckawjdclnna4frqfzy2yavz6htg6nqyq8jef nostr:npub1cn670f663n3ks02jnnlsvd5y88zjnefy8343ykaxs7y3nzzketrsrjwt8a nostr:npub1ykgzky9fffy5hgl76jfay9ywy5y9j3hmzljxau9sq2z2unmsxn2qpgxf8j nostr:npub1tand04svfdhrt7lhg6687fh0y2xvxfpr9nkkj27rqfrxfpeklldsp48sax nostr:npub1upalcp82slrj4yv9kzy37p2nv8nyjte9n7qjga5r6myuev4k28ks8zx054 nostr:npub1nd30hjn52q6p8mkjme5309wgpy5jm2pfrza54wh8h03nxw0kh7mqg8kjj7 and others, who discussed Bitcoin's practical applications and its impact on financial infrastructure.
Here are the upcoming Nostr events that you might want to check out.
**[The Asia Bitcoin Tech Unconference](http://satsnfacts.btc.pub)** is set to take place from February 8 to 10, 2025, in Chiang Mai, Thailand. Organized as a workshop-style event, it will feature a diverse lineup of speakers, including nostr:npub1zk6u7mxlflguqteghn8q7xtu47hyerruv6379c36l8lxzzr4x90q0gl6ef nostr:npub1htnhsay5dmq3r72tukdw72pduzfdcja0yylcajuvnc2uklkhxp8qnz3qac nostr:npub1ejxswthae3nkljavznmv66p9ahp4wmj4adux525htmsrff4qym9sz2t3tv nostr:npub147whqsr5vsj86x0ays70r0hgreklre3ey97uvcmxhum65skst56s30selt ,and others. The conference will focus on key topics such as scalability, mining, payments, and infrastructure, while also encouraging participants to share unfinished projects or technical challenges. Through hackathons and hands-on discussions, the event aims to foster collaboration and innovation. Highlights include technical talks, pitch competitions, Bitcoin product showcases, and creative and wellness activities such as Thai massages, ice baths, and arts and crafts workshops.
Additionally, We warmly invite event organizers who have held recent activities to reach out to us so we can work together to promote the prosperity and development of the Nostr ecosystem.
Thanks for reading! If there’s anything I missed, feel free to reach out and help improve the completeness and accuracy of my coverage.
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-06 07:38:36
# How does bitcoin's lack of central brand authority influence its visual identity, and what implications does this have for designers?
originally posted at https://stacker.news/items/877437
-
![](/static/nostr-icon-purple-64x64.png)
@ 73da3415:a8b7f470
2025-02-06 07:32:17
T e s t 1
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-06 07:28:25
# Looking at bitcoin's layered architecture (base layer and Lightning Network), can you explain why this approach was necessary? What are the trade-offs between transacting on each layer?
originally posted at https://stacker.news/items/877429
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-06 06:38:33
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/877410
-
![](/static/nostr-icon-purple-64x64.png)
@ 3ffac3a6:2d656657
2025-02-06 03:58:47
## Motivations
Recently, my sites hosted behind Cloudflare tunnels mysteriously stopped working—not once, but twice. The first outage occurred about a week ago. Interestingly, when I switched to using the 1.1.1.1 WARP VPN on my cellphone or PC, the sites became accessible again. Clearly, the issue wasn't with the sites themselves but something about the routing. This led me to the brilliant (or desperate) idea of routing all Cloudflare-bound traffic through a WARP tunnel in my local network.
## Prerequisites
- A "server" with an **amd64 processor** (the WARP client only works on amd64 architecture). I'm using an old mac mini, but really, anything with an amd64 processor will do.
- Basic knowledge of Linux commands.
- Access to your Wi-Fi router's settings (if you plan to configure routes there).
---
## Step 1: Installing the WARP CLI
1. **Update your system packages:**
```bash
sudo apt update && sudo apt upgrade -y
```
2. **Download and install the WARP CLI:**
```bash
curl https://pkg.cloudflareclient.com/pubkey.gpg | sudo gpg --yes --dearmor --output /usr/share/keyrings/cloudflare-warp-archive-keyring.gpg
echo "deb [arch=amd64 signed-by=/usr/share/keyrings/cloudflare-warp-archive-keyring.gpg] https://pkg.cloudflareclient.com/ $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/cloudflare-client.list
sudo apt-get update && sudo apt-get install cloudflare-warp
```
3. **Register and connect to WARP:**
Run the following commands to register and connect to WARP:
```bash
sudo warp-cli register
sudo warp-cli connect
````
Confirm the connection with:
```bash
warp-cli status
```
---
## Step 2: Routing Traffic on the Server Machine
Now that WARP is connected, let's route the local network's Cloudflare-bound traffic through this tunnel.
1. **Enable IP forwarding:**
```bash
sudo sysctl -w net.ipv4.ip_forward=1
```
Make it persistent after reboot:
```bash
echo 'net.ipv4.ip_forward=1' | sudo tee -a /etc/sysctl.conf
sudo sysctl -p
```
2. **Set up firewall rules to forward traffic:**
```bash
sudo nft add rule ip filter FORWARD iif "eth0" oif "CloudflareWARP" ip saddr 192.168.31.0/24 ip daddr 104.0.0.0/8 accept
sudo nft add rule ip filter FORWARD iif "CloudflareWARP" oif "eth0" ip saddr 104.0.0.0/8 ip daddr 192.168.31.0/24 ct state established,related accept
```
Replace `eth0` with your actual network interface if different.
3. **Make rules persistent:**
```bash
sudo apt install nftables
sudo nft list ruleset > /etc/nftables.conf
```
---
## Step 3: Configuring the Route on a Local PC (Linux)
On your local Linux machine:
1. **Add a static route:**
```bash
sudo ip route add 104.0.0.0/24 via <SERVER_IP>
```
Replace `<SERVER_IP>` with the internal IP of your WARP-enabled server. This should be a temporary solution, since it only effects a local machine. For a solution that can effect the whole local network, please see next step.
---
## Step 4: Configuring the Route on Your Wi-Fi Router (Recommended)
If your router allows adding static routes:
1. **Log in to your router's admin interface.**
2. **Navigate to the Static Routing section.** (This may vary depending on the router model.)
3. **Add a new static route:**
- **Destination Network:** `104.0.0.0`
- **Subnet Mask:** `255.255.255.0`
- **Gateway:** `<SERVER_IP>`
- **Metric:** `1` (or leave it default)
4. **Save and apply the settings.**
One of the key advantages of this method is how easy it is to disable once your ISP's routing issues are resolved. Since the changes affect the entire network at once, you can quickly restore normal network behavior by simply removing the static routes or disabling the forwarding rules, all without the need for complex reconfigurations.
---
## Final Thoughts
Congratulations! You've now routed all your Cloudflare-bound traffic through a secure WARP tunnel, effectively bypassing mysterious connectivity issues. If the sites ever go down again, at least you’ll have one less thing to blame—and one more thing to debug.
-
![](/static/nostr-icon-purple-64x64.png)
@ a012dc82:6458a70d
2025-02-06 02:34:44
In an unexpected turn of events that has sent ripples through the cryptocurrency world, Changpeng Zhao, the CEO of Binance, has extended his stay in the United States. This development is particularly striking against the backdrop of Binance's ongoing legal challenges and the intense scrutiny it faces from regulators worldwide. Zhao's decision to remain in the U.S. longer than anticipated is not just a personal choice but a strategic move that could have far-reaching implications for Binance's global operations and the cryptocurrency industry at large. It raises questions about Binance's future strategies and its efforts to navigate the complex web of international regulations.
**Table Of Content**
- Background: Binance's Regulatory Challenges
- Changpeng Zhao's Role and Influence
- The Unexpected U.S. Stay
- Legal Considerations
- Future of Binance and Crypto Regulation
- Conclusion
- FAQs
**Background: Binance's Regulatory Challenges**
Binance has emerged as a dominant force in the cryptocurrency exchange market, known for its vast selection of digital assets and high trading volumes. However, this success has not come without its share of challenges. The platform has been under the microscope of regulators across the globe, facing scrutiny over its compliance with stringent anti-money laundering (AML) standards and consumer protection laws. These regulatory hurdles have manifested in various forms, including formal warnings from financial watchdogs, in-depth investigations by regulatory authorities, and outright bans in certain jurisdictions. These challenges highlight the precarious position Binance occupies in the global financial landscape and underscore the delicate balance it must maintain between innovation and regulatory compliance.
**Changpeng Zhao's Role and Influence**
Changpeng Zhao, affectionately known as "CZ" in the crypto community, is more than just the CEO of Binance; he is a visionary and a key influencer in the cryptocurrency sector. Since founding Binance in 2017, Zhao has steered the company through exponential growth, navigating the volatile waters of the crypto market with a blend of technological innovation and strategic foresight. However, this journey has been fraught with controversies, particularly around issues of regulatory compliance and operational transparency. As the face and voice of Binance, Zhao's decisions, public statements, and even his personal movements are closely watched and analyzed for insights into Binance's future direction and its stance on regulatory matters.
**The Unexpected U.S. Stay**
The news of Zhao's extended stay in the U.S. has sparked a flurry of speculation and analysis within the financial and cryptocurrency sectors. This move is particularly intriguing given the current regulatory climate in the U.S., which is known for its stringent financial oversight and tough stance on cryptocurrency regulation. The extended stay raises several questions: Is Zhao seeking to engage in high-level negotiations with U.S. regulators? Is Binance planning a strategic pivot or expansion in the U.S. market? Or is this a proactive measure to address some of the legal challenges facing the company? Whatever the reason, Zhao's presence in the U.S. is a clear indication that significant developments are underway for Binance in one of the world's most important financial markets.
**Implications for Binance**
Zhao's decision to extend his stay in the U.S. could be interpreted as a strategic move to align Binance more closely with U.S. regulatory frameworks. This could involve enhancing the company's compliance systems, engaging in more transparent dialogue with regulatory bodies, or even restructuring some of Binance's business practices to conform to U.S. standards. Such changes could be crucial for Binance's continued operation and growth in the U.S. market, potentially opening doors to new partnerships, investment opportunities, and a broader customer base. Moreover, a stronger foothold in the U.S. could enhance Binance's reputation globally, signaling its commitment to regulatory compliance and financial stability.
**Industry Reactions**
The cryptocurrency industry and financial markets are abuzz with discussions about Zhao's extended stay in the U.S. Analysts, investors, and other industry players are keenly observing this development, understanding that Zhao's actions could signal a new chapter for Binance and possibly the entire cryptocurrency sector. His stay is being interpreted as a sign of Binance's willingness to engage more proactively with regulatory bodies, a move that could have significant implications for how cryptocurrency businesses operate globally. Additionally, Zhao's presence in the U.S. could influence other cryptocurrency exchanges and startups, setting a precedent for how they might approach regulatory challenges and market expansion.
**Legal Considerations**
Zhao's prolonged presence in the U.S. coincides with a critical period for Binance as it navigates complex legal waters. His decision to stay could be instrumental in facilitating more direct and effective engagement with U.S. legal authorities and regulatory bodies. This proximity to the heart of U.S. financial regulation might enable more constructive dialogues, potentially leading to resolutions or progress in the various legal cases and investigations Binance is currently involved in. Zhao's hands-on involvement in these legal matters could be a game-changer, offering opportunities for negotiation, compliance, and possibly even reconciliation with regulatory authorities.
**Potential Outcomes**
The involvement of Zhao in legal and regulatory discussions in the U.S. could lead to a spectrum of outcomes for Binance. These might range from reaching amicable settlements and forming robust compliance agreements to facing more stringent regulatory actions or operational restrictions, depending on the nature of the negotiations and the willingness of both parties to find common ground. The outcomes of these engagements are likely to have a significant impact on Binance's operational framework, its global reputation, and its ability to compete in the international market. They could also set important precedents for how major cryptocurrency exchanges interact with regulatory bodies and navigate legal challenges.
**Future of Binance and Crypto Regulation**
Zhao's decision to extend his stay in the U.S. is a pivotal moment in the evolving narrative of cryptocurrency regulation. It underscores the increasing importance of regulatory compliance for major players in the crypto space and suggests a potential shift towards more collaborative and proactive approaches between industry leaders and regulatory bodies. This development could be a harbinger of a new era in cryptocurrency regulation, where open dialogue, transparency, and compliance play central roles in shaping the industry's future.
**Strategic Shifts for Binance**
Depending on the outcomes of Zhao's engagements in the U.S., Binance may undergo significant strategic shifts, particularly in its approach to regulatory compliance, operational transparency, and market strategy. These shifts could have far-reaching implications, not only for Binance but for the entire cryptocurrency exchange industry. They could set new standards for regulatory compliance, influence the development of new financial products and services, and shape the future landscape of the global cryptocurrency market.
**Conclusion**
Changpeng Zhao's unexpected extended stay in the United States represents a critical and potentially transformative moment in Binance's ongoing legal and regulatory saga. It reflects the complex and dynamic nature of cryptocurrency regulation and the necessity for industry leaders to adeptly navigate these challenges. As the crypto community and financial markets watch closely, the decisions and actions taken by Zhao in the coming days and weeks could have far-reaching implications for Binance's future, its position in the global market, and the broader trajectory of the cryptocurrency industry.
**FAQs**
**What challenges is Binance currently facing?**
Binance is grappling with regulatory scrutiny worldwide, particularly concerning anti-money laundering standards and consumer protection laws. This has led to investigations, warnings, and bans in several countries.
**How might Zhao's stay in the U.S. impact Binance?**
Zhao's extended stay could signal a move towards greater regulatory compliance and cooperation in the U.S., potentially leading to operational changes and enhanced market access for Binance.
**What are the potential outcomes of Zhao's U.S. engagements?**
Outcomes could range from amicable settlements and compliance agreements to more stringent regulatory actions, depending on the nature of Zhao's discussions with U.S. authorities.
**How could this development affect the broader cryptocurrency industry?**
Zhao's actions could set a precedent for cryptocurrency exchanges in terms of regulatory compliance and engagement, influencing the global cryptocurrency regulatory landscape.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-
![](/static/nostr-icon-purple-64x64.png)
@ fe32298e:20516265
2025-02-06 02:11:34
I've been using AI tools to help with coding for a while now, but it's always been copy/pasting into ChatGPT and DeepSeek. Faster iteration is better, and privacy is best. So it's time to figure out how to use these tools integrated into [VSCodium](https://github.com/VSCodium/vscodium) and running locally. After a quick review of the most popular extensions I've heard about, I settled on [Tabby](https://github.com/TabbyML/tabby).
## What the heck does this actually DO?
* Code completion - like autocomplete suggestions, looks at your code and suggests the next thing to type at the cursor. You can see it in gray text, then press Tab and it's added to your code.
* Chat - easily chat with an LLM about your code inside your editor, faster than copy/pasting into a website.
* Apparently it can write docs and tests too.
## Can I run it locally? Without a GPU? YES!
Tabby is optimized for small models that only need a few GBs of RAM. I'm using a fairly old [System76](https://system76.com/) Galago Pro with Core i5-10210U and 16 GB RAM. The fans spin up, and Tabby sometimes shows a warning about slow response time, but it seems usable.
## How do I get it set up?
This is the overview, look for step-by-step instructions at the end of this article.
1. Install the Tabby server, which runs locally.
1. Start the Tabby server and tell it to serve some models which it will download automatically.
1. Log in to the Tabby server web interface and create an admin account.
1. Install the Tabby extension in your editor.
1. Connect the Tabby extension to your Tabby server.
## How do I actually use it?
1. Click **Tabby** in the bottom-right corner to open the Tabby command palette.
1. Select **Chat** to open the Chat pane. Drag it to the right side if you want.
1. Or, *Ctrl-Shift-P* and type "tabby" to see some Tabby commands
1. Select some code and *Ctrl-Shift-P* "tabby" to see more Tabby commands
1. **Explain this** seems like a useful one.
Other than that, I don't know! I just started using it today.
## What model should I use?
As usual, it depends. If you're using CPU instead of GPU, start with the ones recommended by Tabby and shown in the Step-by-Step below. Tabby has a [registry of models](https://tabby.tabbyml.com/docs/models/) you can choose from, and a [leaderboard](https://leaderboard.tabbyml.com/) to compare them.
## Step-by-Step
This is for Ubuntu 24.04, and no GPU.
```
# install pre-reqs
sudo apt install build-essential cmake libssl-dev pkg-config
sudo apt install protobuf-compiler libopenblas-dev
sudo apt install make sqlite3 graphviz
# install rust
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
. "$HOME/.cargo/env"
# build tabby
git clone --recurse-submodules https://github.com/TabbyML/tabby
cd tabby
cargo build
# run tabby (downloads ~3 GB of models)
./target/debug/tabby serve --model StarCoder-1B --chat-model Qwen2-1.5B-Instruct
# browse to http://0.0.0.0:8080 and create an admin user
```
* Install the Tabby extension in your editor. VSCodium had it in the extensions store by searching for "tabby" or try this `ext install TabbyML.vscode-tabby`
* *Ctrl-Shift-P* and look for "Tabby: Connect to server"
* Use the default of `http://localhost:8080`
* Switch over to the Tabby web interface, click your Profile Picture and copy the auth token
* Paste that into Tabby somewhere. I'm sure you'll figure it out if you got this far.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-06 00:49:05
Herbs and spices don't just taste great. Most of the time they're also great for you.
- Spicier foods ironically are strongly anti-inflammatory and chronic inflammation is one of the major drivers of poor health
- Roots, like turmeric/ginger/garlic/onion, are also strongly anti-inflammatory
- Herbs, like parsley and oregano, are super high in vitamins K, C, beta carotene, folate, and others, as well as potassium, manganese, and other minerals.
- Seeds, like cumin or coriander, are super mineral dense.
- Sea salt (unrefined) has a broad array and excellent balance of minerals.
So, what's the health principle?
Eat tastier more flavorful food. It's tasty because it's good for us (shut up sugar!).
originally posted at https://stacker.news/items/877209
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-06 00:19:45
Your phone is not your friend. It is a filthy little snitch that tells anyone who asks where you are, what you are doing, and who you are doing it with. You can obscure and hide some things through the use of privacy respecting software like encrypted communication apps, Tor pathways using Orbot, or the base OS like Graphene but metadata and geolocation is still very loud and very present. It is built into the infrastructure of how cell phones work. Your phone is tracked at all times through every cell tower area you pass through logging your IMEI and by extension your phone number and identity. This data is logged and saved forever by companies who use and sell it for corporate surveillance and post Patriot Act give it to police and government agencies warrantlessly.
Fine, I will just turn it off then. Nice try, but unless the battery can be removed it still tracks you. You didn't think it was weird that Find My Phone still works even if the phone was off? Luddites are not off the hook. That dumb phone or flip phone is tracked just the same and since it will not run encrypted communications you are screaming out the content of every call or text and not just the metadata.
OK, I will get a burner phone or anonymous SIM card not tied to my identity. Better, but not bulletproof. This is great for use and toss but if you continue to use it multiple times, around other devices that are tied to you or your social network, or take it to your home, work, or any location associated with you then it will be doxxed. Once doxxed all past information associated with it becomes now linked to you.
Metadata, Profile, and Network Your network is very easily known and built up over time. Who are the contacts saved in your phone? Who do you interact with? Who do you call, text, email, DM, or follow on social networks? Who do you never contact but your geolocation overlaps with them often. Now look at all those contacts and who they have a network with. A giant spider web of connections. If by 7 degrees of Kevin Bacon you have a shady contact in your network then you may get more scrutiny than you may realize.
You are spilling metadata everywhere you go along with your geolocation. Time stamps, who you contacted, how long you talk to them, which app was used when, internet searches, map app searches, etc. People are creatures of habit and over time this metadata builds a pretty good profile on you. Phone becomes active around 7am when they wake up. Scans social media and news sites for usually 30 minutes. Assume they are taking a shower because the phone is on but not being used until 8am most weekdays. Travels to a coffee place on the corner most mornings and then goes to their place of work. Between 9:30 and 10:30 am they again scan social media and news sites for a solid 10 minutes, probably their bathroom schedule. During lunch they frequent these locations with these people. You get the point.
This profile, plus your geolocation history, plus your network paints a pretty complete picture on you. Surprisingly it is not what you do but when you do something different that gets attention. There was a big protest last night that we are not happy about. We already have a list of everyone who took their phones with them at that geolocation and timestamp. We run an algorithm looking for simple patterns. John is usually at a restaurant eating with friends during this time but strangely his phone was left at home and turned off during that time frame. Did anyone in his network go to the protest that we have already confirmed? Anyone in his network follow the protest Facebook page, or have a deviation from their usual pattern such as their phone being somewhere dormant when it is usually active during this time?
What can you do? You can choose to do nothing. You can just live your life with the awareness that you are being tracked and profiled, maybe work to limit how much metadata you are spilling out to the universe. If you are an activist, an oppressed minority, live in an oppressive regime, or your country suddenly becomes oppressive this might not be an option. Randomize or maintain your profile. This is hard but not impossible. Make your profile and habits so chaotic that any deviation is not a deviation. Most people cannot do this but if you are couch-surfing, going to different places constantly, new friends and new activities on the daily agent of chaos then maybe this is an option.
On the opposite extreme maybe you are a very regimented person so be aware of that and always stick to your routine. If you want to go to that protest but are usually home doom scrolling youtube during that time then set your phone to no sleep mode and set up to watch a long playlist of youtube videos left at home while you go to the protest.
Home phone only. Maybe you decide to have a home phone only, no not a landline, but an actual smart device that can utilize encrypted communications services but never leaves the house. This could potentially save you a lot of money on data plans, texts, and minutes if you don't buy a network plan and just use VOIP on your home WIFI. Or maybe you have a very minimal network plan and when you leave the house you either take it with you in a Faraday bag or have a secondary device that lives in a Faraday bag that only comes out for emergencies and to check in. Just be aware that the time in and out of the Faraday bag is part of your profile.
No Phone. You can have no phone whatsoever. This will not work for most people in the modern age but if you have an extreme risk profile then this might be the extreme option you need. How do you survive with no phone or only a home phone? Just some alternatives and some ideas. You can still buy WIFI only devices that have no network connection and / or stay in airplane mode. Old MP3 players for music and podcasts while on the go. Old phones that you can download maps to for navigation and use VOIP services in WIFI hotspots.
Emergency Communication and Go Bag Prepper culture has given us all sorts of bags: bug out bags, get home bags, never coming back bags, and go bags. I define go bags as very small, light weight, and compact bags or kits. They carry very minimal, bare necessary gear, and ideally are so small that you actually have it on you, in your purse or computer satchel or car all of the time. Emergency communication will be part of this. This is when the burner phone, purchased with cash out of town, and stored in a Faraday bag all the time shines. It has no connection to you and has no history of use. It is a have but hope to never use oh shit device. If you are the activist, the whistleblower, the oppressed that they could come after at any time, or the journalist that investigates corruption, organized crime, or terrorism then you need this.
-
![](/static/nostr-icon-purple-64x64.png)
@ ec42c765:328c0600
2025-02-05 23:45:09
test
test
-
![](/static/nostr-icon-purple-64x64.png)
@ ec42c765:328c0600
2025-02-05 23:43:35
test
-
![](/static/nostr-icon-purple-64x64.png)
@ 638d2a79:f5645f4e
2025-02-05 23:28:37
China was ruled by one ruler, but over time, China split into two—South and North—which had a rivalry between them. At this time, Yang Chien was a general in the army of Northern China. He thought that China should be whole once more, so, like any _insert age here_ year old would do, he attacked the king of the South (for peace!). After a bit of fighting, he overpowered Southern China and took control of all of China. This man founded a dynasty—the Sui Dynasty—to rule and to keep China united.
But wait! Rivers made travel difficult between the North and South, so his son created a new river when he became emperor. This canal made it easier to cross the rivers, which greatly improved trade. The people did not like working on this river, and after it was completed, they killed him, making him the second and last emperor of the Sui Dynasty.
Cue the new emperor, Li Yuan, AKA "the smart guy." He wanted to stay alive for a long time, and he saw how unhappy people had just killed the last important ruler. So, he decided to invest in keeping people happy instead. This started the Golden Age of China, also called the Tang Dynasty.
Tags: [[human behavior index]] ,[[history]]
-
![](/static/nostr-icon-purple-64x64.png)
@ ec42c765:328c0600
2025-02-05 23:16:35
てすと
nostr:nevent1qqst3uqlls4yr9vys4dza2sgjle3ly37trck7jgdmtr23uuz52usjrqqqnjgr
nostr:nevent1qqsdvchy5d27zt3z05rr3q6vvmzgslslxwu0p4dfkvxwhmvxldn9djguvagp2
test
てs
-
![](/static/nostr-icon-purple-64x64.png)
@ dff95033:862fbf40
2025-02-05 23:02:55
Se você achava que o Brasil já tinha atingido o fundo do poço em termos de gestão fiscal, prepare-se para uma surpresa: o poço tem subsolo. O estudo **"Projeções Fiscais e Orçamentárias: O Desafio das Despesas Discricionárias"**, elaborado pela Consultoria de Orçamento e Fiscalização Financeira (Conof) da Câmara dos Deputados, é um retrato nada animador do futuro das contas públicas brasileiras. E, como todo bom retrato de família, é feio, mas é o que temos.
### **O Barco Está Afundando, mas o Capitão Continua no Churrasco**
O estudo começa com uma premissa básica: o **Regime Fiscal Sustentável (RFS)**, aquela joia rara da Lei Complementar nº 200/2024, está prestes a naufragar. A ideia era simples: limitar o crescimento das despesas primárias para evitar que o país virasse um **PIB de mentirinha** com uma dívida pública de verdade. Só que, como tudo na República do Brasil, a teoria é linda, mas a prática é uma tragédia.
O problema central é o **espaço para despesas discricionárias**, ou melhor, a falta dele. Enquanto as despesas obrigatórias (aqueles gastos que o governo não pode cortar, como aposentadorias e salários) continuam crescendo como erva daninha, o espaço para investimentos em áreas como saúde, educação e infraestrutura está diminuindo mais rápido que copo de um certo pinguço. O estudo projeta que, a partir de 2027, o governo vai ter que escolher entre pagar as estravaJanjas da Alvorada ou investir em hospitais — obviamente a estravaJanja.
### **As Pressões: Quando o Salário Mínimo Vira um Pesadelo**
O estudo lista uma série de **pressões** que estão esmagando o orçamento. A primeira delas é o **aumento do salário mínimo**, que, pasmem, não é só uma boa notícia para os trabalhadores. Ele impacta diretamente benefícios como o RGPS, o BPC, o seguro-desemprego e o abono salarial. Em 2025, o salário mínimo subiu de R$ 1.509 para R$ 1.518. Parece pouco, mas quando você multiplica isso por milhões de beneficiários, o resultado é um rombo de R$ 32,8 bilhões. É como se o governo tivesse comprado um apartamento na praia e descobrisse que a taxa de condomínio é em dólar.
E não para por aí. O estudo também aponta a necessidade de **suplementações orçamentárias** para programas como o **Auxílio-Gás** e o **Pé-de-Meia**. No caso do Pé-de-Meia, o Tribunal de Contas da União (TCU) já deu o veredito: o governo não pode usar recursos de fundos sem autorização orçamentária. Ou seja, o programa que deveria ajudar estudantes do ensino médio agora é mais um furo no bolso do contribuinte. Parabéns, 3 meses de curso de economia valeram a pena, né, Senhor Ministro da Economia!
### **Os Alívios: Um Band-Aid num Ferimento de Bala**
Claro, nem tudo está perdido. O estudo aponta algumas fontes de **alívio**, como o aumento do limite de despesa primária do Poder Executivo (R$ 12,4 bilhões) e as economias geradas pelo **pacote fiscal Brasil Mais Forte** (R$ 10,4 bilhões). Mas vamos ser sinceros: isso é como tentar apagar um incêndio florestal com um copo d'água. O pacote fiscal, aliás, é uma piada pronta. Ele promete economias, mas, na prática, é mais um remendo mal costurado em um sistema que já está caindo aos pedaços.
O estudo ainda menciona que o pacote foi "excessivamente tímido" em relação à desvinculação de despesas. Traduzindo: o governo mexeu onde não doía e ignorou os problemas reais. Enquanto isso, a **PEC Alternativa**, a qual o estudo menciona, propõe medidas mais robustas como a desindexação de despesas e a limitação de supersalários, continua engatinhando no Congresso. Ou seja, enquanto o Titanic afunda, Brasília está discutindo como as lagostas serão marinadas.
### **O Futuro: Um Cenário de Terror (Sem Pipoca)**
As projeções para o período de 2025 a 2034 são de cortar o coração — ou o bolso, dependendo de quem está lendo. O estudo mostra que, a partir de 2027, o espaço para despesas discricionárias vai encolher tanto que o governo vai ter que escolher entre pagar os funcionários públicos ou manter os hospitais abertos — Olá Correios! Ou, se der bobeira, nenhum dos dois.
