-

@ d1d95580:0e253b97
2025-03-12 16:43:53
Bitcoin is grabbing attention today, March 12, 2025, with its price surging nearly 2.3% to $81,871.0 by mid-afternoon (CET), as reported by Investing.com. The spark? U.S. inflation data for February, released this morning, landed cooler than expected, calming fears of runaway price pressures. This softer reading has ignited a rally in risk-on assets like Bitcoin, lifting it from a recent skid below $77,000 earlier this week. After a shaky stretch, today’s bounce shows just how tightly Bitcoin tracks macroeconomic pulses, with traders now eyeing a potential push past $82,000—a key psychological level.
The rebound follows a turbulent few days. Bitcoin was scraping four-month lows as recently as Monday, dragged down by a risk-off mood across markets. Today’s swift turnaround highlights its volatility and its role as a barometer for investor sentiment. If this momentum holds, it could signal a fresh wave of optimism, though cautious voices warn that broader economic uncertainties—like the Federal Reserve’s next moves—still loom large.
## Beyond the Price: Indirect Currents Shaping Bitcoin
Bitcoin’s story today isn’t just about the ticker. Several undercurrents are quietly influencing its ecosystem, starting with energy markets. Oil prices edged up slightly today, per Yahoo Finance, a subtle but real factor for Bitcoin miners who rely on energy to secure the network. Rising energy costs could pinch mining profitability, especially in fossil-fuel-dependent regions, potentially nudging hash rate dynamics in the weeks ahead. It’s not front-page news today, but this slow-moving variable remains a critical piece of Bitcoin’s proof-of-work puzzle.
On the regulatory horizon, fresh developments are stirring. Senator Cynthia Lummis reintroduced the Bitcoin Act today, according to X posts from crypto watchers, aiming to solidify Bitcoin’s legal status in the U.S. Details are scarce, but the proposal reflects growing momentum to weave Bitcoin into the financial fabric—a long-term tailwind that’s picking up steam. Meanwhile, Trump’s Strategic Bitcoin Reserve idea, still a talking point on X, floats as a bold vision for a national stash. No firm updates broke today, but these policy threads ripple in the background, bolstering Bitcoin’s case as a systemic contender.
## Macro Ties and Market Context
Zoom out, and macroeconomic shadows come into view. The U.S. dollar softened slightly today after the inflation data, per Bloomberg, a move that often lifts Bitcoin’s appeal as an alternative store of value. If dollar weakness persists, it could amplify BTC’s shine, especially with inflation still a hot topic despite today’s numbers. Equity markets, like the Nasdaq, also ticked up modestly, per Reuters, mirroring the risk-on vibe boosting Bitcoin. These aren’t direct drivers but weave a broader tapestry of sentiment that Bitcoin both reflects and resists.
Today’s price pop steals the show—a vivid reminder of how fast Bitcoin can pivot when new data lands. Whether this is a springboard to higher ground or a fleeting breather in a choppy 2025, the interplay of miners, policymakers, and macro forces keeps Bitcoin’s narrative dynamic. The blockchain hums on, but it’s the world around it that’s turning up the volume.
Stay tuned—this ride’s far from over.
-

@ 04c915da:3dfbecc9
2025-03-12 15:30:46
Recently we have seen a wave of high profile X accounts hacked. These attacks have exposed the fragility of the status quo security model used by modern social media platforms like X. Many users have asked if nostr fixes this, so lets dive in. How do these types of attacks translate into the world of nostr apps? For clarity, I will use X’s security model as representative of most big tech social platforms and compare it to nostr.
