-

@ e373ca41:b82abcc5
2025-02-23 08:39:06
*Dieser Artikel wurde mit dem* *[Pareto-Client](https://pareto.space/read)* *geschrieben (lesen Sie ihn dort, um die volle Erfahrung zu machen). Er wurde zuerst auf Deutsch von Milosz Matuschek auf* *["Freischwebende Intelligenz"](https://www.freischwebende-intelligenz.org/p/was-bringt-eine-wahl-wenn-das-system)* *veröffentlicht.*
Zur Demokratur, der vom Souverän losgelösten Demokratie, gehört es zum Ritus, dem Volk regelmäßig den Puls zu fühlen. Heute ist wieder so ein Tag. Doch was wird der Souverän am Ende dieses Tages gewonnen haben?
Zur parlamentarischen Demokratie gehört der Wesentlichkeitsgrundsatz. Alle grundrechtswesentlichen, also den Wesenskern von Grundrechten betreffenden Entscheidungen müssen vom Parlament gefällt werden.
Behandelt der Bundestag die wesentlichen Fragen?
* Was hat man im Gremium des Souveräns bisher über Nordstream herausgefunden?
* Was über Spike-Proteine, die 700 Tage nach der Impfung noch aktiv sind?
* Wie erklärt dieses Gremium dem Souverän, dass Bankenbosse, Bundeskanzler und migrantische Straftäter in diesem Land ungleich schwieriger zu verurteilen sind als Bürger, die einen gefährlich mindertalentierten Politiker „Schwachkopf“ nennen?
Wofür einen Bundestag wählen, der nichts zählt, wenn es darauf ankommt und wenig zustande bringt, was dem Bürger nützt, wenn er mal darf? Eine allgemeine Impfpflicht, die auf Politikerseite erst jeder kategorisch ausschloss und dann jeder ebenso salbungsvoll kategorisch befürwortete, scheiterte nur knapp. Aufarbeitung seither?

Legitimation des rituellen Umkehrschwungs? (Foto: [Rosenbusch/X](https://x.com/rosenbusch_/status/1893456799728062698))
\
Aus dem Kontrollgremium des Souveräns gegenüber der Regierung ist eine realitätsverweigernde BRD-Volkskammer geworden. Was kann eine Wahl verändern, wenn das System, welches sie alimentiert und perpetuiert, das Problem ist? Nehmen wir einen Motor, der mit Benzin läuft. Der Motor ist „unsere Demokratie“, Wahlen sind der Betankungsvorgang. Der Bürger betankt heute die Maschinerie mit der Legitimation durch seine Stimme. Doch er weiß nicht mehr, welche Hebel und Gerätschaften der Motor eigentlich antreibt. Dieser Teil befindet sich hinter einem schweren Vorhang. Kann im Sinne von Transparenz und Mit-Verantwortung der Betankungsvorgang guten Gewissens vollzogen werden?
Der Wahlvorgang ist ein Paradebeispiel dessen, was der Soziologe Niklas Luhmann mit „Legitimation durch Verfahren“ beschrieben hat. Der prozessuale Akt, die Auszählung und Verkündung schafft neue Realität und legitimiert die neue Ordnung. Aus der Erfahrung der letzten Jahre in einer autoritären parlamentarischen Demokratur bedeutet die Wahlentscheidung jedoch eine de facto Blanko-Einwilligung in die eigene Versklavung. Im Privatrecht wäre das ein sittenwidriges Ziel, das zur Nichtigkeit des Vertrages führen würde. Wieso sollte das auf der Ebene des politischen Gesellschaftsvertrages dann möglich sein? Und wie kann ein solcher Legitimationsvorgang verantwortet werden?
<https://www.youtube.com/watch?v=Ngy05PFUlo8&t=5s>
Der Parlamentarismus in Deutschland ist für mich gescheitert, wieder einmal. Doch warum soll in einem besetzten, globalistisch durchzogenen NATO-EU-WHO-Konglomerat wie Deutschland auch ausgerechnet der Bürger das letzte Wort haben? Die Legitimationskette von Bürger zu Staat hat zu viele blinde Flecken bekommen. Die Rückverfolgung desaströsen politischen Handelns ist nicht mehr möglich. In Deutschland hat keine gesellschaftliche Instanz, nicht die Politik, nicht die Wissenschaft, nicht die Justiz, nicht die Medien, bisher eine Form der Corona-Aufarbeitung hinbekommen, die diesen Namen verdient. Das ist Sache von unabhängigen, versprengten Stimmen und Publikationen.
Wie ist es um die Legitimität der „Partneroganisationen“ Deutschlands bestellt? Die EU ist unlängst vom Friedensbündnis zum Kriegsbündnis geworden, die Nato kann nicht mal Bündnispartner vor Bündnispartnern schützen und die WHO ist ein durch China und Bill Gates unterwandertes Jointventure für globale Impf- und Kontrollexperimente. All das wird heute erneut zementiert und wenn es gesprengt würde, müsste der Wahlvorgang verboten werden. Im besetzten Land darf nur richtig gewählt werden.
Und deshalb gibt es für mich in diesem System keine Wahl.
Wie ist es bei Ihnen?
Wie stehen Sie zu dieser Wahl? Gehen Sie hin und mit welchen Gefühlen, Erwartungen, Intentionen? Ich freue mich auf Ihren Kommentar.
ANZEIGE:
**Sie suchen nach dem einfachsten Weg, Bitcoin zu kaufen und selbst zu verwahren?**\*\*\*\*\*\* *Die* ***[Relai-App](https://relai.app/de/?af_xp=custom\&source_caller=ui\&pid=INFLUENCER\&is_retargeting=true\&af_click_lookback=7d\&shortlink=eo5zpzew\&af_channel=branded_url\&af_inactivity_window=30d\&c=Milosz%20Matuszek)*** *ist Europas erfolgreichste Bitcoin-App.* ***[Hier](https://relai.app/de/?af_xp=custom\&source_caller=ui\&pid=INFLUENCER\&is_retargeting=true\&af_click_lookback=7d\&shortlink=eo5zpzew\&af_channel=branded_url\&af_inactivity_window=30d\&c=Milosz%20Matuszek)*** *kaufen Sie Bitcoin in wenigen Schritten und können auch Sparpläne einrichten. Niemand hat Zugriff auf Ihre Bitcoin, außer Sie selbst.* ***Relai senkt jetzt die Gebühr auf 1%**, mit dem Referral-Code* ***MILOSZ*** *sparen Sie weitere 10%. (keine Finanzberatung). Disclaimer wg. EU-Mica-Regulierung: Die Dienste von Relai werden ausschließlich für Einwohner der Schweiz und Italiens empfohlen.*
***
***You prefer reading me in English?*** *You can find my first uncensorable articles written with our Pareto client via Nostr,* ***[clicking on this link.](https://pareto.space/u/ashoka@pareto.space)*** *Discover other authors at* ***[Pareto.space/read.](https://pareto.space/read)(click on the Pareto button to see our first authors).*** 
[](https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc33bfce1-1a89-42ff-a89f-e1fbd7edfac4_2382x1272.png)
***
***Join the marketplace of ideas!** We are building a publishing ecosystem on Nostr for citizen-journalism, starting with a client for blogging and newsletter distribution. Sound money and sound information should finally be in the hands of the people, right? Want to learn more about the [Pareto Project](https://pareto.space/en)? Zap me, if you want to contribute (all Zaps go to the project).*
*Are you a publication or journalist and want to be part of it, test us, migrate your content to Nostr? Write to **<team@pareto.space>***
**Not yet on** **[Nostr](https://nostr.com/)** **and want the full experience?** Easy onboarding via **[Start.](https://start.njump.me/)**
-

@ e5de992e:4a95ef85
2025-02-23 07:52:00
A trading log isn't just a record of past trades—it's a tool for learning, improving, and achieving consistency. By keeping a detailed log, you gain insights into your decision-making process, identify patterns, and refine your strategy over time.
Here's why and how to maintain a comprehensive trading log effectively.
---
## 1. The Importance of a Trading Log
- **Track Performance Objectively**
Without a log, it's easy to misremember trades or overestimate success. A detailed log provides accurate data to analyze your progress.
- **Understand Your Strengths and Weaknesses**
By reviewing your log, you can identify what works well and where you need improvement. Patterns in losing trades often highlight common mistakes or emotional triggers.
- **Build Confidence and Trust in Your System**
Seeing a record of rule-based, consistent trades reinforces trust in your strategy. Reviewing past successes can boost morale during challenging periods.
---
## 2. What to Include in Your Trading Log
A detailed trading log should cover both objective data and subjective reflections.
### Objective Data
- **Date and Time:** When the trade was entered and exited.
- **Instrument Traded:** Stock, forex pair, crypto, etc.
- **Entry and Exit Prices:** Precise levels where you opened and closed the trade.
- **Position Size:** Number of shares, contracts, or units traded.
- **Stop Loss and Take Profit Levels:** Risk management details.
- **P/L (Profit or Loss):** Outcome of the trade in dollars or percentage terms.
- **Trade Type:** Long, short, scalping, swing, etc.
### Subjective Reflections
- **Reason for Entering the Trade:** What setup or signal prompted the trade?
- **Emotional State:** How did you feel before, during, and after the trade?
- **Execution Notes:** Did you follow your plan? If not, why?
- **Lessons Learned:** What can you take away from this trade to improve next time?
> **Key Insight:** Both data and reflection are essential for meaningful analysis.
---
## 3. How to Analyze Your Trading Log
1. **Identify Patterns**
Look for common themes in your winning and losing trades.
_Examples:_ Winning trades often align with specific setups, while losing trades frequently result from breaking rules or impulsive decisions.
2. **Evaluate Strategy Effectiveness**
Assess whether your system produces consistent results over time.
Use metrics like win rate, risk-reward ratio, and drawdown to evaluate performance.
3. **Address Emotional Triggers**
Reflect on emotional notes to understand what triggers fear, greed, or hesitation.
Develop strategies to manage emotions based on these insights.
---
## 4. Benefits of Keeping a Trading Log
- **Improved Discipline:**
Writing down each trade reinforces the habit of sticking to your plan.
- **Informed Adjustments:**
Logs provide data-driven insights to refine your strategy.
- **Emotional Control:**
Journaling emotions helps you recognize and address psychological pitfalls.
- **Long-Term Growth:**
By tracking your progress, you can measure improvement over months and years.
> **Key Insight:** A trading log turns mistakes into lessons and successes into repeatable actions.
---
## 5. Tools for Logging Trades
### Manual Logs
- Use a notebook or spreadsheet to record trades.
- **Pros:** Highly customizable, forces you to engage deeply with each entry.
- **Cons:** Time-intensive and less automated.
### Software and Platforms
- Tools like Edgewonk, TraderSync, or Tradervue can streamline the process.
- **Pros:** Automated data collection, advanced analytics, and performance tracking.
- **Cons:** May have a learning curve or subscription costs.
> **Key Insight:** Choose a method that aligns with your workflow and trading style.
---
## 6. Tips for Maintaining a Consistent Trading Log
- **Log Every Trade:**
Don't skip trades, even the ones you'd rather forget. They're often the most valuable for learning.
- **Be Honest:**
Record trades exactly as they happened, including mistakes and rule-breaking.
- **Review Regularly:**
Set aside time weekly or monthly to analyze your log and adjust your approach.
- **Stay Disciplined:**
Treat logging as an essential part of your trading routine.
---
## 7. Conclusion: Your Trading Log is Your Mirror
A detailed trading log is more than just a record—it's a roadmap to success. It provides clarity, accountability, and insights that are essential for continuous improvement.
Start today. Keep a detailed log, review it often, and use it to refine both your strategy and your mindset. Your future self will thank you.
-

@ e5de992e:4a95ef85
2025-02-23 07:46:45
China’s M1 increases a lot, it means there’s more money available for people and businesses to buy things. This can help boost spending and economic growth in the short term. However, if there’s too much money chasing the same amount of goods and services, prices can rise, leading to inflation. Sometimes, a rapid increase in M1 can also signal that banks are lending a lot of money, which might eventually create bubbles in things like real estate or stocks if the growth isn’t managed carefully.
https://tradingeconomics.com/china/money-supply-m1
China’s M1 increases a lot, it means there’s more money available for people and businesses to buy things. This can help boost spending and economic growth in the short term.
-

@ da0b9bc3:4e30a4a9
2025-02-23 07:08:22
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/894609
-

@ e3ba5e1a:5e433365
2025-02-23 06:35:51
My wife and I have six children, making our house a household of eight people. Looking just at the eight of us, how many relationships exist? Well, as a first stab, we could look at how many connections exist between two unique individuals in this family. The mathematical term for this is “8 choose 2”, and the answer is 8\*7/2, or 28\.
Even that doesn’t really capture the answer though, because relationships aren’t just between two people. For example, when my wife and two oldest children are the only ones still awake after the younger kids go to bed, we’ll put on my mature TV shows that they’ll appreciate and watch together. It’s our own little subgroup within the group.
Based on that, we could have groups of 2, 3, 4, all the way up to 8, the group of all of us. If you do the math, this comes up to 247 different subgroups of 2 or more people. That’s a lot of groups for just 8 people.
As a father, this means I’ll never be able to fully understand every set of connections within my family. I may have a good understanding of my own relationship with each child. I also am closely aware of the relationship between our two youngest children, since they’re twins. And I could probably list 20 or so other noteworthy relationships. But I’ll never understand all of them.
For example, months ago I bought a game on Steam for my 3rd and 4th kids. I know they like to play games together, so it was a relationship that I thought I understood well. A few days ago I found out that my oldest had joined them in playing one of these games (Brotato). I’d made the purchase, given it to the kids, and it sparked new relationship and interaction structures without my involvement.
There’s no problem with the fact that I can’t track every interaction in my house. That’s healthy\! The kids are able to discover ways of interacting beyond what I can teach them, learn everything from schoolwork to video games from each other, and overall become more healthy and well-adjusted adults (I hope).
And here’s the important part: the growth of the number of connections is *massive* as the number of participants increases. If we add in another participant, we have 502 groupings. At 10 total participants, it jumps to over 1,000. By the time we get to 100, we’re well into the trillions.
A mathematical and software term for this is *combinatoric complexity*, the massive increase in an output value based on a small increase in the input. The analysis I’m providing could be termed as part of graph theory (for connections of 2, looking at people as *vertices* and connections as *edges*) or set theory (unique subsets, allowing for larger group sizes). But regardless, the point is: the increase in complexity is huge as more people join.
Now consider the global economy. It’s over 8 billion people. There are so many people that the number of groupings is absurd to talk about. Nonetheless, massive numbers of these groupings naturally occur. There are family units, friend circles, individual connections, companies, project teams, sports teams, schools, classes, and millions more. These groups of people form new ways of interacting, express vastly different desires for goods and services, and are capable of producing wide varieties of goods and services themselves.
When you allow this system to run free, beauty emerges. Each node in the graph can manage its own connections. Each *person* is free to make his or her own decisions about association, what to spend time on, what to spend money on, and so on. Each person does so on their own judgement and world view.
Some of these people may make “dumb” decisions. They may “waste” their time and money on useless things. Except: who made that value judgement? Clearly not them, they decided it was worth it. No central planner has the right to override their will.
My point in all this is: as yet another of many reasons in the list of “why people should be free,” we have one more data point: pure math. Central planning will never scale. Central planning will never appreciate the individuality and desires of each person. Only by giving people the freedom to explore their connections to others, discover what they can produce and consume, explore their options, and ultimately make their own decisions, can we have any chance of creating a world where everyone can succeed.
-

