-

@ 712d0fec:3e5d56c8
2025-02-25 22:04:48
**Autor:** [Pablito.eth](https://x.com/PabloSabbatella)
**Tweet Original:** [Ver Tweet](https://x.com/PabloSabbatella/status/1893752288201863200)
## Se Recomienda Leer el Tweet Original
Aunque este artículo proporciona un resumen de los consejos de Pablito.eth, se recomienda encarecidamente leer el tweet original para obtener todos los detalles directamente del autor. El tweet contiene matices y ejemplos que pueden complementar la información presentada aquí
## Introducción
En un mundo donde nuestros dispositivos móviles contienen tanta información personal y sensible, perder un celular puede ser un verdadero dolor de cabeza. El incidente reciente de Pablito.eth en Palermo nos ofrece enseñanzas valiosas sobre cómo estar preparados para este desafortunado escenario. Aquí te comparto un resumen y análisis de sus recomendaciones.
## Resumen del Tweet
Pablo expuso los siguientes puntos para proteger tu celular en caso de robo o perdida:
1. **Activar la Protección contra Robo:**
- Usa "Theft protection" en **Android** o "Stolen device protection" en **iOS**.
2. **Seguridad del SIM:**
- Pon un PIN al chip de la SIM para evitar su uso no autorizado.
- Si tienes la tarjeta original, guarda el código PUK para emergencias.
3. **Localización del Dispositivo:**
- Activa "Find my device" o "Find my Android" para localizar el celular.
- Comparte tu ubicación en tiempo real con alguien de confianza.
4. **Bloqueo de Aplicaciones:**
- Usa PIN, huella digital o FaceID en apps con información sensible: bancos, fintechs, crypto, email, fotos, mensajerías, etc.
5. **Revisión de Seguridad:**
- Revisa qué información puede acceder un criminal sin biometría. Elimina o protege datos sensibles.
6. **Gestión de Aplicaciones:**
- Desinstala apps que no uses diariamente para reducir riesgos.
7. **Copia de Seguridad:**
- Duplica tu celular en un dispositivo viejo y guárdalo de forma segura, con batería y apagado.
8. **Protección para Mensajería:**
- Aplica FaceID o huella digital para abrir WhatsApp y Telegram cada vez.
9. **Número de Recuperación:**
- Evita usar tu número de celular como número de recuperación para cuentas.
10. **Listados de Emergencia:**
- Crea un documento con números de teléfono importantes para bloquear el chip, bancos, etc.
## Citas
Pablito.eth enfatizó:
*"Gracias a que estaba preparado para este escenario, no pudieron hacer absolutamente nada con el mismo (ni formatearlo). Van un par de recomendaciones simples que les evitarán un dolor de cabeza si algún día les sucede."*
*"Estos puntos a tener en cuenta son los más básicos pero les van a permitir estar un 95% seguros."*
## Conclusión
La experiencia de Pablito.eth nos recuerda que tomar medidas preventivas puede ahorrarnos muchos problemas si nuestro celular llega a caer en las manos equivocadas. Implementar estas estrategias no solo protege nuestra información sino que también disuade a los potenciales ladrones de acceder a nuestros datos personales.
## Referencias y Créditos
Puedes seguir a [Pablito.eth](https://x.com/PabloSabbatella) en Twitter para más consejos y experiencias sobre seguridad informática.
-

@ 67403b2c:27b48c7a
2025-02-25 21:38:26
## The inconvenient truth about success that productivity gurus don't want you to know
"Just work harder."
If you're like me, you've heard this advice hundreds of times. It's plastered across LinkedIn posts, echoed in graduation speeches, and whispered in performance reviews. But here's what nobody tells you: it might be the most damaging piece of career advice ever given.
## The Religion of Hard Work
From an early age, we're indoctrinated into what I call "the religion of hard work." Its commandments are simple:
- Thou shalt hustle 24/7
- Thou shalt glorify the grind
- Thou shalt feel guilty about rest
We worship at the altar of productivity porn, sharing stories of self-made millionaires and pioneering entrepreneurs who "made it" through sheer force of will. The gospel is clear: work harder than everyone else, and success will follow.