**The Status Quo**
On X, you never have full control of your account. Ultimately to use it requires permission from the company. They can suspend your account or limit your distribution. Theoretically they can even post from your account at will. An X account is tied to an email and password. Users can also opt into two factor authentication, which adds an extra layer of protection, a login code generated by an app. In theory, this setup works well, but it places a heavy burden on users. You need to create a strong, unique password and safeguard it. You also need to ensure your email account and phone number remain secure, as attackers can exploit these to reset your credentials and take over your account. Even if you do everything responsibly, there is another weak link in X infrastructure itself. The platform’s infrastructure allows accounts to be reset through its backend. This could happen maliciously by an employee or through an external attacker who compromises X’s backend. When an account is compromised, the legitimate user often gets locked out, unable to post or regain control without contacting X’s support team. That process can be slow, frustrating, and sometimes fruitless if support denies the request or cannot verify your identity. Often times support will require users to provide identification info in order to regain access, which represents a privacy risk. The centralized nature of X means you are ultimately at the mercy of the company’s systems and staff.
**Nostr Requires Responsibility**
Nostr flips this model radically. Users do not need permission from a company to access their account, they can generate as many accounts as they want, and cannot be easily censored. The key tradeoff here is that users have to take complete responsibility for their security. Instead of relying on a username, password, and corporate servers, nostr uses a private key as the sole credential for your account. Users generate this key and it is their responsibility to keep it safe. As long as you have your key, you can post. If someone else gets it, they can post too. It is that simple. This design has strong implications. Unlike X, there is no backend reset option. If your key is compromised or lost, there is no customer support to call. In a compromise scenario, both you and the attacker can post from the account simultaneously. Neither can lock the other out, since nostr relays simply accept whatever is signed with a valid key.
The benefit? No reliance on proprietary corporate infrastructure.. The negative? Security rests entirely on how well you protect your key.
**Future Nostr Security Improvements**
For many users, nostr’s standard security model, storing a private key on a phone with an encrypted cloud backup, will likely be sufficient. It is simple and reasonably secure. That said, nostr’s strength lies in its flexibility as an open protocol. Users will be able to choose between a range of security models, balancing convenience and protection based on need.
One promising option is a web of trust model for key rotation. Imagine pre-selecting a group of trusted friends. If your account is compromised, these people could collectively sign an event announcing the compromise to the network and designate a new key as your legitimate one. Apps could handle this process seamlessly in the background, notifying followers of the switch without much user interaction. This could become a popular choice for average users, but it is not without tradeoffs. It requires trust in your chosen web of trust, which might not suit power users or large organizations. It also has the issue that some apps may not recognize the key rotation properly and followers might get confused about which account is “real.”
For those needing higher security, there is the option of multisig using FROST (Flexible Round-Optimized Schnorr Threshold). In this setup, multiple keys must sign off on every action, including posting and updating a profile. A hacker with just one key could not do anything. This is likely overkill for most users due to complexity and inconvenience, but it could be a game changer for large organizations, companies, and governments. Imagine the White House nostr account requiring signatures from multiple people before a post goes live, that would be much more secure than the status quo big tech model.
Another option are hardware signers, similar to bitcoin hardware wallets. Private keys are kept on secure, offline devices, separate from the internet connected phone or computer you use to broadcast events. This drastically reduces the risk of remote hacks, as private keys never touches the internet. It can be used in combination with multisig setups for extra protection. This setup is much less convenient and probably overkill for most but could be ideal for governments, companies, or other high profile accounts.
---
Nostr’s security model is not perfect but is robust and versatile. Ultimately users are in control and security is their responsibility. Apps will give users multiple options to choose from and users will choose what best fits their need.
-

@ 9dd283b1:cf9b6beb
2025-03-12 09:46:45
My Raspberry Pi 4 (running Umbrel) has been disconnecting approximately once a month, and my 1TB SSD now has only 80GB of space remaining. I'm considering an upgrade—possibly moving to a Pi 5 with a 2TB drive—but I'm open to any suggestions for a better setup within a similar budget. Any recommendations?
originally posted at https://stacker.news/items/911133
-

@ f25afb62:8d50c6e7
2025-03-12 04:11:46
https://i.postimg.cc/6p0S1LrR/Kiwi-bitcoin.png
# Modernizing the Kiwi Dollar: How Kiwibank Can Lead the Future of Money
## **A Nation at an Inflection Point**
Kiwibank’s upcoming capital raise offers New Zealand a rare opportunity to **future-proof its currency and banking system**. With up to **$500 million** in new capital on the table, the government aims to strengthen Kiwibank as a competitor to the dominant Australian-owned banks. Finance Minister Nicola Willis has emphasized that **more capital means greater competition**, which could **drive down interest rates** and improve banking services for everyday Kiwis.