O piso de investimentos de 0,6% do PIB, que já é baixo, vai consumir boa parte do pouco espaço que resta. E o pior: o estudo alerta para o risco de um **"desligamento" (shutdown)** da máquina pública. Sim, aquela coisa que acontece nos EUA quando o Congresso não aprova o orçamento. Só que, no Brasil, o shutdown não vai ser por falta de acordo, mas por falta de dinheiro mesmo. Imagine o caos: escolas fechadas, hospitais sem médicos, e o Congresso ainda tentando aprovar um aumento de salário para os parlamentares.
Dívida pública brasileira, então? Vixe, vai ser uma explosão nuclear. Anota aí: vai entrar pra história.
### **Conclusão: O Brasil Precisa de um Milagre (ou de um Novo Governo)**
O estudo da Conof é um alerta vermelho para o país. Sem medidas estruturais sérias, o Brasil vai continuar navegando em águas turbulentas, com um barco cheio de furos e um capitão que insiste em ignorar o iceberg à frente. A **PEC Alternativa** é uma luz no fim do túnel, mas, como tudo no Brasil, depende da vontade política de quem está no poder. E, convenhamos, vontade política é algo que anda em falta por aqui.
Enquanto isso, o contribuinte continua pagando a conta de um sistema que parece ter sido projetado para falir. O estudo termina com uma mensagem clara: **ou o país faz reformas profundas, ou o futuro será uma sucessão de crises fiscais**. E, no ritmo em que as coisas estão indo, o futuro já começou.
Então, se você ainda acredita que o Brasil vai recuperar-se, talvez seja hora de repensar. Ou, pelo menos, garantir que você tem um bom fundo e, em alguns casos, seguro de vida — porque o barco está afundando, e nem todos vão conseguir um lugar no bote.
---
![](https://blossom.primal.net/74c100934c84293bd369bc2f0ad43eff8c48eee0cb4533f369034bc230dd69b4.jpg)E por falar em reformas, minha preferência pessoal vai para a PEC 7/2020, uma proposta que considero mais salubre e alinhada com as necessidades estruturais do país. A PEC 7/2020 traz medidas robustas para conter o crescimento dos gastos públicos, com foco na desvinculação de despesas e na revisão de benefícios fiscais, além de propor uma reforma administrativa que promove maior eficiência e transparência na gestão pública. Se você se preocupa com o futuro fiscal do Brasil e acredita que é possível fazer mais com menos, convido você a conhecer a PEC 7/2020 e entender por que ela pode ser a chave para um orçamento público mais sustentável. Afinal, reformas profundas exigem propostas ousadas — e a PEC 7/2020 é exatamente isso.
---
### REFERÊNCIAS
CÂMARA DOS DEPUTADOS. Consultoria de Orçamento e Fiscalização Financeira. **Projeções fiscais e orçamentárias: o desafio das despesas discricionárias**. Brasília, 2025. Disponível em: <https://www2.camara.leg.br/orcamento-da-uniao/estudos/2025/ET_042025_0204Projeesfiscaiseoramentriasodesafiodasdespesasdiscricionrias.pdf>. Acesso em: 05 de fev. 2025
BRAGANÇA, Luiz Orléans e. **Reforma e alinhamento tributário: a opção pelo progresso**. 2023. Disponível em: <https://lpbraganca.com.br/reforma-alinhamento-tributario-opcao-progresso/>. Acesso em: 05 de fev. 2025
-
![](/static/nostr-icon-purple-64x64.png)
@ df478568:2a951e67
2025-02-05 22:12:20
In the Case For A 100 Percent Gold Dollar, Murray Rothbard argues, “the debacle of 1931-1933, when the world abandoned the gold standard, was not a sudden shift from gold weight to paper name; it was the last step in a lenghty, complex process.” He said that before WWI, a dollar was defined as aproximately 1/20th of an ounce of gold.” If it worked, a dollar would buy about as much as $143 does today, but it didn't work.
Gold ownership was banned until Executive Order 6102 was lifted in the 1970's. According to Rothbard, France sent a battleship to the United States to repatriate its gold. Then, Nixon took the dollar "temporarily" off the gold standard in 1971. It just so happened I listened to a podcast after I started writing this. Joseph Voelnel tells the story in this podcast.
https://fountain.fm/episode/mXreHZ2um0RnxaHsWMfe
I paid for the transcript using bitcoin on the lightning network using a podcasting 2.0 app named Fountain. Try it out. You can earn small amount of bitcoin just for listening. It is not self-custodial, but it's a great way to get started if you're curious. If you're not curious, you probably won't like bitcoin.
![Once bitten 523](https://gitea.marc26z.com/marc/Marc26z/raw/commit/b15c10a89226833f3881c63f84c8aa25d7ca4ef8/Gold/Screenshot_20250205_131706.jpg)
The US government debased gold and made it 41% after issuing Executive Order 6102. Nixon took the dollar completely off the gold standard in 1971. The dollar is still a fiat currency, backed by nothing but "good faith and credit of the United States." That's basically nothing. You might as well say the US dollar is backed by good vibes. Do you think the US can pay 36 trillion bucks back with good vibes?
I do not.
**Gold will not fix this**.
If the US went back to the gold standard, we would need to trust the good vibes of Fort Knox, but anyone in their right mind would not trust these good vibes.
*"The root problem with conventional currency is all the trust that's required to make it work. The central bank must be trusted not to debase the currency, but the history of fiat currencies is full of breaches of that trust."*
**Satoshi Nakamoto, P2P Foundation thread.**
Even if we self-custody gold again, metal does not prevent debasement. Here's one of my favorite quotes from Adam Smith's Wealth of Nations:
*"There was a third event which occurred in the course of the same period, and which, though it could not occasion any scarcity of corn, nor, perhaps, in the real quantity of silver which was usually paid for it, must necessarily have occasioned some augmentation in the nominal sum. This event was the great debasement of the silver coin, by clipping and wearing. This evil had begun in the reign of Charles II. and had gone on continually increasing till 1695; at which time, as we may learn from Mr Lowndes, the current silver coin was, at an average, near five-and-twenty percent. Below its standard value."*
Monetary debasement is not a new phenomenon. The double-spending problem has been around for hundreds of years. In my opinion, bitcoin is the best shot humankind has of solving the double spending problem.
*"A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending."*
**Satoshi Nakamoto, Bitcoin: A Peer-To-Peer Electronic Cash System**
To steel-man the case against bitcoin, I would say the biggest issue is how many people prefer to use a trusted third party to custody their bitcoin. That’s why education is important. In principle, I think we should keep 100% custody of our bitcoin. In practice, I do keep some of my sats in a custodial wallet to pay bills. I working on this, but I need to open up a fatter lightning channel and set up auto-payments to my Strike wallet. That’s my goal, but I need to I want to make sure I don’t rug myself first so I am testing it out with smaller amounts first. It is possible, it just takes time to learn how to do it safely.
I still think bitcoin is our best shot against centuries of monetary debasement.
npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
[882,461](https://mempool.marc26z.com/block/00000000000000000000511b272a9da9ff27c70afa16bd96ccb71121ee7197f1)
[Merch](https://marc26z.com/merch/)
-
![](/static/nostr-icon-purple-64x64.png)
@ 8d5ba92c:c6c3ecd5
2025-02-05 22:06:18
**There I was, minding my own business at the airport (i.e., arranging the list of Bitcoin/Freedom podcasts for the next seven hours of flight), when I came across a scene that could have been ripped straight from a show about the decline of civilization. Heart-wrenching. Shocking. Dystopian. To put it simply, what the f*ck?!**
## Prologue.
A family of five, including two early-school kids (let’s call them 'Timmy' and 'Amy', around 5 and 7 years old), a father who looked like he’d given up on life, and a perfect mother multitasking like a pro—breastfeeding a baby while chowing down on a Big Mac.
Oh yeah, the whole family was happily consuming their McDonald’s junk as if it was their daily ritual.
Watching little kids eat that stuff? A mix of anger and sadness. But seeing a breastfeeding mother give her newborn absolute garbage? The scene I can’t forget.
She also washed it all down with some fizzy, sugary, chemical-laden sludge later on. Still, while breastfeeding. Because, you know, nothing screams nourishment like a steady diet of artificial stuff. Best to get them hooked in the first few months, right?
## Act One: The Mother’s Masterpiece.
A modern-day Madonna, cradling her infant while balancing junk food’s finest. The baby, blissfully unaware of the nutritional betrayal unfolding in real-time, probably wasn’t even dreaming of normal food that might one day help it grow into a healthy being.
Seeing this scene, knowing all the options available at the airport—many much more reasonable than this crap—and watching the family enjoy their 'sacred food', I’m almost certain this little one had been getting a side of heavily processed rubbish long before it even left the womb...
Rave: A standing ovation for conscious parenting.
## Act Two: Innocent Contribution.
Just when I thought the scene couldn’t get worse, little “Timmy” decided to play bartender. With the enthusiasm of a child clearly raised on a steady diet of Big Macs and Coca-Cola (or whatever other delicacies were on offer), he extended his cup to his tiny brother or sister. The devoted mother, of course, helped him guide the straw to the baby’s mouth. *“Drink, little one! Drink not just from my body, but directly from the cup. Drink this (crap) with us!”*
Why not? If McDonald’s was good enough for everyone in the family, surely it was good enough for the baby sibling, right?
They all looked almost proud of Timmy’s little “sharing is caring” moment. Meanwhile, my heart shattered into a million pieces, each one screaming, *“Seriously?! Should I interfere? How would they react?”*
I was close enough to keep taking photos, staring at them with my mouth probably hanging open, horror written all over my face. The mother met my gaze once—cold, unreadable. No 'leave us alone.' No 'it’s our business.' No 'what's wrong, tell us.' Just... nothing.
My husband, noticing my growing frustration and sensing I was about to step in, whispered, *“Let it go. You won’t save them in 10 minutes at the airport.”*
Maybe he was right. But I’ll be thinking about it for a long time…
## Act Three: A Recipe for Regret.
It was as if the parents had collectively agreed that their bodies were nothing more than human garbage bins, and their children were just smaller versions of the same.
Let’s be clear: adults can do whatever they want with their health. If you want to treat your body like a landfill, go ahead—it’s your funeral (literally). But when you drag your kids into it, it’s no longer a personal choice. It’s more like a crime. These children didn’t sign up for a life of artificial flavors, empty calories, and a future riddled with health problems. They deserve better.
And if you’re reading this thinking, *‘What’s the big deal?’*—let's talk.
My brain is on the verge of exploding, trying to understand how anyone could actively contribute to the slow, painful destruction of the people they (presumably) love. You should love and respect your own body, and even more so the lives of your kids. What could possibly justify feeding your family McDonald's if it’s not the very last option you have on earth to survive? Please, help me understand why!
## Epilogue: The Aftertaste.
As I stepped into the boarding line, I couldn’t shake the thought: Is this really where we are now?
A world where care and nutritional awareness no longer exist. Where junk food became a family tradition. Where children are raised on a cocktail of chemicals when better options are right there!
**To the McDonald’s family at the airport—and anyone on their way to becoming one:
Not sure if you enjoyed your meal. If you did, I wish you luck. You’ll need it.**
https://i.nostr.build/e8f3h9iuDNQbtmaF.png
**And please, maybe—just maybe—consider giving your kids a chance. They deserve more than a trash life packed with chemicals in a paper bag.**
----
BTC Your Mind. Let it ₿eat.
Şelale
-
![](/static/nostr-icon-purple-64x64.png)
@ ec42c765:328c0600
2025-02-05 22:05:55
# カスタム絵文字とは
任意のオリジナル画像を絵文字のように文中に挿入できる機能です。
また、リアクション(Twitterの いいね のような機能)にもカスタム絵文字を使えます。
![image](https://nostrcheck.me/media/lokuyow/b350b17b9176c59ec8c5e8251189a6610d09f2d7d2746f40476c5214e5827d37.webp)
# カスタム絵文字の対応状況(2025/02/06)
![image](https://cdn.nostrcheck.me/ec42c765418b3db9c85abff3a88f4a3bbe57535eebbdc54522041fa5328c0600/e815d627b374aba2467952ac2206b04684912bf4a65e39603e090f0de65b7d6a.webp)
カスタム絵文字を使うためにはカスタム絵文字に対応した[クライアント](https://welcome.nostr-jp.org/tutorial/explore-client.html)を使う必要があります。
※表は一例です。クライアントは他にもたくさんあります。
使っているクライアントが対応していない場合は、クライアントを変更する、対応するまで待つ、開発者に要望を送る(または自分で実装する)などしましょう。
#### 対応クライアント
- [Amethyst](https://play.google.com/store/apps/details?id=com.vitorpamplona.amethyst)
- [FreeFrom](https://freefrom.space/)
- [nostter](https://nostter.app/)
- [Rabbit](https://rabbit.syusui.net/)
- [Lumilumi](https://lumilumi.app/)
- [Nos Haiku](https://nos-haiku.vercel.app/)
- [Snort](https://snort.social/)
- [noStrudel](https://nostrudel.ninja/)
ここではnostterを使って説明していきます。
# 準備
カスタム絵文字を使うための準備です。
- Nostrエクステンション(NIP-07)を導入する
- 使いたいカスタム絵文字をリストに登録する
## Nostrエクステンション(NIP-07)を導入する
Nostrエクステンションは使いたいカスタム絵文字を登録する時に必要になります。
また、環境(パソコン、iPhone、androidなど)によって導入方法が違います。
Nostrエクステンションを導入する端末は、実際にNostrを閲覧する端末と違っても構いません(リスト登録はPC、Nostr閲覧はiPhoneなど)。
Nostrエクステンション(NIP-07)の導入方法は以下のページを参照してください。
[ログイン拡張機能 (NIP-07)を使ってみよう | Welcome to Nostr! ~ Nostrをはじめよう! ~ ](https://welcome.nostr-jp.org/tutorial/nip-07.html)
少し面倒ですが、これを導入しておくとNostr上の様々な場面で役立つのでより快適になります。
## 使いたいカスタム絵文字をリストに登録する
以下のサイトで行います。
[emojito](https://emojito.meme/)
右上の**Get started**からNostrエクステンションでログインしてください。
例として以下のカスタム絵文字を導入してみます。
実際より絵文字が少なく表示されることがありますが、古い状態のデータを取得してしまっているためです。その場合はブラウザの更新ボタンを押してください。
[generalJP | カスタム絵文字](https://emojito.meme/a/naddr1qqykwetwv4exzmz22qq3uamnwvaz7tmwdaehgun2vykkkctjdyhxset8w4ex7tnrdakj7q3qa3pvwe2p3v7mnjz6hle63r628wl9w567aw7u23fzqs062v5vqcqqxpqqqp65uhjtrk6)
![image](https://nostrcheck.me/media/lokuyow/a154cf1d4218cc17291ec845d7706a8a4de9db92759881b69c4f2bf766f8a409.webp)
- 右側の**Options**から**Bookmark**を選択
![image](https://nostrcheck.me/media/lokuyow/ad932fe7118d3059e245c3ab410724495a7ccc72fbaec5ed43fef398d20361d1.webp)
これでカスタム絵文字を使用するためのリストに登録できます。
# カスタム絵文字を使用する
例としてブラウザから使えるクライアント nostter から使用してみます。
[nostter](https://nostter.app/)
nostterにNostrエクステンションでログイン、もしくは秘密鍵を入れてログインしてください。
## 文章中に使用
1. **投稿**ボタンを押して投稿ウィンドウを表示
2. **顔😀**のボタンを押し、絵文字ウィンドウを表示
3. ***タブ**を押し、カスタム絵文字一覧を表示
4. カスタム絵文字を選択
5. : 記号に挟まれたアルファベットのショートコードとして挿入される
![image](https://nostrcheck.me/media/lokuyow/2f469e7bd4a8d0ed1d778934c60a36ed077010181361e50f8d31cdb24ae828b1.webp)
この状態で投稿するとカスタム絵文字として表示されます。
カスタム絵文字対応クライアントを使っている他ユーザーにもカスタム絵文字として表示されます。
対応していないクライアントの場合、ショートコードのまま表示されます。
![image](https://nostrcheck.me/media/lokuyow/0701671fdc2352a9181fac49bca23fb59b61ffacf33090d16d14b6243ed9f877.webp)
ショートコードを直接入力することでカスタム絵文字の候補が表示されるのでそこから選択することもできます。
![image](https://nostrcheck.me/media/lokuyow/bc6b142ea9ac3643fa2bf9360c774fc5b2914ff5b2c2210cb75e6846581fd77f.webp)
## リアクションに使用
1. 任意の投稿の**顔😀**のボタンを押し、絵文字ウィンドウを表示
2. ***タブ**を押し、カスタム絵文字一覧を表示
3. カスタム絵文字を選択
![image](https://nostrcheck.me/media/lokuyow/203ffeba4fe9f3754ef394d6b4c8875db54d03c7d7b30b5eb4ac6d290c985639.webp)
カスタム絵文字リアクションを送ることができます。
![image](https://nostrcheck.me/media/lokuyow/729c3a016b7054433a56b093ee4cc6f3431248ace9e2eaa89bacdeececc0e58d.webp)
# カスタム絵文字を探す
先述した[emojito](https://emojito.meme/)からカスタム絵文字を探せます。
例えば任意のユーザーのページ [emojito ロクヨウ](https://emojito.meme/p/npub1a3pvwe2p3v7mnjz6hle63r628wl9w567aw7u23fzqs062v5vqcqqu3sgh3) から探したり、 [emojito Browse all](https://emojito.meme/browse) からnostr全体で最近作成、更新された絵文字を見たりできます。
また、以下のリンクは日本語圏ユーザーが作ったカスタム絵文字を集めたリストです(2025/02/06)
※漏れがあるかもしれません
[日本ユーザー作 カスタム絵文字](https://nostviewstr.vercel.app/npub17hczqvxtfv3w69wr6lxrttnpdekwdwel55mld60fr24zwjuu6utqtj8mjx/10030)
各絵文字セットにある**Open in emojito**のリンクからemojitoに飛び、使用リストに追加できます。
-----------
以上です。
次:Nostrのカスタム絵文字の**作り方**
Yakihonneリンク [Nostrのカスタム絵文字の作り方](https://yakihonne.com/article/_@lokuyow.github.io/1707912490439)
Nostrリンク nostr:naddr1qqxnzdesxuunzv358ycrgveeqgswcsk8v4qck0deepdtluag3a9rh0jh2d0wh0w9g53qg8a9x2xqvqqrqsqqqa28r5psx3
-----------
# 仕様
[NIP-30 Custom Emoji](https://github.com/nostr-protocol/nips/blob/master/30.md)
[NIP-30 カスタム絵文字(和訳)](https://github.com/nostr-jp/nips-ja/blob/main/30.md)
-
![](/static/nostr-icon-purple-64x64.png)
@ 21ffd29c:518a8ff5
2025-02-05 21:42:14
The concept of "Sovereigns: The Power of Your Thoughts - Navigating the Journey from Awareness to Creation" can be beautifully integrated with the empowering strength of strong masculine energy. This synergy combines personal empowerment with a sense of assertiveness and confidence, guiding individuals toward their desired reality.
1. **Understanding Sovereignty**: Sovereignty in this context refers to the ability to shape one's life and reality through thought. It emphasizes personal control over external circumstances by influencing inner beliefs and perceptions.
2. **Strong Masculine Energy**: This energy is characterized by assertiveness, confidence, power, and a sense of leadership. It aligns with traits like courage, determination, and self-assurance. In the context of empowerment, it encourages individuals to take charge of their lives with strength and clarity.
3. **Integration of Concepts**:
- Personify sovereignty as a strong, authoritative figure who guides personal growth by helping others master their thoughts and create their reality.
- Emphasize the role of masculine energy in cultivating assertiveness, confidence, and leadership qualities that empower individuals to align their thoughts with their desires.
4. **Practical Steps**:
- **Mindfulness**: Practice observing thoughts and actions with clarity and calmness, fostering a state of present awareness.
- **Affirmations**: Use positive statements to reinforce self-confidence and shift belief systems towards empowerment.
- **Visualization**: Imagine desired outcomes and focus on actionable steps to achieve them, embodying the courage and determination associated with masculine energy.
- **Seeking Guidance**: Engage mentors or coaches who can provide support and clarity, reinforcing leadership qualities and assertiveness.
5. **Benefits**:
- Empowerment: Gain control over your life's direction and outcomes through mindful thought manipulation.
- Clarity & Focus: Achieve a clear vision of goals and paths towards them with confidence and determination.
- Confidence & Success: Build self-assurance from aligning actions with inner strength and assertiveness.
- Fulfillment & Peace: Experience inner satisfaction from creating a life that resonates with personal values and energy.
6. **Addressing Concerns**:
- Clarify that while beliefs influence perception, true transformation requires consistent effort and awareness of one's inner strength.
- Emphasize that thoughts can shape reality positively when aligned with assertiveness and confidence.
7. **Conclusion**: Empower yourself today to shape an extraordinary future by understanding the power of your thoughts as a tool for personal growth. Cultivate strong masculine energy through mindfulness, affirmations, visualization, and leadership qualities, guiding yourself toward a life aligned with your inner strength and determination.
By merging the concepts of sovereignty and strong masculine energy, we create a powerful framework that not only empowers individuals but also encourages them to lead lives that reflect their inner confidence and assertiveness.
-
![](/static/nostr-icon-purple-64x64.png)
@ d4457110:c7dec82b
2025-02-05 21:38:01
![Frame-6](https://mataroa.blog/images/9a88ca90.png)
> ¡Puede construir un dispositivo de firma de transacciones de Bitcoin con espacio de aire (AirGap) fuera de línea a partir de componentes comunes faciles de enconrar listos para usar!
## ¿Que es SeedSigner?
En simples palabras SeedSiner es un dispositivo de firma bitcoin
Cree su propio Seedsigner y firme transacciones en Bitcoin sin comprometer la seguridad y privacidad.
La mayoría de personas en Bitcoin respetan y valoran lo que puede hacer este aparato, pues suele verse como una navaja suiza para administrar nuestros Bitcoins y no es para menos, Veamos que puede hacer.
### ¿Que hace SeedSigner?
Los usuarios de Bitcoin generalmente construyen y usan un SeedSigner por las mismas razones que construyen y usan un nodo completo mayor privacidad, menos confianza, mayor seguridad
- Calcula la palabra 12/24 de una frase semilla BIP39
- Crea una frase semilla BIP39 usando tiradas de dados D6
- Crea una frase semilla BIP39 con entropía a partir de una foto digital
- Interfaz guiada para crear manualmente un SeedQR para almacenamiento/entrada ([video](https://www.youtube.com/watch?v=c1-PqTNx1vc))
- Compatibilidad con frase de contraseña/palabra 13/25 BIP39
- Generación nativa Segwit Multisig XPUB con pantalla QR
- Escanea y analiza datos de transacciones de códigos QR animados
- Firme transacciones y transfiera datos XPUB usando códigos QR animados ([video](https://www.youtube.com/watch?v=LPqvdQ2gSzs))
- Configura los ajustes de usuario con persistencia (opcional)
- Soporte para Bitcoin Mainnet, Testnet y Regtest
- Derivar frases semilla BIP85 secundarias indexadas
## Tres usos imprtantes
- Crea claves privadas seguras de forma minimizada
- Genere claves públicas extendidas utilizadas durante la configuración inicial de la billetera
- Firme transacciones de forma segura a través de conjuntos de códigos QR animados
## Ventajas
- La operación en aislamiento (sin USB/WiFi/Bluetooth) reduce drásticamente los vectores de ataque
- El bajo costo de construcción hace que el dispositivo sea accesible para más personas en más partes del mundo
- La apatridia hace factible el uso de SeedSigner con múltiples semillas y/o múltiples billeteras
- La arquitectura de software completamente FOSS subyacente hace posible la creación independiente desde el origen
- El uso de hardware no específico de bitcoin puede mejorar en gran medida la privacidad del usuario
## ¿Que necesitas?
- Una computadora
- Raspberry [Pi Zero](https://www.raspberrypi.com/products/raspberry-pi-zero/), versión 1.3 (recomendable pero agotada en las tiendas) SeedSigner es compatible con los modelos alternativos W/WH/2W y Raspberry Pi 2/3/4 vea la disponibilidad de Raspberrys en stock en [rpilocator.com](https://rpilocator.com/), si ha elegido alguna de estas opciones alternativas es importante [deshabilitar Wifi/Bluetooth por hardware](https://estudiobitcoin.com/deshabilitar-wifi-y-bluetooth-de-raspberry-pi/) mi recomendación seria ir por la Raspberry Pi Zero 2 WH con Headers, solo tomara unos minutos hacerlo. Proceso en [video](https://video.twimg.com/amplify_video/1616914307140165635/vid/750x640/sTZKr1mknSnGfy0g.mp4?tag=16)
- Pantalla/controles [Waveshare](https://www.waveshare.com/wiki/1.3inch_LCD_HAT) de 1,3” 240x240 links de compra [Wavesshare](https://www.waveshare.com/1.3inch-lcd-hat.htm), [Amazon](https://www.amazon.es/Waveshare-Raspberry-1-3inch-Controller-Communicating/dp/B07FJQHVW8/ref=sr_1_1?__mk_es_ES=%C3%85M%C3%85%C5%BD%C3%95%C3%91&dchild=1&keywords=waveshare+1.3+lcd+240&qid=1619896551&sr=8-1), [AliExpress](https://a.aliexpress.com/_ExMQg1d)
- Cámara compatible con Raspberry Pi (con un cable compatible con Zero) links de compra AliExpress [1](https://a.aliexpress.com/_Ezu0y7t) - [2](https://es.aliexpress.com/item/32788881215.html?spm=a2g0o.productlist.0.0.982b1d4erfbWZD&algo_pvid=ad394e40-b1fc-4f58-a3b8-717fb6ae5964&algo_expid=ad394e40-b1fc-4f58-a3b8-717fb6ae5964-14&btsid=0bb0622a16198966649122634ee890&ws_ab_test=searchweb0_0,searchweb201602_,searchweb201603_) - [3](https://es.aliexpress.com/item/32522482332.html?spm=a2g0o.productlist.0.0.982b1d4erfbWZD&algo_pvid=ad394e40-b1fc-4f58-a3b8-717fb6ae5964&algo_expid=ad394e40-b1fc-4f58-a3b8-717fb6ae5964-13&btsid=0bb0622a16198966649122634ee890&ws_ab_test=searchweb0_0,searchweb201602_,searchweb201603_) - [4](https://es.aliexpress.com/item/1005002264527015.html?spm=a2g0o.productlist.0.0.982b1d4erfbWZD&algo_pvid=ad394e40-b1fc-4f58-a3b8-717fb6ae5964&algo_expid=ad394e40-b1fc-4f58-a3b8-717fb6ae5964-27&btsid=0bb0622a16198966649122634ee890&ws_ab_test=searchweb0_0,searchweb201602_,searchweb201603_)
- MicroSD (minimo 4GB) con adaptador SD para conectar a la computadora y grabar la imagen, link de compra [Amazon](https://www.amazon.es/SanDisk-Tarjeta-microSDXC-Adaptador-Rendimiento/dp/B08HYFMVV6/ref=sr_1_14?__mk_es_ES=%C3%85M%C3%85%C5%BD%C3%95%C3%91&dchild=1&keywords=micro%2Bsd&qid=1619899692&sr=8-14&th=1)
- Powerbank con cable MicroUSB o cargador de RaspberryPi, es importante resaltar que si decide usar una powerbank asegurese que esta tenga un modo de bajo consumo
- Impresora 3D (opcional) si no dispone de una compre un case para su SeedSigner [1](https://www.gobrrr.me/) - [2](https://robotechy.com/) - [3](https://diynodes.com/) - [4](https://anchorhodl.com/shop) - [5](https://btc-hardware-solutions.square.site/) - [6](https://www.lazada.com.ph/products/open-pill-seedsigner-enclosure-i2659416132-s13057065016.html) - [7](https://stackbit.me/categoria-produto/cases/)
> Quiero saltarme todo el proceso de armado y de comprar materiales, quiero un [SeedSigner ya!](https://btc-hardware-solutions.square.site/)
## Empecemos
![img_3103.jpeg](/img_3103.jpeg)
1. Descargar la [imagen correspondiente](https://github.com/SeedSigner/seedsigner/releases/tag/0.6.0) al hardare de Raspberry Pi
2. Grabar la imagen en la microSD use [Rufus](https://rufus.ie/es/) para windows y [BalenaEtcher](https://etcher.balena.io/) para MacOS
3. **Ensamblado**
- Conectar la placa con los pines GPIO (omitir esta parte si estos ya vienen soldados)
- Encajar los pines GPIO con la pantalla Waveshare
4. Inserte la SD
5. Poner en un case. Hay varios diseños que puede descargar para imprimir
- [Open Pill](https://github.com/SeedSigner/seedsigner/tree/main/enclosures/open_pill)
- [Orange Pill](https://github.com/SeedSigner/seedsigner/tree/main/enclosures/orange_pill)
- [Simple Pill](https://github.com/SeedSigner/seedsigner/tree/main/enclosures/orange_pill)
- [Lill Pill](https://cults3d.com/en/3d-model/gadget/lil-pill-seedsigner-case)
- [OrangeSurf Case](https://github.com/orangesurf/orangesurf-seedsigner-case)
- [PS4 Seedsigner](https://www.thingiverse.com/thing:5363525)
- [OpenPill Faceplate](https://www.printables.com/en/model/179924-seedsigner-open-pill-cover-plates-digital-cross-jo)
- [Waveshare Coverplate](https://cults3d.com/en/3d-model/various/seedsigner-coverplate-for-waveshare-1-3-inch-lcd-hat-with-240x240-pixel-display)
6. Guarde sus semillas y SeedQR ([plantillas,](https://github.com/SeedSigner/seedsigner#seedqr-printable-templates) preferiblemente metal)
Si tiene dudas preguntas o aportes vaya a su [Github](https://github.com/SeedSigner/seedsigner), [Telegram](https://t.me/joinchat/GHNuc_nhNQjLPWsS)
## Referencias
> Sitios con las que me apoye para hacer este proyecto
Puede seguir estas guias de instrucciones con mucho mas detalle
- [Estudio Bitcoin](https://estudiobitcoin.com/seedsigner-que-es-y-guia-de-montaje/) por [Lunaticoin](https://twitter.com/lunaticoin)
- [Desobediente Tecnologico](https://github.com/DesobedienteTecnologico/rpi_disable_wifi_and_bt_by_hardware)
-
![](/static/nostr-icon-purple-64x64.png)
@ a367f9eb:0633efea
2025-02-05 20:41:31
When a consumer has an account at their bank or another financial service closed on them, it’s a maddening experience.