But here's the inconvenient truth: it's mostly fiction.
## The Data Tells a Different Story
Let's look at what research actually shows:
- A 2022 study found that socioeconomic background was *twice* as predictive of career advancement as work ethic
- 77% of professionals report burnout at their current jobs
- Productivity *plummets* after 50 hours of work per week
- Working longer hours directly correlates with increased rates of depression and anxiety
Think about that for a second. We're killing ourselves for a promise that data shows isn't even true.
## The Real Success Stories Nobody Talks About
The tech industry—my world for the past decade—provides the perfect case study. For every "overnight success" story about a founder who worked 100-hour weeks, there are dozens of equally hard-working teams that failed. The difference? Usually not effort, but timing, connections, or plain old luck.
Remember Friendster? They worked just as hard as Facebook. MySpace? They grinded just like Twitter. The difference wasn't effort—it was everything else.
## The Nordic Model: Working Less, Achieving More
Here's what really bakes my noodle: the countries with the shortest working hours often have the highest productivity and happiness levels. Take Denmark and Norway:
- Shorter workweeks
- More vacation time
- Higher productivity per hour
- Consistently ranked among the world's happiest nations
They've cracked the code that we're still trying to figure out: working smarter beats working harder.
## A Better Way Forward
Instead of measuring success in hours worked or sacrifices made, what if we measured it in:
- Mental health preserved
- Relationships strengthened
- Creative projects completed
- Life experiences gained
Companies like Buffer and Basecamp aren't just experimenting with this approach—they're proving it works. Their four-day workweeks and "calm company" philosophies haven't hurt their bottom lines; they've helped them.
## The Real Revolution
The next time someone tells you to "just work harder," remember this: hard work has its place, but it's just one ingredient in a complex recipe. The real revolution isn't in grinding ourselves down—it's in building a life where success doesn't require sacrifice.
Because maybe, just maybe, the smartest thing we can do is stop working so hard at working hard.
---
*If this resonated with you, hit the subscribe button below. I write weekly about rethinking traditional career advice and finding better ways to define and achieve success.*
-

@ 67403b2c:27b48c7a
2025-02-25 21:37:22
The heat was relentless—a suffocating force that offered no refuge. Our world shrank to the confines of portable toilets and the fleeting mercy of a mobile shower truck. Even the simple dignity of clean clothes hung precariously on the whims of a laundry service that weaponized access as a form of control.
We lived under the weight of an institutional facade, where arbitrary rules served not order but power. Minutes late to retrieve laundry? The facility would shut down for the day. Showers became bargaining chips, withdrawn for imagined infractions. The computer room, our sole sanctuary of climate control, stood as a cruel mirage—perpetually promised, perpetually denied. Only the Wi-Fi remained steadfast, a digital umbilical cord to the world beyond our suspended reality.
In this liminal space between citizen and prisoner, I discovered an unexpected salvation in vulnerability. The act of opening up to my family about my circumstances didn't just halve the burden—it restored a piece of my humanity. Yet even now, with those days behind me, the memories trigger visceral responses that ripple through my body like aftershocks of trauma.
The path to homelessness is a gradual unraveling. One moment, you're maintaining a precarious balance of employment and housing; the next, you're watching that fragile stability dissolve. The stress manifests physically—a constant companion that transforms into waves of terror and overwhelming dread. Even now, recounting these experiences summons that familiar tide of panic, threatening to pull me under.
Survival mode rewires your priorities with brutal efficiency. When shelter becomes uncertain, the body's response is primal and absolute:
- Communications fade to white noise
- Basic needs become luxury items
- The world contracts to a single imperative: find safety
In these moments of acute crisis, even fundamental human needs—food, connection, dignity—become secondary concerns. Shelter becomes an obsession, sought in any form: a public restroom, a quiet corner, any space that offers temporary reprieve from exposure.
The myth of multitasking crumbles when basic survival consumes every ounce of mental energy. Each day balances precariously on the edge of catastrophe, where the slightest disruption can trigger a cascade of survival responses. These aren't conscious choices but reflexive adaptations—often destructive, always necessary.