But this is more than just a competition play—it's a **chance to radically modernize the Kiwi dollar itself**.
By integrating **Bitcoin's open infrastructure**, Kiwibank could issue a **digitally native, globally liquid, and ultra-secure NZD**. This wouldn’t require reinventing the financial system but rather **leveraging existing and proven Bitcoin technologies**. The result? A financial system that **empowers Kiwis**, attracts global investment, and **puts New Zealand at the forefront of monetary innovation**.
This article outlines a **practical, step-by-step roadmap** for how Kiwibank could:
1. **Tokenize the New Zealand Dollar (NZD)** using **a Bitcoin sidechain like Liquid**.
2. **Issue Kiwi eCash**, providing **cash-like digital money** that’s private and fast.
3. **Enable global NZD payments via the Lightning Network**, making NZD as **instant and accessible as Bitcoin itself**.
4. **Unlock new Bitcoin-powered business models** that **expand Kiwibank’s revenue streams**.
This isn’t a distant dream—it’s **completely feasible today**. The question is: **Will New Zealand lead or lag?** 🚀⚡🇳🇿
---
## **Kiwibank’s Capital Raise – A Launchpad for Innovation**
Kiwibank is raising fresh capital **to strengthen its position against the Big Four banks**, but this money could do much more than just improve traditional banking services. **It could lay the foundation for a digital-first Kiwi dollar, designed for the 21st century.**
New Zealand is actively **courting global investment**, simplifying its **“golden visa”** program to attract **wealthy innovators and investors**. If Kiwibank integrates **Bitcoin-powered financial infrastructure**, it would send a **strong signal that New Zealand is open for high-tech finance business**—drawing interest from:
- **Kiwi citizens**, who would benefit from a **better, faster, and cheaper** banking system.
- **KiwiSaver funds and institutional investors**, who would see Kiwibank as a **bold growth investment**.
- **Global Bitcoiners**, who might **invest in NZ** or move their wealth into a **Bitcoin-friendly jurisdiction**.
Simply put, **this capital raise is a chance to future-proof the Kiwi financial system**—and Bitcoin provides the tools to make it happen.
---
## **Step 1: Tokenized NZD on a Bitcoin Sidechain**
The **first step** in modernizing NZD is **bringing it onto Bitcoin rails** by issuing a **tokenized NZD** on **a Bitcoin sidechain** like **Liquid** or **a custom-built KiwiBTC sidechain**.
### **How It Works**
- Kiwibank, alongside other NZ banks, could **issue digital NZD tokens**, backed **1:1 by reserves**.
- This would be **secured on a federated Bitcoin sidechain**—a **fast, low-fee** network pegged to Bitcoin.
- Transactions would **settle in seconds instead of days**, with **confidentiality features** ensuring **financial privacy**.
This is **not an experiment**—it's **already being done**. **Tether (USDT) uses Liquid today** to issue stablecoins, and the same **proven tech** could be used to issue NZD.
### **Why This Matters**
- **Faster Payments:** Move NZD **instantly**, unlike today’s slow banking rails.
- **Global Liquidity:** Anyone, anywhere, could **hold and transact NZD digitally**.
- **No Need for a CBDC:** The NZ government **retains full control** over monetary policy, without creating a **central bank-controlled digital currency**.
This **solves many of the problems** the Reserve Bank of New Zealand has been grappling with in its **CBDC research**—by **using open Bitcoin tech instead of building from scratch**.
---
## **Step 2: Kiwi eCash – Digital Money With Cash-Like Privacy**
While a **tokenized NZD** would **revolutionize banking and business payments**, **Kiwi eCash** would do the same for **everyday transactions and person-to-person payments**.
