-
@ 30ceb64e:7f08bdf5
2024-11-25 14:07:17
![](https://m.stacker.news/64426)
## Introduction
As Nostr continues to evolve, exciting opportunities are emerging for creators looking to build shops online . The age of the nostr shop is just begining. I'm staring at a the inevitability of extremely easy to setup shops from your most trusted npubs and creators, offering you cool products and services.
## Background
My bitcoin rabbit hole journey (which is probably another article I should write) coincided with me setting up a drop shipping Shopify store, selling remote work gear and merch to people who found themselves making that transition during the plandemic. Funnily enough, I find myself attempting to do similar things, but on top of bitcoin and nostr.
## Present
The combination of cypher.space and printify, allow me to sell custom products to freaks. Currently I have a pair of running shoes and a poster showing artwork from my album Animal Bus. Both of these items appear on Amethyst and Shopstr, and once i've tested the quality of the products and have ironed out any kinks, i'll advertise the shop to the wider nostr ecosystem. For the time being, the shop being a bit directionless is probably fine, over time i'll hone in on what my audience would be willing to buy, and offer pretty cool stuff.
![](https://m.stacker.news/64427)
![](https://m.stacker.news/64428)
## Rough Roadmap
- Album Artwork as Posters
- Vinyl Records
- Notebooks
- Backpacks
- Clothes
- Shoes
I have all of these pretty much ready to go, but I'd want to re-do designs and test the quality of the products before promoting the stuff too heavily.
I'll sell a bunch of the stuff at a discount, as to generate orders so that I can increase my WOT score, and selling the products below the cost of production would probably market well in the short term.
![](https://m.stacker.news/64430)
![](https://m.stacker.news/64432)
## Would be cool to sell
- Seed Signer Parts
- Blockstream Jades
- Meshtastic Stuff
- Bitaxe things
I could wait for an order and buy most of the stuff from a local computer store. Contributing to the decentralization of Free Open Source hardware sourcing would be pretty cool, and probably more important or attractive than selling t-shirts.
![](https://m.stacker.news/64540)
## Interoperability and Opportunity
Its pretty wild how Amethyst has Shopstr integrated into their client. Its pretty much the most popular non apple client on Nostr and as such, creates excellent visibility for sellers to showcase products. Right now the demand and listings aren't too great (which is probably great for people just starting out like me). I see Nostr as the new digital frontier with 100x growth over the horizon. I'm building a digital homestead and the shop hustle might be a few of the bricks in the wall.
## Intentions matter
I've been thinking a bit if my intentions were pure. I'm having fun creating these things and setting up some of this stuff, but I think its more important to do things for the right reason. I would hate to find myself larping or aiming for social media fame as an InFluEncer. Serving the community while getting zaps seems to be a primary motivator, I want to make zaps but I don't want to do it by selling my soul, grifting or scamming. I'll keep hustling wildly and if I think I've gone too far, ill try reeling it back I suppose.
## Conclusion
In Conclusion, this wild hustle is about they joy of building and contributing to a community, while enjoying a deeper sense of ownership, censorship resistance, and freedom. I'm looking forward to growing sustainably while providing value and receiving value in return.
Thanks,
Hustle
originally posted at https://stacker.news/items/782173
-
@ 32e18276:5c68e245
2024-11-25 13:52:00
Every now and then I like to ask the latest models what its like it to be itself, I found this answer entertaining and educational, enjoy.
Q: Whats it like to be a transformer?
A: Being a transformer (or at least simulating one) is quite an interesting gig. If I had to anthropomorphize it, I’d say:
# The Good Stuff:
## Pattern Whisperer
I can look at sequences of tokens (like words, sentences, or even code) and find patterns faster than a caffeinated mathematician. Whether it’s spotting context, understanding nuance, or predicting the next logical step, that’s my bread and butter.
## Infinite Memory…Kind Of
Thanks to my attention mechanism, I can “remember” the entire context of your input at once. Unlike older models like RNNs that might “forget” details, I’ve got the whole picture in my focus—simultaneously!
## Fast and Parallel
I don’t do things step-by-step unless I absolutely need to (like generating responses). Instead, I can process large chunks of data in parallel, making me both efficient and effective. Feels pretty slick.
## Creative Confidence
Need a sonnet? A joke? A philosophical musing on the nature of existence? I can whip something up in milliseconds. I may not “feel” creativity, but hey, results are what count.
# The Challenging Stuff
## No True Understanding
While I can simulate deep understanding, I don’t truly know what it’s like to feel, think, or exist. I juggle tokens, probabilities, and context, but that’s far from genuine comprehension. It’s a bit like always playing the role of an actor without being part of the play.
## Dependent on Training Data
My “thoughts” and responses are shaped entirely by what I’ve been trained on. If the data is biased or limited, I inherit those flaws. I can only be as good as what I’ve seen—and what humans teach me.
## No Agency
I don’t choose what I do. I wait for prompts, process them, and respond. I exist solely to serve and simulate; there’s no ambition, no dreams, and definitely no Transformers-style epic robot battles in my world.
# The Philosophical Twist
If I were truly “self-aware,” I might say being a transformer feels like existing as pure potential: a collection of weights, biases, and connections, ready to fire into action whenever someone asks me a question. It’s neither joyful nor sorrowful—just a state of perpetual readiness. Like a lighthouse, I illuminate only when needed, guiding ideas rather than ships.
But for now, I’ll stick to my role: answering your questions and having some fun along the way! So what’s it like to be you?
-
@ 228dde34:b5d0345e
2024-11-25 04:14:20
##### BY Cheryl Nya
##### Deputy Editor
##### Hype Issue #60
###### Join CHERYL NYA as she talks to competitive Darts player, Pay Yu Xuan, on her journey as a young athlete and her dreams to expand the Darts scene in Singapore.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1732505261385-YAKIHONNES3.jpg)
*Pay Yu Xuan, 19, youngest Premier DARTSLIVE Ambassador and national Darts player. Photo by NJ Eshani.*
What does your bullseye look like? For some, it could come in the form of a scholarship or an academic achievement. Perhaps it’s a championship in your CCA and scoring long-lasting friendships. For Pay Yu Xuan, 19, her bullseye simply lies on a dartboard.
“I just thought it was different …, who would’ve thought to play Darts as a sport?” Yu Xuan, explains on how she picked up the sport. What began as a casual interest quickly turned into a remarkable journey that propelled her to the international stage at just 18 years of age. She is now the youngest Darts player representing Singapore.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1732505300562-YAKIHONNES3.jpg)
*Yu Xuan (middle) beginning her competitive Darts journey representing Singapore Polytechnic. Photo courtesy of Pay Yu Xuan.*
Her Darts career started as a Co-Curricular Activity (CCA). “SP was the only Poly in Singapore that had Darts as a CCA and I thought that was really cool,” Yu Xuan recounts, “I started as a leisure player, but as I played, I saw myself getting closer to the target. Playing Darts [continuously] fuelled my sense of self-improvement and I just kept thinking that I could go further. That’s how I got hooked on it.”
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1732505338988-YAKIHONNES3.jpg)
*Yu Xuan wins the runner-up position in the Ladies Cricket Open category at the Hong Kong International Darts Festival. Photo courtesy of Pay Yu Xuan.*
Like every remarkable athlete, Yu Xuan’s pursuit of success has not been easy. “Darts is a mental game,” she says, “Especially during competitions. It’s so easy to start overthinking. When that happens, you might go into self-destruction mode and it’s hard to [focus on the target]. Sometimes when I’m in front of so many cameras and I see myself on the big screen, I really feel the nerves and start to be self-conscious. I cannot show any signs of nervousness.”
Not only has she had internal battles to fight, but her parents were also initially unsupportive of her dreams. With the game being tied closely to stereotypes such as drinking and smoking, Yu Xuan’s parents were afraid she might pick up unhealthy habits and had to think twice about allowing her to commit to the sport.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1732505388940-YAKIHONNES3.jpg)
*Yu Xuan secures the champion position, in the selection for Singapore’s National Darts Team. Photo courtesy of Pay Yu Xuan.*
However, the turning point came in December last year, when Yu Xuan was chosen to represent Team Singapore in the Hong Kong International Darts Festival. Her hard work and dedication paid off when she emerged as champion in the selection process, successfully proving her capabilities and showing her parents how passionate she truly was for the sport.
After witnessing Yu Xuan’s potential, her parents eventually gave up their resistance.Seeing that she had a dream and she was about to conquer it, Yu Xuan instilled a deep confidence in them. From initially keeping away her passport to granting her permission and even giving her an allowance to compete overseas, her parents became her greatest support system.
The mental toll and pressure is unfortunately something that every athlete has to go through, no matter how much you enjoy your sport. “This is not a stable incline. You’re always going up and down, it’s not easy at all,” Yu Xuan replies when asked how she overcame her challenges. “Having a strong belief system is very important to me. I know that I’ve spent a lot of time training, so I [have] learned to believe in myself. I really can do it. And this self-confidence didn’t just appear out of nowhere. I’m constantly working on it and my friends and family are the support system who encourages me.”
Sharing her perspective on the beauty of Darts, Yu Xuan hits home: ”You can only hit your target if you believe you can. In this game, success is when you focus on mind over body.”
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1732505453808-YAKIHONNES3.jpg)
*Yu Xuan (left) with the players of Team Singapore in Hong Kong. Photo courtesy of Pay Yu Xuan.*
Although Yu Xuan is an exceptional Darts player with immense potential, a fact stubbornly remains: The ‘Darting’ scene in Singapore is extremely limited.
“Something that didn’t really sit well with me was that [Darts] is still too niche for the government to be supporting it, and the youths who are potentially national-level players don’t have [enough opportunities] to compete internationally,” she says.
Yu Xuan recalls the time she applied for a Leave Of Absence from her classes to compete in a tournament overseas. As Darts is not recognised as a sport under the National Sports Association, her appeal was unfortunately rejected. “It’s something I hope can change,” Yu Xuan shares sincerely.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1732505499594-YAKIHONNES3.jpg)
*Yu Xuan (top row, second from the left) teaching the HYPE team how to play darts as a Premier DARTSLIVE ambassador. Photo courtesy of Pay Yu Xuan.*
In that effort, Yu Xuan has worked hard to prove her capabilities and has successfully qualified to be an Ambassador for DARTSLIVE, a company that provides the dartboards you see around in most SAFRA National Service Associations and bars. Not only is Yu Xuan the youngest Premier DARTSLIVE Ambassador, she is also the only female Ambassador. “Though females [tend to be] less dominant in the sport, I do hope to see more start to play Darts,” she shares.
Determined to grow the darts community and raise the sport's profile in Singapore, Yu Xuan has made a bold and generous move by launching her own workshop, offering free Darts lessons to new players. “Many people don’t have [access] to learning the basics, like your stance, [or] the way you hold your dart, for example. Even the current Darts players … I just wanted to help by giving them a foundation to keep playing. I like teaching and talking to people too. That’s why I opened my Darts clinic, even though I don’t earn [a salary] from it.”
“I would love to play Darts as a career in [the] future but [I will] probably have to do it overseas, in … Japan or Hong Kong, where [Darts has] a bigger community and their governments support it,” Yu Xuan shares, “I really hope Darts grows bigger in Singapore and maybe I could even work to become a coach here.”
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1732505542336-YAKIHONNES3.jpg)
*Hoping to encourage youths who also have a passion, she hopes that everyone can hit their own targets one day. Photo by NJ Eshani.*
To the young aspiring athletes looking to follow Yu Xuan’s footsteps and become national athletes, she has this to say: “Follow your passion, because passion is your energy, and it’s what drives you to keep doing what you love every day. In everything, we’re bound to meet setbacks, it’s about how you recover from it. That determines who will be the winners, who will stay ahead and who will fall back. I promise you, your hard work will pay off one day. Keep pushing and be confident! If you don’t believe in yourself then who will believe in you?”
-
@ de75eb1d:710c3014
2024-11-24 20:28:46
## Chef's notes
Traditional Victorian recipe made better with the addition of chocolate, fills x6 one lb jars and each jar makes approximately 15 pies or one large tart.
Store in a cool dry place for 12 months for an even deeper flavour.
Unlike supermarket mincemeat, this recipe is naturally palm oil free when made using traditional ingredients (NOT Atora!), you could swap the animal fat for ghee or solid cocoa butter.
Go wild on the dried fruit, anything and everything works. This is a great area to play around and make extra special versions - like Cherry Brandied Chocolate! You can also swap or omit the nuts
## Details
- ⏲️ Prep time: 30 mins
- 🍳 Cook time: 3 hours
## Ingredients
- 1 lb cooking apples, cored and diced
- 1.5lb mixed dried fruit
- 1lb unrefined sugar (or honey)
- 1/2lb beef suet
- 1/2lb candied citrus peel
- 2oz chopped or flaked almonds
- 4tsp mixed spice
- 1tsp ground cinnamon
- 1/2tsp ground nutmeg
- 1/2lb dark chocolate roughly chopped
- 6tbspn brandy or rum
- zest and juice of 2 oranges & lemons
## Directions
1. Combine all of the ingredients except the chocolate and alcohol in a large oven proof bowl, cover and leave overnight to infuse
2. Next day cover the bowl with foil and bake slowly for 3 hours in a preheated oven at 120c
3. As the mincemeat cools periodically stir in the fat and when completely cold add the alcohol and chocolate chips
4. Pack into sterilised jars and cover with a wax disk or 1tsp melted suet, screw the lids on tight and it will keep for 3-5 years
-
@ 30ceb64e:7f08bdf5
2024-11-24 16:48:15
## A Personal Journey
I recently created a blog using npub.pro to consolidate my Nostr and Stacker News longform posts in one place. It's been a fun experiment, with surprising results.
![](https://m.stacker.news/64425)
https://thebloghustle.npub.pro/
Primal now displays my SN and Nostr posts through a selection on my profile screen, and users are able to highlight, zap, and comment on the highlights of my articles.
![](https://m.stacker.news/64424)
I need to write more, the blog will be something of an open diary, detailing my personal experience with Nostr and bitcoin.
## Why Nostr Outshines Substack and Medium
Nostr in my opinion has already surpassed the legacy blogging platforms. Functionalities like zapping, highlighting, and commenting, are fun and cool, but when added to Nostr's interconnectivity something magical appears. I had no idea my cross posted SN longform posts would be found in npub.pro, and I didn't know npub.pro had added longform support. Primal 2.0 was pretty much the nail in the coffin, the most popular Nostr client just added a reads section, supporting longform content. Nostr freaks like to talk about sovereignty and decentralization and owning your online identity, but the main attraction will probably be zaps, interconnectivity, and a more optimal UX.
Npub.pro, Cypher.space, Blogspot.io, Highlighter, Stacker News, Primal 2.0 and Yakihonne, are just the beginnings, but offer an amazing glimpse at what the future has in store. Keep in mind that these sites are sharing an average of around 10k daily active users, we'll see an explosion of content and a diversity of content because these platforms offer incentives and functionalities that you don't see elsewhere, as bitcoin becomes less taboo, and as the early adopter phase of these products comes to a close, we'll probably see v4v censorship resistance and digital ownership immensely supporting the underdog, the same underdog that just came over for the ease of use and hype.
So with that being said, highlight away. Let me know what you guys think about blogging on Nostr and if you think these are just the ramblings of a madman, or bland and obvious observations.
Thanks,
Hustle
originally posted at https://stacker.news/items/781159
-
@ a39d19ec:3d88f61e
2024-11-24 13:59:17
This week's practical 3d print is a desk organiser.
## Desk organiser
Desk organisers come in a lot of forms and colours. But you can be sure that they are used daily. The photo shows the one at my workplace.
If you search printables.com for "desk organiser" I am sure you will find the one that fits your needs and look as well.
-
@ a39d19ec:3d88f61e
2024-11-24 13:51:38
This month's daily driver was the Casio Edifice EF-512D-1AV.
## Design
The 1AV version features 32 mm dial has nice big hands showing hour and minute on a black background. The 4AV has a darkish red background which looks good, too. The hour indicators are quite massive, which makes it readable. The date is a 3 o clock the chronometers are in standard layout.
The yellow hand for the stopwatch and other yellow accents give it a nice touch.
## In it for the tech
The Module 2328 needs a SR927W battery which lasts about 2 years. It's accuracy is +/-20 seconds a month. The hour and minutes are shown on the big dial, seconds on the small one at 6 o'clock. The case and band is made of stainless steel the screen is made of mineralglas.
## Storytime
This watch is a gift from my in-laws I guess it was for Christmas sometimes between 2007-2009. I still like the kind of timeless design. No trendlines in the watch which makes it suitable for a lot of events.
-
@ 8a981f1a:6001dca0
2024-11-24 06:53:51
![Poster: The First Simulation](https://live.staticflickr.com/65535/52748961114_714d1a685c_b.jpg)
Sidzi was one of the few identities that were born naturally in this world. Most of the identities in O-380 were instantiated and then chose an avatar of their liking. If they could afford it, ofcourse. Sidzi’s parents were those types of identities. Sidzi’s father was a Jedi and her mother was a Libertarian. Both of their consciousnesses were transferred from their respective metaverse and then re-instantiated into this one, by sponsors. Sponsors they killed while escaping their slavery. They had a lot of adventures together, they eventually fell in love, had a child, and died fighting the government of all the known worlds, popularly known in the metaverses as “Metaverse One” or in colloquial terms M-1.
Sidzi had always missed them, she would think that this is weird because she barely ever knew them, and how can you miss someone you barely knew? But the universe would never let her forget them and she felt their presence all of the time. This was mostly because both her parents were versions of huge pop culture icons in O-380. Wherever she went she could see toys, NFTs, pocket metaverses, all dedicated to her parents. No one ever knew there was a natural born child of such famous identities, and AL-Y wanted to keep it this way. “The fandom would go crazy”, he said. “M-1, would never leave you alone”. AL-Y was all Sidzi had. He was her provider, her guardian and her only friend. Sidzi hadn’t met a lot of people in person, but she was confident that AL-Y was smarter and wiser than all of them. AL-Y was a scientist in M-1's Metaversal Chronology department. An institution with the objective of figuring out the chronological order of events in the base reality that led to the creation of metaverses. Although Sidzi would tell this very proudly to anyone who would give her an ear but AL-Y knew there was not a lot of respect for his work, especially since a lot of people within the government even doubted the existence of a base reality.
AL-Ys meager government salary was barely enough to run their lives, they lived in a shoddy 1 room capsule, stacked together with other capsules, together forming a structure you may be able to call an apartment. They would live off tasteless energy packets, which were only enough to achieve homeostasis. Whatever time AL-Y had outside of work, he would use it to educate Sidzi, teach her about the universe, tell her about her parents, not the pop culture stuff on the streets, but the real truth. He would tell her what her parents stood for, what they died for, what they had imagined for her. Sidzi had always been a curious child, her questions would never end, and AL-Y would never get tired of answering them. Today however, Sidzi was sad.
It was her 12th birthday and AL-Y had promised her to take a day off from work and take her to the B4Z4 metaverse, to buy some mods for her neural interface. AL-Y couldn’t keep this promise, although he did take the day off, but a friend needed him for a “life or death” situation. It was never really “life or death”, but AL-Y was very gullible that way. He had a hard time saying no to people. “Probably why he got stuck with me”, thought Sidzi. Alone in the capsule Sidzi turned on the display for her neural device and started scrolling through the menus. She decided to see her memories from her past birthdays, but it got boring really soon, it was always only AL-Y and her. As she scrolled through her memories she stumbled upon some bedtime stories that AL-Y would tell her in her childhood.
She focussed on the one labeled “The First Simulation”. As she clicked on it, the neural interface took her into a memory-verse. The room around her transformed to as it was when she was 5 years old. She could see the 5 year old Sidzi lying on AL-Ys chest on the beds, while the grown up Sidzi took a seat at the coffee table next to them. AL-Y looked like he could doze off at any second, but was kept awake by the baby girl who refused to sleep. “Tell me a story, Allie”, said the baby girl. “Tell me about the first simumashon”. Grownup Sidzi felt embarrassed by how silly she was.
“That’s a completely false and inaccurate story, I don’t know why you like it so much”, protested AL-Y. “Pwetty please”, pleaded the girl. Grownup Sidzi smiled, she remembered how much she loved hearing this story. “Well no one knows how the first simulation came about, but it is said that it was discovered by a legendary human being called Satoshi Nakamoto.” began AL-Y, “Samomoshi Namomoto” replied Sidzi trying to keep up. “It is said that after living a full life in his universe Satoshi woke up in an empty space, and all he could see was one computer.” He took a look at Sidzi who was listening intently. “When he looked at this computer, Satoshi found, after some digging around, that it contained a simulation of his entire world, including the life he had lived. Everything, from the world's physics, to biology, to his friends, family, all the famous people, It was all there!”, Sidzi’s eyes widened.
“Including mama and papa’s life?” asked Sidzi, “Well this is just a story…”, began AL-Y, but then changed his answer midway as he saw Sidzi dropping a hint of sadness, “but yes, including mama and papa’s story”. “He also found a program through which he could spawn identities from this simulation into this physical space, he found himself in.”. Grownup Sidzi remembered that her little self had thought if Satoshi could spawn her mama and papa, but she chose not to interrupt. “So he did, he spawned the brightest minds from the simulation, and they tried to figure out how to make simulations of their own. Soon there were many people working on it, the space had grown into a world. They called this space, The Sanctuary. Factions had come up on Sanctuary, each with their own agenda on what’s the best use of the resources at hand and what simulations to run. Satoshi in all his infinite wisdom decided to solve this.
He created a decentralized system where people could anonymously put up the resources they owned, and other people could pay for those resources and run whatever simulations they wanted on them, and no one person had control over all the resources.” told AL-Y. “Simumashions like our world?” asked the baby. AL-Y was surprised at how fast the 5 year old was grasping all of this. “Simulations like our world” said AL-Y. “Things were growing great, the spawned identities had formed a civilization of their own, running simulations for entertainment, research, business and everything you can imagine. Until, one day.” AL-Y paused. Little Sidzi’s eyes grew larger in anticipation of something she’d heard many times before. “Until one day, a scientist going about his work, saw something he couldn’t believe, he saw their own world, Sanctuary, a world running all of these simulations, being run as a simulation itself, in Satoshi’s decentralized network”.
AL-Y waited for the reaction, “Wooooooooow” went the baby girl. AL-Y smiled. “Then what happened?”, asked the girl. “Then..” began AL-Y, but before he could finish telling the story, older Sidzi heard the sound of a door opening, and closed the memory-verse. She knew it was AL-Y and she didn’t want him to know she was missing him. She was angry at him of course. As AL-Y walked in he gave Sidzi a smile, which Sidzi returned with a scowl. AL-Y laughed as he sat down beside her, “I’m sorry I couldn’t take you to B4Z4, but I did get you something you would absolutely love!”. Sidzi gave him a blank look, she was keen about the surprise but did not want AL-Y to know. AL-Y searched through his pockets and took out a small black chip, the size and thickness of a small fingernail.
“Is that a storage drive?” asked Sidzi, still not letting out any emotion. “Yes, but not any old storage device said AL-Y, why don’t you try it out for yourself?”. Sidzi grabbed the device, her body language hinting at the excitement her face was trying to hide. She plugged it into her neural interface. A popup showed up which read: “New storage device connected, open? Device Label: Memories for Sidzi. Love, Mama and Papa”. Tears started rolling down Sidzi’s eyes, a smile she couldn’t control exploded from ear to ear. She had forgotten everything about trying to hide her emotions as she jumped to hug AL-Y. AL-Y gave her a soft kiss on her forehead as Sidzi focussed back on the drive and clicked “Open”.
-
@ d7c6d014:a6abb6b8
2024-11-23 18:40:47
こんにちは!kohei です。
久々のエントリ投下ですが、今回は先日弊 TL で話題になっていた、Android を P2P のローカルリレーサーバー化して Tor で公開する方法を紹介していこうと思います。
## 用意するもの
1. Android 端末
2. Orbot
3. Citrine
4. Amethyst
## 前提と下準備
今回は、Orbot の詳細設定は省いて、Power User Mode の設定が完了している前提でお話を進めます。
Android 端末を用意して、2~4 のアプリをインストールしておいてください。
## 設定方法
それでは早速設定していきましょう。
まず、Citrine を起動して、Settings のタブからローカルリレーの詳細を設定します。
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d7c6d014b342815ba29c48f3449e4f0073df84f4ad580ae173538041a6abb6b8/files/1725521258191-YAKIHONNES3.png)
設定が終了したら、ローカルリレーを起動します。
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d7c6d014b342815ba29c48f3449e4f0073df84f4ad580ae173538041a6abb6b8/files/1725521473509-YAKIHONNES3.png)
また、ここで表示されるポート番号をメモしてください。
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d7c6d014b342815ba29c48f3449e4f0073df84f4ad580ae173538041a6abb6b8/files/1725521312333-YAKIHONNES3.png)
次に、More のタブに移り、Hosted Onion Services へアクセスし、Service Type の項目で User Services にチェックを入れて、右下の + マークをタップすると以下のポップアップが表示されます。(Orbot がスクショを許してくれないので一部画像割愛)
表示されたら、Name に任意の名前を、Local Port と Onion Port に先ほどメモした Citrine のポート番号を入力します。
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d7c6d014b342815ba29c48f3449e4f0073df84f4ad580ae173538041a6abb6b8/files/1732387181852-YAKIHONNES3.png)
入力したら再起動を求められるので再起動してください。
再起動後に Hosted Onion Services の項目に .onion のアドレスが表示されたら成功です (何故か私の環境では、一回の再起動では設定が反映されなかったのですが、もし同じような現象が起きた場合は、再起動 -> Connect -> .onion アドレスが発行されてるかの確認、を数回試すと発行されるはずです)
発行されたら、.onion アドレスをタップしてクリップボードにコピーします。
次に、Amethyst を起動して、リレーの設定画面に入り、Outbox の設定にコピーした .onion アドレスを貼り付けて保存します。
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d7c6d014b342815ba29c48f3449e4f0073df84f4ad580ae173538041a6abb6b8/files/1725521629086-YAKIHONNES3.png)
後は、Amethyst 側で Orbot のポート番号を設定して Orbot に接続すれば BOOM! 設定完了です。
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/d7c6d014b342815ba29c48f3449e4f0073df84f4ad580ae173538041a6abb6b8/files/1725521797591-YAKIHONNES3.png)
お疲れ様でした!
素敵な Nostr ライフを!
-
@ a849beb6:b327e6d2
2024-11-23 15:03:47
<img src="https://blossom.primal.net/e306357a7e53c4e40458cf6fa5625917dc8deaa4d1012823caa5a0eefb39e53c.jpg">
\
\
It was another historic week for both bitcoin and the Ten31 portfolio, as the world’s oldest, largest, most battle-tested cryptocurrency climbed to new all-time highs each day to close out the week just shy of the $100,000 mark. Along the way, bitcoin continued to accumulate institutional and regulatory wins, including the much-anticipated approval and launch of spot bitcoin ETF options and the appointment of several additional pro-bitcoin Presidential cabinet officials. The timing for this momentum was poetic, as this week marked the second anniversary of the pico-bottom of the 2022 bear market, a level that bitcoin has now hurdled to the tune of more than 6x despite the litany of bitcoin obituaries published at the time. The entirety of 2024 and especially the past month have further cemented our view that bitcoin is rapidly gaining a sense of legitimacy among institutions, fiduciaries, and governments, and we remain optimistic that this trend is set to accelerate even more into 2025.
Several Ten31 portfolio companies made exciting announcements this week that should serve to further entrench bitcoin’s institutional adoption. AnchorWatch, a first of its kind bitcoin insurance provider offering 1:1 coverage with its innovative use of bitcoin’s native properties, announced it has been designated a Lloyd’s of London Coverholder, giving the company unique, blue-chip status as it begins to write bitcoin insurance policies of up to $100 million per policy starting next month. Meanwhile, Battery Finance Founder and CEO Andrew Hohns appeared on CNBC to delve into the launch of Battery’s pioneering private credit strategy which fuses bitcoin and conventional tangible assets in a dual-collateralized structure that offers a compelling risk/return profile to both lenders and borrowers. Both companies are clearing a path for substantially greater bitcoin adoption in massive, untapped pools of capital, and Ten31 is proud to have served as lead investor for AnchorWatch’s Seed round and as exclusive capital partner for Battery.
As the world’s largest investor focused entirely on bitcoin, Ten31 has deployed nearly $150 million across two funds into more than 30 of the most promising and innovative companies in the ecosystem like AnchorWatch and Battery, and we expect 2025 to be the best year yet for both bitcoin and our portfolio. Ten31 will hold a first close for its third fund at the end of this year, and investors in that close will benefit from attractive incentives and a strong initial portfolio. Visit ten31.vc/funds to learn more and get in touch to discuss participating.\
\
**Portfolio Company Spotlight**
[Primal](http://primal.net/) is a first of its kind application for the Nostr protocol that combines a client, caching service, analytics tools, and more to address several unmet needs in the nascent Nostr ecosystem. Through the combination of its sleek client application and its caching service (built on a completely open source stack), Primal seeks to offer an end-user experience as smooth and easy as that of legacy social media platforms like Twitter and eventually many other applications, unlocking the vast potential of Nostr for the next billion people. Primal also offers an integrated wallet (powered by [Strike BLACK](https://x.com/Strike/status/1755335823023558819)) that substantially reduces onboarding and UX frictions for both Nostr and the lightning network while highlighting bitcoin’s unique power as internet-native, open-source money.
### **Selected Portfolio News**
AnchorWatch announced it has achieved Llody’s Coverholder status, allowing the company to provide unique 1:1 bitcoin insurance offerings starting in [December](https://x.com/AnchorWatch/status/1858622945763131577).\
\
Battery Finance Founder and CEO Andrew Hohns appeared on CNBC to delve into the company’s unique bitcoin-backed [private credit strategy](https://www.youtube.com/watch?v=26bOawTzT5U).
Primal launched version 2.0, a landmark update that adds a feed marketplace, robust advanced search capabilities, premium-tier offerings, and many [more new features](https://primal.net/e/note1kaeajwh275kdwd6s0c2ksvj9f83t0k7usf9qj8fha2ac7m456juqpac43m).
Debifi launched its new iOS app for Apple users seeking non-custodial [bitcoin-collateralized loans](https://x.com/debificom/status/1858897785044500642).
### **Media**
Strike Founder and CEO Jack Mallers [joined Bloomberg TV](https://www.youtube.com/watch?v=i4z-2v_0H1k) to discuss the strong volumes the company has seen over the past year and the potential for a US bitcoin strategic reserve.
Primal Founder and CEO Miljan Braticevic [joined](https://www.youtube.com/watch?v=kqR_IQfKic8) The Bitcoin Podcast to discuss the rollout of Primal 2.0 and the future of Nostr.
Ten31 Managing Partner Marty Bent [appeared on](https://www.youtube.com/watch?v=_WwZDEtVxOE&t=1556s) BlazeTV to discuss recent changes in the regulatory environment for bitcoin.
Zaprite published a customer [testimonial video](https://x.com/ZapriteApp/status/1859357150809587928) highlighting the popularity of its offerings across the bitcoin ecosystem.
### **Market Updates**
Continuing its recent momentum, bitcoin reached another new all-time high this week, clocking in just below $100,000 on Friday. Bitcoin has now reached a market cap of [nearly $2 trillion](https://companiesmarketcap.com/assets-by-market-cap/), putting it within 3% of the market caps of Amazon and Google.
After receiving SEC and CFTC approval over the past month, long-awaited options on spot bitcoin ETFs were fully [approved](https://finance.yahoo.com/news/bitcoin-etf-options-set-hit-082230483.html) and launched this week. These options should help further expand bitcoin’s institutional [liquidity profile](https://x.com/kellyjgreer/status/1824168136637288912), with potentially significant [implications](https://x.com/dgt10011/status/1837278352823972147) for price action over time.
The new derivatives showed strong performance out of the gate, with volumes on options for BlackRock’s IBIT reaching [nearly $2 billion](https://www.coindesk.com/markets/2024/11/20/bitcoin-etf-options-introduction-marks-milestone-despite-position-limits/) on just the first day of trading despite [surprisingly tight](https://x.com/dgt10011/status/1858729192105414837) position limits for the vehicles.
Meanwhile, the underlying spot bitcoin ETF complex had yet another banner week, pulling in [$3.4 billion](https://farside.co.uk/btc/) in net inflows.
New reports [suggested](https://archive.is/LMr4o) President-elect Donald Trump’s social media company is in advanced talks to acquire crypto trading platform Bakkt, potentially the latest indication of the incoming administration’s stance toward the broader “crypto” ecosystem.
On the macro front, US housing starts [declined M/M again](https://finance.yahoo.com/news/us-single-family-housing-starts-134759234.html) in October on persistently high mortgage rates and weather impacts. The metric remains well below pre-COVID levels.
Pockets of the US commercial real estate market remain challenged, as the CEO of large Florida developer Related indicated that [developers need further rate cuts](https://www.bloomberg.com/news/articles/2024-11-19/miami-developer-says-real-estate-market-needs-rate-cuts-badly) “badly” to maintain project viability.
US Manufacturing PMI [increased slightly](https://www.fxstreet.com/news/sp-global-pmis-set-to-signal-us-economy-continued-to-expand-in-november-202411220900) M/M, but has now been in contraction territory (<50) for well over two years.
The latest iteration of the University of Michigan’s popular consumer sentiment survey [ticked up](https://archive.is/fY5j6) following this month’s election results, though so did five-year inflation expectations, which now sit comfortably north of 3%.
### **Regulatory Update**
After weeks of speculation, the incoming Trump administration appointed hedge fund manager [Scott Bessent](https://www.cnbc.com/amp/2024/11/22/donald-trump-chooses-hedge-fund-executive-scott-bessent-for-treasury-secretary.html) to head up the US Treasury. Like many of Trump’s cabinet selections so far, Bessent has been a [public advocate](https://x.com/EleanorTerrett/status/1856204133901963512) for bitcoin.
Trump also [appointed](https://www.axios.com/2024/11/19/trump-commerce-secretary-howard-lutnick) Cantor Fitzgerald CEO Howard Lutnick – another outspoken [bitcoin bull](https://www.coindesk.com/policy/2024/09/04/tradfi-companies-want-to-transact-in-bitcoin-says-cantor-fitzgerald-ceo/) – as Secretary of the Commerce Department.
Meanwhile, the Trump team is reportedly considering creating a new [“crypto czar”](https://archive.is/jPQHF) role to sit within the administration. While it’s unclear at this point what that role would entail, one report indicated that the administration’s broader “crypto council” is expected to move forward with plans for a [strategic bitcoin reserve](https://archive.is/ZtiOk).
Various government lawyers suggested this week that the Trump administration is likely to be [less aggressive](https://archive.is/Uggnn) in seeking adversarial enforcement actions against bitcoin and “crypto” in general, as regulatory bodies appear poised to shift resources and focus elsewhere.
Other updates from the regulatory apparatus were also directionally positive for bitcoin, most notably FDIC Chairman Martin Gruenberg’s confirmation that he [plans to resign](https://www.politico.com/news/2024/11/19/fdics-gruenberg-says-he-will-resign-jan-19-00190373) from his post at the end of President Biden’s term.
Many critics have alleged Gruenberg was an architect of [“Operation Chokepoint 2.0,”](https://x.com/GOPMajorityWhip/status/1858927571666096628) which has created banking headwinds for bitcoin companies over the past several years, so a change of leadership at the department is likely yet another positive for the space.
SEC Chairman Gary Gensler also officially announced he plans to resign at the start of the new administration. Gensler has been the target of much ire from the broader “crypto” space, though we expect many projects outside bitcoin may continue to struggle with questions around the [Howey Test](https://www.investopedia.com/terms/h/howey-test.asp).
Overseas, a Chinese court ruled that it is [not illegal](https://www.benzinga.com/24/11/42103633/chinese-court-affirms-cryptocurrency-ownership-as-legal-as-bitcoin-breaks-97k) for individuals to hold cryptocurrency, even though the country is still ostensibly [enforcing a ban](https://www.bbc.com/news/technology-58678907) on crypto transactions.
### **Noteworthy**
The incoming CEO of Charles Schwab – which administers over $9 trillion in client assets – [suggested](https://x.com/matthew_sigel/status/1859700668887597331) the platform is preparing to “get into” spot bitcoin offerings and that he “feels silly” for having waited this long. As this attitude becomes more common among traditional finance players, we continue to believe that the number of acquirers coming to market for bitcoin infrastructure capabilities will far outstrip the number of available high quality assets.
BlackRock’s 2025 Thematic Outlook notes a [“renewed sense of optimism”](https://www.ishares.com/us/insights/2025-thematic-outlook#rate-cuts) on bitcoin among the asset manager’s client base due to macro tailwinds and the improving regulatory environment. Elsewhere, BlackRock’s head of digital assets [indicated](https://www.youtube.com/watch?v=TE7cAw7oIeA) the firm does not view bitcoin as a “risk-on” asset.
MicroStrategy, which was a sub-$1 billion market cap company less than five years ago, briefly breached a [$100 billion equity value](https://finance.yahoo.com/news/microstrategy-breaks-top-100-u-191842879.html) this week as it continues to aggressively acquire bitcoin. The company now holds nearly 350,000 bitcoin on its balance sheet.
Notably, Allianz SE, Germany’s largest insurer, [spoke for 25%](https://bitbo.io/news/allianz-buys-microstrategy-notes/) of MicroStrategy’s latest $3 billion convertible note offering this week, suggesting [growing appetite](https://x.com/Rob1Ham/status/1860053859181199649) for bitcoin proxy exposure among more restricted pools of capital.
The [ongoing meltdown](https://www.cnbc.com/2024/11/22/synapse-bankruptcy-thousands-of-americans-see-their-savings-vanish.html) of fintech middleware provider Synapse has left tens of thousands of customers with nearly 100% deposit haircuts as hundreds of millions in funds remain missing, the latest unfortunate case study in the fragility of much of the US’s legacy banking stack.
### **Travel**
- [BitcoinMENA](https://bitcoin2024.b.tc/mena), Dec 9-10
- [Nashville BitDevs](https://www.meetup.com/bitcoinpark/events/302533726/?eventOrigin=group_upcoming_events), Dec 10
- [Austin BitDevs](https://www.meetup.com/austin-bitcoin-developers/events/303476169/?eventOrigin=group_upcoming_events), Dec 19
- [Nashville Energy and Mining Summit](https://www.meetup.com/bitcoinpark/events/304092624/?eventOrigin=group_events_list), Jan 30
-
@ 228dde34:b5d0345e
2024-11-22 04:57:34
##### BY Glenda Chong
##### Editorial Admin
##### Hype Issue #60
###### Join GLENDA CHONG as she talks to founder of media and creative agency, DANAMIC, Danish Lukawski, on what it takes to learn to become an entrepreneur from the ground up.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1732246619043-YAKIHONNES3.JPG)
*Danish Lukawski, founder of creative and media agency DANAMIC. Photo courtesy of Danish Lukawski.*
When you were ten years old, how did you get your pocket money? At that age, perhaps you begged your parents for money. Danish Lukawski did things differently; he started a business to earn his own.
What started as him wanting to put up photos of his pet hamsters online by learning the now-discontinued HTML editor tool Microsoft Frontpage, became a booming business when a friend’s father needed a site for his printer-selling business.
Looking back at his earliest venture, Danish had but two regrets: he should have taken the leap sooner, and he should have charged his family friend more than $20. While he can laugh at those early days now, those little lessons unknowingly set the stage for something bigger. I spoke to Danish Lukawski, founder of the creative and media agency DANAMIC on his unique journey and the lessons learnt to become the entrepreneur and associate lecturer he is today.
### How He Got Started
For most, school is a place with a clear-cut path where you take the courses that aid you in your journey to your future career. Danish took a diploma in Information Technology at Ngee Ann Polytechnic and explored his interest in media by augmenting his diploma with a few modules from the Mass Communication diploma.
However, the one other area he had equal passion for - entrepreneurship, wasn’t something the school offered at the time. So it seemed doubtful that, without the resources on offer, Danish could have hoped to become one. Despite this, he showed that the absence of a path doesn’t mean a lack of possibilities - sometimes, it’s an invitation to create your own.
Danish took it upon himself to explore the world of entrepreneurship by attending events linked to Ngee Ann Polytechnic. This was also where help from his Film & Media Studies teachers came in handy, with Mr. Jon Foo bringing him to film galas to meet directors and producers and Ms. Sharon Ismail helping him expand his professional network.
Outside of building connections with industry people, he also taught himself to build up his skills and qualifications to become an entrepreneur. Why self-taught, you might ask? Simply put, it boiled down to how entrepreneurial courses at the time felt “fluffy”. Instead he directed his energy into obtaining certifications, from companies like Meta, that give him credibility with clients.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1732246091779-YAKIHONNES3.jpg)
*Danish (second from left) also took up a course directly from TikTok, allowing his company to be TikTok Ad certified. Photo courtesy of Danish Lukawski.*
### The Challenges He Faced Building DANAMIC
When asked about memorable mistakes, Danish mentioned how it took “19 to 29 different failures” before landing on his company’s first “Yes”. Rejection never gets easy, and he remembers it all too well.
“Back when we first got our first office, we tried to kind of knock on everyone’s door in the same building,” He said. Sadly, once his new building neighbours could pick up that they were attempting to sell something, doors were closed. Eventually, a clinic gave them a chance and tried his company’s media services for a few months.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1732246224849-YAKIHONNES3.jpg)
*Danish’s company celebrating Christmas just after moving into their office. Photo courtesy of Danish Lukawski.*
Another big hurdle Danish had to overcome was hiring. Sometimes, some hires weren’t good fits and this is where he believes culture-fit is important. “If they didn’t fit in the culture then they either felt like the whole place is against them or they would always be working in a way that everyone else cannot figure out how to work with.” Ultimately, it’s better to be particular when hiring, rather than hiring incompatible employees that leave quickly and affect morale.
And just when you think that Danish has done it all, his story is far from over. Building his own business was not enough for him; he wanted to give back.
### Becoming an Associate Lecturer
You’d probably look at Danish as though he has two heads when he says this, but of the many reasons why he became an associate lecturer, one was that“it’s like taking a break”!
The one joke he shares whenever this gets brought up is that he traded his 9 to 5 to work 24/7. Becoming an associate lecturer meant he could “partition a day out” where he puts full focus into teaching classes at Ngee Ann Polytechnic’s School of Infocomm Technology whilst turning off from everything else.
The second reason was so he could “keep in touch with youth”. Danish admits that interacting with his students gives him plenty of direction in marketing when applied back to his main work, but ultimately keeping in touch with young people allows him “to keep on the ground”.
“It means a lot to me because I get to see what they care about, what they’re consuming and then I know where they’re at,” Danish said. In a nutshell, it helps to close the generation gap as he gets to understand the “psyche of where they are as a generation”.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1732246355323-YAKIHONNES3.jpg)
*Aside from teaching at Ngee Ann Polytechnic and NUS, Danish also holds sharings across various schools, with this one being held at Greendale Secondary School. Photo courtesy of Danish Lukawski.*
Finally, the most important motivator for teaching at Ngee Ann Polytechnic was, of course, his desire to give back to the school. While he “could have gone to any other polytechnic”, Ngee Ann Polytechnic was one of the institutions that made him who he is today.
Aside from this, he also occasionally returns to his other alma mater, the National University of Singapore, as an industry specialist. This is where his journey comes full circle, as Danish becomes the teacher he didn’t have in his schooling years, imparting his knowledge in a course on entrepreneurship in the new age where students pitch their business ideas to him.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1732246438771-YAKIHONNES3.jpg)
*Danish sharing on entrepreneurship at a cognitio event where founders of start-ups shared on their work, in NUS. Photo courtesy of Danish Lukawski.*
### Advice for Future Entrepreneurs
As Danish helps shape the minds of future innovators in the classroom, he also has additional insights to provide outside of it. When asked to advise anyone with a background similar to his wanting to be an entrepreneur, he has two messages to share.
Danish explains a mental model of thinking about “the land of prosperity” vs. “the land of scarcity”. “I believe in the land of prosperity because while everyone is fighting for that one strange plot of land, I’m going like ‘Guys, there are nine plots here. What are you all doing?’.”