@ 78c90fc4:4bff983c
2025-02-23 06:25:25
 
Vor dem Prozess kursierten Gerüchte, Maxwell verstecke sich in einem U-Boot oder auf nahe gelegenen Inseln. Sie besitzt ein U-Boot und hat eine Lizenz dafür
Water Island ist eine 500 Hektar große Landzunge auf den U.S. Virgin Islands. Aufnahmen aus dem Jahr 2012 (auch Video) zeigen einen Teil des Untergrunds und seiner Umgebung.
2005: James und Sara Biden kaufen ein Grundstück auf Water Island, in der Mitte der Insel, für 150.000 Euro. Dieser Teil des Grundstücks wurde in drei Teile aufgeteilt und verkauft. Einer von ihnen ist Scott Green.
Scott Green, ein Lobbyist mit engen Beziehungen zu Joe Biden, kaufte das Grundstück auf den Jungferninseln von James Biden und gewährte ihm dann eine private Hypothek.
Nach dem Kauf machte Joe Biden mindestens dreimal Urlaub auf der winzigen Insel, die einst einen nahe gelegenen U-Boot-Stützpunkt und eine unterirdische Anlage schützte, bevor sie zu einem tropischen Rückzugsort wurde.
Die Bedingungen des Darlehens wurden in den Immobilienunterlagen nicht offengelegt.
Green hat auf mehrere Bitten um Stellungnahme nicht reagiert.
Der Anwalt von James Biden, George Mesires, bestätigte den Erhalt von Fragen, beantwortete sie aber nicht.
Green hat Biden 2.300 Dollar gespendet, aber als er um einen Kommentar gebeten wurde, hat er nicht geantwortet.
Und raten Sie mal, was Green in Washington, D.C., als Auftragnehmer für öffentliche Sicherheits- und Strafverfolgungsbehörden als Teil einer Firma arbeitet, die er 1994 mitbegründet hat.
Es wird noch interessanter!! Scotts Lafayette Group erhält 5,8 Millionen Dollar von der FEMA. 3 TAGE SPÄTER gaben sie James und Sara Biden eine Hypothek von 133.000 für Water Island Land. Und es gibt noch so viel mehr, aber das ist ein anderes Kaninchenloch (ein weiterer Zuschuss für 40 Millionen Dollar).
Unten können Sie eine von Bidens zahlreichen Lügen sehen:
„Ich habe nie mit meinem Sohn oder meinem Bruder oder sonst jemandem etwas besprochen, was mit ihren Geschäften zu tun hat.“
Hunter Biden arbeitete als Energieberater ohne jegliche Erfahrung in diesem Bereich.
James Biden trat der Firma HillStone bei. Und wie durch ein Wunder erhielt das Unternehmen zahlreiche Aufträge von der Bundesregierung (USA, Irak, Puerto Rico, Mosambik usw.)
Kredit: Natly Denise, CaptainBirchShow, Politico
\#EpsteinClientList #EpsteinIsland
<https://x.com/SaladMeToday/status/1892971887006810214>
<https://x.com/RealWsiegrist/status/1893543364676522222>
Perplexity:
Der U-Boot-Stützpunkt in der Nähe von Water Island auf St. Thomas auf den US-Jungferninseln war während des Zweiten Weltkriegs aufgrund seiner Rolle bei der Verteidigung der Karibik und der US-Marineoperationen von großer strategischer Bedeutung.\
\
\### \*\*Strategische Bedeutung der U-Boot-Basis\*\*\
\- Die U-Boot-Basis auf St. Thomas wurde 1941 als Teil einer umfassenderen US-Militärstrategie zur Sicherung der Karibik während des Zweiten Weltkriegs eingerichtet. Diese Region war entscheidend für den Schutz der Schifffahrtswege und die Bekämpfung der deutschen U-Boot-Aktivitäten im Atlantik\[1]\[2].\
\- Der Stützpunkt verfügte über eine umfangreiche Infrastruktur mit drei Piers, Unterkünften für fast 1.000 Mitarbeiter, Lagereinrichtungen, einer Torpedoüberholungswerkstatt und einem bombensicheren Maschinenhaus\[1]. Diese Einrichtungen unterstützten den Betrieb und die Wartung von U-Booten in einem strategisch wichtigen Gebiet.\
\
\###\
\- Water Island, südlich von St. Thomas gelegen, wurde 1944 von der US-Regierung erworben, um die Küstenverteidigung zu stärken\[5]. Fort Segarra, eine unterirdische Festung auf Water Island, wurde zum Schutz der nahe gelegenen U-Boot-Basis auf St. Thomas\[2]\[4] errichtet.\
\- Das Fort umfasste Geschützstellungen, Tunnel, unterirdische Kammern, Kasernen und andere militärische Infrastrukturen. Es wurde jedoch nie fertiggestellt oder voll einsatzfähig, da der Zweite Weltkrieg vor Abschluss der Bauarbeiten beendet wurde\[3]\[6].\
\
\*\*Nachkriegsnutzung\*\*\
\- Nach dem Krieg wurden Fort Segarra und Water Island für verschiedene militärische Tests genutzt, darunter Experimente zur chemischen Kriegsführung, die zwischen 1948 und 1950 durchgeführt wurden\[4]\[6]. Später, im Jahr 1952, wurde die Insel unter zivile Kontrolle gestellt.\
\
\###\
\- Heute sind die Überreste von Fort Segarra und seine unterirdischen Strukturen auf Water Island für Besucher zugänglich. Sie erinnern an die Rolle des Forts beim Schutz des U-Boot-Stützpunkts und an seine strategische Bedeutung während des Zweiten Weltkriegs\[3]\[6].\
\
Zusammenfassend lässt sich sagen, dass der U-Boot-Stützpunkt auf St. Thomas und die damit verbundenen Verteidigungsanlagen auf Water Island entscheidende Komponenten der US-Bemühungen zur Sicherung der Karibik während des Zweiten Weltkriegs waren. Obwohl ihre militärische Nutzung vor Jahrzehnten endete, bleiben sie aufgrund ihres historischen und strategischen Erbes von Bedeutung.\
\
Quellen\
\[1] Militärgeschichte von Water Island https\://history.wica.vi/military-history/\
\[2] Fort Segarra - Flamingo Point USVI Water Island http\://flamingopointusvi.com/water-island\
\[3] Fort Segarra - Virgin Islands - VInow\.com https\://www\.vinow\.com/wi/wi-a/fort-segarra/\
\[4] Fort Segarra - Wikipedia https\://en.wikipedia.org/wiki/Fort\_Segarra\
\[5] Fort Segarra - Jacksonville District - Army.mil https\://www\.saj.usace.army.mil/FortSegarra/\
\[6] Water Island, U.S. Virgin Islands - Wikipedia https\://en.wikipedia.org/wiki/Water\_Island,\_U.S.\_Virgin\_Islands\
\[7] Water Island | Seas the Day Charters USVI https\://seasthedayusvi.com/2022/02/11/exploring-water-island-u-s-virgin-islands-best-kept-secret/\
\[8] Water Island: Aktivitäten und Sehenswürdigkeiten - Jungferninseln - VInow\.com https\://www\.vinow\.com/waterisland/attractions\_wi/
Dazu auch die Sammlung
Epstein
<https://waltisiegrist.locals.com/post/1353380/epstein-oder-wie-leicht-sich-die-wissenschaft-kaufen-laesst>
-

@ a14ef72e:ff35dcf3
2025-02-23 04:39:58
If this works, I will take it as a sign that I can make long form posts here. But I haven't been asked for a private key. Will nos2x take care of that? Let's see...
-

@ 641d8c39:1224c8d3
2025-02-23 00:17:46
A specter is haunting the modern world, the specter of crypto anarchy.
Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the True Name, or legal identity, of the other. Interactions over networks will be untraceable, via extensive re-routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret, and will even alter the nature of trust and reputation.
The technology for this revolution--and it surely will be both a social and economic revolution--has existed in theory for the past decade. The methods are based upon public-key encryption, zero-knowledge interactive proof systems, and various software protocols for interaction, authentication, and verification. The focus has until now been on academic conferences in Europe and the U.S., conferences monitored closely by the National Security Agency. But only recently have computer networks and personal computers attained sufficient speed to make the ideas practically realizable. And the next ten years will bring enough additional speed to make the ideas economically feasible and essentially unstoppable. High-speed networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band transmitters, multi-MIPS personal computers, and encryption chips now under development will be some of the enabling technologies.
The State will of course try to slow or halt the spread of this technology, citing national security concerns, use of the technology by drug dealers and tax evaders, and fears of societal disintegration. Many of these concerns will be valid; crypto anarchy will allow national secrets to be trade freely and will allow illicit and stolen materials to be traded. An anonymous computerized market will even make possible abhorrent markets for assassinations and extortion. Various criminal and foreign elements will be active users of CryptoNet. But this will not halt the spread of crypto anarchy.
Just as the technology of printing altered and reduced the power of medieval guilds and the social power structure, so too will cryptologic methods fundamentally alter the nature of corporations and of government interference in economic transactions. Combined with emerging information markets, crypto anarchy will create a liquid market for any and all material which can be put into words and pictures. And just as a seemingly minor invention like barbed wire made possible the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier West, so too will the seemingly minor discovery out of an arcane branch of mathematics come to be the wire clippers which dismantle the barbed wire around intellectual property.
Arise, you have nothing to lose but your barbed wire fences!A specter is haunting the modern world, the specter of crypto anarchy.
Computer technology is on the verge of providing the ability for individuals and groups to communicate and interact with each other in a totally anonymous manner. Two persons may exchange messages, conduct business, and negotiate electronic contracts without ever knowing the True Name, or legal identity, of the other. Interactions over networks will be untraceable, via extensive re-routing of encrypted packets and tamper-proof boxes which implement cryptographic protocols with nearly perfect assurance against any tampering. Reputations will be of central importance, far more important in dealings than even the credit ratings of today. These developments will alter completely the nature of government regulation, the ability to tax and control economic interactions, the ability to keep information secret, and will even alter the nature of trust and reputation.
The technology for this revolution--and it surely will be both a social and economic revolution--has existed in theory for the past decade. The methods are based upon public-key encryption, zero-knowledge interactive proof systems, and various software protocols for interaction, authentication, and verification. The focus has until now been on academic conferences in Europe and the U.S., conferences monitored closely by the National Security Agency. But only recently have computer networks and personal computers attained sufficient speed to make the ideas practically realizable. And the next ten years will bring enough additional speed to make the ideas economically feasible and essentially unstoppable. High-speed networks, ISDN, tamper-proof boxes, smart cards, satellites, Ku-band transmitters, multi-MIPS personal computers, and encryption chips now under development will be some of the enabling technologies.
The State will of course try to slow or halt the spread of this technology, citing national security concerns, use of the technology by drug dealers and tax evaders, and fears of societal disintegration. Many of these concerns will be valid; crypto anarchy will allow national secrets to be trade freely and will allow illicit and stolen materials to be traded. An anonymous computerized market will even make possible abhorrent markets for assassinations and extortion. Various criminal and foreign elements will be active users of CryptoNet. But this will not halt the spread of crypto anarchy.
Just as the technology of printing altered and reduced the power of medieval guilds and the social power structure, so too will cryptologic methods fundamentally alter the nature of corporations and of government interference in economic transactions. Combined with emerging information markets, crypto anarchy will create a liquid market for any and all material which can be put into words and pictures. And just as a seemingly minor invention like barbed wire made possible the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier West, so too will the seemingly minor discovery out of an arcane branch of mathematics come to be the wire clippers which dismantle the barbed wire around intellectual property.
Arise, you have nothing to lose but your barbed wire fences!
https://groups.csail.mit.edu/mac/classes/6.805/articles/crypto/cypherpunks/may-crypto-manifesto.html
-

@ 6260f29f:2ee2fcd4
2025-02-22 22:46:27
# A title before again
```js
import React, { useEffect, useState } from 'react';
import dynamic from 'next/dynamic';
import { Dialog } from 'primereact/dialog';
import { track } from '@vercel/analytics';
import { LightningAddress } from '@getalby/lightning-tools';
import { useToast } from '@/hooks/useToast';
import { useSession } from 'next-auth/react';
import { ProgressSpinner } from 'primereact/progressspinner';
import axios from 'axios';
import GenericButton from '@/components/buttons/GenericButton';
import useWindowWidth from '@/hooks/useWindowWidth';
import { useRouter } from 'next/router';
const Payment = dynamic(
() => import('@getalby/bitcoin-connect-react').then((mod) => mod.Payment),
{ ssr: false }
);
const ResourcePaymentButton = ({ lnAddress, amount, onSuccess, onError, resourceId }) => {
const [invoice, setInvoice] = useState(null);
const [isLoading, setIsLoading] = useState(false);
const { showToast } = useToast();
const { data: session, status } = useSession();
const [dialogVisible, setDialogVisible] = useState(false);
const router = useRouter();
const windowWidth = useWindowWidth();
const isMobile = windowWidth < 768;
useEffect(() => {
let intervalId;
if (invoice) {
intervalId = setInterval(async () => {
const paid = await invoice.verifyPayment();
if (paid && invoice.preimage) {
clearInterval(intervalId);
// handle success
handlePaymentSuccess({ paid, preimage: invoice.preimage });
}
}, 2000);
} else {
console.error('no invoice');
}
return () => {
if (intervalId) {
clearInterval(intervalId);
}
};
}, [invoice]);
const fetchInvoice = async () => {
setIsLoading(true);
try {
const ln = new LightningAddress(lnAddress);
await ln.fetch();
const invoice = await ln.requestInvoice({ satoshi: amount });
setInvoice(invoice);
setDialogVisible(true);
} catch (error) {
console.error('Error fetching invoice:', error);
showToast('error', 'Invoice Error', 'Failed to fetch the invoice.');
if (onError) onError(error);
}
setIsLoading(false);
};
const handlePaymentSuccess = async (response) => {
try {
const purchaseData = {
userId: session.user.id,
resourceId: resourceId,
amountPaid: parseInt(amount, 10)
};
const result = await axios.post('/api/purchase/resource', purchaseData);
if (result.status === 200) {
track('Resource Payment', { resourceId: resourceId, userId: session?.user?.id });
if (onSuccess) onSuccess(response);
} else {
throw new Error('Failed to update user purchases');
}
} catch (error) {
console.error('Error updating user purchases:', error);
showToast('error', 'Purchase Update Failed', 'Payment was successful, but failed to update user purchases.');
if (onError) onError(error);
}
setDialogVisible(false);
};
return (
<>
<GenericButton
label={`${amount} sats`}
icon="pi pi-wallet"
onClick={() => {
if (status === 'unauthenticated') {
console.log('unauthenticated');
router.push('/auth/signin');
} else {
fetchInvoice();
}
}}
disabled={isLoading}
severity='primary'
rounded
className={`text-[#f8f8ff] text-sm ${isLoading ? 'hidden' : ''}`}
/>
{isLoading && (
<div className='w-full h-full flex items-center justify-center'>
<ProgressSpinner
style={{ width: '30px', height: '30px' }}
strokeWidth="8"
animationDuration=".5s"
/>
</div>
)}
<Dialog
visible={dialogVisible}
onHide={() => setDialogVisible(false)}
header="Make Payment"
style={{ width: isMobile ? '90vw' : '50vw' }}
>
{invoice ? (
<Payment
invoice={invoice.paymentRequest}
onPaid={handlePaymentSuccess}
paymentMethods='all'
title={`Pay ${amount} sats`}
/>
) : (
<p>Loading payment details...</p>
)}
</Dialog>
</>
);
};
export default ResourcePaymentButton;
```
-