**Kiwi eCash** is a **Chaumian eCash system**—a **digital cash** that **preserves privacy and security**, just like physical banknotes. It’s based on **battle-tested cryptographic blind signatures**, meaning:
- **No bank account required.**
- **No transaction tracking.**
- **Total financial privacy.**
### **How It Works**
- **NZ banks (or independent issuers) mint Kiwi eCash tokens**, backed by **tokenized NZD or Bitcoin**.
- These tokens are **held in a wallet and can be spent freely**—just like handing someone cash.
- Banks **don’t see individual transactions**, ensuring privacy.
- Multiple issuers (banks, credit unions, or fintech firms) could **offer interoperable Kiwi eCash mints**.
This is already happening with **Bitcoin eCash mints like Cashu and Fedimint**, and the **same concept** can be applied to **NZD**.
### **Why It Matters**
- **Digital cash with cash-like privacy**—protecting **financial freedom**.
- **Fast, free transactions**, perfect for **micro-payments and daily spending**.
- **Works offline**, unlike today’s banking apps.
- **Interoperable across banks**, reducing monopolistic control.
---
## **Step 3: Bridging Kiwi eCash to Lightning – NZD at the Speed of Bitcoin**
The **final piece** of the puzzle is **making Kiwi eCash as fast and global as Bitcoin itself**.
By **bridging Kiwi eCash to the Lightning Network** (via **Taproot Assets**), NZD transactions would become:
- **Instant:** Settle in **milliseconds**, anywhere in the world.
- **Global:** Easily convert NZD to **any currency, anywhere**.
- **Ultra-cheap:** Fees near **zero**, unlike Visa or SWIFT.
### **How It Works**
- Kiwi eCash is **wrapped into Lightning channels** using **Taproot Assets**.
- **Payments flow instantly over Lightning**, just like Bitcoin transactions.
- Merchants, individuals, and businesses can **send and receive NZD globally** in a **Bitcoin-compatible format**.
This **integrates NZD directly into the Bitcoin economy**, giving it **instant global reach**.
---
## **Step 4: New Bitcoin-Powered Services for Kiwibank**
Beyond modernizing NZD itself, **Bitcoin infrastructure unlocks entire new revenue streams** for Kiwibank:
1. **Bitcoin Custody:** Offer **multi-sig vaults** instead of **risky single-key custody**.
2. **Bitcoin Lending:** Let customers **borrow NZD against their BTC**—a proven model.
3. **Lightning Yield:** Earn **fees by providing Lightning liquidity**.
4. **Collaborative Bitcoin Custody:** Offer **collaborative custody** where customers **retain control** and Kiwibank is available for **recovery assistance**.
5. **Digital Securities**: Help **Kiwi business raise capital** with **digital securities on the Bitcoin sidechain** and facilitate **secondary market liquidity** of these securities.
Each of these **aligns with Bitcoin’s strengths** while **expanding Kiwibank’s business model**.
---
## **A Bold Vision to Future-Proof the Kiwi Financial System**
This **isn’t just an idea**—it’s **a path forward that’s 100% possible today**.
- **For New Zealanders:** A **faster, fairer financial system** that puts power back in their hands.
- **For Investors:** A **banking innovation play**, positioned for growth.
- **For Bitcoiners worldwide:** A **Bitcoin-friendly financial hub**, with real-world Bitcoin services.
Kiwibank has **a golden opportunity** to lead this transformation. The technology is ready, the capital is available, and the global financial landscape is **ripe for disruption**.
The only question left is:
**Will New Zealand lead, or will we be left behind?**
🚀⚡🇳🇿
---
## **Sources**
1. Kiwibank Capital Raise: [NZ Lawyer](https://www.thelawyermag.com/nz/practice-areas/banking-and-finance/kiwibank-to-receive-500m-boost-as-government-targets-greater-competition-in-banking-sector/517422)
2. New Zealand Active Investor Visa: [NZTE](https://www.nzte.govt.nz/page/investor-migrants)
3. Taproot Assets & Lightning: [Lightning Labs](https://docs.lightning.engineering/the-lightning-network/taproot-assets)
4. Bitcoin Sidechains & Liquid: [Blockstream](https://blockstream.com/elements/)
5. Bitcoin eCash (Cashu/Fedimint): [Cashu](https://cashu.space/)
---
originally posted at https://stacker.news/items/911023
-

@ 21335073:a244b1ad
2025-03-12 00:40:25
Before I saw those X right-wing political “influencers” parading their Epstein binders in that PR stunt, I’d already posted this on Nostr, an open protocol.
