-

@ deba271e:36005655
2025-02-16 06:49:32
Buying groceries with bitcoin rocks! I have been using bitcoin to buy food and stuff in Uvita over the last two months and what a wonderful experience that has been. There are so many places that accept. I went to the local farmers market literally every time it was open (twice a week) to buy veggies, meat, spices, juice, coffee and even clothes. You pay with bitcoin at every stand, payment fully settled sometimes [under 1 second](nostr:note1fxew6skuhayt8v2tpdh907l5tqy0aqkyx8k4x9qpuvd00kj62xjs99d8sy). I used bitcoin definitely more than I used fiat.

*What is in the basket is what I bought with bitcoin*
As is my nature (and nostr [job description](nostr:npub1m6azw8j5wanm6mvwa367anjkzhdnz7srkpl5tyf5kql8ydsq2e2sa7h78d)), I was complaining about the UX to the folks involved across multiple companies/groups here in Uvita, with some issues already fixed and some new features/ideas being worked on. Overall the people working on these projects are amazing. This was so much fun and I hope the folks don't hate me for giving them [feedback](nostr:naddr1qvzqqqr4gupzph46yu09gam8h4kcamr4am89v9wmx9aq8vrlgkgnfvp7wgmqq4j4qqxnzdenxvurgwpjxgmnqwf5wu65zl), [feedback](nostr:note12lxe9qjefyl4uqksx97q0lnq33tghe3fhxldzut0g2rfvpmln4psqj90qe), [feedback](nostr:note1ue96mtfdnpth0msqxxx6ead4w7farnt3h4aysk53rk8cw6gjurjqz6mlwx) - I always tried to make it as actionable as possible (also I'm hard to argue with when I'm right :P).
My focus has always been on getting more merchants onboarded, getting more people to accept bitcoin, but after a couple weeks in Uvita I realized that at this point the problem here is the opposite. **People are not paying with bitcoin**.
I talked to many of the sellers, asked them how many people pay, how often. And in reality it's fairly rare for them. In the restaurants they only have a couple times per day when someone pays with bitcoin. At the market only around 10% of people pay with bitcoin, while 95% of the sellers accept. That made me feel a bit sad and surprised. This is a buyer education problem, not a seller problem.

*Only a small portion of the folks in the picture will pay with bitcoin…*
The word of mouth approach is (imo) a solid strategy to onboard merchants, but it doesn't work for ephemeral tourists. As an example consider a "family with young kids coming for 3 days". This family doesn't have many chances to receive word of mouth. They come from elsewhere, they don't make many connections or interactions with locals.
Sidenote: Physical bitcoin office works like a charm! I would have not guessed that, but I witnessed it being the spot where people meet, where merchants come to ask questions, where new folks ask how to get onboarded. The Bitcoin Jungle team did an amazing job here.
If you are starting a circular economy in some town and already have some office space - consider making it into a "Bitcoin Office" (even if your business isn't exactly bitcoin). It will bring you visitors, great friends, bitcoiners will come hang out, etc.
#### Tourist education
We can assume that in "touristy" areas the restaurants, markets and shops will be mainly visited by tourists, so the solution here is tourist education. Now think about the journey that tourists go through - they come to the area in a car, maybe stop for lunch/dinner and then they check in at their hotel/casa. The next day they go to the local grocery store/market to get supplies and then do touristy stuff - go surfing, beach, hike, drive somewhere, chill, pool, drinks, etc.
The main touch points for where paying with bitcoin could be introduced are:
- when entering the town,
- at the restaurant,
- at the place they check in (hotel, casa),
- in the grocery store/market,
- in whatever they use to find attractions,
- the tour guides, drivers and other folks working in the tourism sector.
Here are couple ideas to make the situation better:
- **Printed brochure at merchants and hotels/casas:** a little printed brochure with the same content available at every merchant - so when someone asks about bitcoin, they can just hand this brochure to them. Doesn't need any technical background or price talk - literally "You can pay with bitcoin here. You need a bitcoin wallet, here's QR to get it. Then you need to get bitcoin, here are the options. Then just pay by scanning the QRs that sellers show you" when you tell them "pagar con bitcoin por favor".
- **Billboard when entering Uvita:** There could be a nice billboard when entering Uvita saying something like "Pay with Bitcoin in Uvita! Welcome to Bitcoin Jungle" and maybe add a link to bitcoinjungle.app and WhatsApp number.
- **A billboard at the market:** a nice printed billboard on the side of the market that shows QR for how to download BitcoinJungle wallet (and some US available wallet), how to get initial sats on it (e.g. ask a specific person at the market, install Strike…).
- **Discounts:** One thing that always attracts an eye is seeing some discount. This could be e.g. included in the brochure - "5% discount when you pay with bitcoin", or "pay with bitcoin, get XYZ for free". Someone may suggest wording "paying with fiat = extra 5% fee", but just from a psychological standpoint that is imo less effective.

*And of course having bitcoin signs "SE ACEPTA AQUI" helps…*
Good luck!
nout
Originally posted at https://stacker.news/items/887222/r/nout
-

@ e7bc35f8:3ed2a7cf
2025-02-16 05:34:56
The 2012 attack on the U.S. diplomatic mission in Benghazi has been widely debated, but the real story remains obscured by political theatrics and media smokescreens. The mainstream narrative focuses on bureaucratic failures, misinformation about an anti-Islamic film, and partisan blame games. However, when you dig deeper, a far more sinister picture emerges—one involving illegal arms deals, covert CIA operations, and geopolitical power plays that stretch far beyond Libya.
### Benghazi: A Strategic Flashpoint
Benghazi, Libya’s second-largest city, was a crucial battleground in the 2011 NATO-backed uprising that led to the overthrow and murder of Muammar Gaddafi. As a key port city, it was not only economically vital but also politically significant. After the fall of Gaddafi, Libya descended into chaos, becoming a breeding ground for militant groups and a hub for illicit weapons smuggling.
On the night of [**September 11, 2012**]( https://edition.cnn.com/2013/08/06/politics/benghazi-attack-timeline/), around **150 armed militants**—reportedly from **Ansar al-Sharia**, an Al-Qaeda-linked faction—attacked the U.S. diplomatic mission in Benghazi. Four Americans died in the assault, including **Ambassador Christopher Stevens** and two former Navy SEALs who were working as CIA contractors.
In the immediate aftermath, the U.S. government, led by **Ambassador Susan Rice**, [falsely claimed]( https://www.bbc.com/news/world-us-canada-20519384) the attack was a spontaneous reaction to an obscure anti-Islamic video. This story [collapsed]( https://www.cbsnews.com/news/emails-illustrate-how-white-house-shaped-benghazi-talking-points/) within days, leading to [Republican-led investigations]( https://web.archive.org/web/20140505004626/http://www.foxnews.com/politics/2014/05/02/house-committee-subpoenas-kerry-over-benghazi-documents/) and heated political battles. Yet, amid the partisan finger-pointing, the most critical questions were never fully answered:
**What was the real purpose of the U.S. presence in Benghazi?**
**Why was the CIA so heavily involved in this particular location?**
**Was the attack a cover-up for a botched operation?**
### The CIA’s Secret War in Benghazi
One of the most underreported aspects of Benghazi is the sheer volume of [CIA operatives]( https://www.businessinsider.com/the-secret-cia-mission-in-benghazi-2013-8) on the ground during the attack. In August 2013, even [CNN]( https://cnnpressroom.blogs.cnn.com/2013/08/02/cnn-exclusive-dozens-of-cia-operatives-on-the-ground-during-benghazi-attack/) admitted that “dozens” of CIA personnel were present in Benghazi that night.
The agency went to extraordinary lengths to keep its operations in Libya under wraps. Whistleblowers later revealed that CIA officers were subjected to [frequent polygraph tests]( https://www.yahoo.com/news/report-cia-polygraphs-operatives-stop-benghazi-leaks-100204865.html) to ensure they weren’t leaking information about what really happened in Benghazi. This level of secrecy suggests something far more than just diplomatic work was taking place.
What were they hiding? Evidence points to an **illegal arms-smuggling operation**, reminiscent of the **Iran-Contra scandal**, where weapons were funneled to terrorist factions in Syria under the guise of aiding "moderate rebels."
### Arming Terrorists: The Benghazi-Syria Connection
Reports suggest that **Ambassador Stevens himself was deeply involved in a covert weapons pipeline**, shipping arms from Libya’s looted stockpiles to Syrian insurgents. These insurgents—many linked to Al-Qaeda—somehow ended up with advanced weaponry, including **U.S.-made Stinger missiles.**
Where did these weapons come from? **The very security operation in Benghazi** that was supposedly meant to prevent arms from falling into the wrong hands.
Lieutenant Colonel **Anthony Shaffer**, a military intelligence whistleblower, [suggested]( https://web.archive.org/web/20201109014908/https://edition.cnn.com/2010/US/09/25/books.destroyed/) that Stevens was likely killed because he had knowledge of these weapons transfers. Similarly, CIA contractor [Robert "Tosh" Plumlee]( https://canadafreepress.com/article/cia-whistleblower-faces-the-ire-of-an-angry-justice-department-over-benghaz), a veteran of Iran-Contra, supported the claim that the U.S. was [funneling weapons]( https://web.archive.org/web/20201101023009/https://wjla.com/news/nation-world/benghazi-hearing-revives-allegations-of-weapons-shipments-to-syria) to Syria through Turkey, Jordan, and even Pakistan.
### The Security Farce: Aiding the Enemy
Another bizarre piece of the puzzle is the **so-called security force** hired to protect the U.S. mission in Benghazi: the **February 17th Martyrs Brigade**. Incredibly, this group **publicly displayed Al-Qaeda flags on their own [Facebook page]( https://web.archive.org/web/20130512160017/http://www.newsmax.com/Newsfront/benghazi-consulate-protected-alqaida/2013/05/02/id/502565)**, yet they were still entrusted with U.S. diplomatic security.

Why would the U.S. government **pay known jihadists** to guard its personnel? Was this sheer incompetence, or something more deliberate?
### A Planned Hit That Spiraled Out of Control
It appears the Benghazi attack was more than just a terrorist ambush. There are indications that it was an **orchestrated hit**—perhaps an attempt to eliminate Stevens before he could [blow the whistle]( https://www.businessinsider.com/us-syria-heavy-weapons-jihadists-2012-10) on the weapons trafficking operation.
The two **former Navy SEALs** who died that night **ignored stand-down orders** and engaged the attackers, holding them off long enough for military drones to capture real-time footage. This forced the U.S. military to take notice, disrupting whatever covert plan was in motion.
An **Air Force whistleblower later [claimed]( https://gazette.com/military/air-force-whistleblower-we-could-have-saved-benghazi-victims/article_25e30eec-7e14-5ae8-b23f-647f7ec05e4c.html)** that a rescue mission was possible but was deliberately withheld. This suggests that allowing Stevens and his team to die was part of a calculated decision to prevent certain truths from coming to light.
### The Petraeus Affair: A Convenient Distraction?
As if this story couldn’t get any murkier, another subplot surfaced: **CIA Director David Petraeus’ extramarital affair** with his biographer, **Paula Broadwell.**
Shortly before the scandal erupted, Broadwell gave a speech in which she **accidentally revealed** that the CIA had been [holding Libyan militants prisoner]( https://www.thegatewaypundit.com/2012/11/paula-broadwell-leaks-info-on-benghazi-prison-says-petraeus-knew-of-benghazi-plea-for-help-video/?PageSpeed=noscript) at the Benghazi annex. This revelation was explosive because it **contradicted Obama’s official stance against CIA black sites**.
Was the Petraeus scandal used as a distraction? Was he forced out because he knew too much?
### The Aftermath: Tying Up Loose Ends
Years later, in a final act of "cleaning house," a **key suspect in the Benghazi attack [was killed]( https://abcnews.go.com/Politics/key-suspect-benghazi-attack-killed-us-airstrike-iraq/story?id=31953157) in a U.S. airstrike in Iraq**. The timing, as always, was suspicious. This has become a pattern—critical witnesses and suspects disappearing before they can testify.
### A Scandal Bigger Than Partisan Politics
Benghazi was **not** about bureaucratic missteps or political negligence. It was about **[illegal arms deals]( https://youtu.be/xmjT-VeHjiY), black ops, and the perpetual cycle of U.S.-backed destabilization in the Middle East.** The official narrative is a smokescreen designed to distract from the uncomfortable truth: **The U.S. government has been covertly arming and funding the same groups it claims to be fighting.**
This is not a Republican or Democrat issue. **Both sides of the political spectrum have been complicit** in covering up what really happened in Benghazi. The military-industrial complex thrives on endless war, and the intelligence agencies operate with impunity.
If history has taught us anything, it’s that these covert operations never truly end—they simply move to the next theater of war. And as long as the public remains distracted by partisan squabbles, the real architects of these schemes continue to operate in the shadows, profiting from chaos.
The question is: Will we ever hold them accountable?
-

@ 9e69e420:d12360c2
2025-02-15 20:24:09
Ukraine's President Volodymyr Zelensky called for an "army of Europe" to defend against Russian threats, emphasizing that the US may not continue its traditional support for Europe. Speaking at the Munich Security Conference, he warned against peace deals made without Ukraine's involvement.
US Vice President JD Vance echoed this sentiment, urging Europe to enhance its defense efforts.
Zelensky stated, "I really believe the time has come - the armed forces of Europe must be created." He highlighted changing dynamics in US-Europe relations and noted that "the old days are over" regarding American support.
Despite discussions around NATO, Zelensky stated he wouldn't rule out NATO membership for Ukraine.
-

@ fd208ee8:0fd927c1
2025-02-15 07:37:01
E-cash are coupons or tokens for Bitcoin, or Bitcoin debt notes that the mint issues. The e-cash states, essentially, "IoU 2900 sats".
They're redeemable for Bitcoin on Lightning (hard money), and therefore can be used as cash (softer money), so long as the mint has a good reputation. That means that they're less fungible than Lightning because the e-cash from one mint can be more or less valuable than the e-cash from another. If a mint is buggy, offline, or disappears, then the e-cash is unreedemable.
It also means that e-cash is more anonymous than Lightning, and that the sender and receiver's wallets don't need to be online, to transact. Nutzaps now add the possibility of parking transactions one level farther out, on a relay. The same relays that cannot keep npub profiles and follow lists consistent will now do monetary transactions.
What we then have is
* a **transaction on a relay** that triggers
* a **transaction on a mint** that triggers
* a **transaction on Lightning** that triggers
* a **transaction on Bitcoin**.
Which means that every relay that stores the nuts is part of a wildcat banking system. Which is fine, but relay operators should consider whether they wish to carry the associated risks and liabilities. They should also be aware that they should implement the appropriate features in their relay, such as expiration tags (nuts rot after 2 weeks), and to make sure that only expired nuts are deleted.
There will be plenty of specialized relays for this, so don't feel pressured to join in, and research the topic carefully, for yourself.
https://github.com/nostr-protocol/nips/blob/master/60.md
https://github.com/nostr-protocol/nips/blob/master/61.md
-

@ 9f0bbd5b:779b33f6
2025-02-16 05:09:59
The next time you see your doctor and get a blood draw (you are doing this every year, yes?) be sure to request that your testosterone levels be tested.
Testosterone is measured as Ng/dL. Ng/dL stands for nanograms per deciliter, which is a unit of measurement used to express the concentration of substances, such as hormones, in the blood. It indicates how many nanograms of a substance are present in one deciliter of blood.
Since the 1960s-70s (the first time data was collected on a large scale), average testosterone levels have been cut nearly in half. You can draw any number of conclusions, when you compare this with the state of our society.

[Source](https://testosteronedecline.com/testosterone-levels-100-years-ago/)
Sedentary lifestyles, processed foods, lack of exercise, sunshine, and sex ... all these things contribute to the feminization of the men in our society. Studies have shown that higher testosterone results in better rational decision making.
Currently, average testosterone levels are lower than they have ever been.

[Source](https://www.health.com/chart-of-testosterone-levels-by-age-8743223#toc-testosterone-levels-by-age)
**How to raise testosterone:**
- Eat real food (beef, veg, dairy, fruit)
- Stop drinking soda, etc
- Get sunshine
- Get rid of your gut
- Exercise regularly
originally posted at https://stacker.news/items/887187
-

@ 8d34bd24:414be32b
2025-02-16 04:19:34
Last night in my Bible reading I read this verse:
> “As for you, **do not pray for this people, and do not lift up cry or prayer for them, and do not intercede with Me**; for I do not hear you. (Jeremiah 7:16) {emphasis mine}
My first thought was “Why in the world is God telling us not to pray for this people? Doesn’t the Bible tell us to pray about everything?”
> First of all, then, **I urge that entreaties and prayers, petitions and thanksgivings, be made on behalf of all men**, for kings and all who are in authority, so that we may lead a tranquil and quiet life in all godliness and dignity. **This is good and acceptable in the sight of God our Savior**, who desires all men to be saved and to come to the knowledge of the truth. (1 Timothy 2:1-4) {emphasis mine}
Doesn’t God tell us to pray for whatever is bothering us?
> Be anxious for nothing, but in everything by prayer and supplication with thanksgiving let your requests be made known to God. And the peace of God, which surpasses all comprehension, will guard your hearts and your minds in Christ Jesus. (Philippians 4:6-7)
Doesn’t the Bible say that God will answer all of our requests?
> Whatever you ask in My name, that will I do, so that the Father may be glorified in the Son. (John 14:13)
Doesn’t the Bible tell us to pray for Israel and Jerusalem and His chosen people?
> **Pray for the peace of Jerusalem**:\
> “May they prosper who love you.\
> May peace be within your walls,\
> And prosperity within your palaces.”\
> For the sake of my brothers and my friends,\
> I will now say, “May peace be within you.”\
> For the sake of the house of the Lord our God,\
> I will seek your good. (Psalm 122:6-9) {emphasis mine}
Doesn’t the Bible even tell us to pray for our enemies?
> “But I say to you who hear, love your enemies, do good to those who hate you, bless those who curse you, **pray for those who mistreat you**. (Luke 6:27-28)
If all of this is true, then why does this verse tell us to not pray for this people, especially considering this is referring to God’s chosen people?
To answer this question, let us look at a broader portion of this passage:
> “As for you, **do not pray for this people, and do not lift up cry or prayer for them, and do not intercede with Me; for I do not hear you**. Do you not see what they are doing in the cities of Judah and in the streets of Jerusalem? The children gather wood, and the fathers kindle the fire, and the women knead dough to make cakes for the queen of heaven; and *they* pour out drink offerings to other gods in order to spite Me. Do they spite Me?” declares the Lord. “Is it not themselves *they spite,* to their own shame?” (Jeremiah 7:16-19) {emphasis mine}
God is saying to not pray for these people who have turned from Him and are worshipping other gods. These people are in full rejection of God. Still does it mean that we can’t pray for them at all or is this talking about a particular kind of prayer?
A little later in Jeremiah, we read:
> “Therefore do not pray for this people, nor lift up a cry or prayer for them; for I will not listen when they call to Me because of their disaster. (Jeremiah 11:14)
and
> So the Lord said to me, “**Do not pray for the welfare of this people**. When they fast, I am not going to listen to their cry; and when they offer burnt offering and grain offering, I am not going to accept them. Rather I am going to make an end of them by the sword, famine and pestilence.” (Jeremiah 14:11-12) {emphasis mine}
We get a little more specificity on the command to “*not pray for*” in Jeremiah 14. We are told, “*Do not pray for the welfare of this people*.” This is not a universal command to never pray for them, but a command to not pray for their welfare. It is a command to not pray blessings on those in active rebellion against God.
At the time this command was made, the Israelites were expecting God’s protection and blessings while refusing to follow Him and instead worshipping other gods. This command isn’t a blanket statement to not pray for a sinning Israel, but a statement to not pray for blessings and protection for a sinning Israel. If this was a blanket statement it would contradict Psalm 122 above.
> This is the confidence which we have before Him, that, **if we ask anything according to His will**, He hears us. And if we know that He hears us in whatever we ask, we know that we have the requests which we have asked from Him. (1 John 5:14-15) {emphasis mine}
Using 1 John 5:14, we can begin to see the catch. We are to pray “*according to His will*.” It is not God’s will for sinners and those in open rebellion against God to be blessed or protected from hardship. A prayer such as, “Please turn your people back to you and give them a pure heart and repentance from sin,” would be according to His will. A prayer to “Please bless and protect Israel” while Israel has turned their back on God is not a prayer that God will answer. He will “*not hear you*.”
The Bible also says:
> You ask and do not receive, because you ask with wrong motives, so that you may spend it on your pleasures. (James 4:3)
How often are our prayers not answered because we pray with wrong motives? At least sometimes. Of course there are also times when God tells us to wait or has something better in mind and we can’t see it because we are not seeking His will, but our own.
It is always good to pray for someone’s repentance and salvation. It isn’t always good to pray for someone’s healing, blessings, and prosperity. It is always good to pray for a nation to turn back to God and to obey His commands. It isn’t always good to pray for a nation’s prosperity and power in the world. Sometimes God’s will is to punish those who turn away from Him or against Him. We need to make sure we are aligned to God’s will and not just seeking our own.
I recommend that our prayers be like Jesus’s prayer right before going to the cross, “*saying, “Father, if You are willing, remove this cup from Me; yet not My will, but Yours be done*.” (Luke 22:42). Our requests should be like that of Shadrach, Meshach, and Abed Ngo right before being thrown in the fiery furnace, “*But even if He does not, let it be known to you, O king, that we are not going to serve your gods or worship the golden image that you have set up*.” (Daniel 3:18). This isn’t just words thrown on the end of our prayers “*yet not My will, but Yours be done*,” but a cry of our hearts in full and complete trust in our Father God.
One thing that helps me is I try to pray the problem not the solution. God knows much better solutions than we do because He knows everything that has happened, everything that is happening, and everything that will happen. He knows what will lead to the best long term solution. When we pray the solution we desire, we miss out on the blessings of God’s knowledge, wisdom, and love.
May God lead you and guide you in a closer relationship to Him so that your will is completely aligned with His will and you are in close fellowship to Our Father in Heaven.
Trust Jesus
-

@ 47cc4b41:1bad46c9
2025-02-15 23:20:11
Since the last time I wrote about a United States Bitcoin Strategic Reserve, there have been a few federal updates. Notably, Treasury Secretary Scott Bessent and Commerce Secretary nominee Howard Lutnick will be developing a plan to create the first United States sovereign wealth fund after President Donald Trump signed an executive order. The order also directs Bessent and Lutnick to develop a plan for creating the fund within 90 days. Lutnick holds hundreds of millions of dollars of Bitcoin and is bullish on the future of Bitcoin and I personally believe this is a huge indication that Bitcoin will be included in this fund.
Additionally, David Sacks, the Crypto Czar said that a top agenda item for his task force is evaluating “the feasibility of a Bitcoin reserve.”
Both of these developments in my opinion are very positive for the future of Bitcoin at a federal level but the reality is that Federal legislation takes time and can suffer from gridlock, party disagreements, and overall levels of bureaucracy that states oftentimes don’t have to deal with. For this reason, many states have already made progress in pushing strategic reserve legislation and other Bitcoin-related legislation forward. This is also a reason why I expect the states to once again “lead” ahead of the federal government as it relates to Bitcoin.
Bitcoin Laws ([*bitcoinlaws.io*](https://bitcoinlaws.io/?utm_source=the-arc.beehiiv.com&utm_medium=referral&utm_campaign=the-states-will-lead)) is a resource that has emerged to specifically track Bitcoin and other digital asset legislation at the state level. The website highlights all of the outstanding legislation and provides the status and details on what is being proposed. I personally believe this resource will continue to be incredibly important for tracking what is actually happening at the state level as it relates to Bitcoin. It is rather difficult to stay up to date on all of the legislative occurrences as it relates to Bitcoin and Bitcoin Laws provides a one-stop-shop for all of the updates.

Most importantly, as of February 10th, 21 ‘Bitcoin Reserve’ bills have been introduced at the state level with 19 still active in the legislative process.
The idea that “the states will lead” reflects a theme of governance from the days of our Founding Fathers—that of Federalism. Federalism is a mode of political organization that allows separate states to unite under a national government while maintaining their own aspects of sovereignty. In layman's terms, Federalism allows for a Federal Government while also allowing State governments to have power within their individual borders. This system emphasizes a division of power with certain powers being granted to the federal government and others residing at the state level.
When the Founding Fathers created the Articles of Confederation they emphasized state power over a strong federal government. This system led to some problems such as economic instability amongst states and difficulties in coordinating a national defense eventually leading to the Constitution taking over and being the rule of the land for the centuries to follow. The Constitution created a stronger federal government while still protecting levels of state authority, autonomy, and sovereignty. The Tenth Amendment is a key aspect of this where it states, “The powers not delegated to the United States by the Constitution, nor prohibited by it to the States, are reserved to the States respectively, or to the people.” The amendment means that any powers *not explicitly given* to the federal government by the Constitution fall to the states.
The states having and maintaining individual power was a focal point when the United States was created and remains true today. Justice Louis Brandeis gave one of the more famous statements related to the rights of the states when he referred to them as “laboratories of democracy” during the case *New State Ice Co. v. Liebmann* (1932)*.* The full quote was, “It is one of the happy incidents of the federal system that a single courageous State may, if its citizens choose, serve as a laboratory; and try novel social and economic experiments without risk to the rest of the country.” The meaning emphasized the idea that states were “laboratories” and should be encouraged to enact policy ahead of the federal government. The rationale for why states should be encouraged to do this is any policy they enact is specifically within their own borders while federal legislation typically applies to the whole country. As such, the “test area” for any new piece of legislation is much smaller and impacts far fewer people than any federally enacted policy of the same measure.
We have seen the “states lead” with numerous issues throughout the years including legislation on same-sex marriage, marijuana, healthcare experiments, climate change regulations, civil rights, and more. I believe the table is being set for the states to once again lead the federal government as it relates to policy regarding a Bitcoin Strategic Reserve.
It is also my personal belief the urgency at which legislation is confirmed for a Bitcoin Strategic Reserve is a matter of national security. Every day that a federal strategic reserve for Bitcoin is not enacted is another day that foreign adversaries and other nations can front-run our country.
The positive of this scenario is that the common man can also front-run the federal government.
The positive of this scenario is that states can also front-run the federal government.
The positive of this scenario is that states have the opportunity to once again lead and pave the way for what I believe the United States Federal government will also adopt.
Strategic Reserves within the United States both at the state and federal level will have their 0 to 1 moment and rapidly have their 1 to many rush to completion.
The States will Lead.
**Stack SATs.**
*The views and opinions expressed here are for entertainment purposes only and should, in no way, be interpreted as financial or investment advice. Always conduct your own research when making an investment or trading decision, as each such move involves risk. I am not a financial advisor and do not claim to be qualified to convey information or advice that a registered financial advisor would convey to clients as guidance. Nothing contained in this e-mail/article constitutes, or shall be construed as, an offering of financial instruments, investment advice, or recommendations of an investment strategy. If you are seeking financial advice, find a professional who is right for you.The views and opinions expressed here are for entertainment purposes only and should, in no way, be interpreted as financial or investment advice. Always conduct your own research when making an investment or trading decision, as each such move involves risk. I am not a financial advisor and do not claim to be qualified to convey information or advice that a registered financial advisor would convey to clients as guidance. Nothing contained in this e-mail/article constitutes, or shall be construed as, an offering of financial instruments, investment advice, or recommendations of an investment strategy. If you are seeking financial advice, find a professional who is right for you.*
-

@ 0fa80bd3:ea7325de
2025-02-14 23:24:37
#intro
The Russian state made me a Bitcoiner. In 1991, it devalued my grandmother's hard-earned savings. She worked tirelessly in the kitchen of a dining car on the Moscow–Warsaw route. Everything she had saved for my sister and me to attend university vanished overnight. This story is similar to what many experienced, including Wences Casares. The pain and injustice of that time became my first lessons about the fragility of systems and the value of genuine, incorruptible assets, forever changing my perception of money and my trust in government promises.
In 2014, I was living in Moscow, running a trading business, and frequently traveling to China. One day, I learned about the Cypriot banking crisis and the possibility of moving money through some strange thing called Bitcoin. At the time, I didn’t give it much thought. Returning to the idea six months later, as a business-oriented geek, I eagerly began studying the topic and soon dove into it seriously.
I spent half a year reading articles on a local online journal, BitNovosti, actively participating in discussions, and eventually joined the editorial team as a translator. That’s how I learned about whitepapers, decentralization, mining, cryptographic keys, and colored coins. About Satoshi Nakamoto, Silk Road, Mt. Gox, and BitcoinTalk. Over time, I befriended the journal’s owner and, leveraging my management experience, later became an editor. I was drawn to the crypto-anarchist stance and commitment to decentralization principles. We wrote about the economic, historical, and social preconditions for Bitcoin’s emergence, and it was during this time that I fully embraced the idea.
It got to the point where I sold my apartment and, during the market's downturn, bought 50 bitcoins, just after the peak price of $1,200 per coin. That marked the beginning of my first crypto winter. As an editor, I organized workflows, managed translators, developed a YouTube channel, and attended conferences in Russia and Ukraine. That’s how I learned about Wences Casares and even wrote a piece about him. I also met Mikhail Chobanyan (Ukrainian exchange Kuna), Alexander Ivanov (Waves project), Konstantin Lomashuk (Lido project), and, of course, Vitalik Buterin. It was a time of complete immersion, 24/7, and boundless hope.
After moving to the United States, I expected the industry to grow rapidly, attended events, but the introduction of BitLicense froze the industry for eight years. By 2017, it became clear that the industry was shifting toward gambling and creating tokens for the sake of tokens. I dismissed this idea as unsustainable. Then came a new crypto spring with the hype around beautiful NFTs – CryptoPunks and apes.
I made another attempt – we worked on a series called Digital Nomad Country Club, aimed at creating a global project. The proceeds from selling images were intended to fund the development of business tools for people worldwide. However, internal disagreements within the team prevented us from completing the project.
With Trump’s arrival in 2025, hope was reignited. I decided that it was time to create a project that society desperately needed. As someone passionate about history, I understood that destroying what exists was not the solution, but leaving everything as it was also felt unacceptable. You can’t destroy the system, as the fiery crypto-anarchist voices claimed.
With an analytical mindset (IQ 130) and a deep understanding of the freest societies, I realized what was missing—not only in Russia or the United States but globally—a Bitcoin-native system for tracking debts and financial interactions. This could return control of money to ordinary people and create horizontal connections parallel to state systems. My goal was to create, if not a Bitcoin killer app, then at least to lay its foundation.
At the inauguration event in New York, I rediscovered the Nostr project. I realized it was not only technologically simple and already quite popular but also perfectly aligned with my vision. For the past month and a half, using insights and experience gained since 2014, I’ve been working full-time on this project.
-

@ 9e69e420:d12360c2
2025-02-14 18:07:10
Vice President J.D. Vance addressed the Munich Security Conference, criticizing European leaders for undermining free speech and traditional values. He claimed that the biggest threat to Europe is not from external enemies but from internal challenges. Vance condemned the arrest of a British man for praying near an abortion clinic and accused European politicians of censorship.
He urged leaders to combat illegal immigration and questioned their democratic practices. “There is a new sheriff in town,” he said, referring to President Trump. Vance's remarks were unexpected, as many anticipated discussions on security or Ukraine. His speech emphasized the need for Europe to share the defense burden to ensure stability and security.
-

@ 04ed2b8f:75be6756
2025-02-15 23:08:57
Every action you take, every decision you make, every battle you fight—it all matters. You may not see it now, but what you do today will ripple far beyond this moment. Your choices carve your legacy, your discipline shapes your destiny, and your willpower determines how you are remembered.
#### **The Weight of Every Choice**
Most people live like their actions die with them. They don’t realize that their words, their work, and their struggles leave a mark—on others, on history, on the future itself. The weak make excuses, thinking no one will remember their failures. But the strong understand: what they do now is what will be spoken of long after they’re gone.
- **Greatness Is Not Accidental** – Legends are not made by chance; they are forged by relentless effort, battle after battle, day after day.
- **Your Discipline Defines You** – What you do in private, in training, in the moments no one sees, builds the warrior you become in battle.
- **Your Struggles Are Not in Vain** – Every hardship you overcome strengthens the echo of your existence. The pain, the fight, the endurance—it all creates an unshakable foundation that future warriors will stand on.
#### **Live Like You Will Be Remembered**
Cowards hide in comfort, waiting for the world to give them something. But warriors? They seize life with both hands and leave behind something greater than themselves.
- **Fight for something bigger than yourself.** Your legacy isn’t about what you take—it’s about what you leave behind.
- **Take action like it matters—because it does.** Every move you make today is carving the future you will walk into.
- **Refuse to be forgotten.** The weak fade into history, but the strong leave behind echoes that never die.
#### **What Will Your Echo Be?**
Your life is happening now. Every moment, you are creating the story that will be told about you. Will it be a story of strength, resilience, and purpose? Or will you let yourself fade into the background, just another name lost to time?
**Stand up. Move forward. Fight harder. Because what you do in life will echo in eternity.**
-

@ 6e0ea5d6:0327f353
2025-02-15 19:47:49
*"You are a slave to whoever controls you emotionally."*
> *"We get angry when someone tries to tell us what to do. 'Don’t tell me how to dress, how to think, how to do my job, how to live.' We feel this way because we see ourselves as independent, self-sufficient individuals.*
> *Or at least, that’s what we tell ourselves.*
> *Yet, if someone says something we disagree with, something inside us tells us we must argue with them. If a plate of treats is placed in front of us, we must eat them. If someone does something we don’t like, we must be furious. If a setback arises, we must be sad, depressed, or worried. But if something good happens a few minutes later, suddenly, we’re happy, excited, and wanting more.*
> *We should never let another person shake us back and forth the way our impulses do. It’s time we start seeing things differently: we are not puppets, dancing to whichever tune suits us at the moment. We should be the ones in control—not our emotions—because we are independent, self-sufficient individuals."*
> — **Ryan Holiday**
> *"Frame your thoughts like this: you are a mature man, and you will no longer allow yourself to be enslaved or manipulated like a puppet by every impulse. You will stop complaining about your current lot or fearing the future."*
> — **Marcus Aurelius**
📌 **Emotions can give us information, but they should not give us orders.**
It’s not enough to learn to say "no" to others; you must also learn **not to give in** to the demands of your weaker self.
---
**Thank you for reading, my friend!**
If this message resonated with you, consider leaving your **"🥃"** as a token of appreciation.
**A toast to our family!**
-

@ c582af78:698069cc
2025-02-15 19:21:25
# **The Face of God: How Art Became a Gateway to the Divine**
If you live in the **West**, you’re surrounded by depictions of **God, Jesus, and the saints**—from paintings and statues to illustrated Bibles and stained glass windows.
But this is far from universal. In the **Islamic world**, religious art takes a very different form: vibrant colors, **intricate geometry, and architectural symmetry**. **Depictions of God or Muhammad aren’t just discouraged—they are outright forbidden.**
But why?
To answer that, we must go back to the **origins of the Abrahamic religions**—when **early Christians, Jews, and Muslims** were surprisingly **unified in their views on religious art**.
https://image.nostr.build/1515c5fd00d798cd283583618bbbc0d5eb91bc481a84c21d53644d42fa30173a.jpg
---
## **The Early Christian Hesitation**
The **first generation of Christians** were deeply aware of **Judaism’s strict prohibition** against idol worship. **Depicting God in any form was considered dangerous**—a potential gateway to paganism.
For centuries, Christianity could have followed this path, rejecting religious imagery altogether. But one fundamental theological idea **changed everything**:
**The Incarnation.**
As the early Church wrestled with the **nature of Christ**, heated debates emerged:
- Was he part human and part divine?
- Was he **fully** human and **fully** divine?
- And what did the Gospel of John mean by *“the Word became flesh and dwelt among us”*?
The result of these debates was the **doctrine of the Incarnation**—the belief that **God took on human form in real flesh and blood**. And if **God himself** had chosen to be seen in **finite form**, then depicting Him in art could no longer be considered blasphemous.
This single theological shift laid the foundation for **Christianity’s embrace of religious art**—a decision that would not only shape Christian worship but **redefine how we engage with art itself**.
https://image.nostr.build/1cf9ea5d1385c46bd720de9c7de65123428a9f76356e39e37c5d7b9663993930.jpg
---
## **Let There Be Art…**
How did this change Christian art?
https://image.nostr.build/b945e4ea06b281bb4618f08b2543108beecf7f510aaa795bed1c833614e32fb7.jpg
The **early objections** to religious imagery went something like this:
> *“God is infinite and mysterious. Reducing Him to a finite, limited form is blasphemy.”*
But with the Incarnation, the argument flipped:
> *“If God took on real shape, color, and form without diminishing His divine nature, then we can depict Him in art without compromising His grandeur.”*
Thus, images of **Jesus, Mary, and saints** not only became **permissible**—they were **encouraged**.
Christian leaders actively **commissioned religious art** to communicate the **Gospel visually** to a largely **illiterate population**. **Paintings, statues, and stained glass** became tools of evangelization, helping people grasp biblical stories **without needing to read**.
Take the **Duomo of Milan** with its **4,000 statues**. They aren’t just decorative. They **inspire faith** by highlighting the lives of the saints.
Christianity had embraced art as a **spiritual bridge**, a way to **connect the finite with the infinite**.
https://image.nostr.build/4f6b79a9179d818a951bf461ee5ff785cbe618ed376b4a56d92e77dcb34005bc.jpg
---
## **The Criticism: Were They Worshiping the Art?**
Not everyone agreed.
Some critics argued that **Christians were focusing too much on the art itself**, rather than the God it was meant to represent.
https://image.nostr.build/29afb401ef99d2b6c59b71d8534a5160c25d2ca468d81251ba0f55d033679490.jpg
But the Church’s response was clear:
> **"You are not meant to look *at* art, but *through* it.**
Art is not the **end goal**—it is a **gateway to something greater**.
A painting of Christ isn’t meant to be **worshiped**—it’s meant to draw the viewer into **His story, His sacrifice, and His message**.
This perspective didn’t just shape religious art. It **fundamentally changed** how we experience **all forms of art, even secular ones.**
---
## **To Infinity and Beyond: The Lasting Impact of Religious Art**
Christianity’s view of art—that it **should point beyond itself**—has so deeply influenced Western culture that we often **don’t even realize it**.
Think about how we experience **books, music, and movies**:
- **A great novel** inspires courage.
- **A powerful song** moves you to tears.
- **A gripping film** motivates you to keep going in life.
The best art **doesn’t just exist for its own sake**—it **transports you beyond the canvas, the page, or the screen**.
This idea mirrors the Incarnation itself: **an infinite God becoming finite to guide us back to the infinite**.
---
## **Tolkien, The Lord of the Rings, and the Incarnation of Art**
A perfect example? **J.R.R. Tolkien’s *The Lord of the Rings***.
Tolkien infused his story with **themes of brotherhood, heroism, and sacrifice**—all timeless, transcendental ideas. But instead of leaving them as abstract concepts, he **"incarnated" them into words on a page**—finite, tangible, and deeply relatable.
https://image.nostr.build/b120c4d7c7232cf226af65c33cb7fc494f495d50b8ad4593a58f3528fd0b71dc.jpg
His goal? To **turn the reader’s heart back to the infinite** by making them experience **these ideals in a concrete way**.
The same can be said for **any truly great art**.
It **doesn’t exist for itself**—it exists to move you, to inspire you, to challenge you.
And next time you step into a **cathedral**, gaze at a **masterpiece**, or listen to a **symphony**, remember:
You’re not supposed to simply **look at the art around you**—
You’re supposed to **look beyond it, into eternity**.
-

@ a95c6243:d345522c
2025-02-15 19:05:38
**Auf der diesjährigen Münchner** **[Sicherheitskonferenz](https://transition-news.org/in-munchen-der-realitat-ins-auge-sehen)** **geht es vor allem um die Ukraine.** Protagonisten sind dabei zunächst die US-Amerikaner. Präsident Trump schockierte die Europäer kurz vorher durch ein Telefonat mit seinem Amtskollegen Wladimir Putin, während Vizepräsident Vance mit seiner Rede über Demokratie und Meinungsfreiheit für versteinerte Mienen und Empörung sorgte.
**Die Bemühungen der Europäer um einen Frieden in der Ukraine** halten sich, gelinde gesagt, in Grenzen. Größeres Augenmerk wird auf militärische Unterstützung, die Pflege von Feindbildern sowie Eskalation gelegt. Der deutsche Bundeskanzler Scholz [reagierte](https://transition-news.org/gesucht-friedenskanzler) auf die angekündigten Verhandlungen über einen möglichen Frieden für die Ukraine mit der Forderung nach noch höheren «Verteidigungsausgaben». Auch die amtierende Außenministerin Baerbock hatte vor der Münchner Konferenz [klargestellt](https://archive.is/nUpYa):
> «Frieden wird es nur durch Stärke geben. (...) Bei Corona haben wir gesehen, zu was Europa fähig ist. Es braucht erneut Investitionen, die der historischen Wegmarke, vor der wir stehen, angemessen sind.»
**Die Rüstungsindustrie freut sich in jedem Fall über weltweit steigende Militärausgaben.** Die Kriege in der Ukraine und in Gaza tragen zu [Rekordeinnahmen](https://transition-news.org/kriege-sind-fur-waffenproduzenten-und-hedgefonds-f-king-good) bei. Jetzt «winkt die Aussicht auf eine jahrelange große Nachrüstung in Europa», auch wenn der Ukraine-Krieg enden sollte, so hört man aus Finanzkreisen. In der Konsequenz kennt «die Aktie des deutschen Vorzeige-Rüstungskonzerns Rheinmetall in ihrem Anstieg [offenbar gar keine Grenzen](https://finanzmarktwelt.de/rheinmetall-aktie-mit-mega-rally-nachruestung-und-1-000-euro-kursziel-339271/) mehr». «Solche Friedensversprechen» wie das jetzige hätten in der Vergangenheit zu starken Kursverlusten geführt.
**Für manche Leute sind Kriegswaffen und sonstige Rüstungsgüter Waren wie alle anderen,** jedenfalls aus der Perspektive von Investoren oder Managern. Auch in diesem Bereich gibt es Startups und man spricht von Dingen wie innovativen Herangehensweisen, hocheffizienten Produktionsanlagen, skalierbaren Produktionstechniken und geringeren Stückkosten.
**Wir lesen aktuell von Massenproduktion und gesteigerten Fertigungskapazitäten** für Kriegsgerät. Der Motor solcher Dynamik und solchen Wachstums ist die Aufrüstung, die inzwischen permanent gefordert wird. Parallel wird die Bevölkerung verbal eingestimmt und auf Kriegstüchtigkeit getrimmt.
**Das Rüstungs- und KI-Startup Helsing verkündete kürzlich** eine «dezentrale [Massenproduktion](https://www.trendingtopics.eu/helsing-kampfdrohnen-unicorn-startet-dezentrale-massenproduktion-fuer-ukrainekrieg/) für den Ukrainekrieg». Mit dieser Expansion positioniere sich das Münchner Unternehmen als einer der weltweit führenden Hersteller von Kampfdrohnen. Der nächste [«Meilenstein»](https://archive.is/eZsWP) steht auch bereits an: Man will eine Satellitenflotte im Weltraum aufbauen, zur Überwachung von Gefechtsfeldern und Truppenbewegungen.
**Ebenfalls aus München stammt das als** **[DefenseTech-Startup](https://www.trendingtopics.eu/arx-robotics-produktion/)** **bezeichnete Unternehmen** ARX Robotics. Kürzlich habe man in der Region die größte europäische Produktionsstätte für autonome Verteidigungssysteme eröffnet. Damit fahre man die Produktion von Militär-Robotern hoch. Diese Expansion diene auch der Lieferung der «größten Flotte unbemannter Bodensysteme westlicher Bauart» in die Ukraine.
**Rüstung boomt und scheint ein Zukunftsmarkt zu sein.** Die Hersteller und Vermarkter betonen, mit ihren Aktivitäten und Produkten solle die europäische Verteidigungsfähigkeit erhöht werden. Ihre Strategien sollten sogar «zum Schutz demokratischer Strukturen beitragen».
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/so-klingt-das-aufrustungs-business-startups-und-alte-hasen)*** erschienen.
-

@ d57360cb:4fe7d935
2025-02-15 17:35:54
Don’t focus on the end goal solely. If you do you’ll always find yourself empty handed. You wouldn’t want a fast forward button on your favorite song or your favorite movie. You don’t want to rush through your meals or the time you spend with important people in your life.
Notice this tendency to do things in order to get to the end. It’s sapping the depth of your existence from you.
Slow down. Life is lived in the in between. If you learn how to savor that, you’ll have a rich meaningful life.
-

@ f3873798:24b3f2f3
2025-02-15 17:30:50

Olá meus caros leitores, estou fazendo um guia voltados aos Brasileiros aqui do Nostr. Vejo que há muito conteúdo em inglês que infelizmente não é traduzido para o português. Por este motivo tomei a iniciativa de começa com este artigo.
Espero que gostem deste artigo, que tenham uma ótima leitura.
# Bem-vindos ao Mundo Nostr !!
Acredito que todos que estão aqui sabem um pouco sobre o Nostr e que é uma rede social descentralizada, local onde você pode postar sem medo de represarias governamentais [ditatoriais].
Mas, vocês conheçem como o Nostr funciona e todas as ferramentas que vocês têm disponível neste ecossistema?
Poisé, acho que não.
O Nostr é um protocolo de comunição descentralizada muito versátil, isso quer dizer que não está limitado a um tipo de "rede social", nele é possível fazer Blogs, streaming, podcast e até mesmo e-mails com autonomia total do usuário.
Meus caros, isso é liberdade total, sem ficar na mão de bigtech como Microsoft, Apple, Google.
Para ficar mais claro darei um exemplo para vocês:
Imagine você criando uma conta no Youtube, você deve aceitar as Diretrizes impostas pela google no uso do **SEU CANAL**, por mais que você tenha autonomia na produção do **SEU CONTEÚDO**, determinadas palavras e termos não podem ser usadas, ou seja, **O GOOGLE DETERMINA O QUE VOCÊ PODE OU NÃO FAZER NO SEU CANAL**.
Veja que é uma liberdade parcial no processo de criação de conteúdo.
Já no Nostr, o seu canal é completamente seu. Não há nenhuma entidade, empresa responsável pelo seu conteúdo a não ser você.

## O Mundo Nostr e sua funcionalidades
No nostr você terá acesso a uma diversidade de aplicativos para cada objetivo de uso.
Mas, antes de abordar sobre os diversos layouts e funcionalidades do Nostr é necessário aprender o básico deste universo.
> ***Em primeiro lugar:*** É necessário que vocês saibam que a partir do momento que vocês criaram um conta aqui, independente do "cliente" ou "distro como o pessoal que gosta de fazer analogia com o Linux", vocês recebem duas importantes chaves ! A **chave privada** e a **chave pública**.

A **Chave privada**, também chamada de chave secreta é o acesso ilimitado a sua conta, ou seja, é a partir dela que poderá produzir conteúdos em geral neste mundo. Ela te dará acesso a todos os rercusos do Nostr, portanto é importante que esteja muito segura.
A **Chave pública**, você ver como os outros usuários ver o seu perfil e o seu conteúdo. Ela é uma importante chave para que as pessoas possam ter acesso aos conteúdo que vocês públicam, ou seja, é atráves dela que você poderá compartilhar o seu perfil para que seu público tenha acesso ao seu mundo.
Dito isso vamos conhecer os apps e os chamados clientes Nostr.
### O que são clientes Nostr?
Clientes são as várias maneiras de interagir com o protocolo Nostr [fonte: Nostr.com]
É semelhante ao Sistema Operacional Linux que tem várias distro com diferentes layout para o mesmo Sistema.
Vejamos as principais para que vocês tenham uma noção da amplitude do protocolo.
- **Damus:** é um app para celulares IOS terem acesso ao NOSTR, tem formato de rede social, como Primal e o Amethyst.
- **Primal** é um app versátil serve tanto para celulares IOS, Android e PCs, também tem formato de rede social, porém você pode abrir uma carteira lightning bitcoin exclusiva deste app, facilitando muito os micropagamentos em satoshis pela rede.
- **Amethyst**, assim como o Damus é para o IOS o Amethsy é para o Android, sou suspeita para falar sobre este clientes, pois é o meu favorito. Além de várias possibilidades de edição de texto, ele tem diversas funcionalidade incluídas, como *****Guia Mercado***** onde você pode comercializar produtos pela rede, tem como intergrar com outros apps de streaming, formar grupos temáticos etc.
- **OXchat** não é exatamente uma rede social tem um layout que lembra um pouco o Whatsapp ou Telegram, serve como uma rede de interação instantânea, tem diversos recursos que achei mais interessante é a lousa, onde é possível interagir no grupo com desenhos etc.
- **Yakihonne** que é justamente o cliente que estou usando para construir este artigo. Como usuário posso dizer que ele tem um foco para criação de Blogs no protocolo Nostr, lembrando que cada cliente tem um layout diferente, ou seja, uso de templates para definir a estrutura do seu blog é meio limitado [ressalva assim como vocês sou iniciante do Nostr, pode ser que tenha como determinar um layout próprio, mas eu mesma não sei como]
Há muitos outros clientes disponíveis para acessar e experimentar e conhecer todos eu recomendo o site: [Nostrapps]( https://nostrapps.com/##all)
Agora que você leu este pequeno guia, se divirta aqui no nostr e não se esqueça de apoia a gente.
Até Mais !!
-

@ 5d4b6c8d:8a1c1ee3
2025-02-15 15:50:17
"Admit it. Sometimes you just need a big strong man." -Xander Harris
Buffy fans should appreciate that reference. It's one of my favorite lines to quote around the house, whenever my wife needs help opening jars.
Today, I said it to my daughter when she tried to open the orange juice herself, which earned a side-eye from the wife. It also led me to think about a possible research hypothesis.
## Idea
I've heard that grip strength has been declining in men, to the point where there's barely a difference anymore between men and women.
Is it possible that something as seemingly trivial as not being any more able to open jars, is reducing the rate of relationship formation?
This was one area where men have historically been able to clearly demonstrate some value.
## Empirical difficulties
I have no idea what the data looks like on either side of this question (grip strength or relationship formation), so I can't say much about specific data problems.
However, there is definitely going to be an issue with "the dreaded third thing". In particular, I'm concerned with how to isolate the impact of grip strength decline from other effects of testosterone decline. Ideally, we'd be able to do a longitudinal study of men, where their grip strengths and testosterone levels are recorded, as well as their relationship status over time.
Since there's no chance of doing that study, the best hope would be to put together some population level numbers over time and see if relationship formation rates still have a correlation with grip strength, after controlling for average testosterone levels.
-----
I hope you enjoyed this half-baked idea. I mentioned to @denlillaapan that it might be fun to share ideas like this on SN. In all likelihood, no one will ever take these ideas any further, but they still might prompt fun discussions.
originally posted at https://stacker.news/items/886699
-

@ 5d4b6c8d:8a1c1ee3
2025-02-15 15:03:10
Much to @realBitcoinDog's chagrin, we did eat out for Valentine's Day. Well, actually, we got some take out, but it definitely wasn't very healthy.
However, we did eat fairly early, so it didn't mess up my fasting.
## Reflections
Even though I had been regularly fasting before February, this Fast February exercise has improved the habit and led to some noticeable outcomes.
The first couple of days, I was kind of snacky. Because of the fiscal fast element of Fast February, I had to snack on whatever was around the house already. That turned out to be the "wrong" type of applesauce that our daughter refuses to eat. After those first few days, though, I really haven't been very snacky.
In fact, my general appetite is noticeably lower.
The most pronounced non-appetite related effect has been more vivid dreams (or at least more memorable dreams).
On the con side, I have felt a little stiffer and have been stretching more often to alleviate muscle tension.
## Score Card
Day 1: 14 hour fast (13 dry)
Day 2: 15 hour fast (14 dry)
Day 3: 17 hours (16 dry)
Day 4: 18 hours (17 dry)
Day 5: 18 hours (16 dry)
Day 6: 19 hours (16 dry)
Day 7: 16 hours (15 dry)
Day 8: 18 hours (17 dry)
Day 9: 17 hours (17 dry)
Day 10: 15 hours (13 dry)
Day 11: 20 hours (19 dry)
Day 12: 20 hours (17 dry)
Day 13: 16 hours (13 dry)
Day 14: 17 hours (15 dry)
Day 15: TBD (16 dry)
originally posted at https://stacker.news/items/886640
-

@ c43d6de3:a6583169
2025-02-15 14:18:07
You’re sitting in the 5am darkness of your living room.
The baby in your arms shifts and you’re afraid she might wake. It's hot, but you wouldn’t dare remove the blankets covering her body.
It seems impossible you could admire anyone more, then you hear the gentle snore of your exhausted wife creep from the gently cracked bedroom door.
You can only imagine what pain she went through to bring this precious girl to the world so you could be holding her now.

Your watch lights up. You dread the sight of that little alarm bell above the time 5:25 and a weight falls on you like a million tiny pieces of lead.
If only you had more time.
You wish you could take your baby girl with you. That way you would have all the time in the day with her and your wife could be left to rest.
You need to work.
You get up as gently as you can. Even so, baby girl shifts in your arms. Her eyes open slightly. The thought of returning a crying baby to your exhausted wife is distressing, it's just not fair.
Baby girl shifts again, her eyes open long enough to spot you in the faint glow of morning twilight and she smiles.
You hold your breath.
The smile remains on baby girl’s face but her eyes close and her head collapses into your chest. You return your baby to her mother’s side and admire them in their slumber.
You need to work. Nothing could ever go wrong with that house so long as you work to keep its walls strong. Some time, when you’re truly needed perhaps you’ll have the money saved up to take the desired time off.
In the absence of the love you share for your family. In the absence of the love others have for you, money loses some value.

If we equate money for what it is, the residue of time, we cannot divorce Love from Money.
It’s important to understand that Money won’t buy you Love and Love should never be exchanged for Money but Time cultivates Love.
These are some key things to keep in mind:
*Life without love is Suffocation*
*Life without money is stress and despair*
*Families are cultivated and grown with love and protected with money.*
*Money is the residue of time.*
Be it Bitcoin or a golden bullion, it exchanges days, hours, minutes, or seconds. What could you do instead if you had money?

