-

@ d1d95580:0e253b97
2025-03-12 17:45:43
---
**Morning: Energize and Focus**
- **Meal:**
- **Option 1:** 2-3 eggs (fried or scrambled in butter) with 4-6 oz of sausage or bacon.
- **Option 2:** Full-fat Greek yogurt (plain) with a handful of mixed nuts and a teaspoon of honey.
- **Why:** High protein and fats provide steady energy; variety ensures accessibility. Based on Saladino and Baker’s emphasis on animal-based nutrition, with a nod to broader dietary preferences.
- **Drink:** Water or black coffee—hydration and focus without complexity.
- **Habit (Inspired by DrJackKruse & hubermanlab):**
- **Natural Light:** 5-15 minutes outdoors in morning light (sunny or overcast).
- **Why:** Regulates sleep-wake cycles and boosts alertness—Kruse’s circadian science and Huberman’s practical neuroscience agree it’s foundational.
- **Learning:**
- **Short Study:** 5-10 minutes reading a health article or listening to a podcast segment (e.g., Huberman Lab on sleep or nutrition).
- **Why:** Starts the day with useful knowledge—small, digestible doses for busy schedules.
---
**Midday: Maintain Momentum**
- **Meal:**
- **Option 1:** Grilled chicken (6-8 oz) with sautéed kale or spinach in olive oil.
- **Option 2:** Baked salmon (5-6 oz) with a small sweet potato and steamed asparagus.
- **Why:** Protein sustains muscle and focus, vegetables add vitamins—combines Baker’s meat focus with Huberman’s balanced nutrient approach.
- **Sport (Inspired by hubermanlab):**
- **Activity Break:** 10-15 minutes of movement—brisk walk, 3 sets of 10 squats, or 15 push-ups.
- **Why:** Improves blood flow and mental clarity—Huberman’s research shows short exercise enhances productivity.
- **Habit:**
- **Water Boost:** Drink 16-20 oz of water (optional pinch of sea salt for electrolytes).
- **Why:** Prevents dehydration, supports stamina—Saladino and Kruse highlight hydration’s role in health.
---
**Afternoon: Stay Steady**
- **Meal (Snack):**
- **Option 1:** 2 hard-boiled eggs with a handful of almonds.
- **Option 2:** A medium apple with 1-2 tablespoons of peanut butter.
- **Why:** Quick, nutrient-rich options stabilize energy—protein, fats, and minimal carbs align with ancestral eating (Saladino) and practical snacking (Huberman).
- **Reading (Inspired by MartyBent):**
- **Daily Read:** 15-20 minutes with a book—e.g., *Atomic Habits* (James Clear) for behavior or *The Body* (Bill Bryson) for health science.
- **Why:** Bent’s curiosity-driven approach—steady learning builds long-term benefits.
- **Habit (Inspired by hubermanlab):**
- **Breathing Pause:** 1-2 minutes of slow breathing (inhale 4 seconds, exhale 6 seconds).
- **Why:** Lowers stress, resets focus—Huberman’s data-backed method for mental resilience.
---
**Evening: Recover and Reflect**
- **Meal:**
- **Option 1:** Pan-seared beef steak (8-10 oz) with roasted carrots or Brussels sprouts.
- **Option 2:** Roasted cod (6 oz) with quinoa (half cup) and a side salad (olive oil dressing).
- **Why:** Protein repairs tissue, sides provide fiber and variety—Saladino’s meat-first philosophy meets Huberman’s holistic nutrition.
- **Sport/Habit (Inspired by DrJackKruse):**
- **Light Movement:** 15-20 minute walk after eating or 5-10 minutes of stretching (focus on back and legs).
- **Why:** Supports digestion and relaxation—Kruse’s focus on natural rhythms, made simple.
- **Learning (Inspired by MartyBent):**
- **Social Scan:** 10 minutes on X, reading or engaging with health-related posts.
- **Why:** Bent’s community engagement—stay informed, connect with ideas.
---
**Night: Rest Well**
- **Habit (Inspired by hubermanlab & DrJackKruse):**
- **Screen Wind-Down:** Reduce screen brightness or use warm lighting 1 hour before bed (target 10-11 PM sleep).
- **Why:** Preserves sleep quality—Huberman and Kruse both stress light’s impact on rest.