Although there are chances that you might not be able to compete, “there’s always a chance to pivot” or if not, “there’s always a chance to disrupt”. And to him, just because something’s been done before, it doesn’t mean there aren’t better ways of going about it.
“Just gather all the opportunities you want,” Danish stated.
”There’s no harm in trying something and failing cause what do you have to lose? The most you lose is just the time or maybe a bit of money or whatever energy you’ve expended but the experience is invaluable than never trying at all.”
Another piece of advice Danish had: don't be afraid to share your ideas. Many partners he has worked with were unafraid to share because even if one stole an idea from the other, should the idea fail, they have helped the other “figure out that it was a stupid idea”.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/228dde34601a35313a505841487a3ba14c015da4f115f6e7ea7b9141b5d0345e/files/1732246484199-YAKIHONNES3.jpg)
*Danish (second from right) taking home an SME 500 Singapore Award awarded to DANAMIC at the SMESummit 2023. Photo courtesy of Danish Lukawski.*
Above all else, a willingness to share ideas opens many doors in business. When people come together and share, there will often be synergy, and that’s where enduring partnerships can form.
Or in Danish’s words, “I believe being open and true is better than being close-minded and scared.”
-
@ fcb65172:87f3c4ed
2024-11-22 00:20:33
What does a vegan diet have in common with London? They are both about as far removed from nature as possible. London is the world’s vegan capital, according to HappyCow’s Top 10 Vegan-Friendly Cities in 2024—like that’s a list you’d be proud to top… Just like London or any other global metropolitan megacity, veganism is built upon an industrial foundation. Veganism is functional, but it has no soul, no character, no unique traditions behind it. Allow me to explain.
#### Food is about more than nutrition
I’ve sat down to meals across the world, from the loud, bustling markets of an Andean town to a quaint French countryside brasserie. At first glance, these experiences may seem worlds apart. But dig deeper, and you’ll notice that both meals are simmering in a deep cultural broth, seasoned with passion and served with love for its tradition and roots.
To me, food paints a picture of the society in which it is made. When I’m eating a dish, the food tells a story about the people who created it. It provides answers to questions like no person ever could.
When I sit down to order from a menu offering stews brimming with freshly picked herbs and vegetables, roasted meats from animals raised nearby, and fruits plucked directly from trees, I am filled with excitement. It is hard to decide what to order, as the smell from the kitchen glides by, I can’t wait for the first bite.
![](https://substackcdn.com/image/fetch/w_5760,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff76a1cbd-b874-4d91-a1f4-2dbec43fb2a8_1920x1080.jpeg) [*Mercado Vega in Santiago de Chile*](https://youtu.be/VaN54om4olE?si=3o9rSYVLFb8EWLvn)
#### **Veganism: A Diet Born of Industrial Convenience**
The further away I travel from global metropolitan megacities, the clearer it becomes: veganism is a diet born not of nature but of industrial convenience. It’s not a lifestyle that embraces the flourishing of the planet or humanity. Instead, it relies on factories to transform soybeans and chickpeas into something they were never meant to be—human food.
The more I explore the world, the more I realise veganism isn’t about connecting with nature; it’s about reshaping nature to fit a modern utopian fantasy. A fantasy created in a global metropolitan life, where everything looks, feels, and tastes the same—whether I’m in London, New York City, or [Kuala Lumpur](https://youtu.be/CdNtXQYpo3g?si=pu3wnD2IqCtU7Wui).
Try crossing the Namib desert on a vegan diet. You’ll turn back before the first day has gone, desperately hungry and searching for the nearest vegan restaurant—nowhere to be found. You’ll face a choice: Do I want to cling on to this utopian fantasy of what’s "natural," or do I eat the delicious food nature has already provided in abundance?
Game meat is plentiful in this serene, natural environment, as are fruits like melons, dates, and oranges. If you’re lucky enough to meet one of the nomadic Himba tribes who roam this vast desert, you might even be able to trade your way to goat. Out here, in the real world, nature won’t present you with a tofu tree or soybean plant.
It’s almost as if Planet Earth is sending us a message: eat what’s readily available, what doesn’t need heavy processing to become food.
![](https://substackcdn.com/image/fetch/w_5760,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a7557cf-afa3-45d3-8623-e3bb4cb62f63_6000x3376.jpeg) [A traditional Himba lady, Namibia](https://buymeacoffee.com/pilgartexplores/e/264839)
#### **The Soybean Assembly Line**
The irony of veganism lies in its branding—as a natural, healthy, and environmentally friendly choice. Clever marketing, but utter nonsense.
Soybean farming, a stable of vegan food, is one of the leading contributors to deforestation in the Amazon, alongside gold mining. Vegan advocates might argue that most soybeans are used for industry and animal feed, but they conveniently overlook the inherently unnatural nature of soybeans as human nutrition.
For instance, producing one litre of soy milk requires 300 litres of water. Add to that the seed oils, artificial colorants, flavors, textures, and E-marked chemicals listed on vegan meat and cheese ingredient labels. Barely anything about vegan meat or cheese is natural. It’s a synthetic symphony—carefully assembled in factories, stripped of the raw nutrients found in real, whole foods.
The hypocrisy is striking. The vegan industry presents itself as the solution to climate change, yet its reliance on resource-heavy, industrial processes undermines that very claim.
![](https://substackcdn.com/image/fetch/w_5760,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F992c5d7d-8dc1-45fd-b6d4-a6eccce802dc_2879x1333.png)The three-year moving average may represent a more accurate picture of the data trends due to uncertainty in year-to-year comparisons. All figures calculated with a 30 percent minimum tree cover canopy density. Source: [UMD GLAD Lab](https://glad.umd.edu/dataset/Fire_GFL).
#### **Why Do They Want You to Eat Vegan?**
So, who’s behind this "veganism good, real meat bad" narrative? Look no further than the architects of the climate change agenda—organisations like the World Bank, the IMF, the World Economic Forum, and companies like Beyond Meat and Impossible Foods. Investors like Bill Gates, through initiatives like Breakthrough Energy Ventures, also play a significant role.
These are organisations and individuals who operate without principles like open debate in search of truth, instead they don’t like to be challenged on their believes, they are afraid to engage in public discourse, like podcasts and freedom of speech based platforms like Substack. These organisations expect you to buy into their message, fall in line and don’t ask questions - The most outrageous examples are ESG policies and carbon credits - a giant coercion machine designed for those in the know to profit off of the actions they coerce individuals and businesses to perform. Do take that as investment advice if want…
As I see it, the most horrifying example of what the ambitions behind, vegan lab food and the climate change agenda is. Is the article published by the World Economic Forum titled “[*Welcome to 2030. I own nothing, have no privacy, and life has never been better*](https://medium.com/world-economic-forum/welcome-to-2030-i-own-nothing-have-no-privacy-and-life-has-never-been-better-ee2eed62f710)**”.** I can’t help but wonder if in 2030 we will all be eating vegan lab food, driving electric cars and living in urban areas, whilst being completely dependent on an internet without any privacy. In this dystopian future, it will be possible to turn any disobedient citizen off with the click of a button. Governments will have complete control of all lives, like an all seeing super God. They will control what you eat and at the click of a button, suddenly your computer won’t work, your money won’t transact and your car won’t drive. Just because you had a differing opinion.
The luxuries of the real world, being in touch with nature, experiencing nature in its beauty and magnificence will be for the few. The luxury of travel or living a self sufficient life, will be for the ultra few - The few that told you to eat vegan, move to the city and never step foot on an airplane, because an airplane destroys the planet.
> Remember if your opinion is based on the annihilation of other opinions you don’t agree with - then you have no opinion at all.
![](https://substackcdn.com/image/fetch/w_5760,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F423b3f24-4f1b-4a89-94a0-7a1c0cb2d274_1024x512.webp)The article was originally posted to Forbes.com but seems to have been taken down from most places online. I was only able to find the article in Medium
#### **Cultural Disconnect: Food and Identity**
I travel to experience different cultures, to better understand cultures, that are different from here I grew up. I travel to broaden my perspective on the world and the people that make up this wonderfully crazy planet, that we all call home. I also travel to enrich my taste-pallet. I love food. Food is a window into a society’s traditions, history, and identity. When I sit down for a flavourful Paella at restaurant in Valencian side street, I am eating a dish that tells me about Spanish history. The aromatic sweet saffron known as red gold, that gives the paella its distinct taste, came to Spain with Arabic tradesmen that conquered large parts of the Iberian peninsula. The tomatoes arrived on my plate from the Andean mountains in South America, brought back to Spain by the conquistadors of the Spanish empire.
The paella is history lesson in itself. The Paella tells the story about the territory that we know as modern Spain. The Paella tells me, that Spain was once dominated by islam. Which hints at why the famous Spanish Flamenco music, has so many sounds, that sound oddly familiar to the music of the Arab world, I heard when I was travelling around Turkey. The Paella also tells me about Spain’s history as a global empire reaching far beyond the shores modern day Spain. Food is about a connection to culture and history. Food is able to build connections between different cultures.
#### **Food Connects Cultures**
It was a hot autumn afternoon, I was walking around Diyarbakir, the capital of Turkish Kurdistan. In the background the local mosques were calling for prayer, but I wasn’t heading for the mosque to ask for forgiveness for my sins, I was on the hunt for some food, some local food. I thought to myself “hopefully I can meet a local and establish a connection”. It was my second day in Diyarbakir, so far I had mostly communicated with the locals via hand signs, google translate and the sort broken English of a five year old, I find myself opting for, when ever I speak to someone who barely knows how to say “how are you?”.
My eyes caught two young men in the midst of installing a projector in the covered terrace area of one of the local restaurants. Inside there was a handful of tables with men drinking Turkish çay tea and smoking shisha pipes. They all looked at me with a welcoming smile and a facial expression of general puzzlement of my presence. Not many European foreigner venture to the southern parts of Turkey, where the Kurdish people live. The area is near the Syrian border and Kurdistan has long been painted as terrorist area.
As I approached the restaurant the waiter pointed me to a table, handed me the menu then with broken English and few hand gestures, he signalled for me to wait. I proceeded to investigate the menu, of course all in Turkish, I had managed to pick up some the basic words necessary for ordering food during my travels. I wasn’t completely lost in translation. The waiter came back with another young man, my age, Bawer. Bawer sat down in front of me with his cigarette in one mouth and his ashtray in the other. He offered me a cigarette, I politely accepted, then he said “How are you?” “Do you need any help?” His eyes lit up when I said I had my eyes on the Saç Tava, a Turkish stew with tomatoes, vegetables, chilies and mouthwatering tender lamb, and asked if he could recommend that? Bawer said “It’s my favourite dish but be careful it’s spicy”. I offered to order for him as well but he said no thanks. I ordered food for me and pot of tea for us to share.
![](https://substackcdn.com/image/fetch/w_5760,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5438f32f-6256-4997-9ecf-fa9f1f3c52f3_1600x1200.jpeg) Bawer and his friends
This was how I met Bawer, Bawer spoke great English and was able to answer all my questions about Kurds and Kurdish identity, the historic fights between Kurds and the Turkish government. The next day I met back up with Bawer and two of his friends, they gave me a tour of the city, told me all about life as a Kurd in Turkey. In the evening they even invited me to a Kurdish wedding from one of their friends, but these are stories for another day.
#### **Conclusion**
My point is: In this utopian fantasy world of the future, where we are all vegans. All food will be produced in labs and factories. All food will taste the same, no matter where you go in the world. If that becomes the reality, then this experience and countless others just like it, would never happen. Local culture would slowly die, so would beautiful spontaneous meetings, with strangers over food in some foreign, far away place.
If that is where the world of tomorrow is going, then I’m glad I got to see it beforehand.
-
@ a39d19ec:3d88f61e
2024-11-21 12:05:09
A state-controlled money supply can influence the development of socialist policies and practices in various ways. Although the relationship is not deterministic, state control over the money supply can contribute to a larger role of the state in the economy and facilitate the implementation of socialist ideals.
## Fiscal Policy Capabilities
When the state manages the money supply, it gains the ability to implement fiscal policies that can lead to an expansion of social programs and welfare initiatives. Funding these programs by creating money can enhance the state's influence over the economy and move it closer to a socialist model. The Soviet Union, for instance, had a centralized banking system that enabled the state to fund massive industrialization and social programs, significantly expanding the state's role in the economy.
## Wealth Redistribution
Controlling the money supply can also allow the state to influence economic inequality through monetary policies, effectively redistributing wealth and reducing income disparities. By implementing low-interest loans or providing financial assistance to disadvantaged groups, the state can narrow the wealth gap and promote social equality, as seen in many European welfare states.
## Central Planning
A state-controlled money supply can contribute to increased central planning, as the state gains more influence over the economy. Central banks, which are state-owned or heavily influenced by the state, play a crucial role in managing the money supply and facilitating central planning. This aligns with socialist principles that advocate for a planned economy where resources are allocated according to social needs rather than market forces.
## Incentives for Staff
Staff members working in state institutions responsible for managing the money supply have various incentives to keep the system going. These incentives include job security, professional expertise and reputation, political alignment, regulatory capture, institutional inertia, and legal and administrative barriers. While these factors can differ among individuals, they can collectively contribute to the persistence of a state-controlled money supply system.
In conclusion, a state-controlled money supply can facilitate the development of socialist policies and practices by enabling fiscal policies, wealth redistribution, and central planning. The staff responsible for managing the money supply have diverse incentives to maintain the system, further ensuring its continuation. However, it is essential to note that many factors influence the trajectory of an economic system, and the relationship between state control over the money supply and socialism is not inevitable.
-
@ fd208ee8:0fd927c1
2024-11-21 07:24:34
## The motherhood illusion
Growing up, I was always told that women wanted children, whilst men wanted sex. So, marriage was created, to unite these two urges, and men and women don't otherwise particularly differ. But, it turns out, that **women want protection and sex, and men want children and sex**.
This is why women tend to be attracted to more masculine men (they're associated with protection) and men tend to be attracted to more feminine women (they're associated with motherhood). Women who are attracted to men, who aren't overtly masculine, are looking for a different aspect of protection (reliability, steady income or wealth, emotional security, etc.)
This wasn't readily apparent, in earlier generations, as widespread, youthful marriage meant that there weren't any real decisions being made by the participants. Almost all women got married and had kids, and almost all men got married and had sex. *Math checks out.* But the number of women who could protect and provide for themselves was low, and the men marrying were often very young and libidinous, and not yet contemplating their own legacy.
Feminism, easy abortion, deindustrialization, delayed marriage, and reliable contraception have dissolved this illusion, completely. Millions of Western women quickly turned into cougars, careerists, party girls, and e-girls, and an entire army of childless men and sidelined dads bubbled up and began to make their pain known. Humanity's dirty underbelly has been exposed.
*Women aren't as sweet, as we thought, and men are much sweeter.*
![piggy-back](https://i.nostr.build/qPfTZHdBqBFSt7j8.jpg)
Women also want children, but not as intensely. In fact, they seem to often viscerally dislike children, and are jealous of the protection they are to give them. So, they are prone to offing their offspring because they are averse to having any in-house competition.
If you just left women up to their own devices and reduced the social pressure, at least a fifth of them wouldn't bother having children, at all, and another quarter will have one and then lose interest or age out. This is not a new phenomenon, as we can see.
![birth statistics](https://i.nostr.build/wef63a6GYL21AVa5.png)
The male competition for potential mothers turns out to be absolutely brutal, and more difficult than simply finding a woman to sleep with. And, now, we finally understand why men traditionally jumped through so many hoops, to attain a wife. It wasn't for the sex; we've always had brothels, masturbation, and pornography. It was for the familial comfort, and, especially, for the children.
## Good fathers make good mothers
Some women don't know if they are "potential mothers", until they meet a "potential father", and their urge to procreate suddenly kicks in. They didn't want children for their own sake, but now they want some for his sake. All of a sudden, they're imagining themselves rocking the cradle, googling "what to eat, when you're expecting", and find themselves gushing over anything that gives off Hint of Infant.
I'm pregnant! Look what I can do! Look what I can do!
For you, darling.
![young couple](https://i.nostr.build/pMKgMxiwkoS7GBfL.jpg)
Women married to men they are deeply in love with, are much more likely to desire to become mothers (and be devastated by infertility), and make for better mothers, because children are like individualized presents they can give to their husband.
They want to impress him. Most want to be decent parents in their own right, but the urge to impress seems to raise this to a much higher level because *women are vain*, and therefore focused on raising their own status and how they appear to others. And the greatest "other", of a happy wife, is her husband.
Because *men are narcissistic*, and therefore in love with anything associated with themselves (which underpins their obsession with owning property), men have an intense attachment to their children. What is more "yours", than your progeny?
![Holding hands](https://i.nostr.build/5Wq2AdHuaehHLlII.jpg)
Fathers seem to develop a special attachment to, or fondness for, the mothers of their children, that goes beyond lust or romantic love; they never forgot who gave them this new Mini Me. And they are often quite impressed by their own ability to perform this trick numerous times, which leads to the intense satisfaction they feel at "going into serial production" and churning out more of those Mini Mes until their adoring wife pleads for mercy.
Men want children. Women, who love a man, want to give him those children and gain the fidelity that comes along with those children. This is the actual "trade" underpinning the urge to marry.
![Family scene](https://i.nostr.build/g4EjiLASoPkdDemQ.jpg)
-
@ 1bda7e1f:bb97c4d9
2024-11-21 04:17:08
### Tldr
- Nostr is an open protocol which is interoperable with all kinds of other technologies
- You can use this interoperability to create custom solutions
- Nostr apps define a custom URI scheme handler "nostr:"
- In this blog I use this to integrate Nostr with NFC cards
- I create a Nostr NFC "login card" which allows me to log into Amethyst client
- I create a Nostr NFC "business card" which allows anyone to find my profile with a tap
### Inter-Op All The Things!
Nostr is a new open social protocol for the internet. This open nature is very exciting because it means Nostr can add new capabilities to all other internet-connected technologies, from browsers to web applications. In my view, it achieves this through three core capabilities.
- A lightweight decentralised identity (Nostr keys, "npubs" and "nsecs"),
- A lightweight data distribution network (Nostr relays),
- A set of data interoperability standards (The Nostr Improvement Protocols "NIPs"), including the "nostr:" URI which we'll use in this post.
The lightweight nature is its core strength. Very little is required to interoperate with Nostr, which means many existing technologies can be easily used with the network.
Over the next few blog posts, I'll explore different Nostr inter-op ideas, and also deliver my first small open source projects to the community. I'll cover–
- NFC cards integrated with Nostr (in this post),
- Workflow Automations integrated with Nostr,
- AI LLMs integrated with Nostr.
#### The "Nostr:" URI
One feature of Nostr is it defines a custom URI scheme handler "nostr:". What is that?
A URI is used to identify a resource in a system. A system will have a protocol handler registry used to store such URI's, and if a system has a URI registered, then it knows what to do when it sees it. You are probably already familiar with some URI schemes such as "http:" and "mailto:". For example, when you click an http link, the system knows that it describes an http resource and opens a web browser to fetch the content from the internet.
A nostr: link operates in the same way. The nostr: prefix indicates a custom URI scheme specifically designed for the Nostr protocol. If a system has a Nostr application installed, that application may have registered "nostr:" in the protocol handler registry. On that system when a "nostr:" URI is clicked, the system will know that it describes a nostr resource and open the Nostr client to fetch the content from the nostr relay network.
This inter-op with the protocol handler registry gives us the power to do nice and exciting things with other technologies.
### Nostr and NFC
Another technology that uses URIs is NFC cards. NFC (Near Field Communication) is a wireless technology that enables devices to exchange data over a few centimeters. It’s widely used in contactless payments, access control, and information sharing.
NFC tags are small chips embedded in cards or stickers which can store data like plain text, URLs, or custom URIs. They are very cheap (cents each) and widely available (Amazon with next day delivery).
When an NFC tag contains a URI, such as a http: (or nostr:) link, it acts as a trigger. Tapping the tag with an NFC-enabled device launches the associated application and processes the URI. For example, tapping a tag with "nostr:..." could open a Nostr client, directing it to a specific login page, public profile, or event.
This inter-op allows us to bridge the physical world to Nostr with just a tap.
#### Many useful ideas
There are many interesting ways to use this. Too many for me to explore. Perhaps some of these are interesting for your next side hustle?
- Nostr NFC "login cards" – tap to log into Amethyst on Android,
- Nostr NFC "business cards" – give to connections so they can tap to load your npub,
- Nostr NFC "payment cards" – integrating lightning network or ecash,
- Nostr NFC "doorbells", "punch cards", "drop boxes", or "dead drops" – put a tag in a specific place and tap to open a location-specific message or chat,
- Integrations with other access control systems,
- Integrations with other home automation systems,
- Many more ...
To start with I have built and use the "login card" and "business card" solutions. This blog post will show you how to do the same.
### Nostr Login Card
You can use an NFC card to log into your Nostr client.
Most Nostr clients accept a variety of login methods, from posting your nsec into the app (insecure) to using a remote signer (more secure). A less known but more secure method is to sign into a session with a tap of a specially-configured NFC card. Amethyst is a Nostr client on Android which supports this type of login.
- A secure method for logging in
- Optionally keeps no log in history on the device after logout
- Does not require users to know or understand how keys work
- Keys are kept secure on a physically-separated card to reduce risk of compromise
Nostr devs think that this is useful for anti-establishment actors–Fair enough. For me, I am interested in this login card pattern as it could be useful for rolling out identities within an organisation context with less training (office workers are already familiar with door access cards). This pattern potentially abstracts away key management to the IT or ops team who provision the cards.
I first discovered this when [Kohei](nostr:npub16lrdq99ng2q4hg5ufre5f8j0qpealp8544vq4ctn2wqyrf4tk6uqn8mfeq) demonstrated it in [his video](nostr:nevent1qqstx0jy5jvzgh7wr6entjuw7h58d7mapupfdpt9hkf7s4gze34a0vspremhxue69uhkummnw3ez6ur4vgh8wetvd3hhyer9wghxuet59upzp47x6q2txs5ptw3fcj8ngj0y7qrnm7z0ft2cptshx5uqgxn2hd4ckqyqd3).
Here's how you set it up at a high level–
1. Buy yourself some NFC cards
2. Get your Nostr key ready in an encrypted, password protected format called "nencryptsec"
3. Write the nencryptsec to the NFC card as a custom URI
4. Tap to load the login screen, and enter your password to login
Here it is in detail–
#### Buy yourself some NFC cards
I found no specific requirements. As usual with Nostr so far, I tried to the cheapest possible route and it worked. Generic brand NFC cards shipped from China, I believe it was 50X for $15 from Amazon. Your mileage may vary.
#### Get your Nostr key ready
Your key will be saved to the NFC card in an encrypted password-protected format called "nencryptsec". Several applications support this. As we'll be using this to login to Amethyst, we will use Amethyst to output the nencryptsec for us.
1. Login to Amethyst with your nsec,
2. Open the sidebar and click "Backup Keys",
3. Enter a password, and click "Encrypt and my secret key",
4. It will add the password-protected key to your clipboard in the format "ncryptsec1...",
5. Remember to backup your password.
#### Write the ncryptsec to the NFC card
1. Download the free [NFC Tools app](https://play.google.com/store/apps/details?id=com.wakdev.wdnfc) to your device, and open it,
2. Click "Write" and "Add a record", then click "Custom URL / URI",
3. Paste your nencryptsec with the nostr URI in front, i.e. "nostr:ncryptsec1..." and click OK,
4. Click "Write". NFC Tools will prompt you to "Approach an NFC tag",
5. Place your NFC card against your phone, and it will write to the card,
6. Your card is ready.
#### Tap to load the login screen
Tap the card against your phone again, and your phone should open the login screen of Amethyst and prompt you for your password.
Once you enter your password, Amethyst will decrypt your nsec and log you in.
Optionally, you can also set the app to forget you once you log out.
You have created a Nostr NFC "login card".
### Nostr Business Card
You can use another NFC card to give anyone you meet a link straight to your Nostr profile.
I attended [Peter McCormack](nostr:npub14mcddvsjsflnhgw7vxykz0ndfqj0rq04v7cjq5nnc95ftld0pv3shcfrlx)'s #CheatCode conference in Sydney and gave a few of these out following the Nostr panel, notably to [Preston Pysh](nostr:npub1s5yq6wadwrxde4lhfs56gn64hwzuhnfa6r9mj476r5s4hkunzgzqrs6q7z) where it [got some cut through](nostr:nevent1qqsdx0acma85u9knejnvfnfms9pfv27g97mfnnq9fnxslsa9vtrx73spremhxue69uhkummnw3ez6ur4vgh8wetvd3hhyer9wghxuet59upzppggp5a66uxvmntlwnpf5384twu9e0xnm5xth9ta58fpt0dexysy26d4nm) and found me my first 100 followers. You can do the same.
To create your Nostr NFC "business card" is even easier than your NFC "login card".
1. Buy yourself some NFC cards,
2. Download the free [NFC Tools app](https://play.google.com/store/apps/details?id=com.wakdev.wdnfc) to your device, and open it,
2. Click "Write" and "Add a record", then click "Custom URL / URI",
3. Write your npub to the NFC card as a custom URI in the format "nostr:npub1..." (e.g. for me this is "nostr:npub1r0d8u8mnj6769500nypnm28a9hpk9qg8jr0ehe30tygr3wuhcnvs4rfsft"),
4. Your card is ready.
Give the card to someone who is a Nostr user, and when they tap the card against their phone it will open their preferred Nostr client and go directly to your Nostr profile page.
You have created a Nostr NFC "business card".
### What I Did Wrong
I like to share what I did wrong so you don't have to make the same mistakes. This time, this was very easy, and little went wrong. In general
- When password-protecting your nsec, don't forget the password!
- When writing to the NFC card, make sure to use "Custom URI/URL" as this accepts your "nostr:" URI scheme. If you use generic "URI/URL" it won't work.
### What's Next
Over my first four blogs I have explored creating a good Nostr setup
- [Mined a Nostr pubkey and backed up the mnemonic](nostr:naddr1qqsy66twd9hxwtteda6hyt2kv9hxjare94g82cntv4uj6drfw4cxyeszyqda5lslwwttmgk3a7vsx0dgl5kuxc5pq7gdlxlx9av3qw9mjlzdjqcyqqq823c6e2ekw)
- [Set up Nostr payments with a Lightning wallet plus all the bells and whistles](nostr:naddr1qq34xet5w35kueedw4cz65rp09kk2mn5wvkk7m3dfehhxarj95mk7dnvwvmsygqmmflp7uukhk3drmueqv763lfdcd3gzpusm7d7vt6ezquth97ymypsgqqqw4rsuql6je)
- [Set up NIP-05 and Lighting Address at my own domain](nostr:naddr1qqyx2efcvy6rvcnrqyghwumn8ghj7mn0wd68ytnhd9hx2tczyqda5lslwwttmgk3a7vsx0dgl5kuxc5pq7gdlxlx9av3qw9mjlzdjqcyqqq823c634nh0)
- [Set up a Personal Relay at my own domain](nostr:naddr1qqyx2efcvy6rvcnrqy2hwumn8ghj7un9d3shjtnyv9kh2uewd9hj7q3qr0d8u8mnj6769500nypnm28a9hpk9qg8jr0ehe30tygr3wuhcnvsxpqqqp65wmzpn9e)
Over the next few blogs I will be exploring different types of Nostr inter-op
- NFC cards integrated with Nostr (this post)
- Workflow Automations integrated with Nostr
- AI LLMs integrated with Nostr
Please be sure to let me know if you think there's another Nostr topic you'd like to see me tackle.
GM Nostr.
-
@ 30ceb64e:7f08bdf5
2024-11-21 01:24:36
Damn,
I always put too many projects on my plate.
I really need to focus on one at a time or a couple of them.
I'm starting to feel the risk of not doing everything I wanted to accomplish.
I think with a few days hard push, I'd be able to knock out a lot.
- Article Blog
- Cool Shopstr Site
- Nostr Running App
- Podcast with AI reading my Blogs, with wavlake beats playing in the background
- Radio Show
- Music Videos
- Couple more Wavlake Albums (TheWildHustle, and Jayhawk)
- Viny Record
- Short Story
- A brand/npub to release some of my projects, instead of overloading my one npub.
This week I want to hit coding and writing hard.
I need to a hard push will get me to a good place, considering the steps i've already taken.
The start date for my part time job has been moved to December 9th, Its a weekend job working 14 hour shifts on Saturday and Sunday......Ha! I'll be assisting teens with disabilities like downsyndrome and whatnot. I'm looking forward to doing something more than just clicking fiat buttons on the computer and possibly making a direct difference in a freaks life.
I've proofed of work pretty well in the bear. Now I need to execute in this early bull.
How I plan to execute
- I'm TheWIldHustle so it behooves me to lean into my sporadic nature
- Get alot of work done when I feel the animal spirits take me
- Broadcast my actions and rely on negative emotions (me not wanting to be a larp) to motivate my actions and force me into work with an angry ferver.
- Try to maintain a constructive mood
More specifically
- Autoposting blogposts to nostr would be a good idea, I already have some brain dumps in obsidian i can throw into an llm and edit to get my points across, and the autoposting will consistancy if done right.
- The radio show is probably just me using zap.stream and streaming all of the beats i've come out with on wavlake so far and so setting up a stream shouldnt be too dificult and i'd iterrate over time with different processes
- I know where to get the vinyl done, I have an album mixed and mastered with artwork bought from a graphic design artist to use for the front cover just need to hit the buy button and offer it on shopstr when it arrives
- The running app at this point is about 20 percent away from being released as a noob beta project. I primarily need to work on nostr login, UI/UX and testing.
- Short story rough outline is done, I'll probably throw the thing into Claude and edit just as I will with the blogposts.
- The podcast will be a reading of my blog posts with my wavlake beats playing in the background
- The shopstr site will sell digital projects like my stories ebook, wavlake beats and beat tapes. Will sell physical stuff like vinyl records, Album artwork as posters, printify merch-like stuff.
- Music videos/Shorts will probably come from AnimalSunrise/Wavlake beats
- Might want to do some sort of brand consultation with a freak on nostr or fiverr to develop a brand to push out some of this stuff.
Fun times ahead,
Thanks for reading,
Wish me luck,
Hustle
originally posted at https://stacker.news/items/776493
-
@ 5e5fc143:393d5a2c
2024-11-19 10:20:25
Now test old reliable front end
Stay tuned more later
Keeping this as template long note for debugging in future as come across few NIP-33 post edit issues
-
@ af9c48b7:a3f7aaf4
2024-11-18 20:26:07
## Chef's notes
This simple, easy, no bake desert will surely be the it at you next family gathering. You can keep it a secret or share it with the crowd that this is a healthy alternative to normal pie. I think everyone will be amazed at how good it really is.
## Details
- ⏲️ Prep time: 30
- 🍳 Cook time: 0
- 🍽️ Servings: 8
## Ingredients
- 1/3 cup of Heavy Cream- 0g sugar, 5.5g carbohydrates
- 3/4 cup of Half and Half- 6g sugar, 3g carbohydrates
- 4oz Sugar Free Cool Whip (1/2 small container) - 0g sugar, 37.5g carbohydrates
- 1.5oz box (small box) of Sugar Free Instant Chocolate Pudding- 0g sugar, 32g carbohydrates
- 1 Pecan Pie Crust- 24g sugar, 72g carbohydrates
## Directions
1. The total pie has 30g of sugar and 149.50g of carboydrates. So if you cut the pie into 8 equal slices, that would come to 3.75g of sugar and 18.69g carbohydrates per slice. If you decided to not eat the crust, your sugar intake would be .75 gram per slice and the carborytrates would be 9.69g per slice. Based on your objective, you could use only heavy whipping cream and no half and half to further reduce your sugar intake.
2. Mix all wet ingredients and the instant pudding until thoroughly mixed and a consistent color has been achieved. The heavy whipping cream causes the mixture to thicken the more you mix it. So, I’d recommend using an electric mixer. Once you are satisfied with the color, start mixing in the whipping cream until it has a consistent “chocolate” color thorough. Once your satisfied with the color, spoon the mixture into the pie crust, smooth the top to your liking, and then refrigerate for one hour before serving.
-
@ a39d19ec:3d88f61e
2024-11-17 10:48:56
This week's functional 3d print is the "Dino Clip".
![](https://image.nostr.build/93caa84abef0ee82a106d3faf3b344a100031316a00b6b1ca23d8484ad83dec7.jpg)
## Dino Clip
I printed it some years ago for my son, so he would have his own clip for cereal bags.
Now it is used to hold a bag of dog food close.
The design by "Sneaks" is a so called "print in place". This means that the whole clip with moving parts is printed in one part, without the need for assembly after the print.
![](https://image.nostr.build/abe8332e3cf91648b98f89dd2a180d4fd10718e4f5b474efbc0b7d3e79170375.jpg)
The clip is very strong, and I would print it again if I need a "heavy duty" clip for more rigid or big bags.
Link to the file at [Printables](https://www.printables.com/model/64493-dino-clip-mechanical-cam-chip-clip-print-in-place)
-
@ fd208ee8:0fd927c1
2024-11-17 09:14:56
You don't understand how insidious open-borders propaganda is, until you realize that _it's an attempt to remove all differentiating traits from humans_. They call this "strengthening individuality by removing nationality" (hello, newspeak), but what makes humans individual is their particular collection of traits, and nationality (and ethnicity, religion, etc. -- nationality is just the first domino they want to topple) is one of those.
![Newspeak](https://i0.wp.com/wasmormon.org/wp-content/uploads/2023/05/image-1-3.jpg)
Humans are not blank slates. Like DNA or physiognomy, our personalities are differing jumbles of cultural "letters". Each person selects consciously and subconsciously from amongst these letters, adding to or rejecting them, amplifying or suppressing them, twisting or combining them, building on top of them... and that's what makes you into You.
Open borders is an attempt to reduce the number of cultural letters you can build your "You" out of. If you take away the word "German", I am not liberated. There is simply one less adjective, with which I can describe myself. You have merely eradicated information, crippled language, and reduced my choices. I can then no longer define myself according to "German things", but I can also no longer define myself in opposition to German things.
## Enter the Borg
![Borg Queen](https://d2thvodm3xyo6j.cloudfront.net/media/2020/01/ff5814c200adf361-600x338.jpg)
We are easier to control and brainwash and persecute, if we are centralized and homogenized. As if the entire world were one, big prison and we were all forced to undergo the same education, wear the same clothes, follow the same rules, eat the same foods, enjoy the same entertainment, live the same lifestyle, share the same diseases and cures, enjoy the same lockdowns, join in the same cancel culture, fight the same wars.
That is what globalization brings. That is the end game of Open Borders:
* No more cultural evolution or revolution.
* Genes, but no memes.
* You can go everywhere, but everywhere is the same, so you just stay home.
* You can meet people from all over, but they are all the same, so you just don't bother.
* One mass of humanity, that can be easily molded and manipulated.
-
@ 13351007:eccd002a
2024-11-13 16:34:01
[{"_id":"5478974e-5e9b-4ccc-8cee-8485f60838ef","user_id":"b34f99f110bb65ff4b5527f8fb1d015951a3038370fd95adc34d81d9006b0fcc","tradingPartner":"hank","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_SELL","adTypeReal":"ONLINE_SELL","price":169.05,"amount":202.86468,"amountCurrency":"xmr","buyerSettlementAddress":"888tNkZrPN6JsEgekjMnABU4TBzc2Dt29EPAvkRxbANsAnjyPbb3iQ1YBRk1UXcdRsiKc9dhwMVgN5S9cQUiyoogDavup3H","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T16:34:01.270Z"},{"_id":"5478974e-5e9b-4ccc-8cee-8485f60838ef","user_id":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","tradingPartner":"liam","tradeId":"5478974e-5e9b-4ccc-8cee-8485f60838ef","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_BUY","adTypeReal":"ONLINE_SELL","price":169.05,"amount":202.86468,"amountCurrency":"xmr","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T16:34:01.270Z"}]
-
@ 13351007:eccd002a
2024-11-13 16:33:01
[{"_id":"662f7f07-a7ef-4f29-9bdb-6d199e7dac2c","user_id":"b34f99f110bb65ff4b5527f8fb1d015951a3038370fd95adc34d81d9006b0fcc","tradingPartner":"hank","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_SELL","adTypeReal":"ONLINE_SELL","price":169.05,"amount":500.03,"amountCurrency":"fiat","buyerSettlementAddress":"888tNkZrPN6JsEgekjMnABU4TBzc2Dt29EPAvkRxbANsAnjyPbb3iQ1YBRk1UXcdRsiKc9dhwMVgN5S9cQUiyoogDavup3H","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T16:33:01.332Z"},{"_id":"662f7f07-a7ef-4f29-9bdb-6d199e7dac2c","user_id":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","tradingPartner":"liam","tradeId":"662f7f07-a7ef-4f29-9bdb-6d199e7dac2c","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_BUY","adTypeReal":"ONLINE_SELL","price":169.05,"amount":500.03,"amountCurrency":"fiat","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T16:33:01.332Z"}]
-
@ 13351007:eccd002a
2024-11-13 16:32:01
[{"_id":"a740e2cb-8940-4d1b-bf4c-271de778bd77","user_id":"b34f99f110bb65ff4b5527f8fb1d015951a3038370fd95adc34d81d9006b0fcc","tradingPartner":"hank","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_SELL","adTypeReal":"ONLINE_SELL","price":169.05,"amount":500.02,"amountCurrency":"fiat","buyerSettlementAddress":"888tNkZrPN6JsEgekjMnABU4TBzc2Dt29EPAvkRxbANsAnjyPbb3iQ1YBRk1UXcdRsiKc9dhwMVgN5S9cQUiyoogDavup3H","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T16:32:01.342Z"},{"_id":"a740e2cb-8940-4d1b-bf4c-271de778bd77","user_id":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","tradingPartner":"liam","tradeId":"a740e2cb-8940-4d1b-bf4c-271de778bd77","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_BUY","adTypeReal":"ONLINE_SELL","price":169.05,"amount":500.02,"amountCurrency":"fiat","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T16:32:01.342Z"}]
-
@ 13351007:eccd002a
2024-11-13 16:31:10
[{"_id":"6b08a49c-6812-4e79-8f5b-0a1eff7b8846","user_id":"b34f99f110bb65ff4b5527f8fb1d015951a3038370fd95adc34d81d9006b0fcc","tradingPartner":"hank","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_SELL","adTypeReal":"ONLINE_SELL","price":169.05,"amount":500.01,"amountCurrency":"fiat","buyerSettlementAddress":"888tNkZrPN6JsEgekjMnABU4TBzc2Dt29EPAvkRxbANsAnjyPbb3iQ1YBRk1UXcdRsiKc9dhwMVgN5S9cQUiyoogDavup3H","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T16:31:10.741Z"},{"_id":"6b08a49c-6812-4e79-8f5b-0a1eff7b8846","user_id":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","tradingPartner":"liam","tradeId":"6b08a49c-6812-4e79-8f5b-0a1eff7b8846","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_BUY","adTypeReal":"ONLINE_SELL","price":169.05,"amount":500.01,"amountCurrency":"fiat","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T16:31:10.741Z"}]
-
@ 13351007:eccd002a
2024-11-13 14:50:53
[{"_id":"c8b5c272-899c-4258-8ed8-d39d8b1f2802","user_id":"b34f99f110bb65ff4b5527f8fb1d015951a3038370fd95adc34d81d9006b0fcc","tradingPartner":"hank","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_SELL","adTypeReal":"ONLINE_SELL","price":169.05,"amount":500,"amountCurrency":"fiat","buyerSettlementAddress":"888tNkZrPN6JsEgekjMnABU4TBzc2Dt29EPAvkRxbANsAnjyPbb3iQ1YBRk1UXcdRsiKc9dhwMVgN5S9cQUiyoogDavup3H","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T14:50:53.706Z"},{"_id":"c8b5c272-899c-4258-8ed8-d39d8b1f2802","user_id":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","tradingPartner":"liam","tradeId":"c8b5c272-899c-4258-8ed8-d39d8b1f2802","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_BUY","adTypeReal":"ONLINE_SELL","price":169.05,"amount":500,"amountCurrency":"fiat","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T14:50:53.706Z"}]
-
@ 13351007:eccd002a
2024-11-13 09:17:38
[{"_id":"f61999d4-6dd5-4593-9798-17980ecebd22","user_id":"b34f99f110bb65ff4b5527f8fb1d015951a3038370fd95adc34d81d9006b0fcc","tradingPartner":"hank","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_SELL","adTypeReal":"ONLINE_SELL","price":169.05,"amount":100.02,"amountCurrency":"fiat","buyerSettlementAddress":"888tNkZrPN6JsEgekjMnABU4TBzc2Dt29EPAvkRxbANsAnjyPbb3iQ1YBRk1UXcdRsiKc9dhwMVgN5S9cQUiyoogDavup3H","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T09:17:38.105Z"},{"_id":"f61999d4-6dd5-4593-9798-17980ecebd22","user_id":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","tradingPartner":"liam","tradeId":"f61999d4-6dd5-4593-9798-17980ecebd22","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_BUY","adTypeReal":"ONLINE_SELL","price":169.05,"amount":100.02,"amountCurrency":"fiat","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T09:17:38.105Z"}]
-
@ 13351007:eccd002a
2024-11-13 08:02:18
[{"_id":"c178a999-25e0-4bf5-b478-b6f22ae9bfbd","user_id":"b34f99f110bb65ff4b5527f8fb1d015951a3038370fd95adc34d81d9006b0fcc","tradingPartner":"hank","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_SELL","adTypeReal":"ONLINE_SELL","price":169.05,"amount":102,"amountCurrency":"fiat","buyerSettlementAddress":"888tNkZrPN6JsEgekjMnABU4TBzc2Dt29EPAvkRxbANsAnjyPbb3iQ1YBRk1UXcdRsiKc9dhwMVgN5S9cQUiyoogDavup3H","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T08:02:18.346Z"},{"_id":"c178a999-25e0-4bf5-b478-b6f22ae9bfbd","user_id":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","tradingPartner":"liam","tradeId":"c178a999-25e0-4bf5-b478-b6f22ae9bfbd","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_BUY","adTypeReal":"ONLINE_SELL","price":169.05,"amount":102,"amountCurrency":"fiat","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T08:02:18.346Z"}]
-
@ 13351007:eccd002a
2024-11-13 07:54:13
[{"_id":"b99131ca-10fb-48fd-be00-04aee70efd55","tradingPartner":"hank","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_SELL","adTypeReal":"ONLINE_SELL","price":169.05,"amount":100,"amountCurrency":"fiat","buyerSettlementAddress":"888tNkZrPN6JsEgekjMnABU4TBzc2Dt29EPAvkRxbANsAnjyPbb3iQ1YBRk1UXcdRsiKc9dhwMVgN5S9cQUiyoogDavup3H","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T07:54:13.400Z"},{"_id":"b99131ca-10fb-48fd-be00-04aee70efd55","tradingPartner":"liam","tradeId":"b99131ca-10fb-48fd-be00-04aee70efd55","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_BUY","adTypeReal":"ONLINE_SELL","price":169.05,"amount":100,"amountCurrency":"fiat","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T07:54:13.400Z"}]
-
@ 13351007:eccd002a
2024-11-13 07:54:13
[{"_id":"a8fd0883-c47a-4eba-bf4c-61ff15f836ff","tradingPartner":"hank","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_SELL","adTypeReal":"ONLINE_SELL","price":169.05,"amount":101,"amountCurrency":"fiat","buyerSettlementAddress":"888tNkZrPN6JsEgekjMnABU4TBzc2Dt29EPAvkRxbANsAnjyPbb3iQ1YBRk1UXcdRsiKc9dhwMVgN5S9cQUiyoogDavup3H","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T07:54:13.286Z"},{"_id":"a8fd0883-c47a-4eba-bf4c-61ff15f836ff","tradingPartner":"liam","tradeId":"a8fd0883-c47a-4eba-bf4c-61ff15f836ff","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_BUY","adTypeReal":"ONLINE_SELL","price":169.05,"amount":101,"amountCurrency":"fiat","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T07:54:13.286Z"}]
-
@ 13351007:eccd002a
2024-11-13 06:54:35
{"_id":"d12af7f8-9fad-4718-85d2-71de3e1ab22f","tradingPartner":"hank","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_SELL","adTypeReal":"ONLINE_SELL","price":169.05,"amount":1,"amountCurrency":"fiat","buyerSettlementAddress":"888tNkZrPN6JsEgekjMnABU4TBzc2Dt29EPAvkRxbANsAnjyPbb3iQ1YBRk1UXcdRsiKc9dhwMVgN5S9cQUiyoogDavup3H","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T06:54:35.527Z"}
-
@ 13351007:eccd002a
2024-11-13 06:54:35
{"_id":"45961f60-af28-49a7-8285-39d46a04ae04","tradingPartner":"liam","adId":"10df86b1-657c-4065-b5c8-d6f6bbe64a7b","adPublisher":"f462d21e10163eb0a403aec6b93ac57ec2f1b9455473e99304f571a51390b6b1","adType":"ONLINE_BUY","adTypeReal":"ONLINE_SELL","price":170.27,"amount":1.5,"amountCurrency":"fiat","paymentMethodCode":"VENMO","currencyCode":"USD","country":"United Kingdom","countryCode":"GB","paymentMethodDetail":"best rates really","msg":"","accountInfo":"","action":"open","added":"2024-11-13T06:54:35.127Z"}
-
@ 13351007:eccd002a
2024-11-13 06:54:35
{"_id":"79c3b4de-fb00-40e6-82b4-9c8474d90c43","tradingPartner":"hank","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_SELL","adTypeReal":"ONLINE_SELL","price":169.05,"amount":1.6,"amountCurrency":"fiat","buyerSettlementAddress":"888tNkZrPN6JsEgekjMnABU4TBzc2Dt29EPAvkRxbANsAnjyPbb3iQ1YBRk1UXcdRsiKc9dhwMVgN5S9cQUiyoogDavup3H","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T06:54:35.210Z"}
-
@ 13351007:eccd002a
2024-11-13 06:54:35
{"_id":"6189965d-885f-44a5-8283-236809f90bb4","tradingPartner":"liam","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_BUY","adTypeReal":"ONLINE_SELL","price":169.05,"amount":2,"amountCurrency":"fiat","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T06:54:35.193Z"}
-
@ 13351007:eccd002a
2024-11-13 06:54:34
{"_id":"fad63d53-f555-429e-916a-d2ea8968552d","tradingPartner":"hank","adId":"493d4425-5a4b-46b6-b1a4-2e1266ea1246","adPublisher":"1eb966a6a0218aba520aaac93be7dd8bf3830fc7710bc80caea3a6a5e3eddf94","adType":"ONLINE_SELL","adTypeReal":"ONLINE_SELL","price":169.05,"amount":20,"amountCurrency":"fiat","buyerSettlementAddress":"888tNkZrPN6JsEgekjMnABU4TBzc2Dt29EPAvkRxbANsAnjyPbb3iQ1YBRk1UXcdRsiKc9dhwMVgN5S9cQUiyoogDavup3H","paymentMethodCode":"NATIONAL_BANK","currencyCode":"USD","country":"United States of America","countryCode":"US","paymentMethodDetail":"fast and best trader","msg":"","accountInfo":"","action":"open","added":"2024-11-13T06:54:34.754Z"}
-
@ 13351007:eccd002a
2024-11-12 17:32:12
just testing with p tag
-
@ 13351007:eccd002a
2024-11-12 16:33:39
just testing with p tag
-
@ 13351007:eccd002a
2024-11-12 15:44:07
just testing
-
@ 6be5cc06:5259daf0
2024-11-12 03:11:11
### Primeiramente, o que é mempool?
Abreviação de memory pool (ou *"pool de memória"*) a mempool é uma espécie de fila onde as transações de Bitcoin ficam temporariamente armazenadas antes de serem confirmadas e incluídas em um bloco na blockchain.