@ fc481c65:e280e7ba
2025-02-22 22:22:14
**Math is the formalization of a human idea**
Mathematics is a broad field of study that involves the investigation of patterns, quantities, structures, and changes in the abstract form as well as their real-world applications. It is foundational to a variety of disciplines including science, engineering, medicine, and the social sciences, providing a framework for reasoning, problem-solving, and understanding the universe.
<iframe title="The Map of Mathematics" src="https://www.youtube.com/embed/OmJ-4B-mS-Y?feature=oembed" height="113" width="200" allowfullscreen="" allow="fullscreen" style="aspect-ratio: 1.76991 / 1; width: 100%; height: 100%;"></iframe>
Mathematics is composed of many subfields, including but not limited to:
1. **Arithmetic:** The study of numbers and the basic operations on them: addition, subtraction, multiplication, and division.
2. **Algebra:** The study of symbols and the rules for manipulating these symbols; it is a unifying thread of almost all of mathematics.
3. **Geometry:** The study of shapes, sizes, and properties of space.
4. **Calculus:** The study of change in mathematical functions and models, dealing with limits, derivatives, integrals, and infinite series.
5. **Statistics:** The study of data collection, analysis, interpretation, presentation, and organization.
6. **Number Theory:** The study of properties and relationships of numbers, especially the integers.
7. **Topology:** The study of properties that remain constant through continuous deformations, such as stretching and bending, but not tearing or gluing.
8. **Applied Mathematics:** Uses mathematical methods and reasoning to solve real-world problems in business, science, engineering, and other fields.
Mathematics is both ancient and modern; it has a rich history stretching back thousands of years, yet it continues to develop and evolve today, with new theories, discoveries, and applications constantly emerging. It is both a rigorous discipline in its own right and an essential tool used throughout the sciences and beyond.
## Pure and Applied Mathematics
Pure mathematics and applied mathematics represent two broad categories within the field of mathematics, each with its focus, methodologies, and applications. The distinction between them lies in their primary objectives and the way mathematical theories are utilized.
[[Attachments/01233372a59d2dc17b937c38319d672f_MD5.jpeg|Open: Pasted image 20240405125055.png]]
![[Attachments/01233372a59d2dc17b937c38319d672f_MD5.jpeg]]
#### Pure Mathematics
Pure mathematics is concerned with the study of mathematical concepts independent of any application outside mathematics. It is motivated by a desire to understand abstract principles and the properties of mathematical structures. The pursuit in pure mathematics is knowledge for its own sake, not necessarily aiming to find immediate practical applications. Pure mathematicians often focus on proving theorems and exploring theoretical frameworks, driven by curiosity and the aesthetic appeal of mathematics itself.
Key areas within pure mathematics include:
- **Algebra:** The study of symbols and the rules for manipulating these symbols.
- **Geometry:** The investigation of the properties of space and figures.
- **Analysis:** The rigorous formulation of calculus, focusing on limits, continuity, and infinite series.
- **Number Theory:** The study of the properties of numbers, particularly integers.
- **Topology:** The study of properties preserved through deformations, twistings, and stretchings of objects.
#### Applied Mathematics
Applied mathematics, on the other hand, is focused on the development and practical use of mathematical methods to solve problems in other areas, such as science, engineering, technology, economics, business, and industry. Applied mathematics is deeply connected with empirical research and the application of mathematical models to real-world situations. It involves the formulation, study, and use of mathematical models and seeks to make predictions, optimize solutions, and develop new approaches based on mathematical theory.
Key areas within applied mathematics include:
- **Differential Equations:** Used to model rates of change in applied contexts.
- **Statistics and Probability:** The study of data, uncertainty, and the quantification of the likelihood of events.
- **Computational Mathematics:** The use of algorithmic techniques for solving mathematical problems more efficiently, especially those that are too large for human numerical capacity.
- **Mathematical Physics:** The application of mathematics to solve problems in physics and the development of mathematical methods for such applications.
## Is Mathematics discovered or Invented
The question of whether mathematics is discovered or invented is a philosophical one that has sparked debate among mathematicians, philosophers, and scientists for centuries. Both viewpoints offer compelling arguments, and the distinction often hinges on one's perspective on the nature of mathematical objects and the universality of mathematical truths.
<iframe title="Is math discovered or invented? - Jeff Dekofsky" src="https://www.youtube.com/embed/X_xR5Kes4Rs?feature=oembed" height="113" width="200" allowfullscreen="" allow="fullscreen" style="aspect-ratio: 1.76991 / 1; width: 100%; height: 100%;"></iframe>
### Mathematics as Discovered
Those who argue that mathematics is discovered believe that mathematical truths exist independently of human thought and that mathematicians uncover these truths through investigation and reasoning. This viewpoint suggests that mathematical concepts like numbers, geometrical shapes, and even more abstract ideas have a reality that transcends human invention. The consistency of mathematical laws across cultures and times, and their applicability in accurately describing the natural world, supports the notion that mathematics is a universal truth waiting to be discovered. According to this perspective, mathematical structures exist in some abstract realm, and humans merely uncover aspects of this pre-existing world.
#### Mathematics as Invented
On the other hand, the viewpoint that mathematics is invented centers on the idea that mathematical concepts are human creations, designed to describe and understand the world. According to this perspective, mathematical theories and structures are the products of human thought, created to serve specific purposes in science, engineering, and other fields. This view emphasizes the role of creativity and invention in the development of mathematical ideas, suggesting that different cultures or species might develop entirely different mathematical systems depending on their needs and experiences. Proponents of this view point to the variety of mathematical systems (such as different geometries or number systems) that have been invented to solve particular types of problems, arguing that this diversity is evidence of mathematics being a human invention.
#### A Middle Ground
Some argue for a middle ground, suggesting that while the basic elements of mathematics are discovered, the development of complex mathematical theories and the choice of which aspects to study or develop further involve human invention and creativity. This perspective acknowledges the intrinsic properties of mathematical objects while also recognizing the role of human ingenuity in shaping the field of mathematics.
#### Conclusion
The debate between discovery and invention in mathematics may never be conclusively resolved, as it touches on deep philosophical questions about the nature of reality and the human mind's relationship to it. Whether one views mathematics as discovered or invented often reflects deeper beliefs about the world and our place within it.
## Axioms
a particular mathematical system or theory. They serve as the foundational building blocks from which theorems and other mathematical truths are derived. Axioms are assumed to be self-evident, and their selection is based on their ability to produce a coherent and logically consistent framework for a body of mathematical knowledge.
In the context of different branches of mathematics, axioms can vary significantly:
- **In Euclidean geometry,** one of the most famous sets of axioms are Euclid's postulates, which include statements like "A straight line segment can be drawn joining any two points," and "All right angles are congruent."
- **In algebra,** the field axioms define the properties of operations like addition and multiplication over sets of numbers.
- **In set theory,** Zermelo-Fraenkel axioms (with the Axiom of Choice) are a set of axioms used to establish a foundation for much of modern mathematics.
The role of axioms has evolved throughout the history of mathematics. Initially, they were considered self-evident truths, but as mathematics has developed, the emphasis has shifted to viewing axioms more as arbitrary starting points chosen for their usefulness in building a mathematical theory. This shift allows for the creation of different, sometimes non-intuitive, mathematical frameworks such as non-Euclidean geometries, which arise from altering Euclid's original postulates.
**Everything in maths is constructed based on Axioms, not observation of the scientific method!** It's based only on the human logic reasoning. **And the universe doesn't five a fuck to fit inside human logic reasoning.**
<iframe title="The paradox at the heart of mathematics: Gödel's Incompleteness Theorem - Marcus du Sautoy" src="https://www.youtube.com/embed/I4pQbo5MQOs?feature=oembed" height="113" width="200" allowfullscreen="" allow="fullscreen" style="aspect-ratio: 1.76991 / 1; width: 100%; height: 100%;"></iframe>
## Mathematics is not a Science
Mathematics and science are deeply interconnected, but they are distinguished by their fundamental approaches, methodologies, and objectives. The distinction between mathematics as a formal science and other natural or empirical sciences like physics, biology, and chemistry lies in the nature of their inquiry and validation methods.
**Maths doesn't need to prove itself through the scientific method, it only needs axioms, logic, and previous definitions.**
- **Mathematics:** Uses deduction as a primary tool. Starting from axioms and definitions, mathematicians use logical reasoning to derive theorems and propositions. The validity of mathematical statements is determined through proofs, which are arguments that demonstrate their truth within the context of axiomatic systems.
- **Science:** Employs the scientific method, which involves hypothesis formation, experimentation, observation, and the modification of hypotheses based on empirical evidence. Scientific theories and laws are validated by their ability to predict and explain phenomena in the natural world, and they are always subject to revision in light of new evidence.
### Objectives
- **Mathematics:** Aims to create a coherent set of rules and structures that can explain and predict outcomes within abstract systems. Its primary goal is not to describe the physical world but to explore the properties and possibilities of mathematical structures.
- **Science:** Aims to understand and describe the universe. The goal is to produce a body of knowledge that explains natural phenomena and can predict outcomes based on empirical evidence.
In summary, while mathematics is often used as a tool in science to model and solve problems, its focus on abstract reasoning and logical proof distinguishes it from the empirical methodologies of the natural sciences. This fundamental difference in approach and objective is why mathematics is considered a formal science or a branch of knowledge distinct from natural or physical sciences, which are based on empirical evidence and experimental validation.
-

@ fc481c65:e280e7ba
2025-02-22 22:09:56
Starting with the basics, #statistics is a branch of #mathematics that deals with collecting, analysing, interpreting, presenting, and organising #data. It provides a way to make sense of data, see patterns, and make decisions based on data analysis. Here's a brief overview of some fundamental concepts in statistics:
### 1. Types of Statistics
- **Descriptive Statistics**: Involves summarising and organising data so it can be easily understood. Common measures include mean (average), median (middle value), mode (most frequent value), variance (measure of how spread out numbers are), and standard deviation (average distance from the mean).
- **Inferential Statistics**: Involves making predictions or inferences about a population based on a sample. This includes hypothesis testing, confidence intervals, and regression analysis.
### 2. Types of Data
- **Qualitative Data** (Categorical): Data that describes qualities or characteristics that cannot be measured with numbers, such as colors, names, labels, and yes/no responses.
- **Quantitative Data**: Data that can be measured and expressed numerically, including age, height, salary, and temperature. It can be further divided into discrete data (countable items, like the number of students in a class) and continuous data (measurable items, like height).
### 3. Measures of Central Tendency
- **Mean**: The average of a data set, found by adding all numbers and dividing by the count of numbers.
- **Median**: The middle value when a data set is ordered from least to greatest; if there’s an even number of observations, it is the average of the two middle numbers.
- **Mode**: The most frequently occurring value in a data set.
### 4. Measures of Spread
- **Range**: The difference between the highest and lowest values in a data set.
- **Variance**: Measures how far each number in the set is from the mean and thus from every other number in the set.
- **Standard Deviation**: The square root of the variance, providing a measure of the spread of a distribution of values.
### 5. Probability
Probability measures the likelihood of an event occurring, ranging from 0 (impossible) to 1 (certain). Understanding probability is essential for inferential statistics and making predictions based on data.
### 6. Sampling and Data Collection
- **Population**: The entire group that you want to draw conclusions about.
- **Sample**: A subset of the population, selected for the actual study. It’s crucial for the sample to be representative of the population to make accurate inferences.
### 7. Hypothesis Testing
This is a method of making decisions or inferences about population parameters based on sample statistics. It involves:
- Formulating a null hypothesis (no effect) and an alternative hypothesis (some effect).
- Calculating a test statistic based on the sample data.
- Using the test statistic to decide whether to reject the null hypothesis in favor of the alternative.
-

@ ee7e3590:5602f192
2025-02-22 21:54:14
Laws, like living organisms, evolve far beyond their creators' intentions. Few examples illustrate this phenomenon more dramatically than the Federal Arbitration Act of 1925 (FAA) – a modest 14-page statute that transformed from a specialized commercial tool into a legal juggernaut that touches nearly every American's life, usually without them knowing it.
## The Problem That Sparked a Revolution
Picture America in the early 1920s. The economy was booming after World War I. Interstate commerce was expanding rapidly. And businesses were drowning in a sea of litigation.
The courts were hopelessly clogged. Commercial disputes dragged on for 18 to 24 months – an eternity in business time. Worse yet, judges routinely tossed out arbitration agreements, viewing them as affronts to judicial authority. A 1924 study by the New York Chamber of Commerce found that 72% of businesses avoided arbitration clauses altogether, knowing courts wouldn't honor them.
The situation created a perfect storm: businesses needed faster resolution systems, courts needed relief from overwhelming caseloads, and a legal reform movement was gaining steam.
## A Solution Born of Pragmatism, Not Ideology
The FAA wasn't controversial legislation. It wasn't a partisan battleground. It was, in the eyes of its drafters, simply practical.
The bill's architecture came primarily from the New York Arbitration Society – a group of corporate attorneys and academics who modeled it after existing New York state law. Their draft established three key principles that remain the FAA's backbone today:
1. Pre-dispute arbitration agreements would be enforceable
2. Courts could pause litigation in favor of arbitration
3. Clear procedures would govern arbitrator appointment and award enforcement
The business community rallied behind the bill. The U.S. Chamber of Commerce and National Association of Manufacturers led lobbying efforts, promising $500 million in annual savings from reduced litigation costs. Even legal luminaries like future Supreme Court Justice Charles Evans Hughes endorsed it, calling arbitration "the lifeblood of commercial justice."
## What Few Remember: The Original Limitations
Here's what's been lost to history: the FAA was deliberately limited in scope. It was designed for disputes between businesses of relatively equal power – not for conflicts between corporations and individuals.
The legislative record makes this clear. The New York Arbitration Society's 1924 memorandum explicitly stated the Act "shall not apply to contracts of adhesion or consumer transactions." Senator Wesley Jones, a supporter, emphasized on the Senate floor that the bill excluded "contracts of adhesion" from coverage.
To address concerns from progressives and labor groups, drafters added specific limitations:
- A labor exemption excluding "contracts of employment of seamen, railroad employees, or any other class of workers engaged in foreign or interstate commerce"
- Non-retroactivity provisions ensuring it wouldn't disrupt existing litigation rights
Even with these safeguards, the bill faced opposition. Senator Henrik Shipstead warned that "forced arbitration" would become "a tool of oppression in the hands of trusts." The American Federation of Labor expressed concerns that the Act's commerce clause foundation could later be weaponized against workers.
As it turns out, they were right.
## The Supreme Court's Remarkable Reinvention
For decades, courts interpreted the FAA narrowly, applying it primarily to business-to-business disputes in industries like maritime shipping, commodities trading, and equipment leasing. But beginning in the 1980s, the Supreme Court dramatically expanded the FAA's reach through a series of landmark decisions.
The transformative shift happened in three waves:
**First came preemption.** In *Southland Corp. v. Keating* (1984), the Court held that the FAA applied in state courts, overriding contrary state policies. This federalized arbitration law, preventing states from protecting their citizens through consumer-friendly legislation.
**Next came expansion to consumers and employees.** *Circuit City Stores, Inc. v. Adams* (2001) narrowed the labor exemption to transportation workers only, subjecting most employment disputes to arbitration despite clear evidence that Congress intended a broader exclusion.
**Finally came class action waivers.** *AT&T Mobility v. Concepcion* (2011) and *Epic Systems* (2018) allowed companies to prohibit collective actions through arbitration agreements, effectively immunizing them from accountability for widespread but individually minor harms.
This judicial rewriting turned a law meant to facilitate dispute resolution between commercial equals into a powerful shield against liability for corporations in their dealings with employees and consumers.
## The Modern Reality: Unintended Consequences
Today, arbitration clauses appear everywhere: employment contracts, credit card agreements, nursing home admissions, rideshare apps, and countless other consumer services. Most Americans are bound by dozens of arbitration agreements without realizing it.
These modern clauses bear little resemblance to what the FAA's drafters envisioned:
- They're typically buried in non-negotiable contracts of adhesion
- They're often coupled with class action waivers, forcing individuals to pursue claims alone
- They frequently allow the corporation to select the arbitrator and set the rules
- They usually maintain confidentiality, preventing public awareness of systematic wrongdoing
The result? A parallel legal system that operates largely in the shadows, outside public scrutiny, where corporations hold structural advantages at every stage.
## Is There a Path Forward?
The story of the FAA reveals something profound about American governance: even well-intentioned legislation can be radically transformed by judicial interpretation. A law designed to solve a specific commercial problem in 1925 has become a cornerstone of corporate immunity in 2025.
Reform efforts have struggled. The Arbitration Justice Act and similar legislation have repeatedly stalled in Congress. State attempts to regulate arbitration face preemption challenges. And with each Supreme Court decision, the doctrine becomes more entrenched.
Some hope lies in creative workarounds. Mass arbitration campaigns, where thousands of individuals file simultaneous claims, have forced some companies to reconsider their arbitration strategies. Consumer advocacy groups have pressured companies like Google and Airbnb to modify their most egregious arbitration terms.
But these are bandages on a structural wound. True reform would require either congressional action explicitly limiting the FAA's scope or a dramatic shift in the Supreme Court's interpretation—neither of which appears imminent.
## The Lesson Worth Learning
The FAA's story isn't just about arbitration. It's about how America's legal system evolves—sometimes in directions no one intended or predicted. It demonstrates how seemingly technical procedural reforms can fundamentally reshape substantive rights. And it reveals the tremendous power of courts to transform the meaning of legislative text over time.
As we debate judicial philosophy and the role of courts in interpreting statutes, the FAA stands as a cautionary tale of how far judicial interpretation can stray from original intent—and how difficult it can be to correct course once that interpretation becomes entrenched.
The 14-page law passed with bipartisan support in 1925 to help businesses resolve their disputes efficiently has become one of the most powerful corporate liability shields in American law. That transformation wasn't inevitable—it was the product of specific judicial choices that prioritized efficiency over access to justice.
The question now is whether we can restore the balance the original drafters intended, or whether the FAA will continue its evolution into something they would scarcely recognize.
-