“Today, the world’s attention will likely fixate on Epstein, governmental failures in addressing horrific abuse cases, and the influential figures who perpetrate such acts—yet few will center the victims and survivors in the conversation. The survivors of Epstein went to law enforcement and very little happened. The survivors tried to speak to the corporate press and the corporate press knowingly covered for him. In situations like these social media can serve as one of the only ways for a survivor’s voice to be heard.
It’s becoming increasingly evident that the line between centralized corporate social media and the state is razor-thin, if it exists at all. Time and again, the state shields powerful abusers when it’s politically expedient to do so. In this climate, a survivor attempting to expose someone like Epstein on a corporate tech platform faces an uphill battle—there’s no assurance their voice would even break through. Their story wouldn’t truly belong to them; it’d be at the mercy of the platform, subject to deletion at a whim. Nostr, though, offers a lifeline—a censorship-resistant space where survivors can share their truths, no matter how untouchable the abuser might seem. A survivor could remain anonymous here if they took enough steps.
Nostr holds real promise for amplifying survivor voices. And if you’re here daily, tossing out memes, take heart: you’re helping build a foundation for those who desperately need to be heard.“
That post is untouchable—no CEO, company, employee, or government can delete it. Even if I wanted to, I couldn’t take it down myself. The post will outlive me on the protocol.
The cozy alliance between the state and corporate social media hit me hard during that right-wing X “influencer” PR stunt. Elon owns X. Elon’s a special government employee. X pays those influencers to post. We don’t know who else pays them to post. Those influencers are spurred on by both the government and X to manage the Epstein case narrative. It wasn’t survivors standing there, grinning for photos—it was paid influencers, gatekeepers orchestrating yet another chance to re-exploit the already exploited.
The bond between the state and corporate social media is tight. If the other Epsteins out there are ever to be unmasked, I wouldn’t bet on a survivor’s story staying safe with a corporate tech platform, the government, any social media influencer, or mainstream journalist. Right now, only a protocol can hand survivors the power to truly own their narrative.
I don’t have anything against Elon—I’ve actually been a big supporter. I’m just stating it as I see it. X isn’t censorship resistant and they have an algorithm that they choose not the user. Corporate tech platforms like X can be a better fit for some survivors. X has safety tools and content moderation, making it a solid option for certain individuals. Grok can be a big help for survivors looking for resources or support! As a survivor, you know what works best for you, and safety should always come first—keep that front and center.
That said, a protocol is a game-changer for cases where the powerful are likely to censor. During China's # MeToo movement, survivors faced heavy censorship on social media platforms like Weibo and WeChat, where posts about sexual harassment were quickly removed, and hashtags like # MeToo or "woyeshi" were blocked by government and platform filters. To bypass this, activists turned to blockchain technology encoding their stories—like Yue Xin’s open letter about a Peking University case—into transaction metadata. This made the information tamper-proof and publicly accessible, resisting censorship since blockchain data can’t be easily altered or deleted.
I posted this on X 2/28/25. I wanted to try my first long post on a nostr client. The Epstein cover up is ongoing so it’s still relevant, unfortunately.
If you are a survivor or loved one who is reading this and needs support please reach out to:
National Sexual Assault Hotline 24/7
https://rainn.org/
Hours: Available 24 hours
-

@ 57d1a264:69f1fee1
2025-03-11 16:17:44
You can learn about what we’re doing at lava on our website: [lava.xyz](http://lava.xyz). We recommend you take a thorough look through everything before applying.
Not an immediate fit? Lava has an open referral bounty. If you refer someone to us and we hire them, we will pay you $5k for an in-person NYC full-time hire and $1k for non-NYC full time hires. Send referrals to [hello@lava.xyz](mailto:hello@lava.xyz)
We are looking for a designer to join our team at Lava. In this role, you will be responsible for leading the design of all of our products.