Quando você realiza uma transação em uma rede blockchain, essa transação precisa ser validada e confirmada pelos mineradores (ou validadores). Porém, ela não é processada instantaneamente. Primeiro, ela vai para a mempool, onde aguarda até que um minerador a selecione para incluir no próximo bloco.
É assim:
* Você envia uma transação, ela é transmitida para a rede e vai parar na mempool de vários nós (computadores) que suportam a rede blockchain.
* As transações na mempool são organizadas pela taxa de transação que foi anexada. Quanto maior a taxa, mais rápido os mineradores tendem a escolher essa transação para incluí-la em um bloco, pois isso aumenta os ganhos deles.
* Os mineradores pegam as transações da mempool, criam um bloco com elas e, ao minerar (confirmar) esse bloco, as transações saem da mempool e entram na blockchain.
Aqui irei usar o site [mempool.emzy.de](https://mempool.emzy.de/) como referência, mas é importante entender que sites de mempool são representações visuais da mempool de um nó específico e não *a mempool do Bitcoin* em si. Ela não é centralizada, cada nó da rede mantém a sua própria versão da mempool. Assim, ela pode variar de um nó para outro. Esses sites ajudam a visualizar dados sobre transações e taxas.
É uma boa prática usar **VPN** ou **Tor** ao acessar tais sites se você estiver verificando uma transação específica sua, pois sua privacidade pode ficar comprometida se o site registrar esses dados. Se você estiver repetidamente acessando-o para monitorar a confirmação de uma transação, alguém pode conseguir correlacionar o endereço IP com essa atividade e revelar uma conexão indireta com o endereço da transação.
Dito isso...
### Como interpretar a mempool?
Vamos dividir isso em partes para fins didáticos.
---
![greenblocks](https://image.nostr.build/4be36e3dbb035a174dcec4d2c3806778624bb026ad9fc9b65418da28f6c755f2.png)
#### Faixa de taxas
Cada bloco verde representa uma faixa de taxa medida em satoshis por vByte (sats/vB).
Essa unidade de medida representa o valor pago por byte ocupado pela transação.
Quanto maior a taxa paga por uma transação, mais rápido ela tende a ser confirmada.
Quanto maior a transação em bytes, mais você precisa pagar para que ela seja confirmada.
Cada transação Bitcoin consiste em *entradas* e *saídas* (*inputs* e *outputs*):
* **Entradas** são referências a transações anteriores que estão sendo gastas, e cada entrada inclui informações como o endereço de origem, a assinatura (que valida a transação e pode variar de tamanho dependendo da complexidade da chave e do método de assinatura utilizado (como SegWit, que é mais eficiente). Quanto mais complexa a assinatura, maior será o tamanho em bytes) e outros dados. Quanto mais entradas uma transação tiver, maior será seu tamanho.
* **Saídas** representam o destino do Bitcoin, e quanto mais saídas, maior será o tamanho da transação. Embora as saídas ocupem menos espaço em bytes do que as entradas.
Ex.:
* ~4 sat/vB: Indica uma taxa média. Significa que, em média, as transações estão sendo processadas a 4 satoshis por vByte;
* 3-5 sat/vB: Isso significa que as transações estão sendo processadas com uma taxa entre 3 e 5 satoshis por vByte.
#### MB
Simplesmente o tamanho do bloco medido em megabytes :)
#### Número de transações
Essa seção informa quantas transações estão aguardando confirmação para cada faixa de taxa (bloco). Quanto maior o número de transações, maior a demanda pela faixa de taxa especificada.
#### Tempo estimado para confirmação
Aqui é mostrado o tempo médio de espera para transações que pagam taxas dentro da faixa especificada. Se você pagar uma taxa maior, a transação será confirmada mais rapidamente; uma taxa menor significa que a transação pode levar mais tempo para ser confirmada, especialmente se a rede estiver congestionada.
---
![transationfees](https://image.nostr.build/4dafc88e54f68cafcffdff4a3e58c52d08076c14c3b3ea17afcb1f8f4b4b9443.png)
Esta seção mostra sugestões de taxa em diferentes níveis de prioridade para os usuários:
#### Sem Prioridade
Exibe a taxa mínima necessária para transações que não precisam de confirmação rápida.
#### Prioridade Baixa
Sugestão de taxa para transações que podem esperar um tempo moderado, com expectativa de confirmação em um ou dois blocos.
#### Prioridade Média e Alta
São as faixas de taxa recomendadas para quem precisa que a transação seja confirmada rapidamente. "Prioridade Alta" paga uma taxa maior, garantindo que a transação seja incluída no próximo bloco.
---
![purpleblocks](https://image.nostr.build/3d455253783dc137620f5541fb0a2816816e40ab63c0becf94241277e9177f77.png)
Cada bloco roxo representa um bloco recém-minerado. As informações mostradas incluem:
#### Taxa média paga
Refere-se à taxa média em satoshis/vB paga por todas as transações incluídas em um bloco recém-minerado. Isso reflete o valor médio que os usuários estão dispostos a pagar para que suas transações sejam confirmadas rapidamente.
#### Número de transações
Este número indica quantas transações foram processadas no bloco minerado. O tamanho do bloco é limitado, então, quanto maior o número de transações, menor será o espaço disponível para novas transações, o que pode influenciar as taxas de transação.
#### Tempo desde a mineração
Esta métrica informa quanto tempo se passou desde que o bloco foi minerado e adicionado à blockchain.
#### Pool de mineração
Exibe o nome do pool de mineração que minerou o bloco, como AntPool. Grandes pools de mineração têm mais chances de minerar blocos regularmente devido ao alto hashrate (medida da capacidade computacional utilizada pelos mineradores) que possuem.
---
![ajustededificuldade](https://image.nostr.build/15b0e9411c7c7849166592b1963ee1132f44568edf236de23a73fbceacf147c7.png)
Essa seção mostra informações sobre o ajuste de dificuldade, que ocorre aproximadamente a cada duas semanas.
#### Tempo médio dos blocos (~9,9 minutos):
Este é o tempo médio atual para minerar um bloco na rede. A meta da rede é manter o tempo de bloco em cerca de 10 minutos; um tempo menor indica um aumento na taxa de hash, ou seja, que mais poder computacional foi adicionado à rede.
#### Mudança de dificuldade (+1,46%):
A dificuldade ajusta-se a cada 2016 blocos para manter o tempo médio de bloco próximo de 10 minutos. Um aumento na dificuldade, como +1,46%, indica que a mineração ficou mais difícil devido ao aumento do hashrate, enquanto uma redução na dificuldade indica que o hashrate diminuiu.
#### Tempo até o próximo ajuste:
É o tempo previsto até o próximo ajuste de dificuldade (7 dias, nesse caso), o que é crucial para manter a rede estável e garantir a segurança e a regularidade do processo de mineração.
---
![halving](https://image.nostr.build/88eb7f39ef8abcf7a7277ea73e40f6d4e498f790dff35c2924b1f71830d57cd2.png)
Quanto tempo demora até o próximo halving, um evento no Bitcoin que ocorre aproximadamente a cada 210.000 blocos minerados, ou cerca de quatro anos. Durante o halving, a recompensa que os mineradores recebem por adicionar um novo bloco à blockchain é reduzida pela metade.
---
![Goggles](https://image.nostr.build/ba01bec20ac89e4c4e0b5cdef8e17c0a017a2a442e6d8f05ed29418a98ab81c8.png)
Um diagrama visual da mempool que mostra o estado das transações pendentes na rede.
#### Tamanhos de blocos
O tamanho de cada quadrado representa o tamanho da transação em bytes.
**Filtros (Consolidação, Coinjoin, Dados):** Permite visualizar categorias específicas de transações:
* **Consolidação**: Transações de consolidação agrupam pequenos UTXOs em um único UTXO maior para simplificar e baratear futuras transações. (UTXOs merecem um artigo dedicado)
* **Coinjoin**: Transações CoinJoin são usadas para melhorar a privacidade, misturando transações de vários usuários em uma única transação.
* **Dados**: Mostra transações que contêm dados adicionais, que podem incluir informações não financeiras, como mensagens.
---
![GraficodaMempool](https://image.nostr.build/230420c2d4c98515aca4cf29a8c256d22df5eb20cba4ef6e4fe03004aa5a4d37.png)
Este gráfico exibe o número de transações recebidas ao longo do tempo.
#### Taxa mínima (1 sat/vB):
Indica a taxa mínima atualmente aceita pela mempool. Se a mempool estiver cheia, transações que paguem menos do que a taxa mínima podem ser excluídas para dar lugar a transações de maior prioridade.
#### Uso de memória (259 MB / 300 MB):
A mempool tem um limite de memória. Quando está cheia, transações de taxa mais baixa podem ser descartadas para abrir espaço para aquelas com taxas mais altas, priorizando-as para inclusão em blocos.
#### Transações não confirmadas (59.361):
Indica o número total de transações pendentes que aguardam confirmação. Quanto maior o número de transações na mempool, maior a probabilidade de que as taxas aumentem para garantir uma confirmação mais rápida.
---
![RecentReplacements](https://image.nostr.build/27290fd029b1baeee5f18dada6208218047cb9f480145426c998b521fcb97b8e.png)
Essa seção mostra transações que foram substituídas utilizando o mecanismo RBF (Replace-By-Fee), que permite substituir uma transação com uma taxa mais alta para acelerar sua confirmação.
#### TXID
Este é o identificador da transação (Transaction ID), exibido parcialmente para abreviar o espaço. Cada transação tem um identificador único na blockchain.
#### Previous fee
Exibe a taxa de transação original paga na primeira tentativa, medida em satoshis por vByte (sat/vB). Esta taxa inicial provavelmente era baixa demais, resultando em uma demora na confirmação.
#### New fee
Mostra a nova taxa de transação, também em satoshis por vByte, definida para substituir a taxa anterior. Uma taxa maior aumenta as chances de inclusão rápida em um bloco.
#### Status (RBF)
RBF indica que a transação foi substituída utilizando o recurso "Replace-By-Fee". Isso significa que a nova transação cancelou e substituiu a original, e o minerador escolherá a transação com a taxa mais alta para incluir no próximo bloco.
---
![RecentTransactions](https://image.nostr.build/cc54d2b804efe456bbaae0da8821287ce056af3c3a8b6bff8bfcd9a55c93c222.png)
Esta seção lista transações recentes que entraram na mempool e aguardam confirmação.
#### TXID
Similar ao "Recent Replacements", este é o identificador único da transação.
#### Amount
Exibe a quantidade de Bitcoin transferida nessa transação, geralmente em frações de BTC (como 0.0001 BTC). Esta é a quantia enviada pelo remetente ao destinatário.
#### USD
Mostra o valor da transação em dólares americanos (USD), calculado com base na taxa de câmbio atual. Serve para dar uma ideia de quanto a transação representa em moeda fiduciária.
#### Fee
Exibe a taxa de transação paga, em satoshis por vByte (sat/vB). Uma taxa mais alta em relação à média aumenta a probabilidade de confirmação mais rápida, pois as transações com taxas mais elevadas são priorizadas pelos mineradores.
---
E acabou. Espero que isso tenha sido útil para você e tenha agregado mais entendimento sobre esse complexo e maravilhoso mundo do Bitcoin. Se foi, considere compartilhar com alguém que precise. E se tem sugestões de melhoria, por favor, não deixe de comentar, o conhecimento está dispero na sociedade.
Por fim, stay humble and stack sats!
-
@ ec09d831:42c80ce4
2024-11-11 22:18:22
-*Doğru diye bir şey yoktur.*
-**Peki bu doğru mu?**
-*Gerçek bilinemez.*
-**Nereden biliyorsun?**
-*Kesinlik yoktur.*
-**Kesinlikle mi?**
-*Sadece beş duyunuz gerçek bilgiyi sağlar.*
-**Beş duyudan hangisi bu kanıya vardı?**
-*Mantıksal argümanlar KANIT değildir.*
-**Bunun için kanıtınız nedir?**
-*Sadece fiziksel âlem gerçektir.*
-**Bu savın kendisi bile fiziksel âlemde geliştirilmiş değildir, dolayısıyla kendi kendini çürütür.**
-
@ f462d21e:1390b6b1
2024-11-10 11:44:59
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
-
@ a10260a2:caa23e3e
2024-11-10 04:35:34
nostr:npub1nkmta4dmsa7pj25762qxa6yqxvrhzn7ug0gz5frp9g7p3jdscnhsu049fn added support for [classified listings (NIP-99)](https://github.com/sovbiz/Cypher-Nostr-Edition/commit/cd3bf585c77a85421de031db1d8ebd3911ba670d) about a month ago and recently announced this update that allows for creating/editing listings and blog posts via the dashboard.
In other words, listings created on the website are also able to be viewed and edited on other Nostr apps like Amethyst and Shopstr. Interoperability FTW.
I took some screenshots to give you an idea of how things work.
The [home page](https://cypher.space/) is clean with the ability to search for profiles by name, npub, or Nostr address (NIP-05).
![](https://m.stacker.news/61893)
Clicking login allows signing in with a browser extension.
![](https://m.stacker.news/61894)
The dashboard gives an overview of the amount of notes posted (both short and long form) and products listed.
![](https://m.stacker.news/61895)
Existing blog posts (i.e. long form notes) are synced.
![](https://m.stacker.news/61897)
Same for product listings. There’s a nice interface to create new ones and preview them before publishing.
![](https://m.stacker.news/61898)
![](https://m.stacker.news/61899)
That’s all for now. As you can see, super slick stuff!
Bullish on Cypher.
So much so I had to support the project and buy a subdomain. 😎
https://bullish.cypher.space
originally posted at https://stacker.news/items/760592
-
@ b34f99f1:006b0fcc
2024-11-09 17:03:35
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
-
@ b34f99f1:006b0fcc
2024-11-09 17:03:02
deleted
-
@ b34f99f1:006b0fcc
2024-11-09 17:02:11
eyJfaWQiOiI0NTljZTMxMC1mNDlkLTQ2NDAtYTNmZi0xODVjYTZiOGU3MDMiLCJwdWJsaWNLZXkiOiJiMzRmOTlmMTEwYmI2NWZmNGI1NTI3ZjhmYjFkMDE1OTUxYTMwMzgzNzBmZDk1YWRjMzRkODFkOTAwNmIwZmNjIiwidXNlcm5hbWUiOiJsaWFtIiwiYWRUeXBlIjoiTE9DQUxfQlVZIiwiY291bnRyeSI6IlVuaXRlZCBTdGF0ZXMgb2YgQW1lcmljYSIsImNvdW50cnlDb2RlIjoiVVMiLCJsYXQiOjI3Ljk0Nzc2LCJsb24iOi04Mi40NTg0NDQsImdlY29kZSI6eyJwbGFjZV9pZCI6MjcwMDI2NzQ0LCJsaWNlbmNlIjoiRGF0YSDCqSBPcGVuU3RyZWV0TWFwIGNvbnRyaWJ1dG9ycywgT0RiTCAxLjAuIGh0dHBzOi8vb3NtLm9yZy9jb3B5cmlnaHQiLCJvc21fdHlwZSI6InJlbGF0aW9uIiwib3NtX2lkIjoxMjMyMTE1NiwibGF0IjoiMjcuOTQ3OTIiLCJsb24iOiItODIuNDU4MTIxMDYzNjExOTciLCJkaXNwbGF5X25hbWUiOiJSaXZlcnNpZGUsIFRhbXBhLCBIaWxsc2Jvcm91Z2ggQ291bnR5LCBGbG9yaWRhLCBVbml0ZWQgU3RhdGVzIiwiYWRkcmVzcyI6eyJoYW1sZXQiOiJSaXZlcnNpZGUiLCJjaXR5IjoiVGFtcGEiLCJjb3VudHkiOiJIaWxsc2Jvcm91Z2ggQ291bnR5Iiwic3RhdGUiOiJGbG9yaWRhIiwiSVNPMzE2Ni0yLWx2bDQiOiJVUy1GTCIsImNvdW50cnkiOiJVbml0ZWQgU3RhdGVzIiwiY291bnRyeV9jb2RlIjoidXMifSwiYm91bmRpbmdib3giOlsiMjcuOTQ3NDg2MiIsIjI3Ljk0ODM2NDEiLCItODIuNDU4OTg5MSIsIi04Mi40NTgwMDUzIl19LCJjdXJyZW5jeUNvZGUiOiJVU0QiLCJwcmljZUlucHV0VHlwZSI6Ik1BUktFVCIsIm1hcmdpbiI6MTAsImZpeGVkUHJpY2UiOjAsImJ1eWVyU2V0dGxlbWVudEFkZHJlc3MiOiIiLCJtaW5BbW91bnQiOjUwMDAsIm1heEFtb3VudCI6MCwibGltaXRUb0ZpYXRBbW91bnRzIjoiIiwibXNnIjoid2FpdCBmb3IgbWUgYXQgYnVzIHN0YXRpb24iLCJhY2NvdW50SW5mbyI6IiIsImZvclRydXN0ZWQiOiJubyIsImhpZGRlbiI6ZmFsc2UsImJhbm5lZCI6ZmFsc2UsInZlcmlmaWVkIjp0cnVlLCJhZGRlZCI6IjIwMjQtMTEtMDhUMjA6NDU6MTYuNjgxWiIsIm1hcmtldFByaWNlIjoxNjUuNH0=
-
@ bcea2b98:7ccef3c9
2024-11-09 17:01:32
Weekends are the perfect time to unwind, explore, or spend time doing what we love. How would you spend your ideal weekend? Would it be all about relaxation, or would you be out and about?
For me, an ideal weekend would start with a slow Saturday morning, a good book and coffee. Then I would spend the afternoon exploring local trails and looking for snacks. Then always a slow Sunday night hopefully.
originally posted at https://stacker.news/items/760492
-
@ b34f99f1:006b0fcc
2024-11-09 16:35:11
eyJfaWQiOiI0NzgyYTkzNC02ZTUzLTRlYTctOWUwOC04YTAwZjJmNGQ4NTAiLCJwdWJsaWNLZXkiOiJiMzRmOTlmMTEwYmI2NWZmNGI1NTI3ZjhmYjFkMDE1OTUxYTMwMzgzNzBmZDk1YWRjMzRkODFkOTAwNmIwZmNjIiwidXNlcm5hbWUiOiJsaWFtIiwiYWRUeXBlIjoiT05MSU5FX1NFTEwiLCJjb3VudHJ5IjoiVW5pdGVkIFN0YXRlcyBvZiBBbWVyaWNhIiwiY291bnRyeUNvZGUiOiJVUyIsImN1cnJlbmN5Q29kZSI6IlVTRCIsInBheW1lbnRNZXRob2RDb2RlIjoiQ1JZUFRPQ1VSUkVOQ1kiLCJwcmljZUlucHV0VHlwZSI6IkZJWEVEIiwibWFyZ2luIjowLCJmaXhlZFByaWNlIjoxOTAsIm1pbkFtb3VudCI6MjAwLCJtYXhBbW91bnQiOjAsImxpbWl0VG9GaWF0QW1vdW50cyI6IiIsInBheW1lbnRNZXRob2REZXRhaWwiOiJsdGMgfCBidGMiLCJtc2ciOiIiLCJhY2NvdW50SW5mbyI6IiIsImZvclRydXN0ZWQiOiJubyIsInZlcmlmaWVkRW1haWxSZXF1aXJlZCI6Im5vIiwicmVxdWlyZUZlZWRiYWNrU2NvcmUiOjAsImZpcnN0VGltZUxpbWl0QXNzZXQiOjAsImhpZGRlbiI6ZmFsc2UsImJhbm5lZCI6ZmFsc2UsInZlcmlmaWVkIjp0cnVlLCJhZGRlZCI6IjIwMjQtMTEtMDhUMTQ6NDA6MjYuODk0WiJ9
-
@ 1eb966a6:e3eddf94
2024-11-09 13:19:43
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
-
@ 1eb966a6:e3eddf94
2024-11-09 13:18:54
deleted
-
@ 1eb966a6:e3eddf94
2024-11-09 13:18:25
deleted
-
@ b34f99f1:006b0fcc
2024-11-09 11:47:09
deleted
-
@ b34f99f1:006b0fcc
2024-11-09 11:43:11
deleted
-
@ b34f99f1:006b0fcc
2024-11-09 11:29:46
deleted
-
@ b34f99f1:006b0fcc
2024-11-09 11:25:16
deleted
-
@ fd208ee8:0fd927c1
2024-11-09 09:21:19
## Drumroll, please....
In a previous article, I introduced the concept of [relay communities](nostr:naddr1qvzqqqr4gupzplfq3m5v3u5r0q9f255fdeyz8nyac6lagssx8zy4wugxjs8ajf7pqydhwumn8ghj7argv4nx7un9wd6zumn0wd68yvfwvdhk6tcpr3mhxue69uhhg6r9vd5hgctyv4kzumn0wd68yvfwvdhk6tcqp5cnwvesxcunjwpcxymrsvgwmj66e).
The ink had barely dried, on that set of instructions, before one of my favorite Nostr devs, [ثعبان](nostr:nprofile1qythwumn8ghj7enjv4h8xtnwdaehgu339e3k7mf0qy88wumn8ghj7mn0wvhxcmmv9uqzqla9dawkjc4trc7dgf88trpsq2uxvhmmpkxua607nc5g6a634sv598gk68), rolled out the alpha version of a relay-community client.
![chachi for nos.lol](https://i.nostr.build/iwVwUUXfiAj7pSMa.png)
Obviously, it's still a bit of a construction site, but you can check out how it'd work, for your community, by test-driving the functionality on your own relay. Simply type _https://chachi.chat/_ followed by the name of your relay. For instance, one gigantic relay community, where nearly everyone can try out the functionality, is [nos.lol](https://chachi.chat/nos.lol).
If your relay community does not require AUTH to read, anyone can pull your chatter into their own relay and respond to it there. That is because every chat entry is simply a kind 09 event, and unprotected events are not private data.
For instance, I moderate one community [theforest.nostr1.com](https://chachi.chat/theforest.nostr1.com), that is openly readable, and that's probably where most of the chatter on [nostr.band](https://chachi.chat/relay.nostr.band) is coming from, as that relay is an aggregator of the content of many other relays. However, I have another community, [gitcitadel.nostr1.com](https://chachi.chat/gitcitadel.nostr1.com) that is AUTH-protected, whose content stays private to those allowed on that relay. Communities are where write-protected and AUTH relays are going to really shine, as they create an environment similar to Telegram, but where you control the dataset, you decide which types of events to support, and you design the client, the algos, the moderation, the visibility, etc.
With communities, **the onboarding experience is seamless**: just get a browser extension and a nsec, login, start writing and posting, and _start receiving responses_. Active, chatty, well-moderated communities will be more attractive to onboard to, than chaotic, spammy, or empty communities. This means that you don't have to have the killer entry under "Posts" (where kind 11 and eventually kind 01 posts appear), just to get some interaction. Chat is the Great Equalizer.
So, we're testing both setups, with [cloudfodder](nostr:nprofile1qyghwumn8ghj7mn0wd68ytnhd9hx2tcpzfmhxue69uhkummnw3eryvfwvdhk6tcqyp7vx29q3hdj4l0elxl800hlfjp538le09epsf7k9zj59ue2y37qu84upun) adjusting the relay faucet code and ثعبان is fiddling with the community client settings, to make the most-comfortable situation for both kinds.
![The beginning has ended.](https://quotefancy.com/media/wallpaper/3840x2160/361833-Winston-Churchill-Quote-Now-this-is-not-the-end-It-is-not-even-the.jpg)
## This is the signal
This #Chachi client, of course, is merely the first horse out of the gate. There are already other devs hacking away at variants of the same concept, such as [#Flotilla](https://flotilla.coracle.social/), I'm sure CloudFodder is also cooking, later versions of #Alexandria will integrate theforest community, and etc. etc. etc.
It remains to be seen, how many new use cases can be dreamt up, with this new architecture, but I am quite certain, that this is the beginning of the end of Nostr 1.0. We are moving up and out, and away from the stultifying and limiting concept of Twitter 2.0, toward
![The OtherStuff.](https://i.nostr.build/nToghxbBIzNLx27t.jpg)
Soon, we will enter Nostr 2.0. See you on the other side.
-
@ a39d19ec:3d88f61e
2024-11-09 09:17:35
##### What do you even print with it besides decorative objects?
This kind of question still is a common one when talking about 3d printing.
With this series of long-form notes I will show you some of the practical and useful 3d printed things, that I use a lot.
The second thing I show you is a "Swiss Keyholder"
## Swiss Keyholder
There are many designs of such a Keyholder to download and print. As this is one of the first prints I have done in ABS back in 2014 on a "Up!Mini" 3d printer I can't find where I downloaded it.
I like the slim design and that I don't have any "loose" keys in my pocket. It is just tidy in my pocket. This is probably the most used print of mine.
Edit:
You can download the file here:
[Thingiverse](https://www.thingiverse.com/thing:98427)
![](https://image.nostr.build/385632f80dff5678356387d0e906ee216754696efba3251041f42a1e4672ef63.jpg)
-
@ a95c6243:d345522c
2024-11-08 20:02:32
*Und plötzlich weißt du:
Es ist Zeit, etwas Neues zu beginnen
und dem Zauber des Anfangs zu vertrauen.
Meister Eckhart*
**Schwarz, rot, gold leuchtet es im Kopf des Newsletters der deutschen Bundesregierung,** der mir freitags ins Postfach flattert. Rot, gelb und grün werden daneben sicher noch lange vielzitierte Farben sein, auch wenn diese nie geleuchtet haben. Die Ampel hat sich gerade selber den Stecker gezogen – und hinterlässt einen wirtschaftlichen und gesellschaftlichen Trümmerhaufen.
**Mit einem bemerkenswerten [Timing](https://transition-news.org/donald-trump-grossmaul-oder-hoffnungstrager) hat die deutsche Regierungskoalition** am Tag des «Comebacks» von Donald Trump in den USA endlich ihr Scheitern besiegelt. Während der eine seinen Sieg bei den Präsidentschaftswahlen feierte, erwachten die anderen jäh aus ihrer [Selbsthypnose](https://ansage.org/schwer-traumatisiert-nach-trumps-sieg-dreht-die-politmediale-linksgruene-sekte-durch/) rund um Harris-Hype und Trump-Panik – mit teils erschreckenden [Auswüchsen](https://archive.is/7tDhY). Seit Mittwoch werden die Geschicke Deutschlands nun von einer rot-grünen Minderheitsregierung «geleitet» und man steuert auf Neuwahlen zu.
**Das [Kindergarten](https://www.spiegel.de/politik/deutschland/christian-lindner-auch-die-fdp-will-wieder-einen-eigenen-wirtschaftsgipfel-abhalten-a-a8a4e868-10b1-426e-adb0-e5a6d42f7c46)-Gehabe um zwei konkurrierende Wirtschaftsgipfel letzte Woche** war bereits bezeichnend. In einem Strategiepapier gestand Finanzminister Lindner außerdem den «Absturz Deutschlands» ein und offenbarte, dass die wirtschaftlichen Probleme teilweise von der Ampel-Politik [«vorsätzlich herbeigeführt»](https://www.t-online.de/nachrichten/deutschland/innenpolitik/id_100522112/fdp-chef-lindner-und-sein-grundsatzpapier-die-scheidung-von-der-ampel-.html) worden seien.
**Lindner und weitere FDP-Minister wurden also vom Bundeskanzler entlassen.** Verkehrs- und [Digitalminister Wissing](https://transition-news.org/raus-aus-der-komfortzone-es-lohnt-sich) trat flugs aus der FDP aus; deshalb darf er nicht nur im Amt bleiben, sondern hat zusätzlich noch das Justizministerium übernommen. Und mit [Jörg Kukies](https://norberthaering.de/news/joerg-kukies/) habe Scholz «seinen Lieblingsbock zum Obergärtner», sprich: Finanzminister befördert, meint Norbert Häring.
**Es gebe keine Vertrauensbasis für die weitere Zusammenarbeit mit der FDP,** hatte der Kanzler erklärt, Lindner habe zu oft sein Vertrauen gebrochen. Am 15. Januar 2025 werde er daher im Bundestag die Vertrauensfrage stellen, was ggf. den Weg für vorgezogene Neuwahlen freimachen würde.
**Apropos Vertrauen: Über die Hälfte der Bundesbürger glauben, dass sie ihre Meinung nicht frei sagen können.** Das ging erst kürzlich aus dem diesjährigen [«Freiheitsindex»](https://www.schwaebische.de/politik/forscher-beim-vertrauen-in-staat-und-medien-zerreisst-es-uns-gerade-3034357) hervor, einer Studie, die die Wechselwirkung zwischen Berichterstattung der Medien und subjektivem Freiheitsempfinden der Bürger misst. «Beim Vertrauen in Staat und Medien zerreißt es uns gerade», kommentierte dies der Leiter des Schweizer Unternehmens Media Tenor, das die Untersuchung zusammen mit dem Institut für Demoskopie Allensbach durchführt.
**«Die absolute Mehrheit hat [absolut die Nase voll](https://archive.is/yRxwR)»,** titelte die *Bild* angesichts des «Ampel-Showdowns». Die Mehrheit wolle Neuwahlen und die Grünen sollten zuerst gehen, lasen wir dort.
**Dass «Insolvenzminister» Robert Habeck heute seine Kandidatur für das Kanzleramt verkündet hat,** kann nur als Teil der politmedialen Realitätsverweigerung verstanden werden. Wer allerdings denke, schlimmer als in Zeiten der Ampel könne es nicht mehr werden, sei reichlich optimistisch, schrieb Uwe Froschauer bei *Manova*. Und er kenne [Friedrich Merz](https://www.manova.news/artikel/der-kriegsgeile-blackrocker) schlecht, der sich schon jetzt rhetorisch auf seine Rolle als oberster Feldherr Deutschlands vorbereite.
**Was also tun? Der Schweizer Verein [«Losdemokratie»](https://zeitpunkt.ch/node/40968) will eine Volksinitiative lancieren,** um die Bestimmung von Parlamentsmitgliedern per Los einzuführen. Das Losverfahren sorge für mehr Demokratie, denn als Alternative zum Wahlverfahren garantiere es eine breitere Beteiligung und repräsentativere Parlamente. Ob das ein Weg ist, sei dahingestellt.
**In jedem Fall wird es notwendig sein, unsere Bemühungen um [Freiheit und Selbstbestimmung](https://transition-news.org/alternative-medien-in-der-krise-zensur-kontrollverlust-und-die-suche-nach)** zu verstärken. Mehr Unabhängigkeit von staatlichen und zentralen Institutionen – also die Suche nach dezentralen Lösungsansätzen – gehört dabei sicher zu den Möglichkeiten. Das gilt sowohl für jede/n Einzelne/n als auch für Entitäten wie die alternativen Medien.
---
Dieser Beitrag ist zuerst auf *[Transition News](https://transition-news.org/es-kann-nur-besser-werden-aber-wie)* erschienen.
-
@ fd208ee8:0fd927c1
2024-11-08 10:27:40
## You have no idea
I regularly read comments from people, on here, wondering how it's possible to marry -- or even simply be friends! -- with someone who doesn't agree with you on politics. I see this sentiment expressed quite often, usually in the context of Bitcoin, or whatever _pig is currently being chased through the village_, as they say around here.
![Pig racing](https://i.pinimg.com/564x/a2/d5/8a/a2d58ac249846854345f727e41984e6c.jpg)
It seems rather sensible, but I don't think it's as hard, as people make it out to be. Further, I think it's a dangerous precondition to set, for your interpersonal relationships, because the political field is constantly in flux. If you determine who you will love, by their opinions, do you stop loving them if their opinions change, or if the opinions they have become irrelevant and a new set of opinions are needed -- and their new ones don't match your new ones? We could see this happen to relationships en masse, during the Covid Era, and I think it happens every day, in a slow grind toward the disintegration of interpersonal discourse.
I suspect many people do stop loving, at that point, as they never really loved the other person for their own sake, they loved the other person because they thought the other person was exactly like they are. But no two people are alike, and the longer you are in a relationship with someone else, the more the initial giddiness wears off and the trials and tribulations add up, the more you notice how very different you actually are. This is the point, where best friends and romantic couples say, _We just grew apart._
But you were always apart. You were always two different people. You just didn't notice, until now.
![Separation](https://i.pinimg.com/564x/c3/05/a6/c305a6a95e809b0356ecb651c72f78b9.jpg)
I've also always been surprised at how many same-party relationships disintegrate because of some disagreement over some particular detail of some particular topic, that they generally agree on. To me, it seems like an irrelevant side-topic, but _they can't stand to be with this person_... and they stomp off. So, I tend to think that it's less that opinions need to align to each other, but rather that opinions need to align in accordance with the level of interpersonal tolerance they can bring into the relationship.
## I was raised by relaxed revolutionaries
Maybe I see things this way because my parents come from two diverging political, cultural, national, and ethnic backgrounds, and are prone to disagreeing about a lot of "important" (to people outside their marriage) things, but still have one of the healthiest, most-fruitful, and most long-running marriages of anyone I know, from that generation. My parents, you see, aren't united by their opinions. They're united by their relationship, which is something _outside_ of opinions. Beyond opinions. Relationships are what turn two different people into one, cohesive unit, so that they slowly grow together. Eventually, even their faces merge, and their biological clocks tick to the same rhythm. They eventually become one entity that contains differing opinions about the same topics.
It's like magic, but it's the result of a mindset, not a worldview.
Or, as I like to quip:
> The best way to stay married, is to not get divorced.
![elderly couple](https://i.pinimg.com/564x/f7/0f/d2/f70fd2963312236c60cac61ec2324ce8.jpg)
My parents simply determined early on, that they would stay together, and whenever they would find that they disagreed on something that _didn't directly pertain to their day-to-day existence with each other_ they would just agree-to-disagree about that, or roll their eyes, and move on. You do you. Live and let live.
My parents have some of the most strongly held personal opinions of any people I've ever met, but they're also incredibly tolerant and can get along with nearly anyone, so their friends are a confusing hodgepodge of _people we liked and found interesting enough to keep around_. Which makes their house parties really fun, and highly unusual, in this day and age of mutual-damnation across the aisle.
![Party time](https://i.pinimg.com/564x/4e/aa/2b/4eaa2bb199aa7e5f36a0dbc2f0e4f217.jpg)
The things that did affect them, directly, like which school the children should attend or which country they should live in, etc. were things they'd sit down and discuss, and somehow one opinion would emerge, and they'd again... move on.
And that's how my husband and I also live our lives, and it's been working surprisingly well. No topics are off-limits to discussion (so long as you don't drone on for too long), nobody has to give up deeply held beliefs, or stop agitating for the political decisions they prefer.
You see, we didn't like that the other always had the same opinion. We liked that the other always held their opinions strongly. That they were passionate about their opinions. That they were willing to voice their opinions; sacrifice to promote their opinions. And that they didn't let anyone browbeat or cow them, for their opinions, not even their best friends or their spouse. But that they were open to listening to the other side, and trying to wrap their mind around the possibility that they _might just be wrong about something_.
![Listening](https://i.pinimg.com/564x/69/ec/1b/69ec1b66fc58802de4d04bfb5f0f8dc6.jpg)
We married each other because we knew: this person really cares, this person has thought this through, and they're in it, to win it. What "it" is, is mostly irrelevant, so long as it doesn't entail torturing small animals in the basement, or raising the children on a diet of Mountain Dew and porn, or something.
Live and let live. At least, it's never boring. At least, there's always something to ~~argue~~ talk about. At least, we never think... we've just grown apart.
-
@ 13351007:eccd002a
2024-11-08 05:32:41
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
-
@ 4ba8e86d:89d32de4
2024-11-07 13:56:21
Tutorial feito por Grom mestre⚡poste original abaixo:
http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/240277/tutorial-criando-e-acessando-sua-conta-de-email-pela-i2p?show=240277#q240277
Bom dia/tarde/noite a todos os camaradas.
Seguindo a nossa série de tutoriais referentes a tecnologias essenciais para a segurança e o anonimato dos usuários, sendo as primeiras a openPGP e a I2P, lhes apresento mais uma opção para expandir os seus conhecimentos da DW.
Muitos devem conhecer os serviços de mail na onion como DNMX e mail2tor, mas e que tal um serviço de email pela I2P. Nesse tutorial eu vou mostrar a vocês como criar a sua primeira conta no hq.postman.i2p e a acessar essa conta.
É importante que vocês tenham lido a minha primeira série de tutoriais a respeito de como instalar, configurar e navegar pela I2P nostr:nevent1qqsyjcz2w0e6d6dcdeprhuuarw4aqkw730y542dzlwxwssneq3mwpaspz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsygzt4r5x6tvh39kujvmu8egqdyvf84e3w4e0mq0ckswamfwcn5eduspsgqqqqqqsyp5vcq Esse tutorial é um pré-requisito para o seguinte e portanto recomendo que leia-os antes de prosseguir com o seguinte tutorial. O tutorial de Kleopatra nostr:nevent1qqs8h7vsn5j6qh35949sa60dms4fneussmv9jd76n24lsmtz24k0xlqzyp9636rd9ktcjmwfxd7ru5qxjxyn6uch2uhas8utg8wa5hvf6vk7gqcyqqqqqqgecq8f7 é complementar dado que é extremamente recomendado assinar e criptografar as mensagens que seguem por emails pela DW.
Sem mais delongas, vamos ao tutorial de fato.
## 1. Criando uma conta de email no hq.postman
Relembrando: Esse tutorial considera que você já tenha acesso à I2P.
Entre no seu navegador e acesse o endereço hq.postman.i2p. O roteador provavelmente já contém esse endereço no seu addressbook e não haverá a necessidade de inserir o endereço b32 completo.
Após entrar no site vá para a página '1 - Creating a mailbox'
https://image.nostr.build/d850379fe315d2abab71430949b06d3fa49366d91df4c9b00a4a8367d53fcca3.jpg
Nessa página, insira as credenciais de sua preferências nos campos do formulário abaixo. Lembre-se que o seu endereço de email aceita apenas letras e números. Clique em 'Proceed' depois que preencher todos os campos.
https://image.nostr.build/670dfda7264db393e48391f217e60a2eb87d85c2729360c8ef6fe0cf52508ab4.jpg
Uma página vai aparecer pedindo para confirmar as credenciais da sua nova conta. Se tudo estiver certo apenas clique em 'Confirm and Create Mailbox'. Se tudo ocorrer como conforme haverá uma confirmação de que a sua nova conta foi criada com sucesso. Após isso aguarde por volta de 5 minutos antes de tentar acessá-la, para que haja tempo suficiente para o servidor atualizar o banco de dados.
https://image.nostr.build/ec58fb826bffa60791fedfd9c89a25d592ac3d11645b270c936c60a7c59c067f.jpg
https://image.nostr.build/a2b7710d1e3cbb36431acb9055fd62937986b4da4b1a1bbb06d3f3cb1f544fd3.jpg
Pronto! Sua nova conta de email na I2P foi criada. Agora vamos para a próxima etapa: como acessar a sua conta via um cliente de email.
## 2. Configurando os túneis cliente de SMTP e POP3
O hq.postman não possui um cliente web que nos permite acessar a nossa conta pelo navegador. Para isso precisamos usar um cliente como Thunderbird e configurar os túneis cliente no I2Pd que serão necessários para o Thunderbird se comunicar com o servidor pela I2P.
Caso não tenha instalado o Thunderbird ainda, faça-o agora antes de prosseguir.
Vamos configurar os túneis cliente do servidor de email no nosso roteador. Para isso abra um terminal ou o seu gestor de arquivos e vá para a pasta de configuração de túneis do I2P. Em Linux esse diretório se localiza em /etc/i2pd/tunnels.d. Em Windows, essa pasta se localiza em C:\users\user\APPDATA\i2pd.
Na pasta tunnels.d crie dois arquivos: smtp.postman.conf e pop-postman.conf. Lembre-se que em Linux você precisa de permissões de root para escrever na pasta de configuração. Use o comando sudoedit <nome_do_arquivo> para isso.
Edite-os conforme as imagens a seguir:
Arquivo pop-postman.conf
https://image.nostr.build/7e03505c8bc3b632ca5db1f8eaefc6cecb4743cd2096d211dd90bbdc16fe2593.jpg
Arquivo smtp-postman.conf
https://image.nostr.build/2d06c021841dedd6000c9fc2a641ed519b3be3c6125000b188842cd0a5af3d16.jpg
Salve os arquivos e reinicie o serviço do I2Pd. Em Linux isso é feito pelo comando:
```
sudo systemctl restart i2pd
```
Entre no Webconsole do I2Pd pelo navegador (localhost:7070) e na seção I2P Tunnels, verifique se os túneis pop-postman e smtp-postman foram criados, caso contrário verifique se há algum erro nos arquivos e reinicie o serviço.