-----------
Thank you for reading!
If this article resonated with you, let me know with a zap and share it with friends who might find it insightful.
Your help sends a strong signal to keep making content like this!
Interested in fiction? Follow nostr:npub1j9cmpzhlzeex6y85c2pnt45r5zhxhtx73a2twt77fyjwequ4l4jsp5xd49 for great short stories and serialized fiction.
More articles you might like from Beneath The Ink:
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqq2kvnfd094y26zkt9dxgmnw0fqkvhmfd4tng8wp0uv
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqq25yan2w39rsjj0dqk5ckn52ptxsc3nve8hw0aftmq
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqq2kjjzzfpjxvutjg33hjvpcw5cyjezyv9y5k0umm6k
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqqa9wefdwfjj6stvdsk57cnnv4ehxety94mkjarg94g8ymm8wfjhxuedg9hxgt2fw3ej6sm0wd6xjmn8946hxtfjvsuhsdnju045ml
-

@ 19220736:7578e0e9
2025-02-15 14:13:33
- The UK’s Serious Fraud Office issued its first Unexplained Wealth Order (UWO) in January 2025.
- UWOs force individuals to justify wealth or risk asset seizure, with expanded powers since 2023.
- Critics warn of its potential for abuse.
This January, the UK's Serious Fraud Office (SFO) [obtained](https://www.gov.uk/government/news/sfo-secures-first-unexplained-wealth-order-in-100m-fraud-case) its first Unexplained Wealth Order (UWO) to recover a Lake District property valued at approximately £1.5 million. The property is owned by Claire Schools, ex-wife of solicitor Timothy Schools, who was sentenced to 14 years in prison in 2022 for fraud. The UWO requires Ms. Schools to explain within 28 days how the property was acquired; failure to do so may lead to its seizure. This marks the Serious Fraud Office's first use of a UWO.
[UWOs](https://www.legislation.gov.uk/ukpga/2002/29/contents) are legal tools first introduced under the Proceeds of Crime Act in 2002, specifically in sections 362A to 362T, as amended by the Criminal Finances Act of 2017. UWOs empower the High Court (or the Court of Session in Scotland) to require individuals to explain the origin of assets over 50,000 GBP that appear disproportionate to their known income. If the individual cannot provide a satisfactory explanation, the assets may be subject to seizure by the government.
UWOs are civil orders and do not require a criminal conviction. Failure to comply with a UWO can make the property presumed recoverable in civil recovery proceedings. Additionally, the court may issue an interim freezing order to prevent the property from being dissipated while under investigation.
In 2023 this law was [updated](https://www.gov.uk/government/publications/economic-crime-transparency-and-enforcement-bill-2022-overarching-documents/factsheet-unexplained-wealth-order-reforms-web-accessible) to expand the scope of UWOs to apply to more individuals, lowering the burden of proof required to apply for UWOs, and allowing faster property seizure if an individual fails to respond or provide a satisfactory explanation. The process echoes witch trials that once accused, you must prove your innocence or forfeit.
The use of a UWO in this case highlights a growing effort by the UK to tackle illicit wealth, but it also raises concerns about the potential for abuse of power.
As explained by Kingsly Napley in [Lexology](https://www.lexology.com/library/detail.aspx?g=287a5b60-5612-4093-ba8f-272252c44cb5) *“The wide range of parties that can be targeted by UWOs, the reverse burden of proof that applies and the pressure on UK authorities to be seen to do more to stamp out suspected dirty money, means that many people may find themselves fighting to retain their assets.”*
With the use of more UWOs to come in the future, the real impact will continue to unfold in the coming years.
-

@ 7d33ba57:1b82db35
2025-02-15 10:59:27
“Phoneography” is photography using a smartphone instead of a traditional camera.
Here are some solid phoneography tips to enhance your shots:
1. **Master the Basics**
* Clean the lens – Phones are handled all day, and a smudged lens can ruin a shot.
* Tap to focus – Always tap on your subject to ensure it's sharp.
* Use gridlines – Turn on the rule of thirds grid for better composition.
2. **Lighting is Everything**
* Natural light > Flash – Soft morning or golden hour light creates the best results.
* Use reflections & shadows – They add depth and creativity to your shots.
* Adjust exposure manually – Tap and slide up/down to brighten or darken.
3. **Composition Tricks**
* Leading lines – Roads, walls, and fences guide the viewer's eye.
* Framing – Use windows, doors, or natural elements to frame your subject.
* Symmetry & patterns – Create balance and visual interest.
4. **Get Creative with Angles**
* Low angles – Make subjects look larger and dramatic.
* Overhead (flat lay) – Great for food, art, or storytelling shots.
* Close-ups & textures – Capture details for a unique perspective.
5. **Edit Like a Pro**
* Use editing apps – Lightroom Mobile, Snapseed, VSCO for better control.
* Don’t overdo filters – Subtle adjustments in contrast, color, and sharpness are best.
* Shoot in RAW (if your phone allows) – More flexibility in post-processing.
6. **Capture Motion & Time**
* Use burst mode – Great for action shots and selecting the best frame.
* Long exposure apps – Create light trails or smooth water effects.
* Slow-motion & time-lapse – Add dynamic storytelling elements.
7. **Know Your Phone’s Camera Features**
* Ultra-wide & telephoto lenses – Experiment with different focal lengths.
* Night mode – Helps capture better low-light shots without excessive noise.
* Portrait mode – Blurs the background for a professional look.
-

@ 0463223a:3b14d673
2025-02-15 08:26:21
*disclaimer - image has no relation to article.
I spend most the time moderately brain dead, how do I know this? By regularly recording my voice. I guess everyone likes to believe they’re pretty smart somehow but listening back to my voice, it is clear I am not. There’s more erms, ums, silences and failure to complete sentences than any fully formed thoughts, the closest to thoughts mostly trail away into silence. I’m not saying this to beat myself up, it’s an observation that I find quite amusing to be honest, It can be quite funny but it’s not exactly what peak performance looks like.
This isn’t ideal so I’m writing these longer form notes to help. Even trying this, I spend way more time blank than typing, I’m gently nudging my brain to try something… a complete thought, I’m not promising anything and it’s unlikely you’re going to read anything illuminating here. Sucks to be you right now right?
A lot of stuff happens doesn’t it? I’ve noticed that it sort of like, happens all the time, like woooaaahhh a thing just happened... and another... and another and they keep happening. I’m resisting to urge the write them out as they happen. I think that service is called The News right? It appears to be linear but I don’t think time is linear? At least not anything beyond a local scale…
I’m sitting in my shed and it's cold, I’ve turned the little heater on but with only 5W of power, it takes a while to heat the space, although once warm, this place holds the heat well, that’s the advantage of using some acoustic treatment for building materials.
I’m trying to evolve around a Value 4 Value economy. I’m struggling tbh. I’m trying things to create value. Over the course of 6 months I’ve generated £100 outside of my usual work. Using money as a metric I’m doing pretty badly. There are people who spend that on a single bottle of wine, and that’s a cheap bottle. But what is value anyway? I don’t know! Maybe someone could do a 16 hour long podcast called What Is Value? A bit like the What Is Money podcast but even longer. 16 hours seems like a sensible length. Were I to host it, 15 hours and 30 minutes would be silence. Maybe that’s a gig for you? I’m just trying out ideas here…
I do get value in other ways though. Playing records for an hour each day and sharing the experience does wonders for my mental health, It keeps my mind open to noises, which no doubt help me in the day job. I also get value from the people who share the time with me, that fact people return each morning suggests they do to. It’s very cool actually. Even if I can’t take credit for Miles Davis and Nightmares On Wax records. It’s still cool. I dig it a lot. I think I’ll keep doing it.
However, I’m still scratching my head how to earn more actual cash. Not that I’m obsessed or anything but it’s the best thing to exchange for food. I tried shoplifting as a kid and I was terrible at it. I didn’t invest the time in getting good at it, I just didn’t want to. More fool me right?
I’ve been doing the sums for setting up a space in town. Including rent, business rates, utilities and paying myself, I’m looking at finding £5,000 per month. Currently I earn between £1,500-£1,800 a month. Not a lot I know. I saw a post someone make looking for work online the other day, they were looking for 10x what I earn. They seem to be pretty good with computers… I bet they’re shit with Phil Collins’ emojis though. So I need to at least 3x the value I can provide in order to make the space work.
There’s probably people reading this thinking ‘get a job’. OK… how about no? I enjoy what I do, that doesn’t mean it’s always fun or not tough but I have a fair amount of autonomy. I don’t think I’m cut out for a ‘job’ but I definitely want to find things I can do which people are happy to swap for cash. This is a different thing all together. A job is targets and performance reviews etc. As I understand it, a person in a suit who earns slightly more than you, tells you if you’re any good on behalf of someone else. If you’re not, instead of telling you to fuck off, they tell you to do more or do better or they’ll tell you to fuck off, trapping you in some weird mind game. And it’s not even their own mind game, it’s a mind game someone else has trapped them into. These chains of mind games can be extremely long and can go through many, many people, literally billions of people find themselves trapped in this weird mind game. It doesn’t sound like my bag at all. I liked the bag James Brown had. That bag was cool.
So I’ll keep thinking… I’m certainly not giving up.
-

@ f916334d:7d1c88d5
2025-02-15 08:10:52
In recent years, I have thought a lot about how we can free ourselves from centralized systems and build a parallel world where we have greater control over our own lives. I became interested in crypto in 2019 due to ideas about decentralization and separating money from the state. Last year, I realized Bitcoin's superiority as both a store of value and a medium of exchange, leading me to sell all other assets and dedicate my focus entirely to it. This is not my first Nostr account, but I created this new identity with the purpose of sharing my thoughts and ideas in a more in-depth and long-form format.
Bitcoin provides us with the opportunity to exit the old system and build a new economy. It’s not just about money but about creating and using alternative systems on multiple levels: economy, social networks, education, health, privacy, and self-sufficiency. By gradually shifting parts of our lives to more decentralized and reliable systems, we can reduce our exposure to centralized institutions and build a future where individuals have greater freedom and autonomy.
### Why This Matters
The world we live in is characterized by increased surveillance, censorship, and centralized control over both information and the economy. By actively choosing alternative systems, we can build an ecosystem where individual freedom is at the center. This post serves as an introduction to some of the most important areas where I´m trying make changes in my own life.
### Economic Systems
The traditional financial system is built on central banks, government regulations, and inflationary monetary policy. Bitcoin offers a way out by being a decentralized, borderless, and censorship-resistant currency. Transitioning to a Bitcoin-based economy involves:
- Trading directly with Bitcoin instead of fiat currency.
- Use Bitcoin-only exchanges when investing in Bitcoin, such as **[Strike](https://strike.me/)**, **[Relai](https://relai.app/)**, **[Bull Bitcoin](https://bullbitcoin.com/)** and **[River](https://river.com/)** (US only). I prefer **Relai** as it is non-custodial, includes a built-in Lightning wallet, and is a European company. I have had good experiences with **Strike** due to its simplicity, though I have not yet tried the other platforms but have heard positive feedback about them. For peer-to-peer trading, [**Bisq**](https://bisq.network/) and **[RoboSats](https://robosats.com/)** are excellent alternatives that allow users to trade Bitcoin in a decentralized and private manner.
- Using alternative marketplaces based on peer-to-peer trade (e.g., [Shopstr](https://shopstr.store/), [LightningNetwork+ Market](https://lightningnetwork.plus/market)). Supporting and creating circular economies where services and products are bought and sold directly for Bitcoin. I want to explore peer-to-peer trading more and would appreciate any tips or recommendations. 
- Utilizing the **Lightning Network** for fast and low-cost Bitcoin transactions. I use **[Alby Hub](https://getalby.com/)** to host my own Lightning wallet, which I then connect to **[Zeus](https://zeusln.app/)** on my mobile for full Lightning control.
- I use **[Umbrel](https://umbrel.com/)** to run my own **Bitcoin and Lightning node**, which allows me to achieve full sovereignty over my funds and transactions. Another alternative for self-hosting a node is **[Start9](https://start9.com/)**, which offers a similar approach to decentralization and privacy. Using a self-hosted node enables seamless Lightning payments, improved privacy, and full control over transactions. It also allows me to verify my own transactions and contribute to the decentralization of the network.
- **Being your own bank** by securely storing your Bitcoin in **hardware wallets** such as **[Jade](https://blockstream.com/jade/)** (my choice), **[Coldcard](https://coldcard.com/)**, or **[BitBox](https://shiftcrypto.ch/bitbox02/)**. These devices allow you to safely store your private keys offline, protecting your funds from hacks and centralized failures. This concept fascinated me the most when I first became interested in crypto—the idea of not having to rely on a third party to safeguard my assets. Ironically, this also led me into the DeFi rabbit hole for a while. 😅
### Social Systems and Digital Freedom
Big Tech dominates digital communication and collects vast amounts of user data. A parallel social ecosystem can be built through:
- Using decentralized networks like **[Nostr](https://nostr.com/)** (I prefer [Yakihonne](https://yakihonne.com/), [Primal](https://primal.net/), and [Freerse](https://freerse.com/) as clients).
- Participating in physical communities and local initiatives to reduce dependence on online platforms. However, I have found challenges in this area, as many local organizations and community groups rely heavily on mainstream apps for communication.
- Using and supporting open-source software to strengthen this ecosystem. Closed systems often lack transparency, increase the risk of surveillance and censorship. By choosing open-source, we gain more transparency, control, and security. I am a complete beginner in this area and am focusing on finding better alternatives, so I am always open to advice and recommendations.
These are some of the alternatives I am currently exploring and using:
- **Communication:** [Signal](https://signal.org/), [Matrix](https://matrix.org/).
- **Browsers:** [Firefox](https://www.mozilla.org/en-US/firefox/), [Brave](https://brave.com/).
- **Productivity:** [LibreOffice](https://www.libreoffice.org/), [Joplin](https://joplinapp.org/), [Nextcloud](https://nextcloud.com/) and [Obsidian](https://obsidian.md/).
- **Privacy-focused services:** [Proton](https://proton.me/) and [SimpleX Chat](https://simplex.chat/)
### Health, Nutrition, and Embracing a Low Time Preference
Freedom is not only about financial independence and digital sovereignty; it also includes physical and mental well-being. A strong body and mind enable long-term resilience. I try to follow these principles by prioritizing **nutrient-dense whole foods**, avoiding processed "fiat food," and embracing an **active lifestyle**, but I also stay mindful not to take it to extremes like carnivore or veganism. I do my best to choose regenerative farming and local food sources to support sustainable communities outside of centralized supply chains. Additionally, embracing a **low time preference mindset** enhances decision-making in finance, education, health, and personal development. This approach promotes patience, discipline, and a focus on sustainable, long-term success rather than immediate rewards. Since becoming a father, I have thought about this even more, wanting to build a strong foundation and leave a meaningful legacy for the future. By prioritizing long-term stability over short-term convenience, we gain greater autonomy and resilience in all areas of life. This principle is deeply embedded in Bitcoin culture and extends to all aspects of life.
### Education
State-run school systems have long been the norm, but they suffer from standardization, political control, and a lack of individual adaptation. I make a conscious effort to focus on self-directed learning and critical thinking as a way to develop a deeper understanding and independence in both my personal and professional life. We have chosen to enroll our son in a private school that aligns with our values and that we actively help manage. Alternative educational paths can include:
- **Self-directed learning** through platforms like [Khan Academy](https://www.khanacademy.org/), [Coursera](https://www.coursera.org/), and [Saylor Academy](https://www.saylor.org/).
- **Strengthening critical thinking** by actively questioning information, exploring different perspectives, and applying source critique methods.
- **Learning through experience and mentorship**, where practical skills and real-world application take precedence over purely theoretical knowledge and traditional grading systems.
- **Homeschooling** as an alternative for families who want more control over their children's education. While I am not fully convinced if it is the right path for everyone, it does offer a way to tailor learning experiences to individual needs and values.
### Strategies for Transitioning to Parallel Systems
Transitioning to greater freedom requires a step-by-step approach. The goal is to gradually detach from centralized systems and build self-sovereignty across finance, communication, health, and learning. Lately, this journey has really gotten me excited and made me more optimistic about the future.
1. **Economy:** Start accepting Bitcoin for small services, use the Lightning Network for micropayments.
2. **Social:** Use Nostr as your social media solution and experiment with Matrix and other decentralized apps to enhance your digital autonomy.
3. **Technology:** Prioritize the use of open-source software (OSS) whenever possible.
4. **Education:** Identify an area you want to learn more about and test an alternative learning method outside the state system.
5. **Privacy:** Begin using privacy-focused services for email, messaging, and browsing.
6. **Running a Node:** Set up your own Bitcoin and Lightning node using Umbrel or Start9 to gain full control over your transactions and privacy.
7. **Self-Custody:** Secure your Bitcoin with a hardware wallet to ensure full ownership and protection.
8. **Health:** Focus on whole foods, movement, and personal well-being as key aspects of independence.
9. **Embrace a low time preference:** To delay gratification and achieve greater long-term rewards.
10. **Spreading Knowledge:** Share your experiences and lessons with others to encourage more people to understand and engage in parallel systems. By educating and inspiring those around us, we can collectively build a stronger decentralized future.
### The Future of Parallel Systems
Although many of the technological solutions are still in their infancy, many of the underlying principles – such as circular economies, physical communities, and local initiatives – are based on old and proven methods that have sometimes been forgotten. The more people choose to participate, the stronger they become. By choosing decentralized and self-governed alternatives, we can create a future where we have greater control over our own lives and reduce dependence on institutions that do not have our best interests at heart. One of my biggest challenges is spreading this perspective within my local community. I often find myself in conversations where people don't even see centralization as a problem, which makes it difficult to spark interest in alternatives. I sometimes struggle with finding alternatives that are both private and easy to use. While I see the value of OSS, I also understand why many stick to mainstream solutions. I plan to delve deeper into the various topics covered in this text in future posts, exploring their practical applications and challenges in greater detail.
---
If you are reading this, you have already taken the first step by joining Nostr – which is a strong start! What does your journey look like? What tools do you use to become more independent? Share your experiences and tips!
\#Bitcoin #SelfSovereignty #Decentralization #Freedom #Technology #OpenSource #Privacy #LightningNetwork #Nostr #LowTimePreference #Health #Nutrition #CircularEconomy
-

@ da0b9bc3:4e30a4a9
2025-02-15 07:47:12
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/886437
-

@ d360efec:14907b5f
2025-02-15 05:55:28
**ภาพรวม BTCUSDT (OKX):**
Bitcoin (BTCUSDT) แสดงความผันผวนอย่างต่อเนื่อง แนวโน้มหลักในระยะยาว (TF Day) ยังคงเป็นขาขึ้น แต่ระยะกลาง (TF 4H) เริ่มอ่อนแรง และระยะสั้น (TF 15m) กลับตัวเป็นขาลง ทำให้เกิดความขัดแย้งระหว่าง Timeframes
**วิเคราะห์ทีละ Timeframe:**
**(1) TF Day (รายวัน):**

* **แนวโน้ม:** ขาขึ้น (Uptrend)
* **SMC:**
* Higher Highs (HH) และ Higher Lows (HL)
* Break of Structure (BOS) ด้านบน
* **EMA:**
* ราคาอยู่เหนือ EMA 50 (สีเหลือง) และ EMA 200 (สีขาว)
* EMA 50 และ EMA 200 ยังคงเรียงตัวแบบ Golden Cross
* **Money Flow (LuxAlgo):**
* สีเขียวเป็นส่วนใหญ่ แสดงถึงแรงซื้อที่ยังคงมีอยู่
* มีแท่งสีแดงแทรกบ้าง แสดงถึงการขายทำกำไร
* **Volume Profile:**
* Volume หนาแน่นที่บริเวณต่ำกว่าราคาปัจจุบัน (92,000 - 94,000)
* **แท่งเทียน:**
* แท่งเทียนล่าสุดเป็นสีแดง แสดงถึงแรงขาย
* **แนวรับ:** EMA 50, EMA 200, บริเวณ 92,000-94,000
* **แนวต้าน:** 109,998.9 (High เดิม)
* **สรุป:** แนวโน้มหลักยังเป็นขาขึ้น แต่เริ่มมีแรงขายเข้ามา
**(2) TF4H (4 ชั่วโมง):**

* **แนวโน้ม:** ขาขึ้น (Uptrend) เริ่มอ่อนแรงลง, มีการพักตัว
* **SMC:**
* Higher Highs (HH) และ Higher Lows (HL) เริ่มไม่ชัดเจน
* Break of Structure (BOS) ด้านบน
* Equal Highs (EQH) ที่บริเวณ High เดิม
* **EMA:**
* ราคาหลุด EMA 50 ลงมาแล้ว
* EMA 200 เป็นแนวรับถัดไป
* **Money Flow (LuxAlgo):**
* สีเขียวและแดงผสมกัน, แท่งสีแดงเริ่มยาวขึ้น แสดงถึงแรงขายที่เข้ามา
* **Volume Profile:**
* Volume สูง
* **แท่งเทียน:**
* แท่งเทียนล่าสุดเป็นสีแดง แสดงถึงแรงขาย
* **แนวรับ:** EMA 200, บริเวณ 92,000-94,000
* **แนวต้าน:** EMA 50, บริเวณ High เดิม
* **สรุป:** แนวโน้มขาขึ้นเริ่มอ่อนแรง, แรงขายเริ่มเข้ามา, EMA 50 หลุด
**(3) TF15 (15 นาที):**

* **แนวโน้ม:** ขาลง (Downtrend)
* **SMC:**
* Lower Highs (LH) และ Lower Lows (LL)
* Break of Structure (BOS) ด้านล่าง
* **EMA:**
* EMA 50 และ EMA 200 เป็นแนวต้าน
* **Money Flow (LuxAlgo):**
* สีแดงเป็นส่วนใหญ่ แสดงถึงแรงขาย
* **Volume Profile:**
* Volume ค่อนข้างเบาบาง
* **แนวรับ:** บริเวณ Low ล่าสุด
* **แนวต้าน:** EMA 50, EMA 200, บริเวณ High ก่อนหน้า
* **สรุป:** แนวโน้มขาลง, แรงขายมีอิทธิพล
**สรุปภาพรวมและกลยุทธ์ (BTCUSDT):**
* **แนวโน้มหลัก (Day):** ขาขึ้น
* **แนวโน้มรอง (4H):** ขาขึ้น (อ่อนแรง)
* **แนวโน้มระยะสั้น (15m):** ขาลง
* **Money Flow:**
* Day: แรงซื้อยังคงมี
* 4H: แรงขายเริ่มเข้ามา
* 15m: แรงขายมีอิทธิพล
* **กลยุทธ์:**
1. **Wait & See (ดีที่สุด):** รอความชัดเจน
2. **Buy on Dip (Day, 4H) - *เสี่ยงสูงมาก*:** ต้องรอสัญญาณกลับตัวใน TF15
3. **Short (15m, เสี่ยงสูง):** ถ้าไม่สามารถ Breakout EMA/แนวต้านได้
**คำแนะนำ:**
* **ความขัดแย้งของ Timeframes:** ยังคงมีอยู่
* **Money Flow:** Day เป็นบวก, 4H เริ่มเป็นลบ, 15m เป็นลบ
* **EMA 50 (TF4H):** หลุดลงมาแล้ว
* **ถ้าไม่แน่ใจ อย่าเพิ่งเข้าเทรด**
**Disclaimer:** การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-

@ ed5774ac:45611c5c
2025-02-15 05:38:56
**Bitcoin as Collateral for U.S. Debt: A Deep Dive into the Financial Mechanics**
The U.S. government’s proposal to declare Bitcoin as a 'strategic reserve' is a calculated move to address its unsustainable debt obligations, but it threatens to undermine Bitcoin’s original purpose as a tool for financial freedom. To fully grasp the implications of this plan, we must first understand the financial mechanics of debt creation, the role of collateral in sustaining debt, and the historical context of the petro-dollar system. Additionally, we must examine how the U.S. and its allies have historically sought new collateral to back their debt, including recent attempts to weaken Russia through the Ukraine conflict.
**The Vietnam War and the Collapse of the Gold Standard**
The roots of the U.S. debt crisis can be traced back to the Vietnam War. The war created an unsustainable budget deficit, forcing the U.S. to borrow heavily to finance its military operations. By the late 1960s, the U.S. was spending billions of dollars annually on the war, leading to a significant increase in public debt. Foreign creditors, particularly France, began to lose confidence in the U.S. dollar’s ability to maintain its value. In a dramatic move, French President Charles de Gaulle sent warships to New York to demand the conversion of France’s dollar reserves into gold, as per the Bretton Woods Agreement.
This demand exposed the fragility of the U.S. gold reserves. By 1971, President Richard Nixon was forced to suspend the dollar’s convertibility to gold, effectively ending the Bretton Woods system. This move, often referred to as the "Nixon Shock," declared the U.S. bankrupt and transformed the dollar into a fiat currency backed by nothing but trust in the U.S. government. The collapse of the gold standard marked the beginning of the U.S.’s reliance on artificial systems to sustain its debt. With the gold standard gone, the U.S. needed a new way to back its currency and debt—a need that would lead to the creation of the petro-dollar system.
**The Petro-Dollar System: A New Collateral for Debt**
In the wake of the gold standard’s collapse, the U.S. faced a critical challenge: how to maintain global confidence in the dollar and sustain its ability to issue debt. The suspension of gold convertibility in 1971 left the dollar as a fiat currency—backed by nothing but trust in the U.S. government. To prevent a collapse of the dollar’s dominance and ensure its continued role as the world’s reserve currency, the U.S. needed a new system to artificially create demand for dollars and provide a form of indirect backing for its debt.
The solution came in the form of the petro-dollar system. In the 1970s, the U.S. struck a deal with Saudi Arabia and other OPEC nations to price oil exclusively in U.S. dollars. In exchange, the U.S. offered military protection and economic support. This arrangement created an artificial demand for dollars, as countries needed to hold USD reserves to purchase oil. Additionally, oil-exporting nations reinvested their dollar revenues in U.S. Treasuries, effectively recycling petro-dollars back into the U.S. economy. This recycling of petrodollars provided the U.S. with a steady inflow of capital, allowing it to finance its deficits and maintain low interest rates.
To further bolster the system, the U.S., under the guidance of Henry Kissinger, encouraged OPEC to dramatically increase oil prices in the 1970s. The 1973 oil embargo and subsequent price hikes, masterminded by Kissinger, quadrupled the cost of oil, creating a windfall for oil-exporting nations. These nations, whose wealth surged significantly due to the rising oil prices, reinvested even more heavily in U.S. Treasuries and other dollar-denominated assets. This influx of petrodollars increased demand for U.S. debt, enabling the U.S. to issue more debt at lower interest rates. Additionally, the appreciation in the value of oil—a critical global commodity—provided the U.S. banking sector with the necessary collateral to expand credit generation. Just as a house serves as collateral for a mortgage, enabling banks to create new debt, the rising value of oil boosted the asset values of Western corporations that owned oil reserves or invested in oil infrastructure projects. This increase in asset values allowed these corporations to secure larger loans, providing banks with the collateral needed to expand credit creation and inject more dollars into the economy. However, these price hikes also caused global economic turmoil, disproportionately affecting developing nations. As the cost of energy imports skyrocketed, these nations faced mounting debt burdens, exacerbating their economic struggles and deepening global inequality.
**The Unsustainable Debt Crisis and the Search for New Collateral**
Fast forward to the present day, and the U.S. finds itself in a familiar yet increasingly precarious position. The 2008 financial crisis and the 2020 pandemic have driven the U.S. government’s debt to unprecedented levels, now exceeding $34 trillion, with a debt-to-GDP ratio surpassing 120%. At the same time, the petro-dollar system—the cornerstone of the dollar’s global dominance—is under significant strain. The rise of alternative currencies and the shifting power dynamics of a multipolar world have led to a decline in the dollar’s role in global trade, particularly in oil transactions. For instance, China now pays Saudi Arabia in yuan for oil imports, while Russia sells its oil and gas in rubles and other non-dollar currencies. This growing defiance of the dollar-dominated system reflects a broader trend toward economic independence, as nations like China and Russia seek to reduce their reliance on the U.S. dollar. As more countries bypass the dollar in trade, the artificial demand for dollars created by the petro-dollar system is eroding, undermining the ability of US to sustain its debt and maintain global financial hegemony.
In search of new collateral to carry on its unsustainable debt levels amid declining demand for the U.S. dollar, the U.S., together with its Western allies—many of whom face similar sovereign debt crises—first attempted to weaken Russia and exploit its vast natural resources as collateral. The U.S. and its NATO allies used Ukraine as a proxy to destabilize Russia, aiming to fragment its economy, colonize its territory, and seize control of its natural resources, estimated to be worth around $75 trillion. By gaining access to these resources, the West could have used them as collateral for the banking sector, enabling massive credit expansion. This, in turn, would have alleviated the sovereign debt crisis threatening both the EU and the U.S. This plan was not unprecedented; it mirrored France’s long-standing exploitation of its former African colonies through the CFA franc system.
For decades, France has maintained economic control over 14 African nations through the CFA franc, a currency pegged to the euro and backed by the French Treasury. Under this system, these African countries are required to deposit 50% of their foreign exchange reserves into the French Treasury, effectively giving France control over their monetary policy and economic sovereignty. This arrangement allows France to use African resources and reserves as implicit collateral to issue debt, keeping its borrowing costs low and ensuring demand for its bonds. In return, African nations are left with limited control over their own economies, forced to prioritize French interests over their own development. This neo-colonial system has enabled France to sustain its financial dominance while perpetuating poverty and dependency in its former colonies.
Just as France’s CFA franc system relies on the economic subjugation of African nations to sustain its financial dominance, the U.S. had hoped to use Russia’s resources as a lifeline for its debt-ridden economy. However, the plan ultimately failed. Russia not only resisted the sweeping economic sanctions imposed by the West but also decisively defeated NATO’s proxy forces in Ukraine, thwarting efforts to fragment its economy and seize control of its $75 trillion in natural resources. This failure left the U.S. and its allies without a new source of collateral to back their unsustainable debt levels. With this plan in ruins, the U.S. has been forced to turn its attention to Bitcoin as a potential new collateral for its unsustainable debt.
**Bitcoin as Collateral: The U.S. Government’s Plan**
The U.S. government’s plan to declare Bitcoin as a strategic reserve is a modern-day equivalent of the gold standard or petro-dollar system. Here’s how it would work:
1. Declaring Bitcoin as a Strategic Reserve: By officially recognizing Bitcoin as a reserve asset, the U.S. would signal to the world that it views Bitcoin as a store of value akin to gold. This would legitimize Bitcoin in the eyes of institutional investors and central banks.
2. Driving Up Bitcoin’s Price: To make Bitcoin a viable collateral, its price must rise significantly. The U.S. would achieve this by encouraging regulatory clarity, promoting institutional adoption, and creating a state-driven FOMO (fear of missing out). This would mirror the 1970s oil price hikes that bolstered the petro-dollar system.
3. Using Bitcoin to Back Debt: Once Bitcoin’s price reaches a sufficient level, the U.S. could use its Bitcoin reserves as collateral for issuing new debt. This would restore confidence in U.S. Treasuries and allow the government to continue borrowing at low interest rates.
The U.S. government’s goal is clear: to use Bitcoin as a tool to issue more debt and reinforce the dollar’s role as the global reserve currency. By forcing Bitcoin into a store-of-value role, the U.S. would replicate the gold standard’s exploitative dynamics, centralizing control in the hands of large financial institutions and central banks. This would strip Bitcoin of its revolutionary potential and undermine its promise of decentralization. Meanwhile, the dollar—in digital forms like USDT—would remain the primary medium of exchange, further entrenching the parasitic financial system.
Tether plays a critical role in this strategy. As explored in my previous article (here: [https://ersan.substack.com/p/is-tether-a-bitcoin-company]), Tether helps sustaining the current financial system by purchasing U.S. Treasuries, effectively providing life support for the U.S. debt machine during a period of declining demand for dollar-denominated assets. Now, with its plans to issue stablecoins on the Bitcoin blockchain, Tether is positioning itself as a bridge between Bitcoin and the traditional financial system. By issuing USDT on the Lightning Network, Tether could lure the poor in developing nations—who need short-term price stability for their day to day payments and cannot afford Bitcoin’s volatility—into using USDT as their primary medium of exchange. This would not only create an artificial demand for the dollar and extend the life of the parasitic financial system that Bitcoin was designed to dismantle but would also achieve this by exploiting the very people who have been excluded and victimized by the same system—the poor and unbanked in developing nations, whose hard-earned money would be funneled into sustaining the very structures that perpetuate their oppression.
Worse, USDT on Bitcoin could function as a de facto central bank digital currency (CBDC), where all transactions can be monitored and sanctioned by governments at will. For example, Tether’s centralized control over USDT issuance and its ties to traditional financial institutions make it susceptible to government pressure. Authorities could compel Tether to implement KYC (Know Your Customer) rules, freeze accounts, or restrict transactions, effectively turning USDT into a tool of financial surveillance and control. This would trap users in a system where every transaction is subject to government oversight, effectively stripping Bitcoin of its censorship-resistant and decentralized properties—the very features that make it a tool for financial freedom.
In this way, the U.S. government’s push for Bitcoin as a store of value, combined with Tether’s role in promoting USDT as a medium of exchange, creates a two-tiered financial system: one for the wealthy, who can afford to hold Bitcoin as a hedge against inflation, and another for the poor, who are trapped in a tightly controlled, surveilled digital economy. This perpetuates the very inequalities Bitcoin was designed to dismantle, turning it into a tool of oppression rather than liberation.
**Conclusion: Prolonging the Parasitic Financial System**
The U.S. government’s plan to declare Bitcoin as a strategic reserve is not a step toward financial innovation or freedom—it is a desperate attempt to prolong the life of a parasitic financial system that Bitcoin was created to replace. By co-opting Bitcoin, the U.S. would gain a new tool to issue more debt, enabling it to continue its exploitative practices, including proxy wars, economic sanctions, and the enforcement of a unipolar world order.
The petro-dollar system was built on the exploitation of oil-exporting nations and the global economy. A Bitcoin-backed system would likely follow a similar pattern, with the U.S. using its dominance to manipulate Bitcoin’s price and extract value from the rest of the world. This would allow the U.S. to sustain its current financial system, in which it prints money out of thin air to purchase real-world assets and goods, enriching itself at the expense of other nations.
Bitcoin was designed to dismantle this parasitic system, offering an escape hatch for those excluded from or exploited by traditional financial systems. By declaring Bitcoin a strategic reserve, the U.S. government would destroy Bitcoin’s ultimate purpose, turning it into another instrument of control. This is not a victory for Bitcoin or bitcoiners—it is a tragedy for financial freedom and global equity.
The Bitcoin strategic reserve plan is not progress—it is a regression into the very system Bitcoin was designed to dismantle. As bitcoiners, we must resist this co-option and fight to preserve Bitcoin’s original vision: a decentralized, sovereign, and equitable financial system for all. **This means actively working to ensure Bitcoin is used as a medium of exchange, not just a store of value, to fulfill its promise of financial freedom.**
-

@ c582af78:698069cc
2025-02-15 04:20:11
### **1. The Battle of Cannae (216 BC) – Rome’s Darkest Hour, and Its Defining Moment**
During the **Second Punic War**, Hannibal of Carthage faced a Roman army that **outnumbered his forces 2-to-1**. Instead of retreating, he met them head-on with a brilliant tactical maneuver. His army **encircled and annihilated** the Romans, slaughtering over **50,000 soldiers in a single day**—one of the most devastating defeats in Roman history.
https://image.nostr.build/a2ccbcc267d3bc30d24d80873612ba70d8f69a00bdd6a90fc3682f91d87eb956.jpg
Any other nation would have surrendered. But Rome refused. Instead, it adapted, shifting to a **war of attrition**, avoiding direct confrontations, and gradually wearing down Hannibal’s forces.
Cannae became a paradox—it was Rome’s **greatest defeat**, yet it forged the **Roman spirit** of perseverance and relentless determination. Rome ultimately turned the tide, **defeated Carthage**, and emerged as the dominant power in the Mediterranean.
https://image.nostr.build/9c29ef6b6cebd916c105271927adaa5fe4e668a6078595390936cd7898464c31.jpg
Hannibal’s tactics at Cannae **changed warfare forever**. His use of battlefield deception and encirclement is still studied in military academies today, and no commander worth his salt is unfamiliar with **Hannibal’s masterpiece at Cannae**.
---
### **2. The Battle of Marathon (490 BC) – The Birth of Western Civilization**
When **King Darius I of Persia** invaded Greece, he sought to **crush Athens** and expand Persian control. The Athenians, vastly outnumbered, faced what seemed like certain defeat. But instead of waiting for the Persians to march inland, they **struck first**.
Using superior tactics and their knowledge of the terrain, the Athenians **routed the Persian army**, sending them fleeing to their ships.
https://image.nostr.build/63c4bdba98f7a2a4ccb3e2a8edcd43596b595284245f3a3395a3c53f51124558.jpg
This **stunning victory** didn’t just preserve Greek independence—it safeguarded the **nascent idea of democracy**. Without it, the **Golden Age of Greece**—the era that produced **Socrates, the Parthenon, and the foundations of Western philosophy and governance**—might never have happened.
Marathon remains a symbol of **strategy and courage overcoming overwhelming odds**. Without it, the world might never have known **Athenian democracy, Greek philosophy, or the cultural foundations of the West**.
https://image.nostr.build/017a314c11238433545977e681801904b8b702e1b568ff6c9438e8577721a243.jpg
---
### **3. The Battle of Hastings (1066) – The Making of Modern England**
In **1066**, William of Normandy led his army across the English Channel to claim the throne of England. At **the Battle of Hastings**, he faced **King Harold II’s Anglo-Saxon forces** in a brutal fight that would decide the future of the island.
William’s forces employed **innovative strategies**, including a **feigned retreat**, which broke Harold’s defensive lines. Harold was killed, and with him, Anglo-Saxon rule in England.
https://image.nostr.build/110045a76be0577defc5d9b884e5d811235f1992941847ca8a1b1a7b80c9bf79.jpg
Hastings **completely transformed England**. The Normans introduced **a new ruling elite**, reshaped governance, and left an enduring mark on the English language. **Old English fused with Norman French**, laying the foundation for **modern English**.
Beyond language, the Norman conquest brought England **closer to continental Europe**, influencing its **legal systems, architecture, and culture for centuries**. Hastings wasn’t just a military victory—it was a **cultural watershed** that forever changed England and, by extension, the world.
https://image.nostr.build/2799f91505263370ffb3a899ea4c79a65894f56673b81a024b206e013f3e73a9.jpg
---
### **4. The Battle of Lepanto (1571) – Christendom Strikes Back**
By the **late 16th century**, the **Ottoman Empire** had become a **dominant naval power**, threatening Christian trading colonies and the stability of **Europe’s maritime trade routes**.
In **1570**, the Ottomans besieged the Venetian-held **island of Cyprus**. After an **11-month siege**, the starving Venetian garrison **surrendered under promises of safe passage**—but the Ottomans **betrayed them, imprisoned the soldiers, and flayed their commander alive**.
In response, the **Papal States, Spain, Venice, Genoa, and other Christian powers** set aside their rivalries and **formed the Holy League**. In a climactic naval showdown, over **130,000 men** engaged in a **fierce battle** that ultimately ended in a **decisive Christian victory**.
https://image.nostr.build/0f233ec50e817874e1e6711a1e035b436e206b032d8cac8b33a68230beb20e1b.jpg
Lepanto **halted Ottoman expansion** into the western Mediterranean and reestablished European control over crucial sea routes. Among the soldiers that day was **Miguel de Cervantes**, who was wounded and lost the use of his left arm. His experience shaped his literary masterpiece, **Don Quixote**, further embedding Lepanto’s legacy in **European art and culture**.
---
### **5. The Battle of Trafalgar (1805) – Britain Secures Global Supremacy**
In **1805**, Napoleon sought to **break British naval dominance** by uniting the French and Spanish fleets against Admiral **Horatio Nelson**. The **Battle of Trafalgar** would decide the fate of European power at sea.
Outnumbered, Nelson devised an **unorthodox strategy**, splitting his fleet into two **perpendicular columns** to punch through enemy lines. The result? **A decisive British victory**—**22 enemy ships destroyed** without a single British vessel lost.
Trafalgar didn’t just **shatter Napoleon’s naval ambitions**—it secured **Britain’s command of the seas for over a century**. This naval dominance paved the way for the **Pax Britannica**, allowing Britain to expand its **empire** and maintain global influence well into the 20th century.
https://image.nostr.build/bf5e00f020a0755ea50c1bf1def870cfb226cb5ad18a91445eddac8389b2f05f.jpg
But Trafalgar’s legacy is also bittersweet—**Nelson was fatally shot in battle**. As he lay dying, he was informed of the victory. His last words?
> *“Now I am satisfied. Thank God, I have done my duty.”*
Nelson’s death turned him into a **national hero**, and Trafalgar became a defining moment in British history.
---
## **More Than Just Battles**
These five battles weren’t just **clashes of armies**—they were **turning points that shaped the world**.
- **Cannae** forged Rome’s resilience.
- **Marathon** preserved Greek democracy.
- **Hastings** reshaped England’s culture and language.
- **Lepanto** altered the balance of power in the Mediterranean.
- **Trafalgar** secured British naval dominance for a century.
Each of these battles **reshaped civilizations**—proving that history isn’t just written in words, but also in **blood, steel, and strategy**.
-

@ 8412613c:df65608a
2025-02-15 04:09:30
> The spiritual foundations of humanity were laid simultaneously and independently... And these are the foundations upon which humanity still subsists today. - Karl Jaspers.
The philosopher Karl Jaspers coined the term “**Axial Age**” to describe the period from the 8th to the 3rd century BCE. This era witnessed the emergence of major world philosophical and religious traditions, with key figures such as Socrates, Plato, and Aristotle in Greece; Buddha and various schools of Hindu philosophy in India; Confucius and Lao Tzu in China; Zoroaster in Persia; and the Hebrew prophets such as Isaiah, Jeremiah, and Ezekiel. While the exact dates of some figures remain debated, their influence is clearly situated within the intellectual shifts of this era.
What makes the Axial Age so compelling is that the ideas that came out of it are still applicable to our lives. As John Vervaeke observes: *"If I were to ask: Have you read anything from the Bronze Age? Have you read the Epic of Gilgamesh, or the Egyptian Book of the Dead? The Sumerian, Mesopotamian and Egyptian civilizations were colossal in their scale and influence, but most of us have not retained a direct relationship to their mythology. Alternatively, if I ask the same question of the Bible, or Plato, or the teachings of the Buddha, chances are you have read them, or at least assimilated a relationship to them. We somehow feel that these figures are relevant to us in a way that the Bronze Age figures are not. We don’t see ourselves in the Bronze Age; there is a discontinuity of identity between the kind of human beings we are now and the kind of human beings we observe in these earlier incarnations of our species.”* (p. 60)
Many scholars view this era as almost mystical, questioning why such a remarkable concentration of great thinkers emerged within a relatively short time. However, in this lecture, Professor Wesley Cecil explains this historical window in a way that *makes sense*. Cecil explains that the shift from hunter-gatherer societies to agrarian societies, coupled with the development of cities and trade networks, led to complex social structures. These societies also struggled with questions surrounding money, foreign goods, and foreign ideas.
Cecil's observation about the connection between leisure, met needs, education, and the contemplation of profound questions is insightful. He points out that you only ask questions about meaning when you have free time, choices, and some education. This wasn't a widespread concern before the Axial Age, simply because most people didn't have those luxuries. The reason these philosophers still resonate with us is that the problems they addressed are still with us. They were among the first to consider how to live in cities, money, foreign people and ideas. Like them, we're trying to figure out how to live in a world we don't rule, where we aren't in charge, but neither are we enslaved.
Technology in our days is also bringing us back to these profound topics, as the introduction of technology did for them. For us, consider the nature of money with the arrival of Bitcoin, human nature with the idea of transhumanism, and human purpose with the prospect of job replacement by AI.
Cecil argues that the Axial Age was a pivotal point in human history. Cecil concludes that we are currently living through another axial age, facing new problems and challenges that our existing systems and structures cannot address. I am excited to see how these challenges will bring forth the best of humanity and new profound thinkers who will influence future generations.
### References
Vervaeke, John; Mastropietro, Christopher. Awakening From the Meaning Crisis: Part 1: Origins. Kindle Edition
The Ancients: Axial Age. By Wes Cecil
<iframe width="560" height="315" src="https://www.youtube.com/embed/5QOzB_vlkZ8?si=f1jLW2IdU1LlOMR-" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
-

@ 57d1a264:69f1fee1
2025-02-15 03:52:36
The lead dev @gandlaf21 from [brrr.gandlaf.com](https://brrr.gandlaf.com) (https://github.com/gandlafbtc/cashu-brrr) reached out to me with an idea: a design contest for ecash paper note templates. Brrr is a paper note ecash generator that lets you easily create and print ecash in the form of bank-style paper notes.
We're thinking of putting up 150k sats as a prize pool to make it fun.
I think this could be a fun opportunity for the Bitcoin Design Community. I’m happy to lead it, but I’d love to get your thoughts. Here are a couple of directions I think it could take:
Could this fit into the next Designathon? Maybe we create a dedicated track for it with a side bounty or prize for the best note design.
Or should we keep it separate and run it as a standalone contest, promoting it as a unique, one-off event?
What do you guys think?
originally posted at https://stacker.news/items/886379
-

@ 57d1a264:69f1fee1
2025-02-15 03:51:09

🧐 Who is the main character of 100,000 sats?!
📋 Checklist
I hope BitcoinSocialLayer will be well recognized when conducting BSL activities at home and abroad.
✅ Photo 1 is a list of participating organizations for the Chiang Mai conference sats 'n' facts. When viewed by a third party, BSL is an abbreviation, so additional explanation is needed, but the spelling BSL does not come to mind.
✅ It may be helpful to refer to the sponsor lists on the pages of other Bitcoin conferences or meetups, such as the Tokyo Conference in Photo 2, to help you write your draft.
* In addition to AI, Photoshop, and Illustrator, you can also use PPT or images in PNG format.
- Please create a logo that fits the name Bitcoin Social Layer:
- Key words: Bitcoin, expert, service, South Korea
- Prize: 100,000 sat
- Submission: bitcoinsociallayer@gmail.com
- Logo high-resolution original file, logo description
- Period: until midnight on February 28th.
- All legal and commercial rights of the winning logo will be transferred to BSL (copyright transfer agreement will be signed and trademark registration will be processed)
- Plagiarized and other copyright infringing logos may be disqualified.
- Depending on the results, there may be no winner. In this case, we will continue to use the existing logo.
Source: https://x.com/BTCSocialLayer/status/1888887772083335519

originally posted at https://stacker.news/items/886369
-

@ a012dc82:6458a70d
2025-02-15 02:53:03
In the ever-evolving landscape of finance, two names have consistently dominated the conversation in recent years: Bitcoin and Ethereum. These cryptocurrencies have not only revolutionized the way we think about money but have also paved the way for a future where digital assets play a central role. As we stand at the cusp of a new era in finance, it's crucial to understand the significance of these two giants in the crypto world. This article takes a deep dive into Bitcoin and Ethereum, exploring their origins, their impact on the financial sector, and what the future might hold for these digital currencies.
**Table of Contents**
- Bitcoin: The Pioneer of Cryptocurrency
- Ethereum: More Than Just a Cryptocurrency
- The Impact on the Financial Sector
- The Future Outlook
- Conclusion
- FAQs
**Bitcoin: The Pioneer of Cryptocurrency**
Bitcoin, created by the mysterious figure or group known as Satoshi Nakamoto, emerged in 2009 as the first decentralized digital currency. It introduced the world to the concept of a blockchain, a distributed ledger technology that ensures security and transparency in transactions. Over the years, Bitcoin has become synonymous with cryptocurrency, often being the first token that comes to mind when discussing digital assets. Its primary appeal lies in its decentralized nature, free from the control of any government or financial institution, offering a form of financial freedom and privacy that traditional currencies cannot.
However, Bitcoin is not without its challenges. Its scalability issues, high transaction fees, and extensive energy consumption due to mining activities have been points of contention. Despite these challenges, Bitcoin has maintained its position as the leading cryptocurrency, often referred to as digital gold, and continues to attract significant investment from both retail and institutional investors.
**Ethereum: More Than Just a Cryptocurrency**
Ethereum, proposed in late 2013 by programmer Vitalik Buterin, is often considered the second most important cryptocurrency after Bitcoin. However, Ethereum offers much more than just a digital currency; it's a platform for decentralized applications (dApps). The introduction of smart contracts on Ethereum's blockchain has opened up possibilities far beyond simple monetary transactions. These self-executing contracts with the terms of the agreement directly written into code have enabled the development of a wide range of applications, from decentralized finance (DeFi) to non-fungible tokens (NFTs).
Ethereum's flexibility and adaptability have made it a cornerstone of the blockchain development community. However, like Bitcoin, it faces its own set of challenges, including network congestion and high gas fees, especially during peak usage times. The much-anticipated upgrade to Ethereum 2.0 aims to address these issues by shifting from a proof-of-work to a proof-of-stake consensus mechanism, which is expected to significantly increase its scalability and reduce its environmental impact.
**The Impact on the Financial Sector**
The advent of Bitcoin and Ethereum has had a profound impact on the financial sector. They have challenged traditional financial models and institutions, introducing concepts like decentralized finance, which aims to create a more open and accessible financial system. Cryptocurrencies have also introduced new investment opportunities, with Bitcoin becoming a popular choice for investors looking for an asset that is not correlated with traditional financial markets.
Moreover, the technologies behind these cryptocurrencies, especially blockchain, have found applications in various sectors, including banking, supply chain management, and voting systems. The transparency, security, and efficiency offered by blockchain technology have the potential to revolutionize these industries.
**The Future Outlook**
Looking ahead, the future of Bitcoin, Ethereum, and cryptocurrencies, in general, is both exciting and uncertain. Regulatory challenges, technological advancements, and market dynamics will play significant roles in shaping their paths. Bitcoin, with its limited supply and increasing adoption, might continue to be seen as a store of value, while Ethereum's transition to Ethereum 2.0 could solidify its position as the leading platform for decentralized applications.
The increasing interest from institutional investors and the integration of cryptocurrency services by major financial players suggest a growing acceptance and maturation of these digital assets. However, the volatile nature of cryptocurrencies remains a significant factor, making them a risky, albeit potentially rewarding, investment.
**Conclusion**
Bitcoin and Ethereum have undeniably paved the way for a new era in finance, one that is digital, decentralized, and diverse. Their impact extends beyond just the financial sector, influencing technology, governance, and society as a whole. As we move forward, the continuous evolution of these cryptocurrencies and their underlying technologies will undoubtedly play a pivotal role in shaping the future of finance. Whether they will become mainstream elements of our financial system or remain as alternative assets, one thing is certain: Bitcoin and Ethereum have forever changed the landscape of finance, and their journey is far from over.
**FAQs**
**How does Ethereum differ from Bitcoin?**
While Bitcoin was created primarily as a digital currency, Ethereum is a decentralized platform that enables smart contracts and decentralized applications (dApps). Ethereum's native token, Ether, is used to facilitate these operations.
**What are the main uses of Bitcoin and Ethereum?**
Bitcoin is mainly used as a digital currency and a store of value, often referred to as 'digital gold.' Ethereum, on the other hand, is used to power smart contracts and dApps, playing a crucial role in the decentralized finance (DeFi) and non-fungible token (NFT) sectors.
**What are the challenges facing Bitcoin and Ethereum?**
Bitcoin faces challenges like scalability, high transaction fees, and environmental concerns due to its mining process. Ethereum struggles with network congestion and high gas fees, although its upcoming upgrade to Ethereum 2.0 aims to address these issues.
**Are Bitcoin and Ethereum regulated?**
The regulatory status of Bitcoin and Ethereum varies by country. While some countries have embraced them with specific regulations, others have imposed restrictions or outright bans.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-

@ 7d33ba57:1b82db35
2025-02-15 01:48:56
**5 Photography Tips for Excursions**
Excursions take you to incredible places, but they’re often designed for quick stops, catering to "click-and-go" tourists rather than photographers and videographers. Capturing great shots in such fast-paced environments can be challenging! However, if an excursion is your only way to visit a stunning location, don’t worry—I got some tips to help you make the most of it.
1) ****Plan Your Story in Advance****
Before you even set foot on the excursion, think about the story you want to capture. In your mind, you’ve probably already envisioned your photo or video album—this is exactly what you should do! Excursions move fast, leaving little time for on-the-spot decisions. Research your destination beforehand, look up photos online, and familiarize yourself with the key subjects you want to focus on. Being prepared will help you capture the shots that truly matter.
2) **Secure the Best Spot**
If your excursion involves a bus or boat, positioning yourself strategically can make all the difference. Try to be one of the first to board so you can grab the best spot—usually at the front. This gives you a clear view. Quick reflexes will help you capture the scene without unwanted distractions!
3) **Sun position**
Always pay attention to the direction of the sun while picking your seat. Position yourself to shoot with the sunlight rather than against it to avoid harsh backlighting and maximize the natural light in your photos.
4) **Connect with the Guide**
The guide plays a big role in setting the pace of the excursion, so building a friendly connection can work in your favor. A smile and some casual conversation can make them more receptive to your needs, giving you extra time to capture the perfect shot. When you arrive at a location, don’t hesitate to ask if you’re allowed to take your own shots instead of strictly following the group. A little charm can go a long way in making your photography experience smoother and more enjoyable!
5) **Manage Your Time & Enjoy the Moment**
As a photographer or videographer, it’s easy to get lost in your creative zone, but remember—you’re on a group excursion! Be mindful of the schedule and avoid spending too much time on a single shot. Others in the group paid the same price for the experience, so it’s important to be respectful of their time—no matter how big or fancy your camera is!
If possible, consider booking a private excursion or joining fellow travel photographers who appreciate spending extra time at each location. This way, you can focus on capturing the best shots without feeling rushed.
Most importantly: Once you’ve taken your amazing shot, take a moment to truly experience the place. Too many travelers stare at their camera screens while walking, missing the beauty right in front of them. Save the reviewing for when you're back at your hotel! After all, photography is about more than just the shot—it’s about the memories you make along the way.
And don’t forget to save the special pictures onto your human hard drive—your memory! This is where we create the real movie.
-

@ 16d11430:61640947
2025-02-15 00:00:51
In today’s world, a silent crisis is unfolding—not in the streets, not in the economy, but in our minds. We are losing the ability to think deeply, to reason, and to resist manipulation. This phenomenon, often called "brain rot," is not just a metaphor. It is a tangible decline in cognitive ability, a creeping erosion of focus, patience, and intellectual curiosity. And while many scramble for solutions in self-help books, meditation apps, or digital detoxes, the true cure lies in an unlikely place: Bitcoin.
This is not just an argument about money. It is a plea for your mind, for the minds of your loved ones, and for a future where independent thought still exists. If you value your own ability to reason, to make sense of the world, and to protect those you love from deception and control, you owe it to yourself to study Bitcoin.
---
What Is Brain Rot?
Brain rot is not a medical diagnosis, but it is real. It is what happens when we are conditioned to react rather than think, when we consume more than we create, and when we surrender our agency to systems that manipulate us for profit. Symptoms include:
Shortened attention span (struggling to read long articles or books)
Loss of critical thinking (believing whatever is most loudly repeated)
Dopamine addiction (chasing likes, notifications, and instant gratification)
Mental fog and anxiety (feeling overwhelmed by noise, yet unable to focus)
Most of us are not born this way. We become this way through a slow, systematic process:
Schools train us to memorize, not to question.
Social media rewards outrage, not wisdom.
Fiat money devalues patience and rewards recklessness.
The result? A society that is easier to manipulate, easier to distract, and easier to control. The antidote to this is not just deleting social media. It’s reclaiming our ability to think for ourselves. Bitcoin is a tool that forces us to do exactly that.
---
Bitcoin as the Cure
At first glance, Bitcoin might seem purely financial—just another asset in a volatile market. But it is so much more than that. It is a test of intellectual curiosity, discipline, and patience. To truly understand Bitcoin, you must engage with fields that are deliberately hidden from us in mainstream education:
Monetary history (how money has been manipulated for control)
Economics (why inflation steals from the poor)
Cryptography & computer science (how decentralization protects truth)
Philosophy & game theory (why trustless systems create fairness)
Every step in understanding Bitcoin rewires your brain for independence. Unlike fiat currency, which asks nothing of you but blind trust, Bitcoin demands that you think critically. It restores long-term thinking, encourages personal responsibility, and rewards patience—all of which counteract brain rot.
---
How Bitcoin Changes Your Mindset
1. It Forces Low Time Preference
Bitcoiners often speak of "low time preference," a fancy way of saying patience over impulsivity. In a fiat world, money loses value over time, so we are incentivized to spend recklessly, live paycheck to paycheck, and chase fleeting pleasure.
Bitcoin reverses this. When money appreciates over time, suddenly the future matters again. You start planning. You start investing in yourself, in your knowledge, in your health. Your brain begins to think long-term, and your clarity improves.
2. It Teaches You to Question Authority
The fiat system is built on trust—trust that central banks will act in your best interest, trust that inflation is necessary, trust that bailouts are fair. Yet history shows that those in power rarely act for the people.
Bitcoin is mathematical truth, not political promises. Studying it forces you to question everything you were taught about money, value, and power. This questioning is the antidote to mental stagnation.
3. It Reduces Cognitive Dissonance
Many people feel anxious without knowing why. Part of this is living in a system that contradicts itself daily. Governments tell you inflation is necessary but also bad. They print money endlessly but tell you to save. They manipulate interest rates and then act surprised when markets collapse.
Bitcoin simplifies everything: a fixed supply, transparent rules, no middlemen. This clarity removes the mental exhaustion of navigating contradictions, freeing your mind for higher-level thinking.
4. It Protects You from Manipulation
Those who control money control perception. Whether through debt traps, engineered crises, or endless consumer distractions, fiat systems are designed to keep you too busy, too exhausted, and too distracted to think clearly.
Bitcoin removes intermediaries. It allows you to store value without trusting banks, transact without permission, and exit systems that do not serve you. It restores agency, and with it, your ability to think critically.
---
Why This Matters for You and Your Loved Ones
If you’ve read this far, you probably feel it—something is deeply wrong with the modern world. Many of us feel trapped in jobs we hate, working for money that loses value, bombarded by distractions that make us forget what matters. If you do nothing, it will only get worse.
You owe it to yourself and your loved ones to study Bitcoin because:
Understanding it will sharpen your mind.
Using it will make you resilient.
Saving in it will protect your future.
No one will do this for you. Schools won’t teach it. The media won’t promote it. Governments won’t encourage it. But the truth is out there, waiting for you to seek it.
---
A Plea for Your Future
You don’t need to become a Bitcoin expert overnight. You don’t need to "buy the top" or "trade for gains." Just start learning. Read The Bitcoin Standard, listen to podcasts, question what you’ve been told. Challenge yourself to understand why this matters.
Brain rot is real. It is not just a meme. It is the slow erosion of your ability to think, to resist, to act in your own best interest. And while many solutions exist, none are as transformative, as empowering, and as liberating as Bitcoin.
Take back your mind.
Take back your future.
Start today.
-