These notices usually appear seemingly out of the blue, giving the customer just a few weeks to empty their funds from the account to move them elsewhere.
Sometimes, it’s because of fraudulent activity or suspicious transactions. It may also be because of a higher risk profile for customer, including those who often pay their bills late or let their account go negative too many times.
These customers will necessarily be categorized as much riskier to the bank’s operations and more liable to have their accounts closed.
But what if accounts are shut down not because of any true financial risk, but because the banks believe their customers are a *regulatory* risk?
Perhaps you buy and sell cryptocurrencies, partake in sports betting, or own and operate a cannabis dispensary in a state where it’s legal? While each of these categories of financial transactions are not suspicious nor illegal in themselves, they increase the scrutiny that regulators will place on banks that take on such customers.
While any reasonable standard of risk management applied to banking will discriminate against accounts that rack up fees or clearly participate in fraud, the notion of inherent risk due to regulatory punishment doled out to banks is a separate and concerning issue.
As Cato Institute Policy Analyst Nick Anthony [rightly sketches out](https://www.cato.org/blog/two-types-debanking-operational-governmental), this creates a dichotomy between what he deems “operational” debanking and “governmental” debanking, where the former is based on actual risk of default or fraud while the latter is due only to regulatory risk from government institutions and regulators.
**The Bank Secrecy Act and Weaponization**
The law that creates these mandates and imposes additional liabilities on banks is called the **Bank Secrecy Act,** originally signed into law in 1970.
Though banking regulation has existed in some form throughout the 19th and [20th centuries](https://tile.loc.gov/storage-services/service/ll/fedreg/fr010/fr010111/fr010111.pdf), the BSA imposed new obligations on financial institutions, mandating **Know Your Customer** and **Anti-Money Laundering** programs to fully identify bank customers and surveil their transactions to detect any potentially illegal behavior.
Without any requirements for warrants or judicial orders, banks are forced to report the “suspicious” transactions of their customers directly to the Financial Crimes Enforcement Network (FinCEN), what is called a “Suspicious Activity Report”. The grounds for filing this could be anything from the name of the recipient, whether the amount is over $10,000, or perhaps even any note or description in the bank transfer that may allude to some criminal activity. If the banks do not file this pre-emptively, they could be on the hook for massive penalties from regulators.
As the House Weaponization Subcommittee [revealed](https://judiciary.house.gov/sites/evo-subsites/republicans-judiciary.house.gov/files/2024-12/2024-12-05-Financial-Surveillance-in-the-United-States.pdf) in one of its final reports, the Bank Secrecy Act and SARs were ramped up specifically to target political conservatives, MAGA supporters, and gun owners.
![](https://consumerchoicecenter.org/wp-content/uploads/2025/02/Screenshot-2025-02-04-at-20.41.27.png)
The consequences of the BSA and its imposed surveillance have reaped unintended havoc on millions of ordinary Americans. This is especially true for those who have undergone “debanking”.
Many Bitcoin and cryptocurrency entrepreneurs, for example, have been debanked on the [sole grounds](https://www.axios.com/2024/12/01/debanked-crypto-andreessen-joe-rogan) of being involved in the virtual currency industry, while millions of others have been swept up in the dragnet of the BSA and financial regulators forcibly deputizing banks to cut off customers, often without explanation.
According to FinCEN guidance, financial institutions are [compelled](https://www.fincen.gov/resources/advisories/fincen-advisory-fin-2010-a014) to keep suspicious activity reports confidential, even from customers, or face criminal penalties. This just makes the problems worse.
**Further reading**
The [excellent research](https://www.cato.org/policy-analysis/revising-bank-secrecy-act-protect-privacy-deter-criminals) by the team at the Cato Institute’s Center for Monetary and Financial Alternatives provides reams of data on these points. As put by Cato’s **Norbert Michel**, “People get wrapped up in BSA surveillance for simply spending their own money”.
My colleagues and I have written [extensively](https://consumerchoicecenter.org/de-banking-is-an-avoidable-consequence-of-strict-financial-regulation/) about why we need reforms to undue the financial surveillance regime that only accelerates debanking of Americans. It’s even worse for those who are interested in the innovative world of Bitcoin and its crypto-offspring as [I explain here](https://www.btcpolicy.org/articles/downgrading-the-bank-secrecy-act-is-a-powerful-reform-for-bitcoin).
It’s one reason why the [Consumer Choice Center supports the **Saving Privacy Act**](https://consumerchoicecenter.org/reform-the-bank-secrecy-act-to-better-protect-consumer-financial-privacy/) introduced by Sens. Mike Lee and Rick Scott, which would vastly reform the Bank Secrecy Act to remove the pernicious and faulty Suspicious Activity Report system.
As the Senate Banking Committee [holds a hearing](https://www.banking.senate.gov/newsroom/majority/scott-announces-witnesses-for-debanking-hearing) on debanking in February 2025, we hope they will zero-in on the issue of excessive financial surveillance required by financial regulators and the harmful and likely unconstitutional impact of the **Bank Secrecy Act**. With renewed interest and motivation, American leaders can reform these rules to ensure that our financial privacy and freedom to transact are restored and upheld.
-
![](/static/nostr-icon-purple-64x64.png)
@ ec42c765:328c0600
2025-02-05 20:30:46
# カスタム絵文字とは
任意のオリジナル画像を絵文字のように文中に挿入できる機能です。
また、リアクション(Twitterの いいね のような機能)にもカスタム絵文字を使えます。
![image](https://nostrcheck.me/media/lokuyow/b350b17b9176c59ec8c5e8251189a6610d09f2d7d2746f40476c5214e5827d37.webp)
# カスタム絵文字の対応状況(2024/02/05)
![image](https://cdn.nostrcheck.me/ec42c765418b3db9c85abff3a88f4a3bbe57535eebbdc54522041fa5328c0600/e815d627b374aba2467952ac2206b04684912bf4a65e39603e090f0de65b7d6a.webp)
カスタム絵文字を使うためにはカスタム絵文字に対応した[クライアント](https://welcome.nostr-jp.org/tutorial/explore-client.html)を使う必要があります。
※表は一例です。クライアントは他にもたくさんあります。
使っているクライアントが対応していない場合は、クライアントを変更する、対応するまで待つ、開発者に要望を送る(または自分で実装する)などしましょう。
#### 対応クライアント
- [Amethyst](https://play.google.com/store/apps/details?id=com.vitorpamplona.amethyst)
- [FreeFrom](https://freefrom.space/)
- [nostter](https://nostter.app/)
- [Rabbit](https://rabbit.syusui.net/)
- [Snort](https://snort.social/)
- [noStrudel](https://nostrudel.ninja/)
ここではnostterを使って説明していきます。
# 準備
カスタム絵文字を使うための準備です。
- Nostrエクステンション(NIP-07)を導入する
- 使いたいカスタム絵文字をリストに登録する
## Nostrエクステンション(NIP-07)を導入する
Nostrエクステンションは使いたいカスタム絵文字を登録する時に必要になります。
また、環境(パソコン、iPhone、androidなど)によって導入方法が違います。
Nostrエクステンションを導入する端末は、実際にNostrを閲覧する端末と違っても構いません(リスト登録はPC、Nostr閲覧はiPhoneなど)。
Nostrエクステンション(NIP-07)の導入方法は以下のページを参照してください。
[ログイン拡張機能 (NIP-07)を使ってみよう | Welcome to Nostr! ~ Nostrをはじめよう! ~ ](https://welcome.nostr-jp.org/tutorial/nip-07.html)
少し面倒ですが、これを導入しておくとNostr上の様々な場面で役立つのでより快適になります。
## 使いたいカスタム絵文字をリストに登録する
以下のサイトで行います。
[emojito](https://emojito.meme/)
右上の**Get started**からNostrエクステンションでログインしてください。
例として以下のカスタム絵文字を導入してみます。
実際より絵文字が少なく表示されることがありますが、古い状態のデータを取得してしまっているためです。その場合はブラウザの更新ボタンを押してください。
[generalJP | カスタム絵文字](https://emojito.meme/a/naddr1qqykwetwv4exzmz22qq3uamnwvaz7tmwdaehgun2vykkkctjdyhxset8w4ex7tnrdakj7q3qa3pvwe2p3v7mnjz6hle63r628wl9w567aw7u23fzqs062v5vqcqqxpqqqp65uhjtrk6)
![image](https://nostrcheck.me/media/lokuyow/a154cf1d4218cc17291ec845d7706a8a4de9db92759881b69c4f2bf766f8a409.webp)
- 右側の**Options**から**Bookmark**を選択
![image](https://nostrcheck.me/media/lokuyow/ad932fe7118d3059e245c3ab410724495a7ccc72fbaec5ed43fef398d20361d1.webp)
これでカスタム絵文字を使用するためのリストに登録できます。
# カスタム絵文字を使用する
例としてブラウザから使えるクライアント nostter から使用してみます。
[nostter](https://nostter.app/)
nostterにNostrエクステンションでログイン、もしくは秘密鍵を入れてログインしてください。
## 文章中に使用
1. **投稿**ボタンを押して投稿ウィンドウを表示
2. **顔😀**のボタンを押し、絵文字ウィンドウを表示
3. ***タブ**を押し、カスタム絵文字一覧を表示
4. カスタム絵文字を選択
5. : 記号に挟まれたアルファベットのショートコードとして挿入される
![image](https://nostrcheck.me/media/lokuyow/2f469e7bd4a8d0ed1d778934c60a36ed077010181361e50f8d31cdb24ae828b1.webp)
この状態で投稿するとカスタム絵文字として表示されます。
カスタム絵文字対応クライアントを使っている他ユーザーにもカスタム絵文字として表示されます。
対応していないクライアントの場合、ショートコードのまま表示されます。
![image](https://nostrcheck.me/media/lokuyow/0701671fdc2352a9181fac49bca23fb59b61ffacf33090d16d14b6243ed9f877.webp)
ショートコードを直接入力することでカスタム絵文字の候補が表示されるのでそこから選択することもできます。
![image](https://nostrcheck.me/media/lokuyow/bc6b142ea9ac3643fa2bf9360c774fc5b2914ff5b2c2210cb75e6846581fd77f.webp)
## リアクションに使用
1. 任意の投稿の**顔😀**のボタンを押し、絵文字ウィンドウを表示
2. ***タブ**を押し、カスタム絵文字一覧を表示
3. カスタム絵文字を選択
![image](https://nostrcheck.me/media/lokuyow/203ffeba4fe9f3754ef394d6b4c8875db54d03c7d7b30b5eb4ac6d290c985639.webp)
カスタム絵文字リアクションを送ることができます。
![image](https://nostrcheck.me/media/lokuyow/729c3a016b7054433a56b093ee4cc6f3431248ace9e2eaa89bacdeececc0e58d.webp)
# カスタム絵文字を探す
先述した[emojito](https://emojito.meme/)からカスタム絵文字を探せます。
例えば任意のユーザーのページ [emojito ロクヨウ](https://emojito.meme/p/npub1a3pvwe2p3v7mnjz6hle63r628wl9w567aw7u23fzqs062v5vqcqqu3sgh3) から探したり、 [emojito Browse all](https://emojito.meme/browse) からnostr全体で最近作成、更新された絵文字を見たりできます。
また、以下のリンクは日本語圏ユーザーが作ったカスタム絵文字を集めたリストです(2024/06/30)
※漏れがあるかもしれません
[日本ユーザー作 カスタム絵文字](https://nostviewstr.vercel.app/npub17hczqvxtfv3w69wr6lxrttnpdekwdwel55mld60fr24zwjuu6utqtj8mjx/10030)
各絵文字セットにある**Open in emojito**のリンクからemojitoに飛び、使用リストに追加できます。
-----------
以上です。
次:Nostrのカスタム絵文字の**作り方**
Yakihonneリンク [Nostrのカスタム絵文字の作り方](https://yakihonne.com/article/_@lokuyow.github.io/1707912490439)
Nostrリンク nostr:naddr1qqxnzdesxuunzv358ycrgveeqgswcsk8v4qck0deepdtluag3a9rh0jh2d0wh0w9g53qg8a9x2xqvqqrqsqqqa28r5psx3
-----------
# 仕様
[NIP-30 Custom Emoji](https://github.com/nostr-protocol/nips/blob/master/30.md)
[NIP-30 カスタム絵文字(和訳)](https://github.com/nostr-jp/nips-ja/blob/main/30.md)
-
![](/static/nostr-icon-purple-64x64.png)
@ eee391ee:8d0b97c2
2025-02-05 19:37:29
## Amber 3.2.1
- Add some details when signing a contact list
- Refactor check for logged in account
- After granting notification permissions show the notification
Download it with [zap.store]( https://zapstore.dev/download), [Obtainium]( https://github.com/ImranR98/Obtainium), [f-droid]( https://f-droid.org/packages/com.greenart7c3.nostrsigner) or download it directly in the [releases page]( https://github.com/greenart7c3/Amber/releases/tag/v3.2.1)
If you like my work consider making a [donation]( https://greenart7c3.com)
## Verifying the release
In order to verify the release, you'll need to have `gpg` or `gpg2` installed on your system. Once you've obtained a copy (and hopefully verified that as well), you'll first need to import the keys that have signed this release if you haven't done so already:
``` bash
gpg --keyserver hkps://keys.openpgp.org --recv-keys 44F0AAEB77F373747E3D5444885822EED3A26A6D
```
Once you have his PGP key you can verify the release (assuming `manifest-v3.2.1.txt` and `manifest-v3.2.1.txt.sig` are in the current directory) with:
``` bash
gpg --verify manifest-v3.2.1.txt.sig manifest-v3.2.1.txt
```
You should see the following if the verification was successful:
``` bash
gpg: Signature made Fri 13 Sep 2024 08:06:52 AM -03
gpg: using RSA key 44F0AAEB77F373747E3D5444885822EED3A26A6D
gpg: Good signature from "greenart7c3 <greenart7c3@proton.me>"
```
That will verify the signature on the main manifest page which ensures integrity and authenticity of the binaries you've downloaded locally. Next, depending on your operating system you should then re-calculate the sha256 sum of the binary, and compare that with the following hashes:
``` bash
cat manifest-v3.2.1.txt
```
One can use the `shasum -a 256 <file name here>` tool in order to re-compute the `sha256` hash of the target binary for your operating system. The produced hash should be compared with the hashes listed above and they should match exactly.
-
![](/static/nostr-icon-purple-64x64.png)
@ ed60dae0:cc3d5108
2025-02-05 19:22:31
I'm a student. I study Bitcoin and markets. I am not a financial advisor, hold no licenses or registrations, and am not qualified to give advice on anything. Talk to your financial advisor. Do your own research.
I get things wrong. If I ever list predictions about the future, note that I will likely get them (partially) wrong.
I often own positions in the names I discuss in my posts. None of this is ever a solicitation to buy or sell securities. It is simply a look into my personal opinions and portfolio. These positions may change immediately after I publish a piece, with or without notice. You are on your own. Do not make decisions based on my posts.
## Use of The First Bastion
Use of The First Bastion (TFB) is at your own risk. In no event shall TFB or any affiliated party be liable for any direct or indirect trading losses caused by any information posted by TFB.
You agree to conduct your own research and due diligence and consult your own financial, legal, and tax advisors before making any investment decision regarding securities mentioned herein. As of the publication date of any content by TFB, you should assume that TFB (possibly along with members, partners, affiliates, employees, and/or consultants) and our clients and/or investors hold positions, long or short, in all stocks and assets (and/or options of the stocks or assets) covered. We may stand to realize significant gains if the price of any stock or asset covered herein moves in our favor. Following the publication of any material on this site or other TFB social media platforms, I may continue transacting in the securities discussed and may be long, short, or neutral at any time thereafter, regardless of prior recommendations, conclusions, or opinions.
This is not an offer to sell or a solicitation to buy any security, nor shall any security be offered or sold in any jurisdiction where such an offer would be unlawful under the securities laws of that jurisdiction.
To the best of my ability and belief, all information contained herein is accurate and reliable, obtained from public sources I believe to be accurate and reliable, and not from insiders or individuals connected to the stock or asset discussed who may owe fiduciary or confidentiality obligations. However, all information is presented "as is," without any warranty—express or implied. TFB makes no representation regarding the accuracy, timeliness, or completeness of any information provided or the results that may be obtained from its use. All expressions of opinion are subject to change without notice, and TFB does not undertake to update or supplement this site, my social media, or any of the information contained herein.
-
![](/static/nostr-icon-purple-64x64.png)
@ fa7153ef:1de1cf78
2025-02-05 18:05:42
"Things usually don't pan out the way you want them to."
It's not really a quote, probably someone said it at some point, but I just wanted to have it at the beginning. My thought process while sitting here is going as - I haven''t written anything for close to 6 months, I need to refer to that fact, and say something about it. I know, things don't usually work out, and wanting to write once a week turned to be no writing for 6 months. Tough luck
I don't really have a good explanation for this. Last post was from end of August 2024. I wouldn't say a lot of things happened in the meantime (especially not a lot that would make me not have time to sit down and write something). People always ask "How have you been?", "Anything happened to you lately?", and my answer is usually - "Nothing special", "Nothing new", "Same old".. (that's probably why I'm not good in conversations with people). But a lot of things have happened, it's just that I feel none of my stories would be interesting to people, or things I find fascinating would just bore everyone. So I usually keep quiet. This is strange, really, since a lot of things that people talk to me about, I don't really care for. But those are their interests, and what are friends for, than to listen to each other? I may be wrong with this one, since writing these words was hard - and I don't really believe in them. It requires some additional thought.
I've always considered myself to be good at spotting when people are uncomfortable, or bored with something (or someone) - like George form Seinfeld. It's likely that I've caught on to people being that way in my presence, so I stopped sharing a lot. Who the heck knows, it's hard being your own psychiatrist, so I won't be one. I'm here to write things.
Since we're on the topic of what happened in the past 6 months, I'd really need to think about everything, and even though you're reading this quickly, a lot of pause has been made when composing this list (I'm going at it one by one, and really trying to remember):
- I met with my old university friends - haven't seen them in 3 years
- visited my sister in another country, and hung out with my little nephew
- had a PR in my squats (50kg) - it's a topic for a different day, but it's a big thing for me, I'm very proud of it.
- I'm working on my spiritual side - trying to get closer to God by reading scripture, praying, and listening to various sermons (which is also a good topic - to share my experiences here)
- I'm following semen retention, it's been a whole year recently. Being single helps, but I won't go into details of it now
- I bought a small 25-key keyboard, and I'm learning playing on it (trying to transfer as much as I can from the guitar experience)
- I feel like anxiety, and fears which have been overwhelming my whole life, have died down a bit. I can still feel them, and when days are bad, so are they, but there have been a lot of good days. Causes for this are numerous, but again, a topic for another time
- I've kept my job
- I've started buying Bitcoin again - I was so "down and out" that even the thought of re-activating my accounts on exchanges was a no-go, but somehow I managed to do it, and am becoming increasingly richer in sats, on a daily basis
- I've been going out more - hanging out with people, and socializing - I'm noticing a substantial increase of this kind of behaviour. I'm not really meeting new people, mostly stick to the ones I already know (which is not a lot)
- I've visited my lifelong friend in another country again, and have a feeling we've rekindled the friendship. It's been a rough time for both of us, and even though we met here and there, at times it felt to be more of a chore. Now, I feel things have changed a bit, and I like it.
- I'm still living with my parents. I don't hate it, it's just something I do. There are strange comments, and I guess people find it curious, but it is what it is.
- I have a much better relation with my father. We've always had an OK relation. He's also a reserved person - I'm not sure of the term and google isn't helping. Likes to keep to himself mostly. We've found some common topics to discuss, and I've been enjoying it. He seems to like it as well. It mostly revolves around football, and watching games together.
- even though I've been sick for the past couple of weeks, my health in general is good. I'm not totally happy with the situation I'm in, but it's still miles ahead of what it has been just a year or two ago
- Some plans have been popping up in my head - after a long time, I have some things I'd like to do. It usually takes a long time to actually do them, but even the thought of wanting something new and different is refreshing, and I'll take it.
I don't know.. There probably are a lot of other things - I mean, there certainly are more private thoughts I've been thinking about - love, romance, romantic partners, God, inner peace, lust, fears, music, family, future.. But I'm not willing to share those yet.
I've finished the Bible last year - by doing daily readings of 10-15 minutes via an app. I've restarted it this year, and going through it again.
Also, I'M noticing that a lot of these sentences start with "I've done this", "I've done that", "I'm this" or "I'm that" - it's understandable, with this being sort-of a personal writing journey, but somehow it's not sitting well with me to have most of the sentences being this way.
I'll keep that in mind for next time. ^^
-
![](/static/nostr-icon-purple-64x64.png)
@ 638d2a79:f5645f4e
2025-02-05 18:05:19
When doing division with two-digit dividends, round up to the nearest tens place if the number ends in 6-9.
**Example:**
200÷29200 \div 29200÷29 can be approximated as 200÷30200 \div 30200÷30, which simplifies to 20÷320 \div 320÷3.
Also, zeros cancel out in division.
**Example:**
20000÷70020000 \div 70020000÷700 can be simplified to 200÷7200 \div 7200÷7, which gives the same answer.
### Multiplication Rule:
When doing multiplication, do not write out all of the zeros.
**Example:**
For 90×290 \times 290×2, you don’t need to write out “00” at the start. Just do 9×29 \times 29×2 and add the zero later.
### Division with Two-Digit Divisors:
If the second digit of the divisor is between 1-5, only divide the first digit by the first digit.
**Example:**
5124÷215124 \div 215124÷21 can be solved as follows:
1. Approximate: 5÷2=25 \div 2 = 25÷2=2 (write 2 as the first digit).
2. 21×2=4221 \times 2 = 4221×2=42, subtract to get 92.
3. 9÷2≈49 \div 2 \approx 49÷2≈4, so 21×4=8421 \times 4 = 8421×4=84, subtract to get 8.
4. Bring down the 4 to make 84, which we already know is 21×421 \times 421×4.
5. Final answer: **244**.
![[Recording 20250122112454.m4a]]
### Converting a Remainder into a Decimal:
To turn a remainder into a decimal, divide the remainder by the divisor.
6. Add a zero to the end of your remainder and divide normally.
7. The quotient becomes the decimal value.
**Example:**
32÷10032 \div 10032÷100 → Rewrite as 320÷100320 \div 100320÷100.
- 100 goes into 320 three times (3).
- Bring down a zero → 30.
- Add another zero → 300 → 100 goes in three times (3).
- Final answer: **0.32**.
If one of the numbers is smaller, like in 880÷22880 \div 22880÷22, where 22 doesn’t go into 0:
- Instead, check how many times **0.22** goes into **88**. The answer is **4**.
- 22 goes into 0, 0 times.
- So, 880÷22=40880 \div 22 = 40880÷22=40.
### Division with Three-Digit Numbers:
Use the same method as with two-digit divisors.
**Example:** 100,492÷518100,492 \div 518100,492÷518
- Approximate using **5** for each digit of the answer.
Another example:
36.85÷21636.85 \div 21636.85÷216
- 222 goes into **3** once → Write **1**.
- 216×1=216216 \times 1 = 216216×1=216, subtract from **368** → **152**.
- Bring down the **5** and continue dividing.
### Calculating Volume:
To find the volume of something, use the equation:
Width×Height\text{Width} \times \text{Height}Width×Height
The answer will be in **square units**.
**Example:**
A 2D box with width **1 inch** and height **4 inches** has an area of **4 inches squared**.
### [[America|American]] Flag Instructions:
- The length of the flag is **1.9 times its width**.
- Each stripe should be **one-thirteenth** of the flag's height.
- The blue area covers **7.6** of the flag’s width.
- The height of the blue area is exactly **7 stripes**, or **7/13** of the flag’s height.
### Finding the Median Score of a Class:
8. Count the number of students with the highest score, then move downward.
9. Write scores in one column and the number of students in another.
10. Find the median of the possible scores.
**Example:**
Possible scores: **10, 9, 8, 6, 4** → Median is **8**.
Then, count students until you reach the middle score **(8 or the median value)**
| Posable score | number of students |
| - | |
| 10 | 3 |
| 9 | 6 |
| 8 | 4 |
| 6 | 1 |
| 4 | 1 |
The answer would be 6 1,2,3,4,5,6,7,8 and we are in the 6 Groupe
Tags: [[arrhythmic]]
-
![](/static/nostr-icon-purple-64x64.png)
@ 638d2a79:f5645f4e
2025-02-05 18:03:29
China was ruled by one ruler, but over time, China split into two—South and North—which had a rivalry between them. At this time, Yang Chien was a general in the army of Northern China. He thought that China should be whole once more, so, like any _insert age here_ year old would do, he attacked the king of the South (for peace!). After a bit of fighting, he overpowered Southern China and took control of all of China. This man founded a dynasty—the Sui Dynasty—to rule and to keep China united.
But wait! Rivers made travel difficult between the North and South, so his son created a new river when he became emperor. This canal made it easier to cross the rivers, which greatly improved trade. The people did not like working on this river, and after it was completed, they killed him, making him the second and last emperor of the Sui Dynasty.
Cue the new emperor, Li Yuan, AKA "the smart guy." He wanted to stay alive for a long time, and he saw how unhappy people had just killed the last important ruler. So, he decided to invest in keeping people happy instead. This started the Golden Age of China, also called the Tang Dynasty.
Tags: [[human behavior index]]
-
![](/static/nostr-icon-purple-64x64.png)
@ 77aba0b1:7e3350f5
2025-02-05 15:42:06
### **Canada and Mexico don't have any leverage**
The cheapest labor in the world is not China and it's not on the other side of the world. It's in Mexico.
######
Due to rising Chinese wages, a rapidly growing economy, and demographic changes, China is no longer the low-wage capital of the world. Great news for Mexico as it means more manufacturing jobs have come their way. But bad news if your wealthy neighbor to the north wants to impose tariffs that are going to prevent you from selling to the world's largest consumer market.
---
![](https://cdn.satellite.earth/dd5b179a6754d422d02d219dea3d3903cc3bcd2f8ce32fe848639b90fb5cc576.jpg)
Mexican President Claudia Sheinbaum talking with President Trump | AI generated image
---
Now consider Canada's dilemma. The US buys 97% of Canada's oil, at a discount. Canada lacks the capacity to refine 75% of their oil production, so they have to sell their sour crude oil to the US at discounted rates because only the US has the infrastructure to move, refine, store, and distribute this commodity. (See [video](https://x.com/themfingcoo/status/1885838258451493305?s=46) for a detailed explanation.)
---
![](https://cdn.satellite.earth/ed49dc507184f449ffd974481ba058113e63fbb07783f89012342fdc5a39db8b.jpg)
Canadian Prime Minister Justin Trudeau meeting with President Trump | AI generated image
---
Canada and Mexico share a common double-edged sword; they're geographically close to the United States. This is a huge benefit for reducing transportation costs to the largest consumer market in the world. But that also means you don't have the transportation infrastructure necessary to sell your products around the world.
######
China had to build a global transportation and supply chain infrastructure if it wanted to reach American and European markets. Because of this inherent characteristic, China is much better positioned to withstand an economic trade war with the United States than either Mexico or Canada.
######
People often mention how fragile the American economy has become because of its reliance on imported foreign goods. They are absolutely correct. But that cuts both ways. The United States can be cut off from foreign goods, but foreign nations will be cut off from a market to sell their products. What happens when there is a huge supply of goods and demand for those goods goes away? Prices drop... precipitously.
######
The United States largest export is the US Dollar. Like it or not, as the printer of the Global Reserve Currency, the US finances the consumer markets and the manufacturing base of the world economy.