**What you will do**
- Drive and execute on an ambitious design vision for Lava
- Communicate with engineering teams to make sure designs are implemented properly
- Talk to users, analyze user feedback, and identify areas for improvement
**What we look for in you**
- You align with the guidelines and values we use to decide who we hire and how we operate: https://www.lava.xyz/onepager
- Expertise as a designer
- You are a great communicator (written and verbal).
- You are extremely organized.
- You learn fast.
- You work hard.
- You get shit done quickly.
- You live in NYC, or you’re willing to relocate to NYC.
If you feel that the above describes you, we’d love to hear from you!
Please fill out this form: https://forms.gle/cJFsuP3tXgSknPJ8A
Job Description: [https://lavaxyz.notion.site/Founding-Designer-78c91e29f4a44d0b8cb32e33ff40c167?pvs=4](https://www.notion.so/Founding-Designer-78c91e29f4a44d0b8cb32e33ff40c167?pvs=21)
originally posted at https://stacker.news/items/910384
-

@ 57d1a264:69f1fee1
2025-03-11 13:32:15
`Remote only`
`Part Time`
Estamos em busca de um profissional para aprimorar a experiência dos usuários em nossos produtos ramblyn.app. Você trabalhará remotamente com um time pequeno e ágil, colaborando diretamente no design de interfaces. Não nos preocupamos com diplomas, buscamos alguém criativo, organizado e capaz de aprimorar e implementar processos em sua área.
**Requisitos:**
- Experiência com desenvolvimento web e web design.
- Ser uma pessoa organizada, com habilidade para documentar processos.
- Experiência prévia com atendimento ao cliente (diferencial).
- Conhecimento sobre Bitcoin e Lightning Network (diferencial).
- Capacidade de criar interfaces intuitivas e otimizadas para a melhor experiência do usuário.
[APPLY](https://t.me/RamblynHelp)
originally posted at https://stacker.news/items/910158
-

@ 0c469779:4b21d8b0
2025-03-11 10:52:49
### Sobre el amor
Mi percepción del amor cambió con el tiempo.
Leer literatura rusa, principalmente a Dostoevsky, te cambia la perspectiva sobre el amor y la vida en general.
Por mucho tiempo mi visión sobre la vida es que la misma se basa en el sufrimiento: también la Biblia dice esto. El amor es igual, en el amor se sufre y se banca a la otra persona.
El problema es que hay una distinción de sufrimientos que por mucho tiempo no tuve en cuenta. Está el sufrimiento del sacrificio y el sufrimiento masoquista. Para mí eran indistintos.
Para mí el ideal era Aliosha y Natasha de *Humillados y Ofendidos*: estar con alguien que me amase tanto como Natasha a Aliosha, un amor inclusive autodestructivo para Natasha, pero real. Tiene algo de épico, inalcanzable. Un sufrimiento extremo, redentor, es una vara altísima que en la vida cotidiana no se manifiesta.
O el amor de Sonia a Raskolnikov, quien se fue hasta Siberia mientras estuvo en prisión para que no se quede solo en *Crimen y Castigo*.
Este es el tipo de amor que yo esperaba. Y como no me pasó nada tan extremo y las situaciones que llegan a ocurrir en mi vida están lejos de ser tan extremas, me parecía hasta poco lo que estaba pidiendo y que nadie pueda quedarse conmigo me parecía insuficiente.
Ahora pienso que el amor no tiene por qué ser así. Es un pensamiento nuevo que todavía estoy construyendo, y me di cuenta cuando fui a la iglesia, a pesar de que no soy cristiano. La filosofía cristiana me gusta. Va conmigo. Tiene un enfoque de humildad, superación y comunidad que me recuerda al estoicismo.
El amor se trata de resaltar lo mejor que hay en el otro. Se trata de ser un plus, de ayudar.
Por eso si uno no está en su mejor etapa, si no se está cómodo con uno mismo, no se puede amar de verdad. El amor empieza en uno mismo.