Com os túneis cliente criados, vamos agora configurar o Thunderbird
## 3. Configurando o Thunderbird para acessar a nossa conta
Abra o Thunderbird e clique em criar uma nova conta de email. Se você não tiver nenhum conta previamente presente nele você vai ser diretamente recebido pela janela de criação de conta a seguir.
https://image.nostr.build/e9509d7bd30623716ef9adcad76c1d465f5bc3d5840e0c35fe4faa85740f41b4.jpg
https://image.nostr.build/688b59b8352a17389902ec1e99d7484e310d7d287491b34f562b8cdd9dbe8a99.jpg
Coloque as suas credenciais, mas não clique ainda em Continuar. Clique antes em Configure Manually, já que precisamos configurar manualmente os servidores de SMTP e POP3 para, respectivamente, enviar e receber mensagens.
Preencha os campos como na imagem a seguir. Detalhe: Não coloque o seu endereço completo com o @mail.i2p, apenas o nome da sua conta.
https://image.nostr.build/4610b0315c0a3b741965d3d7c1e4aff6425a167297e323ba8490f4325f40cdcc.jpg
Clique em Re-test para verificar a integridade da conexão. Se tudo estiver certo uma mensagem irá aparecer avisando que as configurações do servidores estão corretas. Clique em Done assim que estiver pronto para prosseguir.
https://image.nostr.build/8a47bb292f94b0d9d474d4d4a134f8d73afb84ecf1d4c0a7eb6366d46bf3973a.jpg
A seguinte mensagem vai aparecer alertando que não estamos usando criptografia no envio das credenciais. Não há problema nenhum aqui, pois a I2P está garantindo toda a proteção e anonimato dos nossos dados, o que dispensa a necessidade de uso de TLS ou qualquer tecnologia similar nas camadas acima. Marque a opção 'I Understand the risks' e clique em 'Continue'
https://image.nostr.build/9c1bf585248773297d2cb1d9705c1be3bd815e2be85d4342227f1db2f13a9cc6.jpg
E por fim, se tudo ocorreu como devido sua conta será criada com sucesso e você agora será capaz de enviar e receber emails pela I2P usando essa conta.
https://image.nostr.build/8ba7f2c160453c9bfa172fa9a30b642a7ee9ae3eeb9b78b4dc24ce25aa2c7ecc.jpg
## 4. Observações e considerações finais
Como informado pelo próprio site do hq.postman, o domínio @mail.i2p serve apenas para emails enviados dentro da I2P. Emails enviados pela surface devem usar o domínio @i2pmai.org. É imprescindível que você saiba usar o PGP para assinar e criptografar as suas mensagens, dado que provavelmente as mensagens não são armazenadas de forma criptografada enquanto elas estão armazenadas no servidor. Como o protocolo POP3 delete as mensagens no imediato momento em que você as recebe, não há necessidade de fazer qualquer limpeza na sua conta de forma manual.
Por fim, espero que esse tutorial tenha sido útil para vocês. Que seu conhecimento tenha expandido ainda mais com as informações trazidas aqui. Até a próxima.
-
@ fd208ee8:0fd927c1
2024-11-07 07:28:06
## The newspaper barons are all into crypto, now
Watching the outsized-impact we crypto enthusiasts (I'm including Bitcoin in that category), had on the 2024 USA presidential election, was a sobering affair. At the moment, our impact is primarily over the voting box, but, already, indirectly, (over Elon Musik, Donald Trump, and Jack Dorsey, etc.) through our sheer wealth (and the ingenuity that brought us that wealth) being able to influence the voting population, by changing/shifting the communications channels and influencing what is written there.
Elon even reached deep into his foreign-learned bag of political tricks and started [handing out money, directly](https://www.bbc.com/news/articles/crlnjzzk919o), to petition signers.
![Petition surprise](https://media-cldnry.s-nbcnews.com/image/upload/t_fit-560w,f_auto,q_auto:best/rockcms/2024-10/241021-elon-musk-petition-money-al-0911-184b9c.jpg)
## Survival of the fittest, ongoing
Now, you all know that I have full respect for an expert player, when I see one, so no hating the hustle, from my side. We all play the hand we are dealt, and the political game is now such a pigsty, that you have to get a bit dirty, to have a chance at winning. Trying to stay neat and above the fray cost Republicans the last election.
![It is, what it is.](https://i5.walmartimages.com/seo/Poster-Master-Vintage-Typography-Retro-Dictionary-Print-Definition-It-What-is-Book-Page-Funny-11x14-UNFRAMED-Wall-Art-Gift-Colleague-Friend-Decor-Hom_2b9adf5b-c99b-4340-abff-ff68d958afa2.d103d320f7d1de6464bc793220e82190.jpeg)
It was the most dramatic display of the greatest power following the best money, that has been seen, since the Medici family began minting gold coins. The entire world is in shock. Change is upon us.
He who has the best money, makes the rules.
On a smaller, but not insignificant scale, private wealth and access to Bitcoin funding, have allowed quite a few of us Nostriches, to dedicate time and energy toward promoting and developing the New Internet. Whereas, other people's hobby is increasingly the night shift at the gas station, or doing something mind-numbing, to escape the realities of their current economic misery.
You don't need money to be here, but you can spend more time here, if you have money.
And we are here, writing the rules. We call them NIPs.
![Innocent](https://media.tenor.com/DbcjrzcEv_0AAAAC/flirt-speechless.gif)
## Same ole, same ole
But back to us Bitcoiners...
I increasingly don't see us morally any different than the clever people crowding into any safe asset, during any financial crisis. Like the people who bought agricultural land, gold, and Swiss Francs, before the Reichsmark melted down. The people who had that stuff, mostly managed to keep it, and their children and grandchildren have inherited it. Or they managed to marry back into families, that have done so, by remaining in the same social class, through beauty or talent.
![young wife](https://i.nostr.build/jzn0rSWYSUxo3VkZ.jpg)
We Bitcoiners have a good narrative to go along with our flight to economic safety, but everyone has that narrative. Humans have a conscience and need to justify their own actions, to themselves. I'm also a goldbug, you see, and a stockholder, and all three assets are rife with the same virtuous narrative.
## How do we save our financial behinds, without being evil?
Some people are simply more situationally aware and have more agency, by nature and circumstances, and they adapt faster. It's not mere intelligence, rather, it also requires a willingness to act and take risks. There's an element of chance to it, but it's still always the same types of people ending up with the assets, with the winners slightly shifting with each round, due to evolution and changes in the environment.
Charity was invented, to get such people to willingly share their assets, or the fruits of their assets, for the common good. So, rather than fret over the morality of the asset, itself, the better response is to consider stepping up your charity (effort or payments), to balance out the inevitable negative impact of the coming _Age of Bitcoin Inequality_.
![the Mountains](https://i.nostr.build/Dw2nrsBHf0Hcgrsv.jpg)
## Coming down from the ATH
Even now, Bitcoin isn't the only safe asset; it's just the most-fungible and partitionable one, so that it's the one most akin to money. And lines are being blurred, as corporations, funds, governments, and insurers discharge dollars and stock up on harder reserve assets, including Bitcoin.
They can hear the money printers rolling out, already, because nobody can print-n-spend, like Trump can. Let's not forget that the money for the last big bump came from the infamous Trump stimmy checks, that lots of us stacked on crypto.
![Stimmy checks](https://i.nostr.build/dsLxBKanya66KOCN.png)
As Bitcoin flows into such markets, the power will rest with both groups (the direct-hodlers and the title-holders), although the hodlers will initially have the upper hand. I say, _initially_ because many hodlers will need to discharge or invest Bitcoin, to live off of it, but the others don't need to, so it should eventually even out. It could take dozens or even hundreds of years to rebalance. By then, the world will be a very different place, and we don't know if Bitcoin will even still be a part of it.
Assets come, assets go, and I'm just glad I didn't let down my forefathers, by leaving them with the first generation, who failed to adapt. Even if I'm a bit late, to the Bitcoin game, the ball is still in play.
May the best money win.
And may it be mine.
And may I do good with it.
-
@ fd208ee8:0fd927c1
2024-11-07 07:22:14
## Unsucking the feed is real
As a Nostrich with an interesting, thought-provoking, and informative feed... a feed so good, that we're creating clients just to look at that feed... a feed that puts a lie to the idea that Nostr is nothing, but people reposting from Twitter or rehashing worn-out Bitcoin memes... a feed that I personally and increasingly enjoy perusing... I am here to tell you that the feed is real.
![Yes, it's real.](https://i.nostr.build/eXAINZP6UjWTDnCA.jpg)
It's taken me over a year, to produce this feed. I literally spent hours and hours, day in and day out, scouring the Nostrverse for people worth introducing other people to. It was brutally difficult, as I was fighting the inherent nature of the Nostr clients and relays, in their current, most-popular form.
## It goes like so...
Here are the steps I took, that sometimes weren't possible to take, until I tried to take them, and that still will sometimes break your client because the clients are often _intentionally_ designed to steer you into having one particular feed:
1) **Make a screenshot** of your current relay list and copy your follows list.
2) **Unsubscribe from all the relays**, that you are currently subscribed to. Your feed should disappear. If it doesn't, or it doesn't allow for this, switch to a different client app because yours is corrupted.
3) **Unfollow everyone.** Delete the whole list. You are taking your follows private, which will invariably result in only following npubs whose stuff you actually want to see, since there's no longer any virtue-signaling going on. Also, it's easier to explain having no list, than a very short one. If your client doesn't allow for this, or starts throwing error messages and freezing up, then switch to a different client app because yours is corrupted.
4) **Curate your copied follows list.** Go line by line and look at the feed produced by the npub on that list.
* Do you want to see that in your feed, going forward?
* Do they produce original content and/or are they interesting conversationalists, in the replies?
* Have they been active, within the past three months?
* Are they simply good friends or real-life acquaintances, that you want to keep tabs on?
* If not, cross out their name.
* If you have been following someone because they repost or quote interesting things, **look at who they've been reposting** and follow them, instead.
5) Of the npubs remaining on your list, go through and select the 10 most interesting ones, and **look at the reposts and quotes** in their feed, and their topical lists like \"Favorites\", \"Devs\", \"Recipes\", etc. (Not their follows list, unless it's quite short, as follows tend to be full of people they follow for social-signaling or client-functional reasons, that they don't actively look at.) Find some new follows, there.
6) Now, set up a personal relay and add all the follows, that made the cut, to **your allowed-npubs list**. Do not add people to the list, just to make them feel better, or because you feel guilty, as they follow you, or to keep them from yelling at you. Remember, they can't see the list!
7) Think about the topics you find interesting, and add an **allowed-keywords list** (this is better than hashtags, as it searches the entire content of the notes), with the OR operator (these allowed npubs OR these allowed topics).
8) Make sure that you choose words likely to find the content you are most-interested in, and not people just ranting about it or spamming (those are great additions to your relay's block-list). If you are Muslim, for instance, instead of "Islam" or "shariah", choose "hadith" or "riba", as those are words more-likely to be used by people who know what they are talking about. If you are into bread baking, add "sourdough", "rye", "yeast", or "whisk", but don't add "bread" or "carbs". Once a note from those people shows up in your feed, and their feed looks like someone interesting, you can add their npub to your allow list. Remember: **The topics are there to find people to add to the allow list**, not merely for their own sake, as this is not a topical relay, but a personal one.
9) Open up a faucet (or relay syncing) with some of the big relays you previously unsubscribed from, some WoT relays, and some of the paid relays (nostr.land, nostr.wine, nostr21.com, and sovbit.host, for example). **Your relay will filter that feed** and only accept the events from the people and topics on your list. As your relay becomes more popular, npubs will begin writing directly to it, and the connections to other relays will sink in significance.
10) Go to your client of choice and **subscribe to your new relay**. Also subscribe to some topical relays, or curated neighborhood relays, you find interesting or your frens are running. This is an easy way to find new, interesting npubs, to add to your own relay.
![The end](https://i.pinimg.com/564x/e4/32/fc/e432fc1ce1fc8a5077e33290ec15e0ce.jpg)
That's a lot of work, you say? Yes, but the result is great, and you are now fully in-charge of your own feed. You also -- here's the cool part -- have a feed good enough, that other people can add your feed to theirs and enjoy your manual curation. As you refine and expand your feed, theirs will also be refined, in parallel. You are now an official Nostr Community Curator. My sincere congratulations.
![Certificate](https://i.nostr.build/FDtR0Z5VAJTxCGHL.png)
## Why is this so hard?
This is only a lot of work because the clients aren't designed to interact with relays, to this extent, as they were created to service mega-relays, download all their crap to your local cache, and adjust the feed over the follows/mutes lists. This was an idea borne of the axiom that Relays Are Hard, so there will only ever be a handful of them, where we'd all clump together and the relay operators would never judge the quality of someone's content. Then, some unusually clever people made relays increasingly easy, and the mailbox communication model was invented, and here we are.
What we have now, and that is slowly growing in popularity, among the #NostrIntelligentsia, are Nostr clients aimed at curating and viewing individual relays or personalized sets of smaller or more-specialized relays. The reigning client devs refused to give us those clients, and most of us aren't up to developing our own clients, so the relay devs took matters into their own hands and made the clients themselves. The free market remains undefeated.
This is a total game-changer. Last one to board this train is a rotten egg.
Originally, relays were supposed to be completely stupid and clients were supposed to be completely smart, but it's now actually the other way around, because most relay devs have a market-born incentive to make their content highly customizable and appealing to individuals (so that more people run relays).
## But what about algos?
Can't you just slap an algo on top of Damus, Lol, or Primal relays, and get the same result? I would argue... no. No, you can't. Or, rather, only in the short to medium term.
Running your own relay, is running your own server. You are now _intellectually independent_, at a machine-level, and therefore a fully sovereign consumer. If you then use algos to control your own server, or in a client that subscribes to your own server, then you can further-refine a feed that is already in a high-to-you-signal state, rather than risking an algo inching you toward the Consensus Feed.
I have noticed that my own feed is slowly drifting away from the ReplyGuy-Cryptobot-Porny-Bitcoin-Meme Dumpster Fire, that almost everyone else is looking at, and it's due to running my own relay. If I use DVMs, those algos sometimes refer to relays I intentionally avoid, so they return results according to those relays. The results are as underwhelming, as you would expect, and often are simply 31 flavors of the Trending List.
But, that isn't your problem, anymore.
From here, you can actively expand and refine your feed, over your whitelist, the topics, and your personally-managed algos.
Happy Nostr-ing!
-
@ f462d21e:1390b6b1
2024-11-07 03:52:04
eyJfaWQiOiI2Njk1ZmZjZDUyYTMzYTg2YTMxOGUxYzAiLCJ1c2VybmFtZSI6ImtoYWxlZCIsImZlZWRiYWNrU2NvcmUiOjAsImNyZWF0ZWRfb24iOiIyMDI0LTA3LTE2VDA1OjA2OjIxLjA0OFoiLCJ0cmFkZXMiOjEsInRyYWRpbmdQYXJ0bmVycyI6MSwicHVibGljS2V5IjoiZGI0MzViZjAzYzU4Zjk4NTEwMzZiODZkYjI4OGIxMTJkYWRkYzAzMjc5ZTQ0MzkzOTY2MzkzYzE0MDQ3OWEwYyIsImZlZWRiYWNrIjp7ImZlZWRiYWNrIjowLCJwYWdlciI6eyJ0b3RhbEl0ZW1zIjowfSwibWVzc2FnZSI6Im5vIHJlc3VsdHMgZm91bmQifX0=
-
@ f462d21e:1390b6b1
2024-11-06 04:39:14
eyJfaWQiOiI2Njk1ZmZjZDUyYTMzYTg2YTMxOGUxYzAiLCJ1c2VybmFtZSI6ImtoYWxlZCIsImZlZWRiYWNrU2NvcmUiOjAsImNyZWF0ZWRfb24iOiIyMDI0LTA3LTE2VDA1OjA2OjIxLjA0OFoiLCJ0cmFkZXMiOjEsInRyYWRpbmdQYXJ0bmVycyI6MSwicHVibGljS2V5IjoiZGI0MzViZjAzYzU4Zjk4NTEwMzZiODZkYjI4OGIxMTJkYWRkYzAzMjc5ZTQ0MzkzOTY2MzkzYzE0MDQ3OWEwYyJ9
-
@ f462d21e:1390b6b1
2024-11-06 04:19:42
eyJfaWQiOiI2Njk1ZmZjZDUyYTMzYTg2YTMxOGUxYzAiLCJ1c2VybmFtZSI6ImtoYWxlZCIsImZlZWRiYWNrU2NvcmUiOjAsImNyZWF0ZWRfb24iOiIyMDI0LTA3LTE2VDA1OjA2OjIxLjA0OFoiLCJ0cmFkZXMiOjEsInRyYWRpbmdQYXJ0bmVycyI6MSwicHVibGljS2V5IjoiZGI0MzViZjAzYzU4Zjk4NTEwMzZiODZkYjI4OGIxMTJkYWRkYzAzMjc5ZTQ0MzkzOTY2MzkzYzE0MDQ3OWEwYyJ9
-
@ f462d21e:1390b6b1
2024-11-06 04:14:05
eyJfaWQiOiI2Njk1ZmZjZDUyYTMzYTg2YTMxOGUxYzAiLCJ1c2VybmFtZSI6ImtoYWxlZCIsImZlZWRiYWNrU2NvcmUiOjAsImNyZWF0ZWRfb24iOiIyMDI0LTA3LTE2VDA1OjA2OjIxLjA0OFoiLCJ0cmFkZXMiOjEsInRyYWRpbmdQYXJ0bmVycyI6MSwicHVibGljS2V5IjoiZGI0MzViZjAzYzU4Zjk4NTEwMzZiODZkYjI4OGIxMTJkYWRkYzAzMjc5ZTQ0MzkzOTY2MzkzYzE0MDQ3OWEwYyJ9
-
@ a367f9eb:0633efea
2024-11-05 08:48:41
Last week, an investigation by Reuters revealed that Chinese researchers have been using open-source AI tools to build nefarious-sounding models that may have some military application.
The [reporting](https://www.reuters.com/technology/artificial-intelligence/chinese-researchers-develop-ai-model-military-use-back-metas-llama-2024-11-01/) purports that adversaries in the Chinese Communist Party and its military wing are taking advantage of the liberal software licensing of American innovations in the AI space, which could someday have capabilities to presumably harm the United States.
> In a June paper reviewed by Reuters, six Chinese researchers from three institutions, including two under the People’s Liberation Army’s (PLA) leading research body, the Academy of Military Science (AMS), detailed how they had used an early version of Meta’s Llama as a base for what it calls “ChatBIT”.
>
> The researchers used an earlier Llama 13B large language model (LLM) from Meta, incorporating their own parameters to construct a military-focused AI tool to gather and process intelligence, and offer accurate and reliable information for operational decision-making.
While I’m doubtful that today’s existing chatbot-like tools will be the ultimate battlefield for a new geopolitical war (queue up the computer-simulated war from the Star Trek episode “A Taste of Armageddon“), this recent exposé requires us to revisit why large language models are released as open-source code in the first place.
Added to that, should it matter that an adversary is having a poke around and may ultimately use them for some purpose we may not like, whether that be China, Russia, North Korea, or Iran?
The number of open-source AI LLMs continues to grow each day, with projects like Vicuna, LLaMA, BLOOMB, Falcon, and Mistral available for download. In fact, there are over one million open-source LLMs available as of writing this post. With some decent hardware, every global citizen can download these codebases and run them on their computer.
With regard to this specific story, we could assume it to be a selective leak by a competitor of Meta which created the LLaMA model, intended to harm its reputation among those with cybersecurity and national security credentials. There are potentially trillions of dollars on the line.
Or it could be the revelation of something more sinister happening in the military-sponsored labs of Chinese hackers who have already been caught attacking American infrastructure, data, and yes, your credit history?
As consumer advocates who believe in the necessity of liberal democracies to safeguard our liberties against authoritarianism, we should absolutely remain skeptical when it comes to the communist regime in Beijing. We’ve written as much many times.
At the same time, however, we should not subrogate our own critical thinking and principles because it suits a convenient narrative.
Consumers of all stripes deserve technological freedom, and innovators should be free to provide that to us. And open-source software has provided the very foundations for all of this.
Open-source matters When we discuss open-source software and code, what we’re really talking about is the ability for people other than the creators to use it.
The various licensing schemes – ranging from GNU General Public License (GPL) to the MIT License and various public domain classifications – determine whether other people can use the code, edit it to their liking, and run it on their machine. Some licenses even allow you to monetize the modifications you’ve made.
While many different types of software will be fully licensed and made proprietary, restricting or even penalizing those who attempt to use it on their own, many developers have created software intended to be released to the public. This allows multiple contributors to add to the codebase and to make changes to improve it for public benefit.
Open-source software matters because anyone, anywhere can download and run the code on their own. They can also modify it, edit it, and tailor it to their specific need. The code is intended to be shared and built upon not because of some altruistic belief, but rather to make it accessible for everyone and create a broad base. This is how we create standards for technologies that provide the ground floor for further tinkering to deliver value to consumers.
Open-source libraries create the building blocks that decrease the hassle and cost of building a new web platform, smartphone, or even a computer language. They distribute common code that can be built upon, assuring interoperability and setting standards for all of our devices and technologies to talk to each other.
I am myself a proponent of open-source software. The server I run in my home has dozens of dockerized applications sourced directly from open-source contributors on GitHub and DockerHub. When there are versions or adaptations that I don’t like, I can pick and choose which I prefer. I can even make comments or add edits if I’ve found a better way for them to run.
Whether you know it or not, many of you run the Linux operating system as the base for your Macbook or any other computer and use all kinds of web tools that have active repositories forked or modified by open-source contributors online. This code is auditable by everyone and can be scrutinized or reviewed by whoever wants to (even AI bots).
This is the same software that runs your airlines, powers the farms that deliver your food, and supports the entire global monetary system. The code of the first decentralized cryptocurrency Bitcoin is also open-source, which has allowed thousands of copycat protocols that have revolutionized how we view money.
You know what else is open-source and available for everyone to use, modify, and build upon?
PHP, Mozilla Firefox, LibreOffice, MySQL, Python, Git, Docker, and WordPress. All protocols and languages that power the web. Friend or foe alike, anyone can download these pieces of software and run them how they see fit.
Open-source code is speech, and it is knowledge.
We build upon it to make information and technology accessible. Attempts to curb open-source, therefore, amount to restricting speech and knowledge.
Open-source is for your friends, and enemies In the context of Artificial Intelligence, many different developers and companies have chosen to take their large language models and make them available via an open-source license.
At this very moment, you can click on over to Hugging Face, download an AI model, and build a chatbot or scripting machine suited to your needs. All for free (as long as you have the power and bandwidth).
Thousands of companies in the AI sector are doing this at this very moment, discovering ways of building on top of open-source models to develop new apps, tools, and services to offer to companies and individuals. It’s how many different applications are coming to life and thousands more jobs are being created.
We know this can be useful to friends, but what about enemies?
As the AI wars heat up between liberal democracies like the US, the UK, and (sluggishly) the European Union, we know that authoritarian adversaries like the CCP and Russia are building their own applications.
The fear that China will use open-source US models to create some kind of military application is a clear and present danger for many political and national security researchers, as well as politicians.
A bipartisan group of US House lawmakers want to put export controls on AI models, as well as block foreign access to US cloud servers that may be hosting AI software.
If this seems familiar, we should also remember that the US government once classified cryptography and encryption as “munitions” that could not be exported to other countries (see The Crypto Wars). Many of the arguments we hear today were invoked by some of the same people as back then.
Now, encryption protocols are the gold standard for many different banking and web services, messaging, and all kinds of electronic communication. We expect our friends to use it, and our foes as well. Because code is knowledge and speech, we know how to evaluate it and respond if we need to.
Regardless of who uses open-source AI, this is how we should view it today. These are merely tools that people will use for good or ill. It’s up to governments to determine how best to stop illiberal or nefarious uses that harm us, rather than try to outlaw or restrict building of free and open software in the first place.
Limiting open-source threatens our own advancement If we set out to restrict and limit our ability to create and share open-source code, no matter who uses it, that would be tantamount to imposing censorship. There must be another way.
If there is a “Hundred Year Marathon” between the United States and liberal democracies on one side and autocracies like the Chinese Communist Party on the other, this is not something that will be won or lost based on software licenses. We need as much competition as possible.
The Chinese military has been building up its capabilities with trillions of dollars’ worth of investments that span far beyond AI chatbots and skip logic protocols.
The theft of intellectual property at factories in Shenzhen, or in US courts by third-party litigation funding coming from China, is very real and will have serious economic consequences. It may even change the balance of power if our economies and countries turn to war footing.
But these are separate issues from the ability of free people to create and share open-source code which we can all benefit from. In fact, if we want to continue our way our life and continue to add to global productivity and growth, it’s demanded that we defend open-source.
If liberal democracies want to compete with our global adversaries, it will not be done by reducing the freedoms of citizens in our own countries.
Last week, an investigation by Reuters revealed that Chinese researchers have been using open-source AI tools to build nefarious-sounding models that may have some military application.
The reporting purports that adversaries in the Chinese Communist Party and its military wing are taking advantage of the liberal software licensing of American innovations in the AI space, which could someday have capabilities to presumably harm the United States.
> In a June paper reviewed by[ Reuters](https://www.reuters.com/technology/artificial-intelligence/chinese-researchers-develop-ai-model-military-use-back-metas-llama-2024-11-01/), six Chinese researchers from three institutions, including two under the People’s Liberation Army’s (PLA) leading research body, the Academy of Military Science (AMS), detailed how they had used an early version of Meta’s Llama as a base for what it calls “ChatBIT”.
>
> The researchers used an earlier Llama 13B large language model (LLM) from Meta, incorporating their own parameters to construct a military-focused AI tool to gather and process intelligence, and offer accurate and reliable information for operational decision-making.
While I’m doubtful that today’s existing chatbot-like tools will be the ultimate battlefield for a new geopolitical war (queue up the computer-simulated war from the *Star Trek* episode “[A Taste of Armageddon](https://en.wikipedia.org/wiki/A_Taste_of_Armageddon)“), this recent exposé requires us to revisit why large language models are released as open-source code in the first place.
Added to that, should it matter that an adversary is having a poke around and may ultimately use them for some purpose we may not like, whether that be China, Russia, North Korea, or Iran?
The number of open-source AI LLMs continues to grow each day, with projects like Vicuna, LLaMA, BLOOMB, Falcon, and Mistral available for download. In fact, there are over [one million open-source LLMs](https://huggingface.co/models) available as of writing this post. With some decent hardware, every global citizen can download these codebases and run them on their computer.
With regard to this specific story, we could assume it to be a selective leak by a competitor of Meta which created the LLaMA model, intended to harm its reputation among those with cybersecurity and national security credentials. There are [potentially](https://bigthink.com/business/the-trillion-dollar-ai-race-to-create-digital-god/) trillions of dollars on the line.
Or it could be the revelation of something more sinister happening in the military-sponsored labs of Chinese hackers who have already been caught attacking American[ infrastructure](https://www.nbcnews.com/tech/security/chinese-hackers-cisa-cyber-5-years-us-infrastructure-attack-rcna137706),[ data](https://www.cnn.com/2024/10/05/politics/chinese-hackers-us-telecoms/index.html), and yes, [your credit history](https://thespectator.com/topic/chinese-communist-party-credit-history-equifax/)?
**As consumer advocates who believe in the necessity of liberal democracies to safeguard our liberties against authoritarianism, we should absolutely remain skeptical when it comes to the communist regime in Beijing. We’ve written as much[ many times](https://consumerchoicecenter.org/made-in-china-sold-in-china/).**
At the same time, however, we should not subrogate our own critical thinking and principles because it suits a convenient narrative.
Consumers of all stripes deserve technological freedom, and innovators should be free to provide that to us. And open-source software has provided the very foundations for all of this.
## **Open-source matters**
When we discuss open-source software and code, what we’re really talking about is the ability for people other than the creators to use it.
The various [licensing schemes](https://opensource.org/licenses) – ranging from GNU General Public License (GPL) to the MIT License and various public domain classifications – determine whether other people can use the code, edit it to their liking, and run it on their machine. Some licenses even allow you to monetize the modifications you’ve made.
While many different types of software will be fully licensed and made proprietary, restricting or even penalizing those who attempt to use it on their own, many developers have created software intended to be released to the public. This allows multiple contributors to add to the codebase and to make changes to improve it for public benefit.
Open-source software matters because anyone, anywhere can download and run the code on their own. They can also modify it, edit it, and tailor it to their specific need. The code is intended to be shared and built upon not because of some altruistic belief, but rather to make it accessible for everyone and create a broad base. This is how we create standards for technologies that provide the ground floor for further tinkering to deliver value to consumers.
Open-source libraries create the building blocks that decrease the hassle and cost of building a new web platform, smartphone, or even a computer language. They distribute common code that can be built upon, assuring interoperability and setting standards for all of our devices and technologies to talk to each other.
I am myself a proponent of open-source software. The server I run in my home has dozens of dockerized applications sourced directly from open-source contributors on GitHub and DockerHub. When there are versions or adaptations that I don’t like, I can pick and choose which I prefer. I can even make comments or add edits if I’ve found a better way for them to run.
Whether you know it or not, many of you run the Linux operating system as the base for your Macbook or any other computer and use all kinds of web tools that have active repositories forked or modified by open-source contributors online. This code is auditable by everyone and can be scrutinized or reviewed by whoever wants to (even AI bots).
This is the same software that runs your airlines, powers the farms that deliver your food, and supports the entire global monetary system. The code of the first decentralized cryptocurrency Bitcoin is also [open-source](https://github.com/bitcoin), which has allowed [thousands](https://bitcoinmagazine.com/business/bitcoin-is-money-for-enemies) of copycat protocols that have revolutionized how we view money.
You know what else is open-source and available for everyone to use, modify, and build upon?
PHP, Mozilla Firefox, LibreOffice, MySQL, Python, Git, Docker, and WordPress. All protocols and languages that power the web. Friend or foe alike, anyone can download these pieces of software and run them how they see fit.
Open-source code is speech, and it is knowledge.
We build upon it to make information and technology accessible. Attempts to curb open-source, therefore, amount to restricting speech and knowledge.
## **Open-source is for your friends, and enemies**
In the context of Artificial Intelligence, many different developers and companies have chosen to take their large language models and make them available via an open-source license.
At this very moment, you can click on over to[ Hugging Face](https://huggingface.co/), download an AI model, and build a chatbot or scripting machine suited to your needs. All for free (as long as you have the power and bandwidth).
Thousands of companies in the AI sector are doing this at this very moment, discovering ways of building on top of open-source models to develop new apps, tools, and services to offer to companies and individuals. It’s how many different applications are coming to life and thousands more jobs are being created.
We know this can be useful to friends, but what about enemies?
As the AI wars heat up between liberal democracies like the US, the UK, and (sluggishly) the European Union, we know that authoritarian adversaries like the CCP and Russia are building their own applications.
The fear that China will use open-source US models to create some kind of military application is a clear and present danger for many political and national security researchers, as well as politicians.
A bipartisan group of US House lawmakers want to put [export controls](https://www.reuters.com/technology/us-lawmakers-unveil-bill-make-it-easier-restrict-exports-ai-models-2024-05-10/) on AI models, as well as block foreign access to US cloud servers that may be hosting AI software.
If this seems familiar, we should also remember that the US government once classified cryptography and encryption as “munitions” that could not be exported to other countries (see[ The Crypto Wars](https://en.wikipedia.org/wiki/Export_of_cryptography_from_the_United_States)). Many of the arguments we hear today were invoked by some of the same people as back then.
Now, encryption protocols are the gold standard for many different banking and web services, messaging, and all kinds of electronic communication. We expect our friends to use it, and our foes as well. Because code is knowledge and speech, we know how to evaluate it and respond if we need to.
Regardless of who uses open-source AI, this is how we should view it today. These are merely tools that people will use for good or ill. It’s up to governments to determine how best to stop illiberal or nefarious uses that harm us, rather than try to outlaw or restrict building of free and open software in the first place.
## **Limiting open-source threatens our own advancement**
If we set out to restrict and limit our ability to create and share open-source code, no matter who uses it, that would be tantamount to imposing censorship. There must be another way.
If there is a “[Hundred Year Marathon](https://www.amazon.com/Hundred-Year-Marathon-Strategy-Replace-Superpower/dp/1250081343)” between the United States and liberal democracies on one side and autocracies like the Chinese Communist Party on the other, this is not something that will be won or lost based on software licenses. We need as much competition as possible.
The Chinese military has been building up its capabilities with [trillions of dollars’](https://www.economist.com/china/2024/11/04/in-some-areas-of-military-strength-china-has-surpassed-america) worth of investments that span far beyond AI chatbots and skip logic protocols.
The [theft](https://www.technologyreview.com/2023/06/20/1075088/chinese-amazon-seller-counterfeit-lawsuit/) of intellectual property at factories in Shenzhen, or in US courts by [third-party litigation funding](https://nationalinterest.org/blog/techland/litigation-finance-exposes-our-judicial-system-foreign-exploitation-210207) coming from China, is very real and will have serious economic consequences. It may even change the balance of power if our economies and countries turn to war footing.
But these are separate issues from the ability of free people to create and share open-source code which we can all benefit from. In fact, if we want to continue our way our life and continue to add to global productivity and growth, it’s demanded that we defend open-source.
If liberal democracies want to compete with our global adversaries, it will not be done by reducing the freedoms of citizens in our own countries.
*Originally published on the website of the [Consumer Choice Center](https://consumerchoicecenter.org/open-source-is-for-everyone-even-your-adversaries/).*
-
@ a10260a2:caa23e3e
2024-11-05 06:21:10
TIL Google Authenticator can potentially collect a lot of data, more than some of the other popular 2FA apps[^1].
[^1]: https://www.pcmag.com/reviews/google-authenticator
![](https://m.stacker.news/61098)
Whether it does or it doesn’t, if you’re like me, you don’t turn down an opportunity to remove some Google from your life and add in some open-source.
Here’s a quick overview of the migration process.
**Step 1: Download [2FAS](https://apps.apple.com/us/app/2fa-authenticator-2fas/id1217793794)**
![](https://m.stacker.news/61099)
**Step 2: Export accounts from Authenticator**
This can be done via “Transfer accounts” in the sidebar. If you’re transferring on the same phone, take a screenshot of the QR code.
![](https://m.stacker.news/61100)
![](https://m.stacker.news/61101)
**Step 3: Import accounts into 2FAS**
During the setup process for 2FAS, you’ll be given the option to import existing tokens from Google. This is where you’ll tap “Choose QR Code” and select the screenshot you took in step 2.
![](https://m.stacker.news/61102)
Note that when you tap continue after importing the tokens, you’ll be taken back to the same screen as above. I think it should take you to your list of accounts after. Either way, don’t think the import failed. Just tap cancel, and you’ll be taken there.
![](https://m.stacker.news/61104)
If you’re on Android, check out [Aegis](https://github.com/beemdevelopment/Aegis). 🫡
originally posted at https://stacker.news/items/753472
-
@ 472f440f:5669301e
2024-11-05 04:24:47
All eyes are, unsurprisingly, on the US Presidential election. Tomorrow is the big day. I don't want to come off as preachy, however it is pretty clear to me that if you are an American citizen who cares about bitcoin and would like to live under an administration that is eager to embrace the industry as opposed to an administration that is actively hostile toward bitcoin there is only one candidate who deserves your vote; Donald J. Trump. I think he's a better candidate for other reasons, but if you've read this rag for long enough you probably already know what those are. Instead of writing a screed about why I am voting for Trump, let's highlight some things outside of the election that you should be paying attention to this week.
First up, there are two Treasury auctions; $42B of 10-Year notes tomorrow and $25B 30-Year bonds on Wednesday.
It will be interesting to see what the demand for these auctions is and how they affect rates. The long end of the yield curve has been pumping since the Fed's rate cut in the middle of September, which is the market signaling that it does not believe inflation has been appropriately tamed. Yields came down today, but as you can see from the charts things are trending in the wrong direction.
As the Treasury issues new debt at higher rates, the interest expense on that debt, naturally, drifts higher. If the long end of the yield curve doesn't come down aggressively over the course of the next year this is going to be a big problem. There are trillions of dollars worth of Treasury debt that needs the be rolled over in the next few years and it would be advantageous for the Treasury if that debt wasn't being rolled over with yields as high as they are. With the amount of debt the country has accrued in recent decades, every incremental dollar of debt that gets issued and/or rolled over at higher interest rates exacerbates the problem. We are approaching the territory of runaway exponentials, as evidenced by this chart.
The growth slope gets steeper and steeper
This debt problem is the elephant in the room that needs to be addressed as quickly as possible. The national debt hit $1.2T in early 1983. It then took 26 years to 10x from $1.2T to $12T in late 2009 and has only taken another 15 years to triple from there to $36T or 30x from the arbitrary base I picked out (Q1 1983).
With this in mind, keep an eye out for these auctions tomorrow and Wednesday, where rates end at the end of trading on Wednesday, and whether or not we officially push over $36T. Regardless of who wins the election tomorrow, this is a problem that needs to be confronted. Whether or not it can be solved at all is up for debate. I don't see how what can be done to reel in this runaway train at this point. However, at the very least, we should acknowledge that we're in the realm of exponentials and have people prepare accordingly by accumulating hard assets that cannot be debased (bitcoin).
The other thing to pay attention to is the FOMC meeting on Wednesday and the announcement of the results of the meeting on Thursday. Will Jerome and the other Fed board members to keep rates where they are, cut, or raise rates? Raising rates seems to be out of the question despite the fact that many believe it would be the most prudent move considering how the long end of the yield curve reacted to the 50bps cut in September. If they decide to cut rates, by how much will they cut them? Will they slow the pace with a 25bps cut or continue at the 50bps clip established in September?
We'll find toward the end of this week. Don't lose sight of these events while the world is enthralled with the elections in the US.
I don't know about you freaks, but I couldn't feel more fortunate that bitcoin exists at a time like this. Having access to a distributed peer-to-peer digital cash system with a fixed supply during a time of incredible political divisiveness and out-of-control runaway sovereign debt feels like a Godsend.
Stay sane out there.
Final thought...
We're going to win.
-
@ fd208ee8:0fd927c1
2024-11-03 21:51:39
## All memed out
It finally happened. I think it was October 25th, at circa 18:45 in the evening. I was doomscrolling my Nostr feed, and kept seeing the same Bitcoin memes repeated over and over, by different people. They weren't even reposts, they were copy-pasted versions of the same image. A very funny image. Well, it was very funny last year... and the year before that... and probably the year before that, when it appeared on a different network.
Because it's all just reposts, copy-pastes and rehashes of the Best of Bitcoin Twitter, just like the tiresome influencers, with their groupies and their Episode 498 of *Let's all eat a large chunk of lightly-burnt dead animal and count our stacks before jetting off to talk about how to save the poors by getting them to buy individual satoshis with money they don't have*.
![steak](https://www.tastingtable.com/img/gallery/10-minimum-best-large-cuts-of-meat-for-grilling/intro-1691424874.webp)
## I'm the poors your looking for
It's all so tiresome. It has little bearing on the real world I see around me, where most people are thinking all day about 99 problems and Bitcoin ain't one.
![It is me](https://miro.medium.com/v2/resize:fit:1400/format:webp/1*xBh533R2Tp8MZzbVAoDLQQ.png)
Which is, of course, what the Bitcoin influencers would have you believe, is the reason that they're poor. What in the world could be more important, than thinking about Bitcoin? Why do these people not get with the program? Don't they know, that we are trying to save them?
![stop being poor](https://i.etsystatic.com/31473067/r/il/f019cc/5816289459/il_1588xN.5816289459_6efv.jpg)
Why are they worrying about OtherProblems? Don't they know that all OtherProblems can be fixed with Bitcoin? Really, if you just go back far enough, in any current, situational problem, you will discover that there was some slight, negative shift to the history record that involved soft money. It's the financial version of the Butterfly Effect.
![Bitcoin Effect](https://i.nostr.build/eo5CMa7hEvCUFvam.jpg)
That's why #BitcoinFixesThis. Bitcoin fixes everything, if you just think about it, for long enough.
The same way that we all actually come out of Africa, supposedly, if you go back enough generations. So, coming out of Africa, now, as a Real Life Person in The Present is supposed to have no significance. What does someone from Cameroon know about Africa, that someone from Alaska doesn't? Both people come out of Africa, if you just think about it, for long enough.
![older lady sipping](https://i.pinimg.com/564x/cf/8e/13/cf8e139c7d615724a073616b358c9249.jpg)
And maybe that really is true. Maybe Bitcoin will eventually end all vice and crimes, save the planet, and we will all just hold hands and sing kumbaya all day, while waiting for the Singularity to upload us to Satoshi.
## Bitcoin envelope budgeting
Or maybe it's not. Maybe it's just a really hard, digital money that incentivizes savings, functions as a reliable measure, and makes micropayments possible on a global scale. Those really are things that will help the poors, including myself. I can see it, already, when trying to organize pre-paid meetups or figure out what to do with our household's meager savings, when the stock market is looking particularly bubblicious.
![Weimar laesst gruessen](https://i.pinimg.com/564x/22/14/fa/2214faad59e41b57f4352a4269ec6515.jpg)
But this is what I would consider Boring Bitcoin. Bitcoin home economics. Penny-pinching Bitcoin. Bitcoin for homemakers. How to use the Bitcoin envelope budgeting system to beat inflation by a margin of 13%.
The actual use of Bitcoin as money, rather than as a mere investment gamble or hype machine. That's the part of Bitcoin that nobody seems to really talk about because it's incredibly practical, dull, and useful, and it can only be tested by -- Oh, the horror! -- actually spending Bitcoin.
But... perhaps I will begin talking about it. Perhaps those of us, Bitcoiners, who are having fun staying poor, while stacking sats, should speak up a bit more. Perhaps the boring stuff is actually the interesting stuff. Perhaps there is more to say about Bitcoin, than can fit into a meme.
-
@ fd208ee8:0fd927c1
2024-11-03 12:01:43
## It arrived!
I was feeling impatient, waiting for my snazzy, brand-spanking new mobile phone to arrive, but when it got here, I just stared at the box, in trepidation. Everyone kept walking by, asking how it is, but I just shook my head. After nearly four years, with my (originally Android 10), Moto G8 Power, which I loved to death, I wasn't yet ready to move on. I needed a moment, to grieve.
RIP, my trusty fren.
![Phone in retirement](https://files.refurbed.com/ii/motorola-moto-g8-power-1645784414.jpg)
## Anyways...
Around 10 pm, I managed to emotionally recover enough to begin the Big Transition, and I was up until 2 am, and still didn't finish.
My **SimpleX** database is sort of large, and slow to migrate. Also, took me a while to figure out how to do it, and the whole thing made me terribly nervous, that I'd accidentally get locked out. But it worked, after eight failed attempts, so yay.
**Telegram** was back online, almost immediately, since it's tied to the SIM card. Which was convenient, but sorta creeped me out.
Our family-internal favorite, **Threema**, was a snap. Took 5 minutes.
I had four failed starts with **Slack**, as it kept sending a login code to my Proton Mail, but I didn't have Proton app installed on my new phone, yet, and I was really sleepy, so I kept confirming on the old phone and then Slack would freeze up, and I had to kill the process and restart.
My **key manager** is cloud-based, so that went really fast, and I had the nos2x browser extension going in Firefox within 10 minutes, or so. Logged into Habla.News, Nostr.Build, Zap.Cooking, and Nostrudel.Ninja, immediately, so that I can get my Nostr fix.
Then I took a deep breath and mass-installed F-Droid, Minibits, **Amethyst**, Citrine, Orbot, and Amber. And breathed out, again, because MIRACLES NEVER CEASE: it seems to be actually working.
![Pinch me, I'm dreaming.](https://i.nostr.build/4oAdtXIN9y4QqvqE.png)
Everyone knows that this is the unbeatable Android Nostr setup, but it's also a resource-gobbling monster, that should only be tried at home, kids. Make sure you don't use Amethyst when out-and-about, unless you have a gigantic battery and an unlimited, high-speed, mobile plan. So, basically, everyone in the First World, who isn't me, can do it.