---
![](https://cdn.satellite.earth/02d0d2abf634d9df63ce4b51386812ada3be150ad48c21fdb256df9a1c5d3471.jpg)
The value of fiat currencies always goes to zero | AI generated image
---
### **Free Trade vs Managed Trade**
We see a lot of economists and media pundits talking about how tariffs will increase prices and lead to even more inflation. What they really mean is it will lead to "price inflation" which is how most of American society has come to view inflation. Actual inflation is an increase of the money supply and with more moeny chases the same amounts of goods and services, we get an increase in prices or price inflation.
######
The same people who told you that inflation was "transitory" are now telling you the price of a Corona will go up. They're forgetting that we have a fairly robust domestic beer industry.
---
![](https://cdn.satellite.earth/03026fafa9a6c3e4ce039d41d6f7890a0573e38825b238f9d735e3c021488ef1.jpg)
Chuck Schumer and Dylan Mulvaney share bad takes | AI generated image
---
But what really needs to be highlighted is that these pundits are discussing Trump's trade war as if we lived under a free trade system; a truly free market. Sadly, we are nowhere close to this being a reality. The global economic system is Managed Trade, or Bureaucratic Trade; with corporations, lobbyists, the politically appointed and well connected making deals that protect their fiefdoms and syphon money to those who control the levers of power.
######
They are right that tariffs are taxes imposed on imported goods and those taxes are passed on to the consumer. But they act as if tariffs don't didn't exist before Trump. The Biden administration placed tariffs on Chinese "green" technologies. The same administration that said climate change was an existential threat made cheaper, environmentally friendly technology more expensive. It's almost as if it's not about the climate.
### **The Global Economic Empire**
When you owe the bank $1 million, the bank owns you. When you owe the bank $37 trillion, you own the bank.
######
Trump is betting the house and calling everyone's bluff and he's betting that the US can weather the economic fallout better than any other country, except maybe China. It's a race to the bottom and he knows that the USG can cover its finances longer, causing other countries to go bankrupt and need US assistance.
######
It's the equivalent of a run on the banks and the US will buy up the debt for cheap. Really they'll buy it for free, since they're printing the currency they buy up assets with. Canada and Mexico folding are a no brainer. Their economies are not built to export large quantities of goods acros the world. It's almost entirely north or south across the border. They had to cave or risk economic collapse.
---
![](https://cdn.satellite.earth/1e2afd8e2b6d3ee229c4e7d4e6983cda765e54e275dedbb29bedd9e1e0be3114.jpg)
China: Rising Dragon or Paper Tiger | AI generated image
---
######
China is another story. "Is China a Rising Dragon or a Paper Tiger" has been the headline for 20 to 30 years ever since Deng Xiaoping liberalized their economy and instituted social reform. Their economy has been booming but also suffering from population decline due to the One Child policy that was in effect from 1980 to 2016.
######
China has a global supply chain and provides most of the world with manufactured goods. That means they need markets to sell their goods in. If Trump threatens every nation with tariffs, it effects the global economy; meaning it will massively effect China. Couple that with a declining population that’s getting older.
######
The strength of the Chinese economy is that it already has this well established global supply chain. They stand the best chance to weather a trade war with the United States. But a global economic collapse would be a race to the bottom to see which, if any, global power emerges victorious. Just as in war, there is no winner; just bigger losers than others.
######
If Trump uses this leverage to get concessions that benefit the American people, he could be the greatest statesmen who ever lived. Trump may not be clever enough to think this deeply, but he is certainly brash and confident enough to attempt it.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-05 15:17:47
Another good day, but not quite on par with yesterday. I'm sipping some coffee, after 16 hours dry fasting. I'm not really hungry yet, so I'll probably go a while longer before I eat.
Yesterday was the first day that I really noticed the different taste in my mouth that indicates ketosis. Interestingly, it lasted all day. I figured it would wane after I ate a bunch of pasta.
Another thing I've noticed is that I'm more interested in eating fresh produce than normal. A side benefit of dry fasting might be that juicier foods become more appealing.
## Score Card
Day 1: 14 hour fast (13 dry)
Day 2: 15 hour fast (14 dry)
Day 3: 17 hours (16 dry)
Day 4: 18 hours (17 dry)
Day 5: TBD (16 dry)
I'm also on day 3 of a Workit 10k steps/day challenge. So far so good.
originally posted at https://stacker.news/items/876598
-
![](/static/nostr-icon-purple-64x64.png)
@ a012dc82:6458a70d
2025-02-05 14:29:47
The cryptocurrency market is a dynamic and often unpredictable space. With Bitcoin's impressive surge in value, many investors are looking beyond the pioneer cryptocurrency to diversify their portfolios. This article explores various cryptocurrency options, weighing the potential of holding (HODLing) or selling them in the current market.
**Table Of Content**
- Bitcoin's Stellar Performance
- Ether (ETH)
- Solana (SOL)
- Binance Coin (BNB)
- BLUR
- Conclusion
- FAQs
**Bitcoin's Stellar Performance**
Bitcoin, the first and most well-known cryptocurrency, has seen a remarkable increase in value, rising by 120% in 2023. This surge sets a benchmark for evaluating other cryptocurrencies. Bitcoin's growth is influenced by several factors, including the anticipation of a Bitcoin ETF and its upcoming fourth halving. These developments could further drive its demand and value.
The potential introduction of a Bitcoin ETF is particularly significant. It would allow a broader range of investors to gain exposure to Bitcoin without the complexities of direct cryptocurrency ownership. This development could lead to increased institutional investment and potentially stabilize Bitcoin's historically volatile price. Furthermore, the halving event, expected to occur in April, is a fundamental aspect of Bitcoin's design. It reduces the reward for mining new blocks, effectively limiting the supply of new bitcoins. This scarcity is a key driver of Bitcoin's value and has historically led to significant price increases.
However, Bitcoin's dominance and performance also raise questions about market saturation and the potential for continued growth. While Bitcoin remains a safe haven for many investors, its large market capitalization means that it may not offer the same growth potential as some smaller, emerging cryptocurrencies. Investors looking for high-growth opportunities may find these in altcoins, which, while riskier, offer the potential for higher returns.
**Ether (ETH)**
Ether, the native token of the Ethereum blockchain, has a different appeal compared to Bitcoin. While Bitcoin excels as a payment network, Ethereum's strength lies in its versatility as a platform for decentralized applications. Ether's growth has been modest compared to Bitcoin, with a 65% increase this year.
Ethereum's broader utility stems from its ability to support smart contracts and decentralized applications (dApps). These features have made it the backbone of various sectors, including decentralized finance (DeFi) and non-fungible tokens (NFTs). The recent upgrade to Ethereum 2.0, transitioning to a proof-of-stake consensus mechanism, aims to address scalability and energy efficiency issues, potentially increasing its attractiveness to both developers and investors.
Despite these advancements, Ether's price has not seen the same explosive growth as Bitcoin. This could be due to the market's maturation and the increasing competition from other blockchain platforms. However, Ethereum's established position and ongoing development make it a strong contender for long-term growth. Investors may consider holding Ether as a bet on the continued expansion and innovation in the DeFi and NFT spaces, where Ethereum plays a central role.
**Solana (SOL)**
Solana, a blockchain platform seen as a competitor to Ethereum, has recovered remarkably from the impacts of the FTX collapse, with its value increasing by 313% this year. This growth is a testament to the resilience and potential of Solana as an investment.
Solana's key selling point is its high throughput and low transaction costs, making it an attractive platform for both developers and users. Its ability to process thousands of transactions per second outpaces Ethereum significantly, which has been a bottleneck for the latter. This technical superiority has led to increased adoption of Solana for various applications, including decentralized exchanges, gaming, and NFTs.
The rapid recovery of Solana's value post-FTX collapse indicates strong investor confidence and market support for the platform. It suggests that Solana has managed to dissociate itself from the negative sentiment surrounding FTX and is being recognized for its inherent technological strengths. For investors, Solana presents an opportunity to diversify into a high-potential blockchain platform that could capture significant market share in the future.
**Binance Coin (BNB)**
BNB, the native token of the Binance exchange, has faced significant challenges following legal issues with Binance’s CEO. These developments have led to a decrease in BNB's value, prompting considerations for selling the asset.
The legal troubles surrounding Binance and its CEO have raised concerns about the exchange's future and, by extension, the value of BNB. Binance Coin's utility is closely tied to the Binance ecosystem, being used for transaction fee discounts and participation in token sales. If regulatory actions lead to a decrease in Binance's user base or a change in its operational model, BNB could see a further decline in value.
However, it's also important to consider Binance's position as one of the largest and most influential cryptocurrency exchanges globally. The platform has a substantial user base and a wide array of services, including trading, staking, and a native blockchain, Binance Smart Chain. If Binance navigates through its legal challenges successfully, BNB could recover and potentially grow in value. Investors need to weigh the risks of regulatory impacts against the potential for Binance to continue playing a major role in the crypto ecosystem.
**BLUR**
BLUR, associated with the NFT marketplace Blur, has maintained a significant market capitalization despite a downturn in NFT trading. As the NFT market shows signs of a potential rebound, holding BLUR could be a strategic move for investors interested in the digital art and collectibles space.
The NFT market has experienced a significant cooldown from its peak in 2021, but it remains a sector with potential for innovation and growth. BLUR's association with the Blur marketplace positions it well within this niche. The marketplace has gained traction among NFT traders for its user-friendly interface and unique features, such as rewarding users with BLUR tokens based on their trading volume.
BLUR's utility within the Blur ecosystem could drive its value as the NFT market evolves. The token's use in governance and transaction fee payments on the platform aligns it closely with the marketplace's success. As new artists and collectors continue to enter the NFT space, platforms like Blur that offer a streamlined and rewarding experience could see increased usage, potentially boosting BLUR's value.
Investors considering BLUR should monitor the broader NFT market trends and Blur's position within it. While the NFT market is known for its volatility, it also offers unique opportunities for growth, especially in niches that are innovating and capturing user interest.
**Conclusion**
The cryptocurrency market is diverse and constantly evolving. While Bitcoin continues to be a strong performer, other cryptocurrencies offer varied investment opportunities. Investors should consider their risk tolerance, market trends, and the unique attributes of each cryptocurrency when making decisions. Whether to HODL or sell depends on individual investment goals and the ever-changing landscape of the crypto world. Diversification and staying informed are key to navigating this dynamic market successfully.
**FAQs**
**Is it better to invest in Bitcoin or other cryptocurrencies?**
It depends on your investment goals and risk tolerance. Bitcoin is more established but may offer lower growth potential compared to some emerging altcoins. Diversifying your portfolio with a mix of Bitcoin and other cryptocurrencies might be a balanced approach.
**What makes Ether a good investment option?**
Ether is the native token of the Ethereum blockchain, known for its versatility in supporting smart contracts and decentralized applications. Its ongoing development and central role in the DeFi and NFT sectors make it a strong contender for long-term growth.
**Why is Solana considered a rising competitor in the crypto market?**
Solana offers high transaction speeds and low costs, making it an attractive platform for developers and users. Its rapid recovery post-FTX collapse indicates strong market support and potential for significant market share in the future.
**What are the risks associated with investing in Binance Coin (BNB)?**
BNB faces risks due to legal issues surrounding Binance and its CEO. Its value is closely tied to the Binance ecosystem, so any negative impact on the exchange could affect BNB's value.
**Is investing in BLUR a good strategy?**
Investing in BLUR could be a strategic move if you're interested in the NFT market. As the native token of the Blur NFT marketplace, its value may grow with the platform's success in the evolving NFT space.
**How important is diversification in cryptocurrency investment?**
Diversification is crucial in managing risk in the volatile cryptocurrency market. It involves spreading your investment across different assets to reduce the impact of any single asset's performance on your overall portfolio.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-
![](/static/nostr-icon-purple-64x64.png)
@ c69b71dc:426ba763
2025-02-05 13:44:29
# Nature shows us the way…
## …but what does humanity do?
### Let’s take a look at winter:
Trees shed their leaves. The plant’s energy withdraws so it can conserve strength and survive the cold season.
Wild animals follow the same pattern: In autumn, they build up reserves, grow thick fur, and retreat into their caves and thickets. Little movement, lots of sleep – a natural strategy for preserving energy. Animals that wouldn’t survive the cold migrate to warmer places to spend the winter.
#### And what does humanity do?
We eat just as much, move just as much (or little), sleep too little – just as we do all year round. Why? Because we can. Because our lives are no longer governed by the seasons. Refrigerators are full, supermarkets are always open, work calls, and daily routines remain unchanged. But this does not come without consequences.
During winter, we don’t allow ourselves to rest or retreat. We ignore our natural needs, overexerting ourselves physically, mentally, and emotionally. The result? An exhausted body and mind, discontent. The lymphatic system gets clogged, the body becomes overly acidic. Spring fatigue, low energy, depression, inflammation, and other ailments follow.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c69b71dc564fdc350acddff929f25d7202ac1470c87488608bd6d98e426ba763/files/1738762433384-YAKIHONNES3.jpg)
### And then comes spring…
Nature awakens. Life begins anew everywhere. Buds sprout, blossoms unfold – pure energy in its most vibrant form! Everything that grows now serves cleansing and detoxification: wild herbs, fresh shoots, and buds – nature’s medicine for body and mind.
Wild animals follow this rhythm. They shed their winter coats, become more active, consume this natural medicine, mate, or give birth.
#### And what does humanity do?
We keep eating the same, sleeping too little, rushing through our daily routines. And then we wonder why we feel tired, sluggish, and drained. Why our thoughts feel heavy and our bodies weak. Why depression creeps up on us at this very moment. Did you know that the highest suicide rate is in spring?
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c69b71dc564fdc350acddff929f25d7202ac1470c87488608bd6d98e426ba763/files/1738762470431-YAKIHONNES3.jpg)
### Summer – the time of abundance
Nature gifts us with light, warmth, ripe fruits, berries, and fresh vegetables.
Animals spend most of their time outdoors, eating what nature provides and recharging their energy into every cell of their being.
#### And what does humanity do?
We keep working as always, consuming industrially processed foods, barely spending time outside. Too much artificial light, too little sleep. No wonder so many feel exhausted even in summer, drained, struggling with digestion and metabolism.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c69b71dc564fdc350acddff929f25d7202ac1470c87488608bd6d98e426ba763/files/1738762511752-YAKIHONNES3.jpg)
### Autumn – preparing for retreat
Now is the time for harvest. Nuts, mushrooms, apples, pears, root vegetables, pumpkins, cabbage – all available to build up reserves.
Animals follow nature’s call, gathering, storing energy, preparing for the coming months. Chlorophyll in leaves breaks down, green turns to vibrant autumn colours.
#### And what does humanity do?
We ignore these signals. We stay trapped in the hamster wheel. We enter winter unprepared, weakened, prone to infections, drained by a lack of sunlight and an overly acidic system.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c69b71dc564fdc350acddff929f25d7202ac1470c87488608bd6d98e426ba763/files/1738762493284-YAKIHONNES3.jpg)
### A cycle of exhaustion
And so the wheel keeps turning. Because we ignore nature. Because we no longer listen to our bodies. Because we have lost touch with our intuition. Because we have enslaved ourselves.
#### What can you do?
Not everyone is ready to leave their daily life behind, move to a warm country, and become self-sufficient. Many want to maintain their current lifestyle.
#### So how can we break the cycle?
Turn inward. Take time each day to listen to yourself. To truly feel what you need. To give space to your needs. Sense what drains you, what makes you sluggish. What brings you joy. Cleanse yourself – physically, mentally, emotionally!
> **********Do** more of what you miss, of what makes you happy and **fulfilled.** **Remember:** **You** **too** **are** **nature.**********
If all this sounds like a lot of inner work, I invite you to take first steps.
#### Ask yourself:
- Does your body need detoxification?
- Cleansing?
- More movement?
- Or is it time for emotional release?
*If you wish support, let me know and we will discuss an energy exchange that allows you to do something good for yourself in a sustainable way. Supporting you in reclaiming your energy and strength – for a year filled with vitality, self-respect, and self-love. 💛*
**
```
Spring is calling! It offers us a new chance.
Do you hear it? Yes, it’s calling you! Let’s go! 🚀
```
**
-
![](/static/nostr-icon-purple-64x64.png)
@ 0b118e40:4edc09cb
2025-02-05 13:23:56
I’d like to see a world where a small artisan in Sarawak sells handcrafted goods directly to a boutique in Paris by bypassing currency exchange fluctuations, banking restrictions, and government-imposed tariffs. Or where a coffee farmer in Ethiopia sells beans straight to a roaster in Tokyo by sidestepping middlemen, exchange fees, and bureaucratic red tape.
In theory, free trade should enable this exchange smoothly, allowing businesses of all sizes to compete on a level playing field. But in reality, global trade is far from free. Policies, interventions, and economic theories are often designed to favor the powerful.
One particular theory that troubled me was Paul Krugman’s New Trade Theory (NTT), which argues that large businesses with economies of scale, supported by government-backed advantages, dominate international trade. This manifestation of the global marketplace favoring the giants, leaving smaller players like that Ethiopian coffee farmer out and struggling to compete, had led to trade hegemonies and trade wars.
After going through centuries of trade theories from Adam Smith’s Wealth of Nations to Keynesian interventionism and Friedman’s libertarianism I found myself questioning:
Is Krugman right?
After all, in today’s world, global trade is controlled by a few key players. The U.S., China, Germany, Japan, and the U.K. alone contribute to 40% of global trade in goods and services. The 134 countries of the Global South are often forgotten.
Can Bitcoin offer a countermeasure to help globalize small businesses from anywhere in the world?
### Big players rule the game.
Let’s go a little deeper on Krugman’s New Trade Theory. He believes that trade is increasingly dominated by large firms because they benefit from economies of scale and brand power. While older trade theories assumed that countries traded based on resource advantages, NTT tries to explain why similar economies like the U.S. and Europe, engage in high levels of trade with each other, missing out on the obvious nuances of global alliances on geopolitical control and power.
Another aspect of Krugman’s theory is that large companies have a better chance of capturing market lead if they can benefit from unfair advantages through additional boosters in an imperfect market. In simple terms, power, status, and wealth are all you need to win.
So if you are a big company and you have status, government perks, and economic advantages, you can be the market leader. It’s like the Olympics of global trade, except some players get to use performance-enhancing drugs (subsidies, trade barriers, and financial influence) while others run clean. The race isn’t fair, but the rules say it’s fine.
So what is the blind spot here?
Well, other than the obvious disregard for merits and fair play, this model also assumes that only large corporations drive global trade, leaving small businesses to struggle against giants - despite the fact that small businesses often contribute significantly (sometimes up to 80%) to a country's revenue.
### Small business in a big economy
NTT was developed in the 1970s and 1980s when economies of scale and industrial advantages were the primary drivers of global trade. Kugman's argument assumes that large corporations, due to their financial and logistical dominance, will continue to dictate trade flows. But is this still true today?
Small businesses are establishing themselves in a globalized world, even without economies of scale, as opposed to Krugman's belief. The rise of e-commerce, digital platforms, and decentralized technologies has significantly altered the trade landscape, though many barriers remain.
In the past, small businesses struggled because they lacked access to global markets, but platforms like Alibaba, Amazon, and Shopify have reduced the barriers to entry, allowing even micro-businesses to participate in international trade.
When Jack Ma started Alibaba, businesses didn’t automatically sign up. His team traveled to small villages and industrial hubs to onboard businesses that had never considered global trade let alone understand digital interfaces, communicate in English, or use the internet. This grassroots effort revolutionized commerce, digitizing and globalizing it at an unprecedented scale.
Krugman’s model assumes that large firms control trade, but in reality, many countries thrive on small business-driven exports.
I’ve been to these areas in China and seen firsthand how they operate. These small manufacturers in China may not have the scale of a multinational, but they’re deeply integrated into global supply chains. And despite limited resources, they’re able to compete globally.
Other countries like Germany and Japan are great examples where ‘hidden champions' who are typically highly specialized small businesses, play a crucial role in global supply chains.
US is not there yet, but it has the opportunity to explore untapped potential of globalizing small businesses and compete in the global market to drive sustainable economic growth.
In fact with this model, ideally anyone is welcome. But there are many barriers that still exist in limiting the globalization of small businesses :
* High transaction costs.
* Complexity of currency exchange and exchange fees
* Complex regulations and banking restrictions
* Difficulty finding trustworthy international partners
Imagine a small business trying to import materials from multiple global suppliers. Not only is it hard to find them, as many countries still rely on government agencies, trade directories, and outdated methods for searching and connecting with suppliers, but when it comes to solidifying deals, the complications don’t stop. One supplier might require an international wire transfer, another may only accept Western Union, and a third insists on using a local bank with high fees and delays. Small businesses simply don’t have the same access to banking services and streamlined financial systems that large corporations do. The variations often depend on the specific banking practices and infrastructure of both parties.
To make matters even more complicated, small businesses don't have dedicated teams like large corporations. They run on minimal resources, managing everything themselves. One small error or delay can stall shipments, disrupt cash flow, and risk losing customers. Yet, global trade expects them to compete at the same level as industry giants, without the same financial infrastructure or support.
More often than not, small businesses are left to fend for themselves, struggling to overcome these challenges alone.
And that’s where Bitcoin changes everything.
### Can Bitcoin Create a True Free Market?
Unlike traditional banking systems, which are tied to government policies and centralized institutions, Bitcoin operates on a decentralized, borderless network. This enables direct transactions between buyers and sellers without intermediaries or excessive fees.
While Krugman’s theory explains why big corporations once held an advantage, it overlooks how decentralization removes trade bottlenecks, giving small businesses a real chance to compete globally.
In a Bitcoin-based global economy:
* No more currency conversion fees - Businesses trade freely across borders.
* No more reliance on banks - Transactions occur on a trustless system, reducing fraud and expensive intermediaries.
* No more cross-border delays - Payments are instantaneous, bypassing restrictive banking regulations.
For small businesses, this means fewer barriers to global trade. A textile producer in India could sell directly to a retailer in Canada without needing to figure out the bureaucratic maze of currency exchanges and trade laws. A graphic designer in Brazil could collaborate with a company in Australia and receive payment instantly without relying on high-fee banking systems. A shea butter producer in Kenya could sell organic products directly to small skincare manufacturers in the U.S., bypassing middlemen and avoiding international shipping delays.
Bitcoin removes middlemen, slashes costs, and levels the playing field, not by government intervention, but by eliminating artificial barriers altogether.
### The Challenges and the Future
Bitcoin isn’t a perfect solution, and we know that. Scalability, price volatility, and regulatory pushback remain major hurdles.
Currently, stablecoins are attempting to integrate into the Bitcoin Layer 2 network, which could potentially distract from Bitcoin's intended role as a global decentralized medium of exchange. Some are pushing for trade to happen through currency-pegged, centralized coins, which risks undermining Bitcoin's strong push toward free trade and decentralization.
Governments and banks resist decentralization because it threatens their control over money flows.
However, the concept of Bitcoin as a medium of exchange is already taking root. Leaders and developers are dedicating their legacies to building this system for a truly global community. El Salvador’s Bitcoin experiment has shown both the potential and the obstacles of a Bitcoin-driven economy with many lessons to learn from. Block Inc’s innovations have expanded into strengthening Bitcoin’s role as a decentralized medium globally, particularly through decentralized mining benefits and commercialized cold wallets.
Nostr has been very successful in seeing growth in these domains as well. It is slow but it's taking the right steps towards simplifying Bitcoin commerce adoption through zaps.
However the million-dollar question remains. If Bitcoin removes trade barriers, will small businesses adopt it?
History suggests yes but with the right approach. Just as Jack Ma went door to door convincing small businesses to embrace e-commerce, a similar effort is needed for Bitcoin adoption.
With Bitcoin, global trade can become digitized, commercialized, and pain-free, but only if small businesses understand how to use it. More importantly, it disrupts trade hegemony and creates a more equitable world that everyone can be part of.
A challenge I foresee beyond technology, is education. Initiatives that focus on simple onboarding, low-cost adoption, and real-world use cases can drive Bitcoin-powered trade forward. There are many non-tech Bitcoin enthusiasts who want to contribute to the Bitcoin ecosystem and would love to take on educator roles. Once the infrastructure and understanding around Bitcoin become more conceptualized, these folks could play a strong role in spreading awareness and adoption.
If Bitcoin is introduced strategically, not as a speculative asset but as an international trade enabler through its medium of exchange, it could reshape global commerce just as e-commerce once did. The only difference is that this time, trade is truly borderless, trustless, and not controlled by financial intermediaries.
Krugman’s New Trade Theory remains useful in explaining how economies of scale shape trade. But it fails to account for decentralized digital economies, where small businesses can bypass the old rules of power and privilege.
If Bitcoin achieves mainstream adoption, we may finally see a world where trade is truly free, where merit, not governments or middlemen, determines success.
-
![](/static/nostr-icon-purple-64x64.png)
@ c8383d81:f9139549
2025-02-05 13:06:05
**My own stats on what I’ve done over the weekend:**
- Spoke to +100 developers, it was great seeing a couple of familiar Flemish faces and meeting some new ones but overall the crowd was extremely diverse.
- Ended up doing a short interview promoting the protocol and ended up going to 0 talks.
- Tried to evangelize by going booth by booth to distribute a Nostr flyer to other FOSDEM projects, with the hope that they would broadcast the info towards their SOME person to add Nostr on their list or to build out a library for the languages that were present ( This was a fairly slow approach )
- Kept it to Nostr protocol 95% of the time, the Bitcoin narrative is not always a good time to push and as a side note I’ve met more Monero users than in the last 5 years.
- Was able to convince some engineers to look into the #soveng endeavor.
**Small overview from the most common questions:**
- They have heard about Nostr but are not sure of the details. ( mostly through the bitcoin community )
- What is the difference with ActivityPub, Mastodon, Fediverse ?
- IOT developers, so questions regarding MQTT & Meshtastic integrations ?
- Current state of MLS on Nostr ?
- What are the current biggest clients / apps build on Nostr ?
- Will jack still give a talk ?
**Things we could improve:**
- Bring more stickers like loads more,
- Bring T-shirts, Pins… could be a good way to fund these adventures instead of raising funds.
( Most projects where selling something to help raise funds for projects )
- Almost no onboarding / client installs.
- Compared to the Nostr booth at BTC Amsterdam not a single person asked if they could charge their phone.
**Personal Note:**
The last time I visited was roughly 13 years ago and me being a little more seasoned I just loved the fact that I was able to pay some support to the open source projects I’ve been using for years ( homebrew, modzilla, Free BSD,.. ) and see the amazing diverse crowd that is the open source Movement 🧡
**Al final shoutout to our great pirate crew 🏴☠️:**
The Dutch Guard ( nostr:npub1qe3e5wrvnsgpggtkytxteaqfprz0rgxr8c3l34kk3a9t7e2l3acslezefe & nostr:npub1l77twp5l02jadkcjn6eeulv2j7y5vmf9tf3hhtq7h7rp0vzhgpzqz0swft ) and a adrenaline fueled nostr:npub1t6jxfqz9hv0lygn9thwndekuahwyxkgvycyscjrtauuw73gd5k7sqvksrw , nostr:npub1rfw075gc6pc693w5v568xw4mnu7umlzpkfxmqye0cgxm7qw8tauqfck3t8 and nostr:npub1r30l8j4vmppvq8w23umcyvd3vct4zmfpfkn4c7h2h057rmlfcrmq9xt9ma amazing finally meeting you IRL after close to 2 years since the Yakihonne hackathon 😀
![image](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fmedia.tenor.com%2FJWfM8v36QqwAAAAC%2Fjohn-cena-salute.gif&f=1&nofb=1&ipt=c783e6cbd8e6abc7ca910ce06b98e13d80fc4f06e40668935cc05cb009a5b658&ipo=images)
-
![](/static/nostr-icon-purple-64x64.png)
@ a7bbc310:fe7b7be3
2025-02-05 12:20:59
![image]( https://image.nostr.build/16f5a653d5f29639369675d65a810ec462a77ce77bf214822a5b5f7e38c76662.jpg)In 2018 I started doing film photography. I asked myself what could I do that was unique. So, I tried taking picture at local gig venues. I’d look around and everyone was using digital cameras. I had a limited number of shots I could take, inconsistent lighting at different venues but some delayed gratification of not knowing how the images would turn out until I developed them. I’d come home late from a show and be up until the early hours developing and scanning the images. 2020 put a stop to that. It’s something I’d like to start again. I’ll be sharing some of my favourite images I from my badly categorised/labled folders.
![image]( https://image.nostr.build/4eebb266de2a531293c53b21ee2b5817348426927f4a83fed428b4d774179346.jpg)
Artist in photo is called Conner Youngblood. It’s been interesting to listen to his most recent projects (Cascades, Cascading, Cascadingly) to compare to his earlier ones (Australia)
Australia is a stripped back, couple guitars, vox and drums. Most recent has a few more vocal effects and electronica sounds. A comparison I would make would be Bon Iver’s - Emma with their 3rd album 22, a million.