@ df478568:2a951e67
2025-02-22 20:29:43

I shop the bitcoin circular economy as much as I can. Maybe "shop" isn't the best way to describe it. Shopping is a behavior typical of fiat maxis. they drive fancy leases and shop 'till they drop. This season's fashion must-have is next season's trash. Bitcoiners don't shop, we replenish supplies. Our goal is to get the best value for our sats. Our goal to hodl our sats as long as possible.
Yesterday, I shoveled a [ton of compost](nostr:nevent1qvzqqqqqqypzph68s45y080zdd9g8sdacnd6kcd4ejpwrgcju2eghjq45y4f28n8qqs24rrm3u2wvf24ad8xkj2xh8nuq2lz7urnd3lzrpqlstmsp4r29hsug39jw) for my garden. If taking showers mean's I', short bitcoin, so be it. I also happened to get my soap from Soapminer delivered to my P.O. Box the day before. What better way is there to test this soap than after shoveling some shit? It was perfect timing.
## Soapminer Sells Soap Made From Beef Tallow
Soapminer is a nostr rounder I've seen online every timestamp in a while. As the name suggests, he makes soap and sells it for sats. He's not the only soap seller on nostr, but something stands out about this soap. He uses beef tallow, the stuff McDonald's used for french fries back in the day. I use it to cook. It's basically beef lard.
So this pleb makes soap and markets it to people who talk about beef and bitcoin. That's better than Fight Club. Then [I heard Matt Odell say it was pretty good](https://fountain.fm/clip/6GHDdmcwMg47mz0xNpVb). I already thought about spending sats on this soap, but now I had a testimonial from a man I have listened to for about six years. **Can you say Web of Trust baby?**
I no soap and suds expert. I have years of soapo sing experience, but I never thought about what commercial soap is made with. I assumed it was like Fight Club like how I assumed the dollar was backed by gold in high school. Both these statements are false. Fiat soap is made with fiat fuckery. I tried looking for the ingredients on a box of Dove Men's Care, but couldn't find them on the box. It's opaque like the amount of gold at Fort Knox, nobody knows. I know what Soapminer uses to make his soap because [it's open source](nostr:note1aypyepc6g7lztutegx0fw5yg5clc9ythvxkp6czfkau3dcgwz06q4mfqr3).
### Tallow Soap Quotes
I asked Soapminer a few questions on nostr. You can find his answer here:
nostr:nevent1qvzqqqqqqypzqy9kvcxtqa2tlwyjv4r46ancxk00ghk9yaudzsnp697s60942p7lqy88wumn8ghj7mn0wvhxcmmv9uq3xamnwvaz7tmsw4e8qmr9wpskwtn9wvhszxrhwden5te0wa3nztnrw4e8yetwwshxu6twdfsj7qpqh7mqlhn392ekrg6nm33pjjquu0dww27tqv3qjduyag4u20er0tcqd2waxl
**That's the link that shows it was signed by his own nostr key, the Internet's version of "I approve this message."**

**Soapminer:**
`What inspired me was a cleaner, healthier lifestyle. During the plandemic, I had a lot of free time on my hands, and got to read, and investigate what actually causes a lot of the sickness in society. I learned a great deal. I never knew that your skin is your largest organ, and that it absorbs 60-70% of what you put on it. What do ppl put on their skin almost every day? Soap. So out of boredom, and seeking a healthier lifestyle, I started watching YT videos of ppl making soap, and tried it out a few times, and then a few more, until I became good at it.
Once you learn how to make soap, the challenges only arise when you try something that you haven't done before. Depending on what method you are using will determine the challenges that you may face. It's multifaceted, so might be a little long to go into. I overcome them by keep trying until I get it right. No path is going to be easy, you just have to practice to make perfect.
Last question is easy. My favorite soap is Tallow soap. As long as it is made from Tallow, and has all natural ingredients, it is a good soap in my opinion. Tallow mirrors the oils in our skin. It doesn't strip you skin the way commercial soap do, leaving you feel itchy, dry, and actually causing some of the skin ailments that have become common, like eczema, and psoriasis. Just nutures, cleans, and protects. It also, can prevent wrinkles., and acne.`
**Sold!**

I tried the pine tar first. It makes me smell like a man, at least my wife thinks so. That's also why she prefers the unscented. He is adding more scents, but these ate the one's I have tried.
The soap makes me feel rubber-ducky squeaky clean. After my shower, made some lunch and washed my hands with Dawn. **This made my hands ashier than bio-char**. I decided to cut some soap and place a little piece by the kitchen sink. The soap moisturized my hands in two shakes of a bull's tail. I also cut up some of my soap into smaller pieces because I'm as frugal as a Boy-scout and wanted to wash my hands with this stuff instead of Ivory. **Who wants a clean as real as Ivory? It's only 99.44% pure. Soap miner is 100% pure bitcoin signal.

#### Here's some more quotes about Soapminer's soap.
- [He's asking his market if they want Peppermint soap.](nostr:note1tpeh65m7y6s6wt9ucjdcl2pge3m86f2ny4hqjdyvcrmf7kglqshqfeceam "nostr:note1tpeh65m7y6s6wt9ucjdcl2pge3m86f2ny4hqjdyvcrmf7kglqshqfeceam)
- [Then he made the soap like a boss](nostr:nevent1qvzqqqqqqypzqy9kvcxtqa2tlwyjv4r46ancxk00ghk9yaudzsnp697s60942p7lqqs0yqyvffu9pn39grtxa8agpftpvfssx603w0ra67kpn5qn360masquhrtd7).
- [The Benefits of Tallow](nostr:nevent1qqs9w6g8khrqzhrgu7y3trae9vtdl8847p42p80aqzvsvlu9kr84vkgpz4mhxue69uhhyetvv9ujuerpd46hxtnfduhsyg8zenmu7gzq8ulj5jj4kv50ph3muwz43f747vmr9ld2alrjdswgavpsgqqqqqqsq5lkzq)
- [He uses Zaprite](nostr:nevent1qvzqqqqqqypzqjln5vfhstwf2ahjrmanh57kzwrap4v3xpfzql5sxp48gxlk4a74qqsraadvah6890x4hgvr4rcxe9c2n79a0kx88te3hf7x88j72rh7cuskhempa)
[He has giveaways](nostr:nevent1qvzqqqqqqyqzpzvke2t7fxwh0rzea5zmx7qnddzgsqk35ujp9tgpw9jmjsmnserr3z8466)
[He wants everyone to live on a bitcoin standard](nostr:nevent1qvzqqqqqqypzqy9kvcxtqa2tlwyjv4r46ancxk00ghk9yaudzsnp697s60942p7lqqs8gnddcnkj5p2047qam5drgw5jxlg60vy736e2rwxsmj593whnllsy8ej9j)

### Testimonials

nostr:note1y9wsl07lkepfzzj8c8ucekss9f9darvg70j93cdmvttadfjx9nfsvtxwes
**The LOTSProject8**

nostr:nevent1qvzqqqqqqypzqy9kvcxtqa2tlwyjv4r46ancxk00ghk9yaudzsnp697s60942p7lqqsxt8kyd650ph3wvhre0lwlw5s0emuv5gcfzmsvfxf7czgg4c2wynq7vg8ga
**GhostBTC**:

nostr:npub1cm3v486tkgy6qjtk09srry4qvc40y0jysyqha5e3v67whnc22jwsrreyud
**Tuvok**

**Bit 🐳 Ish**

["It's good stuff, you'll love it."](nostr:nevent1qvzqqqqqqypzpr38l76unwuvm5qnrt0xa7jf64k5qx65ynvlm7dx8cr565nmqu2uqqs2r7rcp2rssfcqhk5838cuu569h43wlkvw34gy8ad2flgdpl0cezckxghkc)
**cryptoshi2k21.bitcoin**

["Great soap 🧼🫧"](nostr:nevent1qvzqqqqqqypzqj5nelekm4aruughza09y8yy26ansshnc23wq2kdha79dqz8rhemqqsxdq4xf69vgk27nnes4syrnekpg4mhkp6v4rer7nzdgfht8kya8ssucu8lz)
**Me**

["I spent the last two days shyoveling horse shit and compost for my garden. This soap made me feel rubber-ducky squeeky clean afterward."](nostr:nevent1qvzqqqqqqypzph68s45y080zdd9g8sdacnd6kcd4ejpwrgcju2eghjq45y4f28n8qqsfvqylk56zdh5n3ykhleypr5zznevqt9dw04vptdeuh9jmskemndgq0hw25)
##### Conclusion
I am a soap mining soap customer now. I'm done with fiat soap. I'm thinking about handing out his soap for Christmas gifts. Odell was right. It is good soap. It's expensive compared to the comercial crap, but competitive with fancy olive oil soaps I've seen. I paid with fiat I had in Strike, but Soapminer received bitcoin. I was going to buy soap anyway, but buying soap this way took $35 of fiat off Strike and put it into soap miners strategic bitcoin reserve. It's not cheap, but buying Dove requires me to first buy fiat. Buying soap from Soapminer takes sats off the exchange. Buying Dove does not, but that's not the only reason I bought this soap. It's great soap, but that's not really why I bought it. I am a big believer in what Adam Smith described as the invisible hand: [nostr:note1jsgzk6rxulyqthae8c53rrawaa70yjqh37nm3kxh08xw8g43vgcq3kux9d "nostr:note1jsgzk6rxulyqthae8c53rrawaa70yjqh37nm3kxh08xw8g43vgcq3kux9d"). We want to see people in our community to prosper. It is in our self-interest That is what Smith means by the invisible hand. The invisible hand is not A Central Bank manipulating interest rates and The IMF turning foreigners into debt-fiat slaves for cheap freshly-frozen shrimp.
Bitcoiners are my community. They may not be close to me by proximity, but my moral sentiments guide me to do business with bitcoiners whenever possible. See, capitalism cannot work with socialist money. Those moral sentiments change when people work for soft money. Fiat soap miners get paid in NGD currency. Sell soap for $35 today and that will buy you half as much stuff in 5 years. The fiat soap miner has no savings to improve his community. Inflation makes him search for the cheapest soap just to keep up with grocery prices.

Soapminer can save his sats earned selling soap without anyone stealig from him. Therefore, he will be able to afford to buy stuff in his community. Those on a fiat standard cannot afford to save their money in the hopes of buying high quality products and services in their community. Fiat is socialist money, therefore only buys less and less as time goes on. Dear readers, we are not on late stage capitalism. The problem is that socialist money sucks. Those Papi Trump bucks might be fun for a month, but in the end, everyone pays the Piper. Tariffs are a sales tax, [paywalls in meatspace](nostr:nevent1qvzqqqqqqypzph68s45y080zdd9g8sdacnd6kcd4ejpwrgcju2eghjq45y4f28n8qyt8wumn8ghj7mn0wd68yetvd96x2uewdaexwtcpzemhxue69uhhyetvv9ujumt0wd68ytnsw43z7qg4waehxw309ajxjar5duh8qatz9aex2mrp0yqzqx3u59js9ewy9xwr7nuzv5eytj9ty979wrc7vrhv3tfykjxp5pd28s750n). Save your sats long enough, and these taxes will not matter. We circumvent the unjust tax of inflation, we will find solutions to unjust taxes levied on our community.
I participate in the bitcoin circular economy because I want to bring capitalism back. I do not care where you live. If you are a bitcoiner, you are part of my community. There is an invisible hand which compels me to buy stuff from people in my community. That's why I bought soap from Soapminer, but you know what? **the soap is pretty damn good**.
npub1marc26z8nh3xkj5rcx7ufkatvx6ueqhp5vfw9v5teq26z254renshtf3g0
[884,861](https://mempool.marc26z.com/block/00000000000000000001dd2088c2c20508d768455d6c29cd6b33d2a69912cafb)
[Merch](https://marc26z.com/merch)
-

@ f3873798:24b3f2f3
2025-02-22 20:17:18

Nos últimos anos, temos observado um aumento significativo nos casos de ansiedade, estresse e outros transtornos mentais. O ambiente de trabalho, especialmente no mundo cooperativo e corporativo, desempenha um papel central nesse cenário. Mas qual é a relação entre a estrutura do mercado de trabalho moderno e o crescimento dessas questões de saúde mental?
O Impacto da Cultura Cooperativa na Saúde Mental

O modelo cooperativo atual valoriza, acima de tudo, a produtividade e o cumprimento de metas rígidas. A exigência por resultados rápidos e desempenho excepcional impõe um ritmo de trabalho desumano, levando muitos profissionais à exaustão física e emocional. A pressão constante para atender expectativas impossíveis cria um ambiente hostil, contribuindo para o aumento de diagnósticos como ansiedade, depressão e burnout.
Além disso, a falta de liberdade e flexibilidade no mercado de trabalho faz com que muitos talentos sejam desperdiçados. Profissionais que poderiam inovar e criar novas oportunidades acabam se tornando apenas mais um número em grandes empresas ou no funcionalismo público, muitas vezes por falta de opções. Esse aprisionamento profissional gera frustração, baixa autoestima e até transtornos psicológicos severos.
A Evolução das Demandas e a Intensificação da Pressão

Antigamente, a busca por estabilidade em cargos públicos ou em grandes corporações era comum, mas a pressão e a exigência por resultados eram diferentes. Com o avanço da tecnologia e a digitalização dos processos, a demanda por eficiência aumentou exponencialmente. Hoje, a velocidade imposta pelo mercado ultrapassa os limites humanos, tornando o ambiente de trabalho ainda mais opressor.
Essa realidade não apenas compromete a saúde mental dos profissionais, mas também reflete no comportamento social. O estresse crônico e a frustração acumulada podem levar a episódios de agressividade, intolerância e impaciência, impactando diretamente a convivência em sociedade. O crescimento de casos de violência no trânsito, agressões em ambientes de atendimento e até mesmo crimes por motivos fúteis pode estar ligado a esse fenômeno.
O Caminho para um Mercado de Trabalho Mais Saudável

Para minimizar esses impactos, é fundamental promover maior liberdade econômica e oportunidades para pequenos empreendedores. Reduzir a dependência de grandes empresas e cooperativas pode permitir que mais pessoas encontrem satisfação profissional e desenvolvam suas vocações sem a pressão excessiva por metas irreais.
Empreendimentos menores tendem a oferecer um ambiente de trabalho mais humanizado, onde as metas são ajustadas conforme a capacidade de produção de cada indivíduo. Dessa forma, os profissionais podem atuar de maneira mais saudável e equilibrada, reduzindo os índices de transtornos mentais e promovendo uma sociedade mais harmoniosa.
-