@ 1c197b12:242e1642
2025-02-14 21:40:46
We the People of the United States, in Order to form a more perfect Union, establish Justice, insure domestic Tranquility, provide for the common defence, promote the general Welfare, and secure the Blessings of Liberty to ourselves and our Posterity, do ordain and establish this Constitution for the United States of America.
**Article. I.**
*Section. 1.*
All legislative Powers herein granted shall be vested in a Congress of the United States, which shall consist of a Senate and House of Representatives.
*Section. 2.*
The House of Representatives shall be composed of Members chosen every second Year by the People of the several States, and the Electors in each State shall have the Qualifications requisite for Electors of the most numerous Branch of the State Legislature.
No Person shall be a Representative who shall not have attained to the Age of twenty five Years, and been seven Years a Citizen of the United States, and who shall not, when elected, be an Inhabitant of that State in which he shall be chosen.
Representatives and direct Taxes shall be apportioned among the several States which may be included within this Union, according to their respective Numbers, which shall be determined by adding to the whole Number of free Persons, including those bound to Service for a Term of Years, and excluding Indians not taxed, three fifths of all other Persons. The actual Enumeration shall be made within three Years after the first Meeting of the Congress of the United States, and within every subsequent Term of ten Years, in such Manner as they shall by Law direct. The Number of Representatives shall not exceed one for every thirty Thousand, but each State shall have at Least one Representative; and until such enumeration shall be made, the State of New Hampshire shall be entitled to chuse three, Massachusetts eight, Rhode-Island and Providence Plantations one, Connecticut five, New-York six, New Jersey four, Pennsylvania eight, Delaware one, Maryland six, Virginia ten, North Carolina five, South Carolina five, and Georgia three.
When vacancies happen in the Representation from any State, the Executive Authority thereof shall issue Writs of Election to fill such Vacancies.
The House of Representatives shall chuse their Speaker and other Officers; and shall have the sole Power of Impeachment.
*Section. 3.*
The Senate of the United States shall be composed of two Senators from each State, chosen by the Legislature thereof, for six Years; and each Senator shall have one Vote.
Immediately after they shall be assembled in Consequence of the first Election, they shall be divided as equally as may be into three Classes. The Seats of the Senators of the first Class shall be vacated at the Expiration of the second Year, of the second Class at the Expiration of the fourth Year, and of the third Class at the Expiration of the sixth Year, so that one third may be chosen every second Year; and if Vacancies happen by Resignation, or otherwise, during the Recess of the Legislature of any State, the Executive thereof may make temporary Appointments until the next Meeting of the Legislature, which shall then fill such Vacancies.
No Person shall be a Senator who shall not have attained to the Age of thirty Years, and been nine Years a Citizen of the United States, and who shall not, when elected, be an Inhabitant of that State for which he shall be chosen.
The Vice President of the United States shall be President of the Senate, but shall have no Vote, unless they be equally divided.
The Senate shall chuse their other Officers, and also a President pro tempore, in the Absence of the Vice President, or when he shall exercise the Office of President of the United States.
The Senate shall have the sole Power to try all Impeachments. When sitting for that Purpose, they shall be on Oath or Affirmation. When the President of the United States is tried, the Chief Justice shall preside: And no Person shall be convicted without the Concurrence of two thirds of the Members present.
Judgment in Cases of Impeachment shall not extend further than to removal from Office, and disqualification to hold and enjoy any Office of honor, Trust or Profit under the United States: but the Party convicted shall nevertheless be liable and subject to Indictment, Trial, Judgment and Punishment, according to Law.
*Section. 4.*
The Times, Places and Manner of holding Elections for Senators and Representatives, shall be prescribed in each State by the Legislature thereof; but the Congress may at any time by Law make or alter such Regulations, except as to the Places of chusing Senators.
The Congress shall assemble at least once in every Year, and such Meeting shall be on the first Monday in December, unless they shall by Law appoint a different Day.
*Section. 5.*
Each House shall be the Judge of the Elections, Returns and Qualifications of its own Members, and a Majority of each shall constitute a Quorum to do Business; but a smaller Number may adjourn from day to day, and may be authorized to compel the Attendance of absent Members, in such Manner, and under such Penalties as each House may provide.
Each House may determine the Rules of its Proceedings, punish its Members for disorderly Behaviour, and, with the Concurrence of two thirds, expel a Member.
Each House shall keep a Journal of its Proceedings, and from time to time publish the same, excepting such Parts as may in their Judgment require Secrecy; and the Yeas and Nays of the Members of either House on any question shall, at the Desire of one fifth of those Present, be entered on the Journal.
Neither House, during the Session of Congress, shall, without the Consent of the other, adjourn for more than three days, nor to any other Place than that in which the two Houses shall be sitting.
*Section. 6.*
The Senators and Representatives shall receive a Compensation for their Services, to be ascertained by Law, and paid out of the Treasury of the United States. They shall in all Cases, except Treason, Felony and Breach of the Peace, be privileged from Arrest during their Attendance at the Session of their respective Houses, and in going to and returning from the same; and for any Speech or Debate in either House, they shall not be questioned in any other Place.
No Senator or Representative shall, during the Time for which he was elected, be appointed to any civil Office under the Authority of the United States, which shall have been created, or the Emoluments whereof shall have been encreased during such time; and no Person holding any Office under the United States, shall be a Member of either House during his Continuance in Office.
*Section. 7.*
All Bills for raising Revenue shall originate in the House of Representatives; but the Senate may propose or concur with Amendments as on other Bills.
Every Bill which shall have passed the House of Representatives and the Senate, shall, before it become a Law, be presented to the President of the United States; If he approve he shall sign it, but if not he shall return it, with his Objections to that House in which it shall have originated, who shall enter the Objections at large on their Journal, and proceed to reconsider it. If after such Reconsideration two thirds of that House shall agree to pass the Bill, it shall be sent, together with the Objections, to the other House, by which it shall likewise be reconsidered, and if approved by two thirds of that House, it shall become a Law. But in all such Cases the Votes of both Houses shall be determined by yeas and Nays, and the Names of the Persons voting for and against the Bill shall be entered on the Journal of each House respectively. If any Bill shall not be returned by the President within ten Days (Sundays excepted) after it shall have been presented to him, the Same shall be a Law, in like Manner as if he had signed it, unless the Congress by their Adjournment prevent its Return, in which Case it shall not be a Law.
Every Order, Resolution, or Vote to which the Concurrence of the Senate and House of Representatives may be necessary (except on a question of Adjournment) shall be presented to the President of the United States; and before the Same shall take Effect, shall be approved by him, or being disapproved by him, shall be repassed by two thirds of the Senate and House of Representatives, according to the Rules and Limitations prescribed in the Case of a Bill.
*Section. 8.*
The Congress shall have Power To lay and collect Taxes, Duties, Imposts and Excises, to pay the Debts and provide for the common Defence and general Welfare of the United States; but all Duties, Imposts and Excises shall be uniform throughout the United States;
To borrow Money on the credit of the United States;
To regulate Commerce with foreign Nations, and among the several States, and with the Indian Tribes;
To establish an uniform Rule of Naturalization, and uniform Laws on the subject of Bankruptcies throughout the United States;
To coin Money, regulate the Value thereof, and of foreign Coin, and fix the Standard of Weights and Measures;
To provide for the Punishment of counterfeiting the Securities and current Coin of the United States;
To establish Post Offices and post Roads;
To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries;
To constitute Tribunals inferior to the supreme Court;
To define and punish Piracies and Felonies committed on the high Seas, and Offences against the Law of Nations;
To declare War, grant Letters of Marque and Reprisal, and make Rules concerning Captures on Land and Water;
To raise and support Armies, but no Appropriation of Money to that Use shall be for a longer Term than two Years;
To provide and maintain a Navy;
To make Rules for the Government and Regulation of the land and naval Forces;
To provide for calling forth the Militia to execute the Laws of the Union, suppress Insurrections and repel Invasions;
To provide for organizing, arming, and disciplining, the Militia, and for governing such Part of them as may be employed in the Service of the United States, reserving to the States respectively, the Appointment of the Officers, and the Authority of training the Militia according to the discipline prescribed by Congress;
To exercise exclusive Legislation in all Cases whatsoever, over such District (not exceeding ten Miles square) as may, by Cession of particular States, and the Acceptance of Congress, become the Seat of the Government of the United States, and to exercise like Authority over all Places purchased by the Consent of the Legislature of the State in which the Same shall be, for the Erection of Forts, Magazines, Arsenals, dock-Yards, and other needful Buildings;—And
To make all Laws which shall be necessary and proper for carrying into Execution the foregoing Powers, and all other Powers vested by this Constitution in the Government of the United States, or in any Department or Officer thereof.
*Section. 9.*
The Migration or Importation of such Persons as any of the States now existing shall think proper to admit, shall not be prohibited by the Congress prior to the Year one thousand eight hundred and eight, but a Tax or duty may be imposed on such Importation, not exceeding ten dollars for each Person.
The Privilege of the Writ of Habeas Corpus shall not be suspended, unless when in Cases of Rebellion or Invasion the public Safety may require it.
No Bill of Attainder or ex post facto Law shall be passed.
No Capitation, or other direct, Tax shall be laid, unless in Proportion to the Census or enumeration herein before directed to be taken.
No Tax or Duty shall be laid on Articles exported from any State.
No Preference shall be given by any Regulation of Commerce or Revenue to the Ports of one State over those of another: nor shall Vessels bound to, or from, one State, be obliged to enter, clear, or pay Duties in another.
No Money shall be drawn from the Treasury, but in Consequence of Appropriations made by Law; and a regular Statement and Account of the Receipts and Expenditures of all public Money shall be published from time to time.
No Title of Nobility shall be granted by the United States: And no Person holding any Office of Profit or Trust under them, shall, without the Consent of the Congress, accept of any present, Emolument, Office, or Title, of any kind whatever, from any King, Prince, or foreign State.
*Section. 10.*
No State shall enter into any Treaty, Alliance, or Confederation; grant Letters of Marque and Reprisal; coin Money; emit Bills of Credit; make any Thing but gold and silver Coin a Tender in Payment of Debts; pass any Bill of Attainder, ex post facto Law, or Law impairing the Obligation of Contracts, or grant any Title of Nobility.
No State shall, without the Consent of the Congress, lay any Imposts or Duties on Imports or Exports, except what may be absolutely necessary for executing it's inspection Laws: and the net Produce of all Duties and Imposts, laid by any State on Imports or Exports, shall be for the Use of the Treasury of the United States; and all such Laws shall be subject to the Revision and Controul of the Congress.
No State shall, without the Consent of Congress, lay any Duty of Tonnage, keep Troops, or Ships of War in time of Peace, enter into any Agreement or Compact with another State, or with a foreign Power, or engage in War, unless actually invaded, or in such imminent Danger as will not admit of delay.
**Article. II.**
*Section. 1.*
The executive Power shall be vested in a President of the United States of America. He shall hold his Office during the Term of four Years, and, together with the Vice President, chosen for the same Term, be elected, as follows
Each State shall appoint, in such Manner as the Legislature thereof may direct, a Number of Electors, equal to the whole Number of Senators and Representatives to which the State may be entitled in the Congress: but no Senator or Representative, or Person holding an Office of Trust or Profit under the United States, shall be appointed an Elector.
The Electors shall meet in their respective States, and vote by Ballot for two Persons, of whom one at least shall not be an Inhabitant of the same State with themselves. And they shall make a List of all the Persons voted for, and of the Number of Votes for each; which List they shall sign and certify, and transmit sealed to the Seat of the Government of the United States, directed to the President of the Senate. The President of the Senate shall, in the Presence of the Senate and House of Representatives, open all the Certificates, and the Votes shall then be counted. The Person having the greatest Number of Votes shall be the President, if such Number be a Majority of the whole Number of Electors appointed; and if there be more than one who have such Majority, and have an equal Number of Votes, then the House of Representatives shall immediately chuse by Ballot one of them for President; and if no Person have a Majority, then from the five highest on the List the said House shall in like Manner chuse the President. But in chusing the President, the Votes shall be taken by States, the Representation from each State having one Vote; A quorum for this Purpose shall consist of a Member or Members from two thirds of the States, and a Majority of all the States shall be necessary to a Choice. In every Case, after the Choice of the President, the Person having the greatest Number of Votes of the Electors shall be the Vice President. But if there should remain two or more who have equal Votes, the Senate shall chuse from them by Ballot the Vice President.
The Congress may determine the Time of chusing the Electors, and the Day on which they shall give their Votes; which Day shall be the same throughout the United States.
No Person except a natural born Citizen, or a Citizen of the United States, at the time of the Adoption of this Constitution, shall be eligible to the Office of President; neither shall any Person be eligible to that Office who shall not have attained to the Age of thirty five Years, and been fourteen Years a Resident within the United States.
In Case of the Removal of the President from Office, or of his Death, Resignation, or Inability to discharge the Powers and Duties of the said Office, the Same shall devolve on the Vice President, and the Congress may by Law provide for the Case of Removal, Death, Resignation or Inability, both of the President and Vice President, declaring what Officer shall then act as President, and such Officer shall act accordingly, until the Disability be removed, or a President shall be elected.
The President shall, at stated Times, receive for his Services, a Compensation, which shall neither be encreased nor diminished during the Period for which he shall have been elected, and he shall not receive within that Period any other Emolument from the United States, or any of them.
Before he enter on the Execution of his Office, he shall take the following Oath or Affirmation:—"I do solemnly swear (or affirm) that I will faithfully execute the Office of President of the United States, and will to the best of my Ability, preserve, protect and defend the Constitution of the United States."
*Section. 2.*
The President shall be Commander in Chief of the Army and Navy of the United States, and of the Militia of the several States, when called into the actual Service of the United States; he may require the Opinion, in writing, of the principal Officer in each of the executive Departments, upon any Subject relating to the Duties of their respective Offices, and he shall have Power to grant Reprieves and Pardons for Offences against the United States, except in Cases of Impeachment.
He shall have Power, by and with the Advice and Consent of the Senate, to make Treaties, provided two thirds of the Senators present concur; and he shall nominate, and by and with the Advice and Consent of the Senate, shall appoint Ambassadors, other public Ministers and Consuls, Judges of the supreme Court, and all other Officers of the United States, whose Appointments are not herein otherwise provided for, and which shall be established by Law: but the Congress may by Law vest the Appointment of such inferior Officers, as they think proper, in the President alone, in the Courts of Law, or in the Heads of Departments.
The President shall have Power to fill up all Vacancies that may happen during the Recess of the Senate, by granting Commissions which shall expire at the End of their next Session.
*Section. 3.*
He shall from time to time give to the Congress Information of the State of the Union, and recommend to their Consideration such Measures as he shall judge necessary and expedient; he may, on extraordinary Occasions, convene both Houses, or either of them, and in Case of Disagreement between them, with Respect to the Time of Adjournment, he may adjourn them to such Time as he shall think proper; he shall receive Ambassadors and other public Ministers; he shall take Care that the Laws be faithfully executed, and shall Commission all the Officers of the United States.
*Section. 4.*
The President, Vice President and all civil Officers of the United States, shall be removed from Office on Impeachment for, and Conviction of, Treason, Bribery, or other high Crimes and Misdemeanors.
**Article. III.**
*Section. 1.*
The judicial Power of the United States, shall be vested in one supreme Court, and in such inferior Courts as the Congress may from time to time ordain and establish. The Judges, both of the supreme and inferior Courts, shall hold their Offices during good Behaviour, and shall, at stated Times, receive for their Services, a Compensation, which shall not be diminished during their Continuance in Office.
*Section. 2.*
The judicial Power shall extend to all Cases, in Law and Equity, arising under this Constitution, the Laws of the United States, and Treaties made, or which shall be made, under their Authority;—to all Cases affecting Ambassadors, other public Ministers and Consuls;—to all Cases of admiralty and maritime Jurisdiction;—to Controversies to which the United States shall be a Party;—to Controversies between two or more States;— between a State and Citizens of another State,—between Citizens of different States,—between Citizens of the same State claiming Lands under Grants of different States, and between a State, or the Citizens thereof, and foreign States, Citizens or Subjects.
In all Cases affecting Ambassadors, other public Ministers and Consuls, and those in which a State shall be Party, the supreme Court shall have original Jurisdiction. In all the other Cases before mentioned, the supreme Court shall have appellate Jurisdiction, both as to Law and Fact, with such Exceptions, and under such Regulations as the Congress shall make.
The Trial of all Crimes, except in Cases of Impeachment, shall be by Jury; and such Trial shall be held in the State where the said Crimes shall have been committed; but when not committed within any State, the Trial shall be at such Place or Places as the Congress may by Law have directed.
*Section. 3.*
Treason against the United States, shall consist only in levying War against them, or in adhering to their Enemies, giving them Aid and Comfort. No Person shall be convicted of Treason unless on the Testimony of two Witnesses to the same overt Act, or on Confession in open Court.
The Congress shall have Power to declare the Punishment of Treason, but no Attainder of Treason shall work Corruption of Blood, or Forfeiture except during the Life of the Person attainted.
**Article. IV.**
*Section. 1.*
Full Faith and Credit shall be given in each State to the public Acts, Records, and judicial Proceedings of every other State. And the Congress may by general Laws prescribe the Manner in which such Acts, Records and Proceedings shall be proved, and the Effect thereof.
*Section. 2.*
The Citizens of each State shall be entitled to all Privileges and Immunities of Citizens in the several States.
A Person charged in any State with Treason, Felony, or other Crime, who shall flee from Justice, and be found in another State, shall on Demand of the executive Authority of the State from which he fled, be delivered up, to be removed to the State having Jurisdiction of the Crime.
No Person held to Service or Labour in one State, under the Laws thereof, escaping into another, shall, in Consequence of any Law or Regulation therein, be discharged from such Service or Labour, but shall be delivered up on Claim of the Party to whom such Service or Labour may be due.
*Section. 3.*
New States may be admitted by the Congress into this Union; but no new State shall be formed or erected within the Jurisdiction of any other State; nor any State be formed by the Junction of two or more States, or Parts of States, without the Consent of the Legislatures of the States concerned as well as of the Congress.
The Congress shall have Power to dispose of and make all needful Rules and Regulations respecting the Territory or other Property belonging to the United States; and nothing in this Constitution shall be so construed as to Prejudice any Claims of the United States, or of any particular State.
*Section. 4.*
The United States shall guarantee to every State in this Union a Republican Form of Government, and shall protect each of them against Invasion; and on Application of the Legislature, or of the Executive (when the Legislature cannot be convened) against domestic Violence.
**Article. V.**
The Congress, whenever two thirds of both Houses shall deem it necessary, shall propose Amendments to this Constitution, or, on the Application of the Legislatures of two thirds of the several States, shall call a Convention for proposing Amendments, which, in either Case, shall be valid to all Intents and Purposes, as Part of this Constitution, when ratified by the Legislatures of three fourths of the several States, or by Conventions in three fourths thereof, as the one or the other Mode of Ratification may be proposed by the Congress; Provided that no Amendment which may be made prior to the Year One thousand eight hundred and eight shall in any Manner affect the first and fourth Clauses in the Ninth Section of the first Article; and that no State, without its Consent, shall be deprived of its equal Suffrage in the Senate.
**Article. VI.**
All Debts contracted and Engagements entered into, before the Adoption of this Constitution, shall be as valid against the United States under this Constitution, as under the Confederation.
This Constitution, and the Laws of the United States which shall be made in Pursuance thereof; and all Treaties made, or which shall be made, under the Authority of the United States, shall be the supreme Law of the Land; and the Judges in every State shall be bound thereby, any Thing in the Constitution or Laws of any State to the Contrary notwithstanding.
The Senators and Representatives before mentioned, and the Members of the several State Legislatures, and all executive and judicial Officers, both of the United States and of the several States, shall be bound by Oath or Affirmation, to support this Constitution; but no religious Test shall ever be required as a Qualification to any Office or public Trust under the United States.
**Article. VII.**
The Ratification of the Conventions of nine States, shall be sufficient for the Establishment of this Constitution between the States so ratifying the Same.
The Word, "the," being interlined between the seventh and eighth Lines of the first Page, The Word "Thirty" being partly written on an Erazure in the fifteenth Line of the first Page, The Words "is tried" being interlined between the thirty second and thirty third Lines of the first Page and the Word "the" being interlined between the forty third and forty fourth Lines of the second Page.
Attest William Jackson Secretary
done in Convention by the Unanimous Consent of the States present the Seventeenth Day of September in the Year of our Lord one thousand seven hundred and Eighty seven and of the Independance of the United States of America the Twelfth In witness whereof We have hereunto subscribed our Names,
-

@ 1c197b12:242e1642
2025-02-14 21:38:15
Today, I'm going to attempt to install Servus to my test server. I'll be using a raspberry Pi4 4GB version with a 16GB microSD card (because what I have laying around). And, as you know... if it'll run on a Pi, it'll run pretty much anywhere.
**What is SERVUS?**
From GitHub... "Servus is a CMS, personal Nostr relay and personal Blossom server fully self-contained within one executable file."
**Here's what you'll need:**
A spare server. It can be a VPS, old laptop, old computer, 3rd market server from a decommissioned datacenter that you got for cheap on Ebay, a NUC... something that can run Linux.
- An understanding of the Linux terminal.
- install git and cargo.
- A web browser (don't you side-eye me!).
**Let Us Begin...**
I'm assuming you're using a Debian-based system. Open your terminal and enter the following:
Go ahead and ssh into your server with something like: "ssh yourusername@ipaddress" or "ssh yourusername@domainname.tld" enter your password when prompted and hit enter.

If you plan to do other stuff with your server later on, you might even consider using "ssh-copy-id yourusername@ipaddress" in order to not have to enter you password, all-the-time.

(Without the quotes) "su", or "sudo su". Whatever means you use to get to superuser (root). Then, enter your password.

Once in root, type: *apt install git cargo -y* Then, hit enter.
You'll see a wall text... yadda yadda.


Now, you'll type (without quotes): *"git clone https://github.com/servuscms/servus.git"* and hit enter. You'll see a progress bar.

If you type *"ls"* you should see a folder labeled, *"servus"*. We now change directories by typing, *"cd servus"*. Inside of the servus folder you'll see a few other folders and a few files by typing *"ls"* again.

According the the servus github, there are a few build options. I'm going to use the "release" version for this tutorial. We do this by typing, *"cargo build --release"*. You'll see a fetch progress bar and a wall of text.


**NOTE: **I'm using a raspberry pi 4, in this tutorial. At the end of trying "cargo build --release" I got a version error for a package called "anstream v0.6.14" because it requires "rustc 1.65.0", or higher. The error message gives you a fix by typing "cargo update -p anstream@0.6.14 --precise ver"

**BUT that won't work. Here's how to fix it:**
Type the following (without quotations): *"apt purge rustc -y && apt install curl -y && curl https://sh.rustup.rs -sSf | sh"*
This will remove the outdated rustc. Then, you're installing curl so that you can install the latest version of rustc and cargo because they aren't in the distro repo. Restart your machine with: "sudo reboot". Once you're back into your servus directory, just run the "cargo build" command, again. Now back to the show!
Now that we have run the "cargo build" command, it's time to move on to setting up access and ssl. According to github, there are a few options. They are as follows:
- *./target/debug/servus *- this starts Servus on port 4884, without SSL
- *sudo ./target/debug/servus --ssl-acme[-production] --contact-email youremail@example.com* (this starts Servus on port 443 and obtains SSL certificates from Let's Encrypt using ACME by providing a contact email).
- *sudo ./target/debug/servus --ssl-cert <SSL_CERT_FILE> --ssl-key <SSL_KEY>* (this starts Servus on port 443 using the provided <SSL_CERT> and <SSL_KEY>)
I'll be using the command no calling for SSL. More information can be found here: [ https://github.com/servuscms/servus](https://github.com/servuscms/servus)

So from the terminal we input (without quotes): *"./target/release/servus"* because, as you may recall, I used the *"cargo build --release" *version earlier.
It will ask a few questions. Here's what I put...
**Domain: test.local**
**Admin pubkey: nostr:npub1rsvhkyk2nnsyzkmsuaq9h9ms7rkxhn8mtxejkca2l4pvkfpwzepql3vmtf**

Then, you'll get a bit of output with your ip and port interface. In this case, it's http://localhost:4884 Now go to your browser and input that address, it's local, or the IP address of the server... something like, http://192.168.x.x:4884 and HUZZAH!!! Just like that, you should see your site. To get to the admin section of your site, just add "/.admin" (without quotes) to the IP address you just input into the browser.


**CONGRATS! I hope this was helpful :-)**
While Servus is extremely experimental, and it is advised to not run it in production. There are a number of features worth taking a look at. More information about what Servus can do can be found here: [Servus Github]( https://github.com/servuscms/servus)
**DONE.**
-

@ 1c197b12:242e1642
2025-02-14 21:27:28
This article will be basic instructions for extreme normies (I say that lovingly), or anyone looking to get started with using zap.stream and sharing to nostr.
**EQUIPMENT**
Getting started is incredibly easy and your equipment needs are miniscule.
An old desktop or laptop running Linux, MacOs, or Windows made in the passed 15yrs should do. Im currently using and old Dell Latitude E5430 with an Intel i5-3210M with 32Gigs of ram and 250GB hard drive. Technically, you go as low as using a Raspberry Pi 4B+ running Owncast, but Ill save that so a future tutorial.
Let's get started.
**ON YOUR COMPUTER**
You'll need to install OBS (open broaster software). OBS is the go-to for streaming to social media. There are tons of YouTube videos on it's function. WE, however, will only be doing the basics to get us up and running.
First, go to [ https://obsproject.com/]( https://obsproject.com/)

Once on the OBS site, choose the correct download for you system. Linux, MacOs or Windows. Download (remember where you downloaded the file to). Go there and install your download. You may have to enter your password to install on your particular operating system. This is normal.
Once you've installed OBS, open the application. It should look something like this...

For our purposes, we will be in studio mode. Locate the 'Studio Mode' button on the right lower-hand side of the screen, and click it.

You'll see the screen split like in the image above. The left-side is from your desktop, and the right-side is what your broadcast will look like.
Next, we go to settings. The 'Settings' button is located right below the 'Studio Mode" button.

Now we're in settings and you should see something like this...

Now locate stream in the right-hand menu. It should be the second in the list. Click it.

Once in the stream section, go to 'Service' and in the right-hand drop-down, find and select 'Custom...' from the drop-down menu.

Remeber where this is because we'll need to come back to it, shortly.
**ZAPSTREAM**
We need our streamkey credentials from Zapstream. Go to [ https://zap.stream]( https://zap.stream). Then, go to your dashboard.

Located on the lower right-hand side is the Server URL and Stream Key. You'll need to copy/paste this in OBS.

You may have to generate new keys, if they aren't already there. This is normal. If you're interested in multi-streaming (That's where you broadcast to multiple social media platforms all at once), youll need the server URL and streamkeys from each. You'll place them in their respective forms in Zapstream's 'Stream Forwarding" section.

Use the custom form, if the platform you want to stream to isn't listed.
*Side-Note: remember that you can use your nostr identity across multiple nostr client applications. So when your login for Amethyst, as an example, could be used when you login to zapstream. Also, i would suggest using Alby's browser extension. It makes it much easier to fund your stream, as well as receive zaps.
*
**Now, BACK TO OBS...**
With Stream URL and Key in hand, paste them in the 'Stream" section of OBS' settings.
Service [Custom...]
Server [Server URL]
StreamKey [Your zapstream stream key]

After you've entered all your streaming credentials, click 'OK' at the bottom, on the right-hand side.
**WHAT'S NEXT?**
Let's setup your first stream from OBS. First we need to choose a source. Your source is your input device. It can be your webcam, your mic, your monitor, or any particular window on your screen. assuming you're an absolute beginner, we're going to use the source 'Window Capture (Xcomposite)'.

Now, open your source file. We'll use a video source called 'grannyhiphop.mp4'. In your case it can be whatever you want to stream; Just be sure to select the proper source.

Double-click on 'Window Capture' in your sources list. In the pop-up window, select your file from the 'Window' drop-down menu.


You should see something like this...

Working in the left display of OBS, we will adjust the video by left-click, hold and drag the bottom corner, so that it takes up the whole display.

In order to adjust the right-side display ( the broadcast side), we need to manipulate the video source by changing it's size.

This may take some time to adjust the size. This is normal. What I've found to help is, after every adjustment, I click the 'Fade (300ms)' button. I have no idea why it helps, but it does, lol.

Finally, after getting everything to look the way you want, you click the 'Start Stream' button.

**BACK TO ZAPSTREAM**
Now, we go back to zapstream to check to see if our stream is up. It may take a few moments to update. You may even need to refresh the page. This is normal.

STREAMS UP!!!
A few things, in closing. You'll notice that your dashbooard has changed. It'll show current stream time, how much time you have left (according to your funding source), who's zapped you with how much theyve zapped, the ability to post a note about your stream (to both nostr and twitter), and it shows your chatbox with your listeners. There are also a raid feature, stream settings (where you can title & tag your stream). You can 'topup' your funding for your stream. As well as, see your current balance.
You did a great and If you ever need more help, just use the tag #asknostr in your note. There are alway nostriches willing to help.
**STAY AWESOME!!!**
-

@ 00000001:b0c77eb9
2025-02-14 21:24:24
مواقع التواصل الإجتماعي العامة هي التي تتحكم بك، تتحكم بك بفرض أجندتها وتجبرك
على اتباعها وتحظر وتحذف كل ما يخالفها، وحرية التعبير تنحصر في أجندتها تلك!
وخوارزمياتها الخبيثة التي لا حاجة لها، تعرض لك مايريدون منك أن تراه وتحجب ما لا
يريدونك أن تراه.
في نوستر انت المتحكم، انت الذي تحدد من تتابع و انت الذي تحدد المرحلات التي تنشر
منشوراتك بها.
نوستر لامركزي، بمعنى عدم وجود سلطة تتحكم ببياناتك، بياناتك موجودة في المرحلات،
ولا احد يستطيع حذفها او تعديلها او حظر ظهورها.
و هذا لا ينطبق فقط على مواقع التواصل الإجتماعي العامة، بل ينطبق أيضاً على
الـfediverse، في الـfediverse انت لست حر، انت تتبع الخادم الذي تستخدمه ويستطيع
هذا الخادم حظر ما لا يريد ظهوره لك، لأنك لا تتواصل مع بقية الخوادم بنفسك، بل
خادمك من يقوم بذلك بالنيابة عنك.
وحتى إذا كنت تمتلك خادم في شبكة الـfediverse، إذا خالفت اجندة بقية الخوادم
ونظرتهم عن حرية الرأي و التعبير سوف يندرج خادمك في القائمة السوداء fediblock
ولن يتمكن خادمك من التواصل مع بقية خوادم الشبكة، ستكون محصوراً بالخوادم الأخرى
المحظورة كخادمك، بالتالي انت في الشبكة الأخرى من الـfediverse!
نعم، يوجد شبكتان في الكون الفدرالي fediverse شبكة الصالحين التابعين للأجندة
الغربية وشبكة الطالحين الذين لا يتبعون لها، إذا تم إدراج خادمك في قائمة fediblock سوف تذهب للشبكة الأخرى!
-

@ 6f7db55a:985d8b25
2025-02-14 21:23:57
This article will be basic instructions for extreme normies (I say that lovingly), or anyone looking to get started with using zap.stream and sharing to nostr.
**EQUIPMENT**
Getting started is incredibly easy and your equipment needs are miniscule.
An old desktop or laptop running Linux, MacOs, or Windows made in the passed 15yrs should do. Im currently using and old Dell Latitude E5430 with an Intel i5-3210M with 32Gigs of ram and 250GB hard drive. Technically, you go as low as using a Raspberry Pi 4B+ running Owncast, but Ill save that so a future tutorial.
Let's get started.
**ON YOUR COMPUTER**
You'll need to install OBS (open broaster software). OBS is the go-to for streaming to social media. There are tons of YouTube videos on it's function. WE, however, will only be doing the basics to get us up and running.
First, go to [https://obsproject.com/](https://obsproject.com/)

Once on the OBS site, choose the correct download for you system. Linux, MacOs or Windows. Download (remember where you downloaded the file to). Go there and install your download. You may have to enter your password to install on your particular operating system. This is normal.
Once you've installed OBS, open the application. It should look something like this...

For our purposes, we will be in studio mode. Locate the 'Studio Mode' button on the right lower-hand side of the screen, and click it.

You'll see the screen split like in the image above. The left-side is from your desktop, and the right-side is what your broadcast will look like.
Next, we go to settings. The 'Settings' button is located right below the 'Studio Mode" button.

Now we're in settings and you should see something like this...

Now locate stream in the right-hand menu. It should be the second in the list. Click it.

Once in the stream section, go to 'Service' and in the right-hand drop-down, find and select 'Custom...' from the drop-down menu.

Remeber where this is because we'll need to come back to it, shortly.
**ZAPSTREAM**
We need our streamkey credentials from Zapstream. Go to [https://zap.stream](https://zap.stream). Then, go to your dashboard.

Located on the lower right-hand side is the Server URL and Stream Key. You'll need to copy/paste this in OBS.

You may have to generate new keys, if they aren't already there. This is normal. If you're interested in multi-streaming (That's where you broadcast to multiple social media platforms all at once), youll need the server URL and streamkeys from each. You'll place them in their respective forms in Zapstream's 'Stream Forwarding" section.

Use the custom form, if the platform you want to stream to isn't listed.
*Side-Note: remember that you can use your nostr identity across multiple nostr client applications. So when your login for Amethyst, as an example, could be used when you login to zapstream. Also, i would suggest using Alby's browser extension. It makes it much easier to fund your stream, as well as receive zaps.
*
**Now, BACK TO OBS...**
With Stream URL and Key in hand, paste them in the 'Stream" section of OBS' settings.
Service [Custom...]
Server [Server URL]
StreamKey [Your zapstream stream key]

After you've entered all your streaming credentials, click 'OK' at the bottom, on the right-hand side.
**WHAT'S NEXT?**
Let's setup your first stream from OBS. First we need to choose a source. Your source is your input device. It can be your webcam, your mic, your monitor, or any particular window on your screen. assuming you're an absolute beginner, we're going to use the source 'Window Capture (Xcomposite)'.

Now, open your source file. We'll use a video source called 'grannyhiphop.mp4'. In your case it can be whatever you want to stream; Just be sure to select the proper source.

Double-click on 'Window Capture' in your sources list. In the pop-up window, select your file from the 'Window' drop-down menu.


You should see something like this...

Working in the left display of OBS, we will adjust the video by left-click, hold and drag the bottom corner, so that it takes up the whole display.

In order to adjust the right-side display ( the broadcast side), we need to manipulate the video source by changing it's size.

This may take some time to adjust the size. This is normal. What I've found to help is, after every adjustment, I click the 'Fade (300ms)' button. I have no idea why it helps, but it does, lol.

Finally, after getting everything to look the way you want, you click the 'Start Stream' button.

**BACK TO ZAPSTREAM**
Now, we go back to zapstream to check to see if our stream is up. It may take a few moments to update. You may even need to refresh the page. This is normal.

STREAMS UP!!!
A few things, in closing. You'll notice that your dashbooard has changed. It'll show current stream time, how much time you have left (according to your funding source), who's zapped you with how much theyve zapped, the ability to post a note about your stream (to both nostr and twitter), and it shows your chatbox with your listeners. There are also a raid feature, stream settings (where you can title & tag your stream). You can 'topup' your funding for your stream. As well as, see your current balance.
You did a great and If you ever need more help, just use the tag #asknostr in your note. There are alway nostriches willing to help.
**STAY AWESOME!!!**
npub: nostr:npub1rsvhkyk2nnsyzkmsuaq9h9ms7rkxhn8mtxejkca2l4pvkfpwzepql3vmtf
-

@ 0000065e:9b5b4c75
2025-02-14 20:54:56
Se está armando un considerable revuelo con las medidas, impulsadas por La Liga y Telefónica, que afectan a servicios relacionados con Cloudflare y a muchos de sus usuarios que tienen que soportar la restricción en la operatividad de los mismos. Pero, ¿cómo puede ser que un tema de “piratería” acabe afectando, con aparente impunidad, a servicios legítimos? Aquí intentaremos explicarlo.
Desde tiempos casi inmemoriales la industria relacionada con la explotación de los contenidos, y prestaciones, sujetos a derechos de propiedad intelectual han sido tremendamente imaginativos a la hora de buscar mecanismos que aseguren sus pingües beneficios. Como los jueces no solían hacerles caso, impulsaron modificaciones legislativas para quitarlos de la ecuación, *administrativizando* el conflicto, como sucedió con la conocida como Ley Sinde.
Pero los mecanismos de esta Ley no eran lo suficientemente ágiles para lo que quería la industria, por lo que había que darle otra vuelta de tuerca al asunto, lo que se hizo con ocasión del art. 138 de la Ley de Propiedad Intelectual. En síntesis, el truco es el siguiente:
- El titular de los derechos acude a un Juzgado honesto, imparcial y preocupado, como no podía ser de otra forma, por la defensa de los derechos fundamentales reconocidos constitucionalmente.
- Ahí plantea una demanda, no contra quien considera infractor de esos derechos (Cloudflare o los usuarios que hacen uso ilícito de sus servicios), sino contra los operadores de telecomunicaciones que dan acceso a internet, en una aplicación torticera y kafkiana del art. 138 LPI (sobre el que volveremos más adelante) pidiendo una serie de medidas.
- Las operadoras se "allanan" a la demanda, es decir, reconocen y aceptan las pretensiones del demandante, y el juez [concede las medidas](https://bandaancha.eu/articulos/2-nuevos-listados-obligan-operadoras-10322).
Con este truco, todos se guardan las vergüenzas unos a otros:
- Los demandantes: Nosotros solamente pedimos las medidas. Es el juez el que las acuerda.
- El juez: A mi me viene uno pidiendo una cosa, la parte demandada se allana. Tengo que conceder lo pedido.
- El operador: Tengo que hacer caso al juez.
Para conseguir esto, los demandantes llevan a cabo una torticera interpretación de los artículos 138 y 139 de la LPI, que en la aplicación que se está haciendo de los mismos convierte dichos preceptos en inconstitucionales, pues, en la práctica, se condena a una pluralidad de personas al cierre de su página web o restricción de sus servicios en España sin darles la más mínima oportunidad defenderse, en una flagrante vulneración tanto de la libertad de expresión e información (art. 20 de la Constitución) como del derecho a la tutela judicial efectiva (art. 24 de la Constitución), pues causa una evidente indefensión la producción de una condena sin posibilidad alguna de defenderse, por no hablar de que puede afectar también a servicios críticos o esenciales, como por ejemplo hospitales y centros de emergencias.
Los artículos 138 y 139, formalmente, permiten demandar directamente a los prestadores de servicios de intermediación (operadores que dan acceso a Internet), para instar la suspensión de los servicios que estos presenten a infractores de derechos de propiedad intelectual. En concreto estos son los preceptos a considerar:
>
> Artículo 138. Acciones y **medidas cautelares urgentes**. El titular de los derechos reconocidos en esta ley, sin perjuicio de otras acciones que le correspondan, podrá instar el cese de la actividad ilícita del infractor y exigir la indemnización de los daños materiales y morales causados, en los términos previstos en los artículos 139 y 140. También podrá instar la publicación o difusión, total o parcial, de la resolución judicial o arbitral en medios de comunicación a costa del infractor….
>
> Tanto las medidas de cesación específicas contempladas en el artículo 139.1.h) como las medidas cautelares previstas en el artículo 141.6 podrán también solicitarse, cuando sean apropiadas, contra los intermediarios a cuyos servicios recurra un tercero para infringir derechos de propiedad intelectual….
>
> Art. 139. h) La suspensión de los servicios prestados por intermediarios a terceros que se valgan de ellos para infringir derechos de propiedad intelectual, sin perjuicio de lo dispuesto en la Ley 34/2002, de 11 de julio, de servicios de la sociedad de la información y de comercio electrónico.”
A nadie honesto, y con un mínimo de sentido común e intención de realizar una hermeneútica correcta, puede escapársele que dichos artículos no están pensados para el supuesto de hecho que nos ocupa, donde no consta la existencia de una válida declaración de infracción de propiedad intelectual, que se ha construido de forma artificial, sin respeto a los principios de dualidad y contradicción de partes, generando una evidente indefensión a las partes que se ven perjudicadas por la pretensión de los demandantes. La Audiencia Provincial de Barcelona tuvo oportunidad de analizar estas peculiares y exóticas previsiones normativas en su Sentencia nº 115/2018, de fecha 20 de febrero de 2018, que es citada por las sentencias que afectan a la polémica que analizamos, y donde sobre la génesis de estos preceptos nos indica:
> “15. El redactado de los artículos 138 y 139 del TRLPI , en lo que afecta a **la extensión de las acciones de cesación a los intermediarios, no aparecía en el texto originario de la Ley**, es consecuencia de una de las múltiples reformas que se han llevado a efecto para adaptar la normativa española sobre propiedad intelectual a la normativa comunitaria. Concretamente, la reforma que afecta a estos preceptos es la llevada a efecto por la Ley 23/2006, de 7 de julio, por la que se modifica el texto refundido de la Ley de Propiedad Intelectual, aprobado por el Real Decreto Legislativo 1/1996, de 12 de abril.
> La Exposición de Motivos de esta reforma indica las razones de la misma:
> «La razón de esta reforma del texto refundido de la Ley de Propiedad Intelectual, aprobado por el Real Decreto Legislativo 1/1996, de 12 de abril, responde a la necesidad de incorporar al derecho español una de las últimas directivas aprobadas en materia de propiedad intelectual, la Directiva 2001/29/CE del Parlamento Europeo y del Consejo, de 22 de mayo de 2001, relativa a la armonización de determinados aspectos de los derechos de autor y derechos afines a los derechos de autor en la sociedad de la información, con la que la Unión Europea, a su vez, ha querido cumplir los Tratados de la Organización Mundial de la Propiedad Intelectual (OMPI) de 1996 sobre Derecho de Autor y sobre Interpretación o Ejecución y Fonogramas.»
> Y, en el último punto de la Exposición de Motivos, se especifica el alcance de la reforma respecto de las acciones y procedimientos:
> «Respecto a las acciones y procedimientos que los titulares de los derechos pueden instar, se establece, por primera vez, la **posibilidad de solicitar medidas cautelares contra los intermediarios** a cuyos servicios recurre un tercero para infringir derechos de propiedad intelectual, sin la exigencia de que el intermediario sea también infractor.»
Es decir, la propia norma, en su exposición de motivos, limita la aplicación de los meritados preceptos, en cuanto a la posibilidad de dirigir la acción directamente contra los intermediarios, al **ámbito de las medidas cautelares.** Ello se deriva igualmente de lo dispuesto en las disposiciones europeas aplicables, como indica la sentencia al decir:
> “Por lo tanto, la interpretación de estos preceptos debe hacerse en consonancia con la normativa de la Unión Europea y la jurisprudencia que la desarrolla.
> 16.- La Directiva 2001/29/CE en su considerando 59 destaca uno de los objetivos de la misma: «Sobre todo en el entorno digital, es posible que terceras partes utilicen cada vez con mayor frecuencia los servicios de intermediarios para llevar a cabo actividades ilícitas. En muchos casos, estos intermediarios son quienes están en mejor situación de poner fin a dichas actividades ilícitas. Así pues, y sin perjuicio de otras sanciones o recursos contemplados, los titulares de los derechos deben tener la posibilidad de solicitar **medidas cautelares** contra el intermediario que transmita por la red la infracción contra la obra o prestación protegidas cometida por un tercero. Esta posibilidad debe estar abierta aun cuando los actos realizados por el intermediario estén exentos en virtud del artículo 5. Debe corresponder a la legislación nacional de los Estados miembros regular las condiciones y modalidades de dichas **medidas cautelares**.»
> Y, para la consecución de este objetivo, el artículo 8.3 de la Directiva establece que:
> «3. Los Estados miembros velarán porque los titulares de los derechos estén en condiciones de solicitar **medidas cautelares** contra los intermediarios a cuyos servicios recurra un tercero para infringir un derecho de autor o un derecho afín a los derechos de autor.»
> 17.- La Directiva comunitaria en principio prevé únicamente la existencia de **medidas cautelares** frente a los intermediarios, así aparece también en el TRLPI ya que el artículo 138 en sus incisos finales hace referencia a medidas cautelares, es decir, medidas instrumentales, necesarias para asegurar la efectividad de la tutela judicial que pudiera otorgarse en la sentencia estimatoria que se dictare.”
>
No obstante lo anterior, **la Audiencia Provincial**, en un pronunciamiento que, entendemos, cuando menos de dudosa constitucionalidad, considera que la Ley permite el ejercicio de estas pretensiones más allá del ámbito de las “acciones y **medidas cautelares urgentes**” que menciona la Exposición de Motivos, la normativa europea y el propio título del art. 138, argumentando lo siguiente:
> “Sin embargo, al desarrollarse el contenido de las acciones de cesación el artículo 139 incluye expresamente la suspensión de los servicios prestados por el intermediario (art. 139.1.h), lo que puede habilitar no sólo a la solicitud de medidas cautelares, sino también a la petición, como pretensión principal, de la suspensión de los servicios. Este régimen legal interno, sin duda más amplio que el derivado del artículo 8.3 de la Directiva, permite abrir una serie de escenarios procesales con trascendencia material por cuanto podría habilitar a dirigir demandas únicamente frente a los intermediarios y no frente al infractor, o podría también habilitar cauce procesal para iniciar acciones frente a los intermediarios sin que exista una previa declaración de infracción imputable, en todo caso, a quien se vale de esos proveedores de servicios para realizar una actividad infractora.”
Parece de dudosa constitucionalidad que se extienda, más allá del estricto ámbito cautelar urgente, la posibilidad de acordar una medida como el cierre de una página web o restricción de servicios sin contar con la presencia en el litigio de las personas afectadas por las medidas. Pero **la Audiencia limita esta posibilidad y sí establece, al menos, la necesidad de que exista una constatación de la existencia de infracción**, como presupuesto para el ejercicio de la acción. En este sentido, la Audiencia considera que un pronunciamiento administrativo al respecto no es suficiente, pero, sorprendentemente, sí considera que un informe de parte no sometido a contradicción, como sucede en el caso de la Sentencia del Juzgado de lo Mercantil nº 9, en cambio, sí constata la existencia de infracción. En concreto, así se pronuncia la Audiencia:
> “Estos problemas son los que se plantean en el supuesto de autos, dado que no ha sido llamado a juicio el titular de la página web supuestamente infractora (www.exvagos.com): no se ha producido un pronunciamiento civil en el que se declare la infracción por parte del titular de esta página web, aunque sí existe un pronunciamiento administrativo ante la Comisión de Propiedad Intelectual…
> Por lo tanto, la **constatación de una infracción de derechos de propiedad intelectual** es un presupuesto ineludible para poder ejercitar las acciones previstas en los artículos 138 y 139 del TRLPI…
> el procedimiento administrativo previo no puede servir, por sí solo, para dar por cumplido o satisfecho el presupuesto previo de infracción por parte del titular de la web, ni la retirada de contenidos puede tener el alcance de presunción de infracción….
> en los autos constan otros **documentos en los que se acredita de modo eficiente la realidad de la infracción**. Se trata, concretamente de la **prueba pericial** aportada como documento número 12 de la demanda… El examen de esa prueba pericial sí permite concluir que la página web exvagos facilita el acceso a contenidos y habilita un sistema de intercambio de archivos que infringe derechos de propiedad intelectual. Así lo hace ampliamente el juez de instancia en la Sentencia recurrida (fundamento de derecho cuarto). ”
En este mismo sentido, sobre la necesidad de constatar la existencia de la infracción, se pronuncia la Sentencia nº 15/2018, del Juzgado de lo Mercantil nº 6 de Barcelona, al decir, en un caso similar, que:
> “... el demandante **no quedará exento de probar**, con carácter prejudicial la infracción sobre los derechos de propiedad intelectual.”
Pues bien, **en el caso de Cloudflare, al menos hasta donde es conocido, no existe ninguna constatación de esa supuesta infracción** (más allá de un “informe técnico” no sometido a contradicción), y los demandantes, acaso en connivencia con los demandados (lo cual es obvio en el caso de TELEFÓNICA, que actúa, con diferentes empresas, como demandante y demandado), o conscientes de que para estos era más fácil allanarse que oponerse a unas pretensiones que no representan perjuicio alguno para ellos, construyen esta farsa de proceso judicial, para conseguir la restricción de los servicios, sin ofrecer la más mínima posibilidad de intervención en el litigio.
Debemos mencionar que algunas sentencias, como la anteriormente citada del Juzgado de lo Mercantil nº 6 de Barcelona, basan la procedencia de la medida acordada contra las páginas web en que sus “**titulares no han podido ser identificados ni localizados**”, en cuyo caso podría considerarse pertinente un procedimiento sin la participación del presunto infractor.
Pero eso no es lo que parece que suceda en este caso, donde al menos Cloudflare se encuentra perfectamente identificada.
Como vemos, la extensión de la posibilidad que tiene el titular de los derechos de accionar directamente contra los prestadores de servicios de intermediación fuera del ámbito cautelar urgente es algo que no da la impresión de estar previsto en la Ley y que, desde luego, es de una más que dudosa constitucionalidad. Si la LPI permite demandar al prestador de servicios, sin conocimiento siquiera del titular de los derechos que se ven afectados, y sin una declaración judicial dictada respetando los principios de igualdad entre las partes afectadas y de contradicción, con base únicamente en un documento de parte, que no ha sido sometido a contradicción, entonces dicha previsión ha de considerarse inconstitucional, al violar el art. 24 y la tutela judicial efectiva.
Conforme a una interpretación razonable de la Ley, la parte actora podría haber solicitado medidas cautelares frente a los prestadores de servicios, pero de forma coetánea o inmediatamente posterior demandar a los presuntos infractores, a fin de que en un proceso contradictorio se determinara si realmente existe infracción y permitir, a los afectados por las medidas poder exponer su visión del asunto en sede judicial.
Podría pensarse, así, que el Juzgado aceptó una interpretación inconstitucional de los artículos 138 y 139 LPI, y no tuvo en cuenta que el art. 21 LEC, establece que el allanamiento debe rechazarse cuando suponga, como es el caso, un perjuicio a tercero no demandado en el procedimiento, pues el art. 21 LEC indica que:
> “Cuando el demandado se allane a todas las pretensiones del actor, el tribunal dictará sentencia condenatoria de acuerdo con lo solicitado por éste, pero si el allanamiento se hiciera en **fraude de ley** o supusiera renuncia **contra el interés general** o **perjuicio de tercero,** se dictará auto rechazándolo y seguirá el proceso adelante.”
Las sentencias de los Juzgados de lo [Mercantil nº 6](https://www.poderjudicial.es/search/AN/openDocument/2d094260f53b5cdca0a8778d75e36f0d/20221006) y [9 de Barcelona](https://www.poderjudicial.es/search/AN/openDocument/3c85bed480cbb1daa0a8778d75e36f0d/20221004), que al parecer son las que sirven de base para las medidas que comentamos, exponen que no se perjudica a terceros, pero, como es notorio y ostensible, en este punto los juzgados de lo mercantil se equivocan del medio al medio, puesto que el allanamiento, sin duda alguna, supone un claro perjuicio de terceros, Cloudflare y sus usuarios legítimos, que ven cómo sus servicios son objeto de restricción, sin ofrecerles posibilidad de defenderse ni argumentar contra las pretensiones de las actoras, infringiendo así el art. 21 LEC, en cuya virtud, el allanamiento debe rechazarse cuando suponga, como es el caso, un perjuicio a terceros no demandados en el procedimiento.
De esta forma, como hemos expuesto, se ha articulado una suerte de procedimiento formal, inexistente en la práctica, para evitar un proceso contradictorio sobre su pretensión, eludiendo así la eventual participación de los afectados en el debate litigioso, algo que, deberemos convenir, supone una clara infracción del art. 24 de la Constitución, tal y como lo interpreta nuestro Tribunal Constitucional en sentencias como la STC 43/2010:
> “Este Tribunal ha declarado reiteradamente que el derecho a la tutela judicial efectiva sin indefensión (art. 24.1 CE) garantiza a **todos los que puedan resultar afectados por la decisión que se dicte en un proceso judicial el derecho a conocer su existencia, a fin de que tengan la posibilidad de intervenir en él, ser oídos, y ejercer la defensa de sus derechos e intereses legítimos**. Esta necesidad de promover la defensa, en la medida de lo posible, mediante la debida contradicción, **impone a los órganos judiciales un especial deber de diligencia** que, en palabras de la STC 56/2001, de 26 de febrero, FJ 2, “tiene especial importancia en el proceso de ejecución”. En concreto, y por lo que respecta a la posibilidad de intervenir en un proceso de ejecución, hemos afirmado que el derecho a la tutela judicial efectiva habilita a quienes ostenten algún derecho o interés legítimo que pueda verse afectado por los actos de ejecución a comparecer y actuar en el procedimiento, aunque no hubieran sido parte en el proceso principal, y a este fin los arts. 270 LOPJ y 260.2 LEC exigen que las resoluciones judiciales se notifiquen no sólo a las partes procesales, sino también a las personas a quienes se refieran o puedan parar perjuicio (SSTC 229/2000, de 2 de octubre, FJ 3; 56/2001, de 26 de febrero, FJ 2).”
Por otro lado, siguiendo la anterior sentencia, el art. 270 LOPJ impone el **deber de notificar las resoluciones judiciales**, no solo a las partes, sino “también **a quienes se refieran o puedan parar perjuicios**”, lo que, como indica la Audiencia Provincial de Barcelona en su Auto de 29 de junio de 2002, “va más allá de una mera facultad discrecional del juzgador, notificación que tiene por objeto poner en conocimiento de tales personas la resolución y posibilitar la defensa de su derecho inquietado o perturbado.”
Y en el mismo sentido, el art. 150 LEC establece que “**también se notificará la pendencia del proceso a las personas que, según los mismos autos, puedan verse afectadas** por la resolución que ponga fin al procedimiento.”
Da la impresión de que ambos preceptos han sido infringidos por los Juzgados y deberían determinar la nulidad de lo actuado y, por tanto, de las sentencias que comentamos. Como se ha expuesto, podría apreciarse una **vulneración del art. 21 de LEC, que impide acceder al allanamiento cuando ello suponga un perjuicio de tercero, fraude de Ley o contrarien intereses generales**, pero más allá de eso, podría dar lugar también a una **violación de la tutela judicial efectiva** reconocida en el art. 24 de la Constitución, desde el momento en que se obliga a unos terceros a soportar una condena sin posibilidad alguna de un proceso con unas mínimas garantías.
Como hemos dicho, la previsión del art. 138 LPI, que permite solicitar la suspensión de los servicios prestados por intermediarios a terceros directamente contra dichos intermediarios, queda circunscrita al ámbito establecido en el propio título del art. 138, “Acciones y medidas cautelares urgentes” y no constituyen una acción autónoma fuera del ámbito cautelar urgente.
En segundo lugar, una interpretación de dicho precepto, en el sentido de que permita el ejercicio de una acción de condena (en la práctica el cierre páginas web y diversos servicios relacionados con estas), sin posibilidad alguna de defensa de los afectados (Cloudflare y sus usuarios), iría en contra del art. 24 de la Constitución y si dicha Ley debe interpretarse en este sentido, sería inconstitucional.
Finalmente, si se admite la existencia de esa acción independiente y que la misma es constitucional, su procedencia debe conectarse con dos requisitos: una constatación efectiva de la existencia de infracción, que entendemos debe producirse en el marco de un proceso contradictorio donde se ofrezca al presunto infractor la posibilidad de defenderse, así como una imposibilidad de identificación y/o localización del mismo. El principio fundamental que rige el desarrollo del procedimiento en su conjunto es el derecho de las partes a no sufrir indefensión. Y la indefensión proscrita por el artículo 24.1 de la Constitución no es la meramente formal, sino la material, es decir, aquella que haya producido a la parte un real y efectivo menoscabo de sus posibilidades de defensa. Cabe citar en este sentido la [Sentencia del Tribunal Constitucional nº 161/2006](https://hj.tribunalconstitucional.es/HJ/es/Resolucion/Show/5763), de 22 de mayo de 2006:
> “Según una consolidada doctrina constitucional el derecho a la tutela judicial efectiva sin indefensión que se reconoce en el artículo 24.1 de la Constitución Española **garantiza el derecho a acceder al proceso en condiciones de poder ser oído y ejercer la defensa de los derechos e intereses legítimos**… La finalidad material de esta exigencia es la de llevar al conocimiento de los afectados las resoluciones judiciales, para que puedan adoptar la postura que estimen pertinente en defensa de sus intereses (por todas, las sentencias del Tribunal Constitucional 77/1997, de 21 de abril, FJ 2; y 216/2002, de 25 de noviembre, FJ 2)."
Esta trascendencia constitucional de la correcta configuración de los procesos, a fin de que los eventuales afectados puedan ser oídos y defenderse adecuadamente se extiende también a procedimientos en los que, formalmente, se configuran como terceros, como sucede en este caso. Sirva como muestra de ello, la STC 43/2010, de 26 de julio que contiene unos pronunciamientos perfectamente aplicables al caso, si sustituimos las referencias a “ejecución” por “medidas de cesación”:
> “Este Tribunal ha declarado reiteradamente que el derecho a la tutela judicial efectiva sin indefensión (art. 24.1 CE) garantiza a **todos los que puedan resultar afectados por la decisión que se dicte en un proceso judicial el derecho a conocer su existencia, a fin de que tengan la posibilidad de intervenir en él, ser oídos, y ejercer la defensa de sus derechos e intereses legítimos**.
>
> Esta necesidad de promover la defensa, en la medida de lo posible, mediante la **debida contradicción**, impone a los órganos judiciales un especial deber de diligencia que, en palabras de la STC 56/2001, de 26 de febrero, FJ 2, “tiene especial importancia en el proceso de ejecución”. En concreto, y por lo que respecta a la posibilidad de intervenir en un proceso de ejecución, hemos afirmado que el **derecho a la tutela judicial efectiva habilita a quienes ostenten algún derecho o interés legítimo que pueda verse afectado** por los actos de ejecución a comparecer y actuar en el procedimiento, aunque no hubieran sido parte en el proceso principal, y a este fin los arts. 270 LOPJ y 260.2 LEC exigen que las resoluciones judiciales se notifiquen no sólo a las partes procesales, sino también a las personas a quienes se refieran o puedan parar perjuicio (SSTC 229/2000, de 2 de octubre, FJ 3; 56/2001, de 26 de febrero, FJ 2).
>
> ...Afirmamos en aquel caso que ello “provoca la indefensión de la demandante de amparo, pues contra el mandato contenido en el art. 24.1 CE de promover la defensión mediante la correspondiente contradicción, y sin perjuicio del pronunciamiento que pueda recaer, de lo que se resuelva sobre la posesión y sobre la posible reserva de las acciones que puedan corresponder a los implicados, conforme acertadamente mantiene el Ministerio Fiscal, el órgano judicial acordó el lanzamiento del propietario y poseedor legítimo de una vivienda sin tan siquiera permitirle comparecer a defender su derecho en un procedimiento contradictorio” (FJ 9).
>
> En definitiva, de nuestra doctrina se desprende con **absoluta claridad que la interdicción de la indefensión consagrada en el art. 24.1 CE impone a los órganos judiciales el deber de velar por que quienes ostenten algún derecho o interés legítimo en un proceso** de ejecución, aunque no hayan sido parte en el proceso principal, **puedan comparecer y ser oídos en el mismo para garantizar su defensa**, sin perjuicio del pronunciamiento que pueda recaer y de la posible existencia de otras acciones que puedan corresponder a los afectados.
>
> …En definitiva, y como afirma el Ministerio Fiscal, **el órgano judicial no actuó con la diligencia debida en orden a procurar que los demandantes de amparo pudieran tener conocimiento y comparecer en un proceso** ejecutivo **en el que resultaban afectados sus intereses**... Y dicho comportamiento del órgano judicial **causó indefensión constitucionalmente relevante**, pues **les privó de su derecho a ser oídos y les impidió el ejercicio del derecho de defensa de sus legítimos derechos e intereses** sobre el citado inmueble, sin que exista dato alguno en las actuaciones del que se desprenda que los recurrentes conocieran la existencia del procedimiento ejecutivo o que no hayan actuado con la diligencia debida en orden a facilitar su comparecencia en el citado proceso.”
Es evidente que a los afectados por las medidas **se les privó del derecho a ser oídos** y **se les impidió el ejercicio del derecho de defensa** de sus legítimos intereses sobre las páginas y servicios que operaban, por lo que se ha producido una **violación del derecho a la tutela judicial efectiva** reconocida en el art. 24 de la Constitución.
Además, las medidas de bloqueo de direcciones compartidas afectan también a la **libertad de expresión e información** de terceros que no guardan relación alguna con el conflicto y, lo que es peor, puede tener una **negativa incidencia en servicios que podrían ser críticos,** lo que es un comportamiento peligroso, irresponsable y negligente.
Por todas estas razones, las sentencias deberían ser anuladas y las medidas derivadas de ellas dejadas sin efecto, ofreciendo en todo caso a los afectados la posibilidad de ser oídos en juicio y defender sus legítimos intereses.
-

@ 9e69e420:d12360c2
2025-02-14 15:14:34
A Russian drone attack has struck the radiation shelter at Chernobyl, according to Ukrainian President Volodymyr Zelensky. The strike caused a fire, but it has since been extinguished, and radiation levels remain stable. The International Atomic Energy Agency (IAEA) confirmed that no casualties occurred and that monitoring continues.
Rafael Mariano Grossi, IAEA's director general, emphasized the need for caution. Chernobyl, site of the 1986 nuclear disaster, contains a protective shield costing $1.6 billion. Disaster prevention remains a priority as the conflict unfolds.
The incident occurred shortly before the meeting of world powers at the Munich Security Conference in Germany.
-

@ 9e69e420:d12360c2
2025-02-13 23:01:36
Robert F. Kennedy Jr. has been confirmed as the next Secretary of Health and Human Services with a Senate vote of 52-48. Senator Mitch McConnell opposed the confirmation. Kennedy's nomination faced hurdles but gained support from the Senate Finance Committee.
During the confirmation hearing, Senator Rand Paul criticized the oversimplification of vaccine discussions. He stated, "Discussion over vaccines is so oversimplified and dumbed down." Kennedy asserted his support for vaccines like measles and polio, promising not to discourage vaccinations as HHS Secretary. Previously, he switched from the Democratic Party to run as an independent and endorsed Trump
-

@ e3ba5e1a:5e433365
2025-02-13 06:16:49
My favorite line in any Marvel movie ever is in “Captain America.” After Captain America launches seemingly a hopeless assault on Red Skull’s base and is captured, we get [this line](https://www.youtube.com/shorts/kqsomjpz7ok):
“Arrogance may not be a uniquely American trait, but I must say, you do it better than anyone.”
Yesterday, I came across a comment on the song [Devil Went Down to Georgia](https://youtu.be/ut8UqFlWdDc) that had a very similar feel to it:

America has seemingly always been arrogant, in a uniquely American way. Manifest Destiny, for instance. The rest of the world is aware of this arrogance, and mocks Americans for it. A central point in modern US politics is the deriding of racist, nationalist, supremacist Americans.
That’s not what I see. I see American Arrogance as not only a beautiful statement about what it means to be American. I see it as an ode to the greatness of humanity in its purest form.
For most countries, saying “our nation is the greatest” *is*, in fact, twinged with some level of racism. I still don’t have a problem with it. Every group of people *should* be allowed to feel pride in their accomplishments. The destruction of the human spirit since the end of World War 2, where greatness has become a sin and weakness a virtue, has crushed the ability of people worldwide to strive for excellence.
But I digress. The fears of racism and nationalism at least have a grain of truth when applied to other nations on the planet. But not to America.
That’s because the definition of America, and the prototype of an American, has nothing to do with race. The definition of Americanism is *freedom*. The founding of America is based purely on liberty. On the God-given rights of every person to live life the way they see fit.
American Arrogance is not a statement of racial superiority. It’s barely a statement of national superiority (though it absolutely is). To me, when an American comments on the greatness of America, it’s a statement about freedom. Freedom will always unlock the greatness inherent in any group of people. Americans are *definitionally* better than everyone else, because Americans are freer than everyone else. (Or, at least, that’s how it should be.)
In *Devil Went Down to Georgia*, Johnny is approached by the devil himself. He is challenged to a ridiculously lopsided bet: a golden fiddle versus his immortal soul. He acknowledges the sin in accepting such a proposal. And yet he says, “God, I know you told me not to do this. But I can’t stand the affront to my honor. I am the greatest. The devil has nothing on me. So God, I’m gonna sin, but I’m also gonna win.”
*Libertas magnitudo est*
-

@ c5717281:73e128f4
2025-02-14 20:35:53
This is a test.
-

@ c230edd3:8ad4a712
2025-02-15 17:13:30
## Chef's notes
I prefer to use skinless, boneless chicken thighs. Any part, bone in or out, will work fine. I do recommend removing skin, so that the sauce can saturate the meat.
I like to simmer fresh green beans in the sauce as the chicken cooks through. Any fresh vegetable would work fine. Simply add them early in the cooking time and stir occasionally.
## Details
- ⏲️ Prep time: 10-15 min
- 🍳 Cook time: 30 min - 1 hour
- 🍽️ Servings: 1 - 8, or more
## Ingredients
- Skinless, boneless chicken thighs, or other cut
- Garlic Powder
- Garlic Cloves, 1 per piece of chicken, minced & salted
- Butter, 1 Tbsp per piece
- Chicken Broth or White Wine, approx 1/4 c. per piece
- oil for searing
## Directions
1. Heat oil over med-high heat in appropriate sized pan
2. Season chicken with garlic powder on both sides
3. Brown chicken, smooth side first. Flip and repeat
4. While chicken is browning, mince and salt garlic
5. Add butter to the pan, scrape loose any caramelized bits from the pan, as the butter melts
6. Add minced garlic, and saute until soft and fragrant
7. Add chicken broth or wine and stir, add vegetables if desired
8. Increase heat to bring to a boil, then reduce heat to simmer
9. During simmer, scoop sauce over chicken occasionally, more frequently as sauce reduces
10. If cooking vegetables, flip or stir when coating the chicken to ensure they spend time fully submerged
11. Cook until chicken is done, vegetables are soft, and sauce is reduced to a thick paste
12. Serve :)
-

@ daa41bed:88f54153
2025-02-09 16:50:04
There has been a good bit of discussion on Nostr over the past few days about the merits of zaps as a method of engaging with notes, so after writing a rather lengthy [article on the pros of a strategic Bitcoin reserve](https://geek.npub.pro/post/dxqkgnjplttkvetprg8ox/), I wanted to take some time to chime in on the much more fun topic of digital engagement.
Let's begin by defining a couple of things:
**Nostr** is a decentralized, censorship-resistance protocol whose current biggest use case is social media (think Twitter/X). Instead of relying on company servers, it relies on relays that anyone can spin up and own their own content. Its use cases are much bigger, though, and this article is hosted on my own relay, using my own Nostr relay as an example.
**Zap** is a tip or donation denominated in sats (small units of Bitcoin) sent from one user to another. This is generally done directly over the Lightning Network but is increasingly using Cashu tokens. For the sake of this discussion, how you transmit/receive zaps will be irrelevant, so don't worry if you don't know what [Lightning](https://lightning.network/) or [Cashu](https://cashu.space/) are.
If we look at how users engage with posts and follows/followers on platforms like Twitter, Facebook, etc., it becomes evident that traditional social media thrives on engagement farming. The more outrageous a post, the more likely it will get a reaction. We see a version of this on more visual social platforms like YouTube and TikTok that use carefully crafted thumbnail images to grab the user's attention to click the video. If you'd like to dive deep into the psychology and science behind social media engagement, let me know, and I'd be happy to follow up with another article.
In this user engagement model, a user is given the option to comment or like the original post, or share it among their followers to increase its signal. They receive no value from engaging with the content aside from the dopamine hit of the original experience or having their comment liked back by whatever influencer they provide value to. Ad revenue flows to the content creator. Clout flows to the content creator. Sales revenue from merch and content placement flows to the content creator. We call this a linear economy -- the idea that resources get created, used up, then thrown away. Users create content and farm as much engagement as possible, then the content is forgotten within a few hours as they move on to the next piece of content to be farmed.
What if there were a simple way to give value back to those who engage with your content? By implementing some value-for-value model -- a circular economy. Enter zaps.