As a when I arrange the files on my HD, I’ll be share a few more band photos.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5e13e5d5:217fe898
2025-02-05 11:30:01
<p>With the rapid development of science and technology, communication technology has penetrated into all aspects of our lives, but the accompanying security risks cannot be ignored. As an effective technical means, signal jamming technology has gradually attracted people's attention in the field of public security in recent years. This article will explore the application of <a href="https://www.thejammerblocker.com/">signal jammer</a> in public security and its potential impact.</p>
<h2> Basic concept of signal jammer</h2>
<p>Signal jammer, as the name suggests, is a device used to interfere with or block signals of a specific frequency. By emitting electromagnetic waves of a specific frequency, signal jammers can effectively shield or weaken the reception of certain wireless signals, thereby preventing unnecessary information transmission. Signal jammers have a wide range of application scenarios, from countermeasures in the military field to security protection in the civilian field.</p>
<p><a href="https://www.thejammerblocker.com/t-us-08-6-high-power-wi-fi-blocker-for-classroom/"><img src="https://www.thejammerblocker.com/wp-content/uploads/2024/05/1-1-300x293.jpg" alt="Simple to use iPhone Cell Phone Jammer for Classroom" width="450"/></a></p>
<h3> Application in public security</h3>
<h4> 1. Preventing terrorist attacks</h4>
<p>In some important public places, such as airports, stadiums, and large conferences, signal jammers can be used to prevent terrorists from remotely detonating bombs through mobile phones and other devices. Such devices can create a "jamming area" in a critical area, making communications related to explosive devices impossible, thereby effectively reducing the risk of terrorist attacks.</p>
<p><a title="https://www.thejammerblocker.com/cell-phone-jammer-blocker-for-gsm-5g/" href="https://www.thejammerblocker.com/cell-phone-jammer-blocker-for-gsm-5g/">https://www.thejammerblocker.com/cell-phone-jammer-blocker-for-gsm-5g/</a></p>
<h4> 2. Maintaining public order</h4>
<p>In some special cases, such as demonstrations or large gatherings, in order to prevent criminals from using mobile phones to organize or incite, law enforcement agencies can choose to use signal jammers moderately. By interfering with the communication signals at the scene, the organization ability of criminals can be effectively weakened, thereby maintaining public order.</p>
<h4> 3. Criminal investigation</h4>
<p>During criminal investigations, the police sometimes need to monitor certain targets. Signal jammers can be used to block the communication between suspects and the outside world, so as to further obtain evidence or make arrests. However, this method must be carried out within the scope permitted by law to avoid infringing personal privacy.</p>
<h4> 4. Security precautions</h4>
<p>In some special places, such as prisons and important laboratories, <a href="https://www.thejammerblocker.com/gps-jammer-car-tracker-blocker/">gps blocker</a> can prevent jailbreaks or leaks. By interfering with mobile phone signals, prisoners can be effectively prevented from contacting the outside world and ensuring the safety of the place.</p>
<h3> Potential impacts and legal ethical issues</h3>
<p>Although signal jammers have many applications in public safety, their use also faces some potential impacts and legal ethical issues. First, the use of signal jammers may infringe on personal freedom of communication. Interference with citizens' mobile phone signals may affect their ability to seek help in an emergency. Secondly, if the jammer is abused by criminals, it may lead to social chaos. Therefore, when using <a href="https://www.thejammerblocker.com/drone-uavs-jammers-blockers/">drone jamming device</a>, relevant departments should formulate strict usage specifications and legal frameworks to protect the legitimate rights and interests of citizens.</p>
<h3> Conclusion</h3>
<p>In summary, as an emerging public safety technology, <a href="https://www.thejammerblocker.com/wifi-bluetooth-camera-jammer-blocker/">bluetooth blocker</a> have important application value in preventing terrorist attacks, maintaining public order and criminal investigation. However, how to maintain personal privacy and freedom of communication while ensuring public safety is a question worth pondering. In the future, with the further development of science and technology, the application of signal jammers in public safety will become more and more common, but we must be vigilant about its potential impact and use this technology reasonably and legally.</p>
<p><a href="https://www.thejammerblocker.com/dj-x5-military-grade-signal-jammer-device-5-antennas/">https://www.thejammerblocker.com/dj-x5-military-grade-signal-jammer-device-5-antennas/</a></p>
-
![](/static/nostr-icon-purple-64x64.png)
@ da0b9bc3:4e30a4a9
2025-02-05 07:29:27
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/876357
-
![](/static/nostr-icon-purple-64x64.png)
@ 3c7dc2c5:805642a8
2025-02-05 07:02:42
## 🧠Quote(s) of the week:
Old model:
-You work for money.
-They print it.
-You save your money.
-They devalue it.
-You invest your money.
-They manipulate it.
New model:
-You save in Bitcoin.
-There’s nothing they can do about it.
## 🧡Bitcoin news🧡
Before we start some extra info to get you focused.
1 BTC is unreachable for the majority.
The aspiration used to be 6.15. Now it's 0.1.
'Now who owns Bitcoin?
'The Answer Might Surprise You.
👉🏽Bitcoin is often misunderstood. Some think it’s controlled by a handful of institutions, others believe governments secretly hoard it. The reality? Bitcoin ownership is diverse and widely distributed across individuals, businesses, funds, and even governments.
👉🏽57% of Bitcoin is held by individuals. From everyday savers to long-term believers, Bitcoin’s largest share is in the hands of the people.
👉🏽4% belongs to businesses. Companies are increasingly adding BTC to their treasuries, recognizing its role as digital gold.
👉🏽5% is held by funds and ETFs. Bitcoin is being adopted by the financial system, providing new ways for institutions and retail investors to gain exposure.
👉🏽Governments own 2% to 3%. Whether through seized BTC or strategic holdings where states already acknowledged Bitcoin’s value.
👉🏽Around 18% is estimated to be lost forever. This actually makes Bitcoin even scarcer than its 21 million cap suggests.
👉🏽Miners and yet-to-be-mined Bitcoin represent the rest. This small remaining fraction coupled with a fixed supply means competition for mining remaining bitcoins will only increase over time.
This distribution is one of the many reasons why Bitcoin is unique. Not only there is no single entity that controls it (no government or bank can print more of it), but also its distribution among the population is more fairly distributed than for any other monetary asset.
Bitcoin is owned by those who understand its value, regardless of nationality, religion, skin color, political affiliation, or beliefs. Bitcoin is for everyone.' -Thomas Jeegers
[](https://i.ibb.co/5gJH2pLk/Gi-XWUx0-W8-AAcp84.jpg)
On the 28th of January:
➡️European Squash Federation adopts Bitcoin for its treasury.
➡️Binance under investigation for money laundering, tax fraud, and drug trafficking in France - Reuters
➡️'Metaplanet will issue 21 million new stock warrants with a 0% discount rate, raising approximately $870 million to fund additional Bitcoin purchases. This marks the largest-ever fundraising for Bitcoin purchases in the history of the Asian stock market.' -Metaplanet
➡️U.S. Senator Cynthia Lummis received a framed Bitcoin block from Marathon’s Jayson Browder to mark her role as the new chair of the Senate Banking Subcommittee on Digital Assets. MARA Pool mined the block by calculating 1,476,600,000,000,000,000,000 Bitcoin hashes within 46 seconds.
➡️'Fidelity is now bigger than Greyscale:
1. BlackRock ETF: 576k BTC
2. Fidelity ETF: 205k BTC
3. Greyscale ETF: 202k BTC' -Bitcoin for Freedom
➡️'Brazil’s state-owned oil and gas company Petrobras is reportedly assessing getting into Bitcoin mining. This is a new chapter for the company and shows how traditional industries are adapting to the digital world.
Petrobras, one of the largest and most profitable oil companies in the world, is going to use excess natural gas produced during the oil extraction process to power Bitcoin mining.
This will reduce energy waste and methane emissions, and create a new revenue stream for the company.' -Bitcoin News
➡️Last week, the 613-foot smokestack of the former Somerset Generating Station in Niagara County, New York was demolished. The site, now Tera Wulf Inc.’s Lake Mariner Data, will focus on Bitcoin mining and AI processing powered by hydroelectric energy
➡️'For the first time ever in Bitcoin's 16-year history, the epoch-over-epoch (EOE) growth has fallen below +100%. Pack it up, fellas.'- Wicked
[](https://i.ibb.co/sJFgh93r/Gi-Zncd-PXk-AAuh.jpg)
On the 29th of January:
➡️Czech central bank Governor Ales Michl said he would propose a plan to include bitcoin in the country’s official reserves, the Financial Times reported.
Michl statement: 'Czech National Bank’s goal is price stability. When we took office in July 2022, inflation was 17.5%. We brought it down to target. We are also diversifying reserves—gradually increasing gold holdings from 0% to around 5% and planning for 30% in equities. An asset under consideration is Bitcoin. It currently has zero correlation to bonds and is an interesting asset for a large portfolio. Worth considering. Right now, it’s only at the stage of analysis and discussion. The Bank Board decides, and no decision is imminent. Thoughtful analysis is needed.
Bitcoin has significant volatility, which makes it harder to take advantage of its current low correlation with other assets. That’s why I will ask our team on Thursday to further assess Bitcoin’s potential role in our reserves. Nothing more, nothing less.
The article is very accurate, including my statement that Bitcoin could one day be worth either zero or a huge amount. At our meeting on Thursday, after discussing a document on international reserve management in 2024, the Bank Board of the Czech National Bank (CNB) approved a proposal to analyze the options for investing in additional asset classes.
The central bank has been increasingly diversifying its investments over the last two years as part of its reserve management strategy. At the proposal of Governor Aleš Michl, the CNB is to assess whether it would be appropriate in terms of diversification and return to include other asset classes in the reserves as well.
Based on the results of the analysis, the Bank Board will then decide how to proceed further. No changes will be implemented in this area until then. Any changes in the reserve portfolios will be disclosed in the quarterly information on the CNB’s international reserves and the CNB’s annual report.'
The head of a central bank tweeting about potentially allocating to Bitcoin was not on my 2025 bingo card.
➡️Jerome Powell: "Banks are perfectly able to serve crypto customers."
I love how everyone is recognizing and acknowledging Bitcoin now.
Banks can custody Bitcoin on behalf of clients, create structured Bitcoin financial products, and allow customers to buy Bitcoin.
Even Powell isn't badmouthing it anymore.
On the 29th of January:
➡️'It is utterly remarkable that BTC Dominance is at 62% considering it's really from 45% to 62% has coincided with massive issuance of Memecoins
This really is a different market, a schism between Bitcoin and Crypto.' - Steven Lubka
➡️Illinois State Rep. has introduced a bill to establish a Bitcoin Strategic Reserve.
➡️The decoupling of Bitcoin & Crypto Market Caps:
[](https://i.ibb.co/svqCWGcM/Gifa-ERa-XUAA80-A8.jpg)
ETH losing 50% of its value vs. BTC in the past 11 months explains the lack of enthusiasm about $100K BTC. Mitchell Hodl: '2 years ago if you sold 1 ETH and bought Bitcoin, you would have acquired ~.07 BTC. Today if you sell 1 ETH and buy Bitcoin, you’ll acquire .03 BTC.
Those “toxic maximalists” were right.
If it’s not BTC, it’s dogshit.'
On the 3rd of February Bitcoin dominance soared over 64%. Four-year high. Massively bullish. Despite the hundreds of billions of dollars invested in crypto, Bitcoin dominance has just tagged Nov 2017 levels. At 73%, it unwinds back to the pre-ICO era.
'The truth is, there is no more alt season.
The sooner you accept that, the sooner you can still build up a meaningful Bitcoin position.
You're not too late.
You're among the first 1-2% of people to get into bitcoin.
It's time to leave this chapter of false narratives behind and get on board with something real and meaningful.' - Sam Wouters
If you're trying to outperform Bitcoin with an "alt", just remember that you're mixing with a crowd that is simply trying to beat you to the exit.
➡️Senator Bob Menendez who fought against El Salvador adopting Bitcoin was just sentenced to 11 years in prison for taking bribes in Gold and Cash! Classic!
➡️INDIANA Bitcoin Bill!
HB 1322 would allow 'the Hoosier state' to invest state retirement funds in Bitcoin ETFs.
Nation-states, States, Companies & Individuals are clamoring to acquire Bitcoin.
[](https://i.ibb.co/qYRcVvLM/Gioi-YI-XYAAw-XP2.jpg)
On the 30th of January:
➡️World's largest stablecoin Tether is now minting its stablecoin on the Bitcoin Lightning Network.
➡️ECB chief Lagarde says she "is confident" that Bitcoin will not end up in the EU central bank reserves.
[Here ](https://x.com/pete_rizzo_/status/1885293996412383720) is the video of how she is explaining that Bitcoin isn’t liquid, secure, or safe for EU reserves.
Bitcoin trades 24/7—one of the most liquid markets in the world.
Its code secures $2T+ in wealth, never hacked.
It’s the most secure computer code ever written.
Remember what she said on Bitcoin a while ago: 'It's a matter that needs to be agreed at a global level. If there is an escape, that escape will be used.'
Oh one more: "People are happier to have a job than to have their savings protected." — Christine Lagarde, 10/30/2019
Christine Lagarde has been convicted of more crimes than the average Bitcoin user. Oh well, the more that central banks manipulate the money, the more people will want sound money, and the more people will turn to Bitcoin. Checkmate.
[](https://i.ibb.co/svsv0vZB/Gik-U1-Vp-W8-AA1-Q-V.jpg)
➡️Norway's sovereign wealth fund's indirect Bitcoin exposure has increased by 153% in the past year, reaching 3,821 BTC.
Since 2020, its Bitcoin holdings have grown from 796 BTC to over 3,821 BTC, now valued at over € 350M.
➡️'A $400 home Bitcoin miner just mined a block worth OVER $330,000.
They beat ONCE IN A LIFETIME odds.' -Pete Rizzo
On the 31st of January:
➡️'For the first time in nearly 2 years, the Bitcoin network is running out of pending transactions to fill up new blocks.
It's looking like it could happen within a few hours (only 6 block backlog). This is nothing to worry about.
But if you self-custody bitcoin, it's a great time to learn about UTXOs and consolidate the ones in your wallet, which could save you thousands of dollars worth of bitcoin in the long term.' - Tom Honzik
Learn more here: https://unchained.com/blog/too-many-bitcoin-utxos
➡️MicroStrategy will have up to $584m to buy more Bitcoin after its stock offering was oversubscribed by nearly 3X, increasing from 2.5M shares to 7.3M priced at $80 each.
➡️El Salvador removes Bitcoin's legal tender status and makes its acceptance voluntary, in line with IMF requirements for a $1.4B credit line.
Francis Pouliot: 'Bukele bends the knee to IMF and officially abandons the original Bitcoin law that had caused Bitcoiners to move and invest there in the first place... exactly at the same time as the Bitcoin conference in El Salvador attracting Bitcoiners from all over the world.'
➡️The 2nd time this week another solo Bitcoin miner mined a $300.000 block.
On the 1st of February:
➡️'For the past three consecutive months, the Bitcoin network has processed more than $2 trillion worth of transactions.
That's a lot of utility!' -Pierre Rochard
➡️Retail are capitulating their Bitcoin, whilst whales are buying.
Transfer of wealth from the weak hands to the strong hands. Retail investors are reducing exposure, while large investors (whales) are capitalizing on this opportunity to accumulate. Historically, this divergence aligns with accumulation phases before price appreciation.
➡️So far, so good: Spot bitcoin ETFs pulled in $4.94 billion in January, which annualizes to ~$59 billion.
For context: In all of 2024, they brought in $35.2 billion.
On the 3rd of February:
➡️Ethereum just fell -37% in 60 hours since the trade war headlines mid-day on Friday.
➡️$2B liquidated in 24 hours. That’s a record. More than the COVID dump. More than the FTX collapse.
➡️Trump signs an executive order to create a sovereign wealth fund spearheaded by Howard Lutnick and Scott Bessent. Both are avowedly pro-Bitcoin.
➡️New Record Bitcoin Network Computer Hashrate:
800,000,000,000,000,000,000x per second
➡️OKLAHOMA BITCOIN BILL
SB 315 allows state employees (and all OK residents) to receive payments in Bitcoin.
The bill has progressed to Committee consideration.
➡️'Solid, data-driven reporting on why Bitcoin mining is increasingly regarded among energy experts, academics, and those in the environmental movement as a net positive to the environment across several fronts.' - Daniel Batten on the Mara report.
https://x.com/MARAHoldings/status/1880063353168753133
➡️$562m leveraged Bitcoin positions liquidated as the price plunged as low as $91,359 this morning.
## 💸Traditional Finance / Macro:
On the 27th of January:
👉🏽Over $787 billion was wiped out from the US stock market today.
On the 28th of January:
👉🏽'Amazon, Google, Meta, Microsoft, and Oracle's CapEx are expected to reach a record $274 billion this year.
This would be more than DOUBLE the CapEx posted in 2021 and $127 billion more than in 2023.
Amazon, and Microsoft, are expected to spend $86 billion and $63 billion, respectively.
Spending has accelerated as Big Tech invests in more advanced chips from firms like Nvidia, and large data centers to store them.
The big question is whether China’s DeepSeek will disrupt this trend.
Is AI spending out of control?' -TKL
But meanwhile:
'Magnificent 7 stocks have underperformed the market in 2025:
The Magnificent 7 stocks are down -1.4% while the S&P 500 itself is up ~2.9%.
Meanwhile, the remaining 493 stocks in the S&P 500 have gained +6.6%.
To put this into perspective, in 2024, the Magnificent 7 stocks returned +67.4% while the remaining 493 firms gained just +5.0%.' -TKL
👉🏽MicroStratey today announced the launch of STRK a new convertible preferred stock offering available to institutional investors & select retail investors. To view the investor presentation video, learn more about participating, & access key details, click [here](https://www.microstrategy.com/press/microstrategy-announces-proposed-strk-preferred-stock-offering_01-27-2025).
👉🏽Microsoft shares closed down 6.2% on the worst day since 2022. If only they had listened to Saylor's 3-minute Bitcoin pitch.
## 🏦Banks:
👉🏽Global central banks now hold more Gold than at any point in the past 45 years. Something is brewing.
## 🌎Macro/Geopolitics:
On the 28th of January:
👉🏽'Positions Europe to play a leading role globally.' Inhale, exhale! The EU bureaucrats are stifling innovation.
The EU developed the AI Act instead of AI. To paraphrase Geoffrey Howe, the EU is like a man who knows 364 ways of making love but doesn’t know any women.
[](https://i.ibb.co/BVzLxvKp/Gi-Yc-C-x-Ws-AA1eme.jpg)
Europe also innovated with 'smart waste bins'. The sad this is, I couldn't even refute that now. What groundbreaking future technology has Europe produced in the last 30, 40 50 years?
Europe is done. No Bitcoin, no AI, no tech, no nothing. Regulation fees are becoming their only source of revenue. Wrong side of history, they'll be left behind.
👉🏽Jeroen Blokland: 'China has literally bought its 5% growth target, issuing and swapping tons of DEBT!
China's budget deficit is expected to have hit a whopping 7.1% of GDP in 2024.
Why do you think China's 10-year yield is at 1.60%?
In a world full of debt, invest in scarce assets!'
👉🏽The following is from last week's Weekly Recap: 'The rich are getting richer faster than ever before: US household net worth has risen ~$56 TRILLION since Q1 2020 and hit a record $160 trillion in Q3 2024. Currently, the top 10% own $111 trillion of all wealth, accounting for 69% of the total. The top 0.1% alone own a massive $22 trillion, reflecting 14% of household net worth. On the other hand, the bottom 50% holds just $3.9 trillion, or 2.4% of wealth. This comes as the S&P 500 and the Nasdaq 100 have risen 128% and 166% since Q1 2020 while national home prices have surged ~50%. The wealth gap is growing.' -TKL
Just to elaborate on that, in 1990 the wealth gap between the top 1% and the bottom 50% was $3 trillion.
Incredible chart!
[](https://i.ibb.co/60ckYL3V/Gi-Yafk7-W8-AAy-Giw.jpg)
Now the gap is $40 trillion. Ask yourself why. Has there been more or less government since 1990? Is there more or less money printing?
Cantillion things I guess, and oh don't forget if it was adjusted for inflation it would be even worse, the red line would be pointed down.
👉🏽Ursula von der Leyen: " Dear Christine, dear ECB Governing Council
Europe’s competitiveness is our shared interest—and an urgent challenge.
The Savings and Investments Union must become a reality. It is so needed.
Looking forward to our great work together also in this new mandate."
You mean: "We will grab and redistribute your savings."
These people (one convicted criminal - Lagarde) are so out of touch with reality.
And a new mandate? Are you kidding me?
👉🏽Jeroen Blokland: 'Germany is heading for something 'unique!'
BDI, which calls itself 'The Voice of German Industry,' expects the German economy to shrink again in 2025.
That would mean three consecutive years of GDP decline.
How do German politicians explain this, and how does this reconcile with the re-election of that other German politician, Ursula von der Leyen?'
On the 29th of January:
👉🏽'SUMMARY OF FED DECISION (1/29/2025):
1. Fed leaves rates unchanged, pausing the "Fed Pivot"
2. The decision to halt cuts was a unanimous 12-0 vote
3. Fed says inflation "remains somewhat elevated"
4. The Fed says "Unemployment has stabilized at a low level"
5. Statement on progress toward 2% inflation removed
6. The Fed seems to be aware disinflation has stalled
The battle against inflation continues in 2025.' -TKL
👉🏽Americans spent over $113 billion on lottery tickets last year, which is more than they spent on movies, books, concerts, and sports tickets - combined.
James Lavish: 'Central Banks have turned otherwise normal people into desperate gamblers trying to keep up with the cost of everything.'
👉🏽Gold prices surge to a new all-time high of $2840/oz. Gold prices are now up +40% in 12 months as the US Dollar and interest rates are up sharply.
This has never happened in history. Gold is telling us something.' -TKL
Yes, let me use the following quote by Lawrence Lepard: 'Analog sound money saying sovereign debt crisis inbound.'
But remember, Gold hit an ATH in USD but an ATL in Bitcoin. Fiat money is absolute garbage and Bitcoin is superior to both.
On the 30th of January:
👉🏽The ECB, Christine Lagarde: 'We’re redesigning euro banknotes! Our Governing Council has selected motifs based on our two chosen themes, “European culture” and “Rivers and birds”. We’ll be launching a design contest later this year to help us select the final designs in 2026.'
[](https://i.ibb.co/67GBJrhm/Gin-UBzd-XYAAj-Kb-V.jpg)
On the 31st of January:
👉🏽Germany's unemployment rate hits its highest level in almost 10 years.
The unemployment rate spiked by 0.4% to 6.4%.
👉🏽December PCE inflation, the Fed's preferred inflation measure, RISES to 2.6%, in line with expectations of 2.6%.
Core PCE inflation was 2.8%, in line with expectations of 2.8%.
PCE inflation is now at its highest level since May 2024.
On the 1st of February:
👉🏽 The DOJ just argued that your money isn’t actually property—so the government can take it at will. If that sounds insane, it’s because it is. A federal court will decide if this madness stands. https://reason.com/2025/01/31/the-government-says-money-isnt-property-so-it-can-take-yours/
The money in your bank isn’t actually yours. Only Bitcoin can fix this. Still think you don't need Bitcoin?
## 🎁If you have made it this far I would like to give you a little gift:
++++
Preston Pysh podcast with Lawrence Lepard:
'Exploring the roots of broken money, the moral case for sound currency, and how Bitcoin offers hope for a decentralized financial future.'
https://www.youtube.com/watch?v=WxB8M8q8hQ8
Credit: I have used multiple sources!
My savings account: Bitcoin The tool I recommend for setting up a Bitcoin savings plan: PocketBitcoin especially suited for beginners or people who want to invest in Bitcoin with an automated investment plan once a week or monthly. Use the code BITCOINFRIDAY
Get your Bitcoin out of exchanges. Save them on a hardware wallet, run your own node...be your own bank. Not your keys, not your coins. It's that simple.⠀⠀⠀⠀ ⠀ ⠀⠀⠀
Do you think this post is helpful to you? If so, please share it and support my work with a zap.
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
⭐ Many thanks⭐
Felipe - Bitcoin Friday!
▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃▃
-
![](/static/nostr-icon-purple-64x64.png)
@ 0b118e40:4edc09cb
2025-02-05 06:05:33
During tough economic times, governments have to decide if they should open markets to global trade or protect local businesses with tariffs. The United States has swung between these two strategies, and history shows that the results are never straightforward
Just days ago, President Donald Trump imposed tariffs on imports from Canada, Mexico, and China. He framed these tariffs (25% on most Canadian goods, 10% on Canadian energy, 25% on Mexican imports, and 10% on Chinese imports) as a way to protect American industries.
But will they actually help, or could they backfire?
### A History of U.S. Tariffs
Many have asked if countries will retaliate against the US. They can and they have. Once upon a time, 60 countries were so pissed off at the US, they retaliated at one go and crushed US dominance over trade.
This was during the Great Depression era in the 1930s when the government passed the Smoot-Hawley Tariff Act, placing high taxes on over 20,000 foreign goods. The goal was to protect American jobs, especially American farmers and manufacturers, but it backfired so badly.
Over 60 countries, including Canada, France, and Germany, retaliated by imposing their own tariffs. By 1933, US imports and exports both dropped significantly over 60%, and unemployment rose to 25%.
After President Franklin Roosevelt came to office, he implemented the Reciprocal Trade Agreements Act of 1934 to reverse these policies, calming the world down and reviving trade again.
### The economist history of protectionism
The idea of shielding local businesses with tariffs isn’t new or recent. It's been around for a few centuries. In the 16th to 18th centuries, mercantilism encouraged countries to limit imports and boost exports.
In the 18th century, Adam Smith, in The Wealth of Nations, argued that free trade allows nations to specialize in what they do best countering protectionism policies. Friedrich List later challenged Smith's view by stating that developing countries need some protection to grow their “infant” industries which is a belief that still influences many governments today.
But how often do governments truly support startups and new small businesses in ways that create real growth, rather than allowing funds to trickle down to large corporations instead?
In modern times, John Maynard Keynes supported government intervention during economic downturns, while Milton Friedman championed free trade and minimal state interference.
Paul Krugman argued that limited protectionism can help large industries by providing them unfair advantages to become global market leaders. I have deep reservations about Krugman’s take, particularly on its impact or lack thereof in globalizing small businesses.
The debate between free trade and protectionism has existed for centuries. What’s clear is that there is no one-size-fits-all model to this.
### The Political Debate
Both the left and right have used tariffs but for different reasons. The right supports tariffs to protect jobs and industries, while the left uses them to prevent multinational corporations from exploiting cheap labor abroad.
Neoliberal policies favor free trade, arguing that competition drives efficiency and growth. In the US this gets a little bit confusing as liberals are tied to the left, and free trade is tied to libertarianism which the rights align closely with, yet at present right wing politicians push for protectionism which crosses the boundaries of free-trade.
There are also institutions like the WTO and IMF who advocate for open markets, but their policies often reflect political alliances and preferential treatment - so it depends on what you define as true 'free trade’.
### Who Really Benefits from Tariffs?
Most often, tariffs help capital-intensive industries like pharmaceuticals, tech, and defense, while hurting labor-intensive sectors like manufacturing, agriculture, and construction.
This worsens inequality as big corporations will thrive, while small businesses and working-class people struggle with rising costs and fewer job opportunities.
I’ve been reading through international trade economics out of personal interest, I'll share some models below on why this is the case
#### 1. The Disruption of Natural Trade
Tariffs disrupt the natural flow of trade. The Heckscher-Ohlin model explains that countries export goods that match their resources like Canada’s natural resource energy or China’s labour intensive textile and electronics. When tariffs block this natural exchange, industries suffer.
A clear example was Europe’s energy crisis during the Russia-Ukraine war. By abruptly cutting themselves off from the supply of Russian energy, Europe scrambled to find alternative sources. In the end, it was the people who had to bear the brunt of skyrocketing prices of energy.
#### 2. Who wins and who loses?
The Stolper-Samuelson theorem helps us understand who benefits from tariffs and who loses. The idea behind it is that tariffs benefit capital-intensive industries, while labor-intensive sectors are hurt.
In the US, small manufacturing industries that rely on low-cost imports on intermediary parts from countries like China and Mexico will face rising costs, making their final goods too expensive and less competitive. This is similar to what happened to Argentina, where subsidies and devaluation of pesos contributed to cost-push inflation, making locally produced goods more expensive and less competitive globally.
This also reminded me of the decline of the US Rust Belt during the 1970s and 1980s, where the outsourcing of labour-intensive manufacturing jobs led to economic stagnation in many regions in the Midwest, while capital-intensive sectors flourished on the coasts. It resulted in significantly high income inequality that has not improved over the last 40 years.
Ultimately the cost of economic disruption is disproportionately borne by smaller businesses and low-skilled workers. At the end of the day, the rich get richer and the poor get poorer.
#### 3. Delays in Economic Growth
The Rybczynski theorem suggests that economic growth depends on how efficiently nations reallocate their resources toward capital- or labor-intensive industries. But tariffs can distort this transition and progress.