@ b8851a06:9b120ba1
2025-02-22 19:43:13
The digital guillotine has fallen. The Bybit hack wasn’t just a theft—it was a surgical strike exposing the fatal flaw of “crypto” that isn’t Bitcoin. This wasn’t a bug. It was a feature of a system designed to fail.
Here’s how North Korea’s Lazarus Group stole $1.5B in ETH, why “decentralized finance” is a joke, and how Bitcoin remains the only exit from this circus.
## I. The Heist: How Centralized “Crypto” Betrayed Its Users
### A. The Multisig Mousetrap (Or: Why You’re Still Using a Bank)
Bybit’s Ethereum cold wallet used multisig, requiring multiple approvals for transactions. Sounds secure, right? Wrong.
• The Con: Hackers didn’t pick the lock; they tricked the keyholders using a UI masking attack. The wallet interface showed “SEND TO BYBIT”, but the smart contract was whispering “SEND TO PYONGYANG.”
• Bitcoin Parallel: Bitcoin’s multisig is enforced on hardware, not a website UI. No browser spoofing, no phishing emails—just raw cryptography.
Ethereum’s multisig is a vault with a touchscreen PIN pad. Bitcoin’s is a mechanical safe with a key only you hold. Guess which one got robbed?
### B. Smart Contracts: Dumb as a Bag of Hammers
The thieves didn’t “hack” Ethereum—they exploited its smart contract complexity.
• Bybit’s security depended on a Safe.global contract. Lazarus simply tricked Bybit into approving a malicious upgrade.
• Imagine a vending machine that’s programmed to take your money but never give you a soda. That’s Ethereum’s “trustless” tech.
Why Bitcoin Wins: Bitcoin doesn’t do “smart contracts” in the Ethereum sense. Its scripting language is deliberately limited—less code, fewer attack vectors.
Ethereum is a Lego tower; Bitcoin is a granite slab. One topples, one doesn’t.
## II. The Laundering: Crypto’s Dirty Little Secret
### A. Mixers, Bridges, and the Art of Spycraft
Once the ETH was stolen, Lazarus laundered it at lightspeed:
1. Mixers (eXch) – Obfuscating transaction trails.
2. Bridges (Chainflip) – Swapping ETH for Bitcoin because that’s the only exit that matters.
Bitcoin Reality Check: Bitcoin’s privacy tools (like CoinJoin) are self-custodial—no third-party mixers. You keep control, not some “decentralized” website waiting to be hacked.
Ethereum’s “bridges” are burning rope ladders. Bitcoin’s privacy? An underground tunnel only you control.
### B. The $1.5B Lie: “Decentralized” Exchanges Are a Myth
Bybit’s “cold wallet” was on Safe.global—a so-called “decentralized” custodian. Translation? A website with extra steps.
• When Safe.global got breached, the private keys were stolen instantly.
• “Decentralized” means nothing if your funds depend on one website, one server, one weak link.
Bitcoin’s Answer: Self-custody. Hardware wallets. Cold storage. No trusted third parties.
Using Safe.global is like hiding your life savings in a gym locker labeled “STEAL ME.”
## III. The Culprits: State-Sponsored Hackers & Crypto’s Original Sin
### A. Lazarus Group: Crypto’s Robin Hood (For Dictators)
North Korea’s hackers didn’t break cryptography—they broke people.
• Phishing emails disguised as job offers.
• Bribes & social engineering targeting insiders.
• DeFi governance manipulation (because Proof-of-Stake is just shareholder voting in disguise).
Bitcoin’s Shield: No CEO to bribe. No “upgrade buttons” to exploit. No governance tokens to manipulate. Code is law—and Bitcoin’s law is written in stone.
Ethereum’s security model is “trust us.” Bitcoin’s is “verify.”
### B. The $3B Elephant: Altcoins Fund Dictators
Since 2017, Lazarus has stolen $3B+ in crypto, funding North Korea’s missile program.
Why? Because Ethereum, Solana, and XRP are built on Proof-of-Stake (PoS)—which centralizes power in the hands of a few rich validators.
• Bitcoin’s Proof-of-Work: Miners secure the network through energy-backed cryptography.
• Altcoins’ Proof-of-Stake: Security is dictated by who owns the most tokens.
Proof-of-Stake secures oligarchs. Proof-of-Work secures money. That’s why Lazarus can drain altcoin treasuries but hasn’t touched Bitcoin’s network.
## IV. Bybit’s Survival: A Centralized Circus
### A. The Bailout: Banks 2.0
Bybit took bridge loans from “undisclosed partners” (read: Wall Street vultures).
• Just like a traditional bank, Bybit printed liquidity out of thin air to stay solvent.
• If that sounds familiar, it’s because crypto exchanges are just banks in hoodies.
Bitcoin Contrast: No loans. No bailouts. No “trust.” Just 21 million coins, mathematically secured.
Bybit’s solvency is a confidence trick. Bitcoin’s solvency is math.
### B. The Great Withdrawal Panic
Within hours, 350,000+ users scrambled to withdraw funds.
A digital bank run—except this isn’t a bank. It’s an exchange that pretended to be decentralized.
Bitcoin fixes this: your wallet isn’t an IOU. It’s actual money.
Bybit = a TikTok influencer promising riches. Bitcoin = the gold in your basement.
## V. The Fallout: Regulators vs Reality
### A. ETH’s 8% Crash vs Bitcoin’s Unshakable Base
Ethereum tanked because it’s a tech stock, not money. Bitcoin? Dropped 2% and stabilized.
No CEO, no headquarters, no attack surface.
### B. The Regulatory Trap
Now the bureaucrats come in demanding:
1. Wallet audits (they don’t understand public ledgers).
2. Mixer bans (criminalizing privacy).
3. KYC everything (turning crypto into a surveillance state).
Bitcoin’s Rebellion: You can’t audit what’s already transparent. You can’t ban what’s unstoppable.
## VI. Conclusion: Burn the Altcoins, Stack the Sats
The Bybit hack isn’t a crypto problem. It’s an altcoin problem.
Ethereum’s smart contracts, DeFi bridges, and “decentralized” wallets are Swiss cheese for hackers. Bitcoin? A titanium vault.
The Only Lessons That Matter:
✅ Multisig isn’t enough unless it’s Bitcoin’s hardware-enforced version.
✅ Complexity kills—every altcoin “innovation” is a security risk waiting to happen.
Lazarus Group won this round because “crypto” ignored Bitcoin’s design. The solution isn’t better regulations—it’s better money.
Burn the tokens. Unplug the servers. Bitcoin is the exit.
Take your money off exchanges. Be sovereign.
-

@ 378562cd:a6fc6773
2025-02-22 18:29:35
There was a time when I was a real person. I touched grass, read books made of actual paper, made eye contact with fellow humans, and didn’t panic when my pockets felt empty. Then came the screens. They infiltrated my life like a well-meaning but overly clingy houseguest who never leaves.
It started innocently enough: a quick email check, a couple of YouTube videos, and a little light doomscrolling. And then, before I knew it, my posture resembled a shrimp’s, my eyes had the dull glaze of a microwaved marshmallow, and I had unknowingly memorized the entire algorithm’s playlist of “Obscure Facts You’ll Never Need.”
I knew things had gone too far when I caught myself attempting to *swipe left* on a paperback book. Or when I instinctively tried to pinch-zoom on a restaurant menu, only to find it was printed. On paper. It's like some kind of ancient relic from the Dark Ages.
The worst part? I didn’t even know what I was doing half the time. One moment, I’d be looking up a recipe for lasagna. The next thing I knew, I was 47 minutes deep into a documentary on the mating habits of Alaskan walruses. And did I stop? Of course not. I needed to *know* how it ended! (Spoiler: The walruses were fine. My dinner was not.)
And don’t even get me started on notifications. Those little digital gremlins have mastered the art of ambush just as I’m about to put my phone down, *DING!* A breaking news alert! (Something mildly inconvenient happened in a country I can’t locate on a map.) *DING!* An email! (From a store I haven’t shopped at since 2014, reminding me they exist.) *DING!* A friend liked my post! (The one from three days ago. Thanks, Todd.)
So, I made a vow. I would reclaim my life. I would be strong. I would resist! I would—oh wait, just one more video. Then, for sure, I’ll log off. Probably. Maybe. Okay, fine, I need help.
Until then, I’ll be here, scrolling away, living my best shrimp-postured, screen-addicted life. If you need me, send a text just… not after 9 p.m. That’s when I’m deep in my nightly ritual of watching cooking videos I will never actually attempt.
I hope you enjoyed this sort of funny (in my own head) attempt at wittiness humor. I hope to make some aware of the actual real-life dangers though of too much screen time. We honestly have no idea of all the harm we are causing to our children. To our society. What happens when we all who have actually grown up playing in creeks, skipping rocks, or sitting outside and falling asleep while reading a real book pass away? What happens when those left have only known this screen-diseased life?
I pray we can go back, go way way back!
-

@ cff1720e:15c7e2b2
2025-02-22 17:45:48
Trumps Antrittsrede, seine Präsidentenerlasse, Personalentscheidungen und Amtshandlungen hatten schon in kurzer Zeit die Konturen der künftigen US-Außenpolitik erkennen lassen. Aber in München sprach der Vizepräsident auf einer bedeutenden Konferenz direkt zu den Europäern, den “Partnern” und “Verbündeten”. Und was er ihnen in aller Deutlichkeit mitteilte, war nichts anderes als eine 180-Grad Kehrtwende zur Politik der Vorgänger-Regierung. Die Botschaft war kein Vorschlag, sondern eine Ansage, die Inhalte sind inzwischen hinlänglich bekannt. Obwohl die Rede erwartungsgemäß mehr als reichlich kommentiert wurde, möchte ich noch einige Aspekte ergänzen, die ich bisher in den Kommentaren vermisst habe.

Im November 1988 wurde die Auslieferung der sowjetischen Zeitschrift “Sputnik” in der DDR gestoppt, was einem Verbot gleichkam. Der Anlaß waren kritische Betrachtungen über Stalin und Berichte über den Hitler-Stalin-Pakt, den es laut DDR-Geschichtsschreibung nicht gab. Es war eine Zensur von Informationen aus dem Land des “großen Bruders”, der Führungsmacht der sozialistischen Welt. Das Diktum “von der Sowjetunion lernen heißt siegen lernen” galt erkennbar nicht mehr. Das war zugleich der Höhepunkt einer ideologischen Entfremdung die 1986 begonnen hatte, als Gorbatschow “Glasnost” (Offenheit) und “Perestroika” (Reformen) einforderte, welche von der vergreisten DDR-Führung als unnötig und gefährlich abgelehnt wurden. Gorbatschow hatte richtig erkannt, dass die sozialistischen Staaten ökonomisch und gesellschaftlich gescheitert waren und ohne Reformen nicht überleben würden. Die Einsicht kam aber zu spät, die DDR kollabierte bereits ein Jahr später an ihrem Reformstau, die UdSSR Ende 1991 trotz der begonnenen Reformversuche.

Die Parallelen sind unverkennbar, eklatante politische Fehler (u.a. Euro seit 2009 und Migration seit 2015) haben die EU-Staaten zunächst zu Sanierungsfällen gemacht, durch die Corona-Politik zu Insolvenzkandidaten. Der Rubikon ist längst überschritten, die Schönwetter-Union ist nicht mehr zu retten. Den Amerikanern ist das klar, daher sind die Reform-Appelle von Vance wohl eher seiner Höflichkeit zuzurechnen. Für die US-Regierung ist die EU bereits jetzt nicht mehr existent, Verträge werden wieder direkt mit den Mitglieds-Staaten getroffen, und in den Ukraine-Verhandlungen ist kein Platz am Verhandlungstisch. Die Themenbereiche bei den Gesprächen in Riad haben aber auch gezeigt, dass Amerikaner und Russen in global-strategischen Dimensionen denken, die Ukraine ist zurecht nur ein Randthema. Die aktuelle Rhetorik europäischer Politiker hingegen ist niveaulos und kleinkariert, man spielt in der 2. Liga, die EU hat sich selbst vom Akteur zum Objekt degradiert.

Was bedeutet das für unsere Zukunft? Und was ist von der neuen US-Führung zu erwarten? Die unsäglichen Diskussionen darüber ob nun Trump und Musk gut oder böse sind, vernebelt nur eine klare Tatsache. Die EU hat keinen Rückhalt mehr vom “großen Bruder”, weder durch die NATO in Sachen Ukraine, noch durch Zensur von Systemkritikern (USAID, BigTech). Letzteres führt zu drei fundamentalen Veränderungen.\
\
1\. Das Narrativ von den “westlichen Werten” ist tot. Auf diesem Axiom der USA basierte die gesamte Propaganda-Maschine, es wurde zur Religion. Nun versuchen gerade Provinzpolitiker wie Pistorius und Habeck mit beschränkten rhetorischen Mitteln zu definieren was “westliche Werte” ohne die USA sind, was mehr für Begeisterung bei Satirikern beiträgt als zur Überzeugung von Tagesschau-Anhängern.\
\
2\. Die Deutungshoheit geht verloren weil immer mehr Publizisten ihr Fähnchen in den sich drehenden Wind hängen, sofern sie noch von Leser-Abos und Werbekunden abhängig sind. Die einsetzende Kakophonie verwirrt die Masse der schlichten Medien-Konsumenten, die über Jahrzehnte auf Nachrichten-Konformität dressiert worden sind. \
\
3\. Weniger Zensur in den sozialen Medien verschafft den kritischen Stimmen mehr Reichweite, “bedrohliche” Meinungsvielfalt entsteht. Leider können die meisten Kritiker aber nur kritisieren, was uns zurück in die Zeiten des Sputnik-Verbots führt.

Die DDR-Opposition hat beim Abriss der DDR mitgewirkt, über diese Rolle ist sie aber nie hinaus gekommen. Als die Mauer gefallen war und es um die Neugestaltung ging, hat sie kläglich versagt. Dem Großteil der heutigen Opposition droht das selbe Schicksal, weil sie keinen Plan für die Stunde Null hat. Bei Tauwetter darf man nicht mehr über den Winter diskutieren, sondern über das Bestellen der Felder. Wer die Saat ausbringt, entscheidet über die Ernte. Den Kollaps betreffend ist nur noch der Zeitpunkt unklar, für den Zeitraum danach jedoch alles. Wenn wir uns eine Bürgergesellschaft wünschen, dann müssen wir jetzt als Bürger aktiv werden, also DU, Leser. Spende für Pareto, oder für kritische Autoren und Aktivisten. Mach Dir Gedanken über die Zukunft und publiziere sie, hier auf Pareto, wir fördern den Bürger-Journalismus. Schließe Dich einem Projekt an, leiste einen Beitrag und gestalte die Zukunft. Macht wird nicht verteilt, Macht muss man sich erkämpfen.\
\
**“Nur der verdient sich Freiheit wie das Leben, der täglich sie erobern muß.”** Goethe, Faust Teil 2
**Spenden für Pareto:** <https://geyser.fund/project/pareto>
**Pareto Landing Page:** <https://pareto.space> 
**Pareto Marktplatz:** <https://pareto.space/read> 
-

@ 129f5189:3a441803
2025-02-22 17:11:57
**This is Lazarus.**
They’ve just stolen $1.46 billion from Bybit.
They didn’t breach the code—they breached the people.
Here’s the untold story of how they did it (and why no one is truly safe).
https://image.nostr.build/5120f62c63199bbc1402c1c33c11d337ab9c5623ce78d7351025fcbb9b14c27e.jpg
Lazarus is a state-sponsored hacking group from North Korea.
They've siphoned billions from banks, crypto exchanges, and DeFi protocols.
And now, they’ve executed the largest crypto heist in history.
But how? Well...
https://image.nostr.build/5ecefbb02468cea4ca1b89fdd51835921d15161fc992095d44005003c5f5ddc7.jpg
There was no code exploit.
No leaked private keys.
Bybit’s own multisig signers approved the transactions.
They thought they were signing a routine transfer.
Instead, they handed over access to their entire cold wallet...
https://video.nostr.build/0e92d71c6dba6d99532b4b126c5e42001a8c446d1e312539fa9a3fad8c52d851.mp4
This raises a terrifying question.
How did Lazarus know exactly who to target?
A multisig wallet requires multiple signers.
If even one refused to sign, the hack would have failed.
But they all signed.
This means Lazarus didn’t just hack Bybit...
They knew who to manipulate.
There are only a few ways to gather that kind of information:
- **Inside job** – Someone leaked the signer list.
- **Social engineering** – Lazarus studied their emails and behavior.
- **Device compromise** – One or more signers were infected with malware.
This puts other exchanges at risk too...
https://image.nostr.build/a80694326818292e24e26def7ffddbea45bc2f41384b3563c3217c1a1d53a353.jpg
Today, Lazarus stole 0.42% of all Ethereum.
This means they own more than:
- The Ethereum Foundation
- Vitalik Buterin
- Fidelity
But laundering that much ETH without detection isn’t easy...
https://image.nostr.build/331d83a66c362801b91d42b1aba1b658dc1b35d25a156255d312b483421d4449.jpg
In previous attacks, Lazarus has used:
- Bridging to other blockchains
- On-chain mixing services
- OTC trading through illicit brokers
Will they employ the same tactics again?
https://video.nostr.build/c25c686a1ce4d71ad7e0efebf02b1d6bcb05ac0f23438d11e4380ebe53aa6526.mp4
Investigators quickly flagged the 53 wallets holding the stolen ETH.
Any attempt to cash out or swap funds would immediately raise red flags.
But Lazarus is in no rush...
https://image.nostr.build/2ebfb985c7d7abe4e2715f505ed64c227b908bbbc85b20630fc7437f391a0bb4.jpg
In 2022, Chainalysis found Lazarus still held $55 million from hacks six years earlier.
They don’t cash out quickly; they wait.
And no one has ever gotten their money back. Not once.
Lazarus doesn’t negotiate. They don’t return funds.
So what happens to users?
https://image.nostr.build/3d4738f4d0db5a14c6dd71f32c54d56b061c6e8896134de579cc36867f7175bd.jpg
Bybit’s CEO, Ben Zhou, addressed the crisis publicly:
- “Client funds are 1:1 backed.”
- “We have enough liquidity to cover withdrawals.”
- “All other wallets remain secure.”
So far, there hasn’t been a bank run...
https://video.nostr.build/25616f50b774296945681a3455939f62af623f68081a651209fd89392f778d91.mp4
But this isn’t the first time this has happened.
And it won’t be the last.
So how can you stay safe? Follow these simple steps:
1. **Cold wallets stay cold** - If it touches the internet, it's not cold.
2. **Never sign blindly** - Always verify what you're signing, even if the UI looks legit.
3. **Spread your risk** - Never keep all your funds in one place.
4. **Secure your keys** - Use a hardware wallet. No exceptions.
5. **Assume you're a target** - Lazarus doesn’t hack systems; they hack people. Stay paranoid.
-