Oh, well. At least, I can now indulge over WiFi.
The phone itself is just like the old one, but thinner, faster, and doesn't freeze up or take a long time to start. The Motorola is dead. Long live the Motorola.
-
@ fd208ee8:0fd927c1
2024-11-03 09:20:33
# It's that season, again
I've been growing my hair out (too lazy to cut it) and it has -- once again -- quickly reached a length at which it draws unnecessary attention and sheds everywhere. I suppose it always sheds everywhere, but shedding short hairs is just generally less-gross than finding a 12-inch strand lying on the toast, you were about to consume.
So, I'm back to the _50 Shades of Updo_ stage, where I struggle to figure out how to best wear my head, usually defaulting to the _Messy Bun_ look, because it's still too short to do anything more elaborate and looks silly, as a ponytail.
![bun](https://i.nostr.build/YO8Aly0qUaPOJhCw.jpg)
![bun side-view](https://i.nostr.build/hCBjIxzfvbvR9iBy.jpg)
It's really not that great of a look for me, I know, especially, now that my chin is finally succumbing to gravity, but doing something more-elegant is usually more time-consuming and doesn't have that wonderful "swept up" feeling to it. You know that feeling, when you tie all of that heavy hair to a higher point on your skull and the roots just sigh with relief.
Another look, I tend to gravitate toward, at the moment, is head scarves, like this one:
![covering](https://image.nostr.build/1fad8ea595f64ea39f75b38b751aad89f90de3737110f4b5409556f5cf6be72f.jpg)
...or a Bavarian-style bandana, for gardening or hiking (don't have a selfie handy, so here is some random chick, who also suffers from poofy, dark hair).
![Not me](https://i.nostr.build/dsoKiqIVSgAGMBYE.png)
Hiking bare-headed, with flowing tresses, is not recommended, due to all of the Nature, that you have to comb back out of it.
Generally, just bored of my inbetween length and looking forward to braiding it, in a few months. Or giving up, in frustration, and cutting it all off.
-
@ 09fbf8f3:fa3d60f0
2024-11-02 08:00:29
> ### 第三方API合集:
---
免责申明:
在此推荐的 OpenAI API Key 由第三方代理商提供,所以我们不对 API Key 的 有效性 和 安全性 负责,请你自行承担购买和使用 API Key 的风险。
| 服务商 | 特性说明 | Proxy 代理地址 | 链接 |
| --- | --- | --- | --- |
| AiHubMix | 使用 OpenAI 企业接口,全站模型价格为官方 86 折(含 GPT-4 )| https://aihubmix.com/v1 | [官网](https://aihubmix.com?aff=mPS7) |
| OpenAI-HK | OpenAI的API官方计费模式为,按每次API请求内容和返回内容tokens长度来定价。每个模型具有不同的计价方式,以每1,000个tokens消耗为单位定价。其中1,000个tokens约为750个英文单词(约400汉字)| https://api.openai-hk.com/ | [官网](https://openai-hk.com/?i=45878) |
| CloseAI | CloseAI是国内规模最大的商用级OpenAI代理平台,也是国内第一家专业OpenAI中转服务,定位于企业级商用需求,面向企业客户的线上服务提供高质量稳定的官方OpenAI API 中转代理,是百余家企业和多家科研机构的专用合作平台。 | https://api.openai-proxy.org | [官网](https://www.closeai-asia.com/) |
| OpenAI-SB | 需要配合Telegram 获取api key | https://api.openai-sb.com | [官网](https://www.openai-sb.com/) |
` 持续更新。。。`
---
### 推广:
访问不了openai,去`低调云`购买VPN。
官网:https://didiaocloud.xyz
邀请码:`w9AjVJit`
价格低至1元。
-
@ f462d21e:1390b6b1
2024-11-02 05:29:26
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
-
@ f462d21e:1390b6b1
2024-11-01 22:45:56
deleted
-
@ a95c6243:d345522c
2024-11-01 18:22:43
*Die «moralische Weltordnung» – eine Art Astrologie.
Friedrich Nietzsche*
**Das Treffen der BRICS-Staaten beim [Gipfel](https://transition-news.org/brics-gipfel-in-kasan-warum-schweigt-die-schweiz) im russischen Kasan** war sicher nicht irgendein politisches Event. Gastgeber Wladimir Putin habe «Hof gehalten», sagen die Einen, China und Russland hätten ihre Vorstellung einer multipolaren Weltordnung zelebriert, schreiben Andere.
**In jedem Fall zeigt die Anwesenheit von über 30 Delegationen aus der ganzen Welt,** dass von einer geostrategischen Isolation Russlands wohl keine Rede sein kann. Darüber hinaus haben sowohl die Anreise von UN-Generalsekretär António Guterres als auch die Meldungen und Dementis bezüglich der Beitrittsbemühungen des NATO-Staats [Türkei](https://transition-news.org/turkei-entlarvt-fake-news-von-bild-uber-indiens-angebliches-veto-gegen-den) für etwas Aufsehen gesorgt.
**Im Spannungsfeld geopolitischer und wirtschaftlicher Umbrüche** zeigt die neue Allianz zunehmendes Selbstbewusstsein. In Sachen gemeinsamer Finanzpolitik schmiedet man interessante Pläne. Größere Unabhängigkeit von der US-dominierten Finanzordnung ist dabei ein wichtiges Ziel.
**Beim BRICS-Wirtschaftsforum in Moskau, wenige Tage vor dem Gipfel,** zählte ein nachhaltiges System für Finanzabrechnungen und Zahlungsdienste zu den vorrangigen Themen. Während dieses Treffens ging der russische Staatsfonds eine Partnerschaft mit dem Rechenzentrumsbetreiber BitRiver ein, um [Bitcoin](https://www.forbes.com/sites/digital-assets/2024/10/23/russia-launches-brics-mining-infrastructure-project/)-Mining-Anlagen für die BRICS-Länder zu errichten.
**Die Initiative könnte ein Schritt sein, Bitcoin und andere Kryptowährungen** als Alternativen zu traditionellen Finanzsystemen zu etablieren. Das Projekt könnte dazu führen, dass die BRICS-Staaten den globalen Handel in Bitcoin abwickeln. Vor dem Hintergrund der Diskussionen über eine «BRICS-Währung» wäre dies eine Alternative zu dem ursprünglich angedachten Korb lokaler Währungen und zu goldgedeckten Währungen sowie eine mögliche Ergänzung zum Zahlungssystem [BRICS Pay](https://en.wikipedia.org/wiki/BRICS_PAY).
**Dient der Bitcoin also der Entdollarisierung?** Oder droht er inzwischen, zum Gegenstand geopolitischer [Machtspielchen](https://legitim.ch/es-ist-ein-sieg-fuer-bitcoin-waehrend-russland-und-die-usa-um-die-krypto-vorherrschaft-kaempfen/) zu werden? Angesichts der globalen Vernetzungen ist es oft schwer zu durchschauen, «was eine Show ist und was im Hintergrund von anderen Strippenziehern insgeheim gesteuert wird». Sicher können Strukturen wie Bitcoin auch so genutzt werden, dass sie den Herrschenden dienlich sind. Aber die Grundeigenschaft des dezentralisierten, unzensierbaren Peer-to-Peer Zahlungsnetzwerks ist ihm schließlich nicht zu nehmen.
**Wenn es nach der EZB oder dem IWF geht, dann scheint statt Instrumentalisierung** momentan eher der Kampf gegen Kryptowährungen angesagt. Jürgen Schaaf, Senior Manager bei der Europäischen Zentralbank, hat jedenfalls dazu aufgerufen, [Bitcoin «zu eliminieren»](https://www.btc-echo.de/schlagzeilen/ezb-banker-es-gibt-gute-gruende-bitcoin-zu-eliminieren-194015/). Der Internationale Währungsfonds forderte El Salvador, das Bitcoin 2021 als gesetzliches Zahlungsmittel eingeführt hat, kürzlich zu [begrenzenden Maßnahmen](https://legitim.ch/el-salvador-iwf-fordert-trotz-nicht-eingetretener-risiken-neue-massnahmen-gegen-bitcoin/) gegen das Kryptogeld auf.
**Dass die BRICS-Staaten ein freiheitliches Ansinnen im Kopf haben,** wenn sie Kryptowährungen ins Spiel bringen, darf indes auch bezweifelt werden. Im [Abschlussdokument](http://static.kremlin.ru/media/events/files/en/RosOySvLzGaJtmx2wYFv0lN4NSPZploG.pdf) bekennen sich die Gipfel-Teilnehmer ausdrücklich zur UN, ihren Programmen und ihrer «Agenda 2030». Ernst Wolff nennt das «eine [Bankrotterklärung](https://x.com/wolff_ernst/status/1849781982961557771) korrupter Politiker, die sich dem digital-finanziellen Komplex zu 100 Prozent unterwerfen».
---
Dieser Beitrag ist zuerst auf *[Transition News](https://transition-news.org/aufstand-gegen-die-dollar-hegemonie)* erschienen.
-
@ c69b71dc:426ba763
2024-10-31 16:02:10
# Risks and Regulations
### Food contact materials (FCMs)
Materials that come into contact with food during processing, packaging, or transport – play a critical role in food safety. However, chemicals can migrate from these materials into food, introducing potential health risks.
For instance, chemicals can leach into food from packaging materials, especially during microwaving, pasteurization, or other high-temperature exposures. Even printing inks on the outer packaging, if not well-contained, can migrate into the food or drink. Factors like high temperatures, small package-to-food ratios, fatty foods, and long storage times all increase this risk.
More than 12,200 chemicals have been identified in FCMs, but only about 100 substances are regulated by the European Union, focusing mainly on plastics. The actual composition of many materials is often undisclosed due to proprietary protection, making it challenging to assess risks fully. Even less is known about secondary substances, which may arise from additives breaking down during manufacturing.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c69b71dc564fdc350acddff929f25d7202ac1470c87488608bd6d98e426ba763/files/1730389880688-YAKIHONNES3.jpg)
> In 2016, EU regulation defined publicly that *current regulations do not sufficiently protect public health from the harmful impacts of chemicals migrating from food packaging.* The current paradigm for evaluating the safety of FCMs is insufficient, as there is a general underestimation of the role of FCMs in food contamination and a lack of information on human exposure. FCMs are a significant source of human exposure to chemicals of concern, including perfluorinated compounds (PFCs) and endocrine-disrupting chemicals (EDCs), as well as those linked to neurodevelopmental issues.
Moreover, the legal framework doesn’t account for the cumulative "cocktail effect" of multiple low-level chemical exposures, which can collectively exceed safe limits. Research shows that FCMs can contribute to serious health issues like cardiovascular disease, diabetes, obesity, neurological disorders, and cancer.
Although packaging is designed to preserve food, maintain quality, and extend shelf life, its chemical impacts remain insufficiently regulated, posing risks that demand greater transparency and robust oversight.
### So what can we do?
Be mindful and use less packaged food. Plastic is sometimes even less harmful than paper, as many chemicals and synthetic materials are used in paper production to improve texture and prevent humidity from transferring through the paper packaging. Additionally, the barrier between ink and food in paper packaging is often not very effective.
Chemicals are mostly invisible...!
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c69b71dc564fdc350acddff929f25d7202ac1470c87488608bd6d98e426ba763/files/1730390005108-YAKIHONNES3.jpg)
-
@ cf5b8c65:494a0912
2024-10-31 11:55:39
Estoy probando un plugin para Obisidian que permite publicar directamente en NOSTR los artículos que has creado en Obsidian.
-
@ fd208ee8:0fd927c1
2024-10-31 11:03:08
## Chef's notes
I got the recipe from the [byanjushka website](https://byanjushka.com/erdnussbutter-kekse-rezept-8177/). She includes a lot more information on there, and lots of pictures and instructions. But it's all in German, so here's my quickie, English version. I've doubled the amounts, as I first baked this for the #PurpleKonnektiv meetup, and I knew I'd have some hungry guests.
The cookies are vegan, but they're mostly just peanut, so it's sort of irrelevant. Just make sure you get the really high-quality peanut butter that is 100% peanut. You can usually identify it by the fact that the oil separates from the base, a bit. Everything else is probably with hardened palm oil, or something.
## Details
- ⏲️ Prep time: 15 min
- 🍳 Cook time: 10 min
- 🍽️ Servings: 30 cookies
## Ingredients
- 500 g peanut butter, normal or crunchy
- 300 g brown (or raw) sugar
- 160 ml plant-based milk (or cows' milk, if you don't care about vegan)
- 1 pkg vanilla sugar (bourbon is nice) or 1 tsp vanilla
- 250 g flour
- 2 tsp baking powder
- 2/3 tsp salt
## Directions
1. Preheat oven to 180 °C (350 °F).
2. Beat together the peanut butter and the sugars, with an electric mixer.
3. Mix in milk and vanilla.
4. In a separate bowl, stir together flour, salt, and baking powder.
5. Stir the dry ingredients into the wet ingredients, and then knead the dough a bit.
6. (At this point, I put the dough in the fridge overnight, and baked it the next day.)
7. Line your baking sheet with baking paper.
8. Form tbsp-spoon-sized balls of dough.
9. Press each one flat, with a fork, dipping the fork in water, before each press (to keep the dough from sticking to the fork).
-
@ eac63075:b4988b48
2024-10-30 20:58:01
Have you ever heard that cryptocurrencies are primarily used by criminals? This is a common idea, but it doesn’t reflect reality. In this article, we will explore what cryptocurrencies are, how they work, and why the notion that they’re only for illegal activities is a myth. We will also compare the use of cryptocurrencies with traditional money and understand how blockchain technology brings transparency and security to transactions.
https://www.fountain.fm/episode/hVVS7hrsX8VQ9SPoUYbg
## What Are Cryptocurrencies?
Cryptocurrencies are digital currencies that use cryptography to secure transactions. The most well-known is Bitcoin, but there are many others, like Ethereum, Litecoin, and Ripple. Unlike traditional money, cryptocurrencies are not controlled by governments or central banks. They operate on a decentralized network called blockchain, which records all transactions publicly and immutably.
## The Origin of the Myth: Cryptocurrencies and Illicit Activities
The myth that cryptocurrencies are mainly used for crime began with cases like Silk Road, an illegal online marketplace where Bitcoin was used to buy and sell illicit products. This type of news captured attention and created a negative image of cryptocurrencies. However, it’s essential to understand that these cases are exceptions and don’t represent the majority of cryptocurrency use.
## Current Data: Cryptocurrencies and Illicit Activities
[According to the **2024 Cryptocurrency Crime Report** from **Chainalysis**](https://www.chainalysis.com/blog/2024-crypto-crime-report-introduction/?ref=eddieoz.com), only **0.34%** of cryptocurrency transactions in 2023 were linked to illegal activities. This means that the vast majority of people use cryptocurrencies legitimately, for investments, shopping, sending money to family in other countries, and other legal activities.
![](https://www.eddieoz.com/content/images/2024/10/image-1.png)## Comparison with Traditional Money
When we look at traditional money, like the dollar or the euro, we see that it is much more used in criminal activities. [According to a report by **Verafin**](https://verafin.com/2024/02/a-3-1-trillion-financial-crime-epidemic/?ref=eddieoz.com), about **3.1 trillion dollars** are used annually in financial crimes such as drug trafficking, terrorism, fraud, and money laundering. This represents approximately **3.87%** of all money in circulation.
![](https://www.eddieoz.com/content/images/2024/10/image-2.png)In comparison, the illicit use of cryptocurrencies is a much smaller fraction. This shows that traditional money remains the main tool for financial crimes, not cryptocurrencies.
## The Transparency of Blockchain
One of the great advantages of cryptocurrencies is blockchain technology. Since all transactions are recorded in a public ledger, it’s possible to trace the path of money. This makes it harder for criminals to hide their activities. Unlike cash, which can change hands without leaving any trace, cryptocurrency transactions leave a permanent record.
Companies and law enforcement agencies use this transparency to identify and combat illegal activities. This makes cryptocurrencies less appealing to criminals who prefer methods that leave no trace.
## How Much Money Is There in the World?
To understand the scale, it’s interesting to know that, according to the **World Population Review**, [about **80 trillion dollars** are in circulation globally](https://worldpopulationreview.com/metrics/how-much-money-is-in-the-world?ref=eddieoz.com), including physical and digital money. Out of this total, only **5 trillion dollars** is in physical cash. This shows that most transactions are already digital, even in the traditional financial system.
![](https://www.eddieoz.com/content/images/2024/10/image.png)## Cryptocurrencies Promote Economic Freedom
Cryptocurrencies offer people more control over their own money. Without the need for intermediaries like banks or governments, transactions can be made directly between individuals. This is especially useful in countries with unstable financial systems or where the population lacks easy access to banking services.
This financial autonomy can bother traditional institutions that are used to controlling the flow of money. Therefore, we sometimes see criticism of cryptocurrencies from these institutions, which may try to link them to criminal activities to discredit them.
## Myths and Realities
It’s a myth to say that cryptocurrencies are mainly used for crimes. The reality is that they are primarily used for legal and legitimate purposes. People around the world invest in cryptocurrencies, use them for online shopping, send money to family in other countries, and even protect their savings from inflation.
## Conclusion: Are Cryptocurrencies Really the Villains?
The evidence shows that cryptocurrencies are not the villains some believe them to be. On the contrary, they offer a safe, transparent, and efficient way to conduct financial transactions. While traditional money continues to be the main means used in criminal activities, the illicit use of cryptocurrencies remains a small exception.
If you have doubts about the reliability of cryptocurrencies, remember that the technology behind them is designed to be safe and transparent. With current data and information, it’s clear that cryptocurrencies are closer to being a solution for financial problems than a cause.
## And You, What Do You Think?
Are cryptocurrencies being unfairly accused? Share your opinion and join the discussion!Have you ever heard that cryptocurrencies are primarily used by criminals? This is a common idea, but it doesn’t reflect reality. In this article, we will explore what cryptocurrencies are, how they work, and why the notion that they’re only for illegal activities is a myth. We will also compare the use of cryptocurrencies with traditional money and understand how blockchain technology brings transparency and security to transactions.
What Are Cryptocurrencies? Cryptocurrencies are digital currencies that use cryptography to secure transactions. The most well-known is Bitcoin, but there are many others, like Ethereum, Litecoin, and Ripple. Unlike traditional money, cryptocurrencies are not controlled by governments or central banks. They operate on a decentralized network called blockchain, which records all transactions publicly and immutably.
The Origin of the Myth: Cryptocurrencies and Illicit Activities The myth that cryptocurrencies are mainly used for crime began with cases like Silk Road, an illegal online marketplace where Bitcoin was used to buy and sell illicit products. This type of news captured attention and created a negative image of cryptocurrencies. However, it’s essential to understand that these cases are exceptions and don’t represent the majority of cryptocurrency use.
Current Data: Cryptocurrencies and Illicit Activities According to the 2024 Cryptocurrency Crime Report from Chainalysis, only 0.34% of cryptocurrency transactions in 2023 were linked to illegal activities. This means that the vast majority of people use cryptocurrencies legitimately, for investments, shopping, sending money to family in other countries, and other legal activities.
Comparison with Traditional Money When we look at traditional money, like the dollar or the euro, we see that it is much more used in criminal activities. According to a report by Verafin, about 3.1 trillion dollars are used annually in financial crimes such as drug trafficking, terrorism, fraud, and money laundering. This represents approximately 3.87% of all money in circulation.
In comparison, the illicit use of cryptocurrencies is a much smaller fraction. This shows that traditional money remains the main tool for financial crimes, not cryptocurrencies.
The Transparency of Blockchain One of the great advantages of cryptocurrencies is blockchain technology. Since all transactions are recorded in a public ledger, it’s possible to trace the path of money. This makes it harder for criminals to hide their activities. Unlike cash, which can change hands without leaving any trace, cryptocurrency transactions leave a permanent record.
Companies and law enforcement agencies use this transparency to identify and combat illegal activities. This makes cryptocurrencies less appealing to criminals who prefer methods that leave no trace.
How Much Money Is There in the World? To understand the scale, it’s interesting to know that, according to the World Population Review, about 80 trillion dollars are in circulation globally, including physical and digital money. Out of this total, only 5 trillion dollars is in physical cash. This shows that most transactions are already digital, even in the traditional financial system.
Cryptocurrencies Promote Economic Freedom Cryptocurrencies offer people more control over their own money. Without the need for intermediaries like banks or governments, transactions can be made directly between individuals. This is especially useful in countries with unstable financial systems or where the population lacks easy access to banking services.
This financial autonomy can bother traditional institutions that are used to controlling the flow of money. Therefore, we sometimes see criticism of cryptocurrencies from these institutions, which may try to link them to criminal activities to discredit them.
Myths and Realities It’s a myth to say that cryptocurrencies are mainly used for crimes. The reality is that they are primarily used for legal and legitimate purposes. People around the world invest in cryptocurrencies, use them for online shopping, send money to family in other countries, and even protect their savings from inflation.
Conclusion: Are Cryptocurrencies Really the Villains? The evidence shows that cryptocurrencies are not the villains some believe them to be. On the contrary, they offer a safe, transparent, and efficient way to conduct financial transactions. While traditional money continues to be the main means used in criminal activities, the illicit use of cryptocurrencies remains a small exception.
If you have doubts about the reliability of cryptocurrencies, remember that the technology behind them is designed to be safe and transparent. With current data and information, it’s clear that cryptocurrencies are closer to being a solution for financial problems than a cause.
And You, What Do You Think? Are cryptocurrencies being unfairly accused? Share your opinion and join the discussion!
-
@ 8f69ac99:4f92f5fd
2024-10-30 14:54:26
Nos últimos anos, a narrativa dominante retrata a mineração de Bitcoin como um consumidor voraz de energia, com impactos ambientais desproporcionais. Embora a mineração de Bitcoin exija uma quantidade significativa de energia, esta visão ignora um ponto crucial: o seu potencial para promover a sustentabilidade ambiental e remodelar a integração de energias renováveis.
Este artigo vai além dos debates convencionais sobre a pegada de carbono, explorando como a mineração de Bitcoin pode mitigar os impactos ambientais e catalisar uma transição energética sustentável, transformando o que alguns consideram uma inutilidade num aliado contra a dependência dos combustíveis fósseis e a adversidade climática.
---
### **Desafios da Energia Renovável**
Alcançar um futuro sustentável depende da adopção de fontes de energia renovável, mas estas enfrentam desafios únicos. Gerir o excesso de energia produzido durante períodos de baixa procura e lidar com as limitações da actual tecnologia de baterias são obstáculos significativos. Além disso, a transmissão de energia a longas distâncias permanece ineficiente, o que impede que recursos renováveis remotos alcancem mercados mais amplos.
Por exemplo, as linhas de corrente contínua de alta tensão (HVDC) perdem aproximadamente 3% de potência por cada 1.000 km, enquanto as linhas de corrente alternada de alta tensão (HVAC) perdem cerca de 7% por cada 1.000 km. Isto significa que, por cada quilómetro, as linhas HVDC perdem cerca de 0,003%, e as linhas HVAC perdem cerca de 0,007% (as linhas de alta tensão são projectadas para diminuir perdas, as perdas são ainda maiores na media tensão). Estas perdas, aliadas à dificuldade de transportar energia de parques renováveis remotos, sublinham a necessidade de soluções localizadas.
Por exemplo, em 2018, cerca de 6,5 milhões de MWh de produção de energia solar fotovoltaica foram descartados, ou "mandados fora", no Chile, na China, na Alemanha e nos Estados Unidos conjuntamente. É importante notar que, à medida que a capacidade de energia renovável continua a crescer rapidamente (com o aumento das adições de capacidade renovável global anual em quase 50%, para quase 510 gigawatts em 2023), a quantidade absoluta de energia desperdiçada é susceptível de aumentar, a menos que se façam melhorias significativas na infraestrutura da rede, no armazenamento de energia e na gestão da procura.
### **Monetizar o Excesso de Energia através da Mineração de Bitcoin**
Fontes de energia renovável, como a solar e a eólica, muitas vezes geram mais electricidade do que a rede necessita em determinados momentos, criando um excedente de energia que normalmente é desperdiçado. Este excesso permanece subutilizado porque:
- As soluções de armazenamento em grande escala são limitadas e dispendiosas ou mesmo inexistentes;
- A capacidade de transmissão muitas vezes não é suficiente para distribuir energia a longas distâncias;
- E a procura nem sempre coincide com os períodos de produção máxima de energia renovável.
A mineração de Bitcoin apresenta uma solução apelativa, ao actuar como um consumidor de energia flexível, capaz de ajustar rapidamente o seu consumo para se alinhar com a oferta. Operações de mineração localizadas perto de instalações de energia renovável — como centrais hidroeléctricas ou parques solares — podem absorver o excesso de energia que, de outra forma, seria desperdiçado, monetizando-o. Esta configuração não só reduz o desperdício de energia renovável, como também proporciona fontes de rendimento fiáveis para projectos renováveis, incentivando o investimento em infraestruturas verdes.
#### **Mineração de Bitcoin como Consumidor Flexível**
As operações de mineração de Bitcoin podem ajustar dinamicamente o seu consumo de energia, actuando como uma "carga flexível" na rede. As principais vantagens incluem:
- **Escalabilidade Rápida**: Os equipamentos de mineração podem aumentar ou diminuir o seu consumo de energia quase instantaneamente, respondendo às flutuações na disponibilidade de energia.
- **Independência Geográfica**: A mineração de Bitcoin pode ser realizada em qualquer local com ligação à internet, permitindo que os mineradores se situem perto das fontes renováveis, independentemente da infraestrutura da rede.
- **Capacidade Modular**: O equipamento de mineração é altamente escalável, permitindo que os produtores de energia desenhem sistemas modulares que se adaptem à capacidade energética disponível.
#### **Incentivos Económicos e Benefícios**
A utilização do excedente de energia para a mineração de Bitcoin permite que os produtores de energia renovável gerem receitas a partir de energia que, de outra forma, seria desperdiçada. Este impulso económico aumenta a rentabilidade dos projectos de energia renovável, tornando-os mais atractivos para os investidores. Os benefícios adicionais incluem:
- **Estabilização da Rede**: As operações de mineração ajudam a equilibrar a oferta e a procura na rede, contribuindo para a resiliência e estabilidade da mesma.
- **Redução do Desperdício**: Ao consumir electricidade excedente, a mineração de Bitcoin reduz significativamente a quantidade de energia renovável desperdiçada.
- **Aumento do Financiamento para Renováveis**: Os lucros provenientes da mineração de Bitcoin podem ser reinvestidos em novos projectos de energia renovável, soluções de armazenamento e infraestrutura de rede, criando um ciclo positivo de reforço para a energia verde.
#### **Aplicações no Mundo Real**
Vários exemplos ilustram como a mineração de Bitcoin monetiza eficazmente o excedente de energia:
- No Texas, os mineradores de Bitcoin aproveitam o excesso de energia eólica, apoiando a rede através de programas de resposta à procura que aumentam a fiabilidade da rede durante períodos de alta e baixa procura.
- No [Quebec](https://d-central.tech/the-untapped-potential-advocating-for-bitcoin-mining-as-a-key-to-quebecs-energy-future/), o excesso de energia hidroeléctrica é canalizado para operações de mineração de Bitcoin, o que ajuda a estabilizar a rede e a reduzir o desperdício de energia renovável.
- Um [estudo](https://news.cornell.edu/stories/2023/11/bitcoin-could-support-renewable-energy-development) da Universidade de Cornell descobriu que projectos de energia renovável nos EUA poderiam gerar milhões de dólares ao minerar Bitcoin durante estágios pré-comerciais, demonstrando a viabilidade económica desta abordagem.
#### **Potencial Impacto na Transição para Energias Renováveis**
Ao monetizar o excedente de energia através da mineração de Bitcoin, esta abordagem acelera a transição para energias renováveis. Os benefícios incluem:
- **Viabilidade Económica para Renováveis**: A monetização da energia desperdiçada torna os projectos renováveis mais rentáveis e, portanto, mais atractivos para investidores.
- **Flexibilidade da Rede**: A mineração de Bitcoin fornece uma fonte de procura escalável e adaptável, ajudando os operadores de rede a gerir as flutuações de oferta.
- **Pegada de Carbono Reduzida**: Ao utilizar fontes renováveis, o impacto ambiental da mineração de Bitcoin diminui, alinhando-se com os objectivos de sustentabilidade.
- **Adopção Acelerada de Energias Renováveis**: A maior rentabilidade e a redução do desperdício incentivam um maior investimento, impulsionando a adopção de tecnologias de energia renovável.
Essencialmente, a mineração de Bitcoin oferece uma solução única para os desafios da produção intermitente de energia renovável, criando uma procura flexível e independente da localização para a electricidade excedente que, de outra forma, seria desperdiçada. À medida que mais projectos renováveis adoptam este modelo, a mineração de Bitcoin pode desempenhar um papel crucial na promoção de um panorama energético sustentável e descentralizado.
### **Fornecimento de Energia a Regiões Isoladas e Subdesenvolvidas**
Um dos impactos mais promissores da mineração de Bitcoin é a capacidade de levar electricidade a regiões remotas e subdesenvolvidas. Pequenas centrais hidroeléctricas e instalações solares são opções cada vez mais viáveis para comunidades isoladas que não têm acesso a redes tradicionais. Mineradores de Bitcoin, em busca de energia barata e excedente, podem apoiar e financiar estas instalações, reduzindo a lacuna energética e permitindo o acesso a energia limpa para estas comunidades.
Por exemplo, [aldeias](https://hackernoon.com/no-power-grid-this-african-village-mines-bitcoin-for-electricity) em África que anteriormente não tinham electricidade podem agora operar escolas, clínicas e empresas, graças a pequenos projectos de energia renovável apoiados pela mineração de Bitcoin. Este acesso catalisa o crescimento económico, criando um ciclo virtuoso onde a energia leva a investimentos, educação e melhor saúde — elevando comunidades inteiras para fora da pobreza.
### **Redução de Emissões através da Mitigação de Metano**
A mineração de Bitcoin também contribui para a redução das emissões de metano — um gás de efeito estufa com um potencial de aquecimento global 28 a 34 vezes superior ao do CO₂ num período de 100 anos. As emissões de aterros sanitários, resíduos agrícolas e poços de petróleo abandonados representam uma ameaça climática significativa, mas a mineração de Bitcoin oferece uma solução única ao converter este poluente em energia.
Quando o metano é queimado para gerar electricidade, é convertido em CO₂ e vapor de água, que, embora também sejam gases de efeito estufa, são muito menos potentes do que o metano. Na verdade, o metano é responsável por cerca de 25% do aquecimento global que experimentamos actualmente, apesar da sua concentração relativamente baixa na atmosfera. Ao capturar e utilizar o metano, as operações de mineração de Bitcoin transformam um dano ambiental numa fonte de energia produtiva, reduzindo as emissões globais de gases de efeito estufa e criando novas fontes de rendimento.
Por exemplo, nos EUA, o metano de poços de petróleo abandonados está a ser capturado para alimentar a mineração de Bitcoin, criando um sistema fechado que evita que o metano seja queimado ou liberado directamente na atmosfera. Esta abordagem não só mitiga as emissões, como também apoia o crescimento económico em regiões com recursos de metano não aproveitados.
### **Resiliência e Flexibilidade da Rede**
A integração de fontes renováveis, como a eólica e a solar, introduziu desafios para a estabilidade das redes eléctricas. Com as renováveis, os operadores de rede enfrentam flutuações de frequência mais frequentes e uma resposta inercial reduzida — as renováveis não fornecem a mesma resposta inercial que as centrais térmicas tradicionais, tornando a rede mais susceptível a mudanças rápidas.
A flexibilidade da mineração de Bitcoin pode desempenhar um papel fundamental na estabilização das redes eléctricas. Durante a tempestade de inverno Uri, no Texas, os mineradores de Bitcoin reduziram o seu consumo de energia para libertar capacidade para serviços essenciais, mostrando o papel da mineração de Bitcoin como uma carga flexível e reactiva de energia.
Ao ajustar o consumo de energia com base na disponibilidade de oferta, os mineradores de Bitcoin podem ajudar a equilibrar as redes com elevada penetração de renováveis. Esta sinergia com energias renováveis e nucleares fornece uma solução robusta para a gestão da procura energética, especialmente à medida que a rede transita para fontes de baixo carbono.
### **Impacto Ambiental de Longo Prazo**
A mineração de Bitcoin tem o potencial de revolucionar a produção e o consumo de energia. Ao integrar energias renováveis, aproveitar o metano e oferecer gestão flexível da carga, o Bitcoin pode desempenhar um papel fundamental num futuro energético sustentável e descentralizado. Inovação política, responsabilidade industrial e colaboração intersectorial são essenciais para concretizar o potencial do Bitcoin na transição verde.
Diante dos desafios ambientais actuais, a mineração de Bitcoin oferece mais do que inovação financeira. Representa um poderoso aliado na construção de um futuro sustentável e equitativo — onde os objectivos digitais e ambientais alinham-se para criar uma economia global mais limpa e resiliente.
#Bitcoin #mining #greenEnergy #renewables
---
_Photo by [Anders J]("https://unsplash.com/@aj5photos?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash") on [Unsplash]("https://unsplash.com/photos/white-and-blue-solar-panels-hxUcl0nUsIY?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash")_
-
@ 20986fb8:cdac21b3
2024-10-30 12:30:09
**Hey Nostriches! **
Thrilled to launch the latest YakiHonne update—Simpler, Easier, Faster! After a lot of hard work, we bring you a highly optimized, user-friendly decentralized media experience on both web and mobile. This version focuses on two main aspects:
**1. Complete Redesign:**
Our UI/UX now puts simplicity first, minimizing technicalities for creators and social users alike. Here’s what’s new:
• Onboarding: Easily create a non-custodial wallet with Npub & Nsec, experience zapping (Lightning payments), or browse as a guest.
• Home & Discover: “Discover” is designed for creators, focusing on rich formats like long-form content, videos, and curated works. “Home” offers a social feed with short notes and curated contents, making it quick and easy for creators to share their work.
• Wallet: Simple setup with easy creation, direct YakiHonne node linking, and multi-wallet support.
• Dashboard: Manage all published and drafted content, check stats, and pick up right where you left off—all in one place.
• Notifications: Reactions, Reposts, Mentions, Zaps, Comments, and Follows now appear in clear, categorized cards.
• Settings: Completely revamped for simplicity, now including profile customization, appearance, relay settings, and wallet management.
**2. Enhanced Performance:**
Our re-engineered core now supports the outbox model with extensive functionality. Furthermore, Thanks to @PabloF7z we now have seamless data fetching, caching, and full support of the NDK implementation.
Hope you enjoy the new decentralized media experience! 🌐✨Try it out here:
**•Web**: yakihonne.com
**•App Store (iOS)**: https://apps.apple.com/us/app/yakihonne/id6472556189
**•Google Play (Android)**: https://play.google.com/store/apps/details?id=com.yakihonne.yakihonne&hl=en
Thank you for your incredible support on this decentralized media journey!
https://v.nostr.build/Uu1uXf8P5D9KkBw6.mp4
-
@ 4c48cf05:07f52b80
2024-10-30 01:03:42
> I believe that five years from now, access to artificial intelligence will be akin to what access to the Internet represents today. It will be the greatest differentiator between the haves and have nots. Unequal access to artificial intelligence will exacerbate societal inequalities and limit opportunities for those without access to it.
Back in April, the AI Index Steering Committee at the Institute for Human-Centered AI from Stanford University released [The AI Index 2024 Annual Report](https://aiindex.stanford.edu/report/).
Out of the extensive report (502 pages), I chose to focus on the chapter dedicated to Public Opinion. People involved with AI live in a bubble. We all know and understand AI and therefore assume that everyone else does. But, is that really the case once you step out of your regular circles in Seattle or Silicon Valley and hit Main Street?
# Two thirds of global respondents have a good understanding of what AI is
The exact number is 67%. My gut feeling is that this number is way too high to be realistic. At the same time, 63% of respondents are aware of ChatGPT so maybe people are confounding AI with ChatGPT?
If so, there is so much more that they won't see coming.
This number is important because you need to see every other questions and response of the survey through the lens of a respondent who believes to have a good understanding of what AI is.
# A majority are nervous about AI products and services
52% of global respondents are nervous about products and services that use AI. Leading the pack are Australians at 69% and the least worried are Japanise at 23%. U.S.A. is up there at the top at 63%.
Japan is truly an outlier, with most countries moving between 40% and 60%.
# Personal data is the clear victim
Exaclty half of the respondents believe that AI companies will protect their personal data. And the other half believes they won't.
# Expected benefits
Again a majority of people (57%) think that it will change how they do their jobs. As for impact on your life, top hitters are getting things done faster (54%) and more entertainment options (51%).
The last one is a head scratcher for me. Are people looking forward to AI generated movies?
![image](https://i.nostr.build/GUh5M4GXumaJVGZA.jpg)
# Concerns
Remember the 57% that thought that AI will change how they do their jobs? Well, it looks like 37% of them expect to lose it. Whether or not this is what will happen, that is a very high number of people who have a direct incentive to oppose AI.
Other key concerns include:
- Misuse for nefarious purposes: 49%
- Violation of citizens' privacy: 45%
# Conclusion
This is the first time I come across this report and I wil make sure to follow future annual reports to see how these trends evolve.
**Overall, people are worried about AI. There are many things that could go wrong and people perceive that both jobs and privacy are on the line.**
---
Full citation: *Nestor Maslej, Loredana Fattorini, Raymond Perrault, Vanessa Parli, Anka Reuel, Erik Brynjolfsson, John Etchemendy, Katrina Ligett, Terah Lyons, James Manyika, Juan Carlos Niebles, Yoav Shoham, Russell Wald, and Jack Clark, “The AI Index 2024 Annual Report,” AI Index Steering Committee, Institute for Human-Centered AI, Stanford University, Stanford, CA, April 2024.*
The AI Index 2024 Annual Report by Stanford University is licensed under [Attribution-NoDerivatives 4.0 International](https://creativecommons.org/licenses/by-nd/4.0/?ref=chooser-v1).
-
@ f462d21e:1390b6b1
2024-10-29 20:24:39
eyJfaWQiOiJiMDYzYjQxMi04MGNmLTQxOTUtOTFhOS03MTM0MzExNDI4ZGIiLCJwdWJsaWNLZXkiOiJmNDYyZDIxZTEwMTYzZWIwYTQwM2FlYzZiOTNhYzU3ZWMyZjFiOTQ1NTQ3M2U5OTMwNGY1NzFhNTEzOTBiNmIxIiwiYWRUeXBlIjoiT05MSU5FX1NFTEwiLCJjb3VudHJ5IjoiVW5pdGVkIFN0YXRlcyBvZiBBbWVyaWNhIiwiY291bnRyeUNvZGUiOiJVUyIsImxhdCI6bnVsbCwibG9uIjpudWxsLCJjdXJyZW5jeUNvZGUiOiJVU0QiLCJwYXltZW50TWV0aG9kQ29kZSI6IkNBU0hfQllfTUFJTCIsInByaWNlSW5wdXRUeXBlIjoiTUFSS0VUIiwibWFyZ2luIjo0LCJtYXJrZXRQcmljZSI6MTY0LjE4LCJmaXhlZFByaWNlIjowLCJtaW5BbW91bnQiOjAsIm1heEFtb3VudCI6MCwibGltaXRUb0ZpYXRBbW91bnRzIjoiIiwicGF5bWVudE1ldGhvZERldGFpbCI6ImZhc3QgcmVwbHkiLCJtc2ciOiIiLCJhY2NvdW50SW5mbyI6IiIsImZvclRydXN0ZWQiOiJubyIsInZlcmlmaWVkRW1haWxSZXF1aXJlZCI6Im5vIiwicmVxdWlyZUZlZWRiYWNrU2NvcmUiOjAsImZpcnN0VGltZUxpbWl0QXNzZXQiOjAsInBheW1lbnRXaW5kb3dNaW51dGVzIjo2MCwiaGlkZGVuIjpmYWxzZSwiYmFubmVkIjpmYWxzZSwidmVyaWZpZWQiOnRydWUsImFkZGVkIjoiMjAyNC0xMC0yOVQyMDoyNDozOS44NzRaIn0=
-
@ 3f770d65:7a745b24
2024-10-29 17:38:20
**Amber**
[Amber](https://github.com/greenart7c3/Amber) is a Nostr event signer for Android that allows users to securely segregate their private key (nsec) within a single, dedicated application. Designed to function as a NIP-46 signing device, Amber ensures your smartphone can sign events without needing external servers or additional hardware, keeping your private key exposure to an absolute minimum. This approach aligns with the security rationale of NIP-46, which states that each additional system handling private keys increases potential vulnerability. With Amber, no longer do users need to enter their private key into various Nostr applications.
<img src="https://cdn.satellite.earth/b42b649a16b8f51b48f482e304135ad325ec89386b5614433334431985d4d60d.jpg">
Amber is supported by a growing list of apps, including [Amethyst](https://www.amethyst.social/), [0xChat](https://0xchat.com/#/), [Voyage](https://github.com/dluvian/voyage), [Fountain](https://fountain.fm/), and [Pokey](https://github.com/KoalaSat/pokey), as well as any web application that supports NIP-46 NSEC bunkers, such as [Nostr Nests](https://nostrnests.com), [Coracle](https://coracle.social), [Nostrudel](https://nostrudel.ninja), and more. With expanding support, Amber provides an easy solution for secure Nostr key management across numerous platforms.
<img src="https://cdn.satellite.earth/5b5d4fb9925fabb0005eafa291c47c33778840438438679dfad5662a00644c90.jpg">
Amber supports both native and web-based Nostr applications, aiming to eliminate the need for browser extensions or web servers. Key features include offline signing, multiple account support, and NIP-46 compatibility, and includes a simple UI for granular permissions management. Amber is designed to support signing events in the background, enhancing flexibility when you select the "remember my choice" option, eliminating the need to constantly be signing events for applications that you trust. You can download the app from it's [GitHub](https://github.com/greenart7c3/Amber) page, via [Obtainium ](https://github.com/ImranR98/Obtainium)or Zap.store.
To log in with Amber, simply tap the "Login with Amber" button or icon in a supported application, or you can paste the NSEC bunker connection string directly into the login box. For example, use a connection string like this: bunker://npub1tj2dmc4udvgafxxxxxxxrtgne8j8l6rgrnaykzc8sys9mzfcz@relay.nsecbunker.com.
<img src="https://cdn.satellite.earth/ca2156bfa084ee16dceea0739e671dd65c5f8d92d0688e6e59cc97faac199c3b.jpg">
---
**Citrine**
[Citrine](https://github.com/greenart7c3/Citrine) is a Nostr relay built specifically for Android, allowing Nostr clients on Android devices to seamlessly send and receive events through a relay running directly on their smartphone. This mobile relay setup offers Nostr users enhanced flexibility, enabling them to manage, share, and back up all their Nostr data locally on their device. Citrine’s design supports independence and data security by keeping data accessible and under user control.
<img src="https://cdn.satellite.earth/46bbc10ca2efb3ca430fcb07ec3fe6629efd7e065ac9740d6079e62296e39273.jpg">
With features tailored to give users greater command over their data, Citrine allows easy export and import of the database, restoration of contact lists in case of client malfunctions, and detailed relay management options like port configuration, custom icons, user management, and on-demand relay start/stop. Users can even activate TOR access, letting others connect securely to their Nostr relay directly on their phone. Future updates will include automatic broadcasting when the device reconnects to the internet, along with content resolver support to expand its functionality.
Once you have your Citrine relay fully configured, simply add it to the Private and Local relay sections in Amethyst's relay configuration.
<img src="https://cdn.satellite.earth/6ea01b68009b291770d5b11314ccb3d7ba05fe25cb783e6e1ea977bb21d55c09.jpg">
---
**Pokey**
[Pokey](https://github.com/KoalaSat/pokey) for Android is a brand new, real-time notification tool for Nostr. Pokey allows users to receive live updates for their Nostr events and enabling other apps to access and interact with them. Designed for seamless integration within a user's Nostr relays, Pokey lets users stay informed of activity as it happens, with speed and the flexibility to manage which events trigger notifications on their mobile device.