Walking through society wearing the invisible marks of homelessness teaches you about humiliation, but also about resilience. There's something profoundly dehumanizing about having your existence reduced to pure survival, yet within that stripped-down reality, hope persists—stubborn and essential as a heartbeat. Every step forward becomes an act of reclaiming identity, even as worn clothes and weathered dignity remind you of the distance still to travel.
This narrative transcends personal testimony—it illuminates how survival consciousness reshapes human experience. My coping mechanisms, however imperfect, represent more than individual strategies; they reflect the universal human drive to preserve dignity in the face of systematic degradation. Through this lens, physical deprivation and emotional trauma reveal a deeper truth: resilience isn't about thriving, but about maintaining our essential humanity when circumstances conspire to strip it away.
# Garden of Modern Eden
Every Sunday, Adon watched Elder Clark stand at the pulpit, his voice carrying across the congregation like thunder. The elder preached about strength, about what made a "real man"—always with those air quotes that made Adon's stomach turn.
After service one morning, Adon overheard Clark counseling another young man. "Stand alone. That's what men do. We don't need help, we don't ask for it." The words felt like stones dropping into Adon's chest, each one heavier than the last.
Adon thought about Steve waiting in their apartment, about the strength it took to be themselves in a world that seemed determined to deny their existence. He thought about Clark's daughter, who had transitioned years ago and now lived states away, sending only Christmas cards that were never acknowledged.
"Funny," Adon whispered to himself as he walked home that day, "how some people trust G_d with everything except the beautiful diversity of His creation." He smiled, finally understanding that true strength wasn't in standing alone—it was in standing proudly as the person you were meant to be, even when others refused to see you. his voice carrying across the congregation like thunder. The elder preached about strength, about what made a "real man"—always with those air quotes that made Adon's stomach turn.
After service one morning, Adon overheard Clark counseling another young man. "Stand alone. That's what men do. We don't need help, we don't ask for it." The words felt like stones dropping into Adon's chest, each one heavier than the last.
Adon thought about Steve waiting in their apartment, about the strength it took to be themselves in a world that seemed determined to deny their existence. He thought about Clark's daughter, who had transitioned years ago and now lived states away, sending only Christmas cards that were never acknowledged.
"Funny," Adon whispered to himself as he walked home that day, "how some people trust G_d with everything except the beautiful diversity of His creation." He smiled, finally understanding that true strength wasn't in standing alone—it was in standing proudly as the person you were meant to be, even when others refused to see you.

---
Love what you see? Support my work! ☕
Your coffee donations help fuel new content and keep this project going. I'd love to hear your thoughts and feedback too!
👉 [Buy me a coffee at buymeacoffee.com/adontai](https://buymeacoffee.com/adontai)
-

@ 4c96d763:80c3ee30
2025-02-25 20:49:59
# Changes
## Daniel D’Aquino (8):
- Add release process issue template
- Reduce swipe sensitivity on thread chat view
- Fix issue where a NWC connection would not work unless restarting the app
- Implement developer feature to avoid distractions
- Fix issue where a NWC connection would not work unless restarting the app
- Fix issue where note persisted after note publication
- Add development and testing tips
- Improve open action handling for notifications
## Terry Yiu (6):
- Export strings for translation
- Remove preview strings from translation and add missing period to duplicate string to avoid double translation
- Trim whitespaces from Lightning addresses
- Fix reposts banner to be localizable
- Add Conversations tab to profiles
- Remove mystery tabs meant to fix tab switching bug that no longer exists
## Transifex (23):
- Translate Localizable.strings in pt_PT
- Translate Localizable.strings in pt_PT
- Translate Localizable.strings in pt_PT
- Translate Localizable.strings in pt_PT
- Translate Localizable.strings in pt_PT
- Translate Localizable.stringsdict in th
- Translate Localizable.strings in th
- Translate Localizable.strings in th
- Translate Localizable.strings in th
- Translate Localizable.strings in th
- Translate Localizable.strings in th
- Translate InfoPlist.strings in nl
- Translate InfoPlist.strings in nl
- Translate Localizable.strings in nl
- Translate Localizable.strings in de
- Translate InfoPlist.strings in de
- Translate Localizable.strings in de
- Translate InfoPlist.strings in ja
- Translate InfoPlist.strings in th
- Translate Localizable.strings in th
- Translate Localizable.strings in pl_PL
- Translate InfoPlist.strings in pl_PL
- Translate InfoPlist.strings in pl_PL
## William Casarin (2):
- Revert "Update EventMenu.swift"
- prs: ensure PR always have a linked issue
## alltheseas (1):
- Update EventMenu.swift
pushed to [damus:refs/heads/master](http://git.jb55.com/damus/commit/935a6cae7a199871f06e42190919844c87266a1b.html)
-

@ 9c565c1b:25f42470
2025-02-25 20:43:52
-

@ 3ad01248:962d8a07
2025-02-25 20:35:10
It has almost been a month since the Bitcoin friendly Trump administration has been in power. The Bitcoin price was riding high days before and after the election with Bitcoin reaching a new all time high of 109k. It sure seem like surely once Trump got into office the price would skyrocket and everyone finally would have lambos and girlfriends.