In the 70s and 80s, the US steel industry had competition from Japan and Germany who modernized their production methods, making their steel more efficient and cost-effective. Instead of prioritizing innovation, many U.S. steel producers relied on tariffs and protectionist measures to shield themselves from foreign competition. This helped for a bit but over time, American steelmakers lost global market share as foreign competitors continued to produce better, cheaper steel. Other factors, such as aging infrastructure, and economic shifts toward a service-based economy, further contributed to the industry's decline.
A similar struggle is seen today with China’s high-tech ambitions. Tariffs on Chinese electronics and technology products limit access to key inputs, such as semiconductors and advanced robotics. While China continues its push for automation and AI-driven manufacturing, these trade barriers increase costs and disrupt supply chains, forcing China to accelerate its decoupling from Western markets. This shift could further strengthen alliances within BRICS, as China seeks alternative trade partnerships to reduce reliance on U.S.-controlled financial and technological ecosystems.
Will the current Tariff imposition backfire and isolate the US like it did a hundred years ago or 50 years ago? Is US risking it's position as a trusted economic leader? Only time would tell
### The impact of tariff on innovation - or lack thereof
While the short-term impacts of tariffs often include higher consumer prices and job losses, the long-term effects can be even more damaging, as they discourage innovation by increasing costs and reducing competition.
Some historical examples globally :
* Nigeria: Blocking import of rice opened up black market out of desperation to survive.
* Brazil: Protectionist car policies led to expensive, outdated vehicles.
* Malaysia’s Proton: Sheltered by tariffs and cronyism and failed to compete globally.
* India (before 1991): Over-regulation limited the industries, until economic reforms allowed for growth.
* Soviet Union during Cold War : Substandard products and minimal innovation due to the absence of foreign alternatives, yielding to economic stagnation.
On the flip side, Vietnam has significantly reduced protectionism policies by actively pursuing free trade agreements. This enabled it to become a key manufacturing hub. But Vietnam is not stopping there as it is actively pushing forward its capital-intensive growth by funding entrepreneurs.
### The Future of U.S. Tariffs
History has shown that tariffs rarely deliver their intended benefits without unintended consequences. While they may provide temporary relief, they often raise prices, shrink job opportunities, and weaken industries in the long run.
Without a clear strategy for innovation and industrial modernization, the U.S. risks repeating past mistakes of isolating itself from global trade rather than strengthening its economy.
At this point, only time will tell whether these tariffs will truly help Americans or will they, once again, make the rich richer and the poor poorer.
-
![](/static/nostr-icon-purple-64x64.png)
@ 1cb14ab3:95d52462
2025-02-05 04:10:38
***Tree branches. 4' x 4' [Littleton, USA. 2016]***
---
#### Introduction
Platte captures a tranquil bend of the South Platte River, where the steady flow of water meets the rugged backdrop of Waterton Canyon. This lens offers a moment of respite, encouraging visitors to step away from the river’s busy recreational activities and focus on the quiet beauty of this secluded scene.
#### Site & Placement
Positioned on the west bank of the South Platte River, the lens directs attention to the water’s gentle curves and the canyon rising in the background. A bench placed 12 feet away provides the perfect spot for reflection, emphasizing the interplay of movement and stillness in the landscape.
#### Impermanence & Integration
The lens, constructed from branches and stone, mirrors the ever-changing nature of the river itself. As it stands, it frames a single moment within the flow of time, but its materials will soon be reclaimed by the earth, echoing the river’s constant reshaping of the land.
#### Reflection
Platte invites viewers to contemplate the river’s journey—its constancy in motion and its quiet persistence. The work becomes a metaphor for life’s flow, urging us to find beauty in the transient and the enduring alike.
---
## Photos
![image](https://image.nostr.build/0ef86cf4ef8a17fdc86570528147cab2d71e95f4d53eac156366f099b7d04ab7.jpg)
![image](https://image.nostr.build/a3f7c08274bbe54b6cb523da1181858a284b85475457319eb50a251ea96d53d5.jpg)
![image](https://image.nostr.build/e9bc6ffb0b5164e44cd31f2683c17e2492ed5fe7344f03b581a4be1d6d7a191d.jpg)
![image](https://image.nostr.build/1c88e3ebba620443bb760a687f9e207eafd1cb05bb0b88d96fed072744c4faf5.jpg)
![image](https://image.nostr.build/cad1e572a75598d447e10dc820d8889c1d93a85ef13bfe1bffbd4de93a25f7d3.jpg)
![image](https://image.nostr.build/7f7012da0268b27eb8918010140683d941877bc84aa352eab52c5e5e0ff8e387.jpg)
![image](https://image.nostr.build/efee9155388216794da48a2fdbf299e1ceaa920470d1f38bccc25e7ba6d29dfd.jpg)
---
#### More from the 'Earth Lens' Series:
[Earth Lens Series: Artist Statement + List of Works](https://hes.npub.pro/post/1731091744332/)
["Looking Glass" (Earth Lens 001)](https://hes.npub.pro/post/1736304563962/)
["Folsom" (Earth Lens 002)](https://hes.npub.pro/post/1737844073125/)
["Sanctuary" (Earth Lens 003)](https://hes.npub.pro/post/1731091744332/)
[COMING SOON: "Grandfather" (Earth Lens 005)](https://hes.npub.pro/post/1731091744332/)
[COMING SOON: "Chongming" (Earth Lens 006)](https://hes.npub.pro/post/1731091744332/)
---
#### More from Hes
[Portfolio](https://hesart.npub.pro)
[Online Store](https://plebeian.market/community/hes@nostrplebs.com/hesmart-ym3fcufdfz)
[Artist Statements](https://hes.npub.pro/tag/art/)
[Travel Guides](https://hes.npub.pro/tag/travel/)
[Photography](https://hes.npub.pro/tag/photography)
[Money](https://hes.npub.pro/tag/money)
[Tech](https://hes.npub.pro/tag/tech)
---
*All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.*
-
![](/static/nostr-icon-purple-64x64.png)
@ c43d6de3:a6583169
2025-02-05 02:46:10
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c43d6de3de463a1e5d508926f1e0fa3c316bbc1ddf8340d565b70e71a6583169/files/1738723378172-YAKIHONNES3.jpg)
Right this moment, 5.52 billion pairs of hands are within arm’s reach of the internet.
Hands stretch across pillows, eagerly reaching for phones first thing in the morning. Fingertips tap at keyboards and swipe across glowing glass.
The world has never been so connected. Billions of conversations are happening every second.
Yet, humanity has never been so quiet.
Hotel lobbies, waiting rooms, train stations, and airports — places once buzzing with the chatter of strangers — now lie quieter than libraries. Most libraries don’t exist in the physical sense anymore.
Humanity Has Gone Mute.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c43d6de3de463a1e5d508926f1e0fa3c316bbc1ddf8340d565b70e71a6583169/files/1738723412794-YAKIHONNES3.jpg)
Small talk is disappearing. The tiniest thoughts are condensed into 280 characters to be posted on X, hoping to garner hearts, claps, zaps, or whatever gimmick social media platforms use to keep us tethered to their feeds. Instead of sharing these thoughts with the few souls occupying the same physical space as us, we broadcast them into the digital void.
Gone are the genuine, physical reactions — a smile, a laugh, maybe a headshake if a joke didn’t land.
Who needs small talk, right? Wasn’t it just that awkward thing people did before cellphones and the internet existed?
No. The silence is worse.
It’s the manifestation of relational decay.
That’s why people talked. People talked about the weather or about Mrs. Jones’ dog that always gets out. That’s what helped neighbors scale one another’s emotional fences and get to know one another. It was, and always will be, the first step to any meaningful relationship.
Today, small talk has been relegated to social feeds and forums. It’s easier to make a friend across the planet than to make one next door. People fall into the trap of chasing likes, followers, and fame, while their local connections — the ones critical to mental health and a sense of purpose — fade into the background.
Maybe I’m out of touch. Maybe I just don’t get out enough. But as a member of the Army Reserves, I’ve experienced something rare.
Once a month, I attend drill, and once a year, we’re sent on an annual training that can last up to thirty days. During those thirty days, we’re often shipped off to a place far from the internet. And in that time, something remarkable happens: small talk comes back to life.
It’s incredible to watch my fellow Soldiers connect.
The relationships we have before training versus after are night and day. And it all starts with small talk — simple jokes, shared gripes, and the mundane details that snowball into camaraderie.
When we’re forced to take that first step to avoid the boredom of silence, we discover one another’s existence. It’s a reminder that sometimes, the absence of convenience is what sparks true connection.
Small talk isn’t just filler. It’s the foundation of relationships. Maybe it’s time to put down the phone, look around, and say something — anything — to the person next to you.
While the world may feel quieter than ever, the potential for connection has never been stronger.
-----------
I want to show the world that life is a scroll riddled with ink. The marks will only ever be simple blots on the parchment unless you pause and perceive them for the characters they are.
Thank you for reading. If you liked this article let me know with a zap and share with friends you feel might enjoy it too!
-
![](/static/nostr-icon-purple-64x64.png)
@ c43d6de3:a6583169
2025-02-05 02:37:14
## Reflection on Growth and Gratitude
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c43d6de3de463a1e5d508926f1e0fa3c316bbc1ddf8340d565b70e71a6583169/files/1738722663497-YAKIHONNES3.jpg)
Ah, the Holidays…
That time of year when we return where it all began. The hustle and grind of the past twelve months has built to a fever pitch, and whatever we’ve achieved — or failed to — clings to us like a weight on our shoulders as we step onto the doorsteps of home.
It’s a time of reunions, of seeing faces that knew us before careers, titles, and responsibilities etched lines into our brows. Eyes linger a moment too long, quietly assessing:
“Have they changed?”
“Have they succeeded?”
“How much weight have they gained — or lost?”
And then come the words — warm, congratulatory, or otherwise. “You look amazing!” they’ll gush, or worse, the silence of unspoken judgment.
Later, with old friends, the comparisons begin. It’s subtle, unspoken, but there. This year, as I stood in front of my best friend’s meticulously polished Porsche SUV, a gift to his wife, the voice in my head wasn’t congratulating him. It was whispering something else: envy.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c43d6de3de463a1e5d508926f1e0fa3c316bbc1ddf8340d565b70e71a6583169/files/1738722648153-YAKIHONNES3.jpg)
I was happy for him — truly. I congratulated him on being in a position to give his wife something so extravagant. But as we spent the day together, subtle hints started to pile up, revealing there was more to his gift than I’d initially thought.
Since the last time I’d seen him, he’d grown significantly wealthier. There were comments and allusions that suggested he might even be a millionaire. What started as a faint whisper of envy in the back of my mind soon ignited into a flame of curiosity — and, I’ll admit, a touch of self-pity.
I couldn’t help but wonder: How the hell did he do it?
I tried to play it cool, to not make a fuss about it, but it was gnawing at me. I’d spent the last 12 months busting my ass, juggling work, two kids, and a wife, barely keeping my head above water.
He had kids. He was married. He worked a full-time job. Yet, somehow, he was fitter than me, his house was tidier than mine, and everything I struggled to maintain at a high standard seemed effortlessly better in his world.
What was I missing?
I fought the urge to chalk it up to something simple, like a secret inheritance from a wealthy relative I didn’t know about. Maybe, his grandfather passed and left him a fortune?
Our conversation deepened. I started to understand more about his daily routines and professional growth.
There was no silver bullet. No stroke of luck or hidden windfall. He was simply outworking me in every way imaginable.
Looking at him in his beautiful home, talking about his plans and the ways he still aspired to grow, took me back to when we were kids. Back to the times we would sit on the porch, watching cars roll by, projecting our dreams into the world.
He had turned those dreams into reality — and now, here he was, setting his sights on even higher ceilings to break through.
I felt a pang of shame for the envy stirring inside me.
What had I been doing wrong?
We were essentially the same person. We grew up in the same neighborhood, shared the same circle of friends all the way through college, believed in the same values, and approached life with the same mindset.
But as I listened to him, I realized we had the same foundations and potential, yet we executed differently. He was waking up at 4 a.m. to pursue the things he loved, knowing his busy days wouldn’t allow for it otherwise. Meanwhile, I was hitting snooze, sleeping until the last possible moment before scrambling to get the kids ready and start my day.
I’d been putting off the things I love — like writing. I’d turned down opportunities for higher-paying jobs because I feared they’d chip away at the little time I already had.
The envy I’d felt began to crystalize, forming a smooth, reflective surface — and staring back at me was my own face.
That’s when it hit me: I was actually lucky.
What better friend could I ask for than someone who serves as a reflection of a better version of myself? What better inspiration could there be than the drive to return next year and say, “Hey man, I’m right there with you.”
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c43d6de3de463a1e5d508926f1e0fa3c316bbc1ddf8340d565b70e71a6583169/files/1738722616106-YAKIHONNES3.jpg)
Not everyone returns from the holidays feeling inspired. Most head back to their “real” lives with bags of half-thought-out gifts, a few extra pounds around the waist, and the quiet relief of leaving their hometown behind.
Many start the new year armed with a list of goals but rarely with a clear vision of the person they want to become.
The seed of envy grew into something better in me; a desire to do more, to be more.
Cheers to you, bud. Here’s to the push I needed.
#Envy #growNostr #Friends
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-05 02:18:03
![](https://m.stacker.news/76183)
Pre-Foundational learning for these participants has now kicked off in the Bitcoin Design Community, check out the #education channel on the [Bitcoin.Design](https://Bitcoin.Design) [Discord channel](https://discord.com/channels/903125802726596648/1260871907050393620).
## 🪇 10 talented participants from South America will be:
Learning bitcoin UX Design fundamentals using the Bitcoin Design Guide
Working hands-on with South American-built products to evaluate their user experiences and support builders with data
> Attending [BTC++ in Florianópolis](https://btcplusplus.dev/conf/floripa)
This initiative is sponsored by the [Human Rights Foundation](https://HRF.org) in collaboration with the [Bitcoin Design Foundation](https://bitcoindesignfoundation.org/) and [Area Bitcoin](https://areabitcoin.co).
## 🥅 Goals:
- Empower local talent to improve the UX of South American bitcoin products - seeing their passion and drive to bring bitcoin to their countries is really inspiring
- Create meaningful relationships with wallet developers through practical collaboration
- Scale bitcoin adoption by improving the user experience
- Create a public knowledge base: All research conducted in Africa and South America will be made publicly available for builders
originally posted at https://stacker.news/items/876215
-
![](/static/nostr-icon-purple-64x64.png)
@ dd1f9d50:06113a21
2025-02-05 01:48:55
#### **(Because Most People Don’t Understand Money)**
#### The requisite knowledge needed to know whether $100 or $100,000 per Bitcoin is relatively speaking “a lot,” is what value means. One way to measure value is through a universal yardstick we call “Money.” The question of “What is money?” is perhaps one of the most overlooked and under answered in our day and age. There is even an entire podcast dedicated to that question with the eponymous title, hosted by Robert Breedlove. That podcast often delves into the more philosophical underpinnings whereas I hope to approach this with a more practical answer.
**Money is a technology.**
Money is the technology with which we interact with one another to reorganize goods and services to the place and time they are best suited. Most money of the past has been tangible (though not a requisite feature), scarce, recognizable (read: verifiable), durable, portable, and divisible. These features one might call the “Attributes of Money.” These attributes are absolutely essential for a money to maintain its status as a money. (Those of you who understand the U.S. Dollar system maybe scratching your heads right now but, believe me, I will address that elephant in due time.) These attributes, you may notice, are not a yes or no but more of a gradient. A money can be MORE portable than another yet, less durable. One more divisible but not scarce whatsoever. The point being they must have, in some capacity, these attributes or they simply aren’t money.
**One of These Things is Not Like the Other**
| | **Bitcoin** | **Gold** | **Dollars** |
|-----------------|:----------------------------------------------------------------------------------------------------------------:|:------------------------------------------------------------------:|:--------------------------------------------------------------------------------------------------------------------------------------------------:|
| **Scarcity** | 21 million coins <br />is the maximum supply | Unknown- the <br />supply grows roughly 2% per year | Also unknown to anyone outside of the Federal Reserve, Trillions and counting |
| **Recognizability** | Each coin is verifiable to it's genesis on the timechain | Each molecule of gold has distinct physical verifiable properties | If the Federal reserve says it is a valid note, it is (Unless you are an enemy of the United States) |
| **Durablility** | Each "Bitcoin" is information stored on a globally distributed network | Doesn't Rust and as far as can be measured Au197 is stable forever | Can be destroyed by any means that effect fabric and centralized databases |
| **Portability** | Available wherever data can be store- Anywhere | Can be moved at 9.81 Newtons per Kilogram- Methods may vary | Can be moved physically with fabric notes- Digitally with express permission from a US accredited banking institution |
| **Divisibility** | Currently can be divided into 100 million parts called Sats (can be further subdivided by adding decimal places) | Can be divided to the Atomic level (Though not practical) | Can be divided (without dilution) by adding new denominative bills or coinage<br />Can be divided (with dilution) by printing new bills or coinage |
| | **Bitcoin** | **Gold** | **Dollars** |
You may think with all of the great functionality of Bitcoin that the phrase "One of these things is not like the other" refers to BTC. No, I was referring to the Dollar. It is the only one on the list that was a currency that was substituted as some kind of faux money. It asserts itself, or rather the Federal Reserve asserts it, as money, de facto.
**Dollars are NOT money.**
Dollars are (allegedly) a currency. If money is a specific technology, currency is the financial infrastructure that allows that technology to reach and be used by the most number of people possible. This requires a firm tether between the asset being used as money and the currency used as a claim to that money. For example: If I hand you a chicken, you have a chicken. But, if I hand you a coupon that is redeemable for a chicken, you do not have a chicken. You have a claim to a chicken that is only as good as the party making that claim. Bringing it back to money again, dollars (Prior to 1971) were redeemable for gold at a rate of $35 per ounce. This is that strong tether that pegged dollars to gold and physical reality itself. Without a proof of work, mining, . Until…
**WTF Happened in 1971?**
The Nixon shock happened. Briefly, The U.S. took in Europe’s gold in the 1940’s to keep it out of Hitler’s hands. The U.S. made an agreement to peg the dollar to Europe’s gold. The U.S. over printed dollars in relation to the gold holdings. Around 1971 France (among others) called the U.S. out for devaluing the dollar and thus European currencies. So, Nixon “Temporarily” suspended the convertibility of dollars to gold. Now, here we all are like Wile E. Coyote having run off of the golden cliff clutching our dollars in our arms and 54 years later we still haven’t looked down to see the truth.
**Dollars Aren’t Backed by Anything**
This is why no country in the world today has a money standard. Seemingly they all forgot the number one rule of issuing currency, it must be backed by something. Now, you may hear dollar proponents say “The U.S. dollar is backed by the full faith and credit of the United States!” Another way of saying that is, “We said it is worth something, so it is!” This fiat (by decree) mentality creates a plethora of perverse incentives. The ever growing supply disallows users of the Dollar to save without inccuring the penalties of inflation.
**Just a Few Examples of How You're Being Crushed**
Because your dollar loses value:
- It pushes people to spend them on assets that seem to appreciate (as the dollar debases) but are truly staying stagnant.
- It pushes people to gamble on securities hoping the perceived value is enough to beat the inflationary curve.
- It pushes people away from saving for their future and the future of their families.
- It creates insane credit incentives so that people borrow way more than they can afford today knowing that dollars will be cheaper in the future. (Effectively a short position)
- It pushes people to spend less and less time making and maintaining their families as it becomes more expensive to keep a similar lifestyle to which it was founded.
These are just a few of the terrible consequences of not knowing that trading a currency with no monetary backing has on a society. Most may blame this soley on the ability to print currency by a central bank but, that is not the only factor. If the fed printed dollars against gold, people would simply take the best rate they could get and remonetize themselves with the gold. But because there is no monetary escape hatch guaranteed by the issuance of dollars, I.E. no one has to take your dollars in exchange for their Bitcoin or gold, you are left at the mercy of the market.
**One Day, People Will Stop Accepting Your Dollars**
Those lementing the high price of Bitcoin might want to thank their lucky stars that Bitcoin still has a rational number next to the "BTC 1=$?" sign. One day you will have to exchange something of actual value to the spender (no longer a seller). Your product, good or service, will be the only thing that anyone might be willing to part with their Bitcoin over. That is what makes a money, the most salable non-consumable good, whose only funtion is to back a financial structure that facilitates trade.
**Bitcoin is Capital**
Capital is a broad term that can describe anything that confers value or benefit to its owners, such as a factory and its machinery, or the financial assets of a business or an individual. Bitcoin being the latter creates the financial structures from which you build upon. You use capital to hold, transfer, and grow value. You do not do this with cash. Cash is a depreciating asset when you don't use it to gain goods or services for yourself or your business. This misconception around the equivalance between cash and money (financial capital) is what tricks people into believing Dollars are money. And what's worse is that even some of our greatest heroes have done this.
**Slay Your Heroes, Within Reason**
Unfortunately due to a mixing of verbiage that have **very distinct** differences, the title: "Bitcoin: A Peer-to-Peer Electronic Cash System" is technically inaccurate. Bitcoin doesn't fit the definition of **cash**, which is a liquid asset that can be easily converted into its equivalent value. In short, Satoshi misspoke. In reality, owning Bitcoin UTXOs (with private keys) means you already possess the asset, not just a claim to it. When you spend Bitcoin, the recipient receives the actual asset, not a promise of it. When you receive Bitcoin, you have final settlement on that transaction. Fundamentally Bitcoin is not cash, electronic or otherwise.
# Bitcoin is Money.
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-05 01:26:18
# How does the collaborative nature of open design in bitcoin influence innovation and product development in the ecosystem?
originally posted at https://stacker.news/items/876187
-
![](/static/nostr-icon-purple-64x64.png)
@ df478568:2a951e67
2025-02-05 01:02:39
![OPENdime pin](https://gitea.marc26z.com/marc/Marc26z/raw/branch/main/BTCPinsPics/Screenshot_20250204_124708_Gallery.jpg)
About 150,000 blocks ago, I bought burgers for my family with sats at NextBurger in Newport, California. The Orange County Bitcoin Meetup found a hamburger stand that wanted to accept Bitcoin. This attracted Bitcoiners from all over Southern California. People brought their families. Some sat stackers sold wares outside as if it were a Farmer's Market. A couple kids sold some hats. One dude sold pins. I bought one off him. It resembled the Opendime I use as a keychain. He wore a 21M/infinity hat. We talked about Knut Svanholm books. He asked me, "What do you do for bitcoin?"
"I write a blog," I said. I must have written three articles about Bitcoin back then. I set up a BTCpayServer with LunaNode. My real idea was to write for sats, but I spent more sats on Lunanode than I made. I needed something to sell.
I had a few shitty ideas but no real business plan. I told Pins about one of these shitty ideas.
"I'm thinking about selling BIP39 raffle tickets, but they're a pain in the ass to cut." See what I mean, bad ideas.
Pins didn't say it was a bad idea though. I assure you, it was, but Pins gave this advice.
”Maybe you can use a 3D Printer."
I never did it, but I was impressed by how willing he was to help me. That's common in bitcoin. Bitcoiners are incentivized to help other Bitcoiners. The more people that accept Bitcoin at their stores, the bigger the demand for Bitcoin. The bigger the demand, the more the
![backside of pins](https://gitea.marc26z.com/marc/Marc26z/raw/branch/main/BTCPinsPics/20250118_164136.jpg)
## Bitcoin Is For Spending
I participate in the circular economy because I consider using Bitcoin as money to be more advantageous for my *savings strategy*. When you earn sats, spend sats, and save sats, you break free from the chains of fiat debasement. Dollars are designed to go down in purchasing power to manipulate the public into spending more. That's why most people have more than one TV, but can't afford a $400 emergency. I spend Bitcoin because it forces me to be frugal. Fiat is designed to spend as quickly as possible since it will buy less groceries tomorrow than it will today.
Bitcoin is designed to buy more groceries tomorrow than it will today. When you expect $30 worth of Open AI services will likely be worth $433 in 21 years(if we assume Saylor is correct) you evaluate everything you buy with an orange colored lens. Your shopping habits change. A month of Chat GPT premium mightr be a month's worth of groceries in the future. I no longer buy Nike's because they coat 80k-120k sats, but I expect them to look like shredded cheese in six months. I would rather pay 100k sats for a nice pair of hiking shoes. I expect they will last me a few years.
Knowing this, you might ask, why would you spend Sats on a stupid pin? I've had my open dime pin for almost 4 years now and I expect to have it for years to come. It must have cost me about 100k sats. I don't expect it to be worth that much in the future, but you never know. Sometimes, I watch The Antique Road Show on PBS. Some pins, made by famous artists, are worth thousands of dollars. There is a chance collectibles like this will become more valuable, but I'm skeptical of this. I bought this PIN because it sparks joy, as Marie Kondo says.
This is not investment advice. Your Sats will almost certainly be worth more than your pins in the future, but if you buy a PIN from Salvador Dali, nobody stacks Sats. If you buy a PIN from BTCPins, a hardcore bitccoiner stack sats, which means less sats on the market will be availavle for 8 billion people when you buy a pin. Maybe pins will buy another hat from a bitccoiner, but that just means another bitccoiner stacks Sats. Notice how these Sats never make it back to the exchange because Bitcoiners know their stack will be more valuable in the future than they are today. So when you spend Sats, you only spend Sats on the things you find most valuable.
## Pins I Bought Online
![PinsOnline](http://gitea.marc26z.com/marc/Marc26z/raw/branch/main/BTCPinsPics/20250114_181401%20%281%29.jpg)
Although I consider these Pins art. I don't view art as an investment. I don't expect to ever sell one of these Pins for $110,000 like that banana duct-taped to a canvas before the artist got the munchies. **I don't want dollars anyway**. That's like a whole coin for a banana. I wouldn't spend 100,000,000 sats for one of these Pins, but BTCPins are not so pretentiously priced.
I recently bought some pins I've been salivating over for months. I need a better way of displaying them, but here are the pins I recently bought.
### An Awesome Affiliate Link
![BTCPins Nostr Post](https://gitea.marc26z.com/marc/Marc26z/raw/commit/9bb67c5e546f3993db3089cf3403d752196b9294/BTCPinsPics/Screenshot_20250203_112718_Primal.jpg)
BTCPins has a [unique affiliate link](https://btcpins.com/affiliate-signup/). Provide your lightning address and it will generate an affiliate link for you. These things have been around since the 90s, but what makes this particular link notable is how commissions are paid: In sats on the Bitcoin lightning network.
#### How BTCPins Affiliates Work
![affiliate](https://gitea.marc26z.com/marc/Marc26z/raw/commit/9bb67c5e546f3993db3089cf3403d752196b9294/BTCPinsPics/Screenshot_20250119_054137_Kiwi%20Browser.jpg)
- Navigate to https://btcpins.com/affiliates/
- Enter your lightning address.
- Generate your link
- Share with the world.
So buy a pin or two from BTCPins today using my affiliate link:
Encrypted Link: https://btcpins.com/?aff=ex1GhhNeeU9-PQ1-ZVEkarU9bSnsNyq98Jy_lEUBLmsrWsCqa69PYohMWcCOGK9tK1rAqmuvT2KITFnAjhivbfOajnP3D8A8O09Hi-OY4K8
npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
[802,338](https://mempool.marc26z.com/block/00000000000000000001552286d359e5064ee9f97406e1d1ba2f790df43c613a)
[Subscribe on Substack](https://marc26z.substack.com)
-
![](/static/nostr-icon-purple-64x64.png)
@ 16d11430:61640947
2025-02-05 00:52:05
Introduction: Colonization as a Multi-Generational Trauma
Colonization was not only a political and economic endeavor but also a deeply psychological one. Through forced labor, cultural erasure, and systematic oppression, colonizers imposed a set of economic and social behaviors that favored their interests. Though most colonies gained independence in the mid-20th century, the trauma of colonization remains embedded in their financial and governance structures.
Modern research in epigenetics suggests that trauma can alter gene expression and be passed down through generations (Yehuda & Lehrner, 2018). In a socio-economic context, the colonial mindset—marked by dependency, economic passivity, and a lack of financial sovereignty—persists within many post-colonial nations. One of the most insidious methods by which this trauma is maintained is through fiat currency and debt-based financial systems, which perpetuate economic dependency on former colonizers.
---
1. The Psychological Impact of Colonial Trauma and Economic Passivity
Historical trauma theory suggests that populations subjected to prolonged oppression develop collective learned helplessness—a psychological state in which they stop attempting to resist their conditions because they have been conditioned to believe resistance is futile (Sotero, 2006).
This manifests in post-colonial societies in several ways:
1. Economic Dependency: A tendency to rely on foreign aid, multinational corporations, and foreign direct investment (FDI) rather than fostering self-sustaining industries.
2. Risk Aversion in Economic Policy: Research suggests that traumatic experiences affect the brain’s ability to take financial risks (Shields et al., 2016), leading to post-colonial states preferring IMF/World Bank solutions rather than exploring independent monetary policies.
3. Political Elite Compliance: Many former colonies' elites were educated in Western institutions, perpetuating colonial economic structures that maintain wealth extraction.