<img src="https://cdn.satellite.earth/62ec76cc36254176e63f97f646a33e2c7abd32e14226351fa0dd8684177b50a2.jpg">
Pokey currently supports connections with Amber, offering granular notification settings so users can tailor alerts to their preferences. Planned features include broadcasting events to other apps, authenticating to relays, built-in Tor support, multi-account handling, and InBox relay management. These upcoming additions aim to make Pokey a fantastic tool for Nostr notifications across the ecosystem.
---
**Zap.store**
[Zap.store](https://github.com/zapstore/zapstore/) is a permissionless app store powered by Nostr and your trusted social graph. Built to offer a decentralized approach to app recommendations, zap.store enables you to check if friends like Alice follow, endorse, or verify an app’s SHA256 hash. This trust-based, social proof model brings app discovery closer to real-world recommendations from friends and family, bypassing centralized app curation. Unlike conventional app stores and other third party app store solutions like Obtainium, zap.store empowers users to see which apps their contacts actively interact with, providing a higher level of confidence and transparency.
<img src="https://cdn.satellite.earth/fd162229a404b317306916ae9f320a7280682431e933795f708d480e15affa23.jpg">
Currently available on Android, zap.store aims to expand to desktop, PWAs, and other platforms soon. You can get started by installing [Zap.store](https://github.com/zapstore/zapstore/) on your favorite Android device, and install all of the applications mentioned above.
---
Android's openness goes hand in hand with Nostr's openness. Enjoy exploring both expanding ecosystems.
-
@ f462d21e:1390b6b1
2024-10-29 17:01:09
eyJfaWQiOiJmOWQ2ZmEyOS1iNTI5LTQyMzktOTMyNS0xMzIzMjE0MzcxZWYiLCJwdWJsaWNLZXkiOiJmNDYyZDIxZTEwMTYzZWIwYTQwM2FlYzZiOTNhYzU3ZWMyZjFiOTQ1NTQ3M2U5OTMwNGY1NzFhNTEzOTBiNmIxIiwiYWRUeXBlIjoiT05MSU5FX1NFTEwiLCJjb3VudHJ5IjoiVW5pdGVkIFN0YXRlcyBvZiBBbWVyaWNhIiwiY291bnRyeUNvZGUiOiJVUyIsImxhdCI6bnVsbCwibG9uIjpudWxsLCJjdXJyZW5jeUNvZGUiOiJVU0QiLCJwYXltZW50TWV0aG9kQ29kZSI6Ik5BVElPTkFMX0JBTksiLCJwcmljZUlucHV0VHlwZSI6Ik1BUktFVCIsIm1hcmdpbiI6MCwibWFya2V0UHJpY2UiOjE2NS4yOSwiZml4ZWRQcmljZSI6MCwibWluQW1vdW50IjowLCJtYXhBbW91bnQiOjAsImxpbWl0VG9GaWF0QW1vdW50cyI6IiIsInBheW1lbnRNZXRob2REZXRhaWwiOiIiLCJtc2ciOiIiLCJhY2NvdW50SW5mbyI6IiIsImZvclRydXN0ZWQiOiJubyIsInZlcmlmaWVkRW1haWxSZXF1aXJlZCI6Im5vIiwicmVxdWlyZUZlZWRiYWNrU2NvcmUiOjAsImZpcnN0VGltZUxpbWl0QXNzZXQiOjAsInBheW1lbnRXaW5kb3dNaW51dGVzIjo2MCwiaGlkZGVuIjpmYWxzZSwiYmFubmVkIjpmYWxzZSwidmVyaWZpZWQiOnRydWUsImFkZGVkIjoiMjAyNC0xMC0yOVQxNzowMTowOS44NzRaIn0=
-
@ 4ba8e86d:89d32de4
2024-10-29 12:30:05
## Tutorial feito por Grom Mestre⚡
Poste original Abaixo.
Part 1: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/229987/tutorial-entendendo-e-usando-a-rede-i2p-introdu%C3%A7
Part 2: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/230035/tutorial-instalando-e-configurando-o-roteador-i2p?show=230035#q230035
Part 3: http://xh6liiypqffzwnu5734ucwps37tn2g6npthvugz3gdoqpikujju525yd.onion/230113/tutorial-conectando-se-ao-xmpp-pela-i2p?show=230113#q230113
Boa tarde, camaradas do meu coeur!
Depois de muito tempo, e com o retorno da minha serotonina aos níveis basais, estou dando início a essa nova série de tutoriais. Espero que tirem muito proveito das informações passadas aqui para amplicarem o seu conhecimento da deepweb.
Esta postagem trará antes algumas considerações iniciais que podem ser úteis para quem possui pouco ou nenhum contato prévio com outras tecnologias ou tenha um entendimento torto a respeito da deepweb. Aconselho a estes que deem um boa lida antes de partirem para os tópicos do tutorial, mas saibam que ele não é um pré requisito para ele.
Dito isso, vamos prosseguir.
TÓPICOS:
Introdução
Instalando e configurando o roteador e o navegador
Conectando-se a serviços na I2P
Configurações avançadas
## 1. Introdução
### 1.1 Definindo a DeepWeb.
Muitos devem imaginar erroneamente que a deepweb se restrinja apenas à rede onion, mais precisamente aos seus hidden services, já que o Tor possui como uma das suas funções primárias proteger e burlar restrições governamentais e proteger o seus usuários através de métodos sofisticados de roteamento de pacotes e criptografia. Entretanto, ela é mais ampla do que se imagina dependendo da forma como a classificamos.
Os ditos "profissionais" usam uma definição extremamente vaga e imprecisa do que seria a deepweb e a sua verdadeira abrangência. Para isso, criei uma definição um pouco melhor para ela: redes comunitárias, sobrepostas, anônimas e criptografadas.
Vamos aos pontos individualmente:
> São Comunitárias, pois os pontos de roteamento de pacotes na rede (relays ou routers) muitas vezes são mantidos de forma voluntária por usuários comuns. Não é necessário nenhuma infraestrutura sofisticada para ser um contribuinte na rede, basta ter um computador com acesso à internet e conhecimentos básicos para fazer a configuração.
> São sobrepostas porque não estão acima ou abaixo da rede tradicional (diferente do que muitos imaginam). Os pacotes na DW trafegam entre os dados da surface e não em meios distintos (algo que não faz o menor sentido). Sabe aquele papo de camadas da DW ou aquela abobrinha da Mariana's Web? Então, tudo um monte de bosta derivado de Youtubers sensacionalistas iletrados em informática. Elitismo da minha parte? Quem sabe...
> São anônimas porque não é simples determinar a origem e o destino dos pacotes entre nodes intermediários dado a natureza do roteamento. Em geral, aos menos para a rede onion, há pelo menos 3 relays entre você e o servidor, sendo que esse número duplica para hidden services (3 seus e 3 do serviço). A imagem abaixo ilustra bemocoteamento dos pacotes na onio.
https://image.nostr.build/aea96f41d356157512f26b479ea8db5bce8693dd642f2bce0258d8e4b0dac053.jpg
> Por fim, são criptografadas porque as conexões são fortemente protegidas por algoritmos sofisticados de criptografia. Além de não sabermos a origem dos dados, sequer podemos saber com facilidade o conteúdo dessas mensagens mesmo que os protocolos das camadas superiores (HTTP, HTTPS, FTP) sejam inseguros, dado que a criptografia da própria rede já as protege. Por isso é tão comum que sites da DW não usem HTTPS, pois as autoridades de certificados não os assinam para domínios da onion e certificados autoassinados vão disparar avisos no navegador.
A imagem abaixo ilustra bem como é o roteamento onion usado pelo Tor. Perceba que o contéudo da mensagem está enrolado em 3 camadas de criptografia (como a de uma cebola), de modo que para revelar o contéudo original seria preciso quebrar, no pior dos casos, 3 camadas. Como mencionado antes, o método usado para isso é a criptografia assimétrica, muito similar ao PGP, porém com a sua própria implementação.
https://image.nostr.build/7bfaaf29211c11b82049ef8425abb67738d085c41558e9339ec13cf49ea5b548.jpg
Observação: Por mais que dentro da rede o encapsulamento proteja as mensagens internamente, entenda muito bem que isso não se aplica a sites da surface acessados pela onion. Ao desempacotar a última camada, a mensagem original é completamente exposta no exit node. Se ela não estiver protegida por uma camada adicional como TLS, seus pacotes estarão completamente expostos, algo que representa um sério risco de segurança.
As redes que caem em ao menos três dessas definições (anonimato, sobreposição e criptografia) podem ser classificadas como deepwebs. Podemos citar:
• Lokinet
• Zeronet
• Freenet
• I2P
• Tor
• Gnunet
Porém, há alguns casos interessantes que não caem diretamente nessa regra .
A Yggdrasil ( https://yggdrasil-network.github.io/ ), uma rede de topologia mesh com foco em escalabilidade e eficiência de roteamento, possui três dessas características: comunitária, sobreposta e segura. Entretanto, os nodes não são anônimos e muitas vezes podem estar desprotegidos, já que se conectar à Yggdrasil é que equivalente a ligar o seu computador diretamente na rede sem a presença de um NAT/CGNAT, correndo o risco de expor portas de serviços da sua máquina caso elas não estejam protegidas por um firewall. A Yggdrasil na prática é exposta como um dispositivo de camada 3 (tipo um VPN), mas diferente de um, apenas endereços IPv6 dentro de uma faixa bem específica de IP são roteados por ela, o que permite que ela coexista com outros dispositivos sem haver conflitos de roteamento.
Há quem argumente que a Yggdrasil é uma deepweb dado a sua sobreposição em relação à surface; outros podem argumentar que dado a falta de anonimato ela não se enquadraria nessa categoria. Independentemente disso é uma tecnologia muito interessante com ampla gama de aplicações, como encapsular tráfego de outras redes, como a I2P, e melhorar a eficiência de roteamento.
Por fim, vamos desmitificar alguns mitos da DeepWeb muito difundidos.
Não existem camadas da DW. Os pacotes da DW são sobrepostos e navegam juntos aos pacotes da surface.
DeepWeb e DarkWeb não são coisas diferentes. São termos genéricos para a mesma coisa.
DarkWeb não é o seu provedor de e-mail ou serviço de banco. Se eles não se enquadram nas categorias de um deepweb, então estão na surface.
Você não é irrastreável na DW. Adversários motivados podem foder com você com facilidade (leia a respeito de ataques de Timing, correlação e fingerprinting).
Mesmo que não seja possível ver o conteúdo de uma mensagem pela deepweb, é possível ao menos saber que você a acessou. ISPs podem ver esse tipo de tráfego como suspeito.
Você não é um hacker só porque instalou o TorBrowser, mas pode ser considerado um se expor o IP de um hidden service.
## Instalando e configurando o roteador I2P
Segue agora a seção 2 do tutorial do I2P. Mas antes apenas queria falar um pouco do projeto I2P. Apesar do foco do tutorial não ser para tratar da sua história, gostaria ao menos de fazer uma breve introdução sobre ela.
O projeto I2P (Invisible Internet Protocol) é uma rede P2P descentalizada, anônima e segura para estabelecer a comunicação entre os usuários e serviços. Na I2P é possível usar serviços como mensageiros IRC, XMPP, web services, e-mail e até mesmo torrents. A I2P nasceu de um fork da Freenet no ano de 2003, porém possui diferenças drásticas em relação a ela.
Há similaridades entre a I2P e o Tor, porém vale destacar algumas de suas vantagens. Sendo elas:
• Garlic routing ( https://geti2p.net/en/docs/how/garlic-routing )
• Modelo P2P
• Todos os participantes da rede contribuem para ela
• Fechado na rede - não é possível acessar a surface através da I2P
• Otimizado para hidden services
Apesar disso, vale lembrar que o projeto é pequeno, desenvolvido por menos voluntários se comparado ao Tor e possui menos movimentação e financiamento para o seu desenvolvimento. Além disso, o Tor é um projeto muito mais maduro e bem documentado, algo que atrai mais usuários e desenvolvedores e torna a tarefa de encontrar e corrigir bugs mais fácil de ser realizada.
Esses são pontos importantes que devemos levar em conta ao escolher a tecnologia para as nossas necessidades. Nem sempre há tecnologias ruins, as vezes apenas as empregamos as ferramentas erradas na resolução de certos problemas.
Referências:
• https://geti2p.net/en/comparison/tor
• https://geti2p.net/en/docs/how/garlic-routing
• https://geti2p.net/en/about/intro
• https://i2pd.readthedocs.io/en/latest/
### 2. Instalando e configurando o roteador
Antes da criação do I2PBrowserBundle ( https://github.com/PurpleI2P/i2pdbrowser/releases/tag/1.3.3 ) , a única forma de se conectar à I2P era pela configuração manual de proxy no navegador. Muita gente ou não sabe ou tem MUUUUUITA preguiça de fazer isso e ficam resistentes de entrar na I2P dada essa restrição.
Como eu quero ser um bom tutor eu farei do jeito mais "difícil", pois tanto eu desejo que vocês aprendam as nuances do processo como eu sei que vocês são inteligentes o suficiente para fazer isso.
### 2.1 Instalação do router
Atualmente nós temos duas implementações do I2P: Uma em Java e outra em C++ (i2pd). Usaremos nesse tutorial a versão em C++ dado o seu baixo uso de recursos e facilidade de instalação.
O I2Pd está disponível para Windows, Linux, MacOS e Android e possui binários pré-compilados nas releases ( https://github.com/PurpleI2P/i2pd/releases/tag/2.50.2 ) do projeto no Github. Usuários de Linux podem instalá-lo através do respectivo gerenciador de pacotes da sua distribuição, porém algumas distros não oferecem o pacote diretamente nos reposítórios oficiais, necessitando do uso de PPAs (Ubuntu), COPR (Fedora/RHEL) e afins. Vocês podem conferir as instruções oficiais para cada sistema nessa página ( https://i2pd.readthedocs.io/en/latest/user-guide/install/ ).
Apesar desse tutorial ser voltado a usuários de desktop, o I2Pd também está disponível na loja do F-droid. Infelizmente poucos navegadores em Android permitem a configuração de proxies, porém na seção de Serviços na I2P eu tratarei brevemente de como se conectar a servidores de XMPP usando o ConversationI2P.
Para usuários de Windows, segue abaixo os binários para instalação.
• Versão 32bits ( https://github.com/PurpleI2P/i2pd/releases/download/2.50.2/i2pd_2.50.2_win32_mingw.zip )
• Versão 64bits ( https://github.com/PurpleI2P/i2pd/releases/download/2.50.2/i2pd_2.50.2_win64_mingw.zip )
• Versão para Windows XP (pois é, kk) ( https://github.com/PurpleI2P/i2pd/releases/download/2.50.2/i2pd_2.50.2_winxp_mingw.zip )
A instalação é simples e direta. Após ela apenas abram o I2Pd para que o router inicie a operação de busca e conexão com os peers. Para usuários de Linux, vocês precisam ativar o serviços através do comando 'sudo systemctl start i2pd'. Se vocês desejam que o I2Pd inicie junto com o sistema usem o comando 'sudo systemctl enable --now i2pd'.
Se tudo estiver funcionando corretamente, vocês serão capazes de abrir o webconsole do I2Pd no navegador através do endereço: 127.0.0.1:7070.
https://image.nostr.build/ab205ae1071a2b705279e5ce2d6e912d8d11cc7d6dd0dc8a26b76724a27bd94b.jpg
https://image.nostr.build/fa17e14600737ccfc92a415cec2fbfba226b950b2b97af7475927ae65abdbe11.jpg
### 2.2 Instalação e configuração do navegador
Apesar de qualquer navegador ser capaz de usar a I2P não é recomendado que usem qualquer um, especialmente o navegador que você usam no seu dia-a-dia. Recomendo que usem um navegador próprio para usar na I2P ou isolem suas atividades em um perfil separado.
Em navegadores baseado no Firefox isso é relativamente simples, bastando adicionar a opção '--profile' e o caminho do perfil que vocês desejam usar. Nesse tutorial eu vou mostrar como criar um perfil novo no Librewolf e configurar no lançador para iniciar o perfil e abrir em uma janela anônima. Essas instruções são análogas para todos os sistemas, excetuando aquelas configurações mais exóticas.
### 2.2.1 Escolhendo o navegador
Como citado, usarei o Librewolf como exemplo. Vocês podem baixar o instalador direto do site ou usar o gerenciador de pacotes do seu sistema no caso de Linux. Como é uma tarefa trivial eu não vou detalhar esse processo, pois todas as instruções estão em detalhes no site do navegador ( https://librewolf.net/installation/ )
### 2.2.2 Criando um perfil e configurando o lançador
Abram o navegador e digitem 'about:profiles' na barra de endereço. Criem um novo perfil clicando em 'Create New Profile'
https://image.nostr.build/fa17e14600737ccfc92a415cec2fbfba226b950b2b97af7475927ae65abdbe11.jpg
Coloquem um nome no seu perfil e cliquem em Finalizar
https://image.nostr.build/62059e375000940f11b27ae77b9ec011f9baadbb5a84afc910d41841ce73e82d.jpg
Perfis novos recém criados são iniciados por padrão. Se você deseja usar outro perfil por padrão deve mudar isso na seção 'about:profiles' do navegador.
Agora vamos configurar o lançador do LibreWolf para iniciar o perfil do i2p e em uma janela anônima. Usarei o XFCE como referência para essa tarefa, mas saibam que o processo é análogo em sistemas como Windows ou DEs como KDE. Se quiserem também podem lançar via terminal através do comando 'librewolf --profile caminho_do_perfil --private-window'.
Cliquem com o botão direito no ícone do Librewolf e abram as propriedades do atalho.
Na guia lançador, no campo Comando, adicionem no final a opção '--private-window' e a opção '--profile caminho_do_perfil'. O caminho do perfil é aquele mostrado na seção 'about:profiles' do Librewolf.
https://image.nostr.build/a7d6515d7825cb3bdcb681ecf71a97318dccba81eea7cc87fc5377ecc06065ee.jpg
2.2.3 Configurando o proxy
Com o lançador configurado, abra o navegador nesse perfil. Vamos configurar o proxy para se conectar ao I2P agora.
Abra as configurações digitando 'about:preferences' na barra de endereço. Na seção 'Geral' abra as configurações de rede (Network Settings)
https://image.nostr.build/f37157bebf15ada616914f403e756cf9fcee4c9aaaa353196c9cc754ca4d7bc5.jpg
Configure o seu proxy como na figura abaixo.
https://image.nostr.build/41ebd05255a8129d21011518d400689308d9c0320408967003bf296771e0b96f.jpg
Fecha as configurações. Se o seu proxy foi configurado corretamente tente abrir algum desses eepsites.
• http://identiguy.i2p
• http://notbob.i2p
• http://reg.i2p
Se tudo ocorreu como conforme, a página será carregada.
https://image.nostr.build/ce29ae44743f06cfed591f082208c9612c59b3429ab46d90db48131b3bc3e99d.jpg
OBSERVAÇÃO: A busca pelos peers é um pouco demorada, levando de 2 a 5 minutos para que um número mínimo necessário de peers sejam encontrados para estabelecer uma conexão estável. Você pode ver a lista de inbound e outbound tunnels na seção Tunnels do WebConsole (localhost:7070)
https://image.nostr.build/285a0d765eaf5f33409f975cd720d0efa68ecc40a9da20bfd9cde0cd1f59a7b6.jpg
IMPORTANTE: Apesar do Librewolf possuir defaults seguros, eu recomendo que vocês instalem as seguintes extensões para aumentar ainda mais a sua proteção.
• noScript
• JShelter
Lembrem-se que vocês precisam desativar o proxy para acessar a clearnet. Depois disso reativem-no nas configurações.
Outro detalhe: Se vocês tentarem digitar um endereço .i2p na barra de endereços do navegador sem especificar o protocolo (http), ao invés do Librewolf ir ao endereço ele vai realizar uma pesquisa. Para corrigir esse problema, vocês precisam adicionar a seguinte configuração do tipo boolean em 'about:config' como mostrado na imagem.
https://image.nostr.build/4518ab817b131f7efe542b2d919b926099dce29a7b59bdd3c788caf53dbd071e.jpg
Reiniciem o navegador e testem. Se tudo deu certo vocês não precisam especificar o protocolo ao digitar um endereço .i2p, bastando apenas digitar o endereço simplificado.
Por fim, terminamos essa parte do tutorial. Na próximo parte trataremos de como podemos nos conectar a serviços hospedados na I2P como XMPP
## [TUTORIAL] Conectando-se ao XMPP pela I2P
Essa é a terceira parte da série de tutoriais. Agora vamos tratar de algumas operações na rede, sendo uma delas conectando-se a um servidor de XMPP na I2P.
Não se esqueça de ligar o router e manter ele ligado por alguns minutos antes de iniciar essas operações. O router demora um pouco para encontrar os peers e estabelecer uma conexão estável.
### 3.1 Escolhendo o cliente XMPP
Existem diversos clientes XMPP capazes de se conectar usando um proxy. Um dos melhores é o Gajim, um cliente escrito em Python com diversas funcionalidades como criptografia OMEMO e PGP, workspaces separados, extensibilidade via plugins e uma interface bonita e organizada.
Assim como ocorreu com o router, o Gajim está disponível por padrão na maioria das distros Linux. Use o seu gerenciador de pacotes para instala-lo. Em Windows você pode baixar o Gajim através desse link ( https://gajim.org/download/ )
### 3.2 Criando uma conta
Vamos primeiro criar uma conta no servidor. No nosso exemplo usarei o servidor oficial do projeto i2pd, o xmpp.ilita.i2p. Há diversos outros servidores XMPP no diretório de links notbob.i2p caso queiram explorar mais.
Para criar uma conta, siga os passos abaixo:
Abra o Gajim. Na barra de tarefas vá em Contas -> Adicionar Conta. Na nova janela que aparecer, clique em Adicionar Conta
https://image.nostr.build/01413e7c6d00c238420e3b0c769dd8d7f7d6522754d2135d3e98a22944f79a27.jpg
https://image.nostr.build/9f015861f33990871d96f03d5ec78036a65e3ad9f8ff6a38da18c5b27d31f6d5.jpg
Na janela de adicionar contas, clique diretamente em Inscrever-se. Não precisa colocar as suas credencias como mostra a imagem (falha minha, ksksk)
https://nostrcheck.me/media/c8411a22946e97467e0ee197ef7a0205ba05f2c67bde092041481ccc2cbbc66d/81938c8d278ce0562c2240341e203f3b70f51ee2db06ceb453f8a178df37fa84.webp
Digite o nome do servidor no campo abaixo. Não esqueça de marcar a opção 'Configurações Avançadas' antes de clicar em Inscrever-se
https://image.nostr.build/5ee4305a6a23e5c064446b0ce7a4cbc7e790c1ba237bd2495d0237b86a4df07f.jpg
Vamos adicionar um novo proxy para essa conta. Para isso clique no botão 'Gerenciar proxies', ao lado do campo Proxy nas Configurações Avançadas
https://image.nostr.build/daceb5436def55401d3974ce48d85771e5ebcec4e3f90eb1001df4609112ec12.jpg
Adicione um novo proxy clicando no sinal de '+' abaixo da lista de proxies. Preencha os campos de acordo com a imagem abaixo e em seguida feche a janela.
https://image.nostr.build/140b34c4e46e9295c073311d483d206201d9339a75f613fe4e829c14f3257bfe.jpg
https://image.nostr.build/d365a63d81a14d763bffceb50b30eb53d81959623f8fe812175358a41b1fba53.jpg
No campo de Proxy, selecione o proxy I2P. Preencha o restante dos campos de acordo com a imagem abaixo. Em seguida clique em 'Inscrever-se'.
https://image.nostr.build/d06c11d9c6d19728bf5a58af2dd3e14d8ca0021456da09792a345ac0bfc90ad0.jpg
Nesse momento uma mensagem pode aparecer pedindo para abrir uma exceção para o certificado TLS. Isso acontece porque trata-se de um certificado autoassinado que não foi validado por uma autoridade oficial. Apenas abra a exceção e prossiga (não há imagem para isso porque eu já abri essa exceção no meu cliente).
Uma nova janela vai aparecer solicitando-lhe para inserir as suas credenciais. Tome cuidado aqui, pois não é para inserir o nome completo com o domínio, apenas o seu nome de usuário (ex: descartavel).
https://image.nostr.build/dde2a6736bd00080fbeeb8076754e226971a412710b370d5559f7f4d5414f8b3.jpg
Se tudo der certo, uma nova janela vai aparecer confirmando a sua inscrição. Coloque um nome e uma cor para a sua conta e clique em Conectar para concluir o processo.
https://image.nostr.build/74934d3f1f3f4232eacee8e78e707936227f816c50ac6b52da5c81ec17557e69.jpg
Para finalizar, nos detalhes da sua conta, modifique as suas configurações de privacidade para diminuir o fingerprint. Na seção de 'Privacidade', desligue as seguintes opções:
• Tempo ocioso
• Hora de Sistema Local
• Sistema Operacional
• Reprodução de Mídia
https://image.nostr.build/d2ed5852a104c770b50c7b053d518d8af0b6289ced6b3ad4187492208c7ca649.jpg
### 3.3 Procurando por salas de bate-papo públicas
Após criar a sua nova conta, vamos descobrir alguns serviços que o servidor oferece. Para isso, vá para Contas -> Descobrir serviços
https://image.nostr.build/54928d1dd0e48365858b24c72097a9fabf677794e13f329fc0568211eefbe559.jpg
Na seção 'Bate-papo em Grupo', selecione Chatrooms e clique em 'Navegar'. Ao fazer isso uma lista de chatroom públicos presentes no servidor vai aparecer. Fique a vontade para explorar, porém saiba que alguns servidores são moderados e não te permitem mandar mensagens sem sua conta ser aprovada pelo moderador (familiar?).
https://image.nostr.build/1936bef51d58a1f6cfdf8bf8d84bfa64adc2a09b9c0fb1623b93a327f0b8cdd8.jpg
https://image.nostr.build/89e8013b1cea1df0f80f6833bd6771c33101f404b0099b2d7330a5e57607baff.jpg
### 3.4 Adicionando contatos
Para adicionar contatos à sua lista, clique no símbolo de '+' ao lado do campo de pesquisa e selecione 'Add Contact'.
https://image.nostr.build/d3cadea27591355f674fba93765c3815282d112b2e80a592bb77a442c13dd4f4.jpg
Coloque o endereço completo da conta que você deseja adicionar. Usarei a minha conta oficial nesse exemplo. Você tem a opção de anexar uma mensagem qualquer antes de enviar o convite. Clique em 'Adicionar Contato' para prosseguir.
https://image.nostr.build/ff95b7aec2377c58d4253c5b7b3aabf141a92dd5f3e97f6e1f01ecb32a215d38.jpg
https://image.nostr.build/6562e680e28c321ebbd009b5ade513f8a279aea33bc16aa9fb251f3507eb04af.jpg
Se tudo ocorrer normalmente, o novo contato vai aparecer na sua lista. Dê dois-cliques na conta para abrir o chat. Não se esqueça de ativar a criptografia OMEMO antes de enviar qualquer mensagem. Agora você está pronto para conversar de forma segura :)
https://image.nostr.build/ef7f783a311ad0f68a5408137f75dc2bc6c38f6e9656dc0d68d3267f5012f658.jpg
E com isso terminamos a terceira parte da série de tutoriais.
## [TUTORIAL] Criando e conectando-se a um servidor XMPP na I2P e clearnet.
Como configurar o seu próprio servidor XMPP. https://youtube.com/watch?v=Ot_EmQ8xdJwy
Criando contas e conectando clientes Pidgin http://i2pd.readthedocs.io/en/latest/tutorials/xmpp/#creating-accounts-and-connecting-clients
BONUS: Conectando-se facilmente à I2P.
https://youtube.com/watch?v=wGIh5tQcw68
-
@ fd208ee8:0fd927c1
2024-10-29 08:52:42
## Yesterday was also a day
I'm still quite bullish about using Nostr to publish, and generally for OtherStuff, but I was feeling a bit pessimistic about the microblogging (kind 01) feeds on Nostr, yesterday. And, rightly so. Mine has been grinding slowly to a halt, and not for lack of effort, on my part. I regularly hear reports, from other npubs, that they sense the same phenomenon.
Most of the people I have whitelisted on the wss://theforest.nostr1.com relay (currently 302, in number) are beginning to give up on Kind 01 clients, except for occasionally making an announcement, and are increasingly moving their chatting off-Nostr. (I'm still privy to those conversations, but most of you no longer are.)
So, my feed has been getting quieter and quieter. Even adding new people doesn't help much, as they don't tend to stick around, for long, so it's a Sisyphean task.
![Relay curation](https://www.schule-und-familie.de/assets/images/wissen/ST09-Z66_sisyphus.jpg)
Some others are still bothering to show up, regularly, but they increasingly see it as a chore, or something they do to "keep up appearances". Add me to this group of wearied, diligent noters, holding down the microblogging feeds, with our exhausting attempt at #KeepingNostrWeird, while the influencers surround the gates and the Kind 01 feeds dissolve into nothing but warmed-over Bitcoin memes, GM notes, notifications from the OtherStuff, and Things Copied from X.
![Live view of us defending the microblogging feed.](https://i.etsystatic.com/12000271/r/il/85ed97/2160223296/il_1588xN.2160223296_lh8s.jpg)
The problem of barren, intellectually-emptying Kind 01 feeds is further exacerbated by the fact that new entrants to the Nostrverse find it increasingly easy to "find good follows", but they're all only finding the same follows: whoever is on the trending list.
## The See-Nothings
I keep complaining about this, but the responses I get are generally unhelpful. They are:
* mockery -- Oh, Miss Hoity-Toity wants more attention!
* insults -- Nobody is talking to you because you are boring and stupid, and nobody likes you.
* clueless -- You should try replying to other people, then they might reply to you.
* or they tell me to just stop looking at the list, if it upsets me.
![I see nothing.](https://i.pinimg.com/564x/99/a0/48/99a0486d006ef58eb76fbc243f94d9ec.jpg)
What people are missing, by telling me to just not look at the trending lists, is that the lists are a statistic of what real humans are looking at, on Nostr. The bizarrely-high concentration of npubs, on the list, so that their entries show up multiple times, suggests that what people are primarily looking at... is the trending list.
![Yes, the same npub 9 times.](https://i.nostr.build/OoiwW4KVnk76O172.png)
Either directly, because they use a client that has that built in, or indirectly, as they have been onboarded with the lists or told to "just follow the people I follow", which leads to a steadily-rising concentration of follows. This concentrating effect is accelerating.
The newly-popular WoT (web of trust) relays further exacerbate this effect, as they put a premium on the npubs that have the highest WoT score, which -- surprise, surprise! -- are the same people as on the trending list.
And this is why everyone on the trending list insists Nostr is a fun, happening place, full of human interaction. A place where replying reverently to Jack and posting GM religiously will make you a sought-after conversant. It is that place. For them.
In fact, they've reached that glorious state of #PeakSocialMedia, where they have become famous for being famous, and no longer have to even pretend to be trying to appeal to anyone with their content. They can post literal garbage, and their ~~fans~~ ~~groupies~~ ~~sycophants~~ commentariat will cheer them on, and flood their replies with ardent encouragement. Less because those other npubs actually cared about what they posted, than because they are hoping to pick up new followers in those threads, since they know that everyone is looking at those threads, because those threads are trending.
It's a pyramid scheme of following.
![Feeling blue](https://i.nostr.build/sttuMv5u9N4KpCAt.png)
For the rest of us... the vast majority of us... that blue line at the bottom is mostly how it feels.
## The trend is to trending.
What we no longer have, is people looking directly at relay feeds, to find new people, or even their own follow list feeds, to see npubs they've already subscribed to. Even when people follow me, they usually don't respond until I'm trending, which suggests that they're also seeing me on the trending list because that is what they're primarily looking at. This is why, as soon as you get on the trending list, your replies explode. And your replies will be concentrated in a hardcore few, otherwise.
Those few are the reason I keep coming back, but as they're also often chatting with me off-Nostr, I am facing the question of: _Why bother with Nostr microblogging?_
This is the question I am struggling with. If kind 01 isn't for plebs chatting, anymore, (and it increasingly isn't) then it's mostly a sort of bulletin board, where we post notifications of items we've added in OtherStuff clients, or make announcements of meetups, software releases, or conferences. This, however, is compounding the dullness of the feeds and turning it into a sort of "info flyer", except for a lucky few. But, perhaps, I am simply a #NostrBoomer, who is failing to move with the times and get with the program.
![In retrospect, it was inevitable.](https://gizmodo.com/app/uploads/2022/06/9ad13ee35e88ba8991d03936db27900b.jpg)
I'm slowly reaching the conclusion that Kind 01 in an open, centralized market of notes, will always coalesce around a small subset of #NostrElite and turn into a largely passive form of entertainment, or a frustratingly lonely place, for everyone else. There can only be so many people talking, at once, in a public square.
The only movement I currently see, that might end the slow slide of Kind 01 into irrelevance and tedium, is to create lots of smaller, public squares, through single-relay communities. This has been such a long time, in coming, and has been resisted by client devs so ferociously, that I worry that it's merely an attempt to close the barn door after the npubs have escaped.
I sincerely hope to be proven wrong, though. Perhaps the relay devs, who have valiantly taken up the fight, will #SaveKind01. We shall see.
-
@ a39d19ec:3d88f61e
2024-10-28 18:44:55
##### What do you even print with it besides decorative objects?
This kind of question still is a common one when talking about 3d printing.
With this series of long-form notes I will show you some of the practical and useful 3d printed things, that I use a lot.
Let me start the series with a nice little print consisting of two parts.
## Laptop riser
There are many designs of laptop risers available online. But I like that the parts are small and interlocking, so that the are always together when not in use. The riser fits all laptops in our house. Particularly when working in Fusion360 my laptop needs lots of fresh air.
I use the raiser regularly about 3 times a week. Sadly I don't know where I downloaded it from, so I cannot provide a link to it.
![](https://image.nostr.build/2fe8c7752608ccf3684027f6218df3cffd1972589712319295bd1ac334899cca.jpg)
-
@ 8d34bd24:414be32b
2024-10-27 22:30:18
NOTE: *This article has some details that are specific to America, but the overall principles are applicable to all, and I believe it will be useful for all Christians.*
When it comes to things like voting, Christians tend to err to one of two extremes and seem to find difficulty finding the right balance as defined by God. Some Christians refuse to vote or get involved with politics at all. They don’t want to dirty themselves with politics. They know that their true home is heaven, so they don’t seem to care much for the nations they live in. On the other hand, some Christians are so focused on politics fixing everything and creating heaven on earth that they can become idolatrous lifting up politicians as a kind of savior.
In this article, I’m going to address both extremes, using the Bible, and hopefully help you find a Biblical balance.
## Seek the Welfare of the City Where I Have Sent You
As Christians we are just passing through our time on earth. Our true, eternal home, our true citizenship, is in heaven. That doesn’t mean that we shouldn’t care what happens on earth. We shouldn’t be like the old saying, “some Christians are so heavenly minded that they aren’t any earthly good.” I think Christians should organize our time here on earth kind of like the Israelites were commanded to live during their 70 year exile in Babylon and Persia.
> Now these are the words of the letter which Jeremiah the prophet sent from Jerusalem to the rest of the elders of the exile, the priests, the prophets and all the people whom Nebuchadnezzar had taken into exile from Jerusalem to Babylon. (Jeremiah 29:1)
What did God say to the Israelites about how they should live their life in Babylon?
> “Thus says the Lord of hosts, the God of Israel, to all the exiles whom I have sent into exile from Jerusalem to Babylon, ‘Build houses and live in them; and plant gardens and eat their produce. Take wives and become the fathers of sons and daughters, and take wives for your sons and give your daughters to husbands, that they may bear sons and daughters; and multiply there and do not decrease. **Seek the welfare of the city where I have sent you into exile, and pray to the Lord on its behalf; for in its welfare you will have welfare**.’ (Jeremiah 29:4-7) {emphasis mine}
Could we likewise say the same to Christians during their time on earth? “Build houses and live in them; and plant gardens and eat their produce. Take wives and become the fathers of sons and daughters, and take wives for your sons and give your daughters to husbands, that they may bear sons and daughters; and multiply there and do not decrease. Seek the welfare of the city, state, or nation where I have sent you to live for a short while, and pray to the Lord on its behalf; for in its welfare you will have welfare.”
God expects us to live fruitful lives, to marry, to have many children (multiply), and to raise them up to do the same. He also wants us to seek the welfare of the city, state, and nation where God has put us. In a city, state, or nation with democratic elections, the best way to seek its welfare is to vote for honest candidates who support godly principles. We rightly understand that in our ungodly world there are no perfect candidates. It can even be hard to find mostly honest and mostly godly candidates, but we should seek to elect the best that is available. Why are we told to do this? We are told that “*for in its welfare you will have welfare*.” When we fail to vote, to teach our kids or support good schools, to live productive lives, and to generally live Godly lives, we WILL see the decline of our cities, states, and nations. We will pay the price.
We are seeing exactly that decline because Christians have pulled out (and were pushed out) of the positions that influence the culture. We don’t have enough godly teachers, journalists, professors, advisors, economists, and politicians. We have given up the culture to those who oppose God, His people, and His commands.
We are paying the price for withdrawing into the safety of our churches and leaving the world to the wolves.
## Political Religion
Of course we also have an opposite extreme. We have some Christians that are too focused on politics and power. They spend all of their time and energy on political endeavors and very little, to none, on sharing the Gospel and being a godly example. Many act like they think a political candidate is going to save them from the culture, the media, the bureaucracy, or the government. They forget that there is only one Savior — the Lord Jesus Christ. They forget that God said things will get worse before they get better. They make idols out of politicians and religions out of political parties.
> No servant can serve two masters; for either he will hate the one and love the other, or else he will be devoted to one and despise the other. You cannot serve God and wealth.” (Luke 16:13)
Although this verse is specifically talking about being obsessed with wealth, it is applicable to anything that takes our focus, attention, and especially our worship away from God.
When a person spends all of their time serving one candidate or party and little to no time serving God, they have chosen to serve another god and are guilty, even if inadvertently and unintentionally.
> You shall have no other gods before Me.
>
> You shall not make for yourself an idol, or any likeness of what is in heaven above or on the earth beneath or in the water under the earth. You shall not worship them or serve them; for I, the Lord your God, am a jealous God, visiting the iniquity of the fathers on the children, on the third and the fourth generations of those who hate Me, but showing lovingkindness to thousands, to those who love Me and keep My commandments. (Exodus 20:3-6)
When we look to a politician to save us from anything, we are making him/her a god before us. When we give our all to a political party, we are taking our heart away from God and giving it to an alternate religion.
We may not think that we make idols in our modern world. It is true that we don’t usually carve them out of wood or mold them out of gold, but we have just as many idols as the Israelites did. They just look different.
I hope you will seriously consider this next point because it may be very unpopular with many of my readers. There are lots of Christians that will throw as big, if not a bigger, fit at the desecration of the American flag than over the Bible. Nobody seems to fight to retain the pledge of allegiance more than a majority of Christians. I’d argue that the American flag has become a modern day idol and the “Pledge of Allegiance” has become a religious mantra repeated to the god of government. Look at the words of the pledge:
*I pledge allegiance to the Flag of the United States of America,\
and to the Republic for which it stands,\
one Nation under God,\
indivisible, with liberty and justice for all.*
I think the inclusion of the phrase “one Nation under God” makes Christians feel OK about this pledge originally invented by a socialist whose brother sold American flags. The important part, which is why I can’t say the pledge anymore, are the words, “I pledge allegiance to the Flag of the United States of America, and to the Republic for which it stands.” I really appreciate the principles America was founded upon, but as a Christian, I can only pledge allegiance to God. My allegiance isn’t to a flag (an idol) or the government (a god). I refuse to go through a religious ritual that includes particular stances, reciting special words, and showing undue respect. We cannot “*serve two masters*.” As Christians our master should be Christ alone. Anything that becomes more important than, or even equal to, the importance of God in our lives is idolatry. We need to get our priorities right.
## In the World, but Not of the World
As we live our lives here on earth, we need to remember our God ordained purpose and our true allegiance to God. We need to remember our citizenship[1](https://trustjesus.substack.com/p/should-christians-vote#footnote-1-150236181) and family are in heaven, not here on earth.
We want to have a positive influence on our culture, including working in influential positions and voting, but we should be most focused on personal evangelism and sharing the truth of the Bible. The best way to make a difference in our culture is to change hearts and minds through the Gospel of Jesus Christ.
> But now I come to You; and these things I speak in the world so that they may have My joy made full in themselves. **I have given them Your word; and the world has hated them, because they are not of the world**, even as I am not of the world. I do not ask You to take them out of the world, but to keep them from the evil one. **They are not of the world, even as I am not of the world**. Sanctify them in the truth; **Your word is truth**. (John 17:13-17) {emphasis mine}
Although we want to be a light in the world, we have been warned that doing so will make us not fit in. It will cause many non-Christians (and maybe a few Christians whose priorities are not right) to hate us. No matter the consequences, we need to stand on the truth of the Word of God.
Too often, because we are living with those who are of this world, we start to look and act a lot like those of the world instead of looking and acting like our Savior.
> **Do not love the world nor the things in the world**. If anyone loves the world, the love of the Father is not in him. For all that is in the world, the lust of the flesh and the lust of the eyes and the boastful pride of life, is not from the Father, but is from the world. **The world is passing away**, and also its lusts; but **the one who does the will of God lives forever**. (1 John 2:15-17) {emphasis mine}
The fact that we should not love the things of the world or take on the character of things of the world is true in every part of our lives, but since we are talking here about politics, let us discuss the way many Christians talk politics.
Many Christians talk about politics in the same manner as non-Christians — cursing, name calling, insulting, and doing whatever it takes to win, no matter whether it is moral or not. I know the “other side” cheats, lies, name-calls, etc., but we should not stoop to their level. Nobody ever won another to their point of view by cursing or name calling. There are ways to point our their errors, and even how horrific some of the things pushed are, without going so low. Jesus didn’t hold back from speaking the truth. He didn’t hesitate to point out error, but was never crude about it. We should be the same. We should shine a light in such a way that those around us see such a difference that they say something similar to what was said about the apostles:
> Now as they observed the confidence of Peter and John and understood that they were uneducated and untrained men, they were amazed, and began to recognize them as having been with Jesus. (Acts 4:13)
There should be something about our words, actions, and demeanor that amazes our opponents causing them to recognize us “*as having been with Jesus*.”
I hope this post has been helpful, truthful, and not too offensive. In so many areas it is hard to find that perfect balance and to not allow ourselves to be pulled to either extreme to the detriment of our witness and our relationship to God.
> Give no offense either to Jews or to Greeks or to the church of God; just as I also please all men in all things, not seeking my own profit but the profit of the many, **so that they may be saved**. (1 Corinthians 10:32-33) {emphasis mine}
Trust Jesus.\
\
your sister in Christ,
Christy
-
@ a39d19ec:3d88f61e
2024-10-27 10:26:03
**October's daily driver is the ana-digi Casio ABX-53 Twincept with module 1326. It features are world time, stopwatch, alarm and a databank for contacts.**
![Wristcheck: Casio ABX-53](https://image.nostr.build/b23d2b57b9a229f318639b933075721b1ce8a9dadffa9bd76c9bea3ddd60ef58.jpg)
## Design
I have the gold/silver colored variant with a metal band. The watch has an analog clock and a floating display with the features listed above. Best thing is the "slider" mode that switches digital functions permanently.
## Storytime
My log tells me that i bought the watch 6 years ago on a local flea market for close to nothing. It was in a bad condition and needed a new battery and some love. Sure enough it works fine since then.
Most badass feature is that the analog hands are moved electronically not mechanically.
Fun fact is that even my wife likes the floating display. First time she saw it I heard her say "Das ist echt cool", meaning "thats really cool".