- **Reading (Optional):**
- **Night Read:** 10-15 pages of a calming book—e.g., *Sapiens* (Yuval Noah Harari) or a novel like *To Kill a Mockingbird*.
- **Why:** Eases the mind, encourages reflection—pairs well with a thoughtful lifestyle.
---
**Core Principles**
- **Meals:** Prioritize whole foods—protein, healthy fats, moderate vegetables or carbs. Flexible and realistic.
- **Sports:** Brief, effective exercise—enhances health without dominating your day.
- **Habits:** Use natural tools (light, water, breath)—simple, proven, no gimmicks.
- **Learning/Reading:** Consistent input—broaden knowledge practically and gradually.
-

@ 04c915da:3dfbecc9
2025-03-12 15:30:46
Recently we have seen a wave of high profile X accounts hacked. These attacks have exposed the fragility of the status quo security model used by modern social media platforms like X. Many users have asked if nostr fixes this, so lets dive in. How do these types of attacks translate into the world of nostr apps? For clarity, I will use X’s security model as representative of most big tech social platforms and compare it to nostr.
**The Status Quo**
On X, you never have full control of your account. Ultimately to use it requires permission from the company. They can suspend your account or limit your distribution. Theoretically they can even post from your account at will. An X account is tied to an email and password. Users can also opt into two factor authentication, which adds an extra layer of protection, a login code generated by an app. In theory, this setup works well, but it places a heavy burden on users. You need to create a strong, unique password and safeguard it. You also need to ensure your email account and phone number remain secure, as attackers can exploit these to reset your credentials and take over your account. Even if you do everything responsibly, there is another weak link in X infrastructure itself. The platform’s infrastructure allows accounts to be reset through its backend. This could happen maliciously by an employee or through an external attacker who compromises X’s backend. When an account is compromised, the legitimate user often gets locked out, unable to post or regain control without contacting X’s support team. That process can be slow, frustrating, and sometimes fruitless if support denies the request or cannot verify your identity. Often times support will require users to provide identification info in order to regain access, which represents a privacy risk. The centralized nature of X means you are ultimately at the mercy of the company’s systems and staff.
**Nostr Requires Responsibility**
Nostr flips this model radically. Users do not need permission from a company to access their account, they can generate as many accounts as they want, and cannot be easily censored. The key tradeoff here is that users have to take complete responsibility for their security. Instead of relying on a username, password, and corporate servers, nostr uses a private key as the sole credential for your account. Users generate this key and it is their responsibility to keep it safe. As long as you have your key, you can post. If someone else gets it, they can post too. It is that simple. This design has strong implications. Unlike X, there is no backend reset option. If your key is compromised or lost, there is no customer support to call. In a compromise scenario, both you and the attacker can post from the account simultaneously. Neither can lock the other out, since nostr relays simply accept whatever is signed with a valid key.
The benefit? No reliance on proprietary corporate infrastructure.. The negative? Security rests entirely on how well you protect your key.
**Future Nostr Security Improvements**
For many users, nostr’s standard security model, storing a private key on a phone with an encrypted cloud backup, will likely be sufficient. It is simple and reasonably secure. That said, nostr’s strength lies in its flexibility as an open protocol. Users will be able to choose between a range of security models, balancing convenience and protection based on need.
One promising option is a web of trust model for key rotation. Imagine pre-selecting a group of trusted friends. If your account is compromised, these people could collectively sign an event announcing the compromise to the network and designate a new key as your legitimate one. Apps could handle this process seamlessly in the background, notifying followers of the switch without much user interaction. This could become a popular choice for average users, but it is not without tradeoffs. It requires trust in your chosen web of trust, which might not suit power users or large organizations. It also has the issue that some apps may not recognize the key rotation properly and followers might get confused about which account is “real.”
For those needing higher security, there is the option of multisig using FROST (Flexible Round-Optimized Schnorr Threshold). In this setup, multiple keys must sign off on every action, including posting and updating a profile. A hacker with just one key could not do anything. This is likely overkill for most users due to complexity and inconvenience, but it could be a game changer for large organizations, companies, and governments. Imagine the White House nostr account requiring signatures from multiple people before a post goes live, that would be much more secure than the status quo big tech model.