Los libros son un espejo, no necesariamente vas a aprender de ellos, sino que te muestran quién sos. Resaltás lo que te importa. Por eso a pesar de saber los tipos de amores que hay en los trabajos de Dostoevsky, cometí los mismos errores varias veces.
Ser mejor depende de uno mismo y cada día se pone el granito de arena.
-

@ 57d1a264:69f1fee1
2025-03-11 10:28:08
## The Role
Our team brings deep expertise across electric power markets, project development, and software development, positioning us as trusted experts in this rapidly evolving market. We are seeking an experienced Software Product Manager to lead the planning, development, and execution of our software products. You will play a key role in defining the product vision, roadmap, and strategy, and you will collaborate closely with cross-functional teams to ensure successful product launches and iterations. The ideal candidate will have an energy background, a deep understanding of user needs, and the ability to balance technical requirements with business objectives.
## Your Day-to-Day
- Product Vision and Strategy: You will define and effectively communicate the product vision, strategy, and roadmap to internal teams and key stakeholders, ensuring alignment between our goals and our customers’ needs to drive product decisions and adoption. To do this, you will need to stay informed on industry trends, emerging technologies, and competition to ensure our product remains innovative and competitive.
- End-to-End Product Development: You will lead the product development process from concept to launch, ensuring timely delivery of features that meet both quality standards and customer expectations. You will gather, prioritize, and articulate product requirements based on user feedback, market trends, and business goals. You will maintain clear and thorough documentation for product features, workflows, and technical specifications. You will
- Performance Analysis and Improvement: You will continuously monitor product performance using key metrics and user feedback to refine and iterate on the product, driving ongoing enhancements. You will advocate for user needs throughout the product development cycle to create products that truly resonate with them and a product experience that provides outsized value.
- Stakeholder Communication and Collaboration: You will synthesize and communicate results, insights, and actionable recommendations to the leadership team and all relevant stakeholders, and you will collaborate cross functionally to remove bottlenecks and be a force multiplier for our team.
[APPLY](https://apply.workable.com/satoshi-energy/j/ba09aa8693/?utm_source=stackernews)
originally posted at https://stacker.news/items/910029
-

@ a95c6243:d345522c
2025-03-11 10:22:36
**«Wir brauchen eine digitale Brandmauer gegen den Faschismus»,** [schreibt](https://www.ccc.de/de/updates/2025/ccc-fordert-digitale-brandmauer) der Chaos Computer Club (CCC) auf seiner Website. Unter diesem Motto präsentierte er letzte Woche einen Forderungskatalog, mit dem sich 24 Organisationen an die kommende Bundesregierung wenden. Der Koalitionsvertrag müsse sich daran messen lassen, verlangen sie.
**In den drei Kategorien «Bekenntnis gegen Überwachung»,** «Schutz und Sicherheit für alle» sowie «Demokratie im digitalen Raum» stellen die [Unterzeichner](https://d-64.org/digitale-brandmauer/), zu denen auch Amnesty International und Das NETTZ gehören, unter anderem die folgenden «Mindestanforderungen»:
* Verbot biometrischer Massenüberwachung des öffentlichen Raums sowie der ungezielten biometrischen Auswertung des Internets.
* Anlasslose und massenhafte Vorratsdatenspeicherung wird abgelehnt.
* Automatisierte Datenanalysen der Informationsbestände der Strafverfolgungsbehörden sowie jede Form von Predictive Policing oder automatisiertes Profiling von Menschen werden abgelehnt.
* Einführung eines Rechts auf Verschlüsselung. Die Bundesregierung soll sich dafür einsetzen, die Chatkontrolle auf europäischer Ebene zu verhindern.
* Anonyme und pseudonyme Nutzung des Internets soll geschützt und ermöglicht werden.
* Bekämpfung «privaten Machtmissbrauchs von Big-Tech-Unternehmen» durch durchsetzungsstarke, unabhängige und grundsätzlich föderale Aufsichtsstrukturen.
* Einführung eines digitalen Gewaltschutzgesetzes, unter Berücksichtigung «gruppenbezogener digitaler Gewalt» und die Förderung von Beratungsangeboten.