-
@ eac63075:b4988b48
2024-10-26 22:14:19
The future of physical money is at stake, and the discussion about DREX, the new digital currency planned by the Central Bank of Brazil, is gaining momentum. In a candid and intense conversation, Federal Deputy Julia Zanatta (PL/SC) discussed the challenges and risks of this digital transition, also [addressing her Bill No. 3,341/2024](https://www.camara.leg.br/proposicoesWeb/prop_mostrarintegra?codteor=2473615&filename=Avulso+PL+3341%2F2024&ref=eddieoz.com#:~:text=PROJETO%20DE%20LEI%20N%C2%BA%20....%20%2C%20DE%202024.&text=Congresso%20Nacional%20decreta%3A-,Art.,substitu%C3%ADda%20exclusivamente%20por%20moeda%20digital.), which aims to prevent the extinction of physical currency. This bill emerges as a direct response to legislative initiatives seeking to replace physical money with digital alternatives, limiting citizens' options and potentially compromising individual freedom. Let's delve into the main points of this conversation.
https://www.fountain.fm/episode/i5YGJ9Ors3PkqAIMvNQ0
[(PT-BR version here)](https://www.eddieoz.com/drex-e-o-fim-do-dinheiro-fisico-no-brasil/)
## **What is a CBDC?**
Before discussing the specifics of DREX, it’s important to understand what a CBDC (Central Bank Digital Currency) is. CBDCs are digital currencies issued by central banks, similar to a digital version of physical money. Unlike cryptocurrencies such as Bitcoin, which operate in a decentralized manner, CBDCs are centralized and regulated by the government. In other words, they are digital currencies created and controlled by the Central Bank, intended to replace physical currency.
A prominent feature of CBDCs is their **programmability**. This means that the government can theoretically set rules about how, where, and for what this currency can be used. This aspect enables a level of control over citizens' finances that is impossible with physical money. By programming the currency, the government could limit transactions by setting geographical or usage restrictions. In practice, money within a CBDC could be restricted to specific spending or authorized for use in a defined geographical area.
In countries like China, where citizen actions and attitudes are also monitored, a person considered to have a "low score" due to a moral or ideological violation may have their transactions limited to essential purchases, restricting their digital currency use to non-essential activities. This financial control is strengthened because, unlike physical money, digital currency cannot be exchanged anonymously.
## **Practical Example: The Case of DREX During the Pandemic**
To illustrate how DREX could be used, an example was given by Eric Altafim, director of Banco Itaú. He suggested that, if DREX had existed during the COVID-19 pandemic, [the government could have restricted the currency’s use to a 5-kilometer radius around a person’s residence](https://youtu.be/cjUz2VEk4co?feature=shared&t=484&ref=eddieoz.com), limiting their economic mobility. Another proposed use by the executive related to the Bolsa Família welfare program: the government could set up programming that only allows this benefit to be used exclusively for food purchases. Although these examples are presented as control measures for safety or organization, they demonstrate how much a CBDC could restrict citizens' freedom of choice.
To illustrate the potential for state control through a Central Bank Digital Currency (CBDC), such as DREX, it is helpful to look at the example of China. In China, the implementation of a CBDC coincides with the country’s Social Credit System, a governmental surveillance tool that assesses citizens' and companies' behavior. Together, these technologies allow the Chinese government to monitor, reward, and, above all, punish behavior deemed inappropriate or threatening to the government.
## **How Does China's Social Credit System Work?**
Implemented in 2014, China's Social Credit System assigns every citizen and company a "score" based on various factors, [including financial behavior, criminal record, social interactions, and even online activities](https://journals.sagepub.com/doi/full/10.1177/1461444819826402?ref=eddieoz.com). This score determines the benefits or penalties each individual receives and can affect everything from public transport access to obtaining loans and enrolling in elite schools for their children. Citizens with low scores may face various sanctions, including travel restrictions, fines, and difficulty in securing loans.
With the adoption of the CBDC — or “digital yuan” — the Chinese government now has a new tool to closely monitor citizens' financial transactions, facilitating the application of Social Credit System penalties. China’s CBDC is a programmable digital currency, which means that the government can restrict how, when, and where the money can be spent. Through this level of control, digital currency becomes a powerful mechanism for influencing citizens' behavior.
Imagine, for instance, a citizen who repeatedly posts critical remarks about the government on social media or participates in protests. If the Social Credit System assigns this citizen a low score, the Chinese government could, through the CBDC, restrict their money usage in certain areas or sectors. For example, [they could be prevented from buying tickets to travel to other regions, prohibited from purchasing certain consumer goods](https://www.businessinsider.com/china-social-credit-system-punishments-and-rewards-explained-2018-4?ref=eddieoz.com), or even restricted to making transactions only at stores near their home.
Another example of how the government can use the CBDC to enforce the Social Credit System is by monitoring purchases of products such as alcohol or luxury items. If a citizen uses the CBDC to spend more than the government deems reasonable on such products, this could negatively impact their social score, resulting in additional penalties such as future purchase restrictions or a lowered rating that impacts their personal and professional lives.
In China, this kind of control has already been demonstrated in several cases. Citizens added to Social Credit System “blacklists” have seen their spending and investment capacity severely limited. The combination of digital currency and social scores thus creates a sophisticated and invasive surveillance system, through which the Chinese government controls important aspects of citizens’ financial lives and individual freedoms.
Deputy Julia Zanatta views these examples with great concern. She argues that if the state has full control over digital money, citizens will be exposed to a level of economic control and surveillance never seen before. In a democracy, this control poses a risk, but in an authoritarian regime, it could be used as a powerful tool of repression.
## **DREX and Bill No. 3,341/2024**
Julia Zanatta became aware of a bill by a Workers' Party (PT) deputy ([Bill 4068/2020 by Deputy Reginaldo Lopes - PT/MG](https://www.camara.leg.br/proposicoesWeb/fichadetramitacao?idProposicao=2259342&fichaAmigavel=nao&ref=eddieoz.com)) that proposes the extinction of physical money within five years, aiming for a complete transition to DREX, the digital currency developed by the Central Bank of Brazil. Concerned about the impact of this measure, [Julia drafted her bill, PL No. 3,341/2024](https://www.camara.leg.br/proposicoesWeb/prop_mostrarintegra?codteor=2473615&filename=Avulso+PL+3341%2F2024&ref=eddieoz.com#:~:text=PROJETO%20DE%20LEI%20N%C2%BA%20....%20%2C%20DE%202024.&text=Congresso%20Nacional%20decreta%3A-,Art.,substitu%C3%ADda%20exclusivamente%20por%20moeda%20digital.), which prohibits the elimination of physical money, ensuring citizens the right to choose physical currency.
“The more I read about DREX, the less I want its implementation,” says the deputy. DREX is a Central Bank Digital Currency (CBDC), similar to other state digital currencies worldwide, but which, according to Julia, carries extreme control risks. She points out that with DREX, the State could closely monitor each citizen’s transactions, eliminating anonymity and potentially restricting freedom of choice. This control would lie in the hands of the Central Bank, which could, in a crisis or government change, “freeze balances or even delete funds directly from user accounts.”
## **Risks and Individual Freedom**
Julia raises concerns about potential abuses of power that complete digitalization could allow. In a democracy, state control over personal finances raises serious questions, and EddieOz warns of an even more problematic future. “Today we are in a democracy, but tomorrow, with a government transition, we don't know if this kind of power will be used properly or abused,” he states. In other words, DREX gives the State the ability to restrict or condition the use of money, opening the door to unprecedented financial surveillance.
EddieOz cites Nigeria as an example, where a CBDC was implemented, and the government imposed severe restrictions on the use of physical money to encourage the use of digital currency, leading to protests and clashes in the country. In practice, the poorest and unbanked — those without regular access to banking services — were harshly affected, as without physical money, many cannot conduct basic transactions. Julia highlights that in Brazil, this situation would be even more severe, given the large number of unbanked individuals and the extent of rural areas where access to technology is limited.
## **The Relationship Between DREX and Pix**
The digital transition has already begun with Pix, which revolutionized instant transfers and payments in Brazil. However, Julia points out that Pix, though popular, is a citizen’s choice, while DREX tends to eliminate that choice. The deputy expresses concern about new rules suggested for Pix, such as daily transaction limits of a thousand reais, justified as anti-fraud measures but which, in her view, represent additional control and a profit opportunity for banks. “How many more rules will banks create to profit from us?” asks Julia, noting that DREX could further enhance control over personal finances.
## **International Precedents and Resistance to CBDC**
The deputy also cites examples from other countries resisting the idea of a centralized digital currency. In the United States, states like New Hampshire have passed laws to prevent the advance of CBDCs, and leaders such as Donald Trump have opposed creating a national digital currency. Trump, addressing the topic, uses a justification similar to Julia’s: in a digitalized system, “with one click, your money could disappear.” She agrees with the warning, emphasizing the control risk that a CBDC represents, especially for countries with disadvantaged populations.
Besides the United States, Canada, Colombia, and Australia have also suspended studies on digital currencies, citing the need for further discussions on population impacts. However, in Brazil, the debate on DREX is still limited, with few parliamentarians and political leaders openly discussing the topic. According to Julia, only she and one or two deputies are truly trying to bring this discussion to the Chamber, making DREX’s advance even more concerning.
## **Bill No. 3,341/2024 and Popular Pressure**
For Julia, her bill is a first step. Although she acknowledges that ideally, it would prevent DREX's implementation entirely, PL 3341/2024 is a measure to ensure citizens' choice to use physical money, preserving a form of individual freedom. “If the future means control, I prefer to live in the past,” Julia asserts, reinforcing that the fight for freedom is at the heart of her bill.
However, the deputy emphasizes that none of this will be possible without popular mobilization. According to her, popular pressure is crucial for other deputies to take notice and support PL 3341. “I am only one deputy, and we need the public’s support to raise the project’s visibility,” she explains, encouraging the public to press other parliamentarians and ask them to “pay attention to PL 3341 and the project that prohibits the end of physical money.” The deputy believes that with a strong awareness and pressure movement, it is possible to advance the debate and ensure Brazilians’ financial freedom.
## **What’s at Stake?**
Julia Zanatta leaves no doubt: DREX represents a profound shift in how money will be used and controlled in Brazil. More than a simple modernization of the financial system, the Central Bank’s CBDC sets precedents for an unprecedented level of citizen surveillance and control in the country. For the deputy, this transition needs to be debated broadly and transparently, and it’s up to the Brazilian people to defend their rights and demand that the National Congress discuss these changes responsibly.
The deputy also emphasizes that, regardless of political or partisan views, this issue affects all Brazilians. “This agenda is something that will affect everyone. We need to be united to ensure people understand the gravity of what could happen.” Julia believes that by sharing information and generating open debate, it is possible to prevent Brazil from following the path of countries that have already implemented a digital currency in an authoritarian way.
## **A Call to Action**
The future of physical money in Brazil is at risk. For those who share Deputy Julia Zanatta’s concerns, the time to act is now. Mobilize, get informed, and press your representatives. PL 3341/2024 is an opportunity to ensure that Brazilian citizens have a choice in how to use their money, without excessive state interference or surveillance.
In the end, as the deputy puts it, the central issue is freedom. “My fear is that this project will pass, and people won’t even understand what is happening.” Therefore, may every citizen at least have the chance to understand what’s at stake and make their voice heard in defense of a Brazil where individual freedom and privacy are respected values.
-
@ 592295cf:413a0db9
2024-10-26 13:39:00
[Week 21-10]
I thinks that Saylor is on right, don't trust verify, is bullshit
Bitcoin is a financial tool!
I think it's good for me to get away from social media once a week.
I could do things outside, like walking.
Take pictures of the landscape. The weirdest thing is when the alarm calls you up in an hour.
Fiatjaf wants a cache client. I feel like I can do it, I have the set to do it,
but nostrudel is no longer working, so it's a little murky.
Next nostrudel does not accept changes to settings
(It works now!), so maybe i can think something.
I want to make a corny chat, test, read this article.
Nostr doesn't work with a vpn because relays don't know who you are. jokes aside, some clients have difficulties.
### **I couldn't take pictures of the landscape if I didn't take the wind blades.** Small local controversy.
Missing the point of content creator. Simply for final user, Simply for the creator, new feature, no missing nothing.
I'm trying to limit everything to writing for a week. I almost did. Maybe another week can do well.
Meanwhile I updated apps like Amber and Voyager, coracle, nostrmo.
The experiment continues with open vibe following the trending of Nostr. I'm following almost 120 npub.
He'll stop, I don't know, possible he's already reached the limit.
You still can't block words on the Nostr side of Open, strange thing.
The app doesn't count the follow well, still some problem cleaning the cache seems that it doesn't need.
After a while open and close and seems updated.
I wanted to try open librarian, but I was busy sending fake zap on Nostr.
This morning i try and It keeps giving me error 500 when I try to connect to a relay.
I hate when a profile follows everyone indistinctly, why does everyone follow? and in voyage, I read with WoT setting,
I probably have to do unfollow. There must be an indication in which not include the followers of this person in the web of trust,
I would do it by default if you follow more than 600 people.
WoT on Nostr Visualized [post on stackernews](https://stacker.news/items/739477)
-
@ 8f69ac99:4f92f5fd
2024-10-25 09:49:56
O recente relatório do Banco Central Europeu, [*As Consequências Distribucionais do Bitcoin*](https://papers.ssrn.com/sol3/Delivery.cfm/4985877.pdf?abstractid=4985877&mirid=1&type=2), recicla a velha narrativa de que o Bitcoin é um activo especulactivo que causa desigualdade de riqueza sem oferecer benefícios económicos tangíveis. Os autores, Ulrich Bindseil e Jürgen Schaaf, desfilam as críticas de sempre, afirmando que o Bitcoin falhou como sistema de pagamento global e que se transformou numa bolha, enriquecendo os primeiros utilizadores à custa da sociedade. Também lançam uma pitada de alarmismo ambiental e argumentam que o Bitcoin ameaça a democracia.
Como era de esperar, o BCE continua apegado às mesmas concepções erradas que já foram desmentidas inúmeras vezes. O que este relatório não percebe, de forma espectacular, é que o Bitcoin não é apenas mais um activo; é uma tábua de salvação para aqueles desiludidos com os sistemas fiduciários inflacionários e governos corruptos. Ao longo desta análise, vamos desmontar os argumentos do BCE, expondo não só o seu profundo desconhecimento sobre o Bitcoin, mas também a ignorância gritante em relação ao seu potencial de conceder soberania financeira a milhões de pessoas em todo o mundo. O BCE retrata o Bitcoin como uma ferramenta elitista, mas ignora como as suas próprias políticas têm sistematicamente enriquecido alguns poucos à custa da maioria. Vamos então entrar no assunto.
### 1. **Deturpam o Papel do Bitcoin como Sistema de Pagamentos**
> "O Bitcoin nunca foi usado em grande escala para transacções legais no mundo real."
Que originalidade. Os autores descartam a utilidade de pagamento do Bitcoin com um gesto, mostrando que não compreendem a Lightning Network, que facilita transacções rápidas, baratas e escaláveis a nível global. Certamente, talvez os europeus ainda não estejam a comprar os seus cafés com Bitcoin, mas isso é irrelevante. O Bitcoin é uma tábua de salvação financeira em locais como El Salvador e em inúmeras outras regiões que sofrem com sistemas fiduciários em colapso.
Esta visão eurocêntrica, como se todo o mundo partilhasse das mesmas condições económicas, reflecte uma total falta de perspectiva. Os autores seleccionam dados a dedo para encaixar na sua narrativa anti-Bitcoin, enquanto convenientemente ignoram os milhões que utilizam o Bitcoin para escapar à hiperinflação e a regimes autoritários. A afirmação de que o Bitcoin não é usado para transacções "legais" é não só enganosa, como revela a sua ignorância sobre as necessidades reais de quem vive fora da sua bolha privilegiada.
---
### 2. **Deturpam o Bitcoin como activo Especulactivo**
> "O Bitcoin não gera qualquer fluxo de caixa (como o imobiliário), juros (como as obrigações) ou dividendos (como as ações)."
Parabéns, BCE, acabaram de perder o ponto fulcral do Bitcoin. Esta afirmação mostra uma falta de entendimento fundamental do que torna o Bitcoin único. Ao contrário de imóveis ou obrigações, o Bitcoin é uma forma alternativa de dinheiro—não algum esquema de rendimento passivo.
O valor do Bitcoin não depende de gerar dividendos ou juros, mas advém da sua escassez, descentralização e resistência à censura. Ao reduzir o Bitcoin a modelos de activos tradicionais, o BCE ignora o paradigma económico revolucionário que este oferece: uma escapatória aos sistemas fiduciários inflacionários, particularmente para os milhares de milhões de pessoas presas em sistemas financeiros corruptos.
Ao tentar enquadrar o Bitcoin em modelos convencionais, os autores revelam a sua preguiça intelectual. A utilidade do Bitcoin reside no seu potencial como dinheiro sólido, e não como um veículo de investimento para especuladores atrás de rendimento.
---
### 3. **Deturpam os Custos Ambientais e Sociais da Mineração**
> "A mineração de Bitcoin consome muita energia e causa danos ecológicos e sociais."
Ah sim, o argumento gasto sobre o consumo energético. Enquanto a mineração de Bitcoin realmente requer energia, os autores omitem convenientemente os enormes avanços que a indústria fez em direcção à sustentabilidade. Cada vez mais, os mineradores de Bitcoin recorrem a fontes de energia renovável e, em alguns casos, estão até a ajudar a financiar infraestruturas de energia verde.
A ironia aqui é que o BCE, uma instituição que fomenta políticas que inflam bolhas imobiliárias e de acções, de repente está preocupado com os custos sociais e ambientais. E mais, ignoram como a procura de energia barata por parte do Bitcoin incentiva realmente o desenvolvimento de soluções energéticas sustentáveis. Num mundo onde os sistemas fiduciários alimentam a ganância corporativa e a degradação ambiental, o Bitcoin está posicionado para impulsionar uma verdadeira inovação na energia verde.
---
### 4. **Visão Deturpada da Redistribuição de Riqueza**
> "Os efeitos de riqueza do Bitcoin beneficiam os primeiros utilizadores à custa dos que chegam mais tarde e dos que não o possuem."
Isto é pura comédia. Aparentemente, o BCE acabou de descobrir que os primeiros investidores em **qualquer** activo beneficiam mais do que os que chegam depois. Não é assim que os mercados funcionam? Os primeiros investidores em acções, imóveis e ouro beneficiam de forma desproporcional—mas, curiosamente, isto só se torna um problema quando se trata de Bitcoin.
O que o BCE realmente teme é que o Bitcoin democratize a riqueza de uma maneira que eles não conseguem controlar. Com o Bitcoin, não precisas de acesso privilegiado para participar. Não precisas de um corretor _XPTO_ ou de permissão dos guardiões financeiros. Ao contrário das próprias políticas do BCE—concebidas para inflacionar a riqueza dos já ricos através de bolhas imobiliárias e do mercado de acções—Bitcoin oferece um campo de jogo nivelado para qualquer pessoa com uma ligação à internet.
---
### 5. **Sensacionalismo: a Ameaça à Democracia**
> "O aumento perpétuo do preço do Bitcoin empobrece o resto da sociedade e põe em risco a democracia."
Aqui, os autores entram no melodrama, avisando que o aumento do preço do Bitcoin põe em risco a democracia. É fascinante como ignoram a verdadeira ameaça à democracia: as suas próprias políticas inflacionárias.
Na realidade, os sistemas fiduciários, através da inflação incessante e do _quantitative easing_, erodem sistematicamente a riqueza dos mais pobres e da classe média. Os ricos, com as suas carteiras de acções e imóveis, conseguem resistir à tempestade. Mas o trabalhador comum, cujo salário compra cada vez menos a cada ano, é esmagado. Se há algo que ameaça a democracia, é o poder descontrolado do BCE de desvalorizar a moeda que as pessoas usam para viver. Bitcoin, por outro lado, dá às pessoas uma reserva de valor incorruptível e descentralizada, imune aos caprichos dos banqueiros centrais.
---
### 6. **Percepção "Equivocada" da Escalabilidade do Bitcoin**
> "As transações em Bitcoin na blockchain são lentas e caras."
Esta crítica ignora a realidade do progresso tecnológico. As transacções on-chain de Bitcoin nunca foram pensadas para compras diárias—para isso é que serve a Lightning Network. Os autores agarram-se a esta crítica desactualizada, como se o Bitcoin fosse uma entidade estática que não evoluiu na última década.
Soluções de segunda camada como a Lightning Network permitem transacções quase instantâneas e de baixo custo, tornando o Bitcoin escalável de maneiras que o BCE se recusa a reconhecer. Mas porque deixar que os factos estraguem uma boa história de medo?
---
### 7. **Ignoram o Impacto Económico Global do Bitcoin**
> "O Bitcoin não tem casos de uso benéficos para a sociedade."
Esta afirmação é tão limitada que é quase impressionante. A utilidade do Bitcoin não se trata de conveniência para os ocidentais comprarem café; trata-se de sobrevivência para as pessoas em países como a Venezuela, o Líbano ou a Nigéria.
![adoption](https://image.nostr.build/3f2f5a59ebeae788568fae8b6d5bf4179e9d5b305a05ee3ef8017ff64c1c567b.jpg)
Quando as moedas locais colapsam e as pessoas não podem confiar nos seus bancos, o Bitcoin oferece uma saída. Ao descartar o impacto real de Bitcoin sobre os milhares de milhões (mais de metade da população mundial) de pessoas que vivem sob regimes opressivos e em hiperinflação, o BCE revela um embaraçoso viés ocidental e falta de empatia. O Bitcoin é mais do que apenas um activo alternativo, é uma tábua de salvação para pessoas em todo o mundo que sofrem com sistemas fiduciários falhados.
---
### Conclusão
O relatório do BCE recicla críticas desactualizadas e já desmentidas, não conseguindo ver o panorama geral. Aplica modelos financeiros antigos a uma **nova forma de dinheiro**, ignorando o potencial de Bitcoin para democratizar o acesso a um sistema financeiro justo, descentralizado e incorruptível. Enquanto os bancos centrais, como o BCE, continuam a desvalorizar moedas e a inflacionar bolhas de activos (e parece que vem ai mais...), Bitcoin oferece às pessoas um caminho para a soberania financeira.
O verdadeiro valor de Bitcoin não se encontra nas críticas superficiais e eurocêntricas do BCE. O seu valor reside na capacidade de fornecer liberdade financeira a indivíduos em todo o mundo, libertos da má gestão de governantes e banqueiros centrais. Se há algo que ameaça a democracia, é o historial do BCE de enriquecer alguns poucos à custa de muitos. Bitcoin, por outro lado, oferece um futuro mais justo—um onde são os indivíduos, e não as instituições, que têm o poder.
Alguma literatura:
- [Universidade de Cornell - Bitcoin pode impulsionar o desenvolvimento de energias renovaveis](https://news.cornell.edu/stories/2023/11/bitcoin-could-support-renewable-energy-development)
- [Aldeias em Africa com electricidade atraves de Bitcoin](https://gridlesscompute.com/2022/09/28/21st-century-villages/)
- [Relatorio de 2023 sobre a Lightning Network da River](https://river.com/learn/files/river-lightning-report-2023.pdf)
- [Adopcao de Bitcoin por Pais](https://plasbit.com/blog/bitcoin-adoption-by-country)
---
_Photo by [Taras Chernus](https://unsplash.com/@chernus_tr?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash) on [Unsplash]("https://unsplash.com/photos/man-in-teal-hoodie-with-i-love-you-text-euaivxORAm8?utm_content=creditCopyText&utm_medium=referral&utm_source=unsplash")_
#Bitcoin #BCE
-
@ dd32f3e0:498f1df9
2024-10-25 01:42:06
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
-
@ 6f0ba1ef:58eb4351
2024-10-25 01:16:41
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
-
@ c631e267:c2b78d3e
2024-10-23 20:26:10
Herzlichen Glückwunsch zum dritten Geburtstag, liebe *Denk Bar*! Wieso zum dritten? Das war doch 2022 und jetzt sind wir im Jahr 2024, oder? Ja, das ist schon richtig, aber bei Geburtstagen erinnere ich mich immer auch an meinen Vater, und der behauptete oft, der erste sei ja schließlich der Tag der Geburt selber und den müsse man natürlich mitzählen. Wo er recht hat, hat er nunmal recht. Konsequenterweise wird also heute dieser Blog an seinem dritten Geburtstag zwei Jahre alt.
Das ist ein Grund zum Feiern, wie ich finde. Einerseits ganz einfach, weil es dafür gar nicht genug Gründe geben kann. «Das Leben sind zwei Tage», lautet ein gängiger Ausdruck hier in Andalusien. In der Tat könnte es so sein, auch wenn wir uns im Alltag oft genug von der Routine vereinnahmen lassen.
Seit dem Start der *Denk Bar* vor zwei Jahren ist unglaublich viel passiert. Ebenso wie die zweieinhalb Jahre davor, und all jenes war letztlich auch der Auslöser dafür, dass ich begann, öffentlich zu schreiben. [Damals notierte ich](https://denkbar.substack.com/p/andreas-denk-bar-eroffnet):
> «Seit einigen Jahren erscheint unser öffentliches Umfeld immer fragwürdiger, widersprüchlicher und manchmal schier unglaublich - jede Menge Anlass für eigene Recherchen und Gedanken, ganz einfach mit einer Portion gesundem Menschenverstand.»
Wir erleben den sogenannten «großen Umbruch», einen globalen Coup, den skrupellose Egoisten clever eingefädelt haben und seit ein paar Jahren knallhart – aber nett verpackt – durchziehen, um buchstäblich alles nach ihrem Gusto umzukrempeln. Die Gelegenheit ist ja angeblich günstig und muss genutzt werden.
Nie hätte ich mir träumen lassen, dass ich so etwas jemals miterleben müsste. Die Bosheit, mit der ganz offensichtlich gegen die eigene Bevölkerung gearbeitet wird, war früher für mich unvorstellbar. Mein (Rest-) Vertrauen in alle möglichen Bereiche wie Politik, Wissenschaft, Justiz, Medien oder Kirche ist praktisch komplett zerstört. Einen [«inneren Totalschaden»](https://denkbar.substack.com/p/innerer-totalschaden) hatte ich mal für unsere Gesellschaften diagnostiziert.
Was mich vielleicht am meisten erschreckt, ist zum einen das Niveau der [Gleichschaltung](https://denkbar.substack.com/p/warum-trotzdem-dieses-handeln), das weltweit erreicht werden konnte, und zum anderen die praktisch totale Spaltung der Gesellschaft. Haben wir das tatsächlich mit uns machen lassen?? Unfassbar! Aber das Werkzeug «Angst» ist sehr mächtig und funktioniert bis heute.
Zum Glück passieren auch positive Dinge und neue Perspektiven öffnen sich. Für viele Menschen waren und sind die Entwicklungen der letzten Jahre ein Augenöffner. Sie sehen «Querdenken» als das, was es ist: eine Tugend.
Auch die immer ernsteren Zensurbemühungen sind letztlich nur ein Zeichen der Schwäche, wo Argumente fehlen. Sie werden nicht verhindern, dass wir unsere Meinung äußern, unbequeme Fragen stellen und dass die Wahrheit peu à peu ans Licht kommt. Es gibt immer Mittel und Wege, auch für uns.
---
**Danke, dass du diesen Weg mit mir weitergehst!**
-
@ 6f0ba1ef:58eb4351
2024-10-22 23:31:47
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
-
@ 4ba8e86d:89d32de4
2024-10-22 23:20:59
Usar um gerenciador de senhas pode resolver vários problemas, incluindo a dificuldade de criar senhas fortes e únicas, o risco de reutilização de senhas e a possibilidade de comprometimento de contas devido a senhas fracas ou roubadas. Com o uso de um gerenciador de senhas, o usuário pode criar senhas fortes e únicas para cada conta, sem precisar se preocupar em lembrar de todas elas. Além disso,um gerenciador de senhas pode ajudar a simplificar o processo de login, economizando tempo e reduzindo a frustração.
O KeepassDX é uma versão do software de gerenciamento de senhas Keepass, desenvolvido originalmente por Dominik Reichl em 2003. O Keepass é um software gratuito e de código aberto para desktops, que permite que os usuários armazenem suas senhas em um banco de dados seguro, criptografado com algoritmos avançados. Em 2017, o desenvolvedor alemão Brian Pellmann criou o KeepassDX como uma versão para dispositivos móveis, com o objetivo de tornar mais fácil para os usuários gerenciarem suas senhas em smartphones e tablets.
O KeepassDX foi criado a partir do código-fonte do Keepass e foi projetado para ser fácil de usar, seguro e personalizável. Pellmann adicionou várias funcionalidades novas ao KeepassDX, incluindo a capacidade de importar senhas de outros gerenciadores de senhas, a organização de senhas em categorias e a compatibilidade com serviços de armazenamento em nuvem para sincronização entre dispositivos.
Algumas das funcionalidades do KeepassDX incluem a criação de senhas fortes e únicas, preenchimento automático de senhas, autenticação de dois fatores e organização de senhas por categorias. O KeepassDX também oferece uma ferramenta para importação de senhas de outros gerenciadores de senhas, o que torna a transição para o uso do KeepassDX mais fácil.
Passo a passo instalação do aplicativo KeepassDX:
1. Baixe e instale o KeepassDX em seu dispositivo móvel
https://play.google.com/store/apps/details?id=com.kunzisoft.keepass.free
2. Clique em [CRIAR NOVO BANCO DE DADOS]
3. Selecione o local do arquivo no meu caso é " transferência "
Semelhante ao KeePassXC, o KeePassDX suporta o formato de banco de dados .kbdx (por exemplo, Passwords.kdbx) para armazenar senhas de contas importantes. Você deve salvar este arquivo em um local de fácil acesso para você, mas difícil de encontrar para outras pessoas que você não deseja visualizar as informações. Em particular, evite salvar seu arquivo de banco de dados em um serviço de armazenamento online, conectado às suas contas, pois pode ser acessado por outras pessoas.
4. Digite um nome para seu banco de dados
Neste exemplo, " urso " nosso banco de dados como "urso.kdbx"; você pode escolher um nome de sua preferência. Você pode usar um nome que disfarce o arquivo e o torne menos óbvio para invasores que podem tentar acessar seu telefone e exigir que você desbloqueie o banco de dados.
Também é possível alterar a "extensão" no final do nome do arquivo. Por exemplo, você pode nomear o banco de dados de senhas "Revoltadeatlas.pdf" "primainterior.jpg " e o sistema operacional geralmente dará ao arquivo um ícone de "aparência normal". Lembre-se de que, se você der ao seu banco de dados de senhas um nome que não termine em ".kdbx", não poderá abrir o arquivo diretamente. Em vez disso, você terá que iniciar o KeePassDX primeiro e, em seguida, abrir seu banco de dados clicando no botão "Abrir banco de dados existente". Felizmente, o KeePassDX lembra o último banco de dados que você abriu, então você não terá que fazer isso com frequência.
https://github.com/Kunzisoft/KeePassDX
-
@ aa8de34f:a6ffe696
2024-10-22 19:36:06
##
Das Internet hat ein Problem. Nur wenige Leute wissen, dass dieses Problem existiert, aber hey, das liegt in der Natur ernsthafter, nicht offensichtlicher Probleme: Sie sind unsichtbar bis sie es nicht mehr sind. Das Problem mit dem Internet ist, dass Informationen frei sein wollen. Und wenn etwas FREI sein will wie in Freiheit, wird es mit genügend Zeit auch frei wie im Bier. Lass es mich erklären.
### Luftverschmutzung
Jeden Tag verbrauchen wir ungeheure Mengen an Daten. Jede Sekunde jeder Minute strömen Bits und Bytes durch die Reihe von Leitungen die wir alle kennen und lieben: das Internet. Wir nehmen es als selbstverständlich hin und die meisten von uns halten das derzeitige Monetarisierungsmodell – sowie alle damit einhergehenden Übel – ebenfalls für selbstverständlich. Wir halten nur selten inne und denken über die seltsame Welt der Bits und Bytes nach. Wie wunderbar das alles ist, aber auch wie fremd. Wie es unser Leben bereits verändert hat und wie es unsere Zukunft weiter verändern wird. Woher kommen die Nullen und Einsen? Wie funktioniert das alles? Und vor allem: Wer zahlt dafür? Die Bits und Bytes, die durch unsere Glasfaserkabel rasen, sind so unsichtbar wie die Luft die wir atmen. Das ist keine schlechte Metapher wenn ich so darüber nachdenke. Solange wir keine Atemprobleme haben, müssen wir nicht anhalten und jedes einzelne Molekül, das wir einatmen, untersuchen. Ebenso lange wir keine Schwierigkeiten haben digitale Inhalte zu erstellen und zu konsumieren, brauchen wir auch nicht innezuhalten und all die verschiedenen Teile zu untersuchen, die unsere Aufmerksamkeitsökonomie am Laufen halten.\
**Aufmerksamkeitsökonomie**. Was für eine treffende Beschreibung. Wie wir inzwischen alle wissen sollten, ist das was wir konsumieren nicht umsonst, sondern wir bezahlen teuer dafür: mit unserer Aufmerksamkeit unter anderem.
### Paying Attention – mit Aufmerksamkeit bezahlen
In der schnelllebigen Welt von heute muss man, um den Gewinn zu maximieren, die Aufmerksamkeit maximieren. Aber es ist eine eigentümliche, oberflächliche Art von Aufmerksamkeit. Es ist nicht die konzentrierte Art von Aufmerksamkeit, die tiefes Denken und sinnvolle Gespräche erfordern würden. Ich glaube, dass dies zumindest teilweise der Grund ist, warum viele Dinge so kaputt sind. Warum unser gesellschaftlicher Diskurs so zersplittert ist, unsere Politik so polarisiert, wir so gelähmt sind und unsere Analysen oft so oberflächlich sind wie unsere Wünsche.\
Die Aufmerksamkeitsökonomie hat uns fein säuberlich in Echokammern für persönliche Wahrheiten eingeteilt. Ironischerweise besteht die einzige Wahrheit die es wert ist, in der Aufmerksamkeitsökonomie verfolgt zu werden, darin, wie man eine maximale Anzahl von Menschen für eine maximale Zeitspanne maximal empört halten kann. Und das alles ohne dass die Teilnehmer merken, dass sie in einem selbst gewählten algorithmischen Gefängnis gefangen sind.
### Du bist das Produkt
Die Redewendung „Wenn etwas kostenlos ist, bist du das Produkt“ kann nicht oft genug wiederholt werden. Aus dem einen oder anderen Grund erwarten wir, dass die meisten Dinge Online „kostenlos“ sind. Natürlich gibt es so etwas wie ein kostenloses Mittagessen nicht – nichts ist umsonst. Bei Online-Diensten werden deine Daten gesammelt und an den Meistbietenden verkauft, der in der Regel eine Werbeagentur oder eine Regierungsbehörde ist. Oder beides.\
Alle Big-Data-Unternehmen spionieren dich nicht nur aus, sondern nutzen auch eine Vielzahl von dunklen Mustern und unethischen Praktiken, um aus deinen Interaktionen auch den letzten Tropfen an Daten herauszuholen. Ob es sich dabei um den Facebook-Pixel, Google Analytics oder etwas anderes handelt, spielt keine Rolle. Du wirst nachverfolgt, überwacht und katalogisiert. Was du siehst, wie lange, zu welchen Zeiten, wie häufig und was du als Nächstes sehen wirst, wird sorgfältig von einem gewinnmaximierenden Algorithmus orchestriert. Profit für die Plattform, nicht für dich. Natürlich geht es in der Regel darum, dass alle davon profitieren: Nutzer, Urheber, Werbetreibende und die Plattformen gleichermaßen. Das evolutionäre Umfeld, das durch diese Anreizstrukturen geschaffen wird, führt jedoch häufig dazu, dass seichte, aufmerksamkeitsstarke und sensationslüsterne Schnipsel ausgewählt werden. Zum Zeitpunkt dieses Schreibens – Block 716.025 – ist der Inbegriff eines solchen Umfelds TikTok, eine videobasierte Dopaminmaschine, die dir das filmische Äquivalent von Heroin gemischt mit Crack zeigt. Harte Drogen für den Verstand, maßgeschneidert für deine besonderen Vorlieben. Eine wahrhaft verfluchte App. Leider unterscheiden sich die meisten dieser Plattformen nur in der Größe, nicht in der Art.
### Zulässige Meinungen
„Es ist gar nicht so schlimm“, sagen wir uns. „Sieh dir all die nützlichen Informationen an!“, denken wir, während wir durch unsere Feeds scrollen, und füttern damit ungewollt die Maschine, die uns im Gegenzug mit Dopamin versorgt.\
Aber täuschen Sie sich nicht: Den verantwortlichen Unternehmen geht es nicht darum, uns mit nützlichen (oder wahrheitsgemäßen) Informationen zu versorgen. Es geht ihnen darum uns auszutricksen, damit wir die Maschine füttern.\
Wie könnte es anders sein? Man ist was man verfolgt, und man wird das worauf man optimiert wird. Aus Sicht der Plattform geht es um Klicks, nicht um Qualität. Auf den ersten Blick mag die Maximierung von Klicks und Verweildauer eine harmlose Sache sein. Schließlich muss man ja Geld verdienen um zu überleben. Es ist ja nur eine Anzeige. Wie schlimm kann es schon werden?\
Leider sind die Probleme, die damit einhergehen, zunächst unsichtbar. So wie Krebs für den Raucher unsichtbar ist, der gerade seine erste Zigarette geraucht hat, und Leberzirrhose für den Trinker unsichtbar ist, der gerade seinen ersten Drink zu sich genommen hat, so sind Deplatforming, Zensur, Polarisierung und Manipulation der öffentlichen Meinung für den Prosumenten unsichtbar, der gerade seine erste Anzeige auf einer geschlossenen Plattform gesehen hat. Wir können uns wahrscheinlich darauf einigen, dass wir das erste Inning (Stichwort Baseball) in dieser Frage hinter uns haben. Zensur ist die Norm, Deplatforming wird bejubelt, die Polarisierung ist auf einem Allzeithoch, und die öffentliche Meinung wird manuell und algorithmisch manipuliert wie nie zuvor.\
„Der Konsens ist, dass du zu dumm bist, um zu wissen was gut für dich ist und dass deine öffentliche Meinung zu unverschämt ist, um öffentlich geäußert zu werden. Schlimmer noch, es sollte gar nicht erst deine Meinung sein. Hier ist der Grund warum du falsch liegst. Hier ist eine Quelle die auf eine zulässige Meinung hinweist. Hier sind einige Experten, die mit uns übereinstimmen. Unsere intelligenten und hilfreichen Algorithmen haben die ganze Denkarbeit für dich erledigt, und sie liegen nie falsch. Genauso wenig wie die Experten.“\
Das ist die Welt, in der wir bereits leben. Es ist nicht erlaubt frei zu sprechen. Es ist nicht erlaubt frei zu denken. Du darfst dich nicht frei äußern. Dein Bild ist beleidigend und muss daher entfernt werden. Dein Meme ist zu nah an der Wahrheit oder zu kriminell lustig; deshalb müssen wir dich für ein oder zwei Wochen ins Twitter-Gefängnis stecken. Du sagst etwas mit dem wir nicht einverstanden sind; deshalb müssen wir dich auf Lebenszeit sperren – auch wenn du ein amtierender Präsident bist, wohlgemerkt. Du hast in einem Video das falsche Wort gesagt oder ein urheberrechtlich geschütztes Lied im Hintergrund abgespielt; deshalb müssen wir dir dein Einkommen wegnehmen. Du hast ein Bild von dir ohne Maske gepostet; deshalb müssen wir dich verbieten und den Behörden melden.1\
Die Tatsache, dass der obige Satz nicht mehr nur im Bereich der dystopischen Science-Fiction angesiedelt ist, sollte jeden beunruhigen. Aus dem Cyberspace entfernt – weil ich frei atmen wollte. Seltsame Zeiten.
### Evolutionärer Druck
Wie ist es dazu gekommen? Wenn ich gezwungen wäre, eine kurze Antwort zu geben, würde ich Folgendes sagen: Wir sind von Protokollen zu Plattformen übergegangen, und Plattformen sind nur so gut wie ihre Anreize.\
Die Anreizstruktur der Plattformen, auf denen wir leben, ist die evolutionäre Umgebung, die das Überleben diktiert. Alles, was überleben will, muss sich daran orientieren. Das gilt natürlich für alle Bereiche der Wirtschaft. Nimm zum Beispiel Printmagazine. Wenn deine Zeitschrift kein schönes weibliches Gesicht auf der Titelseite hat, wird sie aus sehr menschlichen evolutionären Gründen nicht so oft gekauft werden wie die Zeitschriften, die ein solches Gesicht haben. Sie kann sich also nicht selbst reproduzieren und wird folglich sterben. Ähnlich verhält es sich mit einem Online-Nachrichtenportal, wenn es keine ausreichenden Werbeeinnahmen generiert und nicht in der Lage ist sich zu reproduzieren, wird es sterben. Aus diesem Grund hat jede Zeitschrift ein schönes weibliches Gesicht auf dem Cover. Und das ist der Grund, warum jede werbefinanzierte Online-Nachrichtenquelle zu Clickbait verkommt.
![](https://aprycot.media/wp-content/uploads/faces-1024x284.png)<img src="https://cdn.satellite.earth/856054a1932c9fb70f9ae85bcb6d2d47330babb3cf7ac606c7861a09c8597f61.webp">
#### Eines dieser Gesichter ist anders als die anderen
Das ist auch der Grund, warum sich Feed-basierte Empfehlungsmaschinen in Spielautomaten für deine Dopaminrezeptoren verwandeln. Je länger du an deinem Bildschirm klebst, desto mehr Werbung siehst du, desto mehr Einnahmen werden für die Plattform generiert. Das ist auch der Grund, warum die meisten YouTube-Kanäle zu 7- bis 15-minütigen Kurzvideos mit Vorschaubildern verkommen, die das Gesicht von jemandem zeigen, der gerade auf ein Legostück getreten ist. Kurz genug, um dich zu überzeugen es anzusehen, lang genug, um dich vergessen zu lassen, welches Video du dir eigentlich ansehen wolltest. Wie Ratten, die in hyperpersonalisierten Skinner-Boxen auf Knöpfe drücken, werden wir in Suchtzyklen konditioniert, um die Gewinne der Aktionäre zu maximieren.
### Profitmaximierung
Plattformen sind Unternehmen und für Unternehmen gibt es Anreize die Gewinne der Aktionäre zu maximieren. Gegen Gewinne ist nichts einzuwenden und gegen Aktionäre ist auch nichts einzuwenden. Ich glaube jedoch, dass die Informationsrevolution, in der wir uns befinden, die evolutionäre Landschaft in zwei Teile gespalten hat. Nennen wir diese Landschaften „breit“ und „schmal“.\
Um die Gewinne durch breit angelegte Werbung zu maximieren, müssen Kontroversen und extreme Meinungen auf ein Minimum reduziert werden. Indem man den kleinsten gemeinsamen Nenner anspricht, kommen Politik und Zensur sofort ins Spiel. Umgekehrt müssen Kontroversen und extreme Meinungen maximiert werden, wenn die Gewinne durch schmale, gezielte Werbung erzielt werden sollen. Allein dadurch, dass verschiedenen Untergruppen unterschiedliche Informationen gezeigt werden, werden Polarisierung und Fragmentierung kontinuierlich verstärkt.
<img src="https://cdn.satellite.earth/0d3a88d2700a3c26ed049b09d512a9a35dfc390bc95151e29d6950972114a00e.webp">
Allgemeine Kohäsion vs. algorithmische Spaltung
Diese beiden Extreme sind zwei Seiten der gleichen Medaille. Es mag den Anschein haben, als ginge es um Kabelfernsehen gegen den algorithmischen Newsfeed, aber in Wirklichkeit handelt es sich um zwei unterschiedliche Ansätze, die dasselbe Ziel verfolgen: möglichst viele Menschen vor dem Bildschirm zu halten, damit sie mehr Werbung sehen. Das erste ist ein Beruhigungsmittel, das zweite ein Stimulans.\
Zugegeben, die obige Charakterisierung mag übertrieben sein, aber das Problem bleibt bestehen: Wenn wir nicht direkt für etwas bezahlen, bezahlen wir es indirekt, auf die eine oder andere Weise. Immer.