Another option are hardware signers, similar to bitcoin hardware wallets. Private keys are kept on secure, offline devices, separate from the internet connected phone or computer you use to broadcast events. This drastically reduces the risk of remote hacks, as private keys never touches the internet. It can be used in combination with multisig setups for extra protection. This setup is much less convenient and probably overkill for most but could be ideal for governments, companies, or other high profile accounts.
---
Nostr’s security model is not perfect but is robust and versatile. Ultimately users are in control and security is their responsibility. Apps will give users multiple options to choose from and users will choose what best fits their need.
-

@ 9dd283b1:cf9b6beb
2025-03-12 09:46:45
My Raspberry Pi 4 (running Umbrel) has been disconnecting approximately once a month, and my 1TB SSD now has only 80GB of space remaining. I'm considering an upgrade—possibly moving to a Pi 5 with a 2TB drive—but I'm open to any suggestions for a better setup within a similar budget. Any recommendations?
originally posted at https://stacker.news/items/911133
-

@ f25afb62:8d50c6e7
2025-03-12 04:11:46
https://i.postimg.cc/6p0S1LrR/Kiwi-bitcoin.png
# Modernizing the Kiwi Dollar: How Kiwibank Can Lead the Future of Money
## **A Nation at an Inflection Point**
Kiwibank’s upcoming capital raise offers New Zealand a rare opportunity to **future-proof its currency and banking system**. With up to **$500 million** in new capital on the table, the government aims to strengthen Kiwibank as a competitor to the dominant Australian-owned banks. Finance Minister Nicola Willis has emphasized that **more capital means greater competition**, which could **drive down interest rates** and improve banking services for everyday Kiwis.
But this is more than just a competition play—it's a **chance to radically modernize the Kiwi dollar itself**.
By integrating **Bitcoin's open infrastructure**, Kiwibank could issue a **digitally native, globally liquid, and ultra-secure NZD**. This wouldn’t require reinventing the financial system but rather **leveraging existing and proven Bitcoin technologies**. The result? A financial system that **empowers Kiwis**, attracts global investment, and **puts New Zealand at the forefront of monetary innovation**.
This article outlines a **practical, step-by-step roadmap** for how Kiwibank could:
1. **Tokenize the New Zealand Dollar (NZD)** using **a Bitcoin sidechain like Liquid**.
2. **Issue Kiwi eCash**, providing **cash-like digital money** that’s private and fast.
3. **Enable global NZD payments via the Lightning Network**, making NZD as **instant and accessible as Bitcoin itself**.
4. **Unlock new Bitcoin-powered business models** that **expand Kiwibank’s revenue streams**.
This isn’t a distant dream—it’s **completely feasible today**. The question is: **Will New Zealand lead or lag?** 🚀⚡🇳🇿
---
## **Kiwibank’s Capital Raise – A Launchpad for Innovation**
Kiwibank is raising fresh capital **to strengthen its position against the Big Four banks**, but this money could do much more than just improve traditional banking services. **It could lay the foundation for a digital-first Kiwi dollar, designed for the 21st century.**
New Zealand is actively **courting global investment**, simplifying its **“golden visa”** program to attract **wealthy innovators and investors**. If Kiwibank integrates **Bitcoin-powered financial infrastructure**, it would send a **strong signal that New Zealand is open for high-tech finance business**—drawing interest from:
- **Kiwi citizens**, who would benefit from a **better, faster, and cheaper** banking system.
- **KiwiSaver funds and institutional investors**, who would see Kiwibank as a **bold growth investment**.
- **Global Bitcoiners**, who might **invest in NZ** or move their wealth into a **Bitcoin-friendly jurisdiction**.
Simply put, **this capital raise is a chance to future-proof the Kiwi financial system**—and Bitcoin provides the tools to make it happen.
---
## **Step 1: Tokenized NZD on a Bitcoin Sidechain**
The **first step** in modernizing NZD is **bringing it onto Bitcoin rails** by issuing a **tokenized NZD** on **a Bitcoin sidechain** like **Liquid** or **a custom-built KiwiBTC sidechain**.
### **How It Works**
- Kiwibank, alongside other NZ banks, could **issue digital NZD tokens**, backed **1:1 by reserves**.
- This would be **secured on a federated Bitcoin sidechain**—a **fast, low-fee** network pegged to Bitcoin.
- Transactions would **settle in seconds instead of days**, with **confidentiality features** ensuring **financial privacy**.