* Ein umfassendes Förderprogramm für digitale öffentliche Räume, die dezentral organisiert und quelloffen programmiert sind, soll aufgelegt werden.
**Es sei ein Irrglaube, dass zunehmende Überwachung einen Zugewinn an Sicherheit darstelle,** ist eines der Argumente der Initiatoren. Sicherheit erfordere auch, dass Menschen anonym und vertraulich kommunizieren können und ihre Privatsphäre geschützt wird.
**Gesunde digitale Räume lebten auch von einem demokratischen Diskurs,** lesen wir in dem Papier. Es sei Aufgabe des Staates, Grundrechte zu schützen. Dazu gehöre auch, Menschenrechte und demokratische Werte, insbesondere Freiheit, Gleichheit und Solidarität zu fördern sowie den Missbrauch von Maßnahmen, Befugnissen und Infrastrukturen durch «die Feinde der Demokratie» zu verhindern.
**Man ist geneigt zu fragen, wo denn die Autoren «den Faschismus» sehen,** den es zu bekämpfen gelte. Die meisten der vorgetragenen Forderungen und Argumente finden sicher breite Unterstützung, denn sie beschreiben offenkundig gängige, kritikwürdige Praxis. Die Aushebelung der Privatsphäre, der Redefreiheit und anderer Grundrechte im Namen der Sicherheit wird bereits jetzt massiv durch die aktuellen «demokratischen Institutionen» und ihre «durchsetzungsstarken Aufsichtsstrukturen» betrieben.
**Ist «der Faschismus» also die EU und ihre Mitgliedsstaaten?** Nein, die «faschistische Gefahr», gegen die man eine digitale Brandmauer will, kommt nach Ansicht des CCC und seiner Partner aus den Vereinigten Staaten. Private Überwachung und Machtkonzentration sind dabei weltweit schon lange Realität, jetzt endlich müssen sie jedoch bekämpft werden. In dem Papier heißt es:
> «Die willkürliche und antidemokratische Machtausübung der Tech-Oligarchen um Präsident Trump erfordert einen Paradigmenwechsel in der deutschen Digitalpolitik. (...) Die aktuellen Geschehnisse in den USA zeigen auf, wie Datensammlungen und -analyse genutzt werden können, um einen Staat handstreichartig zu übernehmen, seine Strukturen nachhaltig zu beschädigen, Widerstand zu unterbinden und marginalisierte Gruppen zu verfolgen.»
**Wer auf der anderen Seite dieser Brandmauer stehen soll, ist also klar.** Es sind die gleichen «Feinde unserer Demokratie», die seit Jahren in diese Ecke gedrängt werden. Es sind die gleichen Andersdenkenden, Regierungskritiker und Friedensforderer, die unter dem großzügigen Dach des Bundesprogramms «Demokratie leben» einem «kontinuierlichen Echt- und Langzeitmonitoring» wegen der Etikettierung [«digitaler Hass»](https://bag-gegen-hass.net/) unterzogen werden.
**Dass die 24 Organisationen praktisch auch die Bekämpfung von Google,** Microsoft, Apple, Amazon und anderen fordern, entbehrt nicht der Komik. Diese fallen aber sicher unter das Stichwort «Machtmissbrauch von Big-Tech-Unternehmen». Gleichzeitig verlangen die Lobbyisten implizit zum Beispiel die Förderung des [Nostr](https://reason.com/video/2024/09/17/is-nostr-an-antidote-to-social-media-censorship/)-Netzwerks, denn hier finden wir dezentral organisierte und quelloffen programmierte digitale Räume par excellence, obendrein zensurresistent. Das wiederum dürfte in der Politik weniger gut ankommen.
*\[Titelbild:* *[Pixabay](https://pixabay.com/de/illustrations/uns-ihnen-stammes-wettbewerb-1767691/)]*
***
Dieser Beitrag ist zuerst auf ***[Transition News](https://transition-news.org/digitale-brandmauer-gegen-den-faschismus-von-der-kunftigen-bundesregierung)*** erschienen.