Sadly for the number go up crowd this didn't happen. There are no lambos to be found and no girlfriends. All we get is some sideways price action and a promise to look at creating a Strategic Bitcoin Reserve (BSR) or some kind of sovereign wealth fund.
If you are in Bitcoin for the right reasons and understand what you hold, this is the perfect time to stack sats before the price goes parabolic. I say this because Bitcoin sure seems to be poised to make a massive run. If you look past the current price of Bitcoin you can see a storm of dollars flowing into Bitcoin from the traditional fiat economy. The signs are there if you start looking for them.
## US States Creating Bitcoin Strategic Reserves
Guess how many states are considering creating a state level Bitcoin reserve of their own? Lots. Here is a list of states that are thinking about creating a reserve for their state:
- [Alabama](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#alabama)
- [Arizona](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#arizona)
- [Florida](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#florida)
- [Kansas](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#kansas)
- [Illinois](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#illinois)
- [Iowa](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#iowa)
- [Massachusetts](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#massachusetts)
- [Michigan](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#michigan)
- [Missouri](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#missouri)
- [Montana](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#montana)
- [New Hampshire](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#new-hampshire)
- [New Jersey](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#new-jersey)
- [New Mexico](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#new-mexico)
- [North Carolina](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#north-carolina)
- [North Dakota](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#north-dakota)
- [Ohio](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#ohio)
- [Pennsylvania](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#pennsylvania)
- [South Dakota](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#south-dakota)
- [Texas](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#texas)
- [Utah](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#utah)
- [Wisconsin](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#wisconsin)
- [Wyoming](https://crypto.news/the-list-us-states-embracing-bitcoin-reserves-growing/#wyoming)
Each state is at some varying degree of interest in creating a reserve. Texas and Arizona are by far have made the most progress on making a Bitcoin reserve a reality. [Texas is currently holding a public hearing on this at the time of this writing](https://bitcoinworld.co.in/texas-senate-bitcoin-reserve-hearing/). There is strong political will to create a reserve so I definitely can see them being first movers on this and once Texas makes it a reality the other state will move in short order.
[Arizona's strategic reserve bill passed the senate finance committee ](https://www.coinspeaker.com/arizona-senate-approves-strategic-bitcoin-reserve-bill/)on a 5-2 which is a big deal in itself but still has a long way to go before it becomes policy. If it passes the Senate it still has to pass the Arizona House of Representatives and signed by Democrat Governor Katie Hobbs, so the odds of this becoming law is slim. Arizona Democrats seem to be anti-Bitcoin in general and any bills coming from Republicans will likely be shoot down or watered down.
[Analysts believe that $23 billion could flow into Bitcoin](https://cryptopotato.com/us-state-strategic-bitcoin-reserves-could-buy-23b-in-btc-vaneck/) from government reserves which equates to 247k Bitcoin going into government cold storage. I have reservations about governments creating BSR's but if we are going to have them I much rather them be at the state level where it can benefit citizens the most. Especially state pension funds that so many of our firefighters, police and first responders depend on for retirement.