This is **not an experiment**—it's **already being done**. **Tether (USDT) uses Liquid today** to issue stablecoins, and the same **proven tech** could be used to issue NZD.
### **Why This Matters**
- **Faster Payments:** Move NZD **instantly**, unlike today’s slow banking rails.
- **Global Liquidity:** Anyone, anywhere, could **hold and transact NZD digitally**.
- **No Need for a CBDC:** The NZ government **retains full control** over monetary policy, without creating a **central bank-controlled digital currency**.
This **solves many of the problems** the Reserve Bank of New Zealand has been grappling with in its **CBDC research**—by **using open Bitcoin tech instead of building from scratch**.
---
## **Step 2: Kiwi eCash – Digital Money With Cash-Like Privacy**
While a **tokenized NZD** would **revolutionize banking and business payments**, **Kiwi eCash** would do the same for **everyday transactions and person-to-person payments**.
**Kiwi eCash** is a **Chaumian eCash system**—a **digital cash** that **preserves privacy and security**, just like physical banknotes. It’s based on **battle-tested cryptographic blind signatures**, meaning:
- **No bank account required.**
- **No transaction tracking.**
- **Total financial privacy.**
### **How It Works**
- **NZ banks (or independent issuers) mint Kiwi eCash tokens**, backed by **tokenized NZD or Bitcoin**.
- These tokens are **held in a wallet and can be spent freely**—just like handing someone cash.
- Banks **don’t see individual transactions**, ensuring privacy.
- Multiple issuers (banks, credit unions, or fintech firms) could **offer interoperable Kiwi eCash mints**.
This is already happening with **Bitcoin eCash mints like Cashu and Fedimint**, and the **same concept** can be applied to **NZD**.
### **Why It Matters**
- **Digital cash with cash-like privacy**—protecting **financial freedom**.
- **Fast, free transactions**, perfect for **micro-payments and daily spending**.
- **Works offline**, unlike today’s banking apps.
- **Interoperable across banks**, reducing monopolistic control.
---
## **Step 3: Bridging Kiwi eCash to Lightning – NZD at the Speed of Bitcoin**
The **final piece** of the puzzle is **making Kiwi eCash as fast and global as Bitcoin itself**.
By **bridging Kiwi eCash to the Lightning Network** (via **Taproot Assets**), NZD transactions would become:
- **Instant:** Settle in **milliseconds**, anywhere in the world.
- **Global:** Easily convert NZD to **any currency, anywhere**.
- **Ultra-cheap:** Fees near **zero**, unlike Visa or SWIFT.
### **How It Works**
- Kiwi eCash is **wrapped into Lightning channels** using **Taproot Assets**.
- **Payments flow instantly over Lightning**, just like Bitcoin transactions.
- Merchants, individuals, and businesses can **send and receive NZD globally** in a **Bitcoin-compatible format**.
This **integrates NZD directly into the Bitcoin economy**, giving it **instant global reach**.
---
## **Step 4: New Bitcoin-Powered Services for Kiwibank**
Beyond modernizing NZD itself, **Bitcoin infrastructure unlocks entire new revenue streams** for Kiwibank:
1. **Bitcoin Custody:** Offer **multi-sig vaults** instead of **risky single-key custody**.
2. **Bitcoin Lending:** Let customers **borrow NZD against their BTC**—a proven model.
3. **Lightning Yield:** Earn **fees by providing Lightning liquidity**.
4. **Collaborative Bitcoin Custody:** Offer **collaborative custody** where customers **retain control** and Kiwibank is available for **recovery assistance**.
5. **Digital Securities**: Help **Kiwi business raise capital** with **digital securities on the Bitcoin sidechain** and facilitate **secondary market liquidity** of these securities.
Each of these **aligns with Bitcoin’s strengths** while **expanding Kiwibank’s business model**.
---
## **A Bold Vision to Future-Proof the Kiwi Financial System**
This **isn’t just an idea**—it’s **a path forward that’s 100% possible today**.
- **For New Zealanders:** A **faster, fairer financial system** that puts power back in their hands.
- **For Investors:** A **banking innovation play**, positioned for growth.
- **For Bitcoiners worldwide:** A **Bitcoin-friendly financial hub**, with real-world Bitcoin services.
Kiwibank has **a golden opportunity** to lead this transformation. The technology is ready, the capital is available, and the global financial landscape is **ripe for disruption**.