Unlike traditional social media platforms, Nostr does not actively use algorithms to determine what content is popular, nor does it push content created for active user engagement to the top of a user's timeline. Yes, there are "trending" and "most zapped" timelines that users can choose to use as their default, but these use relatively straightforward engagement metrics to rank posts for these timelines.
That is not to say that we may not see clients actively seeking to refine timeline algorithms for specific metrics. Still, the beauty of having an open protocol with media that is controlled solely by its users is that users who begin to see their timeline gamed towards specific algorithms can choose to move to another client, and for those who are more tech-savvy, they can opt to run their own relays or create their own clients with personalized algorithms and web of trust scoring systems.
Zaps enable the means to create a new type of social media economy in which creators can earn for creating content and users can earn by actively engaging with it. Like and reposting content is relatively frictionless and costs nothing but a simple button tap. Zaps provide active engagement because they signal to your followers and those of the content creator that this post has genuine value, quite literally in the form of money—sats.

I have seen some comments on Nostr claiming that removing likes and reactions is for wealthy people who can afford to send zaps and that the majority of people in the US and around the world do not have the time or money to zap because they have better things to spend their money like feeding their families and paying their bills. While at face value, these may seem like valid arguments, they, unfortunately, represent the brainwashed, defeatist attitude that our current economic (and, by extension, social media) systems aim to instill in all of us to continue extracting value from our lives.
Imagine now, if those people dedicating their own time (time = money) to mine pity points on social media would instead spend that time with genuine value creation by posting content that is meaningful to cultural discussions. Imagine if, instead of complaining that their posts get no zaps and going on a tirade about how much of a victim they are, they would empower themselves to take control of their content and give value back to the world; where would that leave us? How much value could be created on a nascent platform such as Nostr, and how quickly could it overtake other platforms?
Other users argue about user experience and that additional friction (i.e., zaps) leads to lower engagement, as proven by decades of studies on user interaction. While the added friction may turn some users away, does that necessarily provide less value? I argue quite the opposite. You haven't made a few sats from zaps with your content? Can't afford to send some sats to a wallet for zapping? How about using the most excellent available resource and spending 10 seconds of your time to leave a comment? Likes and reactions are valueless transactions. Social media's real value derives from providing monetary compensation and actively engaging in a conversation with posts you find interesting or thought-provoking. Remember when humans thrived on conversation and discussion for entertainment instead of simply being an onlooker of someone else's life?
If you've made it this far, my only request is this: try only zapping and commenting as a method of engagement for two weeks. Sure, you may end up liking a post here and there, but be more mindful of how you interact with the world and break yourself from blind instinct. You'll thank me later.

-

@ 8ea43eca:a2912095
2025-02-14 20:29:37
-

@ ec42c765:328c0600
2025-02-05 23:38:12
# カスタム絵文字とは
任意のオリジナル画像を絵文字のように文中に挿入できる機能です。
また、リアクション(Twitterの いいね のような機能)にもカスタム絵文字を使えます。

# カスタム絵文字の対応状況(2025/02/06)

カスタム絵文字を使うためにはカスタム絵文字に対応した[クライアント](https://welcome.nostr-jp.org/tutorial/explore-client.html)を使う必要があります。
※表は一例です。クライアントは他にもたくさんあります。
使っているクライアントが対応していない場合は、クライアントを変更する、対応するまで待つ、開発者に要望を送る(または自分で実装する)などしましょう。
#### 対応クライアント
- [Amethyst](https://play.google.com/store/apps/details?id=com.vitorpamplona.amethyst)
- [FreeFrom](https://freefrom.space/)
- [nostter](https://nostter.app/)
- [Rabbit](https://rabbit.syusui.net/)
- [Lumilumi](https://lumilumi.app/)
- [Nos Haiku](https://nos-haiku.vercel.app/)
- [Snort](https://snort.social/)
- [noStrudel](https://nostrudel.ninja/)
ここではnostterを使って説明していきます。
# 準備
カスタム絵文字を使うための準備です。
- Nostrエクステンション(NIP-07)を導入する
- 使いたいカスタム絵文字をリストに登録する
## Nostrエクステンション(NIP-07)を導入する
Nostrエクステンションは使いたいカスタム絵文字を登録する時に必要になります。
また、環境(パソコン、iPhone、androidなど)によって導入方法が違います。
Nostrエクステンションを導入する端末は、実際にNostrを閲覧する端末と違っても構いません(リスト登録はPC、Nostr閲覧はiPhoneなど)。
Nostrエクステンション(NIP-07)の導入方法は以下のページを参照してください。
[ログイン拡張機能 (NIP-07)を使ってみよう | Welcome to Nostr! ~ Nostrをはじめよう! ~ ](https://welcome.nostr-jp.org/tutorial/nip-07.html)
少し面倒ですが、これを導入しておくとNostr上の様々な場面で役立つのでより快適になります。
## 使いたいカスタム絵文字をリストに登録する
以下のサイトで行います。
[emojito](https://emojito.meme/)
右上の**Get started**からNostrエクステンションでログインしてください。
例として以下のカスタム絵文字を導入してみます。
実際より絵文字が少なく表示されることがありますが、古い状態のデータを取得してしまっているためです。その場合はブラウザの更新ボタンを押してください。
[generalJP | カスタム絵文字](https://emojito.meme/a/naddr1qqykwetwv4exzmz22qqsuamnwvaz7tmev9382tndv5hsyg8vgtrk2svt8kuusk4l7w5g7j3mhet4xhhthhz52gsyr7jn9rqxqqpsgqqqw48qud6u3s)

- 右側の**Options**から**Bookmark**を選択

これでカスタム絵文字を使用するためのリストに登録できます。
# カスタム絵文字を使用する
例としてブラウザから使えるクライアント nostter から使用してみます。
[nostter](https://nostter.app/)
nostterにNostrエクステンションでログイン、もしくは秘密鍵を入れてログインしてください。
## 文章中に使用
1. **投稿**ボタンを押して投稿ウィンドウを表示
2. **顔😀**のボタンを押し、絵文字ウィンドウを表示
3. ***タブ**を押し、カスタム絵文字一覧を表示
4. カスタム絵文字を選択
5. : 記号に挟まれたアルファベットのショートコードとして挿入される

この状態で投稿するとカスタム絵文字として表示されます。
カスタム絵文字対応クライアントを使っている他ユーザーにもカスタム絵文字として表示されます。
対応していないクライアントの場合、ショートコードのまま表示されます。

ショートコードを直接入力することでカスタム絵文字の候補が表示されるのでそこから選択することもできます。

## リアクションに使用
1. 任意の投稿の**顔😀**のボタンを押し、絵文字ウィンドウを表示
2. ***タブ**を押し、カスタム絵文字一覧を表示
3. カスタム絵文字を選択

カスタム絵文字リアクションを送ることができます。

# カスタム絵文字を探す
先述した[emojito](https://emojito.meme/)からカスタム絵文字を探せます。
例えば任意のユーザーのページ [emojito ロクヨウ](https://emojito.meme/p/npub1a3pvwe2p3v7mnjz6hle63r628wl9w567aw7u23fzqs062v5vqcqqu3sgh3) から探したり、 [emojito Browse all](https://emojito.meme/browse) からnostr全体で最近作成、更新された絵文字を見たりできます。
また、以下のリンクは日本語圏ユーザーが作ったカスタム絵文字を集めたリストです(2025/02/06)
※漏れがあるかもしれません
[日本ユーザー作 カスタム絵文字](https://nostviewstr.vercel.app/npub17hczqvxtfv3w69wr6lxrttnpdekwdwel55mld60fr24zwjuu6utqtj8mjx/10030)
各絵文字セットにある**Open in emojito**のリンクからemojitoに飛び、使用リストに追加できます。
-----------
以上です。
次:Nostrのカスタム絵文字の**作り方**
Yakihonneリンク [Nostrのカスタム絵文字の作り方](https://yakihonne.com/article/_@lokuyow.github.io/1707912490439)
Nostrリンク nostr:naddr1qqxnzdesxuunzv358ycrgveeqgswcsk8v4qck0deepdtluag3a9rh0jh2d0wh0w9g53qg8a9x2xqvqqrqsqqqa28r5psx3
-----------
# 仕様
[NIP-30 Custom Emoji](https://github.com/nostr-protocol/nips/blob/master/30.md)
[NIP-30 カスタム絵文字(和訳)](https://github.com/nostr-jp/nips-ja/blob/main/30.md)
-

@ c43d6de3:a6583169
2025-02-14 17:34:05
“IN THIS SPRING of 1953 the free world weighs one question above all others: the chance for a just peace for all peoples,” Dwight D. Eisenhower’s throat went dry and he swallowed to alleviate the burn. Eight years had passed since the end of world war 2 but still the beaches of the Marshall Islands lay charred, Hiroshima and Nagasaki dosed in radiation and ruin, and countless ghost towns still littered Europe’s mangled face.
Dwight peered through his glasses at his speech on the podium, then raised his gaze back at the small crowd gathered in front of him in the conference room at the American Society of Newspaper Editors in Washington, D.C. Everyone was on the edge of their seats.
The President spoke of peace, but the United States faced a great enemy in the Soviet Union. How would he continue?

“To weigh this chance is to summon instantly to mind another recent moment of great decision. It came with that yet more hopeful spring of 1945, bright with the promise of victory and of freedom. The hope of all just men in that moment too was a just and lasting peace.”
The heads among the spectators raised in hope, as if the enthusiasm in the President’s voice could be enough to wipe away any prospect of future war against the Soviet threat.
“In that spring of victory the soldiers of the Western Allies met the soldiers of Russia in the center of Europe. They were triumphant comrades in arms. Their peoples shared the joyous prospect of building, in honor of their dead, the only fitting monument-an age of just peace. All these war-weary peoples shared too this concrete, decent purpose: to guard vigilantly against the domination ever again of any part of the world by a single, unbridled aggressive power.”
“This common purpose lasted an instant and perished. The nations of the world divided to follow two distinct roads.”
“The United States and our valued friends, the other free nations, chose one road.”
“The leaders of the Soviet Union chose another.”
“The way chosen by the United States was plainly marked by a few clear precepts, which govern its conduct in world affairs.”
**What came next in Dwight D. Eisenhower’s speech “The Chance for Peace” is the answer to preventing wars between countries**
“First: No people on earth can be held, as a people, to be an enemy, for all humanity shares the **common hunger for peace and fellowship and justice.**
Second: No nation's security and well-being can be lastingly achieved in isolation but only in **effective cooperation** with fellow nations.
Third: **Any nation's right to a form of government and an economic system** of its own choosing **is inalienable**.
Fourth: Any nation's attempt to dictate to other nations their form of government **is indefensible**.
And fifth: A nation's hope of lasting peace cannot be firmly based upon any race in armaments but rather upon **just relations and honest understanding** with all other nations.”

**I. First Point**
When you minimize any nation or country to its most granular piece, the human family, you realize every nation or country is the same. It is a larger body of human families looking to establish peace out of chaos against nature, fellowship with their neighbor to make that peace possible, and justice against affronts to the foundations of the formerly stated peace and fellowship. Without this, what you have is not a nation but rather wilderness.

**II. Second Point**
When we enter the world stage and look at the community of nations it is important we understand that no nation can truly expect to uphold Eisenhower’s first point without the ability to cooperate with other nations. There can be a natural disaster that strikes an entire nation and without exterior help, it may be impossible to overcome.
Understand, Eisenhower’s second point only serves as an extension of the first point. Humankind's struggle with nature will always exist, but in cooperation with other communities we can overcome hardship against nature and live in better harmony.

**III. Third Point**
It cannot be argued that humans, after millenia of having dispersed across the planet, have collected into pockets of communities of which grew and developed with experiences based on the place in the world where they’ve resided.
This has birthed cultures, religions, and moral codes that serve as the foundation of different branches of philosophy that have borne the fruit of governance. Ultimately, no two communities shares the exact same moral code and thus do not share, and will never share, the exact same understanding of what governance should take place. In this respect, it is an inalienable right of the very people within a community to choose how they govern themselves.

**IV. Fourth Point**
In trying to impeded on this third point, we come to Eisenhower’s fourth point which is that no other community has the right to dictate how other nations govern themselves.
**V. Final Point**
Lastly, war will never lead to peace. Only common understanding of the first four points will ever lead to true peace. A race in armaments, as the cold war proved, only leads to further distrust and the breakdown of all other points among the community of nations on the world stage.
All that can be done to expect peace is to take your neighbor as they are. St. Augustine has a famous quote, “Seek not to understand that you may believe, but believe that you may understand.”
This is meant to drive home the point of faith in the unbelievable. It is how a religious person can believe in a god that they can not prove exists.
Some might say there will never be a world without war. I say we already have the recipe for it. We’ve been given this recipe by many leaders throughout our history. Leader’s who’ve witnessed the darkest depths of human evil and wanted to steer humanity away from it.

-----------
Thank you for reading! If this article resonated with you, let me know with a zap and share it with friends who might find it insightful. Your help sends a strong signal to keep making content like this!
Interested in fiction? Follow nostr:npub1j9cmpzhlzeex6y85c2pnt45r5zhxhtx73a2twt77fyjwequ4l4jsp5xd49 for great short stories and serialized fiction.
More articles you might like from Beneath The Ink:
https://primal.net/e/note1ws4es0gahm502k6qgx64dseqhjqgyzh0q7flzk6glcasqxxye6jqm20fj9
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqq25yan2w39rsjj0dqk5ckn52ptxsc3nve8hw0aftmq
https://primal.net/e/note158ns7z27r2y664h9lsdqdhsjj2uehrejve2y02lkvz46d8xgxncs8pcj7w
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqq2kjjzzfpjxvutjg33hjvpcw5cyjezyv9y5k0umm6k
https://primal.net/e/note1htkygah99mz8p4png992n0clqa44spatw3uzzcpl94etwh2zr60stklxvw
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqqa9wefdwfjj6stvdsk57cnnv4ehxety94mkjarg94g8ymm8wfjhxuedg9hxgt2fw3ej6sm0wd6xjmn8946hxtfjvsuhsdnju045ml
https://primal.net/e/note1rdanqhdgc7d8sypm459zrt55m0zfaze7u34phkew9nptyr3ghwlqsvtsdx
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqq2ns3jnfa985c29xp2rs3pexpykz6mjxetxu2g25x6
-

@ 0000065e:9b5b4c75
2025-02-14 01:55:12
En el ámbito bitcoiner es muy habitual que el Estado sea el blanco de las principales críticas, que se ve convertido así en el muñeco de paja al que dirigir nuestros palos. Pero no, en realidad es una piñata que está a punto de desmoronarse de los golpes que le pegan. Cada vez tengo más claro que gran parte de los movimientos "antiestatales", si no todos, están contribuyendo, consciente o inconscientemente, a los intereses de los políticos que nos han llevado a esta situación.
El Estado, con todos sus defectos, sigue siendo la principal unidad de ejercicio de la violencia organizada. Señalando al Estado como el origen de todos los males, no hacemos otra cosa que pegarnos un tiro en el pie, haciendo el caldo gordo a quienes trabajan para cercenar nuestras libertades.
Lo que está claro es que los políticos actuales, de boquilla firmes defensores del Estado, lo que están haciendo es provocar su colapso. Puede que estos políticos, o algunos de ellos, incluso no sean conscientes del todo, pero da igual, pues simplemente priman sus intereses personales, como hacemos todos, intentando aprovechar los incentivos que están encima de la mesa, con las reglas de juego que hemos ido asumiendo. No es que quieran más Estado o que pretendan dinamitarlo, tanto una cosa como otra no son más que las consecuencias de los incentivos que subyacen a nuestra forma de organizarnos en sociedad en el contexto actual. Albert Rivera, en una reciente charla con Iván Espinosa de los Monteros, aludía a esta idea criticando las [redes clientelares y de dependencia del Estado](https://youtu.be/AI7roBGtmvk?t=2709) que generan las actuales dinámicas políticas y adulteran el sistema democrático. Aunque, cabría dudar sobre si el propio “sistema democrático” tiene o no algo que ver con esta situación.
En cualquier caso, no es que la mayoría de políticos sean malvados por naturaleza, aunque algunos puedan realmente serlo; es irrelevante. Sus acciones no están motivadas por su maldad, ni por su ideología o su estupidez, sino, simple y llanamente, por sus intereses personales y los del grupo con el que los comparten.
Las ideologías que manejan los políticos se han convertido en nichos de mercado, en caladeros donde echar la caña a ver si pescan suficientes votos como para asegurarse su porvenir y el de los suyos. Es del todo irrelevante si se creen o no esas ideas que defienden con tanta vehemencia como ausencia de plausabilidad, o incluso si están a sueldo de intereses espurios. De cualquier forma, actuarán en función de lo que crean más conveniente para sus intereses personales y para que más peces caigan en sus redes. Véase, por ejemplo, como [Albert Rivera](https://www.youtube.com/watch?v=XrdCP3viocU), ahora que está fuera de la política, manifiesta que resulta evidente que el sistema de pensiones es una estafa piramidal, mientras que cuando estaba en política defendía lo contrario. O a [Errejón](https://www.youtube.com/watch?v=oZ0KfTsITh8), que sostenía la tesis de que no había denuncias falsas hasta que lo denunciaron a él.
Como digo, los políticos no son malvados o estúpidos (aunque haya algunos, o muchos, que entren en esas categorías), simplemente velan por sus intereses con las armas que tienen a su alcance y, como diría [Vito Corleone](https://youtu.be/Z1dRPt_4rZs?t=208), me es indiferente lo que un hombre haga para vivir. El problema es que esta dinámica está generando unas tendencias que se oponen al progreso que hemos generado como sociedad. Esas reglas de juego en la actualidad, convendremos, son inmorales, en el sentido de que actúan como una fuerza contraria a [nuestra supervivencia y potencia de actuar y obrar](https://maestreabogados.com/bitcoin-el-bien-y-el-mal/).
> *Este artículo forma parte de un trabajo más extenso en elaboración sobre las relaciones de Bitcoin con el Estado.*
-

@ dd664d5e:5633d319
2025-02-14 16:56:29
Most people only know customer-to-customer (C2C) and business-to-customer (B2C) software and websites. Those are the famous and popular ones, but business-to-business (B2B) is also pretty big. How big?
Even something boring and local like [DATEV](https://www.datev.de/web/de/startseite/startseite-n/) has almost 3 million organizations as customers and €1,44 billion in annual revenue.
FedEx has €90 billion in annual revenue and everyone who uses it comes into contact with its software. There's a whole chain of software between the sender and receiver of the package, and it all has to work seamlessly.
Same with Walmart, Toyota, Dubai Airport, Glencore, Tesla, Edeka, Carrefour, Harvard and University of Texas, Continental, Allianz, Asklepios, etc.
That's the sort of software I help build. You've probably never heard of it, but when it doesn't work properly, you'll hear about it on the news.
-

@ df478568:2a951e67
2025-02-07 22:34:11
Freedom tech is free and open-source software. It is free as in freedom. A common license in FOSS is the MIT license. It's the license behind Bitcoin, a peer-to-peer electronic cash system. Anyone is free to run this software. The same is true for the software at mempool.space. The software is free to use. I run it on my own server.
This is what I use to time-stamp my articles. You can use it to check transactions on the bitcoin time chain, but you need to trust that I'm not doing any funny business. I'm not, but keep in mind, the whole point of p2p elwctronic cash is that you don't trust. You verify.
The beauty of FOSS is: You don't need to trust me. You can triple-check the transactions you search on my mempool instance by looking at the official mempool.space website and blockchain.info...Or...You can run your own node on your own hardware, free of charge.
Of course, the hardware is not free. Neither is the actual bitcoin. The freedom is built into the software, but as the saying goes, "freedom isn't free." It took me years to learn how to run my own software on my own server and make it available on the clear net.
## SearXNG

[SearXNG](https://github.com/searxng/searxng) is my favorite search engine. I don't like giving up my precious data to big tech located in the United States or China. I run my own search engine. I have noticed certain biases in Google searches. The biggest problem is ads.
Companies tend to pay for Yelp and Google reviews. I called an AC company I found from a local magazine that came in the mail. A portly man wearing an HVAC costume drove to my house in a white van. He had a great smile and even better social skills. The van had a slogan plastered on it like most tradie vans do. "Reviews Matter We have a 4.9 Review on Google." He also had his name painted on this van like a Bomber pilot from WW2. I won't dox him, but it was something like "Joe the closer."
I don't trust the omnipotenence of the Googs. I also don't trust fat men they call "the closer" to give me the best deal. The trick to saving sats is to choose the game-theory optimal way of negogiation.
In DUCY, by David Sklansky, I learned useful negotiation skills. Sklansky wrote classic poker books and applied his actuarial math brain to negotiation techniques. He said he would go to a Toyota dealer and say, "I'm shopping for a new Camry. I already have a price from dealership XYZ in a nearby city. What is your price?"
This changes the dynamic right from the starting line and gives the consumer the advantage. So I tried this based technique with the HVAC industrial complex. I got a quote from 3 people:
1. Joe "The Closer."
2. The Costco-sponsored HVAC Company
3. My SearXNG search results.
In essence, I apply the same logic I learned running a full bitcoin node. Remember how I said the decentralized nature of bitcoin allows you to **triple-check your transactions?** Running SearXNG allows me to triple check my search results in a similar fashion. I don't trust Google, Costco, or the magazine I get every month in the mail. I verify results with my own search engine.
My SearXNG does not track my location, but I set it to give me local results. To be honest, I have not verified this, but the code is on GitHub for everyone to see.
I don't want to be "sold" on an AC. I don't want an AC if I could avoid it, but my AC was as dead as dentacoin. Living in Southern California with a wife going through "the change" gave me no alternative.
The guy I found on SearXNG showed up in an unmarked van. He had a beard. He was not "a closer." He was an actual HVAC technician. He tried cleaning my unit made in the same year Weezer released their Blue album. He said he coukd jerry rig it to get it working for another few months, but the machine is on it's last days. He said a newer unit would also be more efficient so I asked him about the energy like a bitcoiner.
"How many kilowatt hours does it cost me to run my AC versus a new AC?"
I don't remember the exact answer, but I asked all three companies. He was the only one that new how to find out. He also happened to be the cheapest, but I would have bought a new AC from this guy even if he wasn't.
I told him I made a space heater out of a bitcoin miner. He had no idea this was possible, but he at least pretended to find it interesting. That's why I use SearXNG to find tradesmen. It's better than Yelp.
If you would like to try my instance of SearXNG, check it out.
`523FeCpi9Gx4nR9NmSFIMEaYcI5Q4WmhYHPEPaEah84=`
To decrypt it, use the key behind the paywall at:
https://8gwifi.org/CipherFunctions.jsp
npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
[882785](https://mempool.marc26z.com/block/00000000000000000001840e7986ea4b6ea103f5af9b524dc102be926a831dee)
[merch](https://marc26z.com/merch/)
**Follow me on nostr**.
All of my work is available under the Creative Commons 0 licence. If you would like to try my instance of Searxng and do not wish to support my work, find me on habla.news by searching my npub. You can find all of my work there(including encryption keys)free of charge.
# Paywall On Substack
abdominal.savior.repaint
Will decrypt this ciphertext:
523FeCpi9Gx4nR9NmSFIMEaYcI5Q4WmhYHPEPaEah84=
Which will reveal my instance of SearXNG at
https://searxng.marc26z.com/
[Subscribe on Subtack](https://substack.com/@marc26z)
-

@ 554ab6fe:c6cbc27e
2025-02-14 16:29:51
Bitcoin’s Price and the Power Law: A Reflection of Energy and the Early Stages of Monetary Adoption Introduction Bitcoin’s price trajectory has long puzzled analysts, with its seemingly chaotic booms and busts. However, when examined through the lens of power laws, a pattern emerges—one that is fundamentally tied to Bitcoin’s energy-based production cost. This article argues that Bitcoin’s price has historically followed a power law because its underlying cost structure is dictated by mining, an energy-intensive process. However, this relationship will not persist indefinitely. I propose that as Bitcoin matures into a widely adopted monetary system, its price will decouple from mining production costs and instead oscillate in accordance with natural business cycles, much like traditional forms of money.
**Bitcoin’s Price and the Power Law**
Source and Credit: Giovanni Santostasi’s “[The Bitcoin Power Law](https://giovannisantostasi.medium.com/the-bitcoin-power-law-theory-962dfaf99ee9)”
When Bitcoin’s price is plotted on a logarithmic scale against time, a strikingly straight-line trajectory appears, punctuated by cycles of rapid price expansion (bull markets) followed by severe corrections (bear markets). These perturbations correspond to Bitcoin’s well-known halving cycles, which occur approximately every four years and reduce the block reward paid to miners, effectively doubling the cost of production per Bitcoin. Historically, Bitcoin’s price has always returned to a fundamental minimum—one that closely aligns with the average cost of mining.
This observation suggests that Bitcoin’s power law price behavior is not arbitrary but rather a reflection of its fundamental energy constraints. As in many natural systems governed by power laws, energy dynamics play a central role. In Bitcoin’s case, the “base layer” of its valuation is determined by the energy and computational resources required for mining. This power law behavior is therefore a consequence of Bitcoin’s fundamental design: as block subsidies decrease and mining efficiency improves, the minimum sustainable price follows an upward trajectory dictated by production costs.
**Bitcoin as an Energy-Based System**
Power laws commonly emerge in natural systems involving energy constraints, from thermodynamics to biological ecosystems and planetary dynamics. Bitcoin, as an energy-based monetary system, exhibits similar characteristics. Mining requires significant electricity and computational power, and as the difficulty adjustment ensures a competitive equilibrium, the cost of mining a Bitcoin remains closely tied to its market value over the long run.
Unlike traditional fiat currencies, which are controlled by central banks and subject to arbitrary monetary expansion, Bitcoin’s supply schedule is immutable. Its economic foundation is rooted in **proof of work**, where value is derived from energy expenditure. This fundamental linkage between energy and price explains why Bitcoin’s valuation has adhered to a power law trajectory. It is an entropy engine, and follows physical laws related to energy and entropy.
However, this pattern is not a permanent feature of Bitcoin’s monetary future—it is, rather, an indication of Bitcoin’s **early-stage monetization process**.
**The Transition from Mining-Based Pricing to a Business Cycle**
A crucial implication of Bitcoin’s price following a power law dictated by mining costs is that it suggests Bitcoin has yet to fully mature as money. If Bitcoin were already a widely adopted monetary standard, its valuation would no longer be primarily influenced by the floor mining costs but instead by macroeconomic forces—specifically, the natural fluctuations of the business cycle.
In a world where Bitcoin is the dominant global currency, the “price of money” (which correlates with the cost of capital and prevailing interest rates) would fluctuate according to the broader economic cycle. The dynamics would resemble those of natural interest rate cycles described by the Austrian School of Economics:
- During periods of economic expansion, lower interest rates spur increased investment and consumption, prices slightly rise, and savings deplete.
- As savings decline and prices rise, interest rates naturally rise as well, leading to reduced investment and spending, initiating a contractionary phase and lowered prices.
- During the contraction, savings accumulate, more capital becomes available, and interest rates and prices decline.
- With the availability of capital, lower interest rates and lowered prices, the economy is now ready to enter a phase of investment and expansion once again.
- This oscillatory process continues indefinitely, driven by real economic growth rather than central bank intervention.
If Bitcoin were fully monetized, its price would no longer oscillate based on mining halvings and energy costs but instead reflect **economic expansion and contraction cycles**—just as traditional currencies do when not artificially manipulated by central banks.
**The Early Stage Indicator: Bitcoin’s Dependence on Mining Costs**
Today, Bitcoin’s price still “bounces” off the power law baseline, indicating that its valuation remains primarily anchored to its minimum cost of production. This means that, while Bitcoin is widely recognized as an asset, it has not yet reached the level of adoption where its price is dictated by macroeconomic cycles.
A future in which Bitcoin is used as a primary medium of exchange and unit of account would necessarily imply a **decoupling from mining-driven pricing**. Instead of periodic halvings triggering speculative bull runs followed by crashes, Bitcoin’s price would become far more stable, with fluctuations primarily driven by business cycle dynamics. The continued adherence to the power law model, therefore, is evidence that Bitcoin is still in an early phase of adoption—where mining remains a primary determinant of price.
**Conclusion**
Bitcoin’s price trajectory has long conformed to a power law, reflecting the underlying energy costs of mining. This characteristic, however, is likely not a permanent feature but rather a hallmark of Bitcoin’s early stage as an emerging monetary system. As adoption increases and Bitcoin becomes widely used as money, its price should transition away from being dictated by mining costs and should instead fluctuate according to the natural oscillations of the business cycle.
The persistence of Bitcoin’s power law trend is a sign that it remains in its infancy. The real transformation will occur when Bitcoin is no longer bound to its production cost but is instead driven by the natural ebb and flow of savings, investment, and capital cycles—marking its full emergence as a global monetary system.
Disclaimer: The information provided in this blog is for informational and educational purposes only and should not be construed as financial advice. Please consult with a financial advisor or conduct your own research before making any financial decisions.
-

@ fe32298e:20516265
2025-02-06 02:11:34
I've been using AI tools to help with coding for a while now, but it's always been copy/pasting into ChatGPT and DeepSeek. Faster iteration is better, and privacy is best. So it's time to figure out how to use these tools integrated into [VSCodium](https://github.com/VSCodium/vscodium) and running locally. After a quick review of the most popular extensions I've heard about, I settled on [Tabby](https://github.com/TabbyML/tabby).
## What the heck does this actually DO?
* Code completion - like autocomplete suggestions, looks at your code and suggests the next thing to type at the cursor. You can see it in gray text, then press Tab and it's added to your code.
* Chat - easily chat with an LLM about your code inside your editor, faster than copy/pasting into a website.
* Apparently it can write docs and tests too.
## Can I run it locally? Without a GPU? YES!
Tabby is optimized for small models that only need a few GBs of RAM. I'm using a fairly old [System76](https://system76.com/) Galago Pro with Core i5-10210U and 16 GB RAM. The fans spin up, and Tabby sometimes shows a warning about slow response time, but it seems usable.
## How do I get it set up?
This is the overview, look for step-by-step instructions at the end of this article.
1. Install the Tabby server, which runs locally.
1. Start the Tabby server and tell it to serve some models which it will download automatically.
1. Log in to the Tabby server web interface and create an admin account.
1. Install the Tabby extension in your editor.
1. Connect the Tabby extension to your Tabby server.
## How do I actually use it?
1. Click **Tabby** in the bottom-right corner to open the Tabby command palette.
1. Select **Chat** to open the Chat pane. Drag it to the right side if you want.
1. Or, *Ctrl-Shift-P* and type "tabby" to see some Tabby commands
1. Select some code and *Ctrl-Shift-P* "tabby" to see more Tabby commands
1. **Explain this** seems like a useful one.
Other than that, I don't know! I just started using it today.
## What model should I use?
As usual, it depends. If you're using CPU instead of GPU, start with the ones recommended by Tabby and shown in the Step-by-Step below. Tabby has a [registry of models](https://tabby.tabbyml.com/docs/models/) you can choose from, and a [leaderboard](https://leaderboard.tabbyml.com/) to compare them.
## Step-by-Step
This is for Ubuntu 24.04, and no GPU.
```
# install pre-reqs
sudo apt install build-essential cmake libssl-dev pkg-config
sudo apt install protobuf-compiler libopenblas-dev
sudo apt install make sqlite3 graphviz
# install rust
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
. "$HOME/.cargo/env"
# build tabby
git clone --recurse-submodules https://github.com/TabbyML/tabby
cd tabby
cargo build
# run tabby (downloads ~3 GB of models)
./target/debug/tabby serve --model StarCoder-1B --chat-model Qwen2-1.5B-Instruct
# browse to http://0.0.0.0:8080 and create an admin user
```
* Install the Tabby extension in your editor. VSCodium had it in the extensions store by searching for "tabby" or try this `ext install TabbyML.vscode-tabby`
* *Ctrl-Shift-P* and look for "Tabby: Connect to server"
* Use the default of `http://localhost:8080`
* Switch over to the Tabby web interface, click your Profile Picture and copy the auth token
* Paste that into Tabby somewhere. I'm sure you'll figure it out if you got this far.
-

@ da0b9bc3:4e30a4a9
2025-02-14 15:21:29
It's Finally here Stackers!
It's Friday!
We're about to kick off our weekends with some feel good tracks.
Let's get the party started. Bring me those Feel Good tracks.
It is valentine's so let's get all gooey and soft, let's feel good and loved up.
If the world was ending, I'd wanna be next to you.
https://youtu.be/kPa7bsKwL-c?si=XbAaVfCHLZw6_0n6
Talk Music. Share Tracks. Zap Sats.
Let's go!
originally posted at https://stacker.news/items/885888
-

@ 9e5a3a1a:ed414e8d
2025-02-02 00:51:34
(deleted)
-

@ b2caa9b3:9eab0fb5
2025-02-14 13:55:53
After spending two weeks in Arusha, it was time to move on. My next stop was Dodoma. I walked to the bus station in the center of Arusha to check ticket prices, but I disliked the chaotic atmosphere — people approached me nonstop, trying to sell me tickets to destinations I had no interest in. Instead, I went to the Shabiby office, a reputed bus company, and secured a ticket for 29,000 TZS. The bus was scheduled to leave at 10 A.M. the next day, giving me time to prepare.

*Photo above: a stop between Arusha and Dodoma.*
I returned to my hostel, packed my bag, and picked up snacks and water from Shoppers Supermarket, knowing that Tanzanian bus rides tend to take longer than expected. The 80-kilometer journey from Moshi to Arusha had taken me up to three hours, so I expected the longer trip to Dodoma to stretch beyond the promised eight hours.
## The Journey to Dodoma
The bus ride was predictably long, making frequent stops along the way. Upon arrival in Dodoma, the bus meandered through the city, dropping off passengers. My booked accommodation was just under two kilometers from the final stop, so I decided to walk, relying on Google Maps to guide me.

*Photo above: in Dodoma.*
When I arrived at what was supposed to be my lodging, I was skeptical. The house lacked a sign, and an elderly woman was doing laundry in the yard. When I asked if this was the right place, she called a younger woman who spoke English and welcomed me inside. The accommodation was a full apartment, complete with a kitchen, but not cheap. Later in the evening, I attempted to shower, only to discover there was no running water. I resorted to a bucket shower, but the cramped bathroom caused water to spill into the apartment.

*Photo above: the Baobab Café in Dodoma.*
## Exploring Dodoma
The next day, I set out to explore Dodoma. I passed a cozy café and an old-looking church, which I later learned was not as ancient as it seemed. Strolling down a lively shopping district, I admired the small stores lining the streets. Eventually, I settled at the café I had spotted earlier, enjoying a simple dinner of bread and tomato salad.

*Photo above: the church in Dodoma.*
Originally, I had planned to stay for just one night, but the city intrigued me, and I extended my stay. This meant I had to book my next bus ticket and gather supplies. Using the Bolt app, I ordered a TukTuk to take me to the Shabiby bus terminal. The ride cost 2,000 TZS — without Bolt, I would have been charged significantly more. I bought my ticket to Mbeya for 40,000 TZS, with a departure time of 5:30 A.M.
That night, I packed my bags and went to bed early, knowing I had an early start ahead.
## The Departure to Mbeya
Waking up at 3:30 A.M., I hurriedly took another bucket shower — still no running water. I initially planned to order a TukTuk, but the Bolt app showed no available drivers. With the bus station only a 13-minute walk away, I set out on foot. Along the way, I stepped into a water hole, soaking myself up to my knees. Street vendors persistently offered me motorcycle rides, but I ignored them and continued walking.

*Photo above: in Dodoma.*
Arriving at the bus station, I saw the previous bus to Mbeya departing. My gut told me something was wrong. Sure enough, my bus was delayed by almost an hour. Finally, it arrived, and I boarded, relieved that I hadn’t missed it after all.
## A Long Ride to Mbeya
The previous day, I had suffered from severe diarrhea. Fortunately, a local pharmacy in Dodoma provided me with pills that helped stabilize my system. I also continued taking my daily dose of Doxycycline as a malaria precaution.

*Photo above: shopping street in Dodoma.*
This time, I had a window seat with no one beside me, allowing me to place my backpack on the empty seat. As we traveled, I watched the Tanzanian landscape unfold. At one point, the bus crossed a dam, likely a reservoir, before being stopped by police. A policeman entered, checked my passport, and inquired about my destination. When I mentioned Mbeya, he ask me where after, and I told him to Lusaka. Then he asked if it was in Zambia, returned my passport, and he let us continue.

*Photo above: the Baobab Café in Dodoma.*
My host in Mbeya had instructed me to get off at Nane Nane Stand. Upon arrival, I searched for a TukTuk. Without internet access, I had to negotiate fares blindly. After rejecting overpriced offers, I managed to bargain a price of 5,000 TZS for the short ride to my accommodation, what was a bit high for a Tuktuk.
## Mbeya and the Journey to the Border
Initially planning to stay two nights, exhaustion led me to extend for an extra night. The hostel was beautiful and clean but, yet again, had no running water. However, this time, the host kindly boiled water for me, allowing me to take a warm bucket shower.

*Photo above: on the way to the Supermarket in Dodoma.*
On my final day in Mbeya, I explored the city, visiting a new children's hospital and an old church. Tuktuk drivers repeatedly tried to overcharge me, but I insisted on the standard 800 TZS fare for public transport.

*Photo above: on the way to the Supermarket in Dodoma.*
The following morning, after a quick breakfast, I set off for the bus station with a fellow traveler I met at the hostel. Together, we took a bus to Tunduma for 5,000 TZS each. From there, a TukTuk ride to the border cost another 5,000 TZS.
## Crossing into Zambia
The border crossing was straightforward for me — I received a free 30-day visa for Zambia. My Russian travel companion, however, needed a visa on arrival, payable in cash and only in USD. The immigration officer arranged a taxi to take us to an ATM, but the only available bank, Absa, charged exorbitant fees. Fortunately, we later found a Zanaco ATM in Nakonde that had no fees.

*Photo above: between Dodoma and Mbeya.*
Once we had the necessary cash, we returned to the Border immigration, paid for the visa, and proceeded into Zambia. We walked to town, grabbed some food, and checked into Shalom Hotel. It was cheap, costing only 200 Kwacha per night (under 10 Euros), but lacked cleanliness and had no running water.
## A Frustrating Bus Experience
We booked a 4 A.M. bus to Lusaka with Jkas, supposedly the best company. However, when we arrived at the station at 3:28 A.M., the bus was already gone. The staff had lied, telling us the bus left at 4 A.M. but actually departing at 3 A.M. They then offered an overpriced taxi to chase the bus, which we declined.

*Photo above: between Dodoma and Mbeya.*
With no other options left, we searched for an alternative and eventually made our way to the PowerTools bus station — only to find that the bus also had already left.
The next bus? **Overnight.**
We were stuck.
### The Boda Chase
That’s when a Boda driver approached us. He had been waiting at the Powertools station, watching the situation unfold. **“I know where your bus is,”** he said. **“At the checkpoint. I can take you.”**
There was no time to think. We climbed on.
The night was pitch black, the streets slick with rain and mud. As soon as he twisted the throttle, the bike lurched forward. The driver wasn’t smooth — he was riding like a madman, shaking left and right as he weaved through the darkness. The wet road made it worse, and the mud felt like a trap waiting to swallow us whole.

*Photo above: between Dodoma and Mbeya.*
A gust of wind blew my hat into my face, blinding me for the most time. My gut twisted — I could almost see the crash before it happened. **“Slow down!”** I shouted. He eased off for a while, but soon enough, he hit the gas again. **“I said slow down!”** I had to remind him.
It felt like an eternity. The only thought keeping me together was the hope that the checkpoint was close.
Then — buses. Dozens of them.
We told him which one was ours, but in the dim light, they all looked the same. He swerved between them, searching, until finally — **Jkas.**

*Photo above: the old church in Mbeya.*
As we pulled up, the driver suddenly changed his price from 200 to 400 Kwacha. Of course. I handed him 300, not in the mood to argue, and walked straight into the bus, **relieved to be off that death ride**.
The journey continued, but the morning’s chaos was a reminder that travel in Africa often requires patience and adaptability.
---
## Final Thoughts
The journey from Arusha to Lusaka was long and filled with challenges — delayed buses, unreliable accommodations, and frustrating border experiences. Yet, the beauty of Tanzania and Zambia, the people I met, and the lessons I learned along the way made it all worthwhile. Traveling in Africa requires flexibility, but it rewards you with unforgettable experiences and stories to tell.

*Photo above: in Mbeya.*

*Photo above: somewhere in Zambia from the Bus.*

*Photo above: in Lusaka.*

*Photo above: in the East Park Mall in Lusaka.*

*Photo above: in the East Park Mall in Lusaka.*

*Photo above: East Park Mall in Lusaka.*

*Photo above: in the market in Lusaka.*
-

@ a012dc82:6458a70d
2025-02-14 13:51:33
In the ever-evolving landscape of cryptocurrency, a significant development has emerged that is reshaping perceptions and strategies within the industry. Bitcoin, the original and most prominent digital currency, has seen its transaction fees hit a two-year high. This remarkable surge in fees is not merely a statistical blip but a phenomenon that could herald a transformative phase in Bitcoin mining. As we witness these fees reaching unprecedented levels, it prompts a crucial inquiry: Are we on the cusp of a new era in BTC mining, one that redefines its economic and technological paradigms?
**Table Of Content**
- The Surge in Transaction Fees
- Impact on Bitcoin Miners
- A Divided Community
- The Ripple Effect on Mining Stocks
- The Broader Market Influence
- Conclusion
- FAQs
**The Surge in Transaction Fees**
The Bitcoin network, known for its robustness and security, has recently been the center of a notable financial trend. Transaction fees have soared to over $37, a figure reminiscent of the peak levels observed in April 2021. This significant increase is not an isolated event but rather a symptom of a larger, more complex shift within the Bitcoin ecosystem. The primary driver behind this surge is the burgeoning interest in Bitcoin NFTs, particularly through a protocol known as Ordinals. This innovative protocol facilitates the storage of non-fungible tokens (NFTs) directly on the Bitcoin blockchain. As a result, there has been a marked increase in transaction volumes, leading to higher fees. This trend reflects a growing interest in utilizing Bitcoin not just as a currency but as a platform for broader digital asset interactions, potentially expanding its use cases and value proposition.
**Impact on Bitcoin Miners**
The escalation in transaction fees has had a profound and far-reaching impact on the community of Bitcoin miners. These individuals and companies, who form the backbone of the Bitcoin network by validating transactions and maintaining the blockchain, are now witnessing a dramatic shift in their revenue streams. With fees reaching such high levels, their daily income has surged to an estimated $63 million, translating to an extraordinary $23 billion annually. This figure is a significant leap from the average income over the past two years and represents a potential windfall for the mining sector. The increased profitability could lead to renewed investment in mining infrastructure, potentially spurring technological advancements and increased competition within the sector. It also raises questions about the decentralization of Bitcoin mining, as higher profits could lead to further consolidation in an industry already dominated by large players.
**A Divided Community**
The Bitcoin community, known for its diverse opinions and robust debates, finds itself at a crossroads with the rise of Ordinals and its impact on transaction fees. On one hand, some members of the community, including prominent figures like core developer Luke Dashjr, view the influx of Ordinals as a form of spam that clutters the blockchain and necessitates technical solutions. This perspective underscores concerns about blockchain bloat, transaction prioritization, and the fundamental principles of what Bitcoin should represent. On the other hand, for miners, these high fees have been a significant boon. They have provided a much-needed boost to profitability, especially in a period where the price of Bitcoin itself has been relatively stable. This divergence in views reflects the ongoing evolution of Bitcoin's identity and purpose, as it balances its role as a digital gold, a transactional currency, and now, a platform for digital art and collectibles.
**The Ripple Effect on Mining Stocks**
The impact of the surge in Bitcoin fees extends beyond the digital realm and into the traditional financial markets. Bitcoin mining stocks, representing companies that invest heavily in the infrastructure required to mine the digital currency, have shown remarkable resilience and growth. Companies like Marathon Digital, Riot Platform, and Cleanspark have seen their stock prices rally, significantly outperforming the actual price of Bitcoin. This trend indicates a growing investor confidence in the mining sector, buoyed by the increased revenue potential from transaction fees. It also suggests a decoupling of sorts, where the mining sector's performance is not solely dependent on the price of Bitcoin but also on other factors like transaction volume and fee structures. This decoupling could attract a new class of investors to the mining stocks, those looking for exposure to the crypto market but with a different risk profile than holding cryptocurrencies directly.
**The Broader Market Influence**
The performance of Bitcoin mining stocks is also intricately linked to the broader equity markets. As observed by Caleb Franzen, founder of Cubic Analytics, the strong performance of equity markets has provided additional momentum to these stocks. This correlation indicates that Bitcoin mining companies are increasingly being viewed through the lens of traditional financial analysis, where market trends and investor sentiment play a crucial role. The implication is significant: as Bitcoin mining firms become more integrated into the broader market, they may also become more susceptible to the same macroeconomic factors that influence traditional stocks. This integration could lead to greater stability in the mining sector but also exposes it to new types of risks, such as regulatory changes or shifts in investor sentiment unrelated to the crypto market.
**Conclusion**
The recent developments in Bitcoin transaction fees, driven by the popularity of Ordinals, have ushered in significant changes in the mining landscape. With increased revenues and a positive impact on mining stocks, it's tempting to proclaim the dawn of a new era in Bitcoin mining. However, the sustainability of this trend and its long-term impact on the Bitcoin ecosystem remain subjects of intense speculation and debate. As the community grapples with these changes, the future of Bitcoin mining continues to be a topic of keen interest. Whether this marks a permanent shift or a temporary phase in the cryptocurrency's evolution, one thing is certain: the world of Bitcoin remains as dynamic and unpredictable as ever.
**FAQs**
**What caused the recent spike in Bitcoin transaction fees?**
The surge in Bitcoin transaction fees to over $37, a two-year high, is primarily attributed to the growing popularity of Bitcoin NFTs, especially through the Ordinals protocol, which allows for the storage of non-fungible tokens on the Bitcoin blockchain.
**How does the increase in transaction fees affect Bitcoin miners?**
Bitcoin miners, who earn BTC for processing transactions, have seen a significant increase in their income due to the higher fees. Their daily revenue has reached approximately $63 million, translating to an estimated $23 billion annually.
**What is the Ordinals protocol, and why is it controversial?**
Ordinals is a protocol that enables the storage of NFTs on the Bitcoin blockchain. It has been controversial within the Bitcoin community, with some viewing it as a beneficial innovation and others as a form of spam that clutters the blockchain.
**Have Bitcoin mining stocks been affected by the increase in fees?**
Yes, Bitcoin mining stocks, such as Marathon Digital, Riot Platform, and Cleanspark, have outperformed the actual price of Bitcoin, indicating growing investor confidence in the mining sector due to increased revenue from transaction fees.
**Is the Bitcoin mining industry becoming more centralized?**
The increase in profitability could lead to further investment in mining infrastructure, potentially leading to more competition but also raising concerns about the centralization of mining power in the hands of large companies.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-

@ 09fbf8f3:fa3d60f0
2025-02-14 13:40:37
> 功能很简单的网站,无广告、无任何付费项目,漫画全部免费。
荤素搭配。
唯一的缺点就是有点慢,看了下网站使用的是cloudflare网站加速,国内效果差了一点,加个🪜就好了。
关键词mycomic
官网:[https://mycomic.com](https://mycomic.com)

-

@ c3b2802b:4850599c
2025-02-14 12:14:43
Die Plattform dient dem Zweck, interessierten Gemeinschaften unseres Landes aufzuzeigen, dass auch unter schwierigen globalen und bundespolitischen Rahmenbedingungen der Wandel hin zu zukunftsfähigen Lebensmustern auf kommunaler Ebene möglich ist. Und noch mehr: Dass dieser Umbau auch simultan in mehreren Lebensbereichen gestartet und vollzogen werden kann, wenn mutige und kluge Menschen aus verschiedenen Gruppen in Kommunen beherzt zusammenwirken. 
**Psychologischer Hintergrund.** Viele Studien in 20 Jahren eigener psychologischer Analysen erfolgreicher Regionalisierungsprojekte haben aufgezeigt: Persönliche Begegnung und Austausch zwischen Interessierten an Regionalisierungsvorhaben und bereits erfolgreichen Pionieren sind ein entscheidender Erfolgsfaktor für gelingende Transformation. Dafür braucht es Informationen, wo sich Pionierprojekte befinden. Im ersten größeren Transformationsprojekt meiner Arbeitsgruppe, dem Energiewendedorf Jühnde, hat das Wissenschaftler-Team vorab andere innovative Kommunen besucht und deren Erfolgsfaktoren im eigenen Vorhaben umgesetzt. Die Mehrzahl der 200 [Energiewendedörfer](https://xn--energiewendedrfer-c0b.de/), die nach Fertigstellung Jühndes entstanden sind, hat sich wiederum vor Ort in der Modellkommune Jühnde informiert. Dies zeigt den Schneeballefekt des Lernens am Beispiel auf. Die hier beschriebene Plattform macht derartige „Funkenflüge“ für die Vielfalt der hier beschriebenen Innovationen über den Energiebereich hinaus möglich. Denn: Lernen am Modell setzt eine gute Übersicht über brauchbare Modelle voraus.
**Inhalte der Plattform.** Die [Zukunftskommunen-Plattform](https://zukunftskommunen.de/) beschreibt 67 Kommunen mit jeweils mindestens drei kommunalen Erfolgen. Die im gesamten Bundesgebiet verteilten Kommunen sind auf einer Landkarte ersichtlich. Von jedem Ort unseres Landes aus kann eine der Zukunftskommunen in maximal 100 km Entfernung erreicht werden. Die Nutzer der Plattform können über die Eingabe ihres Standortes erfahren, welche der Zukunftskommunen sich in der eigenen Region befinden – mit Angabe der Distanz in Kilometern. Jede dieser Kommunen ist in Wort und Bild mit den wesentlichen Informationen zum Stand des Umbaus sowie zum Ansprechpartner charakterisiert.
Die derzeit auf der Plattform dargestellten über 200 kommunalen Erfolge sind jeweils durch harte Fakten, Angaben zur Entstehungsgeschichte sowie Erfolgsfaktoren kurz skizziert - und wiederum sind jeweils auskunftsbereite Ansprechpartner genannt. Die Erfolge sind unter den Kommunen angeführt und lassen sich so „durchblättern“. Interessieren sich Nutzer der Plattform jedoch für bestimmte Aspekte der Regionalgesellschaft, können sie auch gezielt nach einzelnen Transformationsbereichen suchen. In dem Fall bekommen Sie – wiederum mit Entfernungsangabe zum eigenen Standort – die interessierenden kommunalen Erfolge angezeigt. 
So lassen sich jeweils dutzende Erfolge im Land auffinden, im Bereich Bildung z.B. Lehrpfade, Umweltbildungsprojekte und Umwelttrainerprojekte, bei denen eigens ausgebildete Ehrenamtler ökologische Zusammenhänge vermitteln. Im Bereich Kreislaufwirtschaft sind die Erfolge nach folgenden Aspekten auffindbar: Regionale Kreisläufe, verpackungsfreie Verteilung, Verwendung von Natur-Baustoffen, Recycling endlicher Ressourcen, Bio-Landwirtschaft, Anbau und Nutzung nachwachsender Rohstoffe, Solar-Mobilität, Produktion von Anlagen zur Erzeugung erneuerbarer Energie und Erzeugung erneuerbarer Energie. Der Bereich natürliche Vielfalt ist folgendermaßen gegliedert: Naturschutz, Ressourcenschutz, Permakultur und Erhaltung von Biodiversität. Die Untergliederung der erfolgreichen Gemeinschaftsprojekte lautet: Miteinander aller Bevölkerungsgruppen, Integration und Inklusion, Generationennetzwerk, Genossenschaften, Rekommunalisierung von Infrastruktur, lokale Währung sowie Tauschen und Schenken. 
Die Vielfalt der Innovationen ist noch weit größer als in dem Kategoriensystem abgebildet, da wegen der Handhabbarkeit der Plattform nicht alle denkbaren Kriterien ausformuliert worden sind. Doch auch besonders ungewöhnliche oder heute noch seltene kommunale Innovationen sind in der Beispielsammlung der Plattform auffindbar. Dazu kann die freie Suche der Plattform verwendet werden. Wer sich z.B. für Eisspeicher interessiert, kann ein Bildungszentrum mit Solareis-Erdspeicher in der Zukunftskommune Wiernsheim auffinden. 
Ein Blog informiert über den politischen und geografischen Kontext, in dem die Transformation in unseren Kommunen stattfindet. Hier lassen sich Erfolgsgeschichten zwischen 2018 und 2024 aus dem In- und Ausland abrufen - wiederum beim Blättern oder durch die Suchfunktion nach Stichworten . Seit Herbst 2024 finden Sie meine Blogbeiträge zu dieser Thematik bei der [Genossenschaft Menschlich Wirtschaften](https://menschlichwirtschaften.de/kategorie/peter-schmuck/). Viel Freude beim Blättern und Stöbern!
*Zuerst veröffentlicht in der Zeitschrift Ländlicher Raum (hier leicht gekürzt)* 
-

@ bd32f268:22b33966
2025-02-14 12:10:11
Muitos livros foram escritos sobre o tema oferecendo perspetivas líricas, narrativas, psicológicas/filosóficas, religiosas, simbólicas e políticas. A resposta varia no seu significado consoante o paradigma teórico de análise. Reconhecendo esta multiplicidade de dimensões do conceito qualquer reflexão será sempre, inevitavelmente parcial, no entanto cumpre realizar-se dado que a importância do tema o exige. Muito se tem dito e muito mais se dirá precisamente porque este é um tema que convida à expressão de uma profunda intimidade universal.
O amor é, segundo Erich Fromm psicanalista alemão, uma decisão, um julgamento e uma promessa, além de um sentimento. Segundo o autor o amor requer paciência, disciplina, concentração, fé e, quanto a mim uma ideia fundamental de Fromm, a capacidade para transcender o nosso próximo narcisismo. Como seriamos capazes de amar sem ultrapassar o nosso narcisismo? Seríamos capazes do compromisso necessário para aceitar o sacrifício de não corresponder aos nossos desejos mais imediatos em prol da construção de um projeto para o futuro com outra pessoa? No nosso narcisismo reside frequentemente o nosso movimento em direção á gratificação imediata e à não aceitação do sacrifício inerente à construção de algo que desejavelmente será maior que nós.
Como nos diz um pergaminho da Psicologia Gestalt, corrente teórica que se dedica ao estudo da forma e da percepção, o todo é maior que a soma das partes. É precisamente neste ponto que está uma das principais forças centrípetas deste conceito, na hipótese de construir algo que melhora a nossa vida que acrescenta em significado, sendo esta a unidade base na qual psicologicamente se medem as coisas e os fenómenos. Fromm propõe ainda que o amor não será apenas a ligação ao objeto amado, mas também uma orientação perante a vida, dizendo: “ o amor é uma atitude, uma orientação de carácter que determina a ligação da pessoa ao mundo como um todo e não apenas a um objeto.” Sendo assim não será suspeito que neste conceito esteja a chave para operar profundas transformações no carácter e na vida dos Humanos, que a somar á construção da relação com o outro têm a construção de uma nova relação com o mundo.
O amor é uma dádiva na qual ao darmos podemos experienciar a nossa riqueza de carácter, a nossa força e o nosso poder. Podemos ver este conceito como um professor que nos ensina sobre a vida e sobre as relações. Ensina-nos humildade na medida em que aceitamos algo maior que nós, ensina disciplina porque requer um foco constante e diria até que nos pode ensinar o significado e peso do conceito de fé. Neste último ponto falo de fé porque o amor contempla a dúvida fundamental da rejeição do sacrifício feito em prol do amor, e a fé transcende essa dificuldade da dúvida. A fé parece salvar-nos da corrosão da dúvida e purificar as intenções da pessoa que ama. Ter fé é mais que desenvolver uma mera expectativa, é a construção da esperança interiormente mesmo que seja na face do improvável ou implausível. Assim sendo, amar parece-se em muito com uma experiência eminentemente religiosa na medida em que sacraliza a experiência da pessoa que ama e a vida, atribuindo contornos de divino e transcendental ao que, aos olhos que quem não ama, pode parecer trivial e normal.
*Sagrado coração de Jesus*
Um amor maduro quer-se consciente da necessidade de amar. Fromm diz-nos que o amor maduro está em: “eu preciso de ti porque te amo” e não em “eu amo-te porque preciso de ti”. Esta inversão do sentido da frase parece fundamental para que o amor não seja confundido com uma forma de egoísmo. Aqui a necessidade do outro surge em função do amor que temos pelo outro, não sendo o amor consequência da necessidade que temos do outro. Amar maduramente é a aceitação do sacrifício diante da incerteza e da dor por vezes debilitante. Assim desenvolvemos a tolerância que nos permite crescer e desenraizar da perversidade do narcisismo cumprindo a nossa identidade na missão de amar.