We will probably see a state level BSR created by the end of the year if not sooner. Time will tell.
### SAB 121 Repeal
What is SAB 121? SAB 121 or Staff Accounting Bulletin 121 made it problematic for financial institutions to custody digital assets such as Bitcoin for their customers. SAB 121 required institutions to record their holdings as a liability and not an asset.
Naturally banks and other financial institutions didn't see an upside to custody digital assets if it meant taking on liability and having an administration that was hostile to crypto in general. Why take the chance to piss off the government and give them a reason to go after you is probably the reasoning of most bank executives. SAB 121 achieved the goal the Biden administration set out to accomplish, namely stymie Bitcoin adoption by banks and individuals as long as possible.
[President Trump swiftly issued a executive order rescinding SAB 121](https://www.fireblocks.com/blog/the-repeal-of-sab-121-a-new-chapter-for-u-s-leadership-in-crypto/) and with that ushering a new era in the realm of Bitcoin and digital assets in general. Financial institutions now have the ability to explore Bitcoin custody solutions that fit their customer's need without fear of having to record a liability on their books.
As more and more people and business learn about Bitcoin third party custody options are going to be popular. Think about it from a small business owner perspective for a second. They are in the business of selling their widgets for Bitcoin but they don't want to manage the complexity that comes with accounting, taxes etc.. In steps in their local bank that they have been with for years if not decades and starts providing Bitcoin management services. Small business owners would be all over that idea. In the long run I think the repeal of SAB 121 is going to be a bigger deal than states creating Bitcoin strategic reserves.
### FASB
Financial Accounting Standards Board or FASB for short has applied fair value accounting rules on Bitcoin and other digital assets. This is a huge deal because it will allow business to realize profit and losses of Bitcoin based on market prices. It also makes it easier for investors who evaluate businesses that hold Bitcoin on their balance sheet. Overall it treats Bitcoin like any other asset that a business would hold.
This accounting rule change will pave the way for more businesses to put Bitcoin on their balance sheet further driving demand for Bitcoin.
#### Lightning Companies Leading The Way
We all know that L1 Bitcoin can not scale to the entire world and that in order to bring more people into Bitcoin that layer two solutions would have to be built. This has largely been done with the creation of the lightning network which enables seamless peer to peer micropayments in the blink of an eye.
Base layer Bitcoin will certain not be used to buy your daily coffees or gym memberships but lightning will be used for that purpose. Businesses small and large will demand one click on demand solutions to help them accept Bitcoin payments for their businesses. There are plenty of Bitcoin business ready to help business adopt a Bitcoin standard.
Businesses such as [Opennode,](https://opennode.com/) [Zaprite](https://zaprite.com/), [Voltage](https://www.voltage.cloud/), [Breez](https://breez.technology/) make switching over to a Bitcoin standard easy for businesses to do.
So when you take a step back and really look at the Bitcoin ecosystem it is a lot more mature than most give it credit for and will slowly eat away at fiat currency dominance around the world.
The best thing that you can do is be patient, stack as many sats as you can and educate others about Bitcoin. We all know how fiat currencies end. Our time will come.
-

@ c1e9ab3a:9cb56b43
2025-02-25 19:49:28
# 1. Introduction
Modern election systems must balance **privacy** (no one sees how individuals vote) with **public verifiability** (everyone can confirm the correctness of the tally). Achieving this in a decentralized, tamper-resistant manner remains a challenge. Nostr (a lightweight protocol for censorship-resistant communication) offers a promising platform for distributing and archiving election data (ballots) without relying on a single central server.
This paper presents a design where:
1. Each *voter* generates a **new ephemeral Nostr keypair** for an election.
2. The election authority (EA) **blind-signs** this ephemeral public key (npub) to prove the voter is authorized, without revealing which voter owns which ephemeral key.
3. Voters cast *encrypted ballots* to Nostr relays, each carrying an **OpenTimestamps** proof to confirm the ballot’s time anchor.