---
2. Fiat Currency as a Tool of Economic Control
Fiat currency—money that has no intrinsic value but is backed by government decree—has been one of the most effective tools for maintaining economic dominance over former colonies.
A. The CFA Franc: A Colonial Currency in 2024
One of the most blatant examples of fiat currency maintaining colonial control is the CFA franc, used by 14 African countries, but ultimately controlled by France.
These countries must keep 50% of their foreign reserves in the French Treasury.
France dictates the monetary policies of these countries, limiting their financial autonomy.
Import dependency: Because the CFA franc is overvalued, it makes local goods more expensive while making European imports cheaper, reinforcing dependency on former colonizers.
B. The Role of the IMF and World Bank in Debt Colonialism
Post-colonial nations, lacking industrial infrastructures due to resource extraction under colonial rule, often turn to IMF and World Bank loans for development. However, these loans come with conditions that ensure neo-colonial economic control:
Structural Adjustment Programs (SAPs): Force nations to privatize industries, cut social spending, and open markets to foreign corporations—benefiting Western investors.
Perpetual Debt: Since loans are taken in foreign fiat currencies (USD, Euro), debt is rarely reduced, creating a cycle of endless repayment that prevents real economic independence.
---
3. How Colonial Trauma Conditions Profitable Behaviors for Former Colonizers
Even outside of direct financial mechanisms, the trauma of colonization has conditioned post-colonial societies to adopt behaviors that benefit the former colonizers.
A. Elites as Gatekeepers of Colonial Structures
In many post-colonial nations, political and economic elites maintain colonial financial policies because they personally benefit from them. Studies (Acemoglu & Robinson, 2012) show that economic elites in post-colonial states are more likely to align with global financial institutions rather than advocate for economic self-determination.
B. Consumer Culture as a Neo-Colonial Tool
Western consumerism remains deeply ingrained in many post-colonial societies. This is a legacy of cultural imperialism, where local industries were suppressed in favor of Western goods.
The majority of African, South Asian, and Latin American countries continue to import Western luxury goods, technology, and services instead of developing their own.
As a result, much of the wealth generated in these countries flows back to Western corporations, mirroring the colonial economic extraction model.
---
Conclusion: Fiat Currency as the Modern Brand of Colonization
The economic and psychological trauma of colonization ensures that former colonies remain profitable markets and debt-ridden nations under the control of their colonizers. Fiat currency, international debt structures, and cultural hegemony serve as the modern pillars of economic colonialism, reinforcing behaviors that favor Western economic dominance.
Key Takeaways:
1. Historical trauma conditions former colonies into economic dependency.
2. Fiat currency (such as the CFA franc) remains a tool of colonial control.
3. The IMF and World Bank perpetuate financial dependency through debt cycles.
4. Consumer culture ensures wealth extraction from former colonies to Western economies.
Unless these structures are dismantled, economic sovereignty for formerly colonized nations remains an illusion. Breaking free from the financial colonial matrix requires monetary independence, de-dollarization strategies, and local industrialization, rather than continued reliance on Western financial systems.
---
References:
Yehuda, R., & Lehrner, A. (2018). Intergenerational transmission of trauma effects: Putative role of epigenetic mechanisms. World Psychiatry, 17(3), 243-257.
Sotero, M. M. (2006). A conceptual model of historical trauma: Implications for public health practice and research. Journal of Health Disparities Research and Practice, 1(1), 93-108.
Shields, G. S., Sazma, M. A., & Yonelinas, A. P. (2016). The effects of acute stress on economic decision-making. Psychoneuroendocrinology, 67, 226-234.
Acemoglu, D., & Robinson, J. (2012). Why Nations Fail: The Origins of Power, Prosperity, and Poverty. Crown Business.
Sylla, N. S. (2019). The CFA Franc: The Shackles of Monetary Dependence. Pluto Press.
Hudson, M. (2021). Super Imperialism: The Economic Strategy of American Empire. Pluto Press.
-
![](/static/nostr-icon-purple-64x64.png)
@ 57d1a264:69f1fee1
2025-02-05 00:25:20
# How does open source development contribute to bitcoin's security, reliability, and evolution as a network?
originally posted at https://stacker.news/items/876130
-
![](/static/nostr-icon-purple-64x64.png)
@ 1cb14ab3:95d52462
2025-02-05 00:14:34
Welcome to the first installment of my ‘Nostr Spotlight’, a series where I explore various Nostr clients (which I will refer to as apps for simplicity sake), review their features, and share tips on how to use them effectively.
For the first installment, I’m diving into [npub.pro](https://npub.pro/), an incredible service that lets anyone on Nostr create a fully functional website using their already-published notes.
---
### What is npub.pro?
![](https://image.nostr.build/e170ef4f8111e41805cb554e01891b1f8b6fdc227fdefc0ee8528ef26407537f.jpg)
npub.pro is a simple—yet powerful— tool that takes your Nostr content and turns it into a website instantly. By filtering through hashtags or keywords, or hand-selecting which notes to feature, you can curate what appears on your site.
This allows for highly customizable and dynamic websites that anyone on Nostr can deploy. Whether you’re a blogger, photographer, journalist, artist—or just want to organize your notes into a cleanly setup website—this service opens up endless possibilities for showcasing your notes.
---
### Who Should Use npub.pro?
This service is ideal for:
✅ Writers and bloggers who want a frictionless way to publish content.
✅ Artists and photographers looking to showcase their work.
✅ Journalists and researchers who need an easy way to organize articles.
✅ Anyone who wants a personal website without dealing with hosting or technical setups.
---
### Why I Love npub.pro
I’ve personally deployed several websites using npub.pro, each serving a different purpose:
[HesArt](https://hesart.npub.pro) – My personal art portfolio.
https://image.nostr.build/6a7030a24a9c5d4a9e3a0854020e08740241e870e46083b6b326ca36d5dc681f.png
[Hes](https://hes.npub.pro/) – My main long-form writing site, featuring artist statements, travel guides, photo series, tech reviews, and economic essays.
https://image.nostr.build/7d088829dd2ec0f9702430f115e29d368da85a78227cf6524f8773216f6a102e.png
[HesCooks](https://hescooks.npub.pro/) – A collection of curated recipes.
https://image.nostr.build/840ffdc74ac618ddf9534d4ab77a09d02aee45eee8c332a6733bcea5b80a3d2a.png
[HesCreates](https://hescreates.npub.pro/) – A categorized and searchable archive of my notes.
https://image.nostr.build/4663c91f3c77ad59f0f291813c672395f8cc20c6806ca2afffb3e3d65b6c6f37.png
The ability to filter my Nostr content and instantly publish it as a website has made organizing my notes seamless and efficient. The opportunities are endless and I have several ideas for other websites I plan on deploying.
---
### How to Get Started
1.Visit [npub.pro](https://npub.pro/).
2.Enter your Nostr private key (nsec) using an extension of bunker.
3.Choose your filters (hashtags, keywords, etc.) to curate what appears and select a pre-made theme.
4.Publish instantly – no extra setup needed!
It’s that simple.
---
### Final Verdict:
5/5 Stars ⭐⭐⭐⭐⭐
npub.pro is an outstanding tool that makes publishing on the web effortless for Nostr users. It’s intuitive, versatile, and packed with potential use cases. Whether you need a blog, portfolio, or curated archive, this app delivers.
Highly recommended!
---
#### More from Hes
[Full Portfolio](https://hesart.npub.pro)
[Online Store](https://plebeian.market/community/hes@nostrplebs.com/hesmart-ym3fcufdfz)
[Artist Statements](https://hes.npub.pro/tag/art/)
[Travel Guides](https://hes.npub.pro/tag/travel/)
[Photography](https://hes.npub.pro/tag/photography)
[Writings](https://hes.npub.pro/tag/money)
---
*Note: This spotlight is not sponsored. I thoroughly enjoy the service and have received outstanding customer service from the team at npub.pro!*
**Stay tuned for more Nostr App Spotlights as I explore the best apps in the ecosystem!**
-
![](/static/nostr-icon-purple-64x64.png)
@ 2cde0e02:180a96b9
2025-02-04 23:05:57
![kaleidoscope girl 7](https://m.stacker.news/76164)
Moving to pencil. Portraits too difficult currently in ink immediately.
originally posted at https://stacker.news/items/876045
-
![](/static/nostr-icon-purple-64x64.png)
@ 1cb14ab3:95d52462
2025-02-04 22:17:27
## Chef's notes
Credit to The Yummy Life. Go show them love below:
https://www.theyummylife.com/Pickled_Jalapeno_Peppers
## Details
- ⏲️ Prep time: 1 hour
- 🍳 Cook time: 20 mins
- 🍽️ Servings: 4 mason jars (pint)
## Ingredients
- 2 lbs. jalapenos
- 2-1/4 cups vinegar (white distilled, apple cider, or a combination of the two)
- 2-1/4 cups water
- 2 tablespoons sugar or honey (optional)
- ADD TO EACH PINT JAR
- 1/2 teaspoon kosher salt
- 1/2 teaspoon whole black pepper corns
- 1/4 teaspoon whole cumin seeds
- 1/4 teaspoon whole coriander seeds
- 1 bay leaf
- 1 whole garlic clove, peeled
- 1/8 teaspoon Pickle Crisp granules (optional)
## Directions
1. Slice 1/2 pound jalapenos into 1/8" rounds, discarding stem ends.
2. Prepare the jars: Wash 4 pint jars and lids in hot sudsy water, then keep them warm.
3. Prepare the pickling liquid: Combine 1/2 cup plus 1 tablespoon vinegar, 1/2 cup plus 1 tablespoon water, and 1-1/2 teaspoons sugar or honey (optional) in a 2 quart pan, heating until just before boiling.
4. Fill the jars: Add jalapeno slices to each jar, pressing them down and packing them in compactly, then pour the hot pickling liquid into each jar, leaving 1/2" head space.
5. Process and store: Allow jars to cool to room temperature, then store them in the refrigerator or can them using standard USDA water process canning procedures, following storage guidelines for refrigerator or canned pickled peppers.
-
![](/static/nostr-icon-purple-64x64.png)
@ 1cb14ab3:95d52462
2025-02-04 21:42:24
## Chef's notes
Classic beef n' broccoli. Easy to make and dank to eat.
## Details
- ⏲️ Prep time: 20 mins
- 🍳 Cook time: 10 mins.
## Ingredients
- 1 lb top sirloin steak, thinly sliced
- ¼ cup low sodium soy sauce
- 2 teaspoons cornstarch
- 1 tablespoon dark brown sugar
- 2 tablespoons fresh ginger, minced
- 1 tablespoon oil
- 1 head broccoli, cut into 1-inch (2 ½ cm) florets
- ½ cup water
- 3 cloves garlic, minced
- ¼ teaspoon red pepper flakes, optional
- 1 teaspoon toasted sesame oil
## Directions
1. In a medium bowl, mix together the sirloin steak, soy sauce, cornstarch, brown sugar, and ginger until the meat is evenly covered in the marinade. Set aside to marinate for 20 minutes.
2. Heat the oil in a large skillet or wok over medium-high heat. Dump in the meat and marinade and sear each side until golden brown. Transfer the meat to a clean bowl and set aside.
3. Place the broccoli into the hot skillet and sauté until the broccoli has just started to brown, about 1 minute. Pour the water into the skillet and immediately cover with a lid. Let it steam for 2 minutes, until the broccoli has softened.
4. Remove the lid and toss in the garlic, red pepper flakes, and sesame oil. Sauté until the garlic becomes fragrant, about 30 seconds.
5. Add the steak back into the pan and stir to combine. Remove from heat and serve on a bed of brown rice.
-
![](/static/nostr-icon-purple-64x64.png)
@ 21ffd29c:518a8ff5
2025-02-04 21:12:15
- **What Are Homestead Chickens?**
Homestead chickens are domesticated fowl kept by homeowners to provide eggs and companionship. They play a vital role in the homestead ecosystem.
**Why Water is Essential in Cold Weather**
- **Hydration Basics**:
Chickens don't drink much water naturally but need it for hydration, especially during cold weather when metabolic rates increase.
- **Environmental Factors**:
Cold weather can lead to ice buildup on water sources. Chickens benefit from having access to fresh water year-round.
**Maintaining Accessible Water Sources**
- **Shallow Troughs**:
Use shallow troughs instead of deep containers to minimize ice formation and ensure constant water supply.
- **Automatic Feeders**:
Consider installing automatic feeders for convenience, especially in unpredictable weather conditions.
- **Multiple Water Sources**:
Provide multiple water sources to prevent competition and ensure all chickens have access.
**Preventing Ice Buildup**
- **Floating Shallow Troughs**:
Opt for troughs that sit above the ground to avoid ice buildup. Ensure they're placed where they can't freeze completely.
- **Regular Checks**:
Inspect water sources regularly to remove ice and debris, maintaining accessibility for chickens.
**Best Practices for Watering Chickens**
- **Waterers Designed for Cold Weather**:
Use waterers made of stainless steel or plastic that can withstand cold temperatures.
- **Seasonal Adjustments**:
During extreme cold spells, supplement with a small amount of fresh water to aid in drinking.
**Conclusion**
- **Key Takeaways**:
Providing proper water is crucial for the health and well-being of homestead chickens during cold weather. Maintaining accessible, shallow water sources prevents issues like ice buildup and ensures hydration.
**Final Thoughts**
- **Sustainability Considerations**:
While chickens don't drink much, ensuring they have water supports their overall health and sustainability efforts.
- **Environmental Impact**:
Thoughtful water management can reduce water usage, promoting eco-friendly practices on the homestead.
-
![](/static/nostr-icon-purple-64x64.png)
@ b035c1dc:7a27ddbd
2025-02-04 20:18:20
Sockz
-
![](/static/nostr-icon-purple-64x64.png)
@ 1cb14ab3:95d52462
2025-02-04 18:40:56
### What is it?
I stumbled upon the **Elgato Stream Deck** while aimlessly browsing the web, and I was instantly intrigued. But one question kept nagging me—how would I use this, and why do I even need it?
**I don’t stream**.
At first glance, it seemed like just another gadget to clutter my already cramped desk in my tiny Shanghai apartment. But curiosity got the best of me. After some research, **I decided to give it a shot and see what all the hype was about.**
And wow—was that hype justified.
This isn’t a deep-dive review covering every feature (there are plenty of those online). Instead, I want to share **some of the workflows I’ve set up** and hopefully get you thinking about the endless possibilities you could create with a Stream Deck.
**If you’re someone who loves making computer tasks easier** but struggles to remember keyboard shortcuts beyond Ctrl + V, this little device might just change the way you work.
---
#### Launching Apps and Websites
![](https://image.nostr.build/6dde2ec22cd0f03a733474f35c28ab597713ba61ef2aabf01fae98ad98223e91.jpg)
I won’t lie—**my favorite use for the Stream Deck is the sheer convenience of pressing a button and instantly launching what I need**.
Want to watch YouTube? Button.
Open Photoshop? Button.
Play a game? Button.
Check Bitcoin prices? Those are always on the display.
![](https://image.nostr.build/9819876d3fda08b7b3c1ca71f67fedfdbd236bc9c0ffe5940becd0ead528f8eb.jpg)
![](https://image.nostr.build/336da5792598da3c9c5cbbf0f4dbed9f86db800a323462881e05073d9d711e95.jpg)
Sure, it’s a small thing, but the speed and ease of launching apps or navigating to websites make a surprising difference. **What used to be a few clicks and keystrokes is now a single tap**.
After using the Stream Deck for a while, my laptop feels... clunky. I’ve genuinely noticed **an increase in my productivity** and focus.
---
#### Custom Application Profiles
One of the most powerful features of the Stream Deck is its ability to switch profiles based on the application you’re using.
This means that **every time you switch programs, the buttons automatically adjust** to show relevant shortcuts and commands. It’s a game-changer for software with hundreds of keyboard shortcuts, making multitasking seamless.
I’ll admit—setting up custom profiles can be a bit time-consuming. The good news? You don’t have to start from scratch. **There are tons of downloadable third-party profiles** for popular programs like Illustrator, Photoshop, Final Cut Pro, DaVinci Resolve, Microsoft Office, and Ableton.
![](https://image.nostr.build/0a0f9469bd3e2598d1dad35fa5f1e83e4010df8fb0e690941e281961dd1ad91d.jpg)
If your favorite app doesn’t have a pre-made profile, you can always build your own. It takes some effort, but once it's set up, the workflow improvements are worth it.
---
#### Music and Audio Control
![](https://image.nostr.build/0ed87e96e60c48a3be341200428e5e1370b6fc7ab7725cd5994a3c602da7a06c.jpg)
I use an audio interface for lossless wired playback and external microphone support. The Stream Deck makes **switching between my computer’s default mic and my studio mic effortless**—no more digging through system preferences.
Even if you don’t use external audio gear, the Stream Deck still has plenty of value for music lovers.
![](https://image.nostr.build/3884c7997a3181ccad67b9cc1a19bf47eb07f79cb2e1898a526dfb13f82e7a8e.jpg)
It integrates with Apple Music and Spotify, letting you control playback, skip tracks, like songs, and add them to playlists—all without switching apps. **Elgato is constantly adding new third-party integrations**, which gives the device even more longevity.
---
#### Lighting and Smart Home Control
![](https://image.nostr.build/dff63cc9fd0f00683cbd5435a86a6ccb7e656caad9e1fde9d0bbdb3fb3358845.jpg)
If you have smart home devices, the Stream Deck can act as a command center. It integrates with platforms like Philips Hue, LIFX, Nanoleaf, and IFTTT, letting you **control lights, scenes, and colors with a single tap**.
Want to set the mood for gaming, reading, or watching a movie? Done.
You can even use it to trigger other smart devices, like cameras, thermostats, or speakers, using IFTTT applets. The possibilities here are endless.
---
#### Finder and Document Shortcuts
![](https://image.nostr.build/84f15d18993134c97c37b57e6947d17703a6a4f348b6e3e40e494a5cc403452e.jpg)
One of the most unexpectedly useful features for me has been **quick access to folders and files**.
I’ve set up buttons for my most frequently used folders—Downloads, Desktop, and Documents—so I can access them instantly. I’ve also created **buttons for specific files like spreadsheets and PDFs,** so I don’t have to dig through folders to find them.
It sounds simple, but when juggling multiple projects, these little time-savers add up fast.
---
### Final Thoughts
The Elgato Stream Deck is a surprisingly versatile tool that enhances **productivity, creativity, and entertainment**. Whether you’re launching apps, controlling music, managing smart devices, or creating complex workflows, it streamlines everyday tasks in a way that’s hard to go back from.
At first, I thought it was just for streamers. Now? **I can’t imagine working without it**.
I hope this post gives you some ideas on how to make the most of a Stream Deck. If you have any questions or thoughts, drop a comment below.
Thanks for reading!
---
> Feel free to support me by grabbing one through my affiliate link below:
[Purchase a Stream Deck](https://amzn.to/3WLGiLE)
---
#### More from Hes
[Full Portfolio](https://hesart.npub.pro)
[Online Store](https://plebeian.market/community/hes@nostrplebs.com/hesmart-ym3fcufdfz)
[Artist Statements](https://hes.npub.pro/tag/art/)
[Travel Guides](https://hes.npub.pro/tag/travel/)
[Photography](https://hes.npub.pro/tag/photography)
[Writings](https://hes.npub.pro/tag/money)
---
*Originally published in 2022. All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.*
-
![](/static/nostr-icon-purple-64x64.png)
@ 0c503f08:4aed05c7
2025-02-04 18:15:32
Sometimes I think I'm a bit nihilistic, it can make me sad at times, but at times it also gives me ultimate freedom. What gets you up in the morning?
We’re stardust that somehow became self-aware. The odds of existing are astronomically small—every ancestor in your lineage survived long enough to pass on life, through ice ages, disasters, and chaos. You’re the universe experiencing itself.
originally posted at https://stacker.news/items/875807
-
![](/static/nostr-icon-purple-64x64.png)
@ 8d34bd24:414be32b
2025-02-04 17:55:30
So many of our problems are due to our point of view. The closer our point of view gets to God, the more peace and joy we will feel.
Too often we look at God as the big, bad killjoy. We resent when He tells us all the “fun” things we aren’t supposed to do and when He tells us to do difficult things like submit to God, submit to husbands, submit to authorities. Too many people focus on the “do nots,” and don’t like the idea of anyone telling them what to do. They then do their own thing, which they think will make them happy. Unfortunately, this leads to the opposite.
God is our Creator. He created us for a purpose within the rest of His creation.
> For we are His workmanship, created in Christ Jesus for good works, which God prepared beforehand so that we would walk in them. (Ephesians 2:10)
When we are doing His will we will find peace and joy. When we fight Him on what we should and should not be doing, we feel frustration, depression, and even despair. Our constant seeking of things to make us happy is actually our innate desire for God and to fulfill His will. Unfortunately, we frequently don’t see the truth and avoid the one thing that will give us peace because it is hard, inconvenient, and doesn’t lead to what we think we want right now.
God wants what is best for us. He also thinks eternally. He doesn’t think in the here and now, like we do. Just as a parent makes decisions for his/her child based on knowledge of what will be better for them in the long term (saving vs spending, healthy food vs junk food, etc.), God makes decisions for us based on what will best prepare us for eternity with Him. Frequently that looks much different than what we think we want. Frequently that even includes hardship and pain because we are much more likely to grow in faith, strength, and holiness during hardship than we do during comfort. We need to understand that God knows best and that He never makes a mistake.
> Trust in the Lord with all your heart\
> And do not lean on your own understanding.\
> In all your ways acknowledge Him,\
> And He will make your paths straight.\
> Do not be wise in your own eyes;\
> Fear the Lord and turn away from evil.\
> It will be healing to your body\
> And refreshment to your bones. (Proverbs 3:5-8)
Nothing happens on earth without God allowing it. Just as Satan had to ask permission to persecute Job, in the same way nobody can cause believers harm without God allowing it for His purpose, which is usually related to helping them to put their full trust in Him.
> Remember the former things long past,\
> For I am God, and there is no other;\
> I am God, and there is no one like Me,\
> Declaring the end from the beginning,\
> And from ancient times things which have not been done,\
> Saying, ‘My purpose will be established,\
> And I will accomplish all My good pleasure’; (Isaiah 46:9-10)
So often I focus on how awesome, powerful, and holy our God is. He is also the most tender, loving, caring, personal father God. Read Psalm 139. The God of the Bible is not a distant clock maker who set the world in motion and let it go about without His care. He is personally involved in everything that happens and in the life of every person on earth, but especially in the life of those who trust in Him.
> **O Lord, You have searched me and known me.\
> You know when I sit down and when I rise up;\
> You understand my thought from afar.**\
> You scrutinize my path and my lying down,\
****And are intimately acquainted with all my ways.\
> Even before there is a word on my tongue,\
> Behold, O Lord, You know it all.**\
> You have enclosed me behind and before,\
> And laid Your hand upon me.\
****Such knowledge is too wonderful for me;\
> It is too high, I cannot attain to it.**\
> Where can I go from Your Spirit?\
> Or where can I flee from Your presence?\
> If I ascend to heaven, You are there;\
> If I make my bed in Sheol, behold, You are there.\
> If I take the wings of the dawn,\
> If I dwell in the remotest part of the sea,\
****Even there Your hand will lead me**,\
> And Your right hand will lay hold of me.\
> If I say, “Surely the darkness will overwhelm me,\
> And the light around me will be night,”\
> Even the darkness is not dark to You,\
> And the night is as bright as the day.\
> Darkness and light are alike to You.\
> For You formed my inward parts;\
> You wove me in my mother’s womb.\
> I will give thanks to You, for I am fearfully and wonderfully made;\
> Wonderful are Your works,\
> And my soul knows it very well.\
> My frame was not hidden from You,\
> When I was made in secret,\
> And skillfully wrought in the depths of the earth;\
****Your eyes have seen my unformed substance;\
> And in Your book were all written\
> The days that were ordained for me,\
> When as yet there was not one of them.**\
> How precious also are Your thoughts to me, O God!\
> How vast is the sum of them!\
> If I should count them, they would outnumber the sand.\
> When I awake, I am still with You.\
> O that You would slay the wicked, O God;\
> Depart from me, therefore, men of bloodshed.\
> For they speak against You wickedly,\
> And Your enemies take Your name in vain.\
> Do I not hate those who hate You, O Lord?\
> And do I not loathe those who rise up against You?\
> I hate them with the utmost hatred;|\
> They have become my enemies.\
****Search me, O God, and know my heart;\
> Try me and know my anxious thoughts;\
> And see if there be any hurtful way in me,\
> And lead me in the everlasting way**. (Psalm 139) {emphasis mine}
What is one of the greatest desires of our hearts? Isn’t it to be truly known and loved for who we are?
> O Lord, You have searched me and known me.\
> You know when I sit down and when I rise up;\
> You understand my thought from afar. (Psalm 139:1-2)
How amazing is it that the Creator of the universe knows you personally and cares for you among all of creation?
> Even before there is a word on my tongue,\
> Behold, O Lord, You know it all. (Psalm 139:4)
He knows our every action, our every thought, and our every feeling before we do.
> Such knowledge is too wonderful for me;\
> It is too high, I cannot attain to it. (Psalm 139:6)
We cannot fully understand how much our Creator cares for us and how carefully God guides us in our every path. We usually can’t see what is for our best. We usually can’t see what great work God is working in us. We usually can’t comprehend how great is His love, knowledge, and plan.
> Even there Your hand will lead me,\
> And Your right hand will lay hold of me. (Psalm 139:10)
It doesn’t matter how difficult a situation we have gotten into. It doesn’t matter how powerful our adversaries are. It doesn’t matter how weak we are. God is always there guiding us and protecting us. Just as God allowed Job to go through difficulty as part of God’s plan for Job and for us, He did not allow Job to be killed. He was guided through the worst of situations and led to ultimate blessing.
> Your eyes have seen my unformed substance;\
> And in Your book were all written\
> The days that were ordained for me,\
> When as yet there was not one of them. (Psalm 139:16)
God knew us and had a plan for us before He even created the universe. He knew every day we would live before we were conceived. We can’t surprise Him and He will be guiding us every day of our lives, especially those who have trusted Him as savior.
> How precious also are Your thoughts to me, O God!\
> How vast is the sum of them! (Psalm 139:17)
We are precious to God and He should be precious to us because of all He has done for us.
> Search me, O God, and know my heart;\
> Try me and know my anxious thoughts;\
> And see if there be any hurtful way in me,\
> And lead me in the everlasting way. (Psalm 139:23-24)
This should be our prayer. We should ask for Him to bring are faults to our minds so we can repent and we should ask for Him to lead us in His “*everlasting way*.” We should admit that our Father God knows best and submit to His will. Everything goes so much smoother when we aren’t fighting our God. Even when He leads us through hardship, being in His will makes all of the difference in the world.
I pray that you will put your trust in our loving Creator and that you will submit to His will. I pray that you will understand that His ways are better even when you don’t understand the why. I pray that you will humbly submit to His will and be used to further the Kingdom for His glory and your blessing.
Trust Jesus.
FYI, Psalm 139 is also one of the best passages on why all believers should oppose abortion. In God’s universe there are no accidents and there are no unwanted babies. Every person ever conceived had a purpose in God’s plan. Every person ever conceived is valuable and made in the image of God. God values all human life and so should we.
-
![](/static/nostr-icon-purple-64x64.png)
@ aade47fd:281e8e4f
2025-02-04 17:27:47
Сюрприз! Оказалось, что мне потребовалось две недели для того, чтобы сделать вторую запись в свой ЕЖЕДНЕВНИК. Раньше после такого оглушительного провала бросил бы это дело, но задачей дневника было формирование дисциплины, а не сам дневник. Нет ничего удивительного в том, что дисциплины на ежедневные записи не хватило сразу: буду стараться писать как можно чаще пока не выйду устойчиво на ежедневные публикации.
---
### Я на Сахалине
Вчера, третьего февраля, мы с отцом прилетели на Сахалин. Планирую провести здесь около трех-четырех месяцев, на пару летних месяцев вернусь в Питере (ве-ло-си-пед), а в августе снова на остров. Здесь очень много работы, а отвлекаться практически не на что. Именно то, что мне сейчас нужно.
---
### Личность
Есть я. Есть не я. Граница между мной и не мной — моя личность. Это структура, через которую внешний мир возействует на меня, а я на него. Над личностью можно и нужно работать. В конечном счете, я верю, что больше ни на что непосредственным образом мы не влияем. Мир это поток случайных событий и состояний. Уверен, что в моменте мы ничего не решаем — все реакции готовы заранее. Их подготовка — наша ответственность. В этом и заключается формирование личности. Можно сказать, что сформированная личность это стена, и чем она выше и прочнее, тем устойчивее твое бытие. С жадностью тащи камни для этой стены: любое решение и дело должно первостепенной целью ставить собственное развитие, а только потом уже внешний результат. Слабая личность пропускает в тебя все проклятия окружающего мира, делая жизнь жалкой и отправленной. Так бывает с теми, кто ставит ценности мира над своими собственными. Жаль, что я понял это так поздно. Повезло, что я понял это вообще. Здесь, на Сахалине, у меня будет время решить, чем наполнять мою жизнь, а что отвергать.