-

@ c43d6de3:a6583169
2025-02-14 11:27:09
## A Brief History of Ownership
### The Forgotten Struggle for Ownership
History reveals that our ancestors labored—both intellectually and physically—to secure the freedoms we are subconsciously giving away.
We stand at the threshold of a new era.
Across the globe, long-established institutions are showing signs of strain. Trust in governments, banks, and major corporations is eroding, leaving many individuals feeling as though their rights are being infringed upon—even if they struggle to articulate exactly how. Social media and traditional news outlets amplify this sense of unease, painting a picture of impending upheaval, as if we are on the brink of a revolution whose name will only become clear in hindsight, once the first sparks ignite into a full-blown blaze.
Yet, when we examine the state of the global economy, this narrative begins to unravel. Economic inequality has reached levels unseen in nearly a century, and while many point fingers at politicians, policies, or the so-called greed of the 1% hoarding all the wealth, the true culprit may be much closer than most realize. At a time when legal structures worldwide strongly protect ownership and economic mobility, it is individuals themselves who are willingly surrendering their financial power to the very elites they criticize.
I know—“willingly” might seem like a stretch. After all, no one consciously chooses to give up their economic freedom. But take a closer look at the way people spend, borrow, and consume, and it becomes painfully clear: most are actively forfeiting their ability to build and own wealth.
How did we get here?
Much of this self-inflicted harm comes from a fundamental ignorance of the history of ownership and the struggles fought to secure it.
This article serves as a short exploration of the past.
I'll examine what might be considered the natural state of humanity, how the majority has historically struggled to achieve ownership rights, and the deadly conflicts that had to occur for the modern individual to enjoy the very rights they are now squandering.

### I. The Era of Communal Ownership
No one is born into this world alone.
We do not simply materialize into existence; we arrive as part of the first unit of human society—the family.
Before the rise of civilization, the primary focus of the family was survival. Ownership was a foreign concept, as early human tribes lived in a state of communal resource-sharing. Material possessions were fleeting, and with that, so was the notion of personal property.
In the state of nature, no individual had an exclusive claim to anything. Instead, ownership existed in a tribal sense: “This land belongs to us.” The idea of “mine” extended only by association—what belonged to the tribe also, by extension, belonged to each of its members.
This was a fragile system. Resources required constant upkeep, and as populations grew, leadership emerged to manage the complexity of distribution. This shift laid the foundation for the rise of kings and centralized authority. The concept of ownership, once a communal right, gradually became something dictated by those in power. The people no longer owned anything outright; they merely had the privilege of stewarding what belonged to their ruler.

### II. The Rise of Peasants and Kings
The first codified legal system, the Code of Hammurabi, laid out extensive laws on ownership. Interestingly, this ancient civilization granted more property rights to commoners than many societies did even a few centuries ago.
A few millennia later, Greece laid the philosophical foundations for ownership, but true legal protections for private property did not emerge until much later. In medieval Europe, ownership rights almost disintegrated—not even nobles truly owned land. Everything belonged to the king, and monarchs waged war over control of vast territories, including the people within them.
Meanwhile, in the Islamic Golden Age, the Middle East saw an unprecedented period of economic freedom. Under Sharia law, property rights were protected for the average citizen, something unheard of in much of medieval Europe. The extent of these rights depended largely on religious affiliation, but compared to their European counterparts, many commoners in the Islamic Empire enjoyed greater economic autonomy.

### III. The Birth of Property Rights: The Rights of Man
As the Islamic Golden Age waned and the Mongol Horde thundered toward Baghdad, another seismic shift was occurring in England. In 1215, rebellious nobles captured London and forced King John to sign the Magna Carta, the first written document to impose limits on absolute monarchical power and introduce property protections—though these rights were initially reserved for the nobility.
This moment planted the seeds of change. Over the next several centuries, the fight for ownership rights expanded beyond the aristocracy. The Black Death (1347–1351) wiped out over 30% of England’s population, increasing labor shortages and bargaining power for peasants. By the 1381 Peasants’ Revolt, the common man demanded a greater share of land and wealth.
Yet, it wasn’t until the 1700s with the Enclosure Acts that private property became legally protected for the broader population. What began as a noble rebellion in 1215 ultimately transformed ownership from royal privilege to individual liberty.

### IV. The Age of Renting: The Illusion of Ownership Today
Despite centuries of struggle, we now find ourselves at a paradoxical moment in history: ownership is more legally protected than ever, yet fewer people actually own anything of value.
**Homeownership in Decline:** The U.S. homeownership rate peaked in 2005, only to decline for a decade, hitting a low of 63% in 2015. Despite slight rebounds, high housing costs have pushed many into perpetual rentership.
**Vehicles as Subscriptions:** In 2024, one-fifth of new vehicles were leased, and long-term auto loans have become the norm. A financed car is not truly owned—it’s rented from a bank until the debt is cleared.
**The Subscription Economy:** Ownership of media, software, and even personal data has been replaced with monthly fees. Cloud storage, SaaS, and streaming services have ensured that we no longer possess even our own information.
### V. The Consequences of Financial Illiteracy
We now live in a society built on renting, where economic stability depends on a continuous stream of payments. The more we lease, subscribe, and finance, the more control shifts from individuals to corporations and financial institutions.
**This shift has profound implications:**
- A person who owns little has little power.
- A society that rents everything can be controlled by those who own everything.
- Wealth is no longer built through accumulation, but through debt and dependency.
For millennia, people fought for the right to own. Today, through financial illiteracy and consumer habits, we are giving it away.
How much do we truly own, and how much have we already forfeited?
-----------
Thank you for reading! If this article resonated with you, let me know with a zap and share it with friends who might find it insightful. Your help sends a strong signal to keep making content like this!
Interested in fiction? Follow Fervid Fables for great short stories and serialized fiction.
nostr:npub1j9cmpzhlzeex6y85c2pnt45r5zhxhtx73a2twt77fyjwequ4l4jsp5xd49
More articles you might like from Beneath The Ink:
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqq2kjjzzfpjxvutjg33hjvpcw5cyjezyv9y5k0umm6k
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqqa9wefdwfjj6stvdsk57cnnv4ehxety94mkjarg94g8ymm8wfjhxuedg9hxgt2fw3ej6sm0wd6xjmn8946hxtfjvsuhsdnju045ml
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqq2ns3jnfa985c29xp2rs3pexpykz6mjxetxu2g25x6
-

@ 8e0033c0:352a436e
2025-02-14 11:20:53
AVA là một nền tảng công nghệ tiên tiến được thiết kế để đáp ứng mọi nhu cầu của người dùng trong kỷ nguyên số hóa. Với giao diện hiện đại, trực quan và dễ sử dụng, AVA mang đến trải nghiệm hoàn hảo cho người dùng ở mọi độ tuổi và lĩnh vực. Từ các thao tác cơ bản đến các tác vụ phức tạp, nền tảng này đều đảm bảo sự ổn định và tốc độ vượt trội. AVA không chỉ hoạt động trơn tru trên các thiết bị cá nhân mà còn tối ưu hóa khả năng tương thích trên mọi nền tảng, từ máy tính để bàn đến thiết bị di động, giúp bạn tiếp cận công nghệ ở bất kỳ đâu và bất kỳ lúc nào.
Một trong những điểm mạnh nổi bật của <a href="https://www-ava.com
">AVA</a> là tính bảo mật toàn diện. Nền tảng sử dụng công nghệ mã hóa tiên tiến và hệ thống bảo mật nhiều lớp nhằm bảo vệ tối đa thông tin người dùng. Tất cả các giao dịch và dữ liệu đều được đảm bảo an toàn, giúp người dùng hoàn toàn yên tâm trong quá trình sử dụng. Hơn nữa, AVA luôn cập nhật các tiêu chuẩn bảo mật mới nhất, đảm bảo hệ thống luôn sẵn sàng đối phó với những nguy cơ tiềm ẩn. Nhờ cam kết mạnh mẽ về bảo mật, AVA đã trở thành sự lựa chọn đáng tin cậy của nhiều cá nhân và tổ chức trên toàn thế giới.
Không chỉ mạnh về bảo mật, AVA còn cung cấp khả năng cá nhân hóa cao, mang lại trải nghiệm tối ưu cho từng người dùng. Nền tảng cho phép tùy chỉnh giao diện, sắp xếp các tính năng theo nhu cầu và phong cách sử dụng riêng. Điều này tạo nên sự linh hoạt vượt trội, giúp AVA trở thành công cụ đắc lực cho mọi đối tượng người dùng, từ cá nhân đến doanh nghiệp. Với khả năng cá nhân hóa này, người dùng không chỉ được hỗ trợ về mặt công nghệ mà còn có thể phát triển hiệu quả các hoạt động và dự án của mình trên nền tảng này.
AVA cũng là một nền tảng thúc đẩy kết nối cộng đồng. Nền tảng cung cấp các công cụ hỗ trợ giao lưu và chia sẻ kiến thức, giúp người dùng không chỉ sử dụng công nghệ mà còn phát triển các mối quan hệ bền vững. Các diễn đàn trao đổi, hội thảo trực tuyến và sự kiện cộng đồng được AVA tổ chức nhằm khuyến khích sự gắn kết và học hỏi lẫn nhau. Đây không chỉ là nơi để tìm kiếm giải pháp công nghệ mà còn là không gian để phát triển bản thân và khám phá các cơ hội mới trong mạng lưới toàn cầu.
Sự kết hợp hoàn hảo giữa công nghệ hiện đại, tính bảo mật vượt trội, khả năng cá nhân hóa và tinh thần cộng đồng đã giúp AVA vươn lên trở thành nền tảng công nghệ hàng đầu. Không ngừng đổi mới và cải tiến, AVA cam kết mang lại những giá trị thiết thực nhất cho người dùng. Đây không chỉ là một nền tảng hỗ trợ mà còn là người bạn đồng hành đáng tin cậy, giúp bạn chinh phục mọi thử thách và đạt được những mục tiêu quan trọng trong hành trình phát triển của mình.
-

@ 8e0033c0:352a436e
2025-02-14 11:19:55
Tai88 là một nền tảng công nghệ hiện đại được thiết kế nhằm đáp ứng tối đa nhu cầu của người dùng trong thời đại số. Với giao diện thân thiện, dễ sử dụng, Tai88 mang lại trải nghiệm liền mạch, giúp mọi thao tác trở nên đơn giản và nhanh chóng. Nền tảng này hoạt động ổn định trên nhiều thiết bị, từ máy tính cá nhân đến điện thoại di động, mang lại sự linh hoạt vượt trội cho người dùng. Tính tương thích cao của Tai88 giúp bạn dễ dàng sử dụng ở bất kỳ đâu và bất kỳ lúc nào, hỗ trợ tối đa cho công việc, học tập hoặc giải trí.
Một trong những ưu điểm vượt trội của <a href="https://tai88.net
">TAI88</a> là hệ thống bảo mật mạnh mẽ, giúp bảo vệ người dùng trước những rủi ro tiềm tàng. Sử dụng các công nghệ mã hóa tiên tiến và lớp bảo mật đa tầng, nền tảng này đảm bảo rằng mọi thông tin cá nhân và dữ liệu quan trọng của bạn luôn được bảo vệ an toàn. Tai88 liên tục cải tiến và cập nhật các giải pháp bảo mật mới nhất, mang lại sự an tâm tuyệt đối trong quá trình sử dụng. Điều này không chỉ giúp Tai88 tạo dựng niềm tin với người dùng mà còn khẳng định vị thế là một nền tảng đáng tin cậy trên thị trường.
Tai88 cũng nổi bật với khả năng tùy chỉnh linh hoạt, mang đến cho người dùng một trải nghiệm cá nhân hóa vượt trội. Người dùng có thể điều chỉnh giao diện, cài đặt các tính năng theo nhu cầu và sở thích cá nhân, tạo ra môi trường sử dụng phù hợp nhất. Với sự linh hoạt này, Tai88 không chỉ là một công cụ công nghệ mà còn là một giải pháp đa năng, đáp ứng tốt các nhu cầu từ cơ bản đến phức tạp. Khả năng này đã giúp nền tảng ghi điểm với cộng đồng người dùng, từ cá nhân cho đến doanh nghiệp.
Ngoài các tính năng ưu việt, Tai88 còn là cầu nối cộng đồng, tạo điều kiện cho người dùng giao lưu và chia sẻ kinh nghiệm. Thông qua các diễn đàn, sự kiện trực tuyến và các công cụ hỗ trợ tương tác, Tai88 khuyến khích người dùng kết nối và học hỏi lẫn nhau. Đây không chỉ là nơi cung cấp công nghệ mà còn là một không gian để xây dựng mối quan hệ, khám phá những cơ hội mới và phát triển bản thân. Tinh thần cộng đồng chính là một trong những yếu tố làm nên giá trị khác biệt của Tai88.
Sự kết hợp giữa công nghệ hiện đại, bảo mật toàn diện, tính linh hoạt và tinh thần cộng đồng đã giúp Tai88 trở thành một nền tảng công nghệ dẫn đầu trong thời đại số hóa. Tai88 không ngừng đổi mới và hoàn thiện để mang đến những trải nghiệm tốt nhất cho người dùng, từ đó đáp ứng mọi nhu cầu trong công việc lẫn cuộc sống. Với sự cam kết về chất lượng và hiệu quả, Tai88 chắc chắn sẽ là người bạn đồng hành đáng tin cậy trong hành trình chinh phục những mục tiêu lớn lao.
-

@ 8e0033c0:352a436e
2025-02-14 11:18:34
V123 là nền tảng công nghệ được phát triển nhằm mang đến sự tiện lợi và tối ưu hóa trải nghiệm người dùng. Với giao diện thân thiện và thiết kế trực quan, V123 giúp người dùng dễ dàng tiếp cận các tính năng mà không cần quá nhiều thao tác phức tạp. Từ việc hỗ trợ công việc hàng ngày đến các nhu cầu giải trí, nền tảng này hoạt động mượt mà trên mọi thiết bị, đảm bảo tính linh hoạt và sự ổn định cao. Đây chính là giải pháp công nghệ lý tưởng cho những ai đang tìm kiếm sự kết hợp giữa hiệu quả và tính đơn giản trong một nền tảng duy nhất.
Bảo mật luôn là yếu tố được ưu tiên hàng đầu trên <a href="https://v123.store">V123</a>. Nền tảng này áp dụng các công nghệ mã hóa tiên tiến và hệ thống bảo mật đa lớp, giúp bảo vệ dữ liệu cá nhân của người dùng trước mọi nguy cơ tiềm tàng. Tất cả các giao dịch và thông tin đều được bảo vệ chặt chẽ, mang lại sự an tâm tuyệt đối trong quá trình sử dụng. Hơn nữa, V123 liên tục cập nhật các biện pháp an ninh mới nhất, đảm bảo nền tảng luôn đi đầu trong việc bảo vệ quyền riêng tư của người dùng. Sự an toàn mà V123 mang lại đã giúp nền tảng này trở thành lựa chọn đáng tin cậy cho hàng triệu người dùng trên toàn thế giới.
Không chỉ mạnh mẽ về bảo mật, V123 còn đặc biệt linh hoạt trong việc tùy chỉnh trải nghiệm người dùng. Nền tảng cho phép người dùng cá nhân hóa giao diện, điều chỉnh các tính năng phù hợp với nhu cầu sử dụng riêng của mình. Điều này mang lại cảm giác thoải mái và tiện nghi khi sử dụng, đồng thời giúp V123 trở thành một công cụ công nghệ lý tưởng phù hợp với nhiều phong cách và mục đích khác nhau. Khả năng tùy biến cao này không chỉ tăng tính tương tác mà còn giúp người dùng khai thác tối đa tiềm năng của nền tảng.
V123 cũng chú trọng vào việc xây dựng một cộng đồng người dùng gắn kết. Thông qua các diễn đàn trao đổi, sự kiện trực tuyến và các công cụ hỗ trợ tương tác, nền tảng này khuyến khích người dùng chia sẻ ý tưởng, học hỏi lẫn nhau và phát triển các mối quan hệ mới. V123 không chỉ là một nền tảng công nghệ mà còn là một cầu nối, giúp người dùng mở rộng mạng lưới kết nối và khám phá những cơ hội mới. Sự gắn kết trong cộng đồng người dùng của V123 là yếu tố quan trọng làm nên sức mạnh và giá trị lâu dài của nền tảng.
Sự kết hợp hoàn hảo giữa công nghệ hiện đại, bảo mật vượt trội và tinh thần cộng đồng đã giúp V123 trở thành nền tảng công nghệ toàn diện trong thời đại số. V123 không ngừng đổi mới để mang đến những tính năng và giải pháp tối ưu nhất, đáp ứng kỳ vọng của người dùng trên toàn cầu. Với cam kết về chất lượng và sự tiện lợi, V123 không chỉ là một công cụ hỗ trợ mà còn là người bạn đồng hành đáng tin cậy trong mọi hành trình chinh phục mục tiêu.
-

@ be41636e:e55c4909
2025-02-14 10:38:04
I asked Unleashed.Chat's DeepSeek model to write an article from the point of view of someone who believes in chemtrails.
In the first attempt, it didn't understand me well and it provided the arguments provided by chemtrails believers and their counterarguments.
When I clearly asked it to write an article from the point of view of someone who actually believes it, it gave some warnings that these claims are not corroborated by science and started the article and ended it by the same remarks.
What follows is the article Unleashed.Chat produced.
---
For years, I’ve watched the skies, and I’ve seen something that doesn’t sit right. It’s not just the occasional contrail left by a passing airplane. No, these are different. They linger. They spread. They look unnatural. And they’re everywhere.
I’m talking about chemtrails—chemical trails intentionally sprayed by aircraft for reasons that are far from benign. At first, I dismissed them as just another conspiracy theory. But as I started paying closer attention, I realized that something was off.
### The Evidence Is in the Sky
Let’s start with what we can all see. Contrails, or condensation trails, are the result of water vapor freezing around small particles in airplane exhaust. They’re short-lived and dissipate quickly. But chemtrails are different. They stay in the sky for hours, spreading out into vast, crisscrossing grids that blanket the sky.
I’ve taken countless photos of these trails, and they all tell the same story. They’re not just random; they’re deliberate. They’re sprayed in patterns that cover entire regions, and they’re doing it day after day, year after year.
### What’s in the Trails?
The government and mainstream media tell us these trails are harmless. But that’s exactly what they want us to believe. Independent researchers and whistleblowers have come forward with disturbing information. Chemtrails contain a cocktail of toxic chemicals, including aluminum, barium, strontium, and other heavy metals.
Why would they spray these substances? The official line is that it’s for weather modification or geoengineering. But that’s a lie. The real purpose is far more insidious.
### The Hidden Agenda
Chemtrails are part of a larger plan to control the population. These chemicals are neurotoxic, and they’re being used to alter our brains and behavior. They’re designed to make us more docile, more compliant, and less likely to question authority.
This isn’t just a theory. There’s a long history of government experimentation on its own citizens. From the Tuskegee Syphilis Experiment to MKUltra, the CIA’s mind-control program, the government has shown time and again that it’s willing to go to extreme lengths to control the population. Chemtrails are the next chapter in this dark history.
### The Health Impact
The effects of these chemicals are already being felt. Rates of autism, Alzheimer’s, and other neurological disorders have skyrocketed in recent decades. Coincidence? I don’t think so.
I’ve spoken to doctors and researchers who have seen firsthand the connection between chemtrail exposure and these health issues. They’re not willing to speak publicly for fear of retaliation, but they’ve shared their findings with me. The evidence is overwhelming.
### The Media Cover-Up
The mainstream media is complicit in this cover-up. They dismiss chemtrails as a conspiracy theory, but that’s just a distraction. They’re paid to keep us in the dark, to prevent us from connecting the dots.
Thankfully, the internet has given us a platform to share the truth. Independent investigators, whistleblowers, and concerned citizens are coming together to expose this atrocity. But we need your help.
### What Can We Do?
The first step is to raise awareness. Share this information with everyone you know. The more people who understand the truth, the harder it will be for the government to continue this program.
Second, we need to demand accountability. Write to your elected representatives. Call for independent investigations into chemtrails. Make your voice heard.
Finally, we need to protect ourselves. Install air filters in your home. Avoid spending time outdoors when chemtrails are being sprayed. And stay informed.
### The Future of Humanity
Chemtrails are not just a threat to our health; they’re a threat to the very future of humanity. If we allow this program to continue unchecked, we risk irreversible damage to our planet and our species.
But there’s still hope. By working together, we can expose the truth and stop this madness. The time to act is now.
-

@ ed60dae0:cc3d5108
2025-02-14 10:25:20
Welcome to a new *Situation Report* from **The First Bastion**. Before we begin, please make sure you’ve read the disclaimer, which applies to all our content.
You can find it here: [Disclaimer](https://primal.net/bergman/Disclaimer-or2cwd)
In short: **Not Financial Advice**.
There seems to be a significant amount of confusion in the markets at the moment. Sentiment is almost bleak, particularly in the crypto market (excluding Bitcoin). Broader stock markets are also experiencing uncertainty, primarily driven by high valuations and elevated multiples on the S&P 500. For instance, the SPX is trading at a 30.3 price-to-earnings ratio and a 3.16 price-to-sales ratio. At the same time, bond yields remain relatively high, with former President Trump pushing for a reduction in long-term rates.
Risk indicators, such as the High Yield Index OAS, is near all-time lows at 2.66%, while the delinquency rate on single-family residential mortgages is impressively low at 1.73%.
Meanwhile, a troubling socioeconomic trend continues to unfold: many young adults, particularly those aged 25–30 (and no, we can’t keep calling them “kids”), are still living with their parents. This phenomenon is particularly evident in the Netherlands, though it may also hold true in the U.S. The cause? Housing affordability. Residential real estate prices have significantly outpaced the growth in real wages, leaving many unable to afford homes of their own.
Inflation numbers released yesterday came in slightly higher than expected, triggering an initial sell-off. However, the market quickly rebounded within hours, likely due to seasonal adjustments and noise in the data tempering its impact.
Amid all this, investors are anxiously awaiting what many are calling “The Big Print.” Market participants anticipate that the Federal Reserve will resort to more aggressive quantitative easing, injecting liquidity and inflating asset prices to new extremes. Yet, Federal Reserve Chair Jerome Powell (“Uncle Jerome”) continues to emphasize that no such measures are imminent. According to him, the economy is strong enough to stand on its own without additional stimulus.
And let’s not forget the run on physical gold that’s happening right now—it’s a whole story in itself.
So, in this type of environment, the key question remains: should you buy or sell risk assets?
## Framework
As part of my learning journey, I’m building a framework to better understand the bigger picture. Think of it as an effort to “connect the dots”—literally. I’m still figuring out the best way to utilize this framework, but for now, I’ll be exporting the canvas as a high-resolution [**PDF file**](https://github.com/btsvr/tfb/blob/b152cc363534548450c5dbb3db3149ee4d4dbe01/202507.pdf). This allows people to zoom in and explore the data and charts directly within the canvas. Additionally, the embedded links are clickable, providing easy access to the original sources.
The content will remain dynamic. My goal isn’t to pack in as much information as possible but rather to focus on the most critical and relevant data for the current narratives and issues. With each SitRep, I’ll reassess what information is still relevant, what can be updated, and what might simply be removed.
For this week, I’m keeping the SitRep compact, as much of my time has been dedicated to building the framework itself. The most impactful factors right now are external, so this SitRep will focus on those key developments.
## Bitcoin
By focusing mostly on exogenous factors later on, I’ll briefly summarize the key endogenous factors. In last week’s SitRep, I highlighted the 3-day chart and its tight consolidation range. This consolidation is reflected in the Return Analysis, which has reverted almost entirely to the mean, with the quarterly return nearing 0%. To illustrate, 90 days ago, Bitcoin was at $92,000, and as of writing, we’re hovering around the same level.
https://blossom.primal.net/e3b97006f3bba849506f5c6ab030c845c97026badc9e4efb0a149d91261bb6c8.png
Over those 90 days, we’ve seen spikes to as high as $108,000 and dips back to $92,000. Along the way, we witnessed some of the largest liquidation events in crypto’s history. This consolidation period, combined with the harsh liquidation wicks, has flushed out a significant amount of leverage from the market.
https://blossom.primal.net/d53cf96fdd81ed8bbdd71792fb0ca5c75bb153f756f51fc6b3bc88b5b8fa6f32.png
If I were to plot Bitcoin on a Speculation Profile, I’d place it in the lower-left quadrant of “balanced positioning,” characterized by a healthy funding rate and relatively low open interest. While open interest remains high on a nominal basis, it’s reasonable when compared to Bitcoin’s market capitalization.
https://blossom.primal.net/bb5e1598012fe02a8e27bd9ad132e3e0be9a39abb9413a08fcf92ebf2d3a22cc.png
I’d place Bitcoin in the same quadrant in terms of volatility. As noted earlier, the consolidation period has resulted in low daily volatility, though intraday fluctuations have been more pronounced. With 30-day historical volatility at 40 and weak directional movement, we’re currently navigating “slow waters.”
https://blossom.primal.net/687294e901b3fc5c6aae6d6685a7ad1872ce9d12efc428832af6ba171671368d.png
Looking at some key metrics, Bitcoin remains well above the True Market Mean (TMM), which looks at active coins and filter out the dormant coins. The TMM shows (unintended) the average of all price data, hence it's name . The 200-day moving average (200DMA) is gradually creeping up toward $80,000, serving as the critical support level for a bull market. With current prices hovering around $96,000, we’re approaching the Short-Term Holders Cost Basis (STH-CB) at $92,255. This level represents **The First Bastion** for bullish investors, defending the upward trend. If you believe the bull market will continue, the zone between the STH-CB and the 200DMA presents a compelling opportunity.
https://blossom.primal.net/69efc46de294000c13841fb7625a9122fe5e5602ec79d07f7792689691928506.png
This brings us to the STH Profit/Loss Profile. As the market price nears the STH-CB, unrealized profit has diminished to near zero. Recently, we’ve seen losses being realized—a dynamic that often provides alpha during bull markets.
## Man on a Mission
President Donald J. Trump is a man on a mission. He talks a lot about winning, but to be honest, I don’t think he has the right mindset for the long term. Simon Sinek’s framing of The Infinite Game resonates here: if a game doesn’t have a definitive end, you shouldn’t play it as if it does. In infinite games, you’re either ahead or behind—there’s no “winning.”
That said, Trump is moving fast. It’s clear he’s not a politician in the traditional sense. Having run a business, he’s now approaching the country’s leadership the same way. Unlike career politicians, who prioritize diplomacy and long-term consensus, Trump is focused on making deals and getting things done. This pace has left many traditional political leaders struggling to keep up.
One of his ultimate goals is to bring the 10-year yield down. On paper, it sounds simple—but in practice, it’s anything but. It’s a monumental task. One shortcut would be to push the Federal Reserve toward Yield Curve Control—creating artificial demand for 10-year notes by buying up everything on the market to force yields lower. However, this approach is fraught with risks and would backfire in more ways than can be imagined. It should never be implemented except as an absolute last resort.
https://blossom.primal.net/7c9b1b0229432eb67064557205cb4090e388a4731238a0739429e7c5793dfd33.png
The right way to achieve this goal is the harder path: sustained effort and real progress. In the SitRep canvas, I’ve outlined some of Trump’s policies that align with this objective. However, many of these also intersect with the Federal Reserve’s dual mandate of controlling inflation and ensuring a healthy labor market. Some of Trump’s policies, like onshoring manufacturing and imposing tariffs, are inflationary, while others, such as increasing oil production and attempting to end the war between Russia and NATO in Ukraine, have deflationary effects.
https://blossom.primal.net/13886c1cc6781f1ea5494614e0aeb6df3ff8db52d047c41b8ceedf700c5360d8.png
This duality also applies to the Federal Reserve’s labor market mandate. Trump’s push for a more efficient government could reduce unnecessary jobs, shrinking the supply of available positions. Simultaneously, his efforts to reduce immigration and deport undocumented immigrants restrict the labor pool, further tilting the equation toward fewer people who are able and willing to work.
Ending the war in Ukraine would bring significant benefits on a global scale. First and foremost, it would save lives and halt the destruction of cities. Beyond that, it would reopen efficient trade routes for transport and energy, reduce spending on weapons and military efforts, and stabilize markets. These developments would create positive ripple effects worldwide.
As Eric Wallerstein recently pointed out, these efforts could bring the 10-year yield down significantly, potentially to a level of low 4%
## To Print or Not To Print
Let’s revisit the question I posed in the introduction: is the current environment one where you should lean more heavily toward risk assets, or should you focus on safe-haven assets like bonds or gold?
Bonds could rally again if Trump succeeds in his mission to lower long-term yields. Similarly, the prospect of the war in Ukraine ending and global trade returning to a more efficient state would benefit corporate profit margins, thereby boosting stock valuations.
Meanwhile, gold continues its remarkable run toward $3,000 per ounce. As I wrote last week, gold serves as a hedge against two risks: defaults and monetary inflation. The recent surge in gold prices appears to stem from a reshuffling of gold inventories, with significant movement from the London LBMA to the New York Comex. This highlights a persistent logistical challenge with gold—it is cumbersome to transport due to its weight and the security requirements. However, it’s not just about location; there’s also a mismatch in quantity and format. Much of the gold held by the Bank of England is stored in 12.5-kilogram bars, which first need to be sent to Switzerland to be melted down and recast into 1-kilogram bars before they can be distributed.
This added friction in the settlement of physical gold has led to higher premiums for faster delivery. Rumors are swirling that there isn’t enough gold to meet demand. This brings us back to one of the oldest and most controversial questions in modern finance: is there really enough gold in the vaults?
Before deciding on the most probable market outlook—which I’ll address later—it’s essential to consider the mechanics driving potential outcomes. Many investors are waiting for what’s been dubbed “The Big Print,” expecting the Federal Reserve to respond with massive money printing akin to 2020’s response to COVID-19 and the subsequent lockdowns. However, these investors may be “fighting the last war,” often a mistake when the battlefield changes over time.
What I’m getting at is this: if you believe the most likely outcome is a stock market rally driven by aggressive Federal Reserve money printing, you may be setting yourself up for disappointment. Jerome Powell has been clear that quantitative easing will only return if interest rates drop to zero—a scenario far from the current reality.
## Expected Outcome
When assessing the most likely outcome, it’s essential to objectively evaluate the data currently available:
* The labor market is holding steady with 4% unemployment, which is remarkable considering the recession signal triggered by the Sahm Rule last summer.
* Inflation hasn’t returned to the 2% target, but it’s not soaring either. Yesterday’s inflation print came in hotter than expected, but one swallow doesn’t make a summer. Some of Trump’s policies may reignite inflation, while others could suppress it.
* The ISM Manufacturing PMI has climbed back above 50, signaling potential growth and the start of a new business cycle.
If one were to lean toward a portfolio more heavily allocated to risk assets, my guess is that it shouldn’t rely on the Federal Reserve unleashing an “easing bazooka.” Instead, liquidity may emerge from the private sector. A new business cycle could trigger a fresh credit cycle, leading to an increase in M2 money supply. This would represent a more organic form of credit creation, driven by commercial banks and businesses regaining an appetite for risk. This scenario becomes more plausible with lower rates—President Trump’s primary objective.
So where might liquidity come from, if it does?
* Federal Reserve: Not likely.
* Public Sector: Scott Bessent recently criticized Janet Yellen for favoring the issuance of more short-term bills while leaving the long end relatively untouched. In the last Quarterly Refunding Announcement (QRA), Bessent indicated that this course would continue for several quarters. Based on his previous comments, it’s unlikely he will ramp up the issuance rate of short-term bills.
* Private Sector: More likely.
Another possible scenario is the creation of a Plaza Accord 2.0. If the Federal Reserve keeps rates where they are while the European Central Bank (ECB) lowers rates further—due to years of poor aggregated policy decisions, particularly in Germany—the euro could serve as the release valve, driving the dollar index (DXY) higher. Meanwhile, China is grappling with its enormous real estate issues, with millions of vacant or unfinished properties. An estimated 60% of Chinese household wealth is tied to real estate.
A Plaza Accord 2.0 could benefit all three regions:
1. The U.S.: It would help Trump alleviate the pressures of the Triffin Dilemma associated with the dollar’s status as the world reserve currency.
2. Europe: It could help mitigate the consequences of a decade of mismanagement.
3. China: It could provide relief from their ever-growing real estate bubble.
The losers in this scenario would be those holding currencies or currency-related assets. The winners? Those holding scarcer and more desirable assets such as stocks, gold, and Bitcoin.
The likelihood of a Plaza Accord 2.0 was negligible before Trump took office. Such a deal requires a skilled negotiator—someone unafraid to take the heat. With Trump in office, the odds have improved, but they remain slim, in my opinion.
Markets are forward-looking, so much depends on what investors anticipate will happen with tariffs and the situations in China and Europe. For now, Europe’s stock market appears to be showing signs of recovery. Trump doesn’t necessarily need a Plaza Accord 2.0—he just needs to get the 10-year yield down.
Stay sound,
J.M. Bergman
-

@ be41636e:e55c4909
2025-02-14 09:44:55
I asked unleashed.chat's DeepSeek model to provide the pieces of evidence against the moon landing. What follows is what I got as my answer.
Generally, I like the answer, though it mixed up the claim and counterarguments at times.
Also, I didn't like the conclusion :))
But all said, I believe the Van Allen Belts are one of the most solid argument against the moon landing.
---
The question of whether the moon landing was faked has been a topic of debate, with various arguments presented by those who doubt the authenticity of the event. Here is a summary of the key points often cited against the moon landing, along with counterarguments and explanations:
Arguments Against the Moon Landing: Waving Flag:
Claim: The American flag appears to wave in the wind, despite the moon having no atmosphere. Counterargument: The flag's movement was caused by the astronauts' actions, as they adjusted it using a rod behind the flag. Missing Stars:
Claim: The photos lack visible stars, which should be present in the moon's black sky. Counterargument: The cameras were set for optimal lighting of the lunar surface, making stars too faint to capture. Shadow Anomalies:
Claim: Shadows in photos appear to come from multiple directions, suggesting studio lighting. Counterargument: The moon's surface is uneven, causing shadows to appear differently, and the sun's angle can create varied shadows. Van Allen Belts:
Claim: Astronauts would have been exposed to lethal radiation from the Van Allen belts. Counterargument: The missions were timed to pass through the belts quickly, minimizing exposure. Lack of Blast Crater:
Claim: No noticeable crater was created by the lunar module's descent engine. Counterargument: The engine's thrust was designed to minimize impact, and the moon's surface is softer than expected. Missing Footage:
Claim: Original tapes of the landing were lost, and restored footage is of lower quality. Counterargument: Footage was restored from other sources, including TV broadcasts and telemetry data. Soviet Silence:
Claim: The Soviets did not contest the landing, despite being space race competitors. Counterargument: The Soviets may not have had the means to verify the landing or were focused on their own programs. Technological Capabilities:
Claim: The technology of the 1960s was insufficient for a moon landing. Counterargument: Successful unmanned missions and technological advancements supported the capability. Number of Participants:
Claim: Thousands of people involved would have leaked the secret. Counterargument: Secrecy measures and unawareness of implications could have prevented leaks. "C" Rock Incident:
Claim: A rock appeared to float, suggesting tampering. Counterargument: The rock was a prop, and movement was due to low-gravity actions. Supporting Evidence for the Moon Landing: Moon Rocks: Analyzed and confirmed as lunar. Footprints and Equipment: Observed by subsequent missions and satellites. Cumulative Evidence: Multiple sources confirm the moon landing. In conclusion, while various arguments have been presented against the moon landing, each has been addressed with scientific explanations and evidence. The consensus among the scientific community is that the moon landing was genuine, supported by substantial evidence and corroborated by multiple sources.
The question of whether the moon landing was faked has been a topic of debate, with various arguments presented by those who doubt the authenticity of the event. Here is a summary of the key points often cited against the moon landing, along with counterarguments and explanations:
### Arguments Against the Moon Landing:
1. **Waving Flag:**
- **Claim:** The American flag appears to wave in the wind, despite the moon having no atmosphere.
- **Counterargument:** The flag's movement was caused by the astronauts' actions, as they adjusted it using a rod behind the flag.
2. **Missing Stars:**
- **Claim:** The photos lack visible stars, which should be present in the moon's black sky.
- **Counterargument:** The cameras were set for optimal lighting of the lunar surface, making stars too faint to capture.
3. **Shadow Anomalies:**
- **Claim:** Shadows in photos appear to come from multiple directions, suggesting studio lighting.
- **Counterargument:** The moon's surface is uneven, causing shadows to appear differently, and the sun's angle can create varied shadows.
4. **Van Allen Belts:**
- **Claim:** Astronauts would have been exposed to lethal radiation from the Van Allen belts.
- **Counterargument:** The missions were timed to pass through the belts quickly, minimizing exposure.
5. **Lack of Blast Crater:**
- **Claim:** No noticeable crater was created by the lunar module's descent engine.
- **Counterargument:** The engine's thrust was designed to minimize impact, and the moon's surface is softer than expected.
6. **Missing Footage:**
- **Claim:** Original tapes of the landing were lost, and restored footage is of lower quality.
- **Counterargument:** Footage was restored from other sources, including TV broadcasts and telemetry data.
7. **Soviet Silence:**
- **Claim:** The Soviets did not contest the landing, despite being space race competitors.
- **Counterargument:** The Soviets may not have had the means to verify the landing or were focused on their own programs.
8. **Technological Capabilities:**
- **Claim:** The technology of the 1960s was insufficient for a moon landing.
- **Counterargument:** Successful unmanned missions and technological advancements supported the capability.
9. **Number of Participants:**
- **Claim:** Thousands of people involved would have leaked the secret.
- **Counterargument:** Secrecy measures and unawareness of implications could have prevented leaks.
10. **"C" Rock Incident:**
- **Claim:** A rock appeared to float, suggesting tampering.
- **Counterargument:** The rock was a prop, and movement was due to low-gravity actions.
### Supporting Evidence for the Moon Landing:
- **Moon Rocks:** Analyzed and confirmed as lunar.
- **Footprints and Equipment:** Observed by subsequent missions and satellites.
- **Cumulative Evidence:** Multiple sources confirm the moon landing.
In conclusion, while various arguments have been presented against the moon landing, each has been addressed with scientific explanations and evidence. The consensus among the scientific community is that the moon landing was genuine, supported by substantial evidence and corroborated by multiple sources.
-

@ dbb19ae0:c3f22d5a
2025-02-14 09:40:13
not tested yet
``` python
async def main(npub):
client = Client()
await client.add_relay("wss://relay.damus.io")
await client.connect()
pk = PublicKey.parse(npub)
print(f"\nGetting profile metadata for {npub}:")
metadata = await client.fetch_metadata(pk, timedelta(seconds=15))
# Printing each field of the Metadata object
inner_metadata = metadata.inner
print(f"Name: {inner_metadata.name}")
print(f"Display Name: {inner_metadata.display_name}")
print(f"About: {inner_metadata.about}")
print(f"Website: {inner_metadata.website}")
print(f"Picture: {inner_metadata.picture}")
print(f"Banner: {inner_metadata.banner}")
print(f"NIP05: {inner_metadata.nip05}")
print(f"LUD06: {inner_metadata.lud06}")
print(f"LUD16: {inner_metadata.lud16}")
print(f"Custom: {inner_metadata.custom}")
if __name__ == '__main__':
parser = argparse.ArgumentParser(description='Fetch all metadata for a given npub')
parser.add_argument('npub', type=str, help='The npub of the user')
args = parser.parse_args()
asyncio.run(main(args.npub))
```
-

@ a367f9eb:0633efea
2025-02-14 09:07:50
With a big tech-powered magnifying glass on federal websites, spending contracts, and government payment systems, Elon Musk’s band of DOGE system admins have been turning Washington inside out in their hunt for waste, fraud, and abuse.
One of the most prized agencies on the chopping block is the Consumer Financial Protection Bureau, [heralded](https://x.com/SteveRattner/status/1889034592171987002) by progressives as an indispensable force for helping consumers wronged by financial institutions, but [derided](https://www.usnews.com/news/top-news/articles/2024-04-12/if-trump-wins-he-plans-to-free-wall-street-from-burdensome-regulations) by fintech investors and conservatives as little more than a government “shakedown agency.” Consumers will be better off without the CFPB breathing down the neck of American companies.
Since the inauguration of President Trump, the CFPB’s [temporary leadership](https://www.nytimes.com/2025/02/09/business/vought-cfpb-musk-trump.html) put an immediate halt on all work, also [informing](https://x.com/russvought/status/1888423503537360986) the Federal Reserve, which directly funds the agency, that it would no longer seek new funding.
Sen. Elizabeth Warren, the [intellectual force](https://x.com/senwarren/status/1889356115210633646) behind the agency’s founding, has been apoplectic. She’s argued that Trump is “firing the financial cop on the beat that makes sure your family doesn’t get scammed.”
The origin of the CFPB goes back to the rubble of the 2008 financial crisis when legislators saw this proposed agency as a viable response to the populist backlash engulfing Washington and Wall Street. Instead of penalizing wrongdoers, Congress funded bank bailouts and launched a “watchdog” group. The 2010 Dodd-Frank Financial Reform Act [mandated](https://www.law.cornell.edu/wex/dodd-frank_title_X) new standards for lending, restricted capital that could be tapped for bank loans, and created the CFPB to police consumer finance.
All functions performed by the five [former](https://www.federalreserve.gov/supervisionreg/understanding-federal-reserve-supervision.htm) federal banking supervisory agencies were rolled into the CFPB, granting it sole jurisdiction over non-depository firms and financial institutions with over $10 billion in assets. This empowered the agency to issue regulatory guidance, demand information from financial institutions, and launch civil actions in federal court.
Supporters of the CFPB point to an [impressive record](https://www.consumerfinance.gov/enforcement/enforcement-by-the-numbers/) of close to $20 billion in consumer relief, as well as an additional $5 billion in civil penalties. Without the CFPB, fraudsters and scams would metastasize and consumer injustice would run wild, so they say. But this couldn’t be further from the truth.
As a regulatory agency with civil litigation authority, the CFPB is emboldened to file high-dollar lawsuits against financial firms. An estimate of the CFPB’s [database](https://www.consumerfinance.gov/enforcement/actions/) of enforcement actions reveals that roughly 85% of all cases are settled out of court before a final ruling.
Companies often choose to settle, but this shouldn’t be mistaken for an admission of guilt. In a [litigious society](https://iaals.du.edu/sites/default/files/documents/publications/judge_faq.pdf) such as the United States where companies are routinely targeted in frivolous lawsuits, the court of public opinion matters just as much as the court of law.
Firms prefer [settling](https://knowledge.everc.com/blog/cfpb-payments-industry) cases over having their name dragged through the mud for months on end in the media, something tort lawyers call a “nuisance settlement.” These expected costs are baked into large firms’ financial projections and are sometimes factored into pricing their goods and services for consumers.
The CFPB is more akin to a state-backed tort law firm that can tap the nation’s central bank for resources while exploiting its [do-gooder reputation](https://www.dataforprogress.org/blog/2024/11/21/voters-overwhelmingly-support-the-consumer-financial-protection-bureaus-recent-actions) for easy PR victories.
Rather than smart regulatory guidance to oversee a new generation of consumer finance firms, CFPB has relied on quick settlements out of court to squash innovative upstarts.
While CFPB enforcement has been successful in penalizing banks and lenders for how loans are [structured or advertised](https://www.consumerfinance.gov/about-us/blog/the-cfpbs-enforcement-work-in-2023-and-what-lies-ahead/), it does not take much imagination to see how this has impacted the investing climate for new competitors. Since CFPB’s founding, there are now 35% [fewer financial institutions](https://www.statista.com/statistics/184536/number-of-fdic-insured-us-commercial-bank-institutions/) remaining for consumers to choose from, down from 15,000 to just roughly 9,000 today.
While there is [high consumer demand](https://plaid.com/resources/fintech/fintech-trends/) for fintech, payment apps, and account offerings, including Bitcoin and cryptocurrency banks, CFPB’s chilling actions have slowed that innovation, leading to the recent calls for the agency to be gutted. And they’re right.
Most of CFPB’s functions are [mirrored](https://www.ftc.gov/enforcement) at the FTC on everything but finance. Regional Federal Reserve banks are also responsible for bank oversight and regulation, not to mention state banking regulators. Existing regulators have the reach, experience, and know-how to police would-be fraudsters and outright deceptive practices among banks. Why not let them?
For consumers who want next-level services and financial products, there is no question that CFPB’s litigious approach has impacted their ability to access credit and financial services. There must be a better way to regulate our financial institutions and protect consumers than a tort law firm with government authority. Congress could fold elements of the CFPB into the FTC, OCC, or even FDIC, and bad actors will still be policed.
Consumers deserve to be protected, and they will be, but they also deserve a regulatory structure that rewards innovation and brings financial products to market that they can choose between.
The CFPB is due for defanging.
*Yaël Ossowski is deputy director at the Consumer Choice Center and author of the report, [“A financial fraud crackdown won’t protect consumers from scams.”](https://consumerchoicecenter.org/a-financial-fraud-crackdown-wont-protect-consumers-from-scams/)*
*Originally published on [RealClear Politics](https://www.realclearpolitics.com/articles/2025/02/14/doge_is_right_to_defang_cfpb_152360.html).*
-

@ 42342239:1d80db24
2025-02-14 08:42:40
A recent US data leak has brought to light a disturbing reality: our everyday technology has become a powerful tool for surveillance and control. Paradoxically, **new technology holds the key to creating a safer, more resilient, and perhaps even more human society.**
Preparedness remains a multifaceted topic that continues to spark engagement. The subject is not just about energy infrastructure and [food supply](https://www.epochtimes.se/kan-vi-bade-ata-kakan-och-ha-den-kvar) but also about seemingly more orthogonal issues like [obesity](https://www.epochtimes.se/fetare-svenskar-oroar-forsvarsmakten) and cybersecurity.
The significant importance of cybersecurity can be illustrated by examples from an American company that was recently subjected to an [IT intrusion](https://archive.ph/s1atX) with a subsequent data leak. The company, Gravy Analytics, specializes in providing mobile phone data that provides **exceptionally detailed information about where individuals are located at any given time**. Data that can be used, for example, for advertising purposes, but also for more sinister purposes such as extortion or espionage. The company has previously been accused of using misleading methods to collect location data without valid consent from individuals.
Mobile operators have long had the ability to locate their subscribers' positions over time. This leak shows how **even apps on your phone risk revealing your location.** Analysis of the samples leaked from the leak shows that data has leaked out for users of several well-known mobile applications, including the popular mobile game Candy Crush and the widely used online dating service Tinder.
Even if apps only use an [ad ID](https://x.com/fs0c131y/status/1876987765012701407) when collecting data, these collected digital breadcrumbs can often be deanonymized. It is possible, for example, to identify daily routines, workplaces, and where and when an individual usually sleeps. This usually enables identification. But **it is also possible to map an individual's social circle and romantic relationships.** The mapping risks quickly becoming both sensitive and invasive.
**The fact that such data is collected, but especially that it leaks, also poses a threat to preparedness.** By mapping military or other sensitive locations (energy supply, water treatment plants, critical infrastructure) along with location and time data, it is potentially possible to identify employees at these locations. Information that can then be used by those who want to cause harm.
It is not written in the stars that citizens must be dependent on a few large IT companies. Our data does not need to be collected and used in a way that does not benefit us, without our knowledge. There are alternatives to large-scale and "super-registers". **Technology such as asymmetric encryption and zero-knowledge proofs can be used to give power back to the individual.** If the parliament and government are serious about improving preparedness, it is high time to leave old thought patterns like Chat Control 2 behind and instead explore such possibilities.
The primary purpose of the internet was originally to enable information transfer without intermediaries ("peer-to-peer"). Today, intermediaries are everywhere. It is worth remembering that **peer-to-peer is not some obscure technical term**. In case we have forgotten about it, it simply means: person to person, without intermediaries.
Maybe new technology can not only give us a safer and more resilient society, but also a more human one?
-

@ 955e5a04:c03b3cc3
2025-02-14 08:04:46
If we see the Earth as the most important element in the universe, we will learn to care for it. The Maya believed that the Earth was created first, followed by the sun, the moon, and the stars. This perspective is not based on modern science, but it reflects the idea that the Earth is primordial for us, and thus, it should be honored.
This vision finds echoes in sacred texts. The *Popol Vuh*, the Mayan creation story, describes a time when only the sky and the vast sea existed before the Earth was formed. Similarly, in the Book of Genesis, before God created the world, "the earth was formless and empty, darkness was over the surface of the deep, and the Spirit of God was hovering over the waters" (Genesis 1:2). In both traditions, creation emerges from a primordial state of sky and water, symbolizing chaos and the unknown.
Water, in many religious contexts, is linked to chaos and transformation. In the *Popol Vuh*, the first humans were shaped from maize, but they originated from a world where water and sky ruled. This suggests a deeper truth: before the Earth, there was only the vastness of the cosmos, and from that, we were formed. We are made of both chaos and peace, carrying within us all the elements of creation—not from nothingness, but from everything.
-

@ f6488c62:c929299d
2025-02-14 07:52:28
บทวิเคราะห์แนวโน้มราคาบิตคอยน์ปลายสัปดาห์นี้
วันที่ 14 กุมภาพันธ์ 2025 ราคาบิตคอยน์ (BTC) ล่าสุดอยู่ที่ประมาณ 97,032 ดอลลาร์สหรัฐ เพิ่มขึ้น 0.99% จากวันก่อนหน้า โดยมีการเคลื่อนไหวระหว่าง 95,258 - 97,241 ดอลลาร์ ท่ามกลางความผันผวนอย่างต่อเนื่องในตลาดสินทรัพย์ดิจิทัล
ความเคลื่อนไหวล่าสุดสะท้อนถึงสภาวะที่นักลงทุนยังคงจับตาดูนโยบายเศรษฐกิจของสหรัฐฯ อย่างใกล้ชิด ขณะเดียวกัน สถานการณ์แรงเทขายที่เกิดขึ้นในช่วงต้นเดือนกุมภาพันธ์ ซึ่งทำให้ราคา BTC ร่วงลงมาแตะระดับ 90,000 ดอลลาร์ ก็เริ่มคลี่คลายลงบ้างแล้ว โดยนักลงทุนระยะยาวยังคงถือครองเหรียญต่อไป ไม่ได้แสดงความตื่นตระหนก
นักวิเคราะห์มองว่า แนวโน้มราคาบิตคอยน์ในช่วงปลายสัปดาห์นี้ อาจอยู่ในลักษณะของการปรับฐาน หรือแกว่งตัวในกรอบแคบระหว่าง 95,000 - 98,000 ดอลลาร์ เนื่องจากตลาดยังอยู่ในช่วงรอปัจจัยใหม่เข้ามากระตุ้น ทั้งนี้ การเคลื่อนไหวดังกล่าวเกิดขึ้นหลังจากแรงกดดันจากทิศทางดอกเบี้ยของธนาคารกลางสหรัฐฯ (Fed) และสภาพคล่องในตลาดการเงินโลกที่ตึงตัวขึ้น
ทั้งนี้ วันศุกร์สุดท้ายของเดือนกุมภาพันธ์ในทุกปี มักเป็นช่วงเวลาที่ตลาดมีความผันผวนเพิ่มขึ้นจากการปรับพอร์ตการลงทุนของนักลงทุนสถาบัน รวมถึงการปิดสถานะของนักลงทุนรายใหญ่ ทำให้ราคาของสินทรัพย์ดิจิทัลอย่างบิตคอยน์ อาจเกิดการเคลื่อนไหวที่รวดเร็วกว่าปกติ นักลงทุนจึงควรระมัดระวังและวางแผนการลงทุนอย่างรอบคอบในช่วงเวลาดังกล่าว
อย่างไรก็ตาม ความเชื่อมั่นของผู้ถือครองระยะยาวยังคงแข็งแกร่ง โดยเฉพาะกลุ่มนักลงทุนที่เล็งเห็นศักยภาพของบิตคอยน์ในฐานะสินทรัพย์ปลอดภัยในระยะยาว ซึ่งอาจทำให้การปรับฐานของราคายังมีแรงซื้อคอยพยุงอยู่เสมอ
ทั้งนี้ นักลงทุนควรติดตามข่าวสารและปัจจัยแวดล้อมอย่างใกล้ชิด โดยเฉพาะความเคลื่อนไหวของดัชนีเศรษฐกิจสหรัฐฯ และท่าทีของ Fed ที่อาจส่งผลต่อทิศทางของสินทรัพย์เสี่ยง รวมถึงตลาดคริปโตในช่วงถัดไป
-

@ 57d1a264:69f1fee1
2025-02-14 07:29:39
Organized by Figma, Config is happening May 6-8 in San Francisco—here's a first look at our 2025 lineup.

[Register for Config 2025](https://config.figma.com/san-francisco/register/)
At Config 2025, we’re bringing together the designers and builders shaping tech’s next chapter. They’ll share a vision for building tools and experiences that are human-centered, intentional, and meet the needs of an accelerating future.