4. **Re-voting** is allowed: a voter can replace a previously cast ballot by publishing a *new* ballot with a *newer* timestamp.
5. Only the *latest valid ballot* (per ephemeral key) is counted.
We combine well-known cryptographic primitives—**blind signatures**, **homomorphic or mix-net encryption**, **threshold key management**, and **time anchoring**—into an end-to-end system that preserves anonymity, assures correctness, and prevents double-voting.
---
# 2. Roles and Components
## 2.1 Voters
- **Long-Term (“KYC-bound”) Key**: Each voter has some identity-verified Nostr public key used only for official communication with the EA (not for voting).
- **Ephemeral Voting Key**: For each election, the voter **locally generates** a new Nostr keypair \((nsec_e, npub_e)\).
- This is the “one-time” identity used to sign ballots.
- The EA never learns the real identity behind \(\npub_e\) because of **blinding**.
## 2.2 Election Authority (EA)
- Maintains the **official voter registry**: who is entitled to vote.
- **Blind-Signs** each valid voter’s ephemeral public key to authorize exactly one ephemeral key per voter.
- Publishes a **minimal voter roll**: e.g., “Voter #12345 has been issued a valid ephemeral key,” without revealing which ephemeral key.
## 2.3 Nostr Relays
- Decentralized servers that store and forward events.
- Voters post their ballots to relays, which replicate them.
- No single relay is critical; the same ballot can be posted to multiple relays for redundancy.
## 2.4 Cryptographic Framework
1. **Blind Signatures**: The EA signs a blinded version of \(\npub_e\).
2. **Homomorphic or Mix-Net Encryption**: Ensures the content of each ballot remains private; only aggregate results or a shuffled set are ever decrypted.
3. **Threshold / General Access Structure**: Multiple trustees (EA plus candidate representatives, for example) must collaborate to produce a final decryption.
4. **OpenTimestamps (OTS)**: Attaches a verifiable timestamp proof to each ballot, anchoring it to a blockchain or other tamper-resistant time reference.
---
# 3. Protocol Lifecycle
This section walks through **voter registration**, **ephemeral key authorization**, **casting (and re-casting) ballots**, and finally the **tally**.
## 3.1 Registration & Minimal Voter Roll
1. **Legal/KYC Verification**
- Each real-world voter proves their identity to the EA (per legal procedures).
- The EA records that the voter is eligible to cast one ballot, referencing their long-term identity key (\(\npub_{\mathrm{KYC}}\)).
2. **Issue Authorization “Slot”**
- The EA’s voter roll notes “this person can receive exactly one blind signature for an ephemeral key.”
- The roll does *not* store an ephemeral key—just notes that it can be requested.
## 3.2 Generating and Blinding the Ephemeral Key
1. **Voter Creates Ephemeral Key**
- Locally, the voter’s client generates a fresh \((nsec_e, npub_e)\).
2. **Blinding**
- The client blinds \(\npub_e\) to produce \(\npub_{e,\mathrm{blinded}}\). This ensures the EA cannot learn the real \(\npub_e\).
3. **Blind Signature Request**
- The voter, using their **KYC-bound key** (\(\npub_{\mathrm{KYC}}\)), sends \(\npub_{e,\mathrm{blinded}}\) to the EA (perhaps via a secure direct message or a “giftwrapped DM”).
- The EA checks that this voter has not already been issued a blind signature.
- If authorized, the EA signs \(\npub_{e,\mathrm{blinded}}\) with its private key and returns the blinded signature.
4. **Unblinding**
- The voter’s client unblinds the signature, obtaining a **valid signature** on \(\npub_e\).
- Now \(\npub_e\) is a **blinded ephemeral public key** that the EA has effectively “authorized,” without knowing which voter it belongs to.
5. **Roll Update**
- The EA updates its minimal roll to note that “Voter #12345 received a signature,” but does *not* publish \(\npub_e\).
## 3.3 Casting an Encrypted Ballot with OpenTimestamps
When the voter is ready to vote:
1. **Compose Encrypted Ballot**
- The ballot can be **homomorphically** encrypted (e.g., with Paillier or ElGamal) or structured for a **mix-net**.