The only question left is:
**Will New Zealand lead, or will we be left behind?**
🚀⚡🇳🇿
---
## **Sources**
1. Kiwibank Capital Raise: [NZ Lawyer](https://www.thelawyermag.com/nz/practice-areas/banking-and-finance/kiwibank-to-receive-500m-boost-as-government-targets-greater-competition-in-banking-sector/517422)
2. New Zealand Active Investor Visa: [NZTE](https://www.nzte.govt.nz/page/investor-migrants)
3. Taproot Assets & Lightning: [Lightning Labs](https://docs.lightning.engineering/the-lightning-network/taproot-assets)
4. Bitcoin Sidechains & Liquid: [Blockstream](https://blockstream.com/elements/)
5. Bitcoin eCash (Cashu/Fedimint): [Cashu](https://cashu.space/)
---
originally posted at https://stacker.news/items/911023
-

@ 21335073:a244b1ad
2025-03-12 00:40:25
Before I saw those X right-wing political “influencers” parading their Epstein binders in that PR stunt, I’d already posted this on Nostr, an open protocol.
“Today, the world’s attention will likely fixate on Epstein, governmental failures in addressing horrific abuse cases, and the influential figures who perpetrate such acts—yet few will center the victims and survivors in the conversation. The survivors of Epstein went to law enforcement and very little happened. The survivors tried to speak to the corporate press and the corporate press knowingly covered for him. In situations like these social media can serve as one of the only ways for a survivor’s voice to be heard.
It’s becoming increasingly evident that the line between centralized corporate social media and the state is razor-thin, if it exists at all. Time and again, the state shields powerful abusers when it’s politically expedient to do so. In this climate, a survivor attempting to expose someone like Epstein on a corporate tech platform faces an uphill battle—there’s no assurance their voice would even break through. Their story wouldn’t truly belong to them; it’d be at the mercy of the platform, subject to deletion at a whim. Nostr, though, offers a lifeline—a censorship-resistant space where survivors can share their truths, no matter how untouchable the abuser might seem. A survivor could remain anonymous here if they took enough steps.
Nostr holds real promise for amplifying survivor voices. And if you’re here daily, tossing out memes, take heart: you’re helping build a foundation for those who desperately need to be heard.“
That post is untouchable—no CEO, company, employee, or government can delete it. Even if I wanted to, I couldn’t take it down myself. The post will outlive me on the protocol.
The cozy alliance between the state and corporate social media hit me hard during that right-wing X “influencer” PR stunt. Elon owns X. Elon’s a special government employee. X pays those influencers to post. We don’t know who else pays them to post. Those influencers are spurred on by both the government and X to manage the Epstein case narrative. It wasn’t survivors standing there, grinning for photos—it was paid influencers, gatekeepers orchestrating yet another chance to re-exploit the already exploited.
The bond between the state and corporate social media is tight. If the other Epsteins out there are ever to be unmasked, I wouldn’t bet on a survivor’s story staying safe with a corporate tech platform, the government, any social media influencer, or mainstream journalist. Right now, only a protocol can hand survivors the power to truly own their narrative.
I don’t have anything against Elon—I’ve actually been a big supporter. I’m just stating it as I see it. X isn’t censorship resistant and they have an algorithm that they choose not the user. Corporate tech platforms like X can be a better fit for some survivors. X has safety tools and content moderation, making it a solid option for certain individuals. Grok can be a big help for survivors looking for resources or support! As a survivor, you know what works best for you, and safety should always come first—keep that front and center.
That said, a protocol is a game-changer for cases where the powerful are likely to censor. During China's # MeToo movement, survivors faced heavy censorship on social media platforms like Weibo and WeChat, where posts about sexual harassment were quickly removed, and hashtags like # MeToo or "woyeshi" were blocked by government and platform filters. To bypass this, activists turned to blockchain technology encoding their stories—like Yue Xin’s open letter about a Peking University case—into transaction metadata. This made the information tamper-proof and publicly accessible, resisting censorship since blockchain data can’t be easily altered or deleted.
I posted this on X 2/28/25. I wanted to try my first long post on a nostr client. The Epstein cover up is ongoing so it’s still relevant, unfortunately.
If you are a survivor or loved one who is reading this and needs support please reach out to:
National Sexual Assault Hotline 24/7
https://rainn.org/
Hours: Available 24 hours