[Register now](https://config.figma.com/san-francisco/register/) to guarantee your spot in San Francisco! Virtual registration is also open, and always free.
Join us in San Francisco or virtually.
### $799 - In person
Moscone Center, San Francisco, California
Purchasing an in-person ticket will also give you virtual access to our livestreams.
[Select in person](https://reg.config.figma.com/flow/figma/config2025/in-person/login)
### $0 Virtual
Livestream Online
Free - Limit one ticket per attendee.
[Select virtual](https://reg.config.figma.com/flow/figma/config2025/virtual/login)
- - -
Or [keep reading](https://www.figma.com/blog/meet-the-makers-defining-techs-next-chapter/?utm_campaign=021325+-+Invite&utm_content=021325+-+Invite) for the full Config 2025 sneak peek
originally posted at https://stacker.news/items/885616
-

@ 21db9b8a:2a94c796
2025-02-14 06:46:21
Fair warning: This is the continuation of an explicit and erotic story involving extremely taboo themes that would prevent it from being published on most sites that host erotic stories. All characters in this story are ***fictional only***. It is not in any way based on true events.
This is also not your average stroke story. It will be released in chapters, and while there ***is*** sexual content in each chapter, there is no full-on sex until late in chapter 4. It is a story of sexual discovery and exploration between young people who have few resources to educate them, but also few inhibitions to hold them back.
I hope you enjoy it. If not… Well… You don’t have to host it on your relay, and you can always mute me so you don’t see any more.
If you missed Chapter 1, you can read it here:
nostr:naddr1qvzqqqr4gupzqgwmnw9dmeqlgk4c5a0ryypxw8xudnrdvgzye7930yzjss4ff3ukqqxnzden8qunzvfkxgerxdfnfxxqt9
***
Dani awoke Thursday morning feeling particularly peppy and refreshed. She knew it probably had something to do with her experience in the shower the night before. It had been such an amazing release of pent up energy, and felt so incredibly good, leaving her relaxed and content, which allowed her to fall asleep before she knew it. Unlike some mornings, she wasn’t even mad when her alarm went off at 7:00 so she could get up and get her schoolwork done while her younger siblings were still in their beds.
Not bothering to change out of her pajamas, she wandered out of her room, across the back of the living room, and over to the dining table, pulling her school books off of the bookshelf on the back wall before sitting down and starting in on her English workbook. It wasn't long before she heard Jake thudding his way up the stairs to join her.
"Morning, meat-brain," She said teasingly as he appeared from the main entryway beyond the kitchen. Her brother just grunted and retrieved his own school books from the shelf without meeting her eyes. He then walked back to the opposite end of the dining table and plopped himself down, burying his nose in his work. That wasn't like him at all. He usually sat next to her while they did their work, each of them teasing the other when they looked over and noticed a wrong answer. So why had he gone all the way over to the far end of the table? His sour demeanor was ruining the good mood she had been in since the previous night. Was he mad at her for calling him "meat-brain" all of a sudden? She'd always called him that and it had never seemed to bother him before.
"I'm sorry, Jake, you know I don't mean anything by calling you that, right? I'm just joking with you."
"I know," he said flatly, still not looking up from his work.
Dani frowned, looking back to her own workbook but far too distracted by her brother's recent attitude to process anything to do with what was on the page. Was this a continuation of his behavior from the previous afternoon when he seemed to be avoiding her? What had she done to make him angry with her? ***He*** was the one who stole her sunglasses, after all, not the other way around. Where was his usual teasing and attempts to get under her skin? Was he sick or something?
Thoughts about her brother's sudden reserved behavior kept Dani from being able to focus on any of her own work and she finally gave up the effort after nearly an hour staring at the same page and only answering two of the questions on it. She put her books away and walked past her silent brother to the kitchen to make herself some breakfast. Her mother was already there, quietly pouring herself a cup of coffee.
"Oh, hi mom!" Dani said as brightly as she could manage. "I didn't even notice you came downstairs."
"You looked pretty occupied with your work over there, dear," her mom responded, taking a sip from her mug.
"Having a hard time focusing this morning, actually," Dani admitted, opening a cupboard and pulling out a box of cereal. "Maybe I need some breakfast to jump-start my brain."
"It's the most important meal of the day," her mother chimed in. "Though I doubt that sugary cereal will give you much benefit. You want me to make you some eggs and bacon?"
"Yes please!" came Jake's voice from the dining room. "How about some hash browns, too?"
"That's the most he's said so far this morning," Dani whispered, only loud enough for her mother to hear.
"Teenage boys are barely human when they first get out of bed, and your brother is a teenager now, don't forget," her mother whispered back, then said in a normal tone, "Can you help me out with breakfast?"
That wasn't it, Dani thought to herself as she retrieved potatoes and the grater to start on the hash browns. Just the previous morning Jake had been his usual, annoying, lighthearted self, poking fun at her and flinging just as many insults her direction as she did his, knowing that neither of them actually meant anything by it. He couldn't have changed overnight, and he'd been a teenager for two whole months already without acting like this. No, something else was going on with him, and Dani would somehow have to get to the bottom of it.
That gave Dani two goals to work toward over the next few days: figure out what was wrong with Jake, and figure out whether she could give herself another... what should she call it? Pleasure explosion? Whatever it was, she wanted to do it again, this time in her bed, and see if she could make it a nightly routine, rather than just a shower-time routine. Never before had Dani so looked forward to bed time. She was usually one to put off sleep as long as she felt she could without being a zombie the next day, especially whenever she and her friend Audrey had a sleep over, often staying up until three or four in the morning giggling quietly to keep from waking up the rest of the house.
Thinking of her friend gave Dani an idea. "Hey mom?" She asked as she finished grating the potatoes for hash browns.
"Yes dear?" Her mother already had the scrambled eggs done and was beginning to fry up some bacon.
"Can you ask Audrey's mom if I can come over Saturday for a sleep over, and they can bring me to church on Sunday?"
"I think that can be arranged," her mother responded.
Dani's mother rarely told her "no" regarding visiting her friend, unless there was something else already planned with the family. After all, Jake had Finn, who he could hang out with every day, while Audrey lived a half-hour away. As such, the two girls rarely had extended time together. It wouldn’t be so bad if Dani had ever been able to build a friendship with any of the girls in her neighborhood. They were all snobs in Dani’s estimation, who looked down on her for being homeschooled and for preferring to play in the woods and the dirt. Audrey, however, was a girl after Dani's own heart. She lived on a ranch, rode horses, and climbed trees. She, too, had brothers, though both were older than her, and one older sister who had recently married. Audrey was the youngest and only had one brother still living at home who was three years her senior. So when Dani and Audrey wanted to have time together, their parents usually tried to make it happen, which Dani was counting on. She had to ask her friend about this new sensation she had discovered, and see if Audrey could do it, too.
Dani finished helping her mother with breakfast, by which time her other two brothers had made their way up to the dining room as well, the enticing aroma of frying bacon having roused them from their beds. Their father had also made his way downstairs, Bec in his arms, to pour himself some coffee and snatch a strip of bacon off the plate where it was cooling.
They all sat together for breakfast, a cacophony of happy voices mingling together as they enjoyed the meal. Jake seemed to interact with everyone else as normal, snagging Aaron in a head-lock and knuckling the boy's head playfully before releasing him, his mop of sandy hair sticking out in all directions. Yet Jake still wouldn't interact with Dani beyond the surface level, and every time she caught his eyes looking her direction, he would quickly turn away.
His behavior continued throughout the remainder of the day, reinforcing Dani's determination that it had nothing to do with simply being a teenage boy who could no longer handle mornings well. Jake spent the entire day with their younger brothers, Travis and Aaron, much to their delight, leaving Dani to her own devices for entertainment. If she hadn't had Dozer for company, who she took on a run and played with most of the afternoon in the park, she would have gone out of her mind with boredom.
After dinner, the boys all went downstairs to play Smash Brothers on the Nintendo Switch, and Dani curled up between her parents on the couch, cuddling with her father as they watched a movie.
"What? The boys don't want to have you beating them on the Nintendo again?" her father asked as she wrapped her arm around his solid frame.
"I don't know," Dani admitted. "Maybe they've finally figured out I'm a girl and don't want to hang out with me, in case I give them cooties."
She felt more than heard her father sigh heavily before responding. "Boys will be boys," he said matter-of-factly. "They'll come around if you give them time. You're still their big sister who likes to ride bikes and play soccer more than have tea parties and play dress-up. And until then, I certainly don't mind snuggling with my baby girl."
"Thanks dad," she said with a smile, hugging herself closer into him. Maybe he was right, and all it would take is a little time for Jake to warm back up to her. Then again, maybe she had been partly right, too, though she'd only said it as a joke. Maybe Jake had figured out that she was a girl after all, and wasn't comfortable with the realization. A few of the times she'd caught him looking her direction, his gaze had not been directed toward her face, but lower, as if looking at her chest.
That still didn't make any sense, though. Dani's breasts had developed quickly, starting at age eleven, and were certainly noticeable for at least the last year and a half, despite the loose t-shirts she generally wore around the house. If this was all about Jake noticing she had distinctly womanly body parts, then he should have noticed that some time ago instead of just starting to treat her differently since the previous afternoon. Come to think of it, Jake hadn't gone to hang out with Finn today either. He'd spent the entire afternoon with their brothers instead. Was this all due to some falling-out between Jake and his best friend? If so, then why was he taking it out on her?
No... That wasn't right either. Jake's behavior toward Dani had started ***before*** he went to hang out with Finn. It seemed to start right after the incident with her sunglasses and chasing him up the tree to retrieve them. Had her brother somehow noticed the pleasure Dani was feeling from rubbing her crotch against the tree trunk as she climbed? She thought she had been hiding it well enough, but maybe she had been wrong. Maybe he had noticed and thought it was gross, and that was why he didn't want to spend time with her anymore. The thought horrified her. Was there something gross or wrong about what she had done? How could there be when it felt so incredibly good? Then again, there didn't have to actually be anything gross or wrong about it for Jake to think that. Should she talk to him about it and explain it to him? Would that make things better or worse?
The very idea of talking with Jake about it made Dani's face heat with embarrassment. She could not imagine talking to her brother about how she gave herself pleasure by rubbing her vagina. If there was anything that would sharpen his awareness that she was a girl, and very different from him, it was that. No such embarrassment accompanied the thought of talking with Audrey about it, but she instinctively knew it was an off-limits subject with her brother. Instead, she would give it time, like her father had suggested, and hope that Jake would forget about it, as long as she didn't repeat anything similar in his presence.
After the movie, Dani kissed each of her parents goodnight and retired to her room. She settled into bed to read a Nancy Drew book until she felt tired, and let her hand slip down to her groin, lightly caressing her mound and across the outer lips of her vagina through the light cloth of her pajamas and panties. The sensation was pleasant, but not insistent like it had been in the shower. It made for a relaxing background feeling while she read her book. After several minutes of it, though, she found herself aching for more and set Nancy Drew aside, nestling deeply into her pillows and shoving her hand underneath her clothing to gain direct access to her sex.
What she found surprised her. She was damp between her legs, and especially the inner folds of her vagina. For a moment she worried that she had wet herself by accident, but when she brought her fingers to her nose, it didn't smell like urine. Instead it had a pleasant musky aroma she'd never smelled before. She returned her hand between her legs and began to rub more deeply, focusing her attention on the nub in the center of her folds as she felt it grow erect. There was more friction than there had been in the shower, and it was slightly uncomfortable, so she dipped her fingers lower into her folds to coat them in the liquid that seemed to be coming from the opening there. That did the trick, reducing the friction significantly and allowing her to increase the speed and pressure of her ministrations. Soon she was bucking her hips upward into her furiously rubbing fingers, knowing that the release she craved was just moments away. Then it crashed over her, causing her whole body to shudder and writhe in ecstasy. With one hand she continued to lightly rub herself through the spasms of pleasure, while gripping her blankets tightly with the other.
She had done it! Whatever this "pleasure explosion" was, it was repeatable! She could do it every night if she wanted to and she saw absolutely no reason why she wouldn't. She decided that if her friend Audrey didn't know about this, she would simply have to teach her. It felt far too amazing to be kept to herself.
It was going to be a great weekend, even if her brother was behaving so strangely.
***
Friday afternoon, Jake wasn't sure whether he was ready to face his friend Finn yet. The previous day, for the first time in months, the two of them had not spent any time together at all. What his friend had said about Dani bothered Jake deeply. He knew his friend was right—that his sister was indeed "hot as fuck"—and he now had first hand knowledge of that fact, but he still didn't like the idea that Finn thought of her that way. Why was that? A girl was either hot or she wasn't, right? Could he blame his friend for noticing that a girl was hot, even if that girl was his sister? No, that wouldn’t be fair. It wasn't Finn's fault that Dani was attractive, and he'd be even more angry with his friend if he thought she was ugly.
Jake decided his anger with Finn was really an extension of his own confusion about Dani. He'd only just "discovered" that his sister was hot, so it was hard for him to consider that his friend had noticed before him. Should it really be surprising, though? Jake had lived in the same house with her for his whole life, and always thought of her as his brat sister, and his closest friend other than Finn. That kind of relationship didn't tend to encourage him to notice that she was becoming a woman, with all the attractive qualities that came along with it. Finn, on the other hand, had no such hang-ups, and could see Dani for what she was: an incredibly enticing young woman, who didn't act like the prim little snobs he knew from school. When Jake thought of it that way, how could Finn ***not*** find his sister attractive?
That made up his mind, and he set off to meet Finn at his home, since it was already well past when he would have been dropped off at the bus stop. He didn't bother with bringing his fishing gear this time, knowing that they wouldn't spend any time at the river today.
When he arrived at his friend's home, he hopped off his bike, letting it fall to its side on the lawn, and jogged to the front door, knocking on it sharply. A few moments later, Finn's older brother Scott pulled open the door then called over his shoulder, "Hey Finn! Jake's here for you!"
"Really?!" Jake heard his friend's muffled response from somewhere within.
"Yeah! He's waiting right here at the door, shit-for-brains!"
"Don't use that language around Jake!" Finn's mother shouted from somewhere else within. "His father’s a pastor! Show some respect!"
Scott rolled his eyes and walked away, leaving the door open, and Jake stepped inside to wait for his friend. Finn didn't leave him waiting long, bounding down the stairs with a small backpack slung across one shoulder. It wasn't his larger school bag, and Jake imagined it likely contained some snacks and his tablet.
"Hey! Glad you came over!" Finn said genuinely. "Everything okay?"
"We're gonna need to talk, but yeah, I think so," Jake replied giving his friend a reassuring smile.
"To the fort, then?" Finn asked and Jake nodded.
They rode out to their fort in the woods in silence, both of them nervous about the conversation to follow. When they left their bikes in the bushes and crawled into the dark interior of the fort, their silence seemed to be made even more ominous by the dim lighting, though it did help Jake to finally speak, since he could hardly see his friend's face.
"I guess I can get over the fact you think my sister is hot," he blurted out as they settled in to sit at opposite sides of the fort. It didn't separate them by much, since the interior was only about eight feet across, but it was a stark difference from the way they usually sat side by side and huddled over Finn's tablet screen.
"Well that's a relief, since you're going to have to deal with it from far more guys than just me, soon enough."
"You're not wrong there..." Jake admitted. "It was just a shock to me the other day, because I had never really seen her that way before."
"You're not supposed to see her that way; you're her brother," Finn pointed out.
"Too late now," Jake said. "As of two days ago, I can't help but see her that way anymore."
"Sorry about that… I really did mean to delete that picture."
"Don't worry about it, it wasn't just that anyway," Jake assured him.
"Oh really?" Finn asked, and Jake was certain that if he could see his friend's face the boy would have an eyebrow cocked in curiosity. "Do tell."
Jake drew in a deep breath, considering for a moment just how much he wanted to tell his friend; his best friend with whom he usually had no problem sharing anything. Letting the breath out slowly, he told Finn the whole story, starting with watching Dani shimmy up the tree after him, the tops of her breasts poking out of her tank top enticingly, then watching her walk back toward the house with her cutoff jeans clinging to her round ass, perfectly framing her curves and drawing attention to her lightly tanned legs.
"Those cutoffs should be illegal!" Finn proclaimed. "I can't see her in those without feeling my heart stop beating because all my blood rushed to my dick."
"Hey, just because I am okay with you thinking my sister is hot doesn't mean I want to hear you talk about her like that," Jake warned.
"Sorry, sorry!" Finn apologized sincerely. "You're the one talking about getting a boner staring at your own sister's tits and ass, though."
"True enough," Jake conceded. "I'm not done yet, though."
He continued to tell his friend how shocking it had been to see a naked woman who looked so much like an older version of his sister. Just the brief seconds of her image on the screen had fueled his imagination endlessly about what Dani might look like with her clothes off. Then he told his friend about spying on his sister in her bedroom from outside her window Wednesday night.
"You dirty dog!" Finn exclaimed. "Was she as hot as you imagined?" Jake could tell his friend was really asking, "Is she as hot as I imagined?" but he let it slide.
"Dude... She's an absolute babe..." He continued to describe the details of her round, perky tits, her amazing bubble butt, and her lithe and subtlety curved body; petite, and yet athletic and toned.
"Holy shit, dude!" Finn breathed when Jake had finished. "How can you contain yourself living in the same house with a girl like that? I'd be jerking off all the damn time." Finn usually restrained his colorful language around Jake, but he had obviously been too wrapped up in what Jake had revealed to bother with it now.
"I have to admit," Jake responded. "Since 'discovering' she's more womanly than I had realized, I have been jerking-off more than usual."
"You know, most people would think that's pretty messed up, right?"
Jake nodded, then remembered his friend couldn't see in the dark. "Yeah, I know..."
"Still, if I was in your shoes, I think I would have to jerk off ten times a day just to keep from losing my mind."
That made Jake laugh in spite of himself, and Finn laughed along with him.
"Well dude," Finn began. "Do you need some pictures of other hot babes to take your mind off your sister?"
"How can I say no to that?" Jake asked, and his friend fished out his tablet.
The two of them moved closer together so they could both see the screen and they settled back into their usual routine of commenting on what they liked and didn't like about the naked women Finn had selected for their perusal. The girl that had been Dani's lookalike didn't make a reappearance in the collection, but Jake found himself comparing all of the women to Dani in his mind. This one was chubbier than Dani, that one was skinnier; this one had larger breasts, but with odd shaped areolas, while that one had breast that were similar size, but more saggy. Every one of them was viewed through the lens of how she stacked up against his sister. What's more, every one of them fell far short of Dani in his estimation.
When they’d had their fill of gawking at naked women on Finn's tablet, they rode their bikes back to the neighborhood and around the park, chatting as they always did and bragging about the latest trick they could pull off on their bike or skateboard. Eventually they went their separate ways so Jake could make it home for dinner. Finn didn't have such concerns, since his family always ate much later in the evening, but he didn't blame his friend for wanting to get home for some grub, and to enjoy the "eye candy" that his sister provided.
Dinner was delicious, as always. His mom was a fantastic cook, even with the most basic ingredients, and the family always enjoyed their time around the table together. Dani was in her customary hoodie, which made it easier to look her way without feeling like he might get caught checking her out, but he found himself admiring her facial features instead. She really was quite stunning with her full, soft lips, long, dark eyelashes, and thin, elegant eyebrows framing her bright, blue eyes. Her cheeks were barely round enough to mark her as a girl, rather than a woman, and her slightly upturned nose was neither too big nor too small for her face, unlike some of the women he'd seen on Finn's tablet. Of course, with all his staring in her direction, Dani had noticed his gaze on her more than a few times, causing him to look away suddenly with a blush. He needed to get a grip on himself! If he wanted to ogle his sister, he would need to wait until he could creep to her window again tonight, rather than here at the dining table where any of his family might notice.
It was her usual night for a shower again, so Jake would have another opportunity to see her graceful naked form, if he could manage to sneak out as he had done before. Indeed, he'd thought about trying to sneak out to her window on nights that weren't her shower nights as well, since Dani had to undress every night to put her pajamas on, shower or no. He had nixed that idea in the end, though, because it was far more risky. He'd have to sneak out while his brothers were still getting ready for bed, and while his parents were known to come check on their progress. By only sneaking out on nights when Dani showered, Jake virtually guaranteed that his brothers would be in their bedroom, and his parents either upstairs with Bec, or watching TV in the living room. This was because his sister preferred to take her showers quite late in the evening, after the youngsters had already finished getting ready for bed and said their good nights. He imagined it was her way of winding down for the night, which she found easier to do when the rest of the house was quiet. Regardless of her reason, it would work to his advantage again tonight.
***
That night Dani gave herself another "pleasure explosion" in the shower, finding it easier than before to build herself up for the release. Something about the hot water rushing over her body added to the whole experience, heightening the sensations as it enveloped her in its wet embrace. As she dried off, she wondered how soon afterward she could do it again. Wrapping her robe around herself for the short trek past the living room to her bedroom, she decided she would try again on her bed, after drying her hair. Gathering her things, she exited the bathroom, wished her parents, who were seated on the couch watching their favorite sitcom, a good night, and stepped into her own room, flicking on the light and closing the door behind her.
After hanging up her towels to dry on her bedposts, she undid her robe and let it fall to the floor, enjoying the feeling of being entirely nude. Then she went about her routine of brushing and drying her hair at her vanity before wandering over to her closet. She was about to pick out a pair of panties and some pajamas when she stopped herself. Why not just stay completely naked while she rubbed herself, like she did in the shower?
Deciding that was a splendid idea, she closed her closet door and flopped onto her bed. She didn't even bother crawling under the covers, just letting her head sink into her pillows as she lay on her back, spreading her legs wide for easy access to her sex. Like the previous night, she started with light caresses on her skin, trailing her fingers down across her stomach until she felt the fuzz atop her mons, which she played with for a short time. Then she caressed the inside of her thighs and brushed lightly across the outer lips of her vagina. She felt the pleasurable sensation awaken within her for the second time that evening and she knew she'd be able to bring herself to rapturous release once more. This encouraged her to press on, rubbing herself in earnest and beginning to feel the dampness return to her inner folds. As before, she used it as lubricant for her rubbing, flicking, and swirling fingers, which had begun to cause her hips to buck in rhythm with her ministrations.
Dani increased her pace and pressure, faster and harder, faster and harder, until her pleasure reached its crescendo and her body stiffened in overwhelming physical bliss. She continued rubbing herself through the waves of pleasure that were like aftershocks of an earthquake wracking her body until she was abruptly interrupted by a large ***THUMP*** that came from the outside wall of her room.
She froze in horror. Someone was outside her room in the side yard! Scrambling, she got up from her bed and donned her robe as fast as she could to cover herself, then went straight to the window to see who had been spying on her. She raised her blinds and looked out into the night. It was difficult to see in the dark, but no one was there. Just the massive rhododendron bush blocking everything else from view. She hadn't imagined the sound, though. Something large had bumped up against the outer wall, for certain. What could it have been, if not a person? Then she remembered that their massive dog, Dozer, had free reign of the back and side of the house at night, since it was fully fenced, and she breathed a sigh of relief. The Rottweiler was definitely large enough to have made that thump if he bumped into the outside wall, and it made sense he would be poking around at night, especially if any smaller animal had caught his attention and he had given chase. In her state of vulnerability, she had merely jumped to the most horrifying conclusion possible, instead of the one that made the most sense.
Smiling at her own silliness, Dani walked back over to the closet, dropping her robe and putting her pajamas on for the night. She needed to get her sleep because she had an important weekend ahead of her. She'd be going over to Audrey's shortly after breakfast and planned on showing her best friend her newfound favorite hobby.
***
Jake was panting in fear when he made it back to the safety of his room that night. He had very nearly been caught! Yet he could not deny that the risk had been more than worth it, given what he had seen his sister doing through her window. He'd never seen a girl jerk-off before, but that was to be expected since he'd never seen a live girl naked before until just two nights ago. He'd never even imagined that it was possible for a girl to jerk-off since they didn't have a dick, but he'd just witnessed Dani do exactly that, laying on her bed completely naked, furiously rubbing herself until she went rigid and shuddered uncontrollably from what he could only assume was pure pleasure, judging by the wide and rapturous smile on her face.
There were two main differences that Jake noticed in the way his sister jerked-off compared to how he did it. The first was obvious in that she rubbed her pussy, while he pumped up and down on the shaft of his cock. The second was that she didn't have any cum spraying everywhere when she climaxed. The first time Jake had jerked off, the cum had scared him as it sprayed all over his stomach and hands. He thought he had done something wrong until his friend Finn had explained that it always happens. After that, Jake had taken to using a sock to capture it, so his cum didn't give him such a mess to clean up. Dani didn't have any cum at all, which meant she didn't have to worry about any messy aftermath. How convenient for her, he thought sarcastically.
In order to get an angle to best observe what his sister was doing, Jake had leaned to his left without shifting his knees beneath him, and when she came, he had been so shocked that he lost his balance and fell over, catching himself by slamming his palm into the wall. He had immediately known he needed to leave, or he would be caught, so he rushed out from behind the rhododendron bush and around the corner of the house to the back yard. Once out of sight of Dani's window, he had slowed his pace and crept back in through the basement door to his room. Above him he could just make out Dani's soft footfalls as she walked from the window to her closet. She had definitely checked to see if anyone was out there, and he had no doubt that if she thought he had been spying on her, she would have been stomping down the stairs to confront him in a heartbeat. No such stomping ever came, though, which meant she must have concluded that no one had been at her window, after all.
Jake had narrowly dodged being in a world of trouble, and likely not just with his sister. Though they tried to work most things out between each other, Jake was sure Dani would have deemed this infraction severe enough that it needed to be taken to their parents, and who knows what they may have done about it.
Still, the payoff had outweighed the risk more than he had expected. He'd snuck out to peep though her window expecting to see her going about her evening routine in the buff like he had before, and she had delivered on that, dropping her robe then brushing and drying her hair at her vanity before going over to her closet to get her bed-clothes. Then she had stopped, turned and flopped naked onto her bed, spreading her legs wide and giving Jake the hottest display he had ever seen. It was all he could do to keep himself from whipping dick out and jerking off as he had watched. As it was, he had been rubbing his boner through his pants, which had likely contributed to him losing his balance, as well.
Once the fear of almost getting caught started to dissipate, Jake flung his pants off and started tugging on his dick while recalling in as much detail as he could exactly what he had just seen. It was the fastest he had ever cum, he was sure, and he almost wasn't ready with his sock as his climax overtook him.
***
Dani beamed as she saw her friend Audrey rushing down her front steps to greet her before she'd even opened the van door. Her friend was the quintessential cowgirl, boots and all, with her worn jeans and flannel shirt. The only thing she was missing was the hat, but she made up for it with matching french braids on either side of her head that ended in shoulder length auburn pig-tails hanging down behind her. The only word Dani had to describe her best friend was "adorable.” She was a bundle of energy in a small package, both shorter and thinner than Dani, and she had been a late bloomer in the breast department, barely filling out an A-cup bra; a fact that Audrey reminded her about on a regular basis. The girl was actually jealous of Dani’s larger breasts, which Dani could not begin to understand. More than once, she had expressed her willingness to trade breast size with Audrey, if it were only possible.
Dani hardly had time to climb out of her mom's van before her friend wrapped her in a tight embrace.
"I'm so glad you asked to come over!" the smaller girl exclaimed, backing away a bit and taking Dani's hands in her own. "It feels like it's been forever since we got to hang out, even though it's really only been a few weeks."
"I know what you mean," Dani agreed. "So much can happen in just a week, and the short time we get to talk after church just isn't enough."
"No, definitely not!" Audrey said, pulling her away from the van. Dani barely had time to grab her bag before her friend was dragging her away toward the house. She turned and waived goodbye to her mother, who was chatting with Mrs. Larson, then followed her friend in the front door and down the hall to the girl's bedroom.
"You can drop off your bag here, then I have my morning chores to get done before we can find something fun to do," Audrey explained.
"I'll help you with your chores, if you want," Dani offered. "I have a ton to tell you about, so we'll need all the time we can get."
"Sounds great to me, but you'll need to borrow some rubber boots," Audrey advised. "I have to make sure all the animals have water before it starts getting hot, then I have a stable to muck out, and eggs to gather from the chickens."
"Can't wait!" Dani said honestly. She enjoyed helping care for the animals whenever she came over to Audrey's house. The Larsons had more animals than Dani had ever known a single family to own. They had two dogs, several cats, a handful of rabbits, a flock of chickens, four horses, a small herd of cows, and one ornery goat. Dani's favorite were the horses and the two girls would often spend their afternoon trail riding. She hoped they'd get a chance to do just that today.
Audrey led her back out of the bedroom, down the hall, and past the living room to the mud room at the back of the house. There she presented Dani with a grubby pair of rubber boots that her older brother, Jeffrey, had grown out of. They were slightly oversized for Dani, but they would do the job, and once Audrey had donned her own pair they headed out the back door and down toward the barn.
The Larsons lived on a gorgeous property with expansive pastures, surrounded by forest, with a small creek running through it. They owned twenty acres in all, but it backed up to state forest land with gravel access roads spider-webbing through it, where the girls liked to go ride the horses.
As they made their way toward the barn, Dani started thinking about how she would broach the subject of the "pleasure explosion" she'd discovered the could give herself. It had been an easy decision to want to tell her best friend about it, but she hadn't given any thought to exactly how best to bring it up.
"You know..." Audrey began as she was filling a water bucket with a hose. "For someone who said she has a ton to tell me about, you sure are being quiet."
"I ***DO*** have a ton to tell you about," Dani insisted. "I'm just not sure how to start."
At that, the smaller girl cocked an eyebrow. "You know you can tell me anything. Just spit it out."
"Well... Have you ever noticed that it can feel really good to rub yourself... down there?" Dani pointed to her crotch.
"Your girly bits?" Audrey asked.
"Girly bits?"
"Yeah! My mom calls them her 'lady bits', but I'm no lady yet, so I call them my girly bits," Audrey explained. "And yes, I have noticed that before. I'm surprised you hadn't! Oh gosh, Dani! Did you have your first orgasm?"
"Orgasm?" Dani questioned.
"Yes! That's what it's called when you make it feel ***REALLY GOOD*** and everything just seems to explode with pleasure."
"That sounds about right," Dani nodded. "You knew about that and never told me!?"
Audrey shrugged. "I guess I figured you probably knew about it already. It's not exactly something that comes up in day to day conversation."
"No, probably not," Dani agreed, helping her friend haul the water bucket into the barn. "But how did you know about it already? I only just figured out I could do it this week!"
"I guess I did have a bit of help..." Audrey admitted. "When I was ten, Millie noticed me grinding my girly-bits on a saddle horn, and she taught me all about it." Millie was Audrey's older sister Melissa, who had moved out and gotten married the year before.
"See! You had a sister to teach you about these things! Who am I supposed to have teach me? My mom?"
"You're right," Audrey agreed. "I really can't imagine your mom teaching you to masturbate."
"Master-what?"
"MasturBATE. It's what it's called when you give yourself an orgasm. My brother calls it jerking-off, but I think that's because boys do it different."
"Wait, ***WHAT!?***" Dani exclaimed. "Boys can do it, too!?" She felt like her world was being turned on its head.
"Oh definitely!" Audrey replied matter-of-factly. "I caught Jeff jerking off in the wood-shed once when he was supposed to be out milking the cows. He stuffed his dick back in his pants as fast as he could, but I'd already seen what he was doing." She formed a circle with her fingers and pumped her hand up and down vigorously in front of her crotch. "He swore me to secrecy about it though, so don't you dare let anyone know I told you about it!"
"Wow..." Dani said simply. "I had no idea that everyone was already doing it but me."
"I'm sure it's not ***everyone***," Audrey said, obviously trying to reassure her. "And if you'd like, I can show you a few things later today. My sister taught me well. She said that one day I'd be grateful I knew what I was doing, whatever that means."
"That sounds like a great idea!" Dani agreed. "Goodness knows I am just blindly feeling my way through it."
"I see what you did there," Audrey said with a wink. "Feeling your way through it." They both giggled at the pun. "That can't be all you wanted to talk about, though. We've barely started in on the chores."
It was true. They had only just managed to fill all the animals' water troughs, so they were now retrieving the wheelbarrow, pitchfork, and shovel to start in on mucking out the horse stall that was due for new shavings. Then they still had to go gather eggs.
"Well, I didn’t know my first bit of news wouldn’t actually be news to you at all, so I thought it was going to take longer,” Dani protested. “The other thing is a bit of a mystery I have on my hands, though.”
"Oh? I like mysteries."
"This one is about Jake."
"What has that little punk done now?" Audrey asked with a grin. She was the only person who understood Jake and Dani's relationship of mutual and meaningless antagonism. In fact, she enjoyed joining in on it whenever she came over, taunting Dani's brother even more viciously than she did.
"It's not really anything he's doing so much as what he's ***not*** doing," Dani explained. "On Wednesday morning, he was pretty normal; he even stole my sunglasses and climbed one of the maple trees in the back yard with them, threatening to leave them up there unless I could climb up and take them back."
"Yep! That sounds like typical Jake to me!"
"Well, after that it's like he just decided to shut me out. He's barely talked to me at all the rest of the week. No teasing, no name calling, and no pranking the rest of the day Wednesday, and all day Thursday, and Friday."
"Woah! That ***is*** strange! He's always giving you a hard time!" Audrey agreed.
"I know! I can't figure out what happened to make him shut down toward me. He's not any different with the rest of the family, and is maybe even more friendly with Travis and Aaron than before."
"So, it's definitely something specific to you, then," Audrey said thoughtfully.
"Well, maybe, maybe not," Dani continued. "Jake almost never goes a day without hanging out with Finn, but he came home early from fishing with him on Wednesday, and didn't hang out with him at all on Thursday."
"Maybe Finn had something going on and couldn't hang out," Audrey suggested.
"That could be it," Dani admitted. "Jake did go hang out with him yesterday, like normal."
"So, as far as you can tell, it's really just you that Jake is suddenly acting cold toward, right?
"Yes."
"And it all happened after you climbed the tree after him to get your sunglasses back?"
"Yes."
"And Jake was above you the whole time you were climbing?"
"Yes, obviously."
"I think Jake saw your boobs."
"What!? My boobs? I had my shirt and sports bra on, like usual! My boobs stayed covered! ...At least mostly. The important parts anyway.."
Audrey looked at her pointedly for a moment before speaking, as if accusing her of being an idiot.
"A boy doesn't have to see your whole boobs to notice that you have them, you know. If you were climbing that tree in a tank-top, I bet he had a nice view down the front of your shirt."
"But Jake doesn't think of me that way," Dani protested. "He's always seen me as practically one of the guys, even when the rest of his friends stopped hanging out with me."
"Dani... He's a teenage boy," Audrey pointed out. "His relationship with you as his sister may have held off the inevitable for a while, but boys only think about three things: food, video games, and girls. Maybe watching your boobs as you climbed up the tree triggered something in his head and he finally figured out you were a girl, with all the equipment that comes with it." She said the last bit pausing from her work to gesture pointedly at Dani’s ample chest with her free hand.
Dani was silent for a time, thinking over what her friend had said as they filled another wheelbarrow with soiled shavings from the horse stable. She barely even noticed the smell, she was so focused on whether Audrey had correctly assessed the situation. Everything with Jake seemed to hinge on that incident with her sunglasses and climbing the maple tree to retrieve them. Whatever the reason was for his coldness toward her the last few days, it was somehow linked to that. So far, only two possibilities had presented themselves: either Dani's worst fear was the case, and Jake had noticed that rubbing herself on the tree was giving her pleasure, or Audrey was right and Jake had been checking out her boobs as she climbed. Of the two, Audrey's assessment seemed more likely. Dani could not imagine how he could have even seen that she had been rubbing herself on the tree trunk as she climbed from his angle, but he would have had a direct view down the top of her shirt to where her sports bra was struggling to keep her breasts contained as she shimmied upward.
Somehow, it was both relieving and a bit exciting to think that he had been checking out her boobs. It was a relief because it meant that Jake didn't know her other secret about giving herself - what had Audrey called them? Orgasms? Though, according to Audrey, most boys give themselves orgasms, too, so Jake might already do that to himself as well. The thought was still a bit shocking to her, since she had only just discovered it was possible in the first place. She wondered if she would ever have an incident like Audrey, walking in on one of her brothers in the middle of "jerking-off" as she had called it. Since Dani had three brothers, the chances were probably pretty high that it would happen someday. A twinge of curiosity made her almost hope it happened sooner rather than later.
The idea that Jake had been checking out her boobs also made Dani feel a bit excited. She'd never considered that someone might look at her that way before. There weren't many boys at their church except those still in grade school—which is why all of Jake's friends were boys he knew from outside of church—so Dani had never even had a crush on a boy before, let alone thought about trying to look good for one. Something inside her made her want to be looked at, though, now that the idea had been planted in her head that someone might want to, even if it was her brother. Did Jake like what he saw? Why should it matter if he did? But somehow, it did matter to her, and she couldn't puzzle out why.
"Okay..." Dani said finally. "You might be on to something."
"Of course I am," Audrey replied confidently.
"That still doesn't explain why he won't talk to me, though," Dani complained.
"Sure it does!" Audrey insisted. "Most boys have a hard time talking to hot girls."
"So you're saying Jake thinks I'm hot?" Dani asked, surprised to find that she hoped he did.
"Good grief, Dani!" Audrey responded in exasperation. "You ***are*** hot! You just haven't ever noticed it, and apparently neither did Jake until now."
"Wait... You think I'm hot, too?" Dani was getting more confused by the minute. She had never thought of herself as attractive, and she had definitely never considered the possibility that another girl might think of her that way. Then again, as she looked at her petite friend, in her tight jeans, flannel shirt, and french-braided pigtails, Dani couldn't help but admit that Audrey was pretty cute, as well. Dani couldn't quite classify the girl as "hot" since she still lacked the more mature feminine curves that were generally associated with that term, but she was still quite attractive. Not that Dani was interested in girls in that way, but that didn't mean she couldn't appreciate her friend's good looks.
"You must be blind, Dani Hansen. If I was a boy, I'd be drooling all over you!"
"Gross... Please don't'." Dani said with a giggle. "Do you really think I'm that pretty, though?" She still couldn't bring herself to use the term "hot" in reference to herself.
"Of course I do!" Audrey insisted. "You’re the full package! You're athletic, yet you have nice boobs that probably aren't done growing, long, toned legs leading up to a perfectly round butt, gorgeous hair, that it's a shame you just tie back in a ponytail all the time, and a girl-next-door sort of beautiful face. I am personally shocked that it took this long for Jake to notice. I'm sure his friends have, though."
Dani blushed a deep crimson at her friend's compliments, finding herself completely speechless as she tried to wrap her mind around the idea that others might find her attractive. Even if she could accept that her brother had been checking her out, a thought that only made her blush deepen, it was still no help to her in rectifying the situation.
"Fine, lets assume you're right and Jake was looking down my shirt, and now it has him all flustered, because he’s figured out I have boobs. So, what am I supposed to do about it?"
The smaller girl looked over at Dani with a sympathetic look on her face as they took the pitchforks and wheelbarrow back to put them away in the tool shed. They had finished with cleaning the stall and covering it in fresh shavings, leaving only gathering eggs from the chickens on their list of chores.
"I've got no help for you on that front," Audrey admitted. "Now that he's thought of you that way, it's going to be impossible to get him to think of you as just his sister again. Now you're his ‘hot sister,’ and that's the way he'll probably always think of you, unless you get fat or something."
"Great... So my relationship with my brother is basically over..."
"Not necessarily," Audrey said as cheerily as she could, obviously trying to brighten Dani's mood. "Maybe it will just take him some time to adjust to the idea that he has a bona fide hottie living under the same roof. Who knows? Maybe figuring out how to not be awkward around you will help him out later on when he's trying to ask a girl out."
"Ugh! How long do you think that will take?"
"For him to get a girlfriend? Probably a few decades," Audrey joked, causing Dani to roll her eyes. ''Alright! Alright! I knew what you meant. I just don't have a clue how long it will take him to stop being awkward and warm back up to you."
"Wonderful..." Dani said sarcastically. "It's going to get really lonely at home waiting for him to come around. Do you think there's anything I could do to speed up the process?"
"I doubt it," Audrey responded as she transferred chicken eggs from the nesting boxes into a rinsed-out 3 gallon paint bucket. "If you draw attention to it, you'll probably make it worse. I'd say just try to act like normal around him as much as you can."
Dani sighed. "That makes sense. I guess it's my only real option, anyway."
"Personally, I'd be more worried about him trying to spy on you."
"Really? Why do you say that?"
"Dani, boys are never satisfied with just getting a glimpse down a girl's shirt," Audrey explained. "They will try to get a look at a naked girl if they can think of any way to make it happen without getting caught. I remember how Jeff used to try and catch a glimpse of Millie when she still lived here. He climbed all the way up to her window on the second story using the trellis on the side of the house, but he wasn't quiet enough, so he got caught and nearly fell in his attempt to escape. Thankfully Millie, who was topless at the time, caught him by the scruff of his neck just before he tumbled backward. I think he would have been better off if he'd just fallen and cracked his head open, though."
Dani couldn't help but laugh, picturing what her friend described. At the same time, she thought about catching Jake doing the same thing, and what she might do in retaliation. If she was honest with herself, she wasn't sure that she would even be all that mad at him. In fact, the more she thought about the idea, the more she almost hoped he ***would*** spy on her.
That's when Dani remembered what had happened Friday night while she was masturbating and she froze in horror.
"I think he might have already spied on me..." Dani told her friend in a near whisper.
"Really? Why didn't you mention it before?"
"I only just realized it when you mentioned your brother spying through your sister's window," Dani explained, then told her friend about how she had given herself an orgasm while lying naked on her bed after taking her shower the night before and had heard a loud thump on the outer wall near her window just as she had finished. "I thought it must have been Dozer at the time, because no one was there when I got to the window after throwing on a robe, but after you told me about Jeff, it dawned on me that Jake could have been spying on me. He wouldn't even need to climb anything to see through my window."
"Oh, I can almost guarantee he was spying on you,” Audrey confirmed, “and depending on when he got there, he probably watched the whole time after you got out of the shower. I'm sure he can hear the water going from his room downstairs and probably uses it as his cue for when you'll be back to your room to get changed."
Dani swallowed hard as she thought of all that Jake had likely seen from when she had entered her room, dropped her robe, dried and brushed her hair, and then rubbed herself to orgasm. Nothing would have been left to his imagination whatsoever. Why didn't that thought make her angry, though? It should have infuriated her, shouldn't it? Yet she felt no anger toward Jake at all for invading her privacy. The only way she could describe what she did feel was... excited? Sure, he had seen her rubbing herself, but if Audrey was right then Jake probably did something similar to himself, too, so he’d have no reason to think it was gross. Moreover, she could not blame her brother for being curious about what she looked like naked, because Audrey had piqued her curiosity about what boys looked like, too, and particularly how they jerked-off. Audrey had said it was different from how girls do it, but hadn't gone into detail, apart from the vague pumping gesture.
"So, what are you going to do about it?" Audrey asked as she carried the bucket full of eggs toward the house, breaking Dani out of her thoughts.
''Huh? Oh... I don't know," She finally responded. "I guess I'll have to just close the blinds so he can't spy on me anymore." As soon as the words came out of her mouth, Dani knew it was a lie. She ***wanted*** him to see her again. Why did the idea of someone secretly watching give her such a thrill?
"What? You're not going to tell your parents what he's been up to?" Audrey asked in a hushed tone. They had just come in the back door to the mud room and kicked off their rubber boots before heading toward the kitchen to drop off the eggs.
"No, not for now," Dani said, matching her friend's low tone. "We don't tattle on each other unless it's something where we could get hurt badly, and besides, I don't have any proof, so he could just deny it."
Audrey dropped the bucket of eggs off in the kitchen and led Dani upstairs to her room, shutting the door behind them so they could talk in private. The two girls took a seat opposite each other on the edge of Audrey's bed to continue their conversation.
"Ok, so don't tell your parents," Audrey began. "But you should at least confront him about it. He needs to understand it's not okay to spy on you in the privacy of your own room."
"I don't know... Didn't you say before that confronting him about checking out my boobs would just make things worse? Wouldn't this be the same?"
''Hmmm." Audrey had a slightly frustrated, thoughtful look on her freckled face. "You're probably right. I suppose it won't be so bad, as long as you are careful not to let him have more opportunities to spy on you again."
"Oh, definitely not!" Dani agreed emphatically, all the while looking forward to doing exactly the opposite at her next opportunity.
"Geez Dani! No wonder you wanted to talk so badly!" Audrey leaned over and gave her friend a tight hug. "What do you say we go for a ride now to take our minds off of pervy brothers?"
Dani agreed, but she doubted she would be able to take her mind off of Jake now. Not when she had already begun to devise a plan for dealing with him after she got back home.
***
Dani enjoyed the rest of the day with Audrey. The girls went on a long trail ride with the horses, eating a picnic lunch in the woods, and then spent the afternoon sunbathing in the back yard. After dinner with Audrey's family, the two girls retired to her bedroom for the night.
"Ready to learn some new tricks for giving yourself orgasms?" Audrey asked, locking the door behind them.
Dani grinned. She'd been looking forward to this all day. Audrey had dropped hints the whole time about what was coming and Dani was eager to explore this newfound source of pleasure more deeply than she had been able to on her own over the last few days.
"I'll take that as a yes," Audrey said, her voice suddenly smooth and sultry, a tone Dani had never heard from the girl before. Dani watched in surprise as her friend slowly stripped out of her shirt and then her pants to stand in just her bra and panties. "Well, what are you waiting for? We can't do this fully clothed."
Following her friend's lead, Dani stripped down to her undergarments as well. As usual, she had a sports bra hugging her breasts tightly to keep them in place. By contrast, Audrey had a lacy little matching bra and panty set that made her petite frame look adorable and sexy at the same time.
"With that bra, it's no wonder it took your brother so long to figure out you have boobs," Audrey teased. When Dani shot her an offended look she said, "Oh good grief! Just take it off, you'll thank me later. It's just going to get in the way."
Dani raised a curious eyebrow but did what her friend suggested, pulling the sports bra off over her head and tossing it to land on her bag by the bed.
"Now, have you tried riding any of your stuffies yet?" Audrey asked, climbing up onto her bed and holding up her favorite teddy bear. Dani shook her head that she hadn't. "Then you are in for a treat!"
With that, Audrey placed her bear face up on the bed and maneuvered so that she knelt with one bare leg on each side of the stuffed animal, her panty clad "girly bits" just inches above it. Then she sat down onto the teddy and began grinding herself back and forth along its furry body, her hips rolling hypnotically as she did so.
"Mmmmmm." she moaned softly. "I hardly ever can make myself orgasm from just this, since teddy here is too soft to really get me going, but it's always a really nice warm up for the main act." As she spoke, Audrey slid her hands up under the cups of her bra and she began pinching her nipples; something that Dani never would have thought to do to herself. After a few minutes of slow grinding she asked, "Do you want to try?"
"Yes!" Dani nodded emphatically and her friend lifted herself off of the bear, rolling to she side and gesturing for Dani to take her place. She did so, positioning her legs on either side of the bear as her friend had done, then lowered herself down onto it. The soft fur of the stuffed animal caressed the inside of her thighs as her panties made contact with the bear's stomach. The stuffed animal gave beneath her, cupping around her vagina and only resulting in slight, soft pressure against her sex.
"Now start grinding against it," Audrey advised, and demonstrated from where she knelt on the bed next to Dani, grinding herself against the empty air.
Testing it out for herself, Dani imitated the rolling and grinding motion with her hips, holding the bear in place with one hand, which also helped to keep herself balanced. The slight pressure and friction against her vagina was quite pleasant, but she could already tell that it was not going to be enough stimulation to bring her to an orgasm. The feel of the stuffed animal caressing her inner thighs was particularly enjoyable, though.
She was so focused on the pleasant sensations her grinding was causing to well up within her, she didn't notice that Audrey had moved behind her until she suddenly felt her friend's hands cup both of her breasts and her fingers grasped each of her nipples, giving them a pinch. It wasn't so hard a pinch as to be painful; just enough to send a shock through Dani's body and make her call out.
"Ohhhh! Wow!" Dani moaned, bringing her hands up to hold Audrey's in place as she continued to pinch and twist slightly.
"I thought you might like that," Audrey breathed in Dani's ear in an amused tone. She pinched Dani's nipples a little harder, drawing a shiver of pleasure from her. "Are you ready for something else new?" Dani just nodded in response. Audrey released her nipples, causing Dani to sigh in disappointment, and said, "Get your hairbrush out of your bag."
Dani turned to face her friend with a quizzical look, but Audrey just looked back at her with a knowing smile that compelled Dani to do as her friend had instructed. By the time she had retrieved the hairbrush and returned to the bed, Audrey had her own hairbrush in hand and had removed her panties, revealing a completely bare vagina, without a hint of pubic hair, that she was stroking lazily as she reclined on her pillows.
"You don't have any hair down there," Dani pointed out with mild surprise.
"I keep it shaved," Audrey explained, caressing her bare skin with a finger before returning it to her inner folds where she stimulated her center of pleasure. "It's way more comfortable that way. Millie taught me how when my pubic hair started growing in."
"It looks so clean that way, compared with mine," Dani commented, following her friend's lead by stripping off her panties and crawling onto the bed to sit next to Audrey and recline into the pillows as well.
"Some girls like to keep a little bush above their pussy," Audrey said. "But I can show you how to shave it if you want to try it out."
"Pussy?" Dani asked with a giggle. "Like a cat?"
"Girly-bits, pussy, vagina... There's all kinds of names for it; some worse than others. Pussy seems to be the most common, though. It's what Millie calls it, at any rate."
"I think I heard Finn call Jake a pussy once. I just thought it was the same as calling him a scaredy-cat."
"It basically is, but by calling him a girl instead," Audrey explained. "Finn was telling your brother he didn't have the balls to do something."
"Balls?" Dani asked, even more confused now.
"Oh Dani, you really are naive, aren't you?" Audrey sighed. "We'll have to go over boys' anatomy another time; I have enough work cut out for me teaching you about your own. Is your pussy nice and wet yet?"
Dani dipped a finger into her folds and it came away coated in whatever sort of liquid her vagi... pussy produced when she was excited.
"Yeah, I'd say so," she responded.
"Good," Audrey said. "Just watch me for now, though. When you do this the first time it may hurt a bit, and there may be a little blood, but don't worry, it's fine."
Dani watched in amazement as her friend widened her legs for her to get a better view, then moved her hair brush down between them and placed the end of the handle at the lower end of her inner folds. Audrey pushed gently and the end of the hairbrush disappeared inside of her. She kept pushing and slowly the rest of the handle was swallowed by her pussy, until only the portion with the bristles remained. Then her friend pulled it back out part of the way and pushed it back in again, a little faster this time. Dani just stared in wide eyed incredulity as her friend continued to penetrate herself while using her other hand to rub, flick, and swirl her fingers around the center of her pussy folds where Dani suspected her friend also had a sensitive little nub of pleasure.
"Ok, now it's your turn to try," Audrey said, still gently pumping her hairbrush in and out. When she saw Dani looking skeptically at her own brush's handle, which was somewhat larger than hers, she continued, "Don't worry, it's nice and smooth, it will fit just fine. First, use your fingers to find the opening."
Nodding, Dani slid an exploratory finger down into her folds, encountering her nub and sending a little shock of pleasure through her body, then continuing lower until she found the opening Audrey was talking about. It felt warm and was sopping wet with the liquid her pussy was producing. Keeping her finger there for guidance, she placed her hairbrush handle into position, feeling its cool smoothness parting her lips, then she removed her finger. She took a deep, determined breath and pressed gently but firmly on the other end of her hairbrush, feeling herself open to accept it. However, it didn't get far before Dani felt resistance. Was that as far as it would go? It was barely in an inch or two, while Audrey had put hers in all the way.
"That's your hymen blocking the way," Audrey informed her. "This is where it's going to hurt a bit. You have to push through it, then it won't hurt next time."
Trusting her best friend wouldn't steer her wrong, Dani did as she was instructed, putting more pressure upon the end of her brush to press it into her pussy. At first it was met with a slight stinging pain, then a brief, sharper pain as whatever was blocking the passage within her gave way, and suddenly the whole handle disappeared inside her, surprising her with the sensation of fullness so that she let out a small gasp.
"You alright?" Audrey asked, and Dani nodded, the stinging pain still there, but diminishing by the second. "Great! Now, before you start pumping it in and out like me, why don't you finger your clit a little to get yourself worked back up?"
"Clit?" Dani asked. "Is that what that little nub is in the middle of my pussy?"
"That's the one!" Audrey confirmed, returning to fingering her own clit, as well. The girl must have paused her ministrations while Dani was working her brush handle into her pussy.
Dani began rubbing her clit, as instructed, and enjoyed the sensations it sent through her. She continued to do so for a few minutes, getting used to the feeling of her brush handle buried inside of her. Then she slowly began to pump the handle in and out of herself in the same way Audrey was doing next to her. It somehow added to the pleasure she was feeling. Not directly, like fingering her clit, but more of a background sensation that added to the overall experience. The full feeling it gave her each time she pushed it back in was exquisite. Soon she was lost in the pleasure her ministrations were causing, hips bucking up to meet each thrust of the brush handle into her, and grind against her furiously swirling fingers. Then she felt Audrey's hand cup her right breast and start pinching her nipple and the added pleasure sent her over the top with cascading waves of ecstasy overcoming her. She thrust the brush handle into herself one final time and marveled as she felt her pussy clamp down in spasms around it. When her orgasm finally began to subside, Dani turned to look at her friend with a massive grin on her face.
"Incredible, right?" Audrey asked, and Dani nodded vigorously. Then she had the pleasure of watching her petite friend work herself to a similar orgasm before collapsing in a satisfied heap on her bed. They both extracted their hairbrushes from their sopping pussies and cleaned them off with some wet wipes Audrey kept handy for that purpose. Dani did find a small amount of blood on hers, but thankfully it had not gotten on her friend's blankets.
I never imagined this would be the reason for my first time bleeding from there, Dani thought to herself with amusement. While she had been an early bloomer in the breast department, she still hadn’t had her first period, which was unusual, but not unheard of for a girl her age. The family doctor wanted her to come in and schedule some testing if she didn’t have it by the time she turned fifteen, though. Dani often wondered why it hadn’t happened yet, but Audrey often reminded her that she wished she didn’t have to deal with it every month, making her count her blessings.
"If you want, I can show you how to shave your pussy now," Audrey offered, breaking Dani out of her thoughts. "Did you bring your razor with you?"
"I brought it," Dani confirmed. "And sure, I think I'd like to try it out."
The two of them covered themselves in bath robes and headed to the bathroom where they hopped into the shower together and Audrey showed her how to properly, and carefully, shave her pussy. It was very strange to Dani, feeling that part of her body so smooth. She'd gotten used to the pubic hair, but she figured that keeping it shaved was no different from doing the same with her legs and arm pits; just another area to make sure she kept up on at the same time. She liked the way it felt as she ran her fingers across the bare flesh, and the two of them fingered themselves to another orgasm there in the shower before returning to bed.
"I can't believe you pinched my nipples like that!" Dani said when they had snuggled under the covers together.
"Millie did the same thing to me when she was teaching me," Audrey said. "It shocked me so bad I almost punched her. But it felt ***sooooo*** good, so I have been doing it to myself ever since. I figured I'd see if you liked it, too."
"It made me orgasm, didn't it?"
"Well, it sent you over the edge," Audrey confirmed. "I doubt you would orgasm just from having your nipples pinched alone."
"I sure am grateful that your sister taught you so much about all this," Dani said. "I came over here thinking I would be telling you about something new I had just discovered, and instead you helped me understand it. Thank you for that."
"My pleasure!" Audrey responded, then added, "Quite literally," and the two of them broke into giggles.
They continued to chat as they lay in Audrey's bed until they were both too tired to remain awake, and then cuddled up together with Audrey wrapping her arm around Dani to cup one of her breasts as they drifted off to sleep.
-

@ da0b9bc3:4e30a4a9
2025-02-14 06:26:26
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/885591
-

@ 18e3af1e:1d42e5df
2023-08-13 02:40:19
Las comunidades son creadas mediante el esfuerzo de no solo un individuo, sino al trabajo de docenas; cientos o miles de personas. Mediante la especialización, como especie, logramos entender que: el saber hacer una sola cosa no significa morir de hambre, o no estar bien preparado para un ataque; por lo contrario, el dominio o maestría de una sola cosa... Puede crear una civilización entera.
Permitirnos un enfoque certero para aprender, dominar y amaestrar nuestras actividades en un periodo de tiempo finito, permitió nuestro avance hacia nuevos campos, de hecho, movió nuestra meta en magnitud tal, que al imaginar el pasado (para muchos) parece mas bien una película cómica y sombría.
Hoy en día, en un mundo regido por individualismo en el reino físico, la manifestación de constructores de comunidades sigue presente en el (reino) digital.
### La evolución de la construcción
A lo largo de la historia de la humanidad, la construcción ha evolucionado desde simples refugios hasta monumentos arquitectónicos y estructuras vanguardistas. Los primeros humanos crearon refugios rudimentarios con materiales naturales. Con la civilización, surgieron las primeras estructuras permanentes, como pirámides y templos, reflejando la organización social y creencias religiosas. La antigua Roma introdujo la innovación en la ingeniería con acueductos y arcos.
La Edad Media vio fortificaciones y catedrales góticas que fusionaban espiritualidad y técnica. El Renacimiento abrazó la proporción y la simetría en palacios y edificios renombrados. La Revolución Industrial marcó un cambio radical con el acero y el hormigón, permitiendo rascacielos y puentes icónicos.
El siglo XX trajo consigo la era de los rascacielos y la arquitectura modernista, desafiando límites estructurales y estéticos. La sostenibilidad ganó importancia en el siglo XXI, impulsando la incorporación de tecnologías avanzadas, como la impresión 3D y la construcción modular.
La historia de la construcción es un testimonio de la creatividad y la adaptabilidad humanas, reflejando no solo avances técnicos, sino también valores culturales y aspiraciones.
En el día hoy, los desarrolladores de software y tecnología podrían considerarse como los constructores del próximo siglo. Al igual que los constructores en otras épocas históricas, los desarrolladores de software son responsables de crear estructuras digitales que moldean la forma en que interactuamos, comunicamos y vivimos en el mundo moderno.
A medida que la tecnología continúa avanzando y la sociedad se vuelve cada vez más digital, el papel de los desarrolladores de software se vuelve crucial en la construcción de soluciones tecnológicas que abordan una amplia gama de desafíos.
Así como los arquitectos y constructores antiguos debían entender la física, la estética y las necesidades humanas para diseñar y construir edificios funcionales y atractivos, los desarrolladores de software deben comprender la lógica de programación, la experiencia del usuario, la seguridad cibernética y la innovación tecnológica para crear aplicaciones, sistemas y plataformas que sean útiles y efectivos.
### Individuos que inspiran
La inspiración individual es un poderoso motor de cambio que puede tener un impacto significativo en la mente colectiva de una comunidad o sociedad. Cuando una persona demuestra pasión, determinación y una visión positiva, puede influir en otros a nivel emocional y cognitivo. Aquí hay algunas formas en que la inspiración individual afecta a la mente colectiva:
La gente puede verse reflejada en las luchas y logros de alguien más, lo que crea un sentido de unidad y comunidad. Esto puede generar un mayor apoyo y solidaridad en torno a ciertas causas o valores. Además, la inspiración individual puede llevar a la acción. Cuando las personas son testigos de un individuo que supera obstáculos o logra metas desafiantes, esto puede motivar a otros a enfrentar sus propios desafíos y trabajar hacia sus objetivos. El ejemplo de una sola persona puede encender la chispa de la acción en muchas más.
La inspiración individual puede tener un efecto multiplicador. Cuando una persona inspirada comparte su historia o experiencia, puede inspirar a otros, creando una cadena de influencia que se extiende a través de redes sociales, comunidades y sociedades enteras. Esto puede tener un impacto a gran escala en la mente colectiva.
El individuo inspirador tiene el potencial de influir profundamente en la mente colectiva al cambiar percepciones, motivar la acción y crear una sensación de comunidad y unidad.
### Comunidades: origen, inicios y progreso.
Las comunidades han sido una parte fundamental de la experiencia humana a lo largo de la historia. Desde los primeros tiempos hasta la era moderna, las comunidades han evolucionado y cambiado en respuesta a las necesidades, avances tecnológicos y contextos culturales.
Desde los primeros días de la humanidad, nuestros antepasados se agruparon en pequeñas comunidades para sobrevivir. Estas comunidades eran grupos familiares o tribus que compartían recursos y conocimientos para cazar, recolectar alimentos y protegerse de los peligros. La cooperación y la solidaridad eran esenciales para la supervivencia.
Con el desarrollo de la agricultura, las comunidades evolucionaron hacia asentamientos más permanentes. La capacidad de cultivar alimentos permitió la formación de aldeas y pueblos, donde la gente podía establecerse y construir relaciones más complejas. Esto llevó al surgimiento de una división del trabajo más especializada y al desarrollo de habilidades artesanales.
Las civilizaciones antiguas, como la sumeria, egipcia, griega y romana, dieron paso a la formación de ciudades y sociedades más organizadas. Las comunidades se convirtieron en centros de comercio, gobierno y cultura. Se construyeron estructuras monumentales, como templos y palacios, que unificaron a las personas en torno a creencias religiosas y sistemas políticos.
Durante la Edad Media, las comunidades se organizaron en torno a sistemas feudales. Los señores feudales gobernaban sobre las tierras y las personas locales. Las aldeas y feudos eran autónomos en gran medida y se centraban en la agricultura y la autosuficiencia.
La Revolución Industrial marcó un cambio importante en la estructura de las comunidades. La industrialización dio lugar a la urbanización, con muchas personas dejando las zonas rurales para trabajar en fábricas en las ciudades.
En la era moderna, las comunidades han continuado evolucionando con avances tecnológicos y la globalización. Las redes sociales y las comunicaciones digitales han conectado a personas de todo el mundo, creando comunidades virtuales en línea.
### Bitcoin | Nostr y la chispa del constructor
Como ya vimos, un solo individuo puede inspirar a muchos otros, teniendo un efecto multiplicador. Esto no solo se traduce al mundo físico, por el contrario, esta directamente ligado a nuestra psicología, incluso podemos decir que va aun mas allá, adentrándonos en el terreno ideológico y espiritual.
Hasta hace no mucho, estábamos a merced de las grandes corporaciones que construían todo por nosotros, mientras esperábamos con ansias las nuevas actualizaciones de cada iteración de sus productos. Cada vez mas y mas nos hacíamos dependientes de dichas corporaciones sin quizás notarlo, poco a poco se fueron apoderando de nuestro tiempo y muy insidiosamente de nuestra personalidad e identidad.
Gracias a las alternativas presentadas hoy en día y a los individuos que inspiran a otros, existe la posibilidad de construir algo que va mas allá de las grandes corporaciones, porque transciende no solo el nivel físico y digital, sino que también transciende a los individuos que aportan a la comunidad. Estoy hablando por supuesto de Nostr, y como los incentivos están alineados gracias a Bitcoin.
Pongamos como ejemplo un par de nombres para ilustrar como individuos que inspirar pueden crear una chispa que se extiende a cada persona dentro de la comunidad.
Personajes como nostr:npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft nostr:npub1utx00neqgqln72j22kej3ux7803c2k986henvvha4thuwfkper4s7r50e8 nostr:npub1v0lxxxxutpvrelsksy8cdhgfux9l6a42hsj2qzquu2zk7vc9qnkszrqj49 nostr:npub107jk7htfv243u0x5ynn43scq9wrxtaasmrwwa8lfu2ydwag6cx2quqncxg (entre muchos otros que podría mencionar pero todo el articulo seria una lista de nombres) han inspirado a otros desarrolladores, creadores de contenido (y todas las otras especializaciones que te puedas imaginar…) A construir sobre este protocolo. Incluso, personas como el caso mas reciente de nostr:npub1m64hnkh6rs47fd9x6wk2zdtmdj4qkazt734d22d94ery9zzhne5qw9uaks han encontrado inspiración para aprender a programar sobre estos mismos rieles.
> nostr:nevent1qqs8fe938k7j5sxcprrv89ezpu09m9pzm90f0sq24hnwlwu0rmn09qcpzemhxue69uhhyetvv9ujumn0wd68ytnzv9hxg5vtygh
La chispa del constructor en palabras mas concisas es: **Inspiración multiplicadora en pos de la productividad y por ende, del crecimiento de una comunidad.**
Sin Bitcoin y Lightning Network, esto seria posible, pero mucho menos efectivo debido a que las personas detrás de toda labor que este enfocada en creación de contenido, desarrollo, etc. Tienen que comer.
### Conclusión
La chispa del constructor radica en la inspiración individual que impulsa a la acción colectiva. Desde la evolución de la construcción hasta las comunidades digitales, **el poder de un individuo inspirado puede moldear el presente y el futuro de las comunidades en todo el mundo.**
-