- Optionally include Zero-Knowledge Proofs (ZKPs) showing the ballot is valid (one candidate per race, etc.).
2. **Obtain OTS Timestamp**
- The voter’s client computes a **hash** \(H\) of the ballot data (ciphertext + ZKPs).
- The client sends \(H\) to an **OpenTimestamps** aggregator.
- The aggregator returns a **timestamp proof** verifying that “this hash was seen at or before block/time \(T\).”
3. **Create a “Timestamped Ballot” Payload**
- Combine:
1. **Encrypted ballot** data.
2. **OTS proof** for the hash of the ballot.
3. **EA’s signature** on \(\npub_e\) (the blind-signed ephemeral key).
4. A final **signature** by the voter’s ephemeral key \((nsec_e)\) over the entire package.
4. **Publish to Nostr**
- The voter posts the complete “timestamped ballot” event to one or more relays.
- Observers see “an event from ephemeral key \(\npub_e\), with an OTS proof and the EA’s blind signature,” but cannot identify the real voter or see the vote’s contents.
### 3.4 Re-Voting (Updating the Ballot)
If the voter wishes to revise their vote (due to coercion, a mistake, or simply a change of mind):
1. **Generate a New Encrypted Ballot**
- Possibly with different candidate choices.
2. **Obtain a New OTS Proof**
- The new ballot has a fresh hash \(H'\).
- The OTS aggregator provides a new proof anchored at a *later* block/time than the old one.
3. **Publish the Updated Ballot**
- Again, sign with \(\npub_e\).
- Relays store both ballots, but the *newer* OTS timestamp shows which ballot is “final.”
**Rule**: The final vote for ephemeral key \(\npub_e\) is determined by the ballot with the **highest valid OTS proof** prior to the election’s closing.
## 3.5 Election Closing & Tally
1. **Close Signal**
- At a specified time or block height, the EA publishes a “closing token.”
- Any ballot with an OTS anchor referencing a time/block *after* the closing is invalid.
2. **Collect Final Ballots**
- Observers (or official tally software) gather the *latest valid* ballot from each ephemeral key.
- They confirm the OTS proofs are valid and that no ephemeral key posted two different ballots with the **same** timestamp.
3. **Decryption / Summation**
- If homomorphic, the system sums the encrypted votes and uses a **threshold** of trustees to decrypt the aggregate.
- If a mix-net, the ballots are shuffled and partially decrypted, also requiring multiple trustees.
- In either case, individual votes remain hidden, but the final counts are revealed.
4. **Public Audit**
- Anyone can fetch all ballots from the Nostr relays, verify OTS proofs, check the EA’s blind signature, and confirm no ephemeral key was used twice.
- The final totals can be recomputed from the publicly available data.
---
# 4. Ensuring One Vote Per Voter & No Invalid Voters
1. **One Blind Signature per Registered Voter**
- The EA’s internal list ensures each real voter only obtains one ephemeral key signature.
2. **Blind Signature**
- Ensures an *unauthorized* ephemeral key cannot pass validation (forging the EA’s signature is cryptographically infeasible).
3. **Public Ledger of Ballots**
- Because each ballot references an EA-signed key, any ballot with a fake or duplicate signature is easily spotted.
---
# 5. Security and Privacy Analysis
1. **Voter Anonymity**
- The EA never sees the unblinded ephemeral key. It cannot link \(\npub_e\) to a specific person.
- Observers only see “some ephemeral key posted a ballot,” not the real identity of the voter.
2. **Ballot Secrecy**
- **Homomorphic Encryption** or **Mix-Net**: no one can decrypt an individual ballot; only aggregated or shuffled results are revealed.
- The ephemeral key used for signing does not decrypt the ballot—the election’s threshold key does, after the election.
3. **Verifiable Timestamping**
- **OpenTimestamps** ensures each ballot’s time anchor cannot be forged or backdated.
- Re-voting is transparent: a later OTS proof overrides earlier ones from the same ephemeral key.
4. **Preventing Double Voting**
- Each ephemeral key is unique and authorized once.