@ a012dc82:6458a70d
2025-02-22 15:51:37
Bitcoin, the pioneering cryptocurrency, has always been known for its volatility. This digital asset has seen dramatic fluctuations in price, attracting investors and speculators alike. Understanding these price movements is crucial for anyone involved in the crypto market. The journey of Bitcoin from a niche digital token to a mainstream financial asset has been marked by periods of rapid growth and sudden declines. This volatility is not just a source of risk, but also of potential opportunity for traders and investors. The factors driving these fluctuations range from regulatory news, technological advancements, to broader economic factors. Bitcoin's decentralized nature adds to its unpredictability, as it operates independently of a central bank or government.
**Table of Contents**
- The Recent Price Rally and Subsequent Halt
- Insights from CryptoQuant's Analysis
- The Role of Short-Term Holders
- Understanding Bitcoin Binary Coin Days Destroyed ( …
- The Dynamics of Profit-Taking
- Actions by Miners and Whales
- Current Market Scenario and Future Outlook
- Conclusion
- FAQs
**The Recent Price Rally and Subsequent Halt**
In a recent surge, Bitcoin's value soared past the $44,000 mark, only to encounter a significant resistance level near $45,000. This resistance led to a notable decline in its price. The question on everyone's mind is: what caused this sudden halt in Bitcoin's otherwise steady climb? This rally, like many in Bitcoin's past, was driven by a mix of investor optimism, favorable market conditions, and increasing institutional interest in cryptocurrency. However, the resistance at $45,000 proved to be a turning point, sparking a wave of sell-offs and profit-taking. This price behavior is a classic example of the market's psychological dynamics, where key resistance levels can lead to significant shifts in investor behavior. The rapid change from a bullish to a bearish market sentiment at this juncture underscores the fragile and speculative nature of the cryptocurrency market.
**Insights from CryptoQuant's Analysis**
CryptoQuant, a renowned market analytics platform, offers valuable insights into this phenomenon. An analyst from CryptoQuant, Yonsei, conducted a detailed analysis of on-chain data to unravel the mystery behind Bitcoin's recent price behavior. This analysis goes beyond surface-level market trends, delving into the intricate movements of Bitcoin across various wallets and exchanges. By examining metrics such as fund flows, wallet activities, and transaction patterns, CryptoQuant provides a more nuanced understanding of what drives Bitcoin's price changes. Yonsei's analysis, in particular, sheds light on the behavior of different investor cohorts, revealing how their actions collectively impact the market. This kind of deep-dive analysis is essential for anyone looking to understand the often opaque mechanisms of cryptocurrency markets.
**The Role of Short-Term Holders**
The analysis revealed that short-term holders, particularly those who had invested in Bitcoin for a period ranging from 6 to 18 months, started to realize their profits as soon as Bitcoin broke through the $40,000 resistance level. This profit-taking was a primary factor in the subsequent price retraction. These short-term holders, often more sensitive to market fluctuations, tend to react quickly to price changes, looking to capitalize on short-term gains. Their collective actions can create significant market movements, as seen in this instance. The behavior of these investors is often influenced by news events, market sentiment, and technical indicators. In this case, the rapid rise in Bitcoin's price likely triggered a psychological response to lock in profits, leading to a cascade of sell orders. Understanding the motivations and behaviors of these short-term holders is crucial for predicting short-term market movements in the volatile world of cryptocurrency.
**Understanding Bitcoin Binary Coin Days Destroyed (CDD)**
A critical metric in this analysis is the Bitcoin Binary Coin Days Destroyed (CDD). This metric assesses the movement of long-held Bitcoins, providing insights into the behavior of long-term investors. An increase in Binary CDD indicates that a significant amount of Bitcoin, held dormant for a long time, has been mobilized, suggesting a sell-off by long-term holders. This metric is particularly important as it highlights the actions of the most steadfast part of the market - those who have held Bitcoin through various cycles. When these long-term holders start moving their coins, it often signals a significant shift in market sentiment. The CDD metric thus serves as a barometer for the conviction of Bitcoin's long-term investor base. A high CDD can indicate a loss of confidence among these investors, or a belief that the market has reached a peak. Conversely, a low CDD suggests that long-term holders are not yet ready to sell, indicating continued confidence in the market's future.
**The Dynamics of Profit-Taking**
The CryptoQuant analysis further highlighted that a majority of Bitcoin holders were in profit, with the Spent Output Profit Ratio remaining above one. This indicated that about 90% of Bitcoin holders were profiting, which naturally led to a trend of profit-taking. This phenomenon is a key aspect of market cycles in cryptocurrencies. When a large portion of investors are in profit, especially after a significant price rally, the market often sees a wave of selling as investors look to cash in on their gains. This behavior is compounded by psychological factors, such as fear of missing out (FOMO) and fear, uncertainty, and doubt (FUD), which can lead to rapid shifts in market sentiment. Additionally, the profit-taking trend is influenced by external factors such as global economic conditions, regulatory news, and technological developments within the blockchain space. These factors can either reinforce the confidence of investors, leading to a hold strategy, or trigger a sell-off in anticipation of a market downturn.
**Actions by Miners and Whales**
Another interesting aspect of the analysis was the behavior of Bitcoin miners and whales (large-scale holders). These groups also contributed to the selling pressure. Miners, in particular, sold their assets at high-profit margins when Bitcoin reached its peak, adding to the downward pressure on its price. The actions of miners are crucial to understanding Bitcoin's market dynamics, as they are not only investors but also the producers of new Bitcoins. Their decision to sell or hold can significantly impact the supply of Bitcoin in the market. Whales, or large-scale holders, have a similar impact due to the sheer volume of their transactions. Their trades can lead to substantial market movements, creating waves that affect smaller investors. The behavior of these whales often reflects a more strategic approach to the market, influenced by long-term trends and broader market analysis. Their actions can serve as indicators for future market movements, making their behavior a key focus for analysts and investors alike.
**Current Market Scenario and Future Outlook**
Despite the recent price drop, the overall market sentiment remains positive. The bear market seems to be in the past, and liquidity conditions in the crypto market are improving. However, Bitcoin currently hovers around the $41,000 mark, a slight decrease from its recent high. This current state reflects the ever-changing nature of the cryptocurrency market, where investor sentiment can shift rapidly. The future outlook for Bitcoin remains a topic of much debate among experts. Some predict continued growth as institutional adoption increases and blockchain technology becomes more integrated into mainstream finance. Others caution about potential regulatory clampdowns and the volatile nature of the market. What remains clear is that Bitcoin continues to be a key player in the financial world, with its price movements being a barometer for the health and sentiment of the broader cryptocurrency market.
**Conclusion**
Bitcoin's market behavior, as analyzed by CryptoQuant, offers a complex picture of various factors at play. The interplay between short-term and long-term holders, the strategic moves of miners and whales, and the overall market sentiment all contribute to the price dynamics of this digital currency. Understanding these elements is key for investors and enthusiasts who wish to navigate the volatile waters of Bitcoin's market. As the crypto landscape continues to evolve, keeping a close eye on these trends and analyses will be crucial for making informed decisions in the world of cryptocurrency. The insights provided by platforms like CryptoQuant are invaluable in this regard, offering a deeper understanding of the market forces at work.
**FAQs**
**What caused the recent halt in Bitcoin's price rally?**
The halt in Bitcoin's price rally, after reaching near $45,000, was primarily due to profit-taking by short-term holders and investors who had held Bitcoin for 6-18 months, as revealed by CryptoQuant's analysis.
**What is Bitcoin Binary Coin Days Destroyed (CDD)?**
Bitcoin Binary Coin Days Destroyed (CDD) is a metric that measures the movement of long-held Bitcoins. It indicates the amount of Bitcoin, held dormant for a long time, that has been mobilized or sold.
**How do miners and whales influence Bitcoin's price?**
Miners and whales (large-scale holders) significantly influence Bitcoin's price through their actions. When they sell their holdings, especially during peak prices, they add to the market's selling pressure, potentially leading to price drops.
**What does a high Bitcoin Binary CDD indicate?**
A high Bitcoin Binary CDD suggests that a large amount of long-held Bitcoin is being sold, which can be a sign of long-term holders losing confidence or deciding to take profits.
**Is the current market sentiment for Bitcoin positive or negative?**
Despite recent price fluctuations, the overall market sentiment for Bitcoin remains cautiously positive, with improvements in market liquidity and interest from institutional investors.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-

@ 1739d937:3e3136ef
2025-02-22 14:51:17
We've been busy. In my last update, I shared that I was sure MLS on Nostr was going to work and shared an early demo of the app. What a long time ago that seems now.
The big news is that White Noise is no longer just a demo. It's a real app. You can [download the alpha release](https://github.com/erskingardner/whitenoise/releases) and run it for yourself on MacOS, Linux, or Android. iOS TestFlight is coming soon. Keep in mind that it's still very much alpha software; a lot is changing and I wouldn't recommend using it for anything serious quite yet.
We've been busy. In my last update, I shared that I was sure MLS on Nostr was going to work and shared an early demo of the app. What a long time ago that seems now.
## Vision
Before we get to the detailed project updates, I wanted to share a bit of my vision for White Noise.
More and more; freedom of speech, freedom of association, and privacy are under attack. Just this week, Apple was forced to remove their iCloud advanced encryption feature for all UK citizens because the UK government demanded that Apple build a backdoor to allow access to customer data. The EU continues to push "Chat Control" legislation that would force companies to remove end-to-end encryption from their platforms. And governments across the world are enforcing draconian "hate speech" laws that criminalize speech that offends or upsets.
The freedom to express ourselves and discuss difficult topics is a critical precondition for maintaining a healthy society. Without the ability to assert ideas and argue their merits vigorously we have no way of making progress or creating a civil society based on shared values and goals. Ironically, the very laws and regulations that many western governments are enforcing to "protect" us are eroding and destroying the most free and innovative societies in history.
White Noise is to built to protect our freedom to gather, to express ourselves, and to discuss difficult topics. It's free and open source; anyone can fork the code and we'll never charge money to use it. It runs on a free and open source protocol; your identity and social graph is yours to own and control. You don't have to trust us with your data, everything is end-to-end encrypted and metadata is next to non-existent. We don't even run any servers, so government data requests will forever fall on deaf ears.
We want to build the fastest, most secure and private, and the most usable messenger in the world. Whether you want to use it to plan a family BBQ or overthrow a tyrant, White Noise should give you the tools you need to make it happen.
If you find this compelling and want to help, please consider contributing to the project or donating.
## Progress
Alright, let's talk about where we're at with the project.
### Current functionality
- Multiple accounts. You can login, or create, many different Nostr accounts in the app.
- Search your nostr contact list, search for users you don't follow, or add contacts using an npub or hex public key.
- Create DM groups. Right now, you can only create chats with a single other user. Under the hood, these DMs are actually groups, I just haven't added the UI for adding/removing users and managing the group.
- Send messages, reply to messages, and add reactions. As you would expect from a messenging app.
- View group information.
- Settings that allows you to manage your accounts, relays, and other app settings.
### Upcoming
- An amazing hackathon group from [Bitcoin++ in Brasil](https://btcplusplus.dev/conf/floripa) has recently [added NWC](https://github.com/erskingardner/whitenoise/pull/89) (nostr wallet connect) support to the app. Paste lightning invoices into chats and they'll become QR codes that you can scan or pay them with a single click in the conversation! This will be in the next release.
- Add support for encrypted media in chats using [Blossom](https://github.com/hzrd149/blossom/tree/master). We'll start with images, but plan to add video, audio messages, and documents soon.
- Groups with more than two users. We'll add the ability to add/remove users and manage the group. This will also include some upgrades to further improve the forward secrecy of group chats.
- iOS TestFlight. Gated app stores suck. We'll get White Noise on iOS into TestFlight as soon as possible.
## Links
- [The repo](https://github.com/erskingardner/whitenoise)
- [Releases](https://github.com/erskingardner/whitenoise/releases)
- [Previous updates](https://highlighter.com/jeffg.fyi)
-

@ 63db3b6d:899680ff
2025-02-22 11:52:51
Many of the tragedies we see in today’s crypto world can be described as a symphony—one composed of ignorance, greed, vanity, and the cunning of those who exploit these human flaws for profit.
People often discuss blockchain while loosely tossing around terms like _cypherpunks_, _decentralization_, and _cryptocurrencies_—concepts they barely understand. They lump them together into some vague image and follow it blindly. It’s a bit like encountering a stranger whose looks alone inspire you to imagine they’re wealthy, kind, and from a noble lineage, projecting all your hopes and wishes onto them.
Take any basic “Blockchain 101” course, and you’ll inevitably hear about cypherpunks. **Cypherpunks** form a social movement that aims to protect individual freedom and privacy against surveillance and censorship by governments or Big Tech. While some of their arguments are certainly relatable, social movements tend to be niche; they rarely represent the mainstream view.
Blockchain was specifically designed as a tool to solve the problems that cypherpunks identified. How valuable, then, is a technology born from such a niche worldview? This is one reason people say, “I don’t see the point of blockchain.” It’s similar to climate change technology: How valuable is it to someone who believes climate change is a hoax? If you don’t relate to cypherpunks’ vision, then blockchain may seem to have zero practical value. And realistically, how many actual cypherpunks are there among all the current blockchain users?
---
### Is Blockchain Really That Worthless If You’re Not a Cypherpunk?
An interesting thing about inventions is that they rarely remain confined to their original purpose. Take **Propecia**—it was developed as a prostate treatment but is now often prescribed to slow hair loss. Cypherpunks created blockchain for their own ends, but other people have since discovered different, potentially useful applications.
---
### Why Would Blockchain Be Useful to Non-Cypherpunks?
The freedom cypherpunks sought is, in modern society, largely defined by the rights our social systems establish and protect. They needed a tool to build a system that would **not** be controlled by any single person or group, yet remain viable among participants who share a common vision. That required **decentralization**.
Here, we find another misconception: equating cypherpunks with decentralization. Decentralization is simply one necessary characteristic of a system that serves their goal: “a system free from the control of any individual or faction.” A decentralized design isn’t _inherently_ superior; it’s just that for cypherpunks, decentralization was a must. If their goals had been different, decentralization might not have mattered at all.
Yet, building a truly decentralized system is extremely difficult. The cypherpunk movement was active in the 1990s, but the first blockchain—Bitcoin—didn’t emerge until 2008. Once blockchain technology was invented, it radically lowered the costs for like-minded people to create decentralized systems.
Any system that defines and protects a set of rights needs **resources**. Ensuring those resources are used fairly, transparently, and in line with collective consensus has always been expensive, which is why we traditionally rely on centralized authorities. Blockchain enables **Trustless Trust**, drastically reducing the cost of building such systems.
---
### Currency as Collective Decision-Making
These systems don’t rely solely on formal governance or voting. **Spending** also reflects decision-making. Fiat currency has no intrinsic value; it represents a _delayed claim_ on real resources within the system. Thus, when more money is spent on a particular good or service, more _actual_ resources are ultimately funneled there. Over time, this **asynchronous spending** accumulates to form a kind of collective will—effectively guiding resource allocation without requiring constant explicit votes.
---
### The Misconception: “Cryptocurrency Is the ‘Killer App’ for Blockchain”
At one point, people struggled to find practical uses for blockchain. Some even flipped the narrative, saying that “cryptocurrency is the killer app of blockchain” or worse, that “blockchain exists only for creating cryptocurrencies.” In reality, cryptocurrencies aren’t the end goal of blockchain; they’re simply tools that allow participants in a decentralized system to **signal their intent** and **allocate resources** in order to shape the system’s future direction.
---
### Then Why Does Blockchain Seem So Useless?
Blockchain itself is a value-neutral technology. It has **no inherent agenda**. It simply allows groups with shared purposes to build decentralized systems. Unfortunately, most current blockchain communities lack genuine shared objectives or real-world problems they intend to solve. The only “problem” many of them define is: “I have less than others,” and their sole “solution” is to extract wealth from someone else.
For a system to be sustainable, resources need to **stay** within it. Since currencies represent delayed claims on these resources, if everyone is constantly converting those claims back into external assets, the system can’t survive.
To make blockchain genuinely useful—and to show that cryptocurrencies aren’t just a scam—there must be:
1. A **clear definition** of the collective problem the system aims to solve.
2. A shared **vision or direction** for solving that problem.
3. A concrete **protocol** specifying how to achieve these goals in a decentralized way.
Without that groundwork, merely issuing a cryptocurrency in the hope of creating a better, happier world is a fantasy—no better than a cultish scam. And that, ultimately, is why so many blockchain initiatives fail to deliver real value.
-