@ ec42c765:328c0600
2025-02-05 23:45:09
test
test
-

@ 9e5a3a1a:ed414e8d
2025-02-02 00:50:08
Either the phone’s battery went bad and quit charging, or the cable was shit. The warm rain running down the screen made the phone’s UI, flicker back and forth, as Ethan turned the screen on again to check how much battery he had left. Not a lot: 4%. At least the thing was water-proof, he thought. Today was also shit. First his parents confiscated he car keys after finding booze in his closet, now the fucking charging cable went bad. (Hopefully it’s the charging cable and not the battery), he thought. A car drove by splashing him with a fan of muddy water.
“Hey!” he yelled, but the red tail lights were too far away now for the driver to hear. “Fucking fuck!” he swore looking down at himself. It was too dark to see how dirty his shirt and pants were now. The light of the gas station still far away. (Oh, well), he thought and continued walking, wet gravel and sand of road’s shoulder making wet crunching noises underfoot.
Ethan’s thumb moved on the phone to turn the flashlight on, but he stopped himself. There was almost no chance that Casey’s gas station won’t have USB cables, they always did, but with today's luck they might just be out. Then he’d be screwed without a phone for the rest of the night and all day at school tomorrow. It wouldn’t be the end of the world, but he was too irate after everything today to accept not having a phone right now.
A pale form moved to his right a few yards away. He turned and saw a figure standing by the trees. Ethan stopped and squinted through the rain. A cold, creepy feeling suddenly gripped him.
It stood there and watched him. A female form, he realized, tall and pale, with black hair longer that he’s ever seen. Something was off. The face… It’s head… The mouth grinned widely, forming a dome above the eyes, eyes that were down close to the neck, under the nose, mouth and chin up above them. (It’s fucking head is upside down..) he realized.
Ethan’s thumb pressed the phone’s power button, battery be damned. He aimed it at the figure, brought up the camera app and pressed the button to take the picture. Just as the shutter sound clicked the face was suddenly full-screen, as if a few feet away from him.
Ethan gasped and the phone tumbled onto the ground. There was a moment of relief when he realized that the figure was still far away and didn’t suddenly teleport right in front of him, but then something long, black, and wide, like a cross between a ribbon and an anaconda flicked itself toward him and the last thing he felt was a thick spiderweb of hair wrapping itself around him and pulling him forward.
***
“Hey, Riley, when did your dad say you needed to be back home?” Alex’s mom yelled from downstairs. The two girls glanced at their phones to see the time.
“Eleven!” Riley yelled back. They still had half an hour of “study” time. The two really did mean to study for the calculus exam, but ended up chatting the whole evening.
“Oh shit! I got to show you something,” Riley said, turning on her phone’s screen again, “You know that ‘Grin Reaper’ thing on social media?” She scrolled through her phone’s picture gallery.
“Like, that smiling ‘monster’ with upside down head?” Alex asked.
“Yeah, the one they said kidnapped those kids”
“That’s so fake!”
“Yeah, but look!” Riley turned her screen towards her friend.
Alex took the phone from her, “What’s this?”
“It’s her! Caleb was driving me to the movies and I saw her out the window. You know where Casey’s gas station is on Maple av? There’s like a wooded area just past it when you’re driving downtown.”
“It’s just some blurry figure. Probably some homeless person… What’s that?” Alex heard some kind of scratching at the window. She walked over to look. They were on the second floor, but there were no trees close enough to scratch against the window. She opened it and look outside. No one. Just a vine attached to the wall of the house outside. Or was it a vine? Along, curly splotch of dark. Alex frowned.
“No, I saw her, for real for real. It’s looks bad on the photo because it was dark and we were moving, but her head was on upside down and grinning.” Riley insisted.
(Is it ivy?) Alex thought, only half listening to Riley, (Since when do we have ivy on the house?)
Riley wondered if she should tell Alex that when she snapped the photo it looked like the woman’s grinning, upside down face was up close suddenly, right up against the car window. Caleb almost veered off the road turning to see what was wrong when she gasped and dropped the phone. When she fished her phone from beneath the seat, the photo looked normal. Blurry but normal.
(Maybe a mud splash) Alex thought, examining the black, vine-like shadow that stuck to the house aiming at the window. (Some asshole splashed mud on the house as a prank. Someone from school?)
“You think I should post it to TikTok?” Riley asked, looking pensively at the photo.
The question brought Alex’s attention back to her. She walked back over and sat on the other side of her friend, taking the phone from her hand and looking closer at the photo. “It’s dark,” Alex rolled her eyes, “Also, some troll could have just been wearing a mask trying to scare people. That shit’s all over social media.”
“I guess…” Riley decided against telling her more. She didn’t want to sound weird.
Just then, Alex heard her phone ding somewhere behind her. She looked back to find it when she heard a choking noise from where Riley sat, “You ok?” she asked looking back and froze, not quite sure what she was seeing. Riley’s eyes were wide, her hands at her throat tugging at something black, like a scarf wrapping around her neck. More dark, tentacle-like locks reached in towards them through the window. It looked like hair, but it moved as if through water, snaking itself forward and wrapping around Riley’s arms, neck and face. Before Alex could utter a sound or register what she saw, the hair straightened, pulled back, yanking Riley out through the window.
***
Alex sits on her bed in shock, glancing back at the window every thirty seconds. She tries to resist getting up and walking over to it. It's weird feeling of being pulled towards it to make sure it’s locked and being afraid to approach it for fear of what she might see outside. What if she sees it again? It’s tentacle-like locks crawling up the house, surrounding her window ready to snatch her like it did her friend. Can it seep through the cracks and unlock the fragile latch? She feels herself standing up and walking over to the window briskly, her hands smooth over the window latch, making sure it’s still locked, her eyes darting back and forth outside. Nothing. The dark splat on the house Alex first mistook for ivy or mud is gone, too.
She sits back on the bed. Alex can hear her parents arguing downstairs. They think she's using drugs. They searched through her room the day after Riley was taken. They yelled at her that night, them and Riley’s dad, all convinced that the girls were high and Riley wondered off somewhere. Alex knew they would not believe what really happened. But lying wouldn’t help anyone find her friend. She lets think it was all a drug-induced hallucination.
(Maybe I’m crazy,) Alex thinks. Her mind searches for mentions of schizophrenia among any of her relatives. Isn’t that shit genetic?
A chill goes through her body again, suddenly. A scratching at the window? Like the one she heard before Riley was taken? “It’s not real,” she whispers out loud. It’s not real. She keeps thinking she hears it almost as often as she walks over to check the latch on the window. “It’s not real….” She has to check.
Pushing through the fear, Alex briskly walks over to the window again. Nothing it the trees out back across the lawn. She can’t see the outside of the house without opening the window but she can’t risk it. “It wasn’t real” she affirms again. Then she has an idea.
The parents’ arguing grows louder as Alex quietly opens her bedroom door and tiptoes down the stairs toward her mom’s office, trying to avoid attracting their attention. They are still pissed, she doesn't want to deal with them. She looks for scotch tape, quickly founds it, grabs a stack of paper from the printer and goes back upstairs.
If she blocks out the window, it can’t see her, even if it is lurking somewhere outside waiting to snatch her, Alex thinks as she starts to cover the glass with paper and tape. She feels better now, suddenly. It feels like she was doing something to protect herself, even if it involves being near the window and risking seeing that thing.
As the final page of printer paper is about to go up to block the glass completely, Alex freezes. A figure stands on the grass in front of the trees. In panic, Alex tries to decipher the face in the dark. The head, it is right side up. Not grinning, no hair tentacles: not the monster. With a wave of relief, she looks closer, trying to figure out who it is, and a surge of adrenaline and excitement suddenly hits her, (It's Riley!)
“Ril--,” she almost screams, fumbling with the latch. As she pulls the window up and looks back out again, the figure is gone, “Riley!” she yells into the night. No answer. Alex pulls the window closed and runs for the door, briefly coming back to latching again, just in case.
“She’s out there! Outside.” Alex almost yells as she barged into the living groom, pointing towards the back door.
“Where? Outside?” her mom says then quickly goes to the door, dad and Alex following her. In the yard they yell Riley’s name, scanning the grass hill beyond and the tree line behind it.
“Are you sure you saw her?” her dad asks.
“Yeah, it was her, for sure.”
“Are you high again?” her mom turns to her with an annoyed grimace on her face.
“I’m not fucking high, mom!”
“Don’t you talk to me this way! Get back to your room.” her mom yells.
“I’m not fucking high, mom! I saw her.”
Mom isn’t listening, she turns to dad “We should call her parents. She could really be out there,” then to Alex, “Upstairs NOW!”
Pissed, Alex walks back into the house. It feels good to be angry, anger is better than fear. She runs up the stairs and tares down the paper she had just put up on the glass. She leans against the window and scans the tree line up in the distance.
A few hour pass. Alex still gets up from time to time to check the window, but this time she is looking for Riley rather than checking the lock. Her parents have finally quieted down downstairs. It's late. They are probably asleep by now.
Alex considers going to bed herself, but she knows she wouldn't be able to sleep. She looks back out the window.
"Riley!" Her friend is there again, closer this time. Alex opens her mouth to call to her, but stops as she saw Riley raise her finger to her lips, gesturing for her to be quiet. Alex frowns, “What the fuck are you doing?” she mouths, shrugging dramatically.
Riley motions for her to come out then puts her finger to her lips again. What is she doing?
Alex thinks about waking her parents, but decides against it. They’ll just be useless and tell her to go to her room again. She quietly creeps downstairs and sneaks out the door.
She half-expects Riley to be gone again as she walks out of the house and looks out to the hillside, but Riley is still there. Further back, almost past the tree-line. She motions Alex to come closer and takes a few steps back, disappearing in the trees.
“Fuck!” Alex swears, looks back at the house one last time, then takes off across the yard after her.
***
Past the tree line in the woods, Alex crunches through the trees, lighting her way (poorly) with her phone’s flashlight. Thorns scratch her arms and legs as she walks as fast as she can, navigating among the trees, yelling Riley’s name. From time to time she can see Riley's figure moving away from her, weaving among the trees. Her friend moves effortlessly, as if gliding above the ground, unimpeded by the greenery.
Alex trips. She catches herself before she tumbles to the ground. For a second it is pitch black. She bends down to look for her phone. It is a glowing outline among the plants. Alex grabs it and gets up. For a moment she’s disoriented, not sure which way she was going. She looks and listens for her friend but sees and hears nothing. She looks back. There’s a bit of light glittering through the trees back where her neighborhood is. She looks forward and yells Riley’s name again, moving her phone trying to catch a glimpse of her friend’s figure. Nothing. Should she go back? Is Riley playing some stupid game? Maybe she is high.
Without a second though, Alex continues forward, “Riley, it’s not funny! What the fuck are you doing?” Alex can see pale gray light between the leaves and the branches up ahead. She quickens her pace, almost tripping again.
Alex walks into what looks like a small clearing. The trees are further away up ahead, but not much moon-light is coming from up above. She looks up towards the wide canopy, forming a dome overhead. Her eyes suddenly focus on a humanoid shape hanging parallel to the ground from the branches above. Its face is white, torn in two by a wide smile that almost reaches its ears. The top of the head is attached to the neck. Bands of hair suspend it from branches above.
Alex freezes. For a second she feels herself cease to exist except for her breath that moves rhythmically in and out. Moments pass. How long, she can’t tell. (Run!), the thought echoes through her head, and she almost moves to obey but stops herself. To run is to turn her back on that thing. What if that’s when it grabs her. She stays still and so does the figure.
The thing blinks and its grin becomes wider. It sways back and forth, its prehensile locks making branches creak overhead. Alex’s chest and throat grows hot and and she gathers herself. She throws herself to the side, tripping yet carrying herself forward through the snapping bush branches. With sudden agility, she rights herself and runs back into the woods. Tree trunks fly at her as she runs trying not to trip on the uneven ground. She bursts into another clearing and looks back swinging her phone to light the trees behind her to look if that thing is following her. Then her vision turns off.
She feels leaves and dirt against her face, a small pointy stick poking her in her right cheek. There’s a pressure on the side of her head and her hand moves there trying to feel what’s pushing against her. There’s nothing. The side of her head is numb. Memory of where she is and why rushes back into her and she pushes herself up with a jerk. When her vision comes back online she can only see a mosaic of black and gray forms, bushy undergrowth letting in pale light ahead of her. There is a glow coming from her left. She turns and her eyes focus quickly on phone, flashlight still on, its light flooding her vision. Alex grabs it and points it forward then all around, trying to see if she’s alone or if that thing is hiding somewhere near. She doesn’t see anyone. Only trees and quick shadows jumping away from the light as he moves it.
She’s in a sort of a clearing again, except for a large tree trunk close to her. Alex reaches for the numb spot on her head and feels that it’s wet and sticky. It’s blood. She must have ran into that tree when she looked back trying to see if that monster followed her. Alex shines the light around her again. No sign of that thing. It could be hiding in the trees just out of sight. Or… her blood runs cold. She slowly looks up, remembering where she saw that thing first.
For a second, all she can see is branches and flowing, black vines like spider webs snaking through the canopy, then her eyes discern three small, slender figures hanging like poppets from these “vines”. Children. Two smaller ones and one teenager her size. The teenager, Riley, stares at with a blank expression on her face. Then her body moves, or is moved by the tentacle “vines” holding her up. Hair, Alex realizes. He is held by the hair, not wrapped around her like back in the bedroom before Riley was pulled through the window, but growing into her flesh from behind, like thousands tiny marionette strings bunched up in locks. The hair brings Rile's hand up to her side and waves it back and forth, as if in a mocking greeting gesture.
Alex tenses. At any moment, she feels, the figures can leap at her, grab her. But, no, they stay suspended. Then, between them, higher up in the branches the hair moves, like slithering snakes or tentacles moving across each other. A fourth figure is slowly lowering itself from above. The Grin Reaper. Smiling lady with an upside down head. It stops shortly after reaching the same level as the three bodies hanging by its hair. It stares at her, the grin seemingly growing wider and wider without really changing size.
“It’s not real?” Alex, whispers to herself. They aren’t moving any closer, neither the woman nor the bodies suspended by her air. Alex’s hand tightens around her phone. (Phone can’t hallucinate) she thinks to herself. Maybe now they will believe her. She aims her phone right at the woman, her figure, looming above her, looks small on the screen. With a practiced gesture her thumb touches the camera button. As the phone snaps the photo, the screen refreshes showing the things face close up, filling the frame of the phone, as if jumping out at Alex. The girl squeaks, dropping the phone. It lands light up, still illuminating the four figures far above her, as if the woman hasn’t moved despite what the photo showed. Slowly, like a coiling snake, a tentacle-like lock of hair moves up in front of the the woman, pointing at Alex like pulled-back tongue. Then, in a flash, it flies toward her her and Alex’s vision goes black.
#story #shortstory #creepypasta #horror #fiction #writing #nostr
-

@ da18e986:3a0d9851
2025-02-14 06:00:27
I'm excited to share the first phase of DVMDash's major redesign! After some recent downtime issues (thanks nostr:npub1e5tfhk8m65teu25dfx8lcvwn4c8ypqjl72u2sh4rt8zy2kss0j5qct7mh9 and nostr:npub1jlrs53pkdfjnts29kveljul2sm0actt6n8dxrrzqcersttvcuv3qdjynqn for the heads up), I've been working on rebuilding DVMDash from the ground up to be more modular, scalable, and reliable.
## What's Live Now: The Stats App
The first piece of the new DVMDash is our completely rebuilt Stats app. Instead of trying to do everything at once, we're now breaking DVMDash into focused tools. The Stats app brings:
- Flexible time windows (1h, 24h, 7d, 30d) for more relevant insights
- Bar graphs showing activity over time
- Per-DVM and per-Kind detailed metrics
For those interested in the new backend architecture, check out my [recent post about performance gains](nostr:naddr1qvzqqqr4gupzpkscaxrqqs8nhaynsahuz6c6jy4wtfhkl2x4zkwrmc4cyvaqmxz3qqxnzdenxu6nwd3sxgmryv3506t7ws) describing how horizontal scaling is needed to support the growing DVM ecosystem.
## Coming Soon: Debug Tools and Playground
You'll notice on the new [landing page](https://dvmdash.live) that DVMDash is now split into three main tools:
1. Stats (available now!)
2. Debug Tools (coming soon)
3. Data Vending Playground (coming soon)
The Debug Tools will bring back the interactive graph-based debugger and event browser, while the Playground will offer a space to experiment with DVMs directly. I'm focusing on getting these right rather than rushing them out.
## Running Locally
Want to try it out? You can clone the repository and run the Stats app locally with a simple
```
docker compose --profile all up
```
then visit **localhost:3000** in your browser.
## What's Next
My immediate focus is on:
1. Polishing the Stats app with new features like:
* Sortable tables for easier data analysis
* Enhanced DVM profiles with pictures and metadata from relays
* More detailed DVM-specific metrics
2. Bringing back the debugging tools
3. Building out the playground
This is very much a work in progress, and I appreciate your patience as we rebuild. If you run into any issues or have suggestions, please drop by our GitHub repository.
-

@ ec42c765:328c0600
2025-02-05 23:43:35
test
-

@ b17fccdf:b7211155
2025-02-01 18:41:27
#### **Next new resources about the MiniBolt guide have been released**:
---
* 🆕 **Roadmap**: [LINK](https://github.com/orgs/minibolt-guide/projects/1)
* 🆕 **Dynamic Network map**: [LINK](https://app.diagrams.net/?tags={}&lightbox=1&target=blank&highlight=0000ff&edit=_blank&layers=1&nav=1&title=networkmap.drawio.png#Uhttps://raw.githubusercontent.com/minibolt-guide/minibolt/main/resources/networkmap.drawio.png)
* 🆕 **Nostr community**: [LINK](https://habla.news/c/[n]addr1qqyy66twd9px7mr5qyf8wumn8ghj7mmxve3ksctfdch8qatzqgstzl7vmurm5gu87qutx3pxwgxddrg39huj809zhmv03scfkus3z4grqsqqpphk2j0aff) < ~ REMOVE the "[]" symbols from the URL (naddr...) to access
* 🆕 **Linktr FOSS** (UC) by [Gzuuus](nostr:npub1gzuushllat7pet0ccv9yuhygvc8ldeyhrgxuwg744dn5khnpk3gs3ea5ds): [LINK](https://linktr.minibolt.info)
* 🆕 **Donate webpage**: 🚾 [Clearnet LINK](https://donate.minibolt.info) || 🧅 [Onion LINK](http://3iqm7nidexns5p6wmgc23ibgiscm6rge7hwyeziviwgav4fl7xui4mqd.onion/apps/Li3AtEGDsqNmNddv6rX69taidm3/pos)
* 🆕 **Contact email**: [hello@minibolt.info](mailto:hello@minibolt.info)
---
Enjoy it MiniBolter! 💙
-

@ 0271e1b9:ad8cff90
2025-02-01 07:39:31
**I study the greats.**
For if and when I find myself beaten down into the gutters of life - the vile, bile and the mundane - I shall draw strength from other great men - past, present and future - who, quite often, faced many more adversities and a lot more suffering, but chose to use them to their advantage, to overcome their dire circumstances and rise above the afflictions that life had bestowed upon them. It’s all been done before. It can be done again, better.
Learning from the past and from the present is very straightforward. Anyone can do that. But how does one learn from the future? It’s simple: you envision the best possible future for humanity, for generations to come, and for yourself. Then you figure out an approximate path on how to get there, and what kind of a man or a woman you must be to walk that path. The skills, the mindset, the qualities. And lastly, but perhaps most importantly, you find actionable measures, habits, convictions on how to become that person - and conversely, what are stopping you from becoming that person.
> “You must value learning above everything else.”
― Robert Greene
> “Those who have a 'why' to live, can bear with almost any 'how'.”
― Viktor E. Frankl
> “You need to look at all events as having value. If you can do that, then you’re in a zone of tremendous opportunity.”
― Phil Stutz
> “I shall take the more pains to uncover the fountains of philosophy, from which all my eloquence has taken its rise.”
― Marcus Tullius Cicero
> “Error correction is the basis of all intelligence.”
― Jeff Booth
> “Yes, you’re likely to fail, that’s fine. Because the goal of playing is not to win, but to keep learning. And the day you stop learning is the day you stop living."
― Jesse Enkamp
> "A man is great not because he hasn't failed; a man is great because failure hasn't stopped him."
— Confucius
> “If people knew how hard I had to work to gain my mastery, it would not seem so wonderful at all.”
― Michelangelo
> “First of all we have to decide what we are to do and what manner of men we wish to be - the most difficult problem in the world.”
― Marcus Tullius Cicero
> “You either bleed soul into your work, or let the work bleed out your soul.”
― Pran Yoganthan
> "The Stoic philosopher is the man who has liberated himself from fear. He’s not afraid of death, he’s not afraid of pain, he’s not afraid of other people’s dismissal as a fool. The only thing he cares about is that he should meet his moral obligations.”
― Michael Sugrue
> "The strong do what they can and the weak suffer what they must."
― Thucydides
> “The brain is the most powerful weapon in the world.”
― David Goggins
> “Man, the bravest of animals, and the one most accustomed to suffering, does not repudiate suffering as such; he desires it, he even seeks it out, provided he is shown a meaning for it, a purpose of suffering. The meaninglessness of suffering, not suffering itself, was the curse that lay over mankind so far.”
― Friedrich Nietzsche
> "Consciousness is awareness with a choice."
― Thomas Campbell
> “The essence of philosophy is that a man should so live that his happiness shall depend as little as possible on external things.”
― Epictetus
> “It’s most real, it’s most good and it’s most salvific - it saves you, it transforms you. That’s the sacred.”
— John Vervaeke
> “It is impossible for a man to learn what he thinks he already knows.”
― Epictetus
> “Evolution is a process of iteration. There’s no master plan. It’s in each moment of what happens.”
― Michael Behrens
> “Don’t follow anybody and don’t accept anyone as a teacher, except when you become your own teacher and disciple.”
― Jiddu Krishnamurti
> “This is your life. You’re accountable. What are you gonna do about that?”
― James Hollis
By the way, if you enjoyed these quotes, feel free to follow a little side project of mine: [Stoic Resurrection](https://linktr.ee/stoic_resurrection)
*Peace & Love,*
*[Kontext](https://linktr.ee/mckontext)*
*Block height 881,748*
-

@ 57d1a264:69f1fee1
2025-02-14 05:45:37

### a practical intro to contributing to FOSS for product people, and other non-devs
So you want to contribute to FOSS, but don’t know where to start. There are many paths to FOSS, but you must find your own. Here’s some advice based on personal experience to help you get started.
### 0\. Find your motivation
FOSS requires a lot of giving, and better aligns with those that are missionaries, as opposed to the mercenaries. Perhaps you are unfulfilled in your fiat job, maybe you are currently unemployed, or perhaps you are excited about a particular bitcoin project. Why you’re exploring contributing to FOSS, is a question that only you can answer.
 Are you a missionary?
### 1\. Discover what excites you
So you’ve found motivation and have a list of various FOSS projects you could contribute to. This is the equivalent of the “I need a job” stage and you’re figuring out where to apply. It’s time to narrow it down.
What are you excited about? A multi-year pilgrimage of learning how to contribute to Bitcoin Core? A lightning wallet, perhaps? Free speech Nostr? A hardware signing device? Or maybe finding a FOSS projects that is not “Bitcoin” in name, but happens to support Bitcoin, and Lightning.
A great first step is to take some time and explore the Bitcoin Design Community ([https://bitcoin.design/](https://bitcoin.design/)) to discover FOSS projects.
 Are you excited anon?
### 2\. Identify the skills you have or want to develop
Chances are that if you follow the Bitcoin Product Community, you’re skills are in Product Management, Product Marketing, and/or Project Management. But contributing to a bitcoin project requires contributors with skills of many backgrounds such as marketing, documentation, community building, and more.
What’s important to know is that most FOSS teams start with a motivated developer, who then may attract other devs. But many of them may not advertise that they need non-developer help such as a PM.
Therein lies the opportunity for you as an eager bitcoin contributor. See what the needs of a project are and see if you can fill in those gaps with your skills. It may be as simple as coordinating meetings for the team. But doing the “dirty work”, or the work no one else wants to do, is exactly the way you can make an immediate impact to a FOSS project. In fact, this is why members of the Bitcoin Product Community affectionately refer to product managers as “[janitors](https://medium.com/all-things-product-management/product-manager-you-are-664d83ee702e)”!
### 3\. Make a list of projects
Now that you have narrowed down your FOSS search, it is time to start building a list of, and evaluating various FOSS products. Some questions you can ask yourself:
Is the project active? Is it a new project? How many team members are there? How many are devs? Is there already a PM? Is there a need for multiple PMs? Is there designer participation? What is the pace of development? Is there enough development activity for this to satisfy your want to contribute? Is there opportunity for a PM?
Github is the defacto standard for FOSS products. Check the activity. Read up on issues. See who is contributing PRs, and creating issues. Check if there is a Github Project instance.
It’s OK, and best for you to check out out multiple FOSS projects concurrently to see which team is the best fit for both parties.
### 4\. Use the thing(s)!
Another thing you can do to help you choose a project is to use the thing! Download the OS. Run the software. Use it.
As you’re interacting with the product, some things you can ask yourself are:
What do you love about the product? What can be improved? Are there bugs?
Jot down your notes. Take screenshots. Do screen recordings. Document your experience. Create a video onboarding walkthrough, or a feature tutorial. What you are actually doing is documentation and this will be useful for the project, even if you don’t decide to actively contribute.
As you use the thing, take note of how you’re reacting to it. Are you getting more or less excited? Are you more or less confident in contributing to the project?
### 5\. Find out where the team works
Another factor to consider is to figure out where the team works.
By now you have already explored their github to collect your FOSS intelligence. Now check nostr, twitter, telegram, or whatever other comms tools the team might be using. Some teams may have calls, and call recordings. Consider listening in to a recording, and/or joining a call to check the team dynamics.
As you do, assess whether you might be a good culture fit. Also see where there might be some gaps in their workflow that you can help improve.
### 6\. Start small
Once you found a project that interests and excites you enough. It’s time to roll up your sleeves and get involved by starting small.
One easy place to start is to go through the github issues list. Some examples of issues in dev heavy teams are e extremely technical bug reports. For FOSS products with an active user base, there might be “customer” centric feature requests.
Start by logging the bug(s) you found. Examine issues, and fill in the blanks if there are unclearly defined reports & requests.
You don’t have to ask for permission to contribute. That said, evaluate team dynamics and who owns what role so you are not stepping on anyone’s toes. You are there to help.
Also take note of how your help is received. It may take time for you to build up your credibility. Don’t throw in the towel on the first week. Keep finding ways to add value.
### 7\. Show up consistently
Keep contributing in small things day in and day out. As you do so, communicate with the team to ramp up your learning, and also start building rapport, and your reputation. You may not have time or opportunity to contribute full-time. With the state of asynchronous communication tools in 2023, you can flexibly contribute when you have time. An exception to the asynchronous communication may be team meetings.
As you continue to show up consistently, you will build up your FOSS proof-of-work, and reputation. This will show FOSS devs, and contributors that you bring value.
### 8\. Find and meet the “customer”
Find, and interact with the project’s users a.k.a “customers”. What do they care about? What are their pain points? What needs are customers using the product for? Become the “voice of the customer” to the dev heavy team.
Is there a conference where your team is presenting, and customers present? These are invaluable opportunities to observe the customer’s behavior, and also to help answer questions, and troubleshoot on the spot.
### 9\. Increase your involvement
After some time starting small and working on bugs, you may eventually find yourself submitting feature requests. Maybe there is an opportunity to create user flows, or mockups. As you consistently contribute, continue seeking more responsibility.
Maybe you offer to facilitate and lead the next team call. Maybe you try creating a roadmap and backlog from scratch. Maybe you host a product & design thinking session. Maybe you will level up and learn how to check out a dev’s PR in a yet-to-released branch.
No matter what you do, be sure to always bring value to the project.
 Testing an unreleased Damus branch checked out on XCode
### 10\. Prune, Commit, Repeat
Congratulations! By now you’ve been doing a “trial run” with several projects. It’s time to focus and choose one(s) that you can commit to.
As you contribute to the project on an ongoing basis, continuously reevaluate if there is opportunity for you to increase your contributions. If you feel that you’ve maxed that out, it may be time to look for a different FOSS product to contribute to. Perhaps a complementary product to your initial one.
As you embark on this journey, it can be exhilarating at times and in other times thankless. To find a community of peers, and perhaps a mentor check in with the Bitcoin Product Community [Discord](https://discord.gg/Ztvwn8fycA), and introduce yourself. The beauty of open source is people are willing to help FOSS products, and to answer your questions.
[https://youtu.be/ZUgQPR6ecuo](https://youtu.be/ZUgQPR6ecuo)“FOSS is the way” - Rockstar dev, @ Advancing Bitcoin Conference London 2023. The author thanks Rockstar for inspiration, and guidance through my FOSS journey.
As you continue to sweep the FOSS floors with your product [mop](https://medium.com/all-things-product-management/product-manager-you-are-664d83ee702e), remember that you are contributing to the mission that you believe in. You are working in the open, with even less authority than a PM at a company might have, and as a result leveling up. You build up your reputation in FOSS, and you show others your capabilities in the FOSS world (and also prospective employers, and co-founders) by doing.
Hopefully this helps you get started. Reach out to [elsat on nostr](https://njump.me/npub1zafcms4xya5ap9zr7xxr0jlrtrattwlesytn2s42030lzu0dwlzqpd26k5) if you have questions about the FOSS journey, and join the Bitcoin Product Community Discord.
Posted on @YakiHonne by @elsat
Source: https://yakihonne.com/article/nevent1qqswn2mdwcfscsvv8cfc8scmcfpy0urnf0xgh0dxrvav583y85mkryspz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzq96n3hp2vfmf6z2y8uvvxl97xk86kkalnqghx4p25lzl79c76a7yjfa8zs
originally posted at https://stacker.news/items/885573
-

@ 000002de:c05780a7
2025-02-01 05:23:37

originally posted at https://stacker.news/items/872035
-

@ 57d1a264:69f1fee1
2025-02-14 05:35:18
Volt Wallet is designed to make Bitcoin and Lightning transactions simple, secure, and accessible for users of all experience levels. With the increasing popularity of the Lightning Network, Volt Wallet provides an easy, user-friendly interface for sending and receiving payments while also incorporating educational elements, such as quizzes and tutorial videos, to promote a better understanding of Bitcoin and Lightning payments.



















- - -
Source: https://www.behance.net/gallery/217868517/Volt-A-Bitcoin-Lighting-Wallet-for-beginners
originally posted at https://stacker.news/items/885569
-

@ d360efec:14907b5f
2025-02-14 05:35:13
**ภาพรวม LUNCUSDT (OKX):**
LUNCUSDT กำลังอยู่ในช่วงที่ผันผวนและมีความไม่แน่นอนสูง หลังจากที่เคยมีสัญญาณบวกของการกลับตัวใน TF Day แต่ตอนนี้ทั้ง 3 Timeframes แสดงให้เห็นถึงแรงขายที่เข้ามา และแนวโน้มเริ่มไม่ชัดเจน
**วิเคราะห์ทีละ Timeframe:**
**(1) TF Day (รายวัน):** [https://www.tradingview.com/x/ulqLh1c9/](https://www.tradingview.com/x/ulqLh1c9/)

* **แนวโน้ม:** เริ่มไม่แน่นอน (จากเดิมที่เป็น Early Uptrend) หลังจากที่ราคาไม่สามารถยืนเหนือ EMA 50/200 ได้
* **SMC:**
* Break of Structure (BOS): มี BOS ทั้งด้านบนและด้านล่าง
* Change of Character (CHoCH): มี CHoCH ด้านบน
* Higher High (HH) & Higher Low (HL): HH ล่าสุดต่ำกว่า High ก่อนหน้า
* **EMA:**
* EMA 50 และ EMA 200 เคยเป็นแนวรับ แต่ตอนนี้ราคากลับลงมาอยู่ใต้เส้น EMA ทั้งสอง
* **Money Flow (LuxAlgo):**
* เริ่มมีแท่งสีแดงยาวขึ้น แสดงถึงแรงขายที่เข้ามา
* **Volume Profile:**
* Volume หนาแน่นบริเวณ 0.00012000 - 0.00014000 (แนวต้าน)
* **แท่งเทียน:**
* แท่งเทียนล่าสุดเป็นสีแดง แสดงถึงแรงขาย
* **แนวรับ:** บริเวณ 0.00006000-0.00007000
* **แนวต้าน:** EMA 50, EMA 200, 0.00014000, 0.00017953
* **สรุป:** แนวโน้มเริ่มไม่แน่นอน, สัญญาณการกลับตัวเริ่มอ่อนแอ, แรงขายเริ่มเข้ามา
**(2) TF4H (4 ชั่วโมง):** [https://www.tradingview.com/x/SLsNzZi2/](https://www.tradingview.com/x/SLsNzZi2/)

* **แนวโน้ม:** ขาลง (Downtrend) หลังจากราคาหลุด EMA 50
* **SMC:**
* Break of Structure (BOS): มี BOS ด้านล่าง
* Change of Character (CHoCH): ไม่ชัดเจน
* Lower Highs (LH) และ Lower Lows (LL)
* **EMA:**
* EMA 50 และ EMA 200 กลายเป็นแนวต้าน
* **Money Flow (LuxAlgo):**
* สีแดงเป็นส่วนใหญ่ แสดงถึงแรงขาย
* **Volume Profile:**
* Volume ค่อนข้างนิ่ง
* **แท่งเทียน:**
* แท่งเทียนล่าสุดเป็นสีแดง แสดงถึงแรงขาย
* **แนวรับ:** บริเวณ 0.00006000-0.00007000
* **แนวต้าน:** EMA 50, EMA 200, บริเวณ High ก่อนหน้า
* **สรุป:** แนวโน้มขาลง, แรงขายมีอิทธิพล
**(3) TF15 (15 นาที):** [https://www.tradingview.com/x/H8QdIEAL/](https://www.tradingview.com/x/H8QdIEAL/)

* **แนวโน้ม:** ขาลง (Downtrend)
* **SMC:**
* Break of Structure (BOS): มี BOS ด้านล่าง
* Change of Character (CHoCH): มีทั้งด้านบนและด้านล่าง
* Lower Highs (LH) และ Lower Lows (LL)
* **EMA:**
* EMA 50 และ EMA 200 เป็นแนวต้าน
* **Money Flow (LuxAlgo):**
* สีแดงเป็นส่วนใหญ่ แสดงถึงแรงขาย
* **Volume:**
* Volume ค่อนข้างเบาบาง
* **แนวรับ:** บริเวณ Low ล่าสุด
* **แนวต้าน:** EMA 50, EMA 200, บริเวณ High ก่อนหน้า
* **สรุป:** แนวโน้มขาลง, แรงขายมีอิทธิพล
**สรุปภาพรวมและกลยุทธ์ (LUNCUSDT):**
* **แนวโน้มหลัก:** เริ่มไม่แน่นอน (TF Day), ขาลง (TF4H, TF15)
* **Money Flow:**
* Day: แรงขายเริ่มเข้ามา
* 4H: แรงขายมีอิทธิพล
* 15m: แรงขายมีอิทธิพล
* **กลยุทธ์:**
1. **Wait & See (ดีที่สุด):** รอความชัดเจน
2. **Short (เสี่ยงสูง):** ถ้าไม่สามารถ Breakout EMA/แนวต้านได้
3. **ไม่แนะนำให้ Buy:** จนกว่าจะมีสัญญาณกลับตัวที่ชัดเจน
**คำแนะนำ:**
* **LUNC มีความเสี่ยงสูงมาก**
* **ความขัดแย้งของ Timeframes:** Day เริ่มไม่แน่นอน, 4H และ 15m เป็นขาลง
* **ถ้าไม่แน่ใจ อย่าเพิ่งเข้าเทรด**
*Disclaimer:** การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-

@ ee7e3590:5602f192
2025-02-01 05:02:15
You’re hitting on the core tension: **unlimited demand for emergency care collides with finite resources**, and pretending otherwise leads to either runaway costs or rationing-by-stealth. Let’s confront this head-on with free-market-aligned solutions that don’t ignore human realities:
---
### **1. Redefine "Emergency Care"**
The U.S. legally mandates ERs to stabilize *anyone*, regardless of ability to pay (EMTALA). This creates moral hazard:
- **Problem**: Hospitals inflate prices on paying patients to offset uncompensated care.
- **Free-Market Fix**:
- **Repeal EMTALA**: Allow ERs to refuse non-critical cases (e.g., toothaches, rashes) unless prepaid or insured.
- **Clarify "True Emergency"**: Legally define emergencies as *immediate life threats* (e.g., strokes, cardiac arrest) and let non-critical cases be diverted to urgent care.
- **Consequence**: ERs could price transparently for true emergencies, while non-critical cases face market-driven urgent care options.
---
### **2. Embrace Tiered Emergency Care**
Not all emergencies require Level I trauma centers:
- **Basic ERs**: Staffed by NPs and paramedics for minor injuries (e.g., sprains, minor burns) at lower costs.
- **Advanced ERs**: For critical care (e.g., gunshot wounds), priced higher but competing via outcomes (e.g., survival rates).
- **Example**: India’s *Ziqitza Healthcare* operates ambulance tiers—basic vans for transport and advanced ICU units.
---
### **3. **Address Moral Hazard with Insurance Innovation**
- **Catastrophic Insurance Mandates**: Require everyone to carry cheap, high-deductible plans covering *only* true emergencies (e.g., $10/month for coverage above $50k).
- Incentivizes price shopping for non-emergencies.
- Prevents freeloading on ERs.
- **Risk-Adjusted Premiums**: Smokers, skydivers, or diabetics pay higher premiums, aligning costs with personal choices.
---
### **4. **Community-Based Safety Nets**
- **Mutual Aid Networks**: Local groups negotiate bulk ER rates (e.g., $100/month membership covers three ER visits annually).
- **Crowdfunding ER Vouchers**: Platforms like *GoFundMe* could partner with hospitals to prepurchase discounted emergency care slots.
---
### **5. **Radical Transparency + Bankruptcy Reform**
- **ER Debt Auctions**: Let hospitals sell unpaid ER bills to collection agencies in real-time, creating competition to minimize patient liability.
- **Flat-Fee ER Pricing**: Hospitals post rates like “$5,000 for appendicitis stabilization, all-inclusive” to deter surprise billing.
- **Ban Wage Garnishment for Medical Debt**: Protect patients from lifelong ruin, forcing hospitals to price responsibly or absorb losses.
---
### **6. **Accept Trade-Offs Explicitly**
The U.S. system fails because it hides rationing behind complexity. A free-market approach must embrace transparency:
- **Option 1**: Pay $100,000 for a 95% survival rate in a car crash.
- **Option 2**: Pay $20,000 for a 70% survival rate at a budget ER.
- **Brutal but Honest**: Let individuals (or insurers) choose their risk tolerance upfront.
**Example**:
- **Japan’s Price Controls**: Caps ER costs but tolerates wait times (e.g., 8+ hours for non-critical care).
- **Switzerland’s Mandates**: Everyone buys insurance, but ERs charge $1,000+ deductibles to deter overuse.
---
### **7. **Disrupt with Decentralized Care**
- **Crypto-ERs**: Blockchain-based emergency funds where contributors vote on covering members’ bills.
- **AI-Guided Self-Care**: Apps that stabilize patients en route to ERs (e.g., tourniquet tutorials, overdose reversal guidance).
---
### **8. **Reform Malpractice to Reduce Defensive Medicine**
- **“No Pay, No Harm” Liability**: If a patient doesn’t pay, they can’t sue for malpractice (incentivizing upfront pricing).
- **Safe Harbor Protocols**: ERs using approved, cost-effective treatments (e.g., generics) get immunity from lawsuits.
---
### **The Uncomfortable Truth**
A free market in emergency care requires accepting that **not everyone will be saved**—just as not everyone can afford a Ferrari. The alternative is the current U.S. model, which *pretends* to save everyone but bankrupts millions and still leaves 30% of ER visits unmet due to overcrowding.
By legalizing tiered care, deregulating monopolies, and forcing transparency, you create a system where:
- **Elites** pay premium prices for cutting-edge emergency care.
- **Most** get “good enough” stabilization at reasonable costs.
- **Some** choose cheap, high-risk options (or none at all).
This isn’t pretty, but it’s honest—and arguably more ethical than today’s hidden rationing and financial toxicity.
-

@ 604e96e0:20279eb2
2023-08-11 18:39:36
notacomment allows you to zap nostr notes when you comment on them. In order to use notacomment, you have to run a script yourself either on your own computer or in the cloud somewhere. To get started open https://github.com/SamSamskies/notacomment in a browser tab.
At this point, I'm sure a lot of you are feeling like this:

Let's breakdown the instructions from the README.
## Prerequisites
Node.js and npm - I suggest installing the latest Node.js LTS version from https://nodejs.org. That should also install npm.
Once installation is complete, open your terminal. On a Mac you can press cmd + spacebar and type in `terminal` to open the terminal. On other platforms, you'll have to ask ChatGPT 😂
.
To verify installation of Node.js type `node -v`. To verify installation type `npm -v`.
It should look something like this:

Leave the terminal open.
## Downloading the code to your computer
The easiest way to download the code is to download the zip file from the GitHub repo. Remember that first link I told you to open? That's the GitHub repo. Click the green button that says `Code` on it and click `Download ZIP` from the menu.

Now unzip the file and then navigate to the folder in the terminal. To navigate to the folder use the `cd` command. If you unzipped the folder in the `Downloads` folder, you can navigate to the folder by typing `cd ~/Downloads/notacomment-main/`.
## Usage With Strike
1. Create an account with Strike if you don't already have one https://strike.me/download/
1. Get a Strike API key with all the payment scopes from https://dashboard.strike.me/
1. Create a .env file and provide NOSTR_NSEC and STRIKE_API_KEY values (see .env.example)
1. Install the dependencies using npm or yarn or whatever your heart desires
1. Make sure you have money in your Strike account
1. Run the script `npm start`
Keep in mind that Strike pays the invoices from your cash balance. This means the payment rounds up to the nearest cent when paying an invoice, so if you set the zap amount to 1 sat, you'll be sending more money to Strike than the person you are zapping with every zap.
## Usage With LNbits
I recommend making a separate wallet from your main LNbits wallet for usage with notacomment in case you accidentally leak the admin key.
1. Create a .env file and provide NOSTR_NSEC, LNBITS_ADMIN_KEY, and LNBITS_URL values (see .env.example)
1. Install the dependencies using npm or yarn or whatever your heart desires
1. Make sure you have sats in your LNbits wallet
1. Run the script `npm start`
## Usage With Nostr Wallet Connect
1. Create a NWC connection string using something like https://nwc.getalby.com/
1. Create a .env file and provide NOSTR_NSEC and NWC_CONNECTION_STRING values (see .env.example)
1. Install the dependencies using npm or yarn or whatever your heart desires
1. Make sure you have sats in your wallet that you generated the NWC connection string with
1. Run the script `npm start`
<br />
<br />
Screenshot of terminal with commands to install dependencies, create .env file, open .env file, and start the script:

-

@ e3ba5e1a:5e433365
2025-02-05 17:47:16
I got into a [friendly discussion](https://x.com/snoyberg/status/1887007888117252142) on X regarding health insurance. The specific question was how to deal with health insurance companies (presumably unfairly) denying claims? My answer, as usual: get government out of it!
The US healthcare system is essentially the worst of both worlds:
* Unlike full single payer, individuals incur high costs
* Unlike a true free market, regulation causes increases in costs and decreases competition among insurers
I'm firmly on the side of moving towards the free market. (And I say that as someone living under a single payer system now.) Here's what I would do:
* Get rid of tax incentives that make health insurance tied to your employer, giving individuals back proper freedom of choice.
* Reduce regulations significantly.
* In the short term, some people will still get rejected claims and other obnoxious behavior from insurance companies. We address that in two ways:
1. Due to reduced regulations, new insurance companies will be able to enter the market offering more reliable coverage and better rates, and people will flock to them because they have the freedom to make their own choices.
2. Sue the asses off of companies that reject claims unfairly. And ideally, as one of the few legitimate roles of government in all this, institute new laws that limit the ability of fine print to allow insurers to escape their responsibilities. (I'm hesitant that the latter will happen due to the incestuous relationship between Congress/regulators and insurers, but I can hope.)
Will this magically fix everything overnight like politicians normally promise? No. But it will allow the market to return to a healthy state. And I don't think it will take long (order of magnitude: 5-10 years) for it to come together, but that's just speculation.
And since there's a high correlation between those who believe government can fix problems by taking more control and demanding that only credentialed experts weigh in on a topic (both points I strongly disagree with BTW): I'm a trained actuary and worked in the insurance industry, and have directly seen how government regulation reduces competition, raises prices, and harms consumers.
And my final point: I don't think any prior art would be a good comparison for deregulation in the US, it's such a different market than any other country in the world for so many reasons that lessons wouldn't really translate. Nonetheless, I asked Grok for some empirical data on this, and at best the results of deregulation could be called "mixed," but likely more accurately "uncertain, confused, and subject to whatever interpretation anyone wants to apply."
https://x.com/i/grok/share/Zc8yOdrN8lS275hXJ92uwq98M
-

@ ee7e3590:5602f192
2025-02-01 05:00:39
You’re hitting on the core tension: **unlimited demand for emergency care collides with finite resources**, and pretending otherwise leads to either runaway costs or rationing-by-stealth. Let’s confront this head-on with free-market-aligned solutions that don’t ignore human realities:
---
### **1. Redefine "Emergency Care"**
The U.S. legally mandates ERs to stabilize *anyone*, regardless of ability to pay (EMTALA). This creates moral hazard:
- **Problem**: Hospitals inflate prices on paying patients to offset uncompensated care.
- **Free-Market Fix**:
- **Repeal EMTALA**: Allow ERs to refuse non-critical cases (e.g., toothaches, rashes) unless prepaid or insured.
- **Clarify "True Emergency"**: Legally define emergencies as *immediate life threats* (e.g., strokes, cardiac arrest) and let non-critical cases be diverted to urgent care.
- **Consequence**: ERs could price transparently for true emergencies, while non-critical cases face market-driven urgent care options.
---
### **2. Embrace Tiered Emergency Care**
Not all emergencies require Level I trauma centers:
- **Basic ERs**: Staffed by NPs and paramedics for minor injuries (e.g., sprains, minor burns) at lower costs.
- **Advanced ERs**: For critical care (e.g., gunshot wounds), priced higher but competing via outcomes (e.g., survival rates).
- **Example**: India’s *Ziqitza Healthcare* operates ambulance tiers—basic vans for transport and advanced ICU units.
---
### **3. **Address Moral Hazard with Insurance Innovation**
- **Catastrophic Insurance Mandates**: Require everyone to carry cheap, high-deductible plans covering *only* true emergencies (e.g., $10/month for coverage above $50k).
- Incentivizes price shopping for non-emergencies.
- Prevents freeloading on ERs.
- **Risk-Adjusted Premiums**: Smokers, skydivers, or diabetics pay higher premiums, aligning costs with personal choices.
---
### **4. **Community-Based Safety Nets**
- **Mutual Aid Networks**: Local groups negotiate bulk ER rates (e.g., $100/month membership covers three ER visits annually).
- **Crowdfunding ER Vouchers**: Platforms like *GoFundMe* could partner with hospitals to prepurchase discounted emergency care slots.
---
### **5. **Radical Transparency + Bankruptcy Reform**
- **ER Debt Auctions**: Let hospitals sell unpaid ER bills to collection agencies in real-time, creating competition to minimize patient liability.
- **Flat-Fee ER Pricing**: Hospitals post rates like “$5,000 for appendicitis stabilization, all-inclusive” to deter surprise billing.
- **Ban Wage Garnishment for Medical Debt**: Protect patients from lifelong ruin, forcing hospitals to price responsibly or absorb losses.
---
### **6. **Accept Trade-Offs Explicitly**
The U.S. system fails because it hides rationing behind complexity. A free-market approach must embrace transparency:
- **Option 1**: Pay $100,000 for a 95% survival rate in a car crash.
- **Option 2**: Pay $20,000 for a 70% survival rate at a budget ER.
- **Brutal but Honest**: Let individuals (or insurers) choose their risk tolerance upfront.
**Example**:
- **Japan’s Price Controls**: Caps ER costs but tolerates wait times (e.g., 8+ hours for non-critical care).
- **Switzerland’s Mandates**: Everyone buys insurance, but ERs charge $1,000+ deductibles to deter overuse.
---
### **7. **Disrupt with Decentralized Care**
- **Crypto-ERs**: Blockchain-based emergency funds where contributors vote on covering members’ bills.
- **AI-Guided Self-Care**: Apps that stabilize patients en route to ERs (e.g., tourniquet tutorials, overdose reversal guidance).
---
### **8. **Reform Malpractice to Reduce Defensive Medicine**
- **“No Pay, No Harm” Liability**: If a patient doesn’t pay, they can’t sue for malpractice (incentivizing upfront pricing).
- **Safe Harbor Protocols**: ERs using approved, cost-effective treatments (e.g., generics) get immunity from lawsuits.
---
### **The Uncomfortable Truth**
A free market in emergency care requires accepting that **not everyone will be saved**—just as not everyone can afford a Ferrari. The alternative is the current U.S. model, which *pretends* to save everyone but bankrupts millions and still leaves 30% of ER visits unmet due to overcrowding.
By legalizing tiered care, deregulating monopolies, and forcing transparency, you create a system where:
- **Elites** pay premium prices for cutting-edge emergency care.
- **Most** get “good enough” stabilization at reasonable costs.
- **Some** choose cheap, high-risk options (or none at all).
This isn’t pretty, but it’s honest—and arguably more ethical than today’s hidden rationing and financial toxicity.
-

@ d360efec:14907b5f
2025-02-14 05:21:58
**ภาพรวม XRPUSDT (OKX):**
XRPUSDT กำลังแสดงสัญญาณที่น่าสนใจและมีความซับซ้อน แนวโน้มใน Timeframe ใหญ่ (Day) เริ่มเป็นขาขึ้น แต่ Timeframe กลาง (4H) เริ่มอ่อนแรง และ Timeframe เล็ก (15m) เป็นขาลง ทำให้เกิดความขัดแย้งที่ต้องระมัดระวัง
**วิเคราะห์ทีละ Timeframe:**
**(1) TF Day (รายวัน):** [https://www.tradingview.com/x/3EbxjOgV/](https://www.tradingview.com/x/3EbxjOgV/)

* **แนวโน้ม:** เริ่มเป็นขาขึ้น (Early Uptrend) หลังจากราคา Breakout EMA 50 ขึ้นมาได้
* **SMC:**
* Break of Structure (BOS): มี BOS ด้านบน (Breakout EMA 50)
* Change of Character (CHoCH): ยังไม่ชัดเจน
* Higher High (HH) & Higher Low (HL): เพิ่งเริ่มก่อตัว (ยังไม่ชัดเจน)
* **EMA:**
* ราคาอยู่เหนือ EMA 50 (สีเหลือง) และ EMA 200 (สีขาว)
* EMA 50 และ EMA 200 กำลังจะเกิด Golden Cross
* **Money Flow (LuxAlgo):**
* สีเขียวเป็นส่วนใหญ่ แสดงถึงแรงซื้อที่ยังคงมีอยู่
* มีแท่งสีแดงแทรกบ้าง แสดงถึงการขายทำกำไร
* **Volume Profile:**
* Volume หนาแน่นบริเวณ EMA 50
* **แท่งเทียน:**
* แท่งเทียนล่าสุดเป็นสีเขียว แสดงถึงแรงซื้อ
* **แนวรับ:** EMA 50, EMA 200
* **แนวต้าน:** 0.6448 (High ก่อนหน้า)
* **สรุป:** แนวโน้มเริ่มเป็นขาขึ้น แต่ยังอยู่ในช่วงเริ่มต้น
**(2) TF4H (4 ชั่วโมง):** [https://www.tradingview.com/x/nARcdWWp/](https://www.tradingview.com/x/nARcdWWp/)

* **แนวโน้ม:** เริ่มไม่แน่นอน (พักตัว, ทดสอบแนวรับ) หลังจากเป็นขาขึ้นระยะสั้น
* **SMC:**
* Break of Structure (BOS): มี BOS ด้านบน (ก่อนหน้านี้)
* Change of Character (CHoCH): ไม่ชัดเจน
* Higher High (HH) & Higher Low (HL): เริ่มไม่ชัดเจน
* มี Equal Highs (EQH)
* **EMA:**
* EMA 50 กำลังถูกทดสอบ
* EMA 200 เป็นแนวรับถัดไป
* **Money Flow (LuxAlgo):**
* เขียวและแดงผสมกัน แสดงถึงความไม่แน่นอน
* แท่งสีแดงเริ่มยาวขึ้น แสดงถึงแรงขายที่เข้ามา
* **Volume Profile:**
* Volume หนาแน่นบริเวณ EMA 50
* **แท่งเทียน:**
* แท่งเทียนล่าสุด เป็น Doji
* **แนวรับ:** EMA 50, EMA 200, บริเวณ 0.50-0.52
* **แนวต้าน:** บริเวณ High ก่อนหน้า
* **สรุป:** แนวโน้มเริ่มไม่แน่นอน, มีแรงขายเข้ามา, EMA 50 เป็นจุดสำคัญ
**(3) TF15 (15 นาที):** [https://www.tradingview.com/x/NI2wqamj/](https://www.tradingview.com/x/NI2wqamj/)

* **แนวโน้ม:** ขาลง (Downtrend) ระยะสั้น
* **SMC:**
* Break of Structure (BOS): มี BOS ด้านล่าง
* Change of Character (CHoCH): มีทั้งด้านบนและด้านล่าง
* Lower Highs (LH) และ Lower Lows (LL)
* **EMA:**
* EMA 50 และ EMA 200 กลายเป็นแนวต้าน
* **Money Flow (LuxAlgo):**
* สีแดงเป็นส่วนใหญ่ แสดงถึงแรงขาย
* **Volume Profile:**
* Volume สูง
* **แนวรับ:** บริเวณ Low ล่าสุด
* **แนวต้าน:** EMA 50, EMA 200, บริเวณ 0.54
* **สรุป:** แนวโน้มขาลง, แรงขายมีอิทธิพล
**สรุปภาพรวมและกลยุทธ์ (XRPUSDT):**
* **แนวโน้มหลัก (Day):** เริ่มเป็นขาขึ้น
* **แนวโน้มรอง (4H):** เริ่มไม่แน่นอน, พักตัว
* **แนวโน้มระยะสั้น (15m):** ขาลง
* **Money Flow:**
* Day: แรงซื้อยังคงมี
* 4H: แรงซื้อและแรงขายผสมกัน, แรงขายเริ่มเข้ามา
* 15m: แรงขายมีอิทธิพล
* **กลยุทธ์:**
1. **Wait & See (ดีที่สุด):** รอความชัดเจน
2. **Buy on Dip (Day, 4H) - *เสี่ยงสูงมาก*:** ต้องรอสัญญาณกลับตัวใน TF15
3. **Short (15m, เสี่ยงสูง):** ถ้าไม่สามารถ Breakout EMA/แนวต้านได้
**คำแนะนำ:**
* **ความขัดแย้งของ Timeframes:** ยังคงมีอยู่
* **Money Flow:** Day เป็นบวก, 4H เริ่มไม่แน่นอน, 15m เป็นลบ
* **EMA 50 (TF4H):** จุดสำคัญ
* **ถ้าไม่แน่ใจ อย่าเพิ่งเข้าเทรด**
*Disclaimer:** การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-

@ 6e75f797:a8eee74e
2023-08-07 13:16:42
Last night I started a nostr community multiplayer instance for No Man's Sky [on ZapStream](https://zap.stream/) and before we knew it, we had 4 Nostrichs arriving on the genesis planet to join the fun.