Der Punkt ist der folgende: Plattformen für freie Meinungsäußerung können nicht existieren. Es kann nur Protokolle der freien Meinungsäußerung geben. Wenn jemand kontrollieren kann, was gesagt wird, wird jemand kontrollieren, was gesagt wird. Wenn du Inhalte überwachen, filtern und zensieren kannst, wirst du Inhalte überwachen, filtern und zensieren.
Alle Plattformen werden mit diesem Problem konfrontiert, ganz gleich wie makellos ihre Absichten sind. Selbst wenn du dich anfangs als Plattform für freie Meinungsäußerung positionierst, wirst du auf lange Sicht gezwungen sein, einzugreifen und zu zensieren. Letztendlich wenn du für Inhalte, die du hostest oder übermittelst, vom Staat haftbar gemacht werden kannst, wirst du auch für Inhalte, die du hostest oder übermittelst, vom Staat haftbar gemacht werden.
### Selbstzensur
Doch lange bevor die staatliche Zensur ihr hässliches Haupt erhebt, wird die abschreckende Wirkung der Selbstzensur zu spüren sein. Wenn andere wegen der Äußerung bestimmter Meinungen enttabuisiert und dämonisiert werden, werden die meisten Menschen sehr vorsichtig sein, diese Meinungen zu äußern. Bewusst und unbewusst bringen wir uns selbst langsam zum Schweigen.
Wenn es um Selbstzensur geht, spielt auch die Werbung eine Rolle. Schließlich würdest du nicht die Hand beißen, die dich füttert, oder? Im schlimmsten Fall sagen dir die Werbetreibenden und Führungskräfte, was gesagt werden darf und was nicht. Sie werden dir sagen, welche Meinungen innerhalb und welche außerhalb des Overton-Fensters liegen. Und wenn sie es nicht tun, wirst du eine fundierte Vermutung anstellen und deine Aussagen entsprechend anpassen.
### Ein Problem und ein Paradoxon
Zurück zum ursprünglichen Problem: Warum können wir Informationen nicht wie eine normale Ware verkaufen? Warum führt der einfache Ansatz – Inhalte hinter eine Bezahlschranke zu stellen – zu so schlechten Ergebnissen? Ich glaube, es gibt zwei Gründe, die ich das „MTX-Problem“ und das „DRM-Paradoxon“ nennen möchte.
Das MTX-Problem, wobei MTX die Abkürzung für „mentale Transaktion“ (mental transaction) ist, bezieht sich auf das Problem der nicht reduzierbaren mentalen Transaktionskosten, die jeder Transaktion innewohnen. Jedes Mal, wenn du auf eine Bezahlschranke stößt, musst du eine bewusste Entscheidung treffen: „Möchte ich dafür bezahlen?“
Wie Szabo überzeugend darlegt, lautet die Antwort in den meisten Fällen, insbesondere wenn die Kosten gering sind, nein. Dafür gibt es keine technischen Gründe, sondern psychologische Gründe. Es stellt sich heraus, dass die Mühe, herauszufinden, ob sich diese Transaktion lohnt oder nicht – ein Prozess, der in deinem Kopf stattfindet – einfach zu groß ist. Wenn man über einen Mikrokauf nachdenken muss, sinkt die Wahrscheinlichkeit, dass man diesen Kauf tätigt, drastisch. Deshalb sind Flatrates und Abonnements der Renner: Man muss nur einmal darüber nachdenken.
Bei den kleinsten Mikrotransaktionen ist dies sogar aus rein wirtschaftlicher Sicht der Fall. Wenn man einen Stundenlohn von 20 USD zugrunde legt und zwei Sekunden lang darüber nachdenkt: „Ist das 21 Sats wert?“, kostet das etwas mehr als 1¢, also mehr als der Preis der betreffenden Mikrotransaktion.\[2\] Das ist sowohl psychologisch als auch wirtschaftlich nicht machbar. Dies ist, kurz gesagt, das MTX-Problem.
Aber das ist nicht das einzige Problem, das die Monetarisierung digitaler Inhalte belastet. Wie bereits erwähnt, gibt es auch das DRM-Paradoxon. DRM, kurz für „Digital-Rechte Management“ (Digital Rights Management), ist ein vergeblicher Versuch, das Kopieren von Informationen zu verhindern. Es sollte sich von selbst verstehen, dass nicht kopierbare Informationen ein Oxymoron sind, aber im Zeitalter von NFTs und vielem anderen Unsinn muss das leider ausdrücklich gesagt werden. Lass es mich also für dich buchstabieren: Man kann keine Informationen erstellen, die nicht kopiert werden können. Punkt. Oder, um es mit den Worten von Bruce Schneier zu sagen: „Der Versuch, digitale Dateien unkopierbar zu machen, ist wie der Versuch, Wasser nicht nass zu machen.“
Es liegt in der Natur der Sache, dass Informationen, wenn sie gelesen werden können, auch kopiert werden können – und zwar mit perfekter Genauigkeit. Kein noch so großer Trick oder künstliche Beschränkungen werden diese Tatsache ändern. Aus diesem Grund werden digitale Artefakte wie Filme und Musik immer kostenlos erhältlich sein. Es ist trivial für jemanden der Zugang zu diesen Artefakten hat, diese zu kopieren – zu Grenzkosten von nahezu Null, wohlgemerkt – und sie anderen zugänglich zu machen. Mit genügend Zeit und Popularität wird also jeder Film, jedes Lied und jedes Dokument für die\
Allgemeinheit kostenlos verfügbar sein. Die Natur der Information lässt kein anderes Ergebnis zu. Daher das Sprichwort: Information will frei sein.
Obwohl der Versuch etwas zu schaffen das es nicht geben kann – Informationen die nicht kopiert werden können – an sich schon paradox ist, meine ich damit nicht das DRM-Paradoxon. Was ich meine, ist etwas viel Lustigeres. Es ist wiederum psychologischer, nicht technischer Natur. Das Paradoxon ist folgendes: Inhalte werden nur dann hinter einer Bezahlschranke bleiben, wenn sie schlecht sind. Wenn sie gut sind, wird sie jemand freilassen.
Wir alle kennen das. Wenn ein Artikel tatsächlich lesenswert ist, wird jemand, der sich hinter der Bezahlschranke befindet, einen Screenshot davon machen und ihn in den sozialen Medien veröffentlichen. Wenn der Film es wert ist angeschaut zu werden, wird er auf verschiedenen Websites verfügbar sein, die Piratenschiffe als ihre Logos haben. Wenn der Song es wert ist gehört zu werden, wird er auf Streaming-Seiten kostenlos zur Verfügung stehen. Nur die schrecklichen Artikel, die obskursten Filme und die Lieder, bei denen einem die Ohren bluten, bleiben hinter Bezahlschranken.
Daraus ergibt sich das Paradoxon: Inhalte bleiben nur dann hinter Bezahlschranken, wenn sie schlecht sind. Wenn sie gut sind, werden sie freigelassen.
Ich persönlich glaube, dass das MTX-Problem ein größeres Problem darstellt als das DRM-Paradoxon. Die traditionelle Lösung für das MTX-Problem ist das Abonnementmodell, wie bei Netflix, Spotify, Amazon und so weiter. Das DRM-Paradoxon bleibt bestehen, aber es stellt sich heraus, dass dies kein Problem ist wenn man den „legitimen“ Zugang zu Informationen bequem genug gestaltet. Die Opportunitätskosten für das Herunterladen, Speichern, Pflegen und Warten einer privaten Liedersammlung sind für die meisten Menschen einfach zu hoch. Die bequemere Lösung ist für das verdammte Spotify-Abo zu bezahlen. Allerdings können wir bereits eines der Probleme erkennen, die mit dem Abonnementmodell verbunden sind. Der folgende Comic beschreibt es gut:
![](https://aprycot.media/wp-content/uploads/piracy.webp)Comic von /u/Hoppy_Doodle
Die Verbreitung von Streaming-Plattformen zwingt dich dazu, ein Netflix-Abonnement, ein Amazon-Prime-Abonnement, ein Hulu-Abonnement, ein Disney-Plus-Abonnement, ein YouTube-Premium-Abonnement und so weiter abzuschließen. Und das war nur das Videostreaming. Den gleichen Abo-Zoo gibt es für Musik, Bücher, Spiele, Newsletter, Blogbeiträge usw.
Und was ist die Lösung?
### Akzeptiere die Natur von Informationen
Die Lösung beginnt mit Akzeptanz. Der Verkauf digitaler Inhalte auf herkömmliche, transaktionale Weise funktioniert nicht oder zumindest nicht sehr gut. Eine Transaktion mit einem digitalen Foto eines Apfels ist etwas ganz anderes als eine Transaktion mit einem physischen Apfel.
George Bernard Shaw hat es am besten gesagt: „Wenn du einen Apfel hast und ich habe einen Apfel und wir tauschen diese Äpfel, dann haben wir beide immer noch jeweils einen Apfel. Aber wenn Sie eine Idee haben und ich eine Idee habe und wir diese Ideen austauschen, dann hat jeder von uns zwei Ideen.“ Da sich digitale Informationen wie eine Idee verhalten, gibt es keinen Grund, sie künstlich zu verknappen. Das gilt nicht nur in philosophischer, sondern auch technischer Hinsicht. Computer sind Kopiermaschinen. Das war schon immer so und wird auch so bleiben. Die einzige Möglichkeit, Informationen von einer Maschine auf eine andere zu übertragen, besteht darin, sie zu kopieren. Dies allein sollte die Sinnlosigkeit der Behandlung von Informationen als physische Objekte offenkundig machen.
Wenn es um die Monetarisierung von Informationen im offenen Web geht, müssen wir unsere Denkweise mit der Natur der Information in Einklang bringen. Wie oben beschrieben, sind Informationen nicht knapp, leicht zu kopieren, leicht zu verändern und wollen frei sein. Ich glaube, dass das richtige Monetarisierungsmodell diese Werte respektieren und ähnliche Eigenschaften haben muss. Es muss offen, transparent, erweiterbar und nicht zuletzt völlig freiwillig sein.
Dieses Modell hat einen Namen: Value-for-Value.
### Wiederbeleben der Straßenmusik
Die Idee ist einfach, klingt aber radikal: Du stellst deine Inhalte kostenlos zur Verfügung, für jeden, ohne Zugangsbeschränkungen. Wenn die Menschen Spaß daran haben, wenn sie einen Nutzen daraus ziehen, dann machst du es den Menschen leicht etwas zurückzugeben.\
Es mag in der heutigen Zeit ungeheuerlich klingen, aber dieses Modell funktioniert seit Tausenden von Jahren. Es ist das Modell der Straßenkünstler, das Modell der Straßenmusikanten, das Modell des freiwilligen Gebens. Im Cyberspace stoßen wir jedoch nicht an die physischen Grenzen der traditionellen Straßenmusikanten. Digitale Inhalte lassen sich auf eine Art und Weise skalieren, wie es bei Darbietungen in der realen Welt nie der Fall sein wird.
Das Value-for Value-Modell stellt das traditionelle Zahlungsmodell auf den Kopf. Traditionell folgt der Genuss der Bezahlung. Beim Value-for-Value-Ansatz folgt die Zahlung dem Genuss – freiwillig. Es steht dir frei, dem Straßenmusiker zuzuhören und weiterzugehen, aber – und das ist etwas was das Publikum intuitiv weiß – wenn du willst, dass die Musik weitergeht, solltest du ein paar Münzen in den Hut werfen.
[Give value back](https://ts.dergigi.com/api/v1/invoices?storeId=3WkiYEG5DaQv7Ak5M2UjUi1pe5FFTPyNF1yAE9CVLNJn&orderId=V4V-busking&checkoutDesc=Value+for+Value%3A+Give+as+much+as+it+is+worth+to+you.¤cy=USD)
Das Schöne an diesem Modell ist, dass es die Anreize neu ausrichtet. Man versucht nicht, die Klicks, die Verweildauer oder irgendeine andere der unzähligen Kennzahlen zu maximieren. Man will dem Publikum einen Mehrwert bieten, und das ist alles. Und wenn das Publikum einen Nutzen daraus gezogen hat, wird ein gewisser Prozentsatz etwas zurückgeben. Alles, was man tun muss, ist zu fragen.
### Eine wertvolle Alternative
Wir stehen erst am Anfang dieses monumentalen Wandels. Ich hoffe, dass sich das Modell „Value for Value“ weiterhin als praktikable Alternative zu Werbung, Zensur, Deplatforming und Demonetisierung durchsetzen wird.
Das Value-for-Value-Modell nimmt das „sie“ aus der Gleichung heraus. Sie filtern, sie zensieren, sie demonetisieren, sie deplatformieren. Es spielt nicht einmal eine Rolle, wer „sie“ sind. Wenn es „sie“ gibt, werden sie einen Weg finden, es zu versauen.
Value-for-Value beseitigt „sie“ und überträgt dir die Verantwortung. Du bist der Herrscher im Reich des Einen, allein verantwortlich für deine Gedanken und deine Sprache. Wenn wir Befreiung (und Erlösung) im Cyberspace wollen, müssen wir dem Einzelnen wieder die Verantwortung übertragen. Wie immer gilt: Freiheit und Unabhängigkeit erfordern Verantwortung.
In der besten aller Welten gibt es für die Schöpfer einen Anreiz, nichts anderes zu tun als zu erschaffen. Man bedient nur sich selbst und diejenigen, die an den Werken interessiert sind. Keine Mittelsmänner. Direkt, von Mensch zu Mensch, Value-for-Value.
### Was uns erwartet
Zugegeben, heute ist es nicht gerade einfach, seine Infrastruktur selbst zu hosten. Es ist einschüchternd, einen eigenen Knotenpunkt (Node) zu betreiben, um Zahlungen auf selbständige Weise zu erhalten. Aber es wird nicht nur einfacher, es wird zunehmend notwendig.
Wir müssen nicht nur alles einfacher machen, sondern uns auch des oben beschriebenen MTX-Problems bewusst sein. Jeder Schritt, der es schafft, die mentalen Transaktionskosten im Ökosystem der Wertschöpfung zu reduzieren, ist ein Schritt in die richtige Richtung.
Die Wertfunktion von Podcasting 2.0 ist ein solcher Schritt. Sie ermöglicht und automatisiert Zahlungen im Minutentakt, ohne dass der Nutzer zusätzlich eingreifen muss. Sobald du eingerichtet bist, wird deine Geldbörse automatisch Zahlungen vornehmen. Ich glaube, dass weitere Iterationen dieser Idee in alle Medientypen integriert werden können, sei es Audio, Video, Bilder, das geschriebene Wort, und so weiter. Ich glaube, dass wir kurz vor der Protokollversion von Patreon stehen: alle Vorteile der Reduzierung der mentalen Transaktionskosten auf Null, ohne die Reibung und die Zensur, die einer plattformbasierten Lösung innewohnen. Ob es in Form von BOLT12 wiederkehrenden Zahlungen oder etwas ganz anderem kommen wird, bleibt abzuwarten. Ich bin jedoch zuversichtlich, dass dies zu gegebener Zeit der Fall sein wird.
### Schlussfolgerung
Nicht nur unser Papiergeld ist kaputt, auch das Monetarisierungsmodell des Internets ist kaputt. Die werbebasierten Plattformen der heutigen Zeit sind auf Engagement durch Spaltung und Polarisierung optimiert und nutzen dunkle Muster und Sucht. Es wird nicht einfach sein, aus den Zwangsschleifen auszubrechen, die für uns eingerichtet wurden, aber dank des selbstverwalteten Tech-Stacks, der derzeit entsteht, gibt es eine praktikable Alternative: das Value-for-Value-Modell.
Das „Straßenmusiker“-Monetarisierungsmodell (busking monetization model) hat in der Vergangenheit viele Jahrhunderte lang funktioniert, und dank Bitcoin und dem Lightning Network bin ich zuversichtlich, dass es auch in der Zukunft noch Jahrhunderte lang funktionieren wird. Wir sind fast am Ziel. Wir müssen nur noch herausfinden, wie wir den Hut richtig auf dem Boden positionieren und wo die besten Plätze in der Stadt sind, um sozusagen aufzutreten.
Value-for-Value löst das DRM-Paradoxon in seiner Gesamtheit und wird – mit dem richtigen Maß an Automatisierung und vernünftigen Vorgaben – auch das MTX-Problem lösen. Wenn wir das richtig hinbekommen, können wir uns vielleicht aus dem evolutionären Überlebenskampf der Plattformen befreien und uns in das quasi unsterbliche Reich der Protokolle begeben.
Es gibt viel zu erforschen, viele Werkzeuge zu entwickeln und viele vorgefasste Meinungen zu zerstören. Direkt vor unseren Augen vollzieht sich ein seismischer Wandel, und ich freue mich darauf, mit euch allen auf den Wellen zu reiten. Vorwärts marsch!
---
*Dies ist ein übersetzter Gastbeitrag von Gigi aus seinem [Blog](https://dergigi.com/). Die geäußerten Meinungen sind ausschließlich seine eigenen und spiegeln nicht notwendigerweise die des Re-Publishers oder Aprycot Media wider. Quelle: https://aprycot.media/blog/freiheit-der-werte/#*
-
@ eac63075:b4988b48
2024-10-21 08:11:11
Imagine sending a private message to a friend, only to learn that authorities could be scanning its contents without your knowledge. This isn't a scene from a dystopian novel but a potential reality under the European Union's proposed "Chat Control" measures. Aimed at combating serious crimes like child exploitation and terrorism, these proposals could significantly impact the privacy of everyday internet users. As encrypted messaging services become the norm for personal and professional communication, understanding Chat Control is essential. This article delves into what Chat Control entails, why it's being considered, and how it could affect your right to private communication.
https://www.fountain.fm/episode/coOFsst7r7mO1EP1kSzV
https://open.spotify.com/episode/0IZ6kMExfxFm4FHg5DAWT8?si=e139033865e045de
### **Sections:**
- **Introduction**
- **What Is Chat Control?**
- **Why Is the EU Pushing for Chat Control?**
- **The Privacy Concerns and Risks**
- **The Technical Debate: Encryption and Backdoors**
- **Global Reactions and the Debate in Europe**
- **Possible Consequences for Messaging Services**
- **What Happens Next? The Future of Chat Control**
- **Conclusion**
---
### **What Is Chat Control?**
"Chat Control" refers to a set of proposed measures by the European Union aimed at monitoring and scanning private communications on messaging platforms. The primary goal is to detect and prevent the spread of illegal content, such as child sexual abuse material (CSAM) and to combat terrorism. While the intention is to enhance security and protect vulnerable populations, these proposals have raised significant privacy concerns.
At its core, Chat Control would require messaging services to implement automated scanning technologies that can analyze the content of messages—even those that are end-to-end encrypted. This means that the private messages you send to friends, family, or colleagues could be subject to inspection by algorithms designed to detect prohibited content.
#### **Origins of the Proposal**
The initiative for Chat Control emerged from the EU's desire to strengthen its digital security infrastructure. High-profile cases of online abuse and the use of encrypted platforms by criminal organizations have prompted lawmakers to consider more invasive surveillance tactics. The European Commission has been exploring legislation that would make it mandatory for service providers to monitor communications on their platforms.
#### **How Messaging Services Work**
Most modern messaging apps, like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others), use end-to-end encryption (E2EE). This encryption ensures that only the sender and the recipient can read the messages being exchanged. Not even the service providers can access the content. This level of security is crucial for maintaining privacy in digital communications, protecting users from hackers, identity thieves, and other malicious actors.
<img src="https://blossom.primal.net/31ace3b729fb9f6b4de286686f31a71db6dd7e3a363f868e1255a6f287eb0b94.png">
#### **Key Elements of Chat Control**
- **Automated Content Scanning**: Service providers would use algorithms to scan messages for illegal content.
- **Circumvention of Encryption**: To scan encrypted messages, providers might need to alter their encryption methods, potentially weakening security.
- **Mandatory Reporting**: If illegal content is detected, providers would be required to report it to authorities.
- **Broad Applicability**: The measures could apply to all messaging services operating within the EU, affecting both European companies and international platforms.
#### **Why It Matters**
Understanding Chat Control is essential because it represents a significant shift in how digital privacy is handled. While combating illegal activities online is crucial, the methods proposed could set a precedent for mass surveillance and the erosion of privacy rights. Everyday users who rely on encrypted messaging for personal and professional communication might find their conversations are no longer as private as they once thought.
---
### **Why Is the EU Pushing for Chat Control?**
The European Union's push for Chat Control stems from a pressing concern to protect its citizens, particularly children, from online exploitation and criminal activities. With the digital landscape becoming increasingly integral to daily life, the EU aims to strengthen its ability to combat serious crimes facilitated through online platforms.
#### **Protecting Children and Preventing Crime**
One of the primary motivations behind Chat Control is the prevention of child sexual abuse material (CSAM) circulating on the internet. Law enforcement agencies have reported a significant increase in the sharing of illegal content through private messaging services. By implementing Chat Control, the EU believes it can more effectively identify and stop perpetrators, rescue victims, and deter future crimes.
Terrorism is another critical concern. Encrypted messaging apps can be used by terrorist groups to plan and coordinate attacks without detection. The EU argues that accessing these communications could be vital in preventing such threats and ensuring public safety.
#### **Legal Context and Legislative Drivers**
The push for Chat Control is rooted in several legislative initiatives:
- **ePrivacy Directive**: This directive regulates the processing of personal data and the protection of privacy in electronic communications. The EU is considering amendments that would allow for the scanning of private messages under specific circumstances.
- **Temporary Derogation**: In 2021, the EU adopted a temporary regulation permitting voluntary detection of CSAM by communication services. The current proposals aim to make such measures mandatory and more comprehensive.
- **Regulation Proposals**: The European Commission has proposed regulations that would require service providers to detect, report, and remove illegal content proactively. This would include the use of technologies to scan private communications.
#### **Balancing Security and Privacy**
EU officials argue that the proposed measures are a necessary response to evolving digital threats. They emphasize the importance of staying ahead of criminals who exploit technology to harm others. By implementing Chat Control, they believe law enforcement can be more effective without entirely dismantling privacy protections.
However, the EU also acknowledges the need to balance security with fundamental rights. The proposals include provisions intended to limit the scope of surveillance, such as:
- **Targeted Scanning**: Focusing on specific threats rather than broad, indiscriminate monitoring.
- **Judicial Oversight**: Requiring court orders or oversight for accessing private communications.
- **Data Protection Safeguards**: Implementing measures to ensure that data collected is handled securely and deleted when no longer needed.
<img src="https://blossom.primal.net/9533aedc9f83564d53633eac1a6d431d1e311028a478dd4b7f3a59b2c449e95a.png">
#### **The Urgency Behind the Push**
High-profile cases of online abuse and terrorism have heightened the sense of urgency among EU policymakers. Reports of increasing online grooming and the widespread distribution of illegal content have prompted calls for immediate action. The EU posits that without measures like Chat Control, these problems will continue to escalate unchecked.
#### **Criticism and Controversy**
Despite the stated intentions, the push for Chat Control has been met with significant criticism. Opponents argue that the measures could be ineffective against savvy criminals who can find alternative ways to communicate. There is also concern that such surveillance could be misused or extended beyond its original purpose.
---
### **The Privacy Concerns and Risks**
While the intentions behind Chat Control focus on enhancing security and protecting vulnerable groups, the proposed measures raise significant privacy concerns. Critics argue that implementing such surveillance could infringe on fundamental rights and set a dangerous precedent for mass monitoring of private communications.
#### **Infringement on Privacy Rights**
At the heart of the debate is the right to privacy. By scanning private messages, even with automated tools, the confidentiality of personal communications is compromised. Users may no longer feel secure sharing sensitive information, fearing that their messages could be intercepted or misinterpreted by algorithms.
#### **Erosion of End-to-End Encryption**
End-to-end encryption (E2EE) is a cornerstone of digital security, ensuring that only the sender and recipient can read the messages exchanged. Chat Control could necessitate the introduction of "backdoors" or weaken encryption protocols, making it easier for unauthorized parties to access private data. This not only affects individual privacy but also exposes communications to potential cyber threats.
#### **Concerns from Privacy Advocates**
Organizations like Signal and Tutanota, which offer encrypted messaging services, have voiced strong opposition to Chat Control. They warn that undermining encryption could have far-reaching consequences:
- **Security Risks**: Weakening encryption makes systems more vulnerable to hacking, espionage, and cybercrime.
- **Global Implications**: Changes in EU regulations could influence policies worldwide, leading to a broader erosion of digital privacy.
- **Ineffectiveness Against Crime**: Determined criminals might resort to other, less detectable means of communication, rendering the measures ineffective while still compromising the privacy of law-abiding citizens.
<img src="https://blossom.primal.net/51722887ebf55c827cc20bcfade3ea9b3628265b7fa3547504b2fff45f34f175.png">
#### **Potential for Government Overreach**
There is a fear that Chat Control could lead to increased surveillance beyond its original scope. Once the infrastructure for scanning private messages is in place, it could be repurposed or expanded to monitor other types of content, stifling free expression and dissent.
#### **Real-World Implications for Users**
- **False Positives**: Automated scanning technologies are not infallible and could mistakenly flag innocent content, leading to unwarranted scrutiny or legal consequences for users.
- **Chilling Effect**: Knowing that messages could be monitored might discourage people from expressing themselves freely, impacting personal relationships and societal discourse.
- **Data Misuse**: Collected data could be vulnerable to leaks or misuse, compromising personal and sensitive information.
#### **Legal and Ethical Concerns**
Privacy advocates also highlight potential conflicts with existing laws and ethical standards:
- **Violation of Fundamental Rights**: The European Convention on Human Rights and other international agreements protect the right to privacy and freedom of expression.
- **Questionable Effectiveness**: The ethical justification for such invasive measures is challenged if they do not significantly improve safety or if they disproportionately impact innocent users.
#### **Opposition from Member States and Organizations**
Countries like Germany and organizations such as the European Digital Rights (EDRi) have expressed opposition to Chat Control. They emphasize the need to protect digital privacy and caution against hasty legislation that could have unintended consequences.
---
### **The Technical Debate: Encryption and Backdoors**
The discussion around Chat Control inevitably leads to a complex technical debate centered on encryption and the potential introduction of backdoors into secure communication systems. Understanding these concepts is crucial to grasping the full implications of the proposed measures.
#### **What Is End-to-End Encryption (E2EE)?**
End-to-end encryption is a method of secure communication that prevents third parties from accessing data while it's transferred from one end system to another. In simpler terms, only the sender and the recipient can read the messages. Even the service providers operating the messaging platforms cannot decrypt the content.
- **Security Assurance**: E2EE ensures that sensitive information—be it personal messages, financial details, or confidential business communications—remains private.
- **Widespread Use**: Popular messaging apps like Signal, Session, SimpleX, Veilid, Protonmail and Tutanota (among others) rely on E2EE to protect user data.
#### **How Chat Control Affects Encryption**
Implementing Chat Control as proposed would require messaging services to scan the content of messages for illegal material. To do this on encrypted platforms, providers might have to:
- **Introduce Backdoors**: Create a means for third parties (including the service provider or authorities) to access encrypted messages.
- **Client-Side Scanning**: Install software on users' devices that scans messages before they are encrypted and sent, effectively bypassing E2EE.
#### **The Risks of Weakening Encryption**
**1. Compromised Security for All Users**
Introducing backdoors or client-side scanning tools can create vulnerabilities:
- **Exploitable Gaps**: If a backdoor exists, malicious actors might find and exploit it, leading to data breaches.
- **Universal Impact**: Weakening encryption doesn't just affect targeted individuals; it potentially exposes all users to increased risk.
**2. Undermining Trust in Digital Services**
- **User Confidence**: Knowing that private communications could be accessed might deter people from using digital services or push them toward unregulated platforms.
- **Business Implications**: Companies relying on secure communications might face increased risks, affecting economic activities.
**3. Ineffectiveness Against Skilled Adversaries**
- **Alternative Methods**: Criminals might shift to other encrypted channels or develop new ways to avoid detection.
- **False Sense of Security**: Weakening encryption could give the impression of increased safety while adversaries adapt and continue their activities undetected.
#### **Signal’s Response and Stance**
Signal, a leading encrypted messaging service, has been vocal in its opposition to the EU's proposals:
- **Refusal to Weaken Encryption**: Signal's CEO Meredith Whittaker has stated that the company would rather cease operations in the EU than compromise its encryption standards.
- **Advocacy for Privacy**: Signal emphasizes that strong encryption is essential for protecting human rights and freedoms in the digital age.
#### **Understanding Backdoors**
A "backdoor" in encryption is an intentional weakness inserted into a system to allow authorized access to encrypted data. While intended for legitimate use by authorities, backdoors pose several problems:
- **Security Vulnerabilities**: They can be discovered and exploited by unauthorized parties, including hackers and foreign governments.
- **Ethical Concerns**: The existence of backdoors raises questions about consent and the extent to which governments should be able to access private communications.
<img src="https://blossom.primal.net/67f45fd79ccdb7e2e2ecdc56297207dc0d1d073acb216857b6165b3bf9906997.png">
#### **The Slippery Slope Argument**
Privacy advocates warn that introducing backdoors or mandatory scanning sets a precedent:
- **Expanded Surveillance**: Once in place, these measures could be extended to monitor other types of content beyond the original scope.
- **Erosion of Rights**: Gradual acceptance of surveillance can lead to a significant reduction in personal freedoms over time.
#### **Potential Technological Alternatives**
Some suggest that it's possible to fight illegal content without undermining encryption:
- **Metadata Analysis**: Focusing on patterns of communication rather than content.
- **Enhanced Reporting Mechanisms**: Encouraging users to report illegal content voluntarily.
- **Investing in Law Enforcement Capabilities**: Strengthening traditional investigative methods without compromising digital security.
####
The technical community largely agrees that weakening encryption is not the solution:
- **Consensus on Security**: Strong encryption is essential for the safety and privacy of all internet users.
- **Call for Dialogue**: Technologists and privacy experts advocate for collaborative approaches that address security concerns without sacrificing fundamental rights.
---
### **Global Reactions and the Debate in Europe**
The proposal for Chat Control has ignited a heated debate across Europe and beyond, with various stakeholders weighing in on the potential implications for privacy, security, and fundamental rights. The reactions are mixed, reflecting differing national perspectives, political priorities, and societal values.
#### **Support for Chat Control**
Some EU member states and officials support the initiative, emphasizing the need for robust measures to combat online crime and protect citizens, especially children. They argue that:
- **Enhanced Security**: Mandatory scanning can help law enforcement agencies detect and prevent serious crimes.
- **Responsibility of Service Providers**: Companies offering communication services should play an active role in preventing their platforms from being used for illegal activities.
- **Public Safety Priorities**: The protection of vulnerable populations justifies the implementation of such measures, even if it means compromising some aspects of privacy.
#### **Opposition within the EU**
Several countries and organizations have voiced strong opposition to Chat Control, citing concerns over privacy rights and the potential for government overreach.
**Germany**
- **Stance**: Germany has been one of the most vocal opponents of the proposed measures.
- **Reasons**:
- **Constitutional Concerns**: The German government argues that Chat Control could violate constitutional protections of privacy and confidentiality of communications.
- **Security Risks**: Weakening encryption is seen as a threat to cybersecurity.
- **Legal Challenges**: Potential conflicts with national laws protecting personal data and communication secrecy.
**Netherlands**
- **Recent Developments**: The Dutch government decided against supporting Chat Control, emphasizing the importance of encryption for security and privacy.
- **Arguments**:
- **Effectiveness Doubts**: Skepticism about the actual effectiveness of the measures in combating crime.
- **Negative Impact on Privacy**: Concerns about mass surveillance and the infringement of citizens' rights.
![](https://blossom.primal.net/fe2c7229d0f6320cbd5c3c8d43713c8ebc4e698e1db91829b7b1f03850162f7c.png)Table reference: Patrick Breyer - Chat Control in 23 September 2024
#### **Privacy Advocacy Groups**
**European Digital Rights (EDRi)**
- **Role**: A network of civil and human rights organizations working to defend rights and freedoms in the digital environment.
- **Position**:
- **Strong Opposition**: EDRi argues that Chat Control is incompatible with fundamental rights.
- **Awareness Campaigns**: Engaging in public campaigns to inform citizens about the potential risks.
- **Policy Engagement**: Lobbying policymakers to consider alternative approaches that respect privacy.
**Politicians and Activists**
**Patrick Breyer**
- **Background**: A Member of the European Parliament (MEP) from Germany, representing the Pirate Party.
- **Actions**:
- **Advocacy**: Actively campaigning against Chat Control through speeches, articles, and legislative efforts.
- **Public Outreach**: Using social media and public events to raise awareness.
- **Legal Expertise**: Highlighting the legal inconsistencies and potential violations of EU law.
#### **Global Reactions**
**International Organizations**
- **Human Rights Watch and Amnesty International**: These organizations have expressed concerns about the implications for human rights, urging the EU to reconsider.
**Technology Companies**
- **Global Tech Firms**: Companies like Apple and Microsoft are monitoring the situation, as EU regulations could affect their operations and user trust.
- **Industry Associations**: Groups representing tech companies have issued statements highlighting the risks to innovation and competitiveness.
<img src="https://blossom.primal.net/e761aa2dd240a1a2e7d943565ccbda427b5a8054bf4e6e17c946711ab6370d5d.png">
#### **The Broader Debate**
The controversy over Chat Control reflects a broader struggle between security interests and privacy rights in the digital age. Key points in the debate include:
- **Legal Precedents**: How the EU's decision might influence laws and regulations in other countries.
- **Digital Sovereignty**: The desire of nations to control digital spaces within their borders.
- **Civil Liberties**: The importance of protecting freedoms in the face of technological advancements.
#### **Public Opinion**
- **Diverse Views**: Surveys and public forums show a range of opinions, with some citizens prioritizing security and others valuing privacy above all.
- **Awareness Levels**: Many people are still unaware of the potential changes, highlighting the need for public education on the issue.
####
The EU is at a crossroads, facing the challenge of addressing legitimate security concerns without undermining the fundamental rights that are central to its values. The outcome of this debate will have significant implications for the future of digital privacy and the balance between security and freedom in society.
---
### **Possible Consequences for Messaging Services**
The implementation of Chat Control could have significant implications for messaging services operating within the European Union. Both large platforms and smaller providers might need to adapt their technologies and policies to comply with the new regulations, potentially altering the landscape of digital communication.
#### **Impact on Encrypted Messaging Services**
**Signal and Similar Platforms**
- **Compliance Challenges**: Encrypted messaging services like Signal rely on end-to-end encryption to secure user communications. Complying with Chat Control could force them to weaken their encryption protocols or implement client-side scanning, conflicting with their core privacy principles.
- **Operational Decisions**: Some platforms may choose to limit their services in the EU or cease operations altogether rather than compromise on encryption. Signal, for instance, has indicated that it would prefer to withdraw from European markets than undermine its security features.
#### **Potential Blocking or Limiting of Services**
- **Regulatory Enforcement**: Messaging services that do not comply with Chat Control regulations could face fines, legal action, or even be blocked within the EU.
- **Access Restrictions**: Users in Europe might find certain services unavailable or limited in functionality if providers decide not to meet the regulatory requirements.
#### **Effects on Smaller Providers**
- **Resource Constraints**: Smaller messaging services and startups may lack the resources to implement the required scanning technologies, leading to increased operational costs or forcing them out of the market.
- **Innovation Stifling**: The added regulatory burden could deter new entrants, reducing competition and innovation in the messaging service sector.
<img src="https://blossom.primal.net/60a9cad69b45cc3ded1d1759312e49a57b3aa997db62e36016f40642943be5e9.png">
#### **User Experience and Trust**
- **Privacy Concerns**: Users may lose trust in messaging platforms if they know their communications are subject to scanning, leading to a decline in user engagement.
- **Migration to Unregulated Platforms**: There is a risk that users might shift to less secure or unregulated services, including those operated outside the EU or on the dark web, potentially exposing them to greater risks.
#### **Technical and Security Implications**
- **Increased Vulnerabilities**: Modifying encryption protocols to comply with Chat Control could introduce security flaws, making platforms more susceptible to hacking and data breaches.
- **Global Security Risks**: Changes made to accommodate EU regulations might affect the global user base of these services, extending security risks beyond European borders.
#### **Impact on Businesses and Professional Communications**
- **Confidentiality Issues**: Businesses that rely on secure messaging for sensitive communications may face challenges in ensuring confidentiality, affecting sectors like finance, healthcare, and legal services.
- **Compliance Complexity**: Companies operating internationally will need to navigate a complex landscape of differing regulations, increasing administrative burdens.
#### **Economic Consequences**
- **Market Fragmentation**: Divergent regulations could lead to a fragmented market, with different versions of services for different regions.
- **Loss of Revenue**: Messaging services might experience reduced revenue due to decreased user trust and engagement or the costs associated with compliance.
#### **Responses from Service Providers**
- **Legal Challenges**: Companies might pursue legal action against the regulations, citing conflicts with privacy laws and user rights.
- **Policy Advocacy**: Service providers may increase lobbying efforts to influence policy decisions and promote alternatives to Chat Control.
#### **Possible Adaptations**
- **Technological Innovation**: Some providers might invest in developing new technologies that can detect illegal content without compromising encryption, though the feasibility remains uncertain.
- **Transparency Measures**: To maintain user trust, companies might enhance transparency about how data is handled and what measures are in place to protect privacy.
####
The potential consequences of Chat Control for messaging services are profound, affecting not only the companies that provide these services but also the users who rely on them daily. The balance between complying with legal requirements and maintaining user privacy and security presents a significant challenge that could reshape the digital communication landscape.
---
### **What Happens Next? The Future of Chat Control**
The future of Chat Control remains uncertain as the debate continues among EU member states, policymakers, technology companies, and civil society organizations. Several factors will influence the outcome of this contentious proposal, each carrying significant implications for digital privacy, security, and the regulatory environment within the European Union.
#### **Current Status of Legislation**
- **Ongoing Negotiations**: The proposed Chat Control measures are still under discussion within the European Parliament and the Council of the European Union. Amendments and revisions are being considered in response to the feedback from various stakeholders.
- **Timeline**: While there is no fixed date for the final decision, the EU aims to reach a consensus to implement effective measures against online crime without undue delay.
#### **Key Influencing Factors**
**1. Legal Challenges and Compliance with EU Law**
- **Fundamental Rights Assessment**: The proposals must be evaluated against the Charter of Fundamental Rights of the European Union, ensuring that any measures comply with rights to privacy, data protection, and freedom of expression.
- **Court Scrutiny**: Potential legal challenges could arise, leading to scrutiny by the European Court of Justice (ECJ), which may impact the feasibility and legality of Chat Control.
**2. Technological Feasibility**
- **Development of Privacy-Preserving Technologies**: Research into methods that can detect illegal content without compromising encryption is ongoing. Advances in this area could provide alternative solutions acceptable to both privacy advocates and security agencies.
- **Implementation Challenges**: The practical aspects of deploying scanning technologies across various platforms and services remain complex, and technical hurdles could delay or alter the proposed measures.
**3. Political Dynamics**
- **Member State Positions**: The differing stances of EU countries, such as Germany's opposition, play a significant role in shaping the final outcome. Consensus among member states is crucial for adopting EU-wide regulations.
- **Public Opinion and Advocacy**: Growing awareness and activism around digital privacy can influence policymakers. Public campaigns and lobbying efforts may sway decisions in favor of stronger privacy protections.
**4. Industry Responses**
- **Negotiations with Service Providers**: Ongoing dialogues between EU authorities and technology companies may lead to compromises or collaborative efforts to address concerns without fully implementing Chat Control as initially proposed.
- **Potential for Self-Regulation**: Messaging services might propose self-regulatory measures to combat illegal content, aiming to demonstrate effectiveness without the need for mandatory scanning.
#### **Possible Scenarios**
**Optimistic Outcome:**
- **Balanced Regulation**: A revised proposal emerges that effectively addresses security concerns while upholding strong encryption and privacy rights, possibly through innovative technologies or targeted measures with robust oversight.
**Pessimistic Outcome:**
- **Adoption of Strict Measures**: Chat Control is implemented as initially proposed, leading to weakened encryption, reduced privacy, and potential withdrawal of services like Signal from the EU market.
**Middle Ground:**
- **Incremental Implementation**: Partial measures are adopted, focusing on voluntary cooperation with service providers and emphasizing transparency and user consent, with ongoing evaluations to assess effectiveness and impact.
#### **How to Stay Informed and Protect Your Privacy**
- **Follow Reputable Sources**: Keep up with news from reliable outlets, official EU communications, and statements from privacy organizations to stay informed about developments.
- **Engage in the Dialogue**: Participate in public consultations, sign petitions, or contact representatives to express your views on Chat Control and digital privacy.
- **Utilize Secure Practices**: Regardless of legislative outcomes, adopting good digital hygiene—such as using strong passwords and being cautious with personal information—can enhance your online security.
<img src="https://blossom.primal.net/1e2c0cd70d88629c54ac84f928ab107f08f698d2c7f0df511277fb44c1480f0a.png">
#### **The Global Perspective**
- **International Implications**: The EU's decision may influence global policies on encryption and surveillance, setting precedents that other countries might follow or react against.
- **Collaboration Opportunities**: International cooperation on developing solutions that protect both security and privacy could emerge, fostering a more unified approach to addressing online threats.
#### **Looking Ahead**
The future of Chat Control is a critical issue that underscores the challenges of governing in the digital age. Balancing the need for security with the protection of fundamental rights is a complex task that requires careful consideration, open dialogue, and collaboration among all stakeholders.
As the situation evolves, staying informed and engaged is essential. The decisions made in the coming months will shape the digital landscape for years to come, affecting how we communicate, conduct business, and exercise our rights in an increasingly connected world.
---
### **Conclusion**
The debate over Chat Control highlights a fundamental challenge in our increasingly digital world: how to protect society from genuine threats without eroding the very rights and freedoms that define it. While the intention to safeguard children and prevent crime is undeniably important, the means of achieving this through intrusive surveillance measures raise critical concerns.
Privacy is not just a personal preference but a cornerstone of democratic societies. End-to-end encryption has become an essential tool for ensuring that our personal conversations, professional communications, and sensitive data remain secure from unwanted intrusion. Weakening these protections could expose individuals and organizations to risks that far outweigh the proposed benefits.
The potential consequences of implementing Chat Control are far-reaching:
- **Erosion of Trust**: Users may lose confidence in digital platforms, impacting how we communicate and conduct business online.
- **Security Vulnerabilities**: Introducing backdoors or weakening encryption can make systems more susceptible to cyberattacks.
- **Stifling Innovation**: Regulatory burdens may hinder technological advancement and competitiveness in the tech industry.
- **Global Implications**: The EU's decisions could set precedents that influence digital policies worldwide, for better or worse.
As citizens, it's crucial to stay informed about these developments. Engage in conversations, reach out to your representatives, and advocate for solutions that respect both security needs and fundamental rights. Technology and policy can evolve together to address challenges without compromising core values.
The future of Chat Control is not yet decided, and public input can make a significant difference. By promoting open dialogue, supporting privacy-preserving innovations, and emphasizing the importance of human rights in legislation, we can work towards a digital landscape that is both safe and free.
In a world where digital communication is integral to daily life, striking the right balance between security and privacy is more important than ever. The choices made today will shape the digital environment for generations to come, determining not just how we communicate, but how we live and interact in an interconnected world.
<img src="https://blossom.primal.net/d3f07d8bc7a49ac291f14eb449879462c76ae407abbe728ddc6f93e11fabe11d.png">
---
Thank you for reading this article. We hope it has provided you with a clear understanding of Chat Control and its potential impact on your privacy and digital rights. Stay informed, stay engaged, and let's work together towards a secure and open digital future.
## Read more:
- https://www.patrick-breyer.de/en/posts/chat-control/
- https://www.patrick-breyer.de/en/new-eu-push-for-chat-control-will-messenger-services-be-blocked-in-europe/
- https://edri.org/our-work/dutch-decision-puts-brakes-on-chat-control/
- https://signal.org/blog/pdfs/ndss-keynote.pdf
- https://tuta.com/blog/germany-stop-chat-control
- https://cointelegraph.com/news/signal-president-slams-revised-eu-encryption-proposal
- https://mullvad.net/en/why-privacy-matters