@ da0b9bc3:4e30a4a9
2025-02-22 10:55:44
Hello Stackers!
Welcome on into the ~Music Corner of the Saloon!
A place where we Talk Music. Share Tracks. Zap Sats.
So stay a while and listen.
🚨Don't forget to check out the pinned items in the territory homepage! You can always find the latest weeklies there!🚨
🚨Subscribe to the territory to ensure you never miss a post! 🚨
originally posted at https://stacker.news/items/893831
-

@ 6734e11d:c7e34e8f
2025-02-22 09:16:15
...damit wir weiter recht haben und so weitermachen können wie bisher, die verordnete Omertà eingehalten wird zu Grundrechten, Notverordnungen, Pandemiesimulationen, Energieversorgung, Deindustrialisierung, kalte und echte Enteigung, Umverteilung, Freiluft- und Digitalgefängnis, Blockwartnachbarn...
Alles andere wäre äußerst unangenehm, wie das Aufplatzen einer großen Eiterblase und müsste dann wieder mit Exekutive, Justiz, Notverordnungen, neuen Strafrechtsparagraphen, Verschärfung der Strafprozessordnung, echte Änderung des Grundgesetzes, Überwachung, Totalzensur, Parteiverboten, Regimechanges und Krieg unterbunden werden.
Idee und Meme sind wieder von der Schwurbel Oase
<https://t.me/schwurbel_oase/2318>
-

@ 6389be64:ef439d32
2025-02-22 09:12:02
2024-05-28 at 14:05
Tags:
# Soil Carbon Oxidation Under Tillage
When soil is turned over (by tilling or plow) it exposes carbon to oxygen and that carbon burns off as CO2.
You are burning the carbon out of the soil.
---
# References
[[Shepard-Lappe-Restoration Agriculture]]
# Core Notes
[[Soil Erosion]]
# Location
[991](kindle://book?action=open&asin=B00IYUAMSI&location=991)
-