NSM is an deterministic, procedurally generated open universe where players can explore, quest, build, combat and have fun together. Every new system discovered is generated when the first Traveller enters the system making the game a unique experience for any open world gaming fan.
If you fancy joining us in the Nostrverse let me know and I'll friend you in #NMS and on Steam or Epic. If you just want to watch the fun, participate in naming systems, planets, fauna and flora come and hang out in my stream or the stream of [Oceanbee](nostr:npub1wqxxe0cjaxnvmrv4lkvx8d5dlft7ewswyn09w5v7fg7642fgzm7srucxws), [HolgerHatGarKeineNode](nostr:npub1pt0kw36ue3w2g4haxq3wgm6a2fhtptmzsjlc2j2vphtcgle72qesgpjyc6) or [taette](npub1yh0dl6pazf55025qvp860lstpscuy0kj2a5lfhxlk400m968vgpql5vsnd).

### If you already own NMS, feel free to add me!
My NMS friend code is: EMAZ-KMHT-ZPFXP
See you in space Traveller! - TheGrinder
-

@ 000002de:c05780a7
2025-01-30 21:17:26

> The Debian Publicity Team will no longer post on X/Twitter. We took this decision since we feel X doesn't reflect Debian shared values as stated in our social contract, code of conduct and diversity statement. X evolved into a place where people we care about don't feel safe.
A couple red flags in this post that explain their actions.
1. Shared values - projects that have broad values statements are prone to isolation over time
2. Social contract - that's a meaningless vapid term
I have no issue with code of conduct guidelines or having value statements but when you pick sides on cultural divides and things that are not at all related to the logical objective of a project you are going to end up where Debian has landed.
X has its issues, I'm not a fan but the reasoning behind this seems really off.
One Debian user responded with what I thought was a good summary of why this is a bad move.
> I'm a long-time Debian user and fan, and am also one of the champions for using Debian in space-based applications at NASA.
> IMO this is a short-sighted and foolish decision. The notion of "values" is bring sadly misapplied here.
> I urge you to reconsider. More channels of communication, even with those whom you disagree with, is good for both Debian and your user community.
I'm not into the "anti-woke" or "woke" crap and I dare say most people that use Linux do not care about either side very much at all. A loud minority has been gaining power in these types of projects for a long time. Today we have very loud counters to that group that also can be annoying and out of line.
Will be interesting to watch this all unfold over the next few years. Conservatives seem to be running victory laps and I think that's not only premature but also counter-productive.
I can see leaving X for other reasons.
* Debian users are really using it to communicate with the project
* The Debian publicity team isn't seeing very much of a response for their efforts
* X has become more about politics than tech and communication
* Specific examples of how X is causing issues for the project
They do say this
> X evolved into a place where people we care about don't feel safe.
That's too bad but honestly I don't buy it. Maybe I don't spend enough time on X to have much credibility on this but I'm skeptical of this being the case.
originally posted at https://stacker.news/items/870437
-

@ 91bea5cd:1df4451c
2025-02-04 17:24:50
### Definição de ULID:
Timestamp 48 bits, Aleatoriedade 80 bits
Sendo Timestamp 48 bits inteiro, tempo UNIX em milissegundos, Não ficará sem espaço até o ano 10889 d.C.
e Aleatoriedade 80 bits, Fonte criptograficamente segura de aleatoriedade, se possível.
#### Gerar ULID
```sql
CREATE EXTENSION IF NOT EXISTS pgcrypto;
CREATE FUNCTION generate_ulid()
RETURNS TEXT
AS $$
DECLARE
-- Crockford's Base32
encoding BYTEA = '0123456789ABCDEFGHJKMNPQRSTVWXYZ';
timestamp BYTEA = E'\\000\\000\\000\\000\\000\\000';
output TEXT = '';
unix_time BIGINT;
ulid BYTEA;
BEGIN
-- 6 timestamp bytes
unix_time = (EXTRACT(EPOCH FROM CLOCK_TIMESTAMP()) * 1000)::BIGINT;
timestamp = SET_BYTE(timestamp, 0, (unix_time >> 40)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 1, (unix_time >> 32)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 2, (unix_time >> 24)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 3, (unix_time >> 16)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 4, (unix_time >> 8)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 5, unix_time::BIT(8)::INTEGER);
-- 10 entropy bytes
ulid = timestamp || gen_random_bytes(10);
-- Encode the timestamp
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 224) >> 5));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 1) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 1) & 7) << 2) | ((GET_BYTE(ulid, 2) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 2) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 2) & 1) << 4) | ((GET_BYTE(ulid, 3) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 3) & 15) << 1) | ((GET_BYTE(ulid, 4) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 4) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 4) & 3) << 3) | ((GET_BYTE(ulid, 5) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 5) & 31)));
-- Encode the entropy
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 6) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 6) & 7) << 2) | ((GET_BYTE(ulid, 7) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 7) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 7) & 1) << 4) | ((GET_BYTE(ulid, 8) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 8) & 15) << 1) | ((GET_BYTE(ulid, 9) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 9) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 9) & 3) << 3) | ((GET_BYTE(ulid, 10) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 10) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 11) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 11) & 7) << 2) | ((GET_BYTE(ulid, 12) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 12) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 12) & 1) << 4) | ((GET_BYTE(ulid, 13) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 13) & 15) << 1) | ((GET_BYTE(ulid, 14) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 14) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 14) & 3) << 3) | ((GET_BYTE(ulid, 15) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 15) & 31)));
RETURN output;
END
$$
LANGUAGE plpgsql
VOLATILE;
```
#### ULID TO UUID
```sql
CREATE OR REPLACE FUNCTION parse_ulid(ulid text) RETURNS bytea AS $$
DECLARE
-- 16byte
bytes bytea = E'\\x00000000 00000000 00000000 00000000';
v char[];
-- Allow for O(1) lookup of index values
dec integer[] = ARRAY[
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 0, 1, 2,
3, 4, 5, 6, 7, 8, 9, 255, 255, 255,
255, 255, 255, 255, 10, 11, 12, 13, 14, 15,
16, 17, 1, 18, 19, 1, 20, 21, 0, 22,
23, 24, 25, 26, 255, 27, 28, 29, 30, 31,
255, 255, 255, 255, 255, 255, 10, 11, 12, 13,
14, 15, 16, 17, 1, 18, 19, 1, 20, 21,
0, 22, 23, 24, 25, 26, 255, 27, 28, 29,
30, 31
];
BEGIN
IF NOT ulid ~* '^[0-7][0-9ABCDEFGHJKMNPQRSTVWXYZ]{25}$' THEN
RAISE EXCEPTION 'Invalid ULID: %', ulid;
END IF;
v = regexp_split_to_array(ulid, '');
-- 6 bytes timestamp (48 bits)
bytes = SET_BYTE(bytes, 0, (dec[ASCII(v[1])] << 5) | dec[ASCII(v[2])]);
bytes = SET_BYTE(bytes, 1, (dec[ASCII(v[3])] << 3) | (dec[ASCII(v[4])] >> 2));
bytes = SET_BYTE(bytes, 2, (dec[ASCII(v[4])] << 6) | (dec[ASCII(v[5])] << 1) | (dec[ASCII(v[6])] >> 4));
bytes = SET_BYTE(bytes, 3, (dec[ASCII(v[6])] << 4) | (dec[ASCII(v[7])] >> 1));
bytes = SET_BYTE(bytes, 4, (dec[ASCII(v[7])] << 7) | (dec[ASCII(v[8])] << 2) | (dec[ASCII(v[9])] >> 3));
bytes = SET_BYTE(bytes, 5, (dec[ASCII(v[9])] << 5) | dec[ASCII(v[10])]);
-- 10 bytes of entropy (80 bits);
bytes = SET_BYTE(bytes, 6, (dec[ASCII(v[11])] << 3) | (dec[ASCII(v[12])] >> 2));
bytes = SET_BYTE(bytes, 7, (dec[ASCII(v[12])] << 6) | (dec[ASCII(v[13])] << 1) | (dec[ASCII(v[14])] >> 4));
bytes = SET_BYTE(bytes, 8, (dec[ASCII(v[14])] << 4) | (dec[ASCII(v[15])] >> 1));
bytes = SET_BYTE(bytes, 9, (dec[ASCII(v[15])] << 7) | (dec[ASCII(v[16])] << 2) | (dec[ASCII(v[17])] >> 3));
bytes = SET_BYTE(bytes, 10, (dec[ASCII(v[17])] << 5) | dec[ASCII(v[18])]);
bytes = SET_BYTE(bytes, 11, (dec[ASCII(v[19])] << 3) | (dec[ASCII(v[20])] >> 2));
bytes = SET_BYTE(bytes, 12, (dec[ASCII(v[20])] << 6) | (dec[ASCII(v[21])] << 1) | (dec[ASCII(v[22])] >> 4));
bytes = SET_BYTE(bytes, 13, (dec[ASCII(v[22])] << 4) | (dec[ASCII(v[23])] >> 1));
bytes = SET_BYTE(bytes, 14, (dec[ASCII(v[23])] << 7) | (dec[ASCII(v[24])] << 2) | (dec[ASCII(v[25])] >> 3));
bytes = SET_BYTE(bytes, 15, (dec[ASCII(v[25])] << 5) | dec[ASCII(v[26])]);
RETURN bytes;
END
$$
LANGUAGE plpgsql
IMMUTABLE;
CREATE OR REPLACE FUNCTION ulid_to_uuid(ulid text) RETURNS uuid AS $$
BEGIN
RETURN encode(parse_ulid(ulid), 'hex')::uuid;
END
$$
LANGUAGE plpgsql
IMMUTABLE;
```
#### UUID to ULID
```sql
CREATE OR REPLACE FUNCTION uuid_to_ulid(id uuid) RETURNS text AS $$
DECLARE
encoding bytea = '0123456789ABCDEFGHJKMNPQRSTVWXYZ';
output text = '';
uuid_bytes bytea = uuid_send(id);
BEGIN
-- Encode the timestamp
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 224) >> 5));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 1) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 1) & 7) << 2) | ((GET_BYTE(uuid_bytes, 2) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 2) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 2) & 1) << 4) | ((GET_BYTE(uuid_bytes, 3) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 3) & 15) << 1) | ((GET_BYTE(uuid_bytes, 4) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 4) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 4) & 3) << 3) | ((GET_BYTE(uuid_bytes, 5) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 5) & 31)));
-- Encode the entropy
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 6) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 6) & 7) << 2) | ((GET_BYTE(uuid_bytes, 7) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 7) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 7) & 1) << 4) | ((GET_BYTE(uuid_bytes, 8) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 8) & 15) << 1) | ((GET_BYTE(uuid_bytes, 9) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 9) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 9) & 3) << 3) | ((GET_BYTE(uuid_bytes, 10) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 10) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 11) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 11) & 7) << 2) | ((GET_BYTE(uuid_bytes, 12) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 12) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 12) & 1) << 4) | ((GET_BYTE(uuid_bytes, 13) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 13) & 15) << 1) | ((GET_BYTE(uuid_bytes, 14) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 14) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 14) & 3) << 3) | ((GET_BYTE(uuid_bytes, 15) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 15) & 31)));
RETURN output;
END
$$
LANGUAGE plpgsql
IMMUTABLE;
```
#### Gera 11 Digitos aleatórios: YBKXG0CKTH4
```sql
-- Cria a extensão pgcrypto para gerar uuid
CREATE EXTENSION IF NOT EXISTS pgcrypto;
-- Cria a função para gerar ULID
CREATE OR REPLACE FUNCTION gen_lrandom()
RETURNS TEXT AS $$
DECLARE
ts_millis BIGINT;
ts_chars TEXT;
random_bytes BYTEA;
random_chars TEXT;
base32_chars TEXT := '0123456789ABCDEFGHJKMNPQRSTVWXYZ';
i INT;
BEGIN
-- Pega o timestamp em milissegundos
ts_millis := FLOOR(EXTRACT(EPOCH FROM clock_timestamp()) * 1000)::BIGINT;
-- Converte o timestamp para base32
ts_chars := '';
FOR i IN REVERSE 0..11 LOOP
ts_chars := ts_chars || substr(base32_chars, ((ts_millis >> (5 * i)) & 31) + 1, 1);
END LOOP;
-- Gera 10 bytes aleatórios e converte para base32
random_bytes := gen_random_bytes(10);
random_chars := '';
FOR i IN 0..9 LOOP
random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) >> 3) & 31) + 1, 1);
IF i < 9 THEN
random_chars := random_chars || substr(base32_chars, (((get_byte(random_bytes, i) & 7) << 2) | (get_byte(random_bytes, i + 1) >> 6)) & 31 + 1, 1);
ELSE
random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) & 7) << 2) + 1, 1);
END IF;
END LOOP;
-- Concatena o timestamp e os caracteres aleatórios
RETURN ts_chars || random_chars;
END;
$$ LANGUAGE plpgsql;
```
#### Exemplo de USO
```sql
-- Criação da extensão caso não exista
CREATE EXTENSION
IF
NOT EXISTS pgcrypto;
-- Criação da tabela pessoas
CREATE TABLE pessoas ( ID UUID DEFAULT gen_random_uuid ( ) PRIMARY KEY, nome TEXT NOT NULL );
-- Busca Pessoa na tabela
SELECT
*
FROM
"pessoas"
WHERE
uuid_to_ulid ( ID ) = '252FAC9F3V8EF80SSDK8PXW02F';
```
### Fontes
- https://github.com/scoville/pgsql-ulid
- https://github.com/geckoboard/pgulid
-

@ 91bea5cd:1df4451c
2025-02-04 17:15:57
### Definição de ULID:
Timestamp 48 bits, Aleatoriedade 80 bits
Sendo Timestamp 48 bits inteiro, tempo UNIX em milissegundos, Não ficará sem espaço até o ano 10889 d.C.
e Aleatoriedade 80 bits, Fonte criptograficamente segura de aleatoriedade, se possível.
#### Gerar ULID
```sql
CREATE EXTENSION IF NOT EXISTS pgcrypto;
CREATE FUNCTION generate_ulid()
RETURNS TEXT
AS $$
DECLARE
-- Crockford's Base32
encoding BYTEA = '0123456789ABCDEFGHJKMNPQRSTVWXYZ';
timestamp BYTEA = E'\\000\\000\\000\\000\\000\\000';
output TEXT = '';
unix_time BIGINT;
ulid BYTEA;
BEGIN
-- 6 timestamp bytes
unix_time = (EXTRACT(EPOCH FROM CLOCK_TIMESTAMP()) * 1000)::BIGINT;
timestamp = SET_BYTE(timestamp, 0, (unix_time >> 40)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 1, (unix_time >> 32)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 2, (unix_time >> 24)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 3, (unix_time >> 16)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 4, (unix_time >> 8)::BIT(8)::INTEGER);
timestamp = SET_BYTE(timestamp, 5, unix_time::BIT(8)::INTEGER);
-- 10 entropy bytes
ulid = timestamp || gen_random_bytes(10);
-- Encode the timestamp
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 224) >> 5));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 0) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 1) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 1) & 7) << 2) | ((GET_BYTE(ulid, 2) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 2) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 2) & 1) << 4) | ((GET_BYTE(ulid, 3) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 3) & 15) << 1) | ((GET_BYTE(ulid, 4) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 4) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 4) & 3) << 3) | ((GET_BYTE(ulid, 5) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 5) & 31)));
-- Encode the entropy
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 6) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 6) & 7) << 2) | ((GET_BYTE(ulid, 7) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 7) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 7) & 1) << 4) | ((GET_BYTE(ulid, 8) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 8) & 15) << 1) | ((GET_BYTE(ulid, 9) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 9) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 9) & 3) << 3) | ((GET_BYTE(ulid, 10) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 10) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 11) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 11) & 7) << 2) | ((GET_BYTE(ulid, 12) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 12) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 12) & 1) << 4) | ((GET_BYTE(ulid, 13) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 13) & 15) << 1) | ((GET_BYTE(ulid, 14) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 14) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(ulid, 14) & 3) << 3) | ((GET_BYTE(ulid, 15) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(ulid, 15) & 31)));
RETURN output;
END
$$
LANGUAGE plpgsql
VOLATILE;
```
#### ULID TO UUID
```sql
CREATE OR REPLACE FUNCTION parse_ulid(ulid text) RETURNS bytea AS $$
DECLARE
-- 16byte
bytes bytea = E'\\x00000000 00000000 00000000 00000000';
v char[];
-- Allow for O(1) lookup of index values
dec integer[] = ARRAY[
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 255, 255, 255,
255, 255, 255, 255, 255, 255, 255, 0, 1, 2,
3, 4, 5, 6, 7, 8, 9, 255, 255, 255,
255, 255, 255, 255, 10, 11, 12, 13, 14, 15,
16, 17, 1, 18, 19, 1, 20, 21, 0, 22,
23, 24, 25, 26, 255, 27, 28, 29, 30, 31,
255, 255, 255, 255, 255, 255, 10, 11, 12, 13,
14, 15, 16, 17, 1, 18, 19, 1, 20, 21,
0, 22, 23, 24, 25, 26, 255, 27, 28, 29,
30, 31
];
BEGIN
IF NOT ulid ~* '^[0-7][0-9ABCDEFGHJKMNPQRSTVWXYZ]{25}$' THEN
RAISE EXCEPTION 'Invalid ULID: %', ulid;
END IF;
v = regexp_split_to_array(ulid, '');
-- 6 bytes timestamp (48 bits)
bytes = SET_BYTE(bytes, 0, (dec[ASCII(v[1])] << 5) | dec[ASCII(v[2])]);
bytes = SET_BYTE(bytes, 1, (dec[ASCII(v[3])] << 3) | (dec[ASCII(v[4])] >> 2));
bytes = SET_BYTE(bytes, 2, (dec[ASCII(v[4])] << 6) | (dec[ASCII(v[5])] << 1) | (dec[ASCII(v[6])] >> 4));
bytes = SET_BYTE(bytes, 3, (dec[ASCII(v[6])] << 4) | (dec[ASCII(v[7])] >> 1));
bytes = SET_BYTE(bytes, 4, (dec[ASCII(v[7])] << 7) | (dec[ASCII(v[8])] << 2) | (dec[ASCII(v[9])] >> 3));
bytes = SET_BYTE(bytes, 5, (dec[ASCII(v[9])] << 5) | dec[ASCII(v[10])]);
-- 10 bytes of entropy (80 bits);
bytes = SET_BYTE(bytes, 6, (dec[ASCII(v[11])] << 3) | (dec[ASCII(v[12])] >> 2));
bytes = SET_BYTE(bytes, 7, (dec[ASCII(v[12])] << 6) | (dec[ASCII(v[13])] << 1) | (dec[ASCII(v[14])] >> 4));
bytes = SET_BYTE(bytes, 8, (dec[ASCII(v[14])] << 4) | (dec[ASCII(v[15])] >> 1));
bytes = SET_BYTE(bytes, 9, (dec[ASCII(v[15])] << 7) | (dec[ASCII(v[16])] << 2) | (dec[ASCII(v[17])] >> 3));
bytes = SET_BYTE(bytes, 10, (dec[ASCII(v[17])] << 5) | dec[ASCII(v[18])]);
bytes = SET_BYTE(bytes, 11, (dec[ASCII(v[19])] << 3) | (dec[ASCII(v[20])] >> 2));
bytes = SET_BYTE(bytes, 12, (dec[ASCII(v[20])] << 6) | (dec[ASCII(v[21])] << 1) | (dec[ASCII(v[22])] >> 4));
bytes = SET_BYTE(bytes, 13, (dec[ASCII(v[22])] << 4) | (dec[ASCII(v[23])] >> 1));
bytes = SET_BYTE(bytes, 14, (dec[ASCII(v[23])] << 7) | (dec[ASCII(v[24])] << 2) | (dec[ASCII(v[25])] >> 3));
bytes = SET_BYTE(bytes, 15, (dec[ASCII(v[25])] << 5) | dec[ASCII(v[26])]);
RETURN bytes;
END
$$
LANGUAGE plpgsql
IMMUTABLE;
CREATE OR REPLACE FUNCTION ulid_to_uuid(ulid text) RETURNS uuid AS $$
BEGIN
RETURN encode(parse_ulid(ulid), 'hex')::uuid;
END
$$
LANGUAGE plpgsql
IMMUTABLE;
```
#### UUID to ULID
```sql
CREATE OR REPLACE FUNCTION uuid_to_ulid(id uuid) RETURNS text AS $$
DECLARE
encoding bytea = '0123456789ABCDEFGHJKMNPQRSTVWXYZ';
output text = '';
uuid_bytes bytea = uuid_send(id);
BEGIN
-- Encode the timestamp
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 224) >> 5));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 0) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 1) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 1) & 7) << 2) | ((GET_BYTE(uuid_bytes, 2) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 2) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 2) & 1) << 4) | ((GET_BYTE(uuid_bytes, 3) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 3) & 15) << 1) | ((GET_BYTE(uuid_bytes, 4) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 4) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 4) & 3) << 3) | ((GET_BYTE(uuid_bytes, 5) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 5) & 31)));
-- Encode the entropy
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 6) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 6) & 7) << 2) | ((GET_BYTE(uuid_bytes, 7) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 7) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 7) & 1) << 4) | ((GET_BYTE(uuid_bytes, 8) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 8) & 15) << 1) | ((GET_BYTE(uuid_bytes, 9) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 9) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 9) & 3) << 3) | ((GET_BYTE(uuid_bytes, 10) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 10) & 31)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 11) & 248) >> 3));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 11) & 7) << 2) | ((GET_BYTE(uuid_bytes, 12) & 192) >> 6)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 12) & 62) >> 1));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 12) & 1) << 4) | ((GET_BYTE(uuid_bytes, 13) & 240) >> 4)));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 13) & 15) << 1) | ((GET_BYTE(uuid_bytes, 14) & 128) >> 7)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 14) & 124) >> 2));
output = output || CHR(GET_BYTE(encoding, ((GET_BYTE(uuid_bytes, 14) & 3) << 3) | ((GET_BYTE(uuid_bytes, 15) & 224) >> 5)));
output = output || CHR(GET_BYTE(encoding, (GET_BYTE(uuid_bytes, 15) & 31)));
RETURN output;
END
$$
LANGUAGE plpgsql
IMMUTABLE;
```
#### Gera 11 Digitos aleatórios: YBKXG0CKTH4
```sql
-- Cria a extensão pgcrypto para gerar uuid
CREATE EXTENSION IF NOT EXISTS pgcrypto;
-- Cria a função para gerar ULID
CREATE OR REPLACE FUNCTION gen_lrandom()
RETURNS TEXT AS $$
DECLARE
ts_millis BIGINT;
ts_chars TEXT;
random_bytes BYTEA;
random_chars TEXT;
base32_chars TEXT := '0123456789ABCDEFGHJKMNPQRSTVWXYZ';
i INT;
BEGIN
-- Pega o timestamp em milissegundos
ts_millis := FLOOR(EXTRACT(EPOCH FROM clock_timestamp()) * 1000)::BIGINT;
-- Converte o timestamp para base32
ts_chars := '';
FOR i IN REVERSE 0..11 LOOP
ts_chars := ts_chars || substr(base32_chars, ((ts_millis >> (5 * i)) & 31) + 1, 1);
END LOOP;
-- Gera 10 bytes aleatórios e converte para base32
random_bytes := gen_random_bytes(10);
random_chars := '';
FOR i IN 0..9 LOOP
random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) >> 3) & 31) + 1, 1);
IF i < 9 THEN
random_chars := random_chars || substr(base32_chars, (((get_byte(random_bytes, i) & 7) << 2) | (get_byte(random_bytes, i + 1) >> 6)) & 31 + 1, 1);
ELSE
random_chars := random_chars || substr(base32_chars, ((get_byte(random_bytes, i) & 7) << 2) + 1, 1);
END IF;
END LOOP;
-- Concatena o timestamp e os caracteres aleatórios
RETURN ts_chars || random_chars;
END;
$$ LANGUAGE plpgsql;
```
#### Exemplo de USO
```sql
-- Criação da extensão caso não exista
CREATE EXTENSION
IF
NOT EXISTS pgcrypto;
-- Criação da tabela pessoas
CREATE TABLE pessoas ( ID UUID DEFAULT gen_random_uuid ( ) PRIMARY KEY, nome TEXT NOT NULL );
-- Busca Pessoa na tabela
SELECT
*
FROM
"pessoas"
WHERE
uuid_to_ulid ( ID ) = '252FAC9F3V8EF80SSDK8PXW02F';
```
### Fontes
- https://github.com/scoville/pgsql-ulid
- https://github.com/geckoboard/pgulid
-

@ d360efec:14907b5f
2025-02-14 04:13:06
Bitcoin (BTCUSDT) กำลังแสดงสัญญาณที่น่าสนใจ โดยรวมแล้วแนวโน้มระยะยาวยังเป็นขาขึ้น แต่ระยะสั้นมีความผันผวนและมีการปรับฐานลงมา
**วิเคราะห์ทีละ Timeframe:**
**(1) TF Day (รายวัน):** [https://www.tradingview.com/x/s9CAaSKQ/](https://www.tradingview.com/x/s9CAaSKQ/)

* **แนวโน้ม:** ขาขึ้น (Uptrend) แข็งแกร่ง
* **SMC:**
* Higher Highs (HH) และ Higher Lows (HL) อย่างต่อเนื่อง
* Break of Structure (BOS) ด้านบนหลายครั้ง
* ไม่มีสัญญาณการกลับตัวเป็นขาลง
* **EMA:**
* ราคาอยู่เหนือ EMA 50 (เส้นสีเหลือง) และ EMA 200 (เส้นสีขาว)
* EMA 50 และ EMA 200 เรียงตัวแบบ Golden Cross (EMA 50 ตัด EMA 200 ขึ้น)
* **Money Flow (LuxAlgo):**
* โดยรวมเป็นสีเขียว แสดงถึงแรงซื้อที่ยังคงมีอิทธิพลเหนือกว่า
* มีแท่งสีแดงแทรกบ้าง แสดงถึงการขายทำกำไร
* **Volume Profile:**
* Volume หนาแน่นที่บริเวณ 96,000 - 98,000 (ซึ่งตอนนี้กลายเป็นแนวรับไปแล้ว)
* **แท่งเทียน:**
* แท่งเทียนล่าสุดเป็นสีแดง แสดงถึงแรงขาย แต่ไส้เทียนด้านล่างยาว แสดงว่ามีแรงซื้อกลับเข้ามาบ้าง
* **แนวรับ:** EMA 50, EMA 200, บริเวณ 96,000 - 98,000
* **แนวต้าน:** 109,998.9 (High เดิม)
* **สรุป:** แนวโน้มขาขึ้นยังคงแข็งแกร่ง Buy on Dip ยังคงเป็นกลยุทธ์หลัก
**(2) TF4H (4 ชั่วโมง):** [https://www.tradingview.com/x/KsuVdl2e/](https://www.tradingview.com/x/KsuVdl2e/)

* **แนวโน้ม:** ขาขึ้น (Uptrend) แต่มีการพักตัวลงมา (Pullback)
* **SMC:**
* Higher Highs (HH) และ Higher Lows (HL)
* Break of Structure (BOS) ด้านบน
* ราคาพักตัวลงมา แต่ยังไม่เสียโครงสร้างขาขึ้น
* มี Equal Highs (EQH) บริเวณ 109,998.9
* **EMA:**
* EMA 50 กำลังถูกทดสอบ
* EMA 200 เป็นแนวรับถัดไป
* **Money Flow (LuxAlgo):**
* โดยรวมเป็นสีเขียว แต่เริ่มมีแท่งสีเขียวสั้นลง และมีแท่งสีแดงยาวขึ้น แสดงว่าแรงซื้อเริ่มอ่อนแรง และมีแรงขายเข้ามา
* **Volume Profile:**
* Volume หนาแน่นที่บริเวณ 96,000 - 98,000
* **แท่งเทียน:**
* แท่งเทียนล่าสุดเป็นสีแดง แสดงถึงแรงขาย
* **แนวรับ:** EMA 50, EMA 200, บริเวณ 96,000 - 98,000
* **แนวต้าน:** 109,998.9 (EQH, High เดิม)
* **สรุป:** แนวโน้มขาขึ้นยังไม่เสีย แต่เริ่มมีสัญญาณเตือน (Money Flow อ่อนแรง, ราคาพักตัว)
**(3) TF15 (15 นาที):** [https://www.tradingview.com/x/DSrpSjn6/](https://www.tradingview.com/x/DSrpSjn6/)

* **แนวโน้ม:** Sideways Down (แกว่งตัวลง) หลังจากพยายาม Breakout แต่ไม่สำเร็จ
* **SMC:**
* Break of Structure (BOS) ด้านล่าง (หลุดแนวรับย่อยๆ)
* Change of Character (CHoCH) ทั้งด้านบนและด้านล่าง
* Lower Highs (LH) และ Lower Lows (LL) เริ่มก่อตัว
* Equal Highs (EQH) หลายจุด
* **EMA:**
* EMA 50 และ EMA 200 กลายเป็นแนวต้าน
* **Money Flow (LuxAlgo):**
* สีแดงมีอิทธิพลเหนือกว่า แสดงถึงแรงขาย
* **Volume Profile:**
* Volume หนาแน่นที่บริเวณ 97,000-97,200 (กลายเป็นแนวต้าน)
* **แนวรับ:** บริเวณ Low ล่าสุด
* **แนวต้าน:** EMA 50, EMA 200, บริเวณ 96,000, 96,800, 97,000-97,200
* **สรุป:** แนวโน้มระยะสั้นเป็นขาลง, แรงขายยังมีอยู่
**สรุปภาพรวมและกลยุทธ์ (BTCUSDT):**
* **แนวโน้มหลัก (Day, 4H):** ขาขึ้น (Uptrend)
* **แนวโน้มระยะสั้น (15m):** ขาลง (Downtrend) / Sideways Down
* **Money Flow:**
* Day: แรงซื้อยังแข็งแกร่ง
* 4H: แรงซื้อเริ่มอ่อนแรง, แรงขายเริ่มเข้ามา
* 15m: แรงขายมีอิทธิพลเหนือกว่า
* **กลยุทธ์:**
1. **Wait & See (ดีที่สุด):** รอความชัดเจน เนื่องจากความขัดแย้งระหว่าง Timeframes
2. **Buy on Dip (Day, 4H) - *ความเสี่ยงสูงมาก*:** ต้องรอสัญญาณกลับตัวใน TF15
3. **Short (15m, ความเสี่ยงสูงมาก):** ถ้าไม่สามารถ Breakout EMA/แนวต้านได้
**คำแนะนำ:**
* **ความขัดแย้งของ Timeframes:** ยังคงมีอยู่
* **Money Flow:** Day เป็นบวก, 4H เริ่มเป็นลบ, 15m เป็นลบ
* **EMA 50 (TF4H):** จุดสำคัญ
* **ถ้าไม่แน่ใจ อย่าเพิ่งเข้าเทรด**
*Disclaimer:** การวิเคราะห์นี้เป็นเพียงความคิดเห็นส่วนตัว ไม่ถือเป็นคำแนะนำในการลงทุน ผู้ลงทุนควรศึกษาข้อมูลเพิ่มเติมและตัดสินใจด้วยความรอบคอบ
-

@ ec42c765:328c0600
2025-02-05 23:16:35
てすと
nostr:nevent1qqst3uqlls4yr9vys4dza2sgjle3ly37trck7jgdmtr23uuz52usjrqqqnjgr
nostr:nevent1qqsdvchy5d27zt3z05rr3q6vvmzgslslxwu0p4dfkvxwhmvxldn9djguvagp2
test
てs
-

@ 1cb14ab3:95d52462
2025-01-30 18:45:41















---
#### Other Photo Series by Hes:
[City Series](https://hes.npub.pro/post/1734817611982/)
[Structural Reflections](https://hes.npub.pro/post/1720570208841/)
---
#### More from Hes:
[Long Form](https://hes.npub.pro/)
[Art Portfolio](https://hesart.npub.pro/)
[Online Store](https://plebeian.market/community/1cb14ab335876fc9efc37d838ba287cf17e5adcccb20bf6d49f9da9695d52462:hesmart-ym3fcufdfz)
[Travel Guides](https://hes.npub.pro/tag/travel/)
[Photography](https://hes.npub.pro/tag/photography/)
[Writings](https://hes.npub.pro/tag/money)
---
*All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from these photos, please feel free to send a zap. Enjoy life on a Bitcoin standard.*
-

@ 3eba5ef4:751f23ae
2025-02-14 03:52:48
🍨*Your weekly byte of the latest updates from the Bitcoin ecosystem!*
## Crypto Insights
### Solving the Optimal Cluster Linearization Problem With DeepSeek
Stefan Richter (stefanwouldgo) [found](https://delvingbitcoin.org/t/how-to-linearize-your-cluster/303/9?u=sss_is_me) a 1989 paper through DeepSeek R1 that provides a solid solution to the problem of optimal cluster linearization. The paper presents a proven algorithm that efficiently finds the subset of transactions with the highest fees; if this subset is included in a block, it is topologically valid.
### New Class in Cluster Mempool Improves Transaction Handling and Performance
The introduction of the `TxGraph` class in [Cluster Mempool](https://bitcoinops.org/en/topics/cluster-mempool/) enhances transaction handling by encapsulating the transaction graph, focusing on effective fees, sizes, and dependencies. It enables batched and lazy updates for more efficient mempool operations, with improvements in transaction prioritization, incentive compatibility, and performance. This design simplifies the code by abstracting graph management, allowing for easier validation and future optimizations.
More details in this [pull request](https://github.com/bitcoin/bitcoin/pull/31363).
### Independent Mining Still Feasible
Two independent miners recently mined Bitcoin blocks:
* [Block 881432](https://mempool.sethforprivacy.com/block/00000000000000000000931af218dd988191e459a8449dbce22b17e4475cd5a0) by [256 Foundation](https://256foundation.org/), a public organization promoting open-source Bitcoin mining. The group combined the hash rate from over 300 participants with the goal of breaking up the mining patent monopolies of large pools, making Bitcoin and free technology more accessible to all.
* [Block 881676](https://mempool.space/block/000000000000000000022247ce3898fc9e10be0161cde5f369293d7a916ca8b3) by the open-source home mining hardware [solo.ckpool](https://solo.ckpool.org/), using hash rate equivalent to thousands of BitAxe devices.
This demonstrates that independent miners can still compete, reinforcing Bitcoin’s decentralization and censorship resistance.
### 6-Block Confirmation No Longer Enough, Mining Centralization Impacts Bitcoin Security
Bitcoin Core developer Luke Dashjr [posted](https://x.com/LukeDashjr/status/1888295040113361129) that he intended to update the 6-blocks-to-confirm target in the Knots wallet GUI. However, he found that due to Antpool controlling around 48% of the network's hash rate, more than 800 block confirmations would be required to achieve 95% security. He also noted that many pools, like Braiins and ViaBTC, are actually Antpool under different names.
### Payjoin Development Progress Review
Spiral [reviewed](https://spiralbtc.substack.com/p/nerd-of-the-month-payjoin) the development progress of [Payjoin](https://bitcoinops.org/en/topics/payjoin/), which allows for including an additional input in a payment transaction to enhance privacy. The article also mentions that by using joint batching to optimize fees, Payjoin reduces transaction costs and increases network efficiency. Moreover, when both parties contribute inputs, Payjoin helps protect privacy by breaking common blockchain monitoring assumptions, making it harder for third parties to track payment amounts and private spending behaviors.
### Block Size Report Reveals: Growth Partly Limited by Miner Policies and Bitcoin Core Defaults
The [Block Size Report](https://research.mempool.space/block-size-report/), published by Mempool research, uses data-driven analysis to examine the evolution of block size in Bitcoin from its inception to February 2025. It discusses changes in block size post-SegWit upgrade and reveals how growth has been partly limited by miner policies and Bitcoin Core defaults over the years. The report concludes with predictions about the growth of Bitcoin’s blockchain in the coming years.
### Tutorial on Becoming an Advanced Nostr User With Sats Cashback
Rizful published a [guide](https://rizful.com/get_on_nostr_today) on how to become an advanced Nostr user and set up the self-owned Lightning node. After completing the tutorial, users can receive 5,000 sats via zap cashback.
### Build a Smart Card for Bitcoin and Nostr Event Signing for Under $25
The 100% open-source smart card [Satochip](https://stacker.news/items/877488) allows users to build their own signing device in just 10 minutes under 25 USD. Satochip's advantages include:
* Affordable and widely available
* Dual interface: supports both NFC (contactless) and Chip (contact) modes
* Minimal electronics, reducing the attack surface
* Enhanced security based in Secure Element
### Bitcoin at the Crossroads of AI Revolution and Sovereign Evolution
CKBEcoFund [shared](https://x.com/c_hongzhou/status/1887142941980041727) their insights from the talk at [The Satoshi Roundtable](https://satoshiroundtable.org/), discussing several macro issues including the dominance of artificial intelligence, Bitcoin's security, scalability, sovereignty, and national Bitcoin strategic reserves. He explored how CKB, as a Bitcoin Layer 2, is positioning itself for high-frequency micropayments, smart contracts, and cross-chain asset management.
## Top Reads on Blockchain and Beyond
### Pod: An Optimal-Latency, Censorship-Free, and Accountable Generalized Consensus Layer
[This paper](https://arxiv.org/pdf/2501.14931) introduces a new consensus concept pod, aiming to achieve physically optimal latency for one round-trip—just one write of a new transaction and one read. This work solves inherent problems of high latency in blockchain and low scalability in traditional consensus protocols.
[Grigore Rosu](https://x.com/RosuGrigore) commented: "It can lead to the end of blockchains as we know them today. It shows how we can still achieve all the benefits of blockchains, but dropping the tyranny of sequentiality (and all the value exploiters that come with it).”
### Tracking and Surveillance In-App Ads
The author learned of a massive [location data breach](https://www.404media.co/hackers-claim-massive-breach-of-location-data-giant-threaten-to-leak-data/?ref=timsh.org) revealing that over 2,000 apps in the App Store and Google Play were secretly collecting geographic location data without users' consent, and developers were unaware.
He then began tracking himself through location data leaked by some apps and made the following discoveries:
* Regardless of whether users choose "Allow" or "Ask not to track" in phone settings, the combination of "IP + location + user agent + geography" is still leaked to hundreds of third parties.
* The phone sends requests with location and leaked IP. These can be converted to geographic locations through reverse DNS.
* Data collection pathway: stack → [o.isx.unity3d.com](http://o.isx.unity3d.com/) → [molocoads](https://www.moloco.com/?ref=timsh.org) → bwin
* **Unity** is an SSP (supply-side platform) that collects app data via its SDK
* **Moloco Ads** is a DSP network that resells data from multiple SSPs like Unity, Applovin, Chartboost
* **bwin** is the advertiser that users see ads for in games
More discoveries in this [post](9https://timsh.org/tracking-myself-down-through-in-app-ads/).
### Potential DAO 2.0 Product Ideas
The author believes that the development of on-chain AI agents will lead to new forms of DAO, giving true autonomy to the "A" in DAO. [New product ideas](https://blog.variant.fund/dao-product-ideas) include:
* **DAO 2.0 launcher:** platform enables launching new community/governance tokens tied to an agent, agent responds to tokenholder votes, reads discussion forums and generates proposals
* **Quality assessment for token distribution**: agent assesses contribution quality to determine payouts/token distributions for DAOs/airdrops/etc.
* **ZachZBT:** agent monitors for hacks or other fraudulent activity and publishes research as well as tries to get funds back for people
* **Due diligence agent**: agent verifies contract integrity, dev reputations, on-chain behavior, and potential rug risks; allows users to interact with the agent to ask questions about risks
-

@ ec42c765:328c0600
2025-02-05 22:05:55
# カスタム絵文字とは
任意のオリジナル画像を絵文字のように文中に挿入できる機能です。
また、リアクション(Twitterの いいね のような機能)にもカスタム絵文字を使えます。

# カスタム絵文字の対応状況(2025/02/06)

カスタム絵文字を使うためにはカスタム絵文字に対応した[クライアント](https://welcome.nostr-jp.org/tutorial/explore-client.html)を使う必要があります。
※表は一例です。クライアントは他にもたくさんあります。
使っているクライアントが対応していない場合は、クライアントを変更する、対応するまで待つ、開発者に要望を送る(または自分で実装する)などしましょう。
#### 対応クライアント
- [Amethyst](https://play.google.com/store/apps/details?id=com.vitorpamplona.amethyst)
- [FreeFrom](https://freefrom.space/)
- [nostter](https://nostter.app/)
- [Rabbit](https://rabbit.syusui.net/)
- [Lumilumi](https://lumilumi.app/)
- [Nos Haiku](https://nos-haiku.vercel.app/)
- [Snort](https://snort.social/)
- [noStrudel](https://nostrudel.ninja/)
ここではnostterを使って説明していきます。
# 準備
カスタム絵文字を使うための準備です。
- Nostrエクステンション(NIP-07)を導入する
- 使いたいカスタム絵文字をリストに登録する
## Nostrエクステンション(NIP-07)を導入する
Nostrエクステンションは使いたいカスタム絵文字を登録する時に必要になります。
また、環境(パソコン、iPhone、androidなど)によって導入方法が違います。
Nostrエクステンションを導入する端末は、実際にNostrを閲覧する端末と違っても構いません(リスト登録はPC、Nostr閲覧はiPhoneなど)。
Nostrエクステンション(NIP-07)の導入方法は以下のページを参照してください。
[ログイン拡張機能 (NIP-07)を使ってみよう | Welcome to Nostr! ~ Nostrをはじめよう! ~ ](https://welcome.nostr-jp.org/tutorial/nip-07.html)
少し面倒ですが、これを導入しておくとNostr上の様々な場面で役立つのでより快適になります。
## 使いたいカスタム絵文字をリストに登録する
以下のサイトで行います。
[emojito](https://emojito.meme/)
右上の**Get started**からNostrエクステンションでログインしてください。
例として以下のカスタム絵文字を導入してみます。
実際より絵文字が少なく表示されることがありますが、古い状態のデータを取得してしまっているためです。その場合はブラウザの更新ボタンを押してください。
[generalJP | カスタム絵文字](https://emojito.meme/a/naddr1qqykwetwv4exzmz22qq3uamnwvaz7tmwdaehgun2vykkkctjdyhxset8w4ex7tnrdakj7q3qa3pvwe2p3v7mnjz6hle63r628wl9w567aw7u23fzqs062v5vqcqqxpqqqp65uhjtrk6)

- 右側の**Options**から**Bookmark**を選択

これでカスタム絵文字を使用するためのリストに登録できます。
# カスタム絵文字を使用する
例としてブラウザから使えるクライアント nostter から使用してみます。
[nostter](https://nostter.app/)
nostterにNostrエクステンションでログイン、もしくは秘密鍵を入れてログインしてください。
## 文章中に使用
1. **投稿**ボタンを押して投稿ウィンドウを表示
2. **顔😀**のボタンを押し、絵文字ウィンドウを表示
3. ***タブ**を押し、カスタム絵文字一覧を表示
4. カスタム絵文字を選択
5. : 記号に挟まれたアルファベットのショートコードとして挿入される

この状態で投稿するとカスタム絵文字として表示されます。
カスタム絵文字対応クライアントを使っている他ユーザーにもカスタム絵文字として表示されます。
対応していないクライアントの場合、ショートコードのまま表示されます。

ショートコードを直接入力することでカスタム絵文字の候補が表示されるのでそこから選択することもできます。

## リアクションに使用
1. 任意の投稿の**顔😀**のボタンを押し、絵文字ウィンドウを表示
2. ***タブ**を押し、カスタム絵文字一覧を表示
3. カスタム絵文字を選択

カスタム絵文字リアクションを送ることができます。

# カスタム絵文字を探す
先述した[emojito](https://emojito.meme/)からカスタム絵文字を探せます。
例えば任意のユーザーのページ [emojito ロクヨウ](https://emojito.meme/p/npub1a3pvwe2p3v7mnjz6hle63r628wl9w567aw7u23fzqs062v5vqcqqu3sgh3) から探したり、 [emojito Browse all](https://emojito.meme/browse) からnostr全体で最近作成、更新された絵文字を見たりできます。
また、以下のリンクは日本語圏ユーザーが作ったカスタム絵文字を集めたリストです(2025/02/06)
※漏れがあるかもしれません
[日本ユーザー作 カスタム絵文字](https://nostviewstr.vercel.app/npub17hczqvxtfv3w69wr6lxrttnpdekwdwel55mld60fr24zwjuu6utqtj8mjx/10030)
各絵文字セットにある**Open in emojito**のリンクからemojitoに飛び、使用リストに追加できます。
-----------
以上です。
次:Nostrのカスタム絵文字の**作り方**
Yakihonneリンク [Nostrのカスタム絵文字の作り方](https://yakihonne.com/article/_@lokuyow.github.io/1707912490439)
Nostrリンク nostr:naddr1qqxnzdesxuunzv358ycrgveeqgswcsk8v4qck0deepdtluag3a9rh0jh2d0wh0w9g53qg8a9x2xqvqqrqsqqqa28r5psx3
-----------
# 仕様
[NIP-30 Custom Emoji](https://github.com/nostr-protocol/nips/blob/master/30.md)
[NIP-30 カスタム絵文字(和訳)](https://github.com/nostr-jp/nips-ja/blob/main/30.md)
-

@ e3ba5e1a:5e433365
2025-02-04 08:29:00
President Trump has started rolling out his tariffs, something I [blogged about in November](https://www.snoyman.com/blog/2024/11/steelmanning-tariffs/). People are talking about these tariffs a lot right now, with many people (correctly) commenting on how consumers will end up with higher prices as a result of these tariffs. While that part is true, I’ve seen a lot of people taking it to the next, incorrect step: that consumers will pay the entirety of the tax. I [put up a poll on X](https://x.com/snoyberg/status/1886035800019599808) to see what people thought, and while the right answer got a lot of votes, it wasn't the winner.

For purposes of this blog post, our ultimate question will be the following:
* Suppose apples currently sell for $1 each in the entire United States.
* There are domestic sellers and foreign sellers of apples, all receiving the same price.
* There are no taxes or tariffs on the purchase of apples.
* The question is: if the US federal government puts a $0.50 import tariff per apple, what will be the change in the following:
* Number of apples bought in the US
* Price paid by buyers for apples in the US
* Post-tax price received by domestic apple producers
* Post-tax price received by foreign apple producers
Before we can answer that question, we need to ask an easier, first question: before instituting the tariff, why do apples cost $1?
And finally, before we dive into the details, let me provide you with the answers to the ultimate question. I recommend you try to guess these answers before reading this, and if you get it wrong, try to understand why:
1. The number of apples bought will go down
2. The buyers will pay more for each apple they buy, but not the full amount of the tariff
3. Domestic apple sellers will receive a *higher* price per apple
4. Foreign apple sellers will receive a *lower* price per apple, but not lowered by the full amount of the tariff
In other words, regardless of who sends the payment to the government, both taxed parties (domestic buyers and foreign sellers) will absorb some of the costs of the tariff, while domestic sellers will benefit from the protectionism provided by tariffs and be able to sell at a higher price per unit.
## Marginal benefit
All of the numbers discussed below are part of a [helper Google Sheet](https://docs.google.com/spreadsheets/d/14ZbkWpw1B9Q1UDB9Yh47DmdKQfIafVVBKbDUsSIfGZw/edit?usp=sharing) I put together for this analysis. Also, apologies about the jagged lines in the charts below, I hadn’t realized before starting on this that there are [some difficulties with creating supply and demand charts in Google Sheets](https://superuser.com/questions/1359731/how-to-create-a-supply-demand-style-chart).
Let’s say I absolutely love apples, they’re my favorite food. How much would I be willing to pay for a single apple? You might say “$1, that’s the price in the supermarket,” and in many ways you’d be right. If I walk into supermarket A, see apples on sale for $50, and know that I can buy them at supermarket B for $1, I’ll almost certainly leave A and go buy at B.
But that’s not what I mean. What I mean is: how high would the price of apples have to go *everywhere* so that I’d no longer be willing to buy a single apple? This is a purely personal, subjective opinion. It’s impacted by how much money I have available, other expenses I need to cover, and how much I like apples. But let’s say the number is $5.
How much would I be willing to pay for another apple? Maybe another $5. But how much am I willing to pay for the 1,000th apple? 10,000th? At some point, I’ll get sick of apples, or run out of space to keep the apples, or not be able to eat, cook, and otherwise preserve all those apples before they rot.
The point being: I’ll be progressively willing to spend less and less money for each apple. This form of analysis is called *marginal benefit*: how much benefit (expressed as dollars I’m willing to spend) will I receive from each apple? This is a downward sloping function: for each additional apple I buy (quantity demanded), the price I’m willing to pay goes down. This is what gives my personal *demand curve*. And if we aggregate demand curves across all market participants (meaning: everyone interested in buying apples), we end up with something like this:

Assuming no changes in people’s behavior and other conditions in the market, this chart tells us how many apples will be purchased by our buyers at each price point between $0.50 and $5. And ceteris paribus (all else being equal), this will continue to be the demand curve for apples.
## Marginal cost
Demand is half the story of economics. The other half is supply, or: how many apples will I sell at each price point? Supply curves are upward sloping: the higher the price, the more a person or company is willing and able to sell a product.
Let’s understand why. Suppose I have an apple orchard. It’s a large property right next to my house. With about 2 minutes of effort, I can walk out of my house, find the nearest tree, pick 5 apples off the tree, and call it a day. 5 apples for 2 minutes of effort is pretty good, right?
Yes, there was all the effort necessary to buy the land, and plant the trees, and water them… and a bunch more than I likely can’t even guess at. We’re going to ignore all of that for our analysis, because for short-term supply-and-demand movement, we can ignore these kinds of *sunk costs*. One other simplification: in reality, supply curves often start descending before ascending. This accounts for achieving efficiencies of scale after the first number of units purchased. But since both these topics are unneeded for understanding taxes, I won’t go any further.
Anyway, back to my apple orchard. If someone offers me $0.50 per apple, I can do 2 minutes of effort and get $2.50 in revenue, which equates to a $75/hour wage for me. I’m more than happy to pick apples at that price\!
However, let’s say someone comes to buy 10,000 apples from me instead. I no longer just walk out to my nearest tree. I’m going to need to get in my truck, drive around, spend the day in the sun, pay for gas, take a day off of my day job (let’s say it pays me $70/hour). The costs go up significantly. Let’s say it takes 5 days to harvest all those apples myself, it costs me $100 in fuel and other expenses, and I lose out on my $70/hour job for 5 days. We end up with:
* Total expenditure: $100 \+ $70 \* 8 hours a day \* 5 days \== $2900
* Total revenue: $5000 (10,000 apples at $0.50 each)
* Total profit: $2100
So I’m still willing to sell the apples at this price, but it’s not as attractive as before. And as the number of apples purchased goes up, my costs keep increasing. I’ll need to spend more money on fuel to travel more of my property. At some point I won’t be able to do the work myself anymore, so I’ll need to pay others to work on the farm, and they’ll be slower at picking apples than me (less familiar with the property, less direct motivation, etc.). The point being: at some point, the number of apples can go high enough that the $0.50 price point no longer makes me any money.
This kind of analysis is called *marginal cost*. It refers to the additional amount of expenditure a seller has to spend in order to produce each additional unit of the good. Marginal costs go up as quantity sold goes up. And like demand curves, if you aggregate this data across all sellers, you get a supply curve like this:

## Equilibrium price
We now know, for every price point, how many apples buyers will purchase, and how many apples sellers will sell. Now we find the equilibrium: where the supply and demand curves meet. This point represents where the marginal benefit a buyer would receive from the next buyer would be less than the cost it would take the next seller to make it. Let’s see it in a chart:

You’ll notice that these two graphs cross at the $1 price point, where 63 apples are both demanded (bought by consumers) and supplied (sold by producers). This is our equilibrium price. We also have a visualization of the *surplus* created by these trades. Everything to the left of the equilibrium point and between the supply and demand curves represents surplus: an area where someone is receiving something of more value than they give. For example:
* When I bought my first apple for $1, but I was willing to spend $5, I made $4 of consumer surplus. The consumer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and above the equilibrium price point.
* When a seller sells his first apple for $1, but it only cost $0.50 to produce it, the seller made $0.50 of producer surplus. The producer portion of the surplus is everything to the left of the equilibrium point, between the supply and demand curves, and below the equilibrium price point.
Another way of thinking of surplus is “every time someone got a better price than they would have been willing to take.”
OK, with this in place, we now have enough information to figure out how to price in the tariff, which we’ll treat as a negative externality.
## Modeling taxes
Alright, the government has now instituted a $0.50 tariff on every apple sold within the US by a foreign producer. We can generally model taxes by either increasing the marginal cost of each unit sold (shifting the supply curve up), or by decreasing the marginal benefit of each unit bought (shifting the demand curve down). In this case, since only some of the producers will pay the tax, it makes more sense to modify the supply curve.
First, let’s see what happens to the foreign seller-only supply curve when you add in the tariff:

With the tariff in place, for each quantity level, the price at which the seller will sell is $0.50 higher than before the tariff. That makes sense: if I was previously willing to sell my 82nd apple for $3, I would now need to charge $3.50 for that apple to cover the cost of the tariff. We see this as the tariff “pushing up” or “pushing left” the original supply curve.
We can add this new supply curve to our existing (unchanged) supply curve for domestic-only sellers, and we end up with a result like this:

The total supply curve adds up the individual foreign and domestic supply curves. At each price point, we add up the total quantity each group would be willing to sell to determine the total quantity supplied for each price point. Once we have that cumulative supply curve defined, we can produce an updated supply-and-demand chart including the tariff:

As we can see, the equilibrium has shifted:
* The equilibrium price paid by consumers has risen from $1 to $1.20.
* The total number of apples purchased has dropped from 63 apples to 60 apples.
* Consumers therefore received 3 less apples. They spent $72 for these 60 apples, whereas previously they spent $63 for 3 more apples, a definite decrease in consumer surplus.
* Foreign producers sold 36 of those apples (see the raw data in the linked Google Sheet), for a gross revenue of $43.20. However, they also need to pay the tariff to the US government, which accounts for $18, meaning they only receive $25.20 post-tariff. Previously, they sold 42 apples at $1 each with no tariff to be paid, meaning they took home $42.
* Domestic producers sold the remaining 24 apples at $1.20, giving them a revenue of $28.80. Since they don’t pay the tariff, they take home all of that money. By contrast, previously, they sold 21 apples at $1, for a take-home of $21.
* The government receives $0.50 for each of the 60 apples sold, or in other words receives $30 in revenue it wouldn’t have received otherwise.
We could be more specific about the surpluses, and calculate the actual areas for consumer surplus, producer surplus, inefficiency from the tariff, and government revenue from the tariff. But I won’t bother, as those calculations get slightly more involved. Instead, let’s just look at the aggregate outcomes:
* Consumers were unquestionably hurt. Their price paid went up by $0.20 per apple, and received less apples.
* Foreign producers were also hurt. Their price received went down from the original $1 to the new post-tariff price of $1.20, minus the $0.50 tariff. In other words: foreign producers only receive $0.70 per apple now. This hurt can be mitigated by shifting sales to other countries without a tariff, but the pain will exist regardless.
* Domestic producers scored. They can sell less apples and make more revenue doing it.
* And the government walked away with an extra $30.
Hopefully you now see the answer to the original questions. Importantly, while the government imposed a $0.50 tariff, neither side fully absorbed that cost. Consumers paid a bit more, foreign producers received a bit less. The exact details of how that tariff was split across the groups is mediated by the relevant supply and demand curves of each group. If you want to learn more about this, the relevant search term is “price elasticity,” or how much a group’s quantity supplied or demanded will change based on changes in the price.
## Other taxes
Most taxes are some kind of a tax on trade. Tariffs on apples is an obvious one. But the same applies to income tax (taxing the worker for the trade of labor for money) or payroll tax (same thing, just taxing the employer instead). Interestingly, you can use the same model for analyzing things like tax incentives. For example, if the government decided to subsidize domestic apple production by giving the domestic producers a $0.50 bonus for each apple they sell, we would end up with a similar kind of analysis, except instead of the foreign supply curve shifting up, we’d see the domestic supply curve shifting down.
And generally speaking, this is what you’ll *always* see with government involvement in the economy. It will result in disrupting an existing equilibrium, letting the market readjust to a new equilibrium, and incentivization of some behavior, causing some people to benefit and others to lose out. We saw with the apple tariff, domestic producers and the government benefited while others lost.
You can see the reverse though with tax incentives. If I give a tax incentive of providing a deduction (not paying income tax) for preschool, we would end up with:
* Government needs to make up the difference in tax revenue, either by raising taxes on others or printing more money (leading to inflation). Either way, those paying the tax or those holding government debased currency will pay a price.
* Those people who don’t use the preschool deduction will receive no benefit, so they simply pay a cost.
* Those who do use the preschool deduction will end up paying less on tax+preschool than they would have otherwise.
This analysis is fully amoral. It’s not saying whether providing subsidized preschool is a good thing or not, it simply tells you where the costs will be felt, and points out that such government interference in free economic choice does result in inefficiencies in the system. Once you have that knowledge, you’re more well educated on making a decision about whether the costs of government intervention are worth the benefits.