---
### Амбиции
Помню, что еще лет двадцать назад у слова "амбиции" было исключительно негативный смысл. Надеюсь, мы окончательно ушли от этого. Амбиции это аппетит к жизни. Человек без амбиций — полуживой, тень своего зомби. Такого невозможно полюбить. Новость для меня оказалась в том, что речь здесь идет не только о мужчинах: недавно я потерял интерес и симпатию к женщине не обнаружив в ней амбиций к развитию. Не ставлю на людях крест, я и сам провел много лет в таком состоянии, но лучше я буду двигаться один, чем стану пытаться кого-то растолкать. Спрашивают, может ли всемогущий Бог создать такой камень, который сам не смог бы поднять? Отвечаю: да, этот камень — человек.
---
На сегодня все. Встретимся завтра!
-
![](/static/nostr-icon-purple-64x64.png)
@ e97aaffa:2ebd765d
2025-02-04 16:58:18
Será que neste ciclo teremos turistas no #Bitcoin?
Nos últimos meses tenho me debruçado muito sobre este assunto, mas não consigo chegar a uma conclusão.
Antes de mais, o que são turistas?
Os turistas são aqueles que compram Bitcoin alimentados pelo FOMO, com a ganância de enriquecer rapidamente. Não tem o mínimo conhecimento do Bitcoin, nem tem interesse em conhecer, só estão pelo dinheiro.
Com a entrada dos turistas, o preço do Bitcoin começa a valorizar exponencialmente, é a segunda fase da _bullrun_, acontece sempre após o halving e após superar o anterior ATH. Com o novo ATH começa a surgir as notícias nas televisões e jornais, o mainstream acorda.
Só que a quantidade de turistas é de tal maneira elevada, muito superior à dos holders. Este desequilíbrio entre forças de curto prazo(turistas) e do longo prazo(_holders_), gera forte volatilidade. Quanto maior o desequilíbrio, maior a volatilidade.
A avalanche de turistas, faz o preço disparar e quanto mais sobe, mais turistas atrai.
Só que o movimento não dura para sempre, a esperança dos turistas de enriquecer rápido, desvanece e rapidamente se transforma numa desilusão, na sua grande maioria entra em pânico, assim que o preço começa a corrigir, vendendo em prejuízo. Sendo responsável pelas gigantes correções, superiores a 70%.
Este é o meu 4° ciclo, eu noto que este está a ser completamente diferente. Nos anteriores, os turistas entravam pelo Bitcoin, mas desta vez está a acontecer uma mudança.
Devido ao elevado _marketcap_ do Bitcoin, este já não permite valorização exponenciais num curto espaço de tempo, estes turistas que procuram multiplicar o seu dinheiro por 10x, 100x ou 1000x, estão a ir directamente para as shitcoins ou memecoins. Estas valorização pornograficas, só acontecerá em meia dúzia, mas o grande problema é que existem milhões de memecoins, é como encontrar uma agulha num palheiro. É o verdadeiro casino e os turistas procuram isto.
Só que neste ciclo, a maior parte dos novos _inflows_ estão a ser através do institucional, sobretudo pelos ETFs. Só que tem um perfil não diferente dos turistas, têm conhecimento de mercados financeiros tradicionais, são muito mais racionais, têm um conhecimento mínimo do Bitcoin. Não têm as mãos de diamante como os holders, mas também não são mãos de alface como os turistas. É um perfil de investidor intermédio. Poderá vender uma pequena parte do Bitcoin, para retirar uma parte do seu investimento inicial, mas tem um pensamento mais de médio-longo prazo.
Com isto, existe um maior equilíbrio entre os que pensam a curto prazo e os que pensam a longo prazo. Até ao momento, eu tenho a sensação que os turistas já não procuram o Bitcoin, ou são muito poucos.
O afastamento dos turistas é bom ou mau?
A meu ver é bom, é verdade que deixamos de ter aquelas enormes explosões no preço para cima, mas também acredito que as correções também serão muito menores. Em suma, uma redução na volatilidade do Bitcoin.
Mas essa redução na volatilidade, vai trazer um novo público, aquele que não é especulador, que apenas quer preservar o seu património, o real valor do Bitcoin, que pensa a longo prazo.
Estes turistas que procuram o 100x, com uma pura ganância, vão passar muitas noites sem dormir e na sua maioria vão perder muito dinheiro, vão acabar por receber uma dura lição de vida. Alguns vão finalmente compreender que Bitcoin é diferente, e que os 2x é suficiente para a sua vida.
A redução de turistas não afeta só o Bitcoin, mas também afeta o mercado das altcoins e das memecoins. Nos ciclos anteriores, os turistas entravam pelo Bitcoin mas depois rodavam o capital para as altcoins, gerando a chamada altseason. Se neste ciclo, os turistas descartam o Bitcoin, consequentemente a rotação será muito menor, possivelmente não haverá altseason.
Mas isto é apenas a minha convicção, só o tempo dirá, se os turistas trocaram o Bitcoin, pelo casino das memecoins.
-
![](/static/nostr-icon-purple-64x64.png)
@ 554ab6fe:c6cbc27e
2025-02-04 15:56:29
Modern life, despite all our technology, can still feel challenging. Many of us work very long hours to make ends meet, burdened by stress that can dramatically affect our health. The internet provides us with a wealth of helpful knowledge but also bombards us with headlines that can make us uneasy about the state of the world. In short, life can feel very stressful. Sometimes, leaving it all behind and becoming a monk may seem like a perfect way to escape it all. Though this may work for some, this is simply not a practical thing to do for many of us. Many of us are here to stay. However, even though the stressful nature of society will not change for a very long time, it is possible to reorient one's perspective so that it feels less stressful. In other words, rather than needing to go to a temple to become a monk, one can learn to bring the monk mind here.
It can be challenging to know where to begin to generate a positive outlook on life. So many people try to give advice, yet there never seems to be a "one size fits all" approach. We attempt to solve our outlooks by rationalizing the situation in a more positive way. Indeed, this can be useful for some, but not all. Furthermore, different people require different rationalizations. Regardless of advice, some are still stuck wondering how to have a better outlook on life. There is, of course, another method of perspective, and that is through non-judgment and simple acceptance.
Mindfulness meditation is a method of training the mind to become calmer and more at peace. In the scientific community, meditation is defined as a method of self-regulation of attention to the present moment, involving adopting a particular orientation toward one's experiences characterized by curiosity, openness, acceptance, and non-judgmental (Bishop et al., 2004). The benefits of meditation are many; however, much more research is required to understand its benefits and mechanisms better. The most well-documented benefit of mindfulness meditation is its ability to alleviate stress and anxiety (Greeson et al., 2018; Petterson & Olson, 2017; Querstret et al., 2020). The method by which this occurs is still reasonably unclear, yet many researchers have developed psychological and physiological theories. Furthermore, meditation reduces stress and anxiety while also creating resilience (Chin et al., 2019; Hwang et al., 2018). So, not only does it seem to be a curative treatment, but a preventative one as well. Understanding how meditation creates stress resilience is crucial to understand why meditation is so beneficial to health—the lessons provided in the research share profound philosophical lessons for us to bear in mind.
When studying meditation and its effects on the mind and body, it is essential to take a neuroscientific and psychological approach. The neuroscientific approach is valuable in both providing evidence that meditation impacts the body and sheds light on the mechanisms of action. A psychological perspective is also critical because it evaluates the mental schemas' effect on the body to better understand how the reader can practice this at home and in their daily lives. Both points of view will be discussed below.
**Amygdala and ACC connectivity**
The two brain areas that seem to be highly related to the process of resilience toward stress induced by mindfulness meditation are the amygdala and the anterior cingulate cortex (ACC).
The amygdala is found medial to the brain's temporal lobe and plays a vital role in emotional regulation and attention (Desbordes et al., 2012). For this reason, numerous studies have shown to be heavily involved in the experience of stress (Britton, 2006; Hölzel et al., 2009; Rubinow et al., 2016). It also influences the body in response to stress. For example, the amygdala regulates blood pressure in response to stressful stimuli (Saha, 2005).
The role of the ACC is seemingly more complex than the amygdala. In general, it is involved in executing responses regarding incoming interoceptive signals (signals from within the body) (Craig, 2002). For this reason, it connects to the motor cortex of the brain (Craig, 2002). On this same note, the anterior portion of the amygdala, the more executive region, has been associated with regulating endocrine functions, conditioned learning responses, expressing internal states vocally, and maternal-infant interactions (Devinsky et al., 1995). The ACC is related mainly to the processing of internal stimuli, associating it with the practice of mindfulness meditation. Less clear is how it relates to the amygdala and resilience to stress.
The neuroscientific observations of stress resilience are found within the connectivity between the amygdala and the ACC. In a randomized control trial involving a 3-day intensive mindfulness meditation program, researchers found that reduced stress following the practice was marked by decreased communication between the amygdala and the ACC (Taren et al., 2014). The study also noted reduced communication between the amygdala and ACC lessened HPA-axis activation (Taren et al., 2014). The HPA-axis is responsible for releasing hormones such as cortisol, which is a common biomarker for the activation of stress. This study is not alone in observing signs that mindfulness meditation reduces cortisol (Hoge et al., 2018). This is strong evidence that meditation induces physical changes within the brain, promoting resilience to biological responses to stress. The question is, how does this occur mentally, and how can we put this into practice?
**Important Techniques within Meditation**
The discussion and research surrounding how meditation leads to physical changes in the brain and body are complex and poorly understood. The appreciation for science in the west is new, and there is much research to be done. The author's current opinion is that meditation involves both [physical](https://highlighter.com/a/naddr1qvzqqqr4gupzq422kmldvavct44endu667mcfluv5jjmqfmcsyhpj68wurrvhsn7qq056etrdpsku6tnd4ej6mmx94xk2erfw3shg6t0dckh2at48pnxv7kh9ug) and [mental](https://highlighter.com/a/naddr1qvzqqqr4gupzq422kmldvavct44endu667mcfluv5jjmqfmcsyhpj68wurrvhsn7qqdyzt2zd3shxapdw3hj6argv5k4qctnwsknvme389m8steunzv) mechanisms that lead to some of its practical health benefits. Regarding resilience, a randomized control trial also observed that the resilience created was both physical and mental (Hoge et al., 2018). Though the exact mechanism is not fully understood, there has been an effort to gain insight applicable to modern-day life.
The research involving the mechanism at which meditation generates resilience towards stress is often pursued from a psychological point of view. To pursue this question, experiments involve different groups of people who are asked to perform similar tasks but differ in mental schemas practiced. The observed differences in health results indicate specific meditation techniques that are so helpful in generating resilience. For example, a randomized control trial in 2018 involved sending a group of participants to a temple (Hwang et al., 2018). One group was asked to participate in meditation sessions, while another group was asked to simply relax during this time at a peaceful place. The purpose was to discern whether or not the relaxing aspect of meditation was sufficient to produce resilience to stress or if something else was causing the change. The results found that both groups showed short-term benefits, but only the meditators had prolonged resilience towards stress months after the experiment. The results indicate that there was a mental practice involved through meditation that promoted stress resilience. A randomized control trial in 2019 expanded on this investigation by having one group of meditators purely practice the focused attention on the present, while the other group focused on the present while also cultivating a perspective of acceptance to all incoming stimuli (Chin et al., 2019). This study found that those who practiced a non-judgmental awareness showed a more significant reduction of stress than the attention group and the non-meditators, suggesting that the non-judgmental awareness of the present moment and experience was an essential aspect of stress resilience. Others have produced a similar theory on why meditation seems to be a healthy therapeutic method for those suffering from PTSD (Thompson & Waltz, 2010). The significance of these findings is not only crucial for those who have a meditation practice but anyone in general.
**Be Non-Judgmental**
A key aspect of meditation practice is to be mindful and aware of the present experience and interpret all thoughts, experiences, and stimuli in an accepting and non-judgemental manner. Not only is this important within the philosophical teachings, but it is a core aspect of how meditation works from a scientific point of view. This has profound implications for the importance of how we generate personal narratives. In meditation, one learns to let go of every incoming experience, no matter how tempting it is to value that thought or feeling. This is perhaps why the amygdala and ACC are involved. The amygdala is involved in emotions and stress, and the ACC is involved in "doing something about it." In meditation, no matter the feeling, thought, or stressor, one must cultivate an attitude of acceptance. One must simply continue sitting and focusing on the present. There is no evaluation, no judgment, simply acceptance.
This article began with the idea that one can become resilient to stress and experience less of it by simply reorienting their perspective of modern stressors. It was also stated that there is seemingly no one answer for everyone. This may be because people often try to generate rational or schemas to help people think about events differently. This article argues a different approach: don't think, just accept, let go, and move on. This is easier said than done, of course, and by no means are the benefits of meditation best articulated through argument. It is best to be experienced first hand.
Nonetheless, we are heavily burdened by the values we give to thoughts related to the stressors of modern-day life. We cannot avoid the stressors, but we can change their power over us. Removing their meaning and value removes their power and influence.
**References**
Bishop, S. R., Lau, M., Shapiro, S., Carlson, L., Anderson, N. D., Carmody, J., Segal, Z. v., Abbey, S., Speca, M., Velting, D., & Devins, G. (2004). Mindfulness: A Proposed Operational Definition. Clinical Psychology: Science and Practice, 11(3), 230–241. https://doi.org/10.1093/clipsy.bph077
Britton, W. B. (2006). Meditation and Depression.
Chin, B., Lindsay, E. K., Greco, C. M., Brown, K. W., Smyth, J. M., Wright, A. G. C., & Creswell, J. D. (2019). Psychological mechanisms driving stress resilience in mindfulness training: A randomized controlled trial. Health Psychology, 38(8), 759–768. https://doi.org/10.1037/hea0000763
Craig, A. D. (2002). How do you feel? Nature Review. https://doi.org/10.1177/1359105308095062
Desbordes, G., Negi, L. T., Pace, T. W. W., Alan Wallace, B., Raison, C. L., & Schwartz, E. L. (2012). Effects of mindful-attention and compassion meditation training on amygdala response to emotional stimuli in an ordinary, Nonmeditative State. Frontiers in Human Neuroscience, 6(OCTOBER 2012), 292. https://doi.org/10.3389/fnhum.2012.00292
Devinsky, O., Morrell, M. J., & Vogt, B. A. (1995). Contributions of anterior cingulate cortex to behaviour. Brain, 118(1), 279–306. https://doi.org/10.1093/BRAIN/118.1.279
Greeson, J. M., Zarrin, H., Smoski, M. J., Brantley, J. G., Lynch, T. R., Webber, D. M., Hall, M. H., Suarez, E. C., & Wolever, R. Q. (2018). Mindfulness Meditation Targets Transdiagnostic Symptoms Implicated in Stress-Related Disorders: Understanding Relationships between Changes in Mindfulness, Sleep Quality, and Physical Symptoms. Evidence-Based Complementary and Alternative Medicine, 2018. https://doi.org/10.1155/2018/4505191
Hoge, E. A., Bui, E., Palitz, S. A., Schwarz, N. R., Owens, M. E., Johnston, J. M., Pollack, M. H., & Simon, N. M. (2018). The effect of mindfulness meditation training on biological acute stress responses in generalized anxiety disorder. Psychiatry Research, 262(May 2016), 328–332. https://doi.org/10.1016/j.psychres.2017.01.006
Hölzel, B. K., Carmody, J., Evans, K. C., Hoge, E. A., Dusek, J. A., Morgan, L., Pitman, R. K., & Lazar, S. W. (2009). Stress reduction correlates with structural changes in the amygdala. Social Cognitive and Affective Neuroscience, 5(1), 11–17. https://doi.org/10.1093/scan/nsp034
Hwang, W. J., Lee, T. Y., Lim, K. O., Bae, D., Kwak, S., Park, H. Y., & Kwon, J. S. (2018). The effects of four days of intensive mindfulness meditation training (Templestay program) on resilience to stress: A randomized controlled trial. Psychology, Health and Medicine, 23(5), 497–504. https://doi.org/10.1080/13548506.2017.1363400
Petterson, H., & Olson, B. L. (2017). Effects of mindfulness-based interventions in high school and college athletes for reducing stress and injury, and improving quality of life. Journal of Sport Rehabilitation, 26(6), 578–587. https://doi.org/10.1123/jsr.2016-0047
Querstret, D., Morison, L., Dickinson, S., Cropley, M., & John, M. (2020). Mindfulness-based stress reduction and mindfulness-based cognitive therapy for psychological health and well-being in nonclinical samples: A systematic review and meta-analysis. International Journal of Stress Management, 27(4), 394–411. https://doi.org/10.1037/str0000165
Rubinow, M. J., Mahajan, G., May, W., Overholser, J. C., Jurjus, G. J., Dieter, L., Herbst, N., Steffens, D. C., Miguel-Hidalgo, J. J., Rajkowska, G., & Stockmeier, C. A. (2016). Basolateral amygdala volume and cell numbers in major depressive disorder: a postmortem stereological study. Brain Structure and Function, 221(1), 171–184. https://doi.org/10.1007/s00429-014-0900-z
Saha, S. (2005). ROLE OF THE CENTRAL NUCLEUS OF THE AMYGDALA IN THE CONTROL OF BLOOD PRESSURE: DESCENDING PATHWAYS TO MEDULLARY CARDIOVASCULAR NUCLEI. Clinical and Experimental Pharmacology and Physiology, 32(5–6), 450–456. https://doi.org/10.1111/j.1440-1681.2005.04210.x
Taren, A. A., Gianaros, P. J., Greco, C. M., Lindsay, E. K., Fairgrieve, A., Brown, K. W., Rosen, R. K., Ferris, J. L., Julson, E., Marsland, A. L., Bursley, J. K., Ramsburg, J., & Creswell, J. D. (2014). Mindfulness meditation training alters stress-related amygdala resting state functional connectivity: A randomized controlled trial. Social Cognitive and Affective Neuroscience, 10(12), 1758–1768. https://doi.org/10.1093/scan/nsv066
Thompson, B. L., & Waltz, J. (2010). Mindfulness and experiential avoidance as predictors of posttraumatic stress disorder avoidance symptom severity. Journal of Anxiety Disorders, 24(4), 409–415. https://doi.org/10.1016/j.janxdis.2010.02.005
-
![](/static/nostr-icon-purple-64x64.png)
@ a012dc82:6458a70d
2025-02-04 15:49:10
Bitcoin halving is a cornerstone event in the cryptocurrency landscape, occurring approximately every four years, or after every 210,000 blocks are mined. This event is significant because it marks a reduction in the reward that miners receive for adding new blocks to the Bitcoin blockchain, effectively halving the rate at which new bitcoins are generated. The concept of halving is embedded in Bitcoin's protocol by Satoshi Nakamoto, its mysterious creator, as a measure to mimic the scarcity and deflationary characteristics of precious metals like gold. This mechanism is crucial in controlling the supply of Bitcoin, ensuring that it remains finite and valuable. As the next halving event draws near, it's not just miners who are impacted; the entire cryptocurrency market, including investors and enthusiasts, keenly anticipates the potential outcomes. Historically, halving events have been associated with increased market activity, price volatility, and heightened public interest in Bitcoin. The event is seen as a moment of transformation for Bitcoin, where the dynamics of supply and demand are altered, potentially leading to significant shifts in its market value.
**Table Of Content**
- Understanding the Hash Rate Surge
- Implications of the Rising Hash Rate
- The Halving Event: What to Expect
- Preparing for the Halving
- Conclusion
- FAQs
**Understanding the Hash Rate Surge**
**What is Hash Rate?**
The hash rate, in the context of Bitcoin, refers to the total computational power being used to mine and process transactions on the blockchain. It's a vital metric that reflects the health and security of the network. A higher hash rate means that more computational resources are being dedicated to maintaining the network, making it more robust against potential attacks. The hash rate is measured in hashes per second (H/s), and with advancements in mining technology, the network has seen this rate reach exahash levels (1 EH/s = 1 quintillion hashes per second). This metric is crucial for miners, as it affects their chances of solving the mathematical puzzles required to mine new blocks and earn rewards. It also indicates the level of competition among miners, as a higher hash rate suggests more participants or more powerful mining equipment in the network.
**Record-Breaking Levels**
The Bitcoin network's hash rate has recently hit an all-time high, reaching a staggering 491 exahashes per second (EH/s). This surge is indicative of the growing strength and security of the network. Such a high hash rate means that the network is more resilient than ever to potential attacks, such as the 51% attack, where a single entity could potentially gain control over the majority of the network's mining power. This level of security is crucial, especially as Bitcoin continues to gain mainstream acceptance and attract significant institutional investment. The record-breaking hash rate also reflects the increasing global interest in Bitcoin mining. It suggests that despite the high costs associated with mining - including specialized hardware and significant electricity consumption - miners are still heavily investing in this activity. This investment is not just in terms of money but also in research and development of more efficient mining technologies, which could further drive up the hash rate.
**Implications of the Rising Hash Rate**
**Enhanced Network Security**
The surge in Bitcoin's hash rate is a positive development for the network's security. A higher hash rate means that it becomes exponentially more difficult for a malicious actor to orchestrate an attack on the network. This security is paramount for a system that handles billions of dollars worth of transactions. The decentralized nature of Bitcoin relies heavily on the integrity of its blockchain, which is maintained by this collective computational effort. As the hash rate increases, the confidence in the network's security also grows, which is crucial for both individual users and institutional investors. This enhanced security is particularly important in the context of the upcoming halving event, as it ensures the stability and reliability of the network during a period of significant change.
**Increased Mining Difficulty**
With the rise in hash rate comes an increase in the difficulty of mining Bitcoin. The Bitcoin network is designed to adjust the difficulty of mining new blocks approximately every two weeks to ensure that the time between blocks remains around 10 minutes. As more computational power joins the network, the difficulty increases, making it harder for individual miners to solve the cryptographic puzzles required to mine new blocks. This increase in difficulty can have several implications for miners. Smaller miners or those with less efficient equipment may find it increasingly difficult to compete with larger mining operations that have access to more powerful and efficient technology. This could lead to a consolidation in the mining industry, where only the most efficient operations can survive. Additionally, as the difficulty increases, the profitability of mining can decrease, especially if the price of Bitcoin does not increase proportionally. Miners must constantly evaluate their operations' efficiency and electricity costs to ensure continued profitability.
**Energy Consumption Concerns**
The rising hash rate of the Bitcoin network has brought renewed attention to the issue of energy consumption in Bitcoin mining. The process of mining Bitcoin is energy-intensive, as it requires a significant amount of computational power. As the hash rate increases, so does the total energy consumption of the network. This has led to concerns about the environmental impact of Bitcoin mining, especially in regions where electricity is generated from fossil fuels. The debate around Bitcoin's energy consumption is complex. On one hand, proponents argue that much of the energy used for Bitcoin mining comes from renewable sources, and the industry drives innovation in energy efficiency. On the other hand, critics point out that the overall energy consumption is still substantial and could be directed towards other, more productive uses. This debate is likely to continue as the network grows and the hash rate increases, especially in the context of global concerns about climate change and sustainable energy practices.
**The Halving Event: What to Expect**
**Reward Reduction**
The upcoming Bitcoin halving event is a scheduled reduction in the rewards that miners receive for verifying and adding new transactions to the blockchain. This halving reduces the number of new bitcoins created and earned by miners with each new block from 6.25 bitcoins to 3.125 bitcoins. This event occurs every 210,000 blocks, or approximately every four years, and is a fundamental part of Bitcoin's economic model. The halving is designed to mimic the extraction of precious resources, becoming progressively harder and less rewarding over time. This mechanism ensures that the total supply of Bitcoin will never exceed 21 million coins, making Bitcoin a deflationary asset. The halving event is significant because it affects the economics of Bitcoin mining. With the reward halving, the revenue for miners is effectively cut in half overnight. This can lead to a shakeout in the mining industry, as less efficient miners may no longer be profitable and could be forced to shut down their operations.
**Market Impact**
Historically, Bitcoin halving events have been followed by significant price increases. This pattern has led to a common perception that halving events are bullish for Bitcoin's price. The rationale behind this is simple: as the rate of new supply of Bitcoin decreases, and if demand remains constant or increases, the price should theoretically go up. However, it's important to note that financial markets are influenced by a myriad of factors, and the impact of the halving may already be priced in by the time it occurs. Additionally, each halving event occurs in a different macroeconomic environment, and past performance is not indicative of future results. Investors and traders closely watch these events, as they can lead to increased volatility in the market. Some see the halving as an opportunity for long-term investment, while others may speculate on short-term price movements.
**Preparing for the Halving**
**Miner Adaptations**
In anticipation of the halving and its impact on profitability, miners are taking various steps to adapt. One key strategy is the investment in more efficient mining hardware. Newer models of mining rigs offer greater hash power with lower energy consumption, which can help maintain profitability even with reduced rewards. Miners are also exploring alternative sources of revenue, such as transaction fee income, which could become a more significant part of their earnings post-halving. Additionally, miners are looking at geographical relocation to regions with cheaper electricity and favorable regulatory environments to reduce operational costs. Another consideration for miners is the potential consolidation of mining operations. Larger mining pools might have a better chance of surviving the reduced rewards, leading to a more centralized mining landscape. This potential centralization raises concerns within the Bitcoin community, as it could impact the decentralized nature of the network.
**Investor Strategies**
Investors are also preparing for the halving event in various ways. Many are closely analyzing historical data to understand potential market movements, although it's widely acknowledged that past trends may not necessarily predict future outcomes. Some investors view the halving as a key event that could drive long-term value growth in Bitcoin and are adjusting their portfolios accordingly. Others are more cautious, considering the potential for increased volatility around the event. There is also a focus on diversification, with investors looking at other cryptocurrencies and blockchain projects that might benefit from increased interest in the crypto space around the halving. Additionally, institutional investors, who have increasingly entered the cryptocurrency market, are likely to play a significant role in how the market reacts to the halving. Their strategies, which may include hedging and derivative trading, could influence Bitcoin's price dynamics in ways that were not seen in previous halving events.
**Conclusion**
The countdown to the Bitcoin halving is a period of significant anticipation and activity within the cryptocurrency community. The record-breaking hash rate ahead of the event is a testament to the network's strength and the commitment of its participants to maintain and secure the blockchain. As the halving approaches, the crypto world watches with keen interest, eager to see how this pivotal event will shape the future of Bitcoin. Whether it leads to a surge in price, increased adoption, or new challenges for miners, the halving is a reminder of the unique and dynamic nature of cryptocurrency and its underlying technology. As with any major event in the crypto space, the halving presents both opportunities and risks, and how it plays out could have lasting implications for the entire blockchain ecosystem.
**FAQs**
**What is Bitcoin Halving?**
Bitcoin halving is an event that occurs approximately every four years, reducing the reward for mining new Bitcoin blocks by half. This mechanism controls the supply of new bitcoins and is a fundamental part of Bitcoin's economic model.
**Why is the Bitcoin Hash Rate Important?**
The hash rate measures the total computational power used in mining and processing transactions on the Bitcoin network. A higher hash rate indicates a more secure and robust network, making it resistant to attacks.
**What Happens to Bitcoin's Price After Halving?**
Historically, Bitcoin's price has increased following halving events, but this is not guaranteed. Market reactions can be unpredictable, and various factors influence Bitcoin's price.
**How Does Halving Affect Bitcoin Miners?**
Halving reduces the reward miners receive for validating new blocks, impacting their profitability. Miners often need to upgrade to more efficient hardware or find cheaper energy sources to remain competitive.
**Can Bitcoin Halving Lead to Increased Centralization in Mining?**
Potentially, yes. As mining becomes less profitable for smaller operations, there could be a consolidation towards larger mining pools, which might lead to a more centralized mining landscape.
**Is the Increase in Bitcoin's Hash Rate Linked to the Upcoming Halving?**
Yes, the increase in hash rate is often linked to the upcoming halving as miners upgrade their equipment and increase their computational power in anticipation of the reduced mining rewards.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-
![](/static/nostr-icon-purple-64x64.png)
@ 1833ee04:7c4a8170
2025-02-04 15:14:03
The international race for Bitcoin strategic reserves is just getting started.
If you’re stacking now, you’re still incredibly early.
At $100k per Bitcoin, it’s practically free for anyone who truly understands how massive this shift is.
Think back to when paper currency was introduced, people had to trade their gold for paper bills. Many laughed, saying, Who’s going to trust these worthless pieces of paper as money?
Yet today, you sell your time to earn these paper bills while your government can print an unlimited amount at will.
The world is returning to a gold standard. But this time, it’s Gold 2.0 which is Bitcoin.The international race for Bitcoin strategic reserves is just getting started.\
\
If you’re stacking now, you’re still incredibly early.\
\
At $100k per Bitcoin, it’s practically free for anyone who truly understands how massive this shift is.\
\
Think back to when paper currency was introduced, people had to trade their gold for paper bills. Many laughed, saying, Who’s going to trust these worthless pieces of paper as money?\
\
Yet today, you sell your time to earn these paper bills while your government can print an unlimited amount at will.\
\
The world is returning to a gold standard. But this time, it’s Gold 2.0 which is Bitcoin.