@ 2fb77d26:c47a6ee1
2025-02-22 09:04:25
Der 1953 geborene [Craig Reynolds](https://de.wikipedia.org/wiki/Craig_Reynolds) ist Experte für künstliches Leben und Computergrafik. In dieser Funktion arbeitete er unter anderem an Filmen wie Tron (1982) und Batman (1992). Bei »*Sony Computer Entertainment America*« (heute [SIE](https://de.wikipedia.org/wiki/Sony_Interactive_Entertainment)) entwickelte er die [OpenSteer](https://opensteer.sourceforge.net/)-Bibliothek, die der Abbildung von Schwarmverhalten in Spielen und Animationsanwendungen dient. An solch prestigeträchtige Aufträge kam Reynolds, weil er sich nebst Computergrafik intensiv mit Theorien zum »*Steuerungsverhalten für autonome Charaktere*« befasst hatte. Mit Schwarmverhalten. Einem Thema, das mit wachsender Rechenleistung immer wichtiger für die Entwicklung von Computerspielen wurde.
Die sollten dem Spieler das Gefühl geben, sich in einer realen Welt mit »*autonomen Charakteren*« zu bewegen. Dazu mussten diese vom Computer, beziehungsweise der Software gesteuerten Charaktere – im Fachjargon »*[Agenten](https://de.wikipedia.org/wiki/Software-Agent)*« genannt – sich irgendwie verhalten. Und zwar ohne, dass von außen ein weiterer Steuerungseingriff erfolgt. Eigendynamisch. Dafür bedarf es Regeln, die im Programmcode eingebettet werden können. Genau die lieferte Reynolds 1986 im Rahmen der von ihm modellierten [Boids-Simulation](https://www.red3d.com/cwr/boids/), die besagt, dass Schwarmverhalten auf drei simplen Regeln basiert:
1. Bewege dich in Richtung des Mittelpunkts derer, die du in deinem Umfeld siehst.
2. Entferne dich, sobald dir jemand zu nahe kommt.
3. Bewege dich etwa in die gleiche Richtung wie deine Nachbarn.
Sprich: Kohäsion, Separation und Orientierung. In Reynolds’ Beschreibung des Boid-Modells liest man diesbezüglich:
»*1986 habe ich ein Computermodell koordinierter Tierbewegungen *(…) *erstellt. Es basierte auf dreidimensionaler Computergeometrie, wie sie normalerweise in der Computeranimation oder im computergestützten Design verwendet wird. Ich habe die generischen, simulierten Schwarmtiere Boids genannt. Das grundlegende Schwarmmodell besteht aus drei einfachen Lenkverhalten, die beschreiben, wie ein einzelner Boid auf der Grundlage der Positionen und Geschwindigkeiten seiner Schwarmgenossen in der Nähe manövriert. Jeder Boid hat direkten Zugriff auf die geometrische Beschreibung der gesamten Szene, aber das Schwarmverhalten erfordert, dass er nur auf Schwarmgenossen in einer bestimmten kleinen Nachbarschaft um sich herum reagiert. *(…)* Schwarmgenossen außerhalb dieser lokalen Nachbarschaft werden ignoriert.*
*Die Nachbarschaft könnte als Modell eingeschränkter Wahrnehmung betrachtet werden (wie bei Fischen in trübem Wasser), aber es ist wahrscheinlich korrekter, sie als Definition des Bereichs zu betrachten, in dem Schwarmgenossen die Lenkung eines Boids beeinflussen. In den ersten Experimenten wurde ein etwas ausgefeilteres Verhaltensmodell verwendet. Es umfasste vorausschauende Hindernisvermeidung und Zielsuche. *(…)* Für Anwendungen in der Computeranimation führte ein Zielsuchverhalten mit niedriger Priorität dazu, dass die Herde einem vorgegebenen Pfad folgte*.«
Wer sich bei dieser Beschreibung an die Strukturen postmoderner Gesellschaft erinnert fühlt und »*Agenten*« mit »*[Agent Smith](https://en.wikipedia.org/wiki/Agent_Smith)*« aus den Matrix-Filmen assoziiert, liegt nicht ganz falsch. Denn Kohäsion, Separation und Orientierung definieren nicht mehr nur das Schwarmverhalten autonomer Charaktere in Computerspielen, sondern auch die Dynamiken des gesellschaftlichen Zusammenlebens im multimedialen Panoptikum der Postmoderne.
**So nimmt es kaum Wunder, dass ein vom** **[US Air Force Laboratory](https://www.afrl.af.mil/)** **(AFRL) finanziertes** **[Forschungsprojekt](https://arxiv.org/pdf/1402.5644)** **an der University of Florida (Gainesville, USA) bereits im Jahr 2014 untersuchte, »*wie Social Media eingesetzt werden kann, um Menschen wie Drohnen zu steuern*«.**
Unter diesem Titel berichtete denn auch [Ars Technica](https://arstechnica.com/information-technology/2014/07/air-force-research-how-to-use-social-media-to-control-people-like-drones/) am 17. Juli 2014, dass der Forschungsleiter der AFRL-Studie, [Warren Dixon](https://ncr.mae.ufl.edu/index.php?id=people), seines Zeichens Chef des Lehrstuhls für nichtlineare Steuerung und Robotik an der University of Florida, vor allem daran arbeite, »*wie man ein Netzwerk, wenn man es einmal identifiziert hat, in Richtung eines Ziels manipulieren kann*«. Und mit »*Netzwerk*« meint Dixon nicht Computer, sondern soziale Strukturen.
Die Untersuchungen von Dixon, Kan, Klotz und Pasiliao – formeller Titel: »*Eindämmungskontrolle für ein soziales Netzwerk mit staatlich abhängiger Konnektivität*« – unterstreichen, dass die mathematischen Prinzipien, die zur Steuerung autonomer Agenten und Robotergruppen verwendet werden, auch auf soziale Netzwerke übertragbar sind, um menschliches Verhalten zu manipulieren. Im großen Stil. Ausgehend von einer optimalen Kalibrierung könnten die von den AFRL-Forschern entwickelten Modelle eingesetzt werden, um die Meinung auf Social-Media-Portalen in Richtung eines gewünschten Verhaltens zu lenken. Genau wie die [Cyber-Waffen](https://www.business-standard.com/article/technology/hacks-raise-fear-over-nsa-s-hold-on-cyberweapons-117070100851_1.html) der NSA (National Security Agency, USA) oder das entsprechende Arsenal des [GCHQ](https://www.gchq.gov.uk/) (Government Communication Headquarters, UK), das seine [Nudge-Unit](https://en.wikipedia.org/wiki/Behavioural_Insights_Team) nicht nur gegen Corona-Maßnahmenkritiker, sondern mittlerweile auch gegen »*[Heizpumpen-Skeptiker](https://reclaimthenet.org/uk-government-heat-pumps-nudge-unit-controversy)*« ins Feld führt.
Schwarmverhalten ist demnach nicht nur an [Chinas](https://www.eurasiantimes.com/mother-of-all-drones-china-unveil/) Himmel oder in der Nähe des vom Iran jüngst zu Wasser gelassenen Drohnenträgers [Schahid Bagheri](https://www.t-online.de/nachrichten/ausland/id_100596308/neuartiges-kriegsschiff-iran-stellt-ersten-drohnentraeger-vor.html) zu beobachten – oder in der Ukraine, wo todbringende [Minidrohnen](https://www.nzz.ch/international/ukraine-krieg-kamikaze-drohnen-machen-das-soldatenleben-zur-hoelle-ld.1825600) heute Jagd auf gegnerische Truppen machen – sondern auch in der unmittelbaren Nachbarschaft des Lesers. Denn Drohnen sind heute nicht mehr nur auf dem Schlachtfeld gang und gäbe. Der Nutzmensch selbst ist eine Drohne. Das traurige Produkt einer jahrzehntelangen [Schlacht ums Gehirn](https://gegendruck.eu/ausgaben/ausgabe-003.html).
Die Corona-Krise war Generalprobe für die Einführung des von den Verhaltensökonomen Richard Thaler und Cass Sunstein ([Nudge](https://en.wikipedia.org/wiki/Nudge_\(book\)), Yale University Press, 2008) maßgeblich entwickelten Herrschaftsmodells der Zukunft: [Hive-Mind](https://www.mdr.de/wissen/medizin-gesundheit/stranger-things-hive-mind-102.html)-Technokratie. Fernsteuerung der Massen via Social-Media-Nudging. Via geteiltem Bewusstsein. Sprich: Regieren mittels [Plattformökonomie](https://www.economist.com/business/2024/12/10/the-paypal-mafia-is-taking-over-americas-government), Manipulativkommunikation und Emotion. Mit »Soft Power«. Zumindest bis der kopflose Schwarm endlich mit der Cloud verbunden ist.
Wer also denkt, es mache Sinn, sich über Erhalt oder Verfall der Meinungsfreiheit auf einem Konzernmarkplatz wie Twitter Gedanken zu machen, erfüllt genau die Rolle, die ihm AFRL, Nudge-Unit, das NATO-[Innovation Hub](https://web.archive.org/web/20240805053751/https:/innovationhub-act.org/cognitive-warfare-2/) mit seiner »*sechsten Dimension der Kriegsführung*« und Peter Thiels PayPal-Mafia seit jeher zuschrieben: Die des geist-, willen- und haltlosen »*Agenten*« in einer überfrachteten Simulation. Nicht umsonst waren alle Big-Tech-Größen Teilnehmer der Social-Engineering-[Seminare](https://web.archive.org/web/20130511134703/http:/edge.org/conversation/libertarian-paternalism-why-it-is-impossible-not-to-nudge-class-1) von John Brockmanns [Edge-Foundation](https://www.regenauer.press/die-glorreichen-sieben).
Nicht von ungefähr soll KI nun alles »*effizienter*« machen. Wirft man allerdings einen Blick auf die [Vorstandsebene](https://openai.com/our-structure/) von OpenAI, dem [ChatGPT-Anbieter](https://openai.com/index/chatgpt/) und neben dem von der CIA [startfinanzierten](https://www.businessinsider.com/the-cia-made-larry-ellison-a-billionaire-2014-9), [Mossad-nahen](https://orinocotribune.com/oracle-the-shadowy-tech-giant-in-league-with-the-cia-and-israel-with-alan-macleod/) IT-Konzern Oracle primärer Partner von Donald Trumps [Stargate-Projekt](https://apnews.com/article/trump-ai-openai-oracle-softbank-son-altman-ellison-be261f8a8ee07a0623d4170397348c41), das KI und mRNA mit einem Budget von 500 Milliarden Dollar zusammenbringen soll, wird schnell deutlich, dass mit Effizienz nichts anderes als ein Ausbau des Überwachungsstaats gemeint ist.
Da wäre zum einen [Sue Desmond-Hellmann](https://en.wikipedia.org/wiki/Sue_Desmond-Hellmann), von 2014 bis 2020 CEO der Bill & Melinda Gates Foundation, seit 2020 Vorstandsmitglied bei [Pfizer](https://www.pfizer.com/people/leadership/board-of-directors/susan_desmond-hellmann-md-mph) und darüber hinaus im Vorstand von [Resilience](https://resilience.com/meet/team/), dem vom CIA-Finanztentakel [In-Q-Tel](https://www.iqt.org/) grundfinanzierten Biotech-Unternehmen, das [mRNA](https://betakit.com/federal-government-promises-199-16-million-to-biotech-company-resilience-biotechnologies/) für unter anderem [Moderna](https://www.nasdaq.com/articles/moderna:-national-resilience-to-manufacture-mrna-for-covid-19-vaccine-2021-09-08) produziert. Oder der [korrupte](https://exiledonline.com/is-larry-summers-taking-kickbacks-from-the-banks-hes-bailing-out/) Larry Summers, ehemals Chefökonom der Weltbank, der mit massiven [Deregulierungen](https://thehill.com/blogs/pundits-blog/finance/264675-clinton-and-summers-are-wrong-on-sanderss-glass-steagall-proposal/) des Finanzmarkts geradezu als Initiator der Finanzkrise 2008 bezeichnet werden kann und so [Tiefenstaat](https://wikispooks.com/wiki/Lawrence_Summers) ist wie es nur geht. Nicht zu vergessen Nicole Seligmann, [genannt](https://www.washingtonpost.com/archive/lifestyle/1998/08/17/the-lawyers-lawyer/9dcd901a-7026-43ea-89b0-aa8abfa8db0e/) »Anwältin der Anwälte«, ehemalige [Chefin](https://www.thewrap.com/nicole-seligman-out-as-president-of-sony-entertainment/) von Sony USA, [Rechtsbeistand](https://law.justia.com/cases/federal/appellate-courts/F2/910/843/463467/) von Oliver North während der Iran-Contra Anhörungen in den 80ern sowie Anwältin der [Clintons](https://www.washingtonpost.com/wp-srv/politics/special/clinton/stories/seligman081798.htm), unter anderem während des [Amtsenthebungsverfahrens](https://en.wikipedia.org/wiki/Impeachment_of_Bill_Clinton) gegen Bill Clinton im Jahr 1999. Von den langjährigen Facebook-Top-Managern [Fidji Simo](https://www.marieclaire.com/career-advice/a28712482/fidji-simo-facebook/), [Adam D’Angelo](https://om.co/gigaom/my-conversation-with-ex-facebook-cto-and-quora-co-founder-adam-dangelo/) und [Bret Taylor](https://www.forbes.com/sites/tomiogeron/2012/06/15/facebook-cto-bret-taylor-to-leave-company/) ganz zu schweigen.
Angesichts dieser Mannschaft dürfte niemand überrascht sein, dass OpenAI-CEO Sam Altman von seiner jüngeren Schwester des jahrelangen [Missbrauchs](https://www.theguardian.com/technology/2025/jan/08/openai-chief-executive-sam-altman-accused-of-sexual-abuse-by-sister-in-lawsuit) bezichtigt wird und sich dafür demnächst vor Gericht verantworten muss – oder dass ein Whistleblower, der zu illegalen Aktivitäten bei OpenAI aussagen wollte, im Dezember 2024 überraschend tot in seiner Wohnung aufgefunden wurde, weshalb dessen Eltern Sam Altmans Unternehmen nun [Mord](https://www.newsweek.com/openai-tucker-carlson-whistleblower-death-2015874) vorwerfen und die Stadt San Francisco wegen schlampiger Ermittlungen [verklagen](https://nypost.com/2025/02/08/us-news/big-tech-whistleblowers-parents-sue-san-francisco-sounding-alarm-over-sons-unexpected-death/).
Erstaunlich ist lediglich, dass diese Informationen nicht in aller Munde sind und Menschen wie Sam Altman und Oracle-Gründer Larry Ellison an Tag zwei nach Donald Trumps Amtseinführung als Partner einer US-Regierung präsentiert werden, die angeblich den Tiefenstaat ausheben will.
Aufmerksame Beobachter des militärisch-digitalen Komplexes dürften diese Umstände allerdings kaum noch schockieren. Denn gerade das US-Militär fokussiert sich seit Jahren auf die Verwendung von Open Source Intelligence – meint Handydaten, Social-Media-Inhalte, Daten-Leaks, Hacks und KI –, um aufständischen Zellen auf den Zahn zu fühlen. So gründete die DARPA im Jahr 2011 das SMISC-Programm (Social Media in Strategic Communication). Ausgestattet mit einem Budget von knapp 50 Millionen US-Dollar gingen Wissenschaftler der Frage nach, wie sich soziale Netzwerke für Propaganda und psychologische Kriegsführung nutzen lassen. Der Initiator von SMISC, Rand Waltzman, ein DARPA-Manager, [beschrieb](https://information-professionals.org/the-darpa-social-media-in-strategic-communication-smisc-program/) im April 2015, worin die vier Kernziele des von ihm ins Leben gerufenen Programms bestanden:
1. Erkennen, klassifizieren, messen und verfolgen der Entstehung und Entwicklung sowie Verbreitung von Ideen und Konzepten (Memes) und gezielte oder irreführende Nachrichten und Fehlinformationen.
2. Erkennen der Strukturen von Überzeugungskampagnen und Einflussoperationen auf Social-Media-Sites und Communities.
3. Identifizieren der Teilnehmer und Absichten und messen der Auswirkungen von Überzeugungskampagnen.
4. Verbreiten von Gegeninformation bei erkannten gegnerischen Einflussoperationen.
Darüber hinaus erklärte Waltzman, welchen technischen Umfang, beziehungsweise Fokus die Analyseprozesse aufwiesen:
1. Sprachliche Hinweise, Muster des Informationsflusses, Analyse von Thementrends, Analyse narrativer Strukturen, Stimmungserkennung und Meinungsforschung.
2. Meme-Tracking in Communities, Graphen-Analyse, probabilistisches Denken, Mustererkennung, kulturelle Narrative.
3. Induzieren von Identitäten, Modellieren entstehender Communities, Vertrauensanalyse, Modellieren von Netzwerkdynamiken.
4. Automatisierte Inhaltsgenerierung, Bots in sozialen Medien, Crowdsourcing.
Die DARPA untersuchte [Twitter](https://www.theguardian.com/world/2014/jul/08/darpa-social-networks-research-twitter-influence-studies)-Follower prominenter Musiker, analysierte die Verbreitung von [Memes](https://web.archive.org/web/20121114225259/https:/www.cs.cmu.edu/~badityap/papers/composite-ccr12.pdf) und testete operative Ansätze einer [IBM-Studie](https://aaai.org/papers/00121-14513-modeling-user-attitude-toward-controversial-topics-in-online-social-media/), die sich mit der »*Modellierung von Nutzerverhalten bei kontroversen Themen auf Social Media*« befasste. Am 9. Juli 2014 veröffentlichte die DARPA eine [Liste](https://web.archive.org/web/20140709083209/https:/www.darpa.mil/OpenCatalog/SMISC.html) von 181 vom SMISC-Programm finanzierten Projekten, die sich allesamt mit dem Thema psychologische Kriegsführung auf Social Media befassten. Im Vordergrund stand jeweils die Graph-Theorie, also die Analyse des Verhaltens von Menschen anhand sozialer Daten. Die Formelsprache, die von den Projekten zur mathematischen Beschreibung der Interaktionen zwischen Menschen und Produkten verwendet wurde, war dieselbe, die bei der Steuerung autonomer Fahrzeug-Gruppen zur Anwendung kommt. Sie bildet das Herzstück von Googles Verständnis zu Suchkontexten und ist grundlegender Bestandteil von Kontrollsystemen zur Steuerung autonomer Roboterschwärme.
Warren Dixon und die DARPA gingen nun aber der Frage nach, ob die gleiche Mathematik auf die Steuerung autonomer Menschen und Gruppen von Menschen anwendbar ist. Um zu verstehen, was das bedeutet, folgend eine Erläuterung zum Facebook-Graph, über den [Ars Technica](https://arstechnica.com/information-technology/2013/03/knowing-the-score-how-facebooks-graph-search-knows-what-you-want/) am 14. März 2013 berichtete:
»*Der Graph ist eine Datenbank, die Informationen über Benutzer, Seiten und andere Objekte im Facebook-Universum speichert. Er enthält auch die Beziehungen zwischen ihnen. Jede Entität, also jeder Knoten im Facebook-Graph – identifiziert durch eine eindeutige Nummer, die als fbid (Facebook-ID) bezeichnet wird – ist mit einer Reihe von Attributen oder Metadaten verknüpft. Die Beziehungen zwischen diesen Knoten, die als Kanten bezeichnet werden, enthalten ihre eigenen Metadaten, um die Art der Beziehung zwischen ihnen zu beschreiben. Die von Facebook verwendete Graph-Datenbank ist Googles [Knowledge-Graph](https://arstechnica.com/information-technology/2012/06/inside-the-architecture-of-googles-knowledge-graph-and-microsofts-satori/) und Microsofts Satori-Graph-basiertem Konzept recht ähnlich. In vielerlei Hinsicht ist die Struktur des Facebook-Graphs jedoch einfacher als die Graph-Schemata von Google und Microsoft, da Facebook die Metadaten für seine Knoten und Kanten speziell auf soziale Interaktion abgestimmt hat*.«
Dixons AFRL-Arbeitsgruppe nutze solche Daten, um zu modellieren, wie die Zusammenarbeit zwischen »*wichtigen Influencern*« in sozialen Netzwerken das Verhalten von Gruppen innerhalb dieses Netzwerks beeinflussen könnte. Stichwort: »*Eindämmungskontrolle*«. Dixon selbst erläuterte dieses Konzept mit den Worten:
**»*Es gibt eine Gruppe von Anführern, von denen jeder seine eigenen Ziele und sein eigenes Schwerpunktthema hat. Unser Ziel ist, dass diese Leute ihre Meinung ändern und die Gruppe der Anhänger – also Leute, die zu ihrer sozialen Gruppe gehören, aber das übergeordnete Ziel nicht kennen – unter Druck setzen*.«**
Unter Zuhilfenahme der Graphen-Theorie erarbeiteten Dixon und Co. ein Kommunikationsmodell, das verständlich machte, wie viel Einfluss ein Social-Media-Influencer benötigt, um Macht auszuüben und das Verhalten seiner Follower zu ändern. Während die DARPA im Rahmen mehrerer Pressemitteilungen versicherte, weder persönlichkeitsbezogene Daten zu speichern noch Social-Media-User zu manipulieren, hatte man beim GCHQ in Großbritannien weniger Hemmungen. Wie die von NSA-Whistleblower Edward Snowden geleakten Dokumente [belegen](https://arstechnica.com/information-technology/2014/07/ghcqs-chinese-menu-of-tools-spread-disinformation-across-internet/), hatte der britische Nachrichtendienst ein ganzes Arsenal digitaler Waffen zur Hand, um Individuen und ihre Geräte zu infiltrieren, Fake-Identitäten aufzubauen, Falschinformationen zu verbreiten und die öffentliche Meinung zu »*formen*«. Diese Werkzeuge teilte das GCHQ mit der NSA, die sie ihrerseits anwandte, um in Afghanistan und anderen Krisengebieten zu steuern, welche Informationen gegnerische Gruppen online und über das Smartphone abrufen konnten.
Neben Militär, Geheimdiensten und Tech-Konzernen sind natürlich auch Organisationen wie USAID und das NED (National Endowment for Democracy) auf dem Feld der Cyber-Kriegsführung aktiv. Im [April 2014](https://taz.de/Twitterplattform-ZunZuneo/!5045053/) wurde zum Beispiel bekannt, das USAID auf Kuba ein Twitter-ähnliches Netzwerk aufbauen wollte, um das kommunistische Regime zu unterminieren. Dass es sich dabei nicht um Einzelfälle handelt, veranschaulicht ein [Report](https://www.ox.ac.uk/news/2021-01-13-social-media-manipulation-political-actors-industrial-scale-problem-oxford-report) der Universität Oxford, der am 13. Januar 2021 veröffentlicht wurde und Social-Media-Manipulation in gut 80 Ländern analysierte:
**»*In jedem der 81 untersuchten Länder wurden organisierte Kampagnen zur Manipulation sozialer Medien festgestellt, ein Anstieg von 15 Prozent innerhalb eines Jahres, verglichen mit 70 Ländern im Jahr 2019. Dem Bericht zufolge produzieren Regierungen, PR-Agenturen und politische Parteien im industriellen Maßstab Falschinformationen. Er zeigt, dass Desinformation zu einer gängigen Strategie geworden ist, wobei in mehr als 93 Prozent der Länder Desinformation als Teil der politischen Kommunikation eingesetzt wird*.«**
»*Die Leute denken nicht gern daran, dass sie manipuliert werden*«, so Warren Dixon. »*Aber wir werden jeden Tag manipuliert. Durch Werbung, durch Regierungschefs, religiöse Führer und sogar dazu, zur Arbeit zu gehen. Wir arbeiten größtenteils deswegen, weil wir dafür bezahlt werden. Aber wie viel muss ich jemandem für seine Arbeit zahlen?*«
Gute Frage. Wie viel muss man jemandem bezahlen, damit er lügt, damit er seinen besten Freund verrät oder einen Menschen ermordet? Oder ein paar tausend Menschen? Mit solchen Fragen beschäftigen sich die Verhaltensforscher, die Big Tech und Geheimdienste beraten, die Algorithmen und soziale [Feedback-Loops](https://youtu.be/J54k7WrbfMg?si=GgS-5yx7vgKFbPtB) kreieren. Denn Suchmaschinen und Social Media sind kein Serviceangebot, sondern eine Waffengattung kognitiver Kriegsführung. Die Projektile des Informationskriegs. Und die meisten Menschen sind dem Kugelhagel schutzlos ausgeliefert.
Die zeitgeistig flexible Herrschaftskaste weiß diesen Umstand zum eigenen Vorteil zu nutzen. Gerade deshalb ist »*Agent Smith*« eine perfekte wie düstere Parabel für den modernen Nutzmenschen, der sein Leben online führt und im digitalen Raum binnen Sekunden Entscheidungen trifft, für die ihm jede inhaltliche Grundlage fehlt. Entscheidungen, die sein Selbstbild nachhaltig verändern. Wer das System eben noch kritisierte, wedelt im nächsten Moment mit Pompons, um es zu bejubeln. Denn die Transformation des Ich ist dieser Tage immer nur einen Klick entfernt.
»*Smith begann als Agent, ein KI-Programm in der Matrix, das darauf programmiert war, die Ordnung im System aufrechtzuerhalten, indem es menschliche Simulakren eliminierte, die die simulierte Realität instabil machen würden, sowie alle Schurkenprogramme, die für das Maschinenkollektiv keinen Zweck mehr erfüllen. *(…)* Smiths wahre Macht beruht auf seiner Fähigkeit, Erinnerungen und Kräfte seiner Opfer – Menschen und Programme gleichermaßen – zu absorbieren. *(…)* Smith erlangt die Macht, seine physische Form auf jedes Wesen in der Matrix zu kopieren, indem er seine Hand in ihren Körper eintauchen lässt und eine schwarze Flüssigkeit verteilt, die sie in eine Kopie seiner selbst verwandelt, was zu einer ständig wachsenden Armee von Smiths führt, die durch ein einziges Bewusstsein verbunden sind*.«
**Wer sich also fragt, warum seine vormals maßnahmen- und obrigkeitskritischen Weggefährten nun dem tiefenstaatlich orchestrierten MAGA-Kult huldigen, findet die Antwort in DARPA-Studien zum Thema »*Steuerung des Gruppenverhaltens mittels Social Media*«.**
Neu ist das alles nicht. Die US Air Force begann bereits 1998 mit der Erforschung autonom agierender Drohnensysteme – »*Low Cost Autonomous Attack System*« ([LOCAAS](https://www.globalsecurity.org/military/systems/munitions/locaas.htm)) genannt. Die LOCAAS-Systeme nutzten einen Algorithmus, der auf Craig Reynolds’ Boids-Modell basiert, um in Formation eines Schwarms zu fliegen. Warf ein Tarnkappenbomber seine bis zu 192 Drohnen ab, begannen sie sich untereinander zu verständigen und attackierten feindliche Truppen im Verbund.
Das war vor 27 Jahren. Heute gehören Drohnen zum zivilen Alltag. So betreibt die [Swisscom](https://www.swisscom.ch/de/business/broadcast/sicherheitsloesungen/drohnennetzwerk-schweiz.html) in der Schweiz in Kooperation mit Nokia ein Drones-as-a-Service (DaaS) Netzwerk für »*effiziente Inspektionen und die Sicherung großer Areale sowie zentraler Infrastruktur*«. Das klingt zunächst einmal nach privatwirtschaftlicher Dienstleistung auf Abruf. Aber: »*Blaulichtorganisationen sollen diese Drohnen auf Abruf nutzen können, um dank detailliertem Bildmaterial* (…) *Informationen von Unfallstellen, Katastrophengebieten oder Tatorten einzuholen*«, so der [Tagesanzeiger](https://www.tagesanzeiger.ch/swisscom-ueberwachung-mit-drohnen-datenschutz-unklar-998244957315) am 18. August 2024. Was für Bildmaterial in welcher Auflösung wann, wo, warum aufgezeichnet und gespeichert wird, ist indes unklar. Hiesige Datenschützer sind alarmiert.
Aus gutem Grund. Denn auch in der Kriegsführung gehören Drohnen mittlerweile zum Tagesgeschäft. Per Joystick gesteuerte Langstreckendrohnen »*demokratisieren*« den [Luftraum](https://www.thebureauinvestigates.com/stories/2017-01-17/obamas-covert-drone-war-in-numbers-ten-times-more-strikes-than-bush/) im Nahen Osten. Bevorzugt mit lasergesteuerten GBU-12 Paveway II Bomben. Mini-Drohnen [überwachen](https://www.youtube.com/watch?v=wW7lUdvJl7Q) unauffällig das Einsatzgebiet und töten gezielt per [Kopfschuss](https://www.youtube.com/watch?v=TlO2gcs1YvM). [Kamikaze](https://www.youtube.com/watch?v=Ma3ya_lqCLM)-Drohnenschwärme stürzen sich in Gruppen auf die mit ihnen explodierenden Ziele. Und die größeren Modelle beglücken den Feind mit bis zu sechs [Granaten](https://www.youtube.com/watch?v=mT5FKNQ2Fg8).
Projekte des US-Militärs und [chinesische](https://youtu.be/LpaSXwpKzGk?si=6bKHlqaoi_mpURDn) Guinness-Weltrekorde im Drohnen-Formationsflug [zeigen](https://www.regenauer.press/null), dass es wohl nicht mehr allzu lange dauern wird, bis autonome Schwärme, die von ebenso autonomen Trägerfahrzeugen verteilt und aufgeladen werden, Krisengebiete, Grenzen und Innenstädte überwachen – und schützen. Fragt sich nur, vor wem.
Die inflationäre Verwendung von und progressiv-positive Kommunikation zu Drohnentechnologie sowie KI sollte also durchaus zu denken geben. Denn was dem Hobbyfilmer günstige Luftaufnahmen liefert und Zuschauern in Form eines illuminierten [Drachens](https://www.youtube.com/watch?v=3G1KBu6H6BM) aus 1.500 Drohnen über Shenzen Bewunderung abnötigt, dürfte die nächste Ausbaustufe militarisierter Überwachungsinfrastruktur charakterisieren.
Der gemeine »*Agent*«, die »*iDrone*«, der Boid – also der von medialer Dynamik und Polarisierungsdialektik überforderte Homo demens – sieht diesen Entwicklungen natürlich weithin gelassen entgegen. Denn er »*bewegt sich in Richtung des Mittelpunkts derer, die er in seinem Umfeld sieht, entfernt sich, sobald ihm jemand zu nahe kommt und läuft immer in etwa die gleiche Richtung wie seine Nachbarn*«.