- Re-voting by the same key overwrites the old ballot but does not *increase* the total count.
5. **Protection Against Coercion**
- Because the voter can re-cast until the deadline, a coerced vote can be replaced privately.
- No receipts (individual decryption) are possible—only the final aggregated tally is revealed.
6. **Threshold / Multi-Party Control**
- Multiple trustees must collaborate to decrypt final results, preventing a single entity from tampering or prematurely viewing partial tallies.
---
# 6. Implementation Considerations
1. **Blind Signature Techniques**
- Commonly implemented with RSA-based Chaumian blind signatures or BLS-based schemes.
- Must ensure no link between \(\npub_{e,\mathrm{blinded}}\) and \(\npub_e\).
2. **OpenTimestamps Scalability**
- If millions of voters are posting ballots simultaneously, multiple timestamp aggregators or batch anchoring might be needed.
- Verification logic on the client side or by public auditors must confirm each OTS proof’s integrity.
3. **Relay Coordination**
- The system must ensure no single relay can censor ballots. Voters may publish to multiple relays.
- Tally fetchers cross-verify events from different relays.
4. **Ease of Use**
- The user interface must hide the complexity of ephemeral key generation, blind signing, and OTS proof retrieval—making it as simple as possible for non-technical voters.
5. **Legal Framework**
- If law requires publicly listing which voters have cast a ballot, you might track “Voter #12345 used their ephemeral key” without revealing the ephemeral key. Or you omit that if secrecy about *who voted* is desired.
6. **Closing Time Edge Cases**
- The system uses a *block/time anchor* from OTS. Slight unpredictability in block generation might require a small buffer around the official close. This is a policy choice.
---
# 7. Conclusion
We propose an **election system** that leverages **Nostr** for decentralizing ballot publication, **blinded ephemeral keys** for robust voter anonymity, **homomorphic/mix-net encryption** for ballot secrecy, **threshold cryptography** for collaborative final decryption, **OpenTimestamps** for tamper-proof time anchoring, and **re-voting** to combat coercion.
**Key Advantages**:
1. **Anonymity**: The EA cannot link ballots to specific voters.
2. **One Voter, One Credential**: Strict enforcement through blind signatures.
3. **Verifiable Ordering**: OTS ensures each ballot has a unique, provable time anchor.
4. **Updatability**: Voters can correct or override coerced ballots by posting a newer one before closing.
5. **Decentralized Audit**: Anyone can fetch ballots from Nostr, verify the EA’s signatures and OTS proofs, and confirm the threshold-decrypted results match the posted ballots.
Such a design shows promise for secure, privacy-preserving **digital elections**, though real-world deployment will require careful **policy, legal, and usability** considerations. By combining cryptography with decentralized relays and an external timestamp anchor, the system can uphold both **individual privacy** and **publicly auditable correctness**.
-

@ 6e0ea5d6:0327f353
2025-02-25 19:39:35
People naturally gravitate toward what they are already good at, often neglecting the development of complementary essential skills—creating an asymmetric growth. However, this common imbalance is a mistake we don’t have to repeat.
To stand out, one must seek completeness.
If you possess natural intelligence, don’t rely solely on it—strengthen your body through physical training or martial arts.
If you are naturally athletic, nourish your mind with great books and intellectual content.
Aspiring to excellence demands this balance:
When your ambition is to be a king, you must first become a warrior-scholar.
Staying on the throne depends precisely on this deliberate fusion of seemingly opposite strengths.
"The society that separates its scholars from its warriors will have its thinking done by cowards and its fighting done by fools."
— Thucydides
"If your son is quiet and intelligent, emphasize boldness, leadership, and physicality. If your son is tall and impulsive, emphasize learning, mindfulness, and critical thinking. You cannot be a complete man when you only have 50% of the equation."
Thank you for reading, my friend!
If this message resonated with you, consider leaving your "🥃" as a token of appreciation.
A toast to our family!
-

@ 8da249fe:ecc00e09
2025-02-25 18:25:37
É um sistema eletrônico de dinheiro P2P, ou seja, é uma forma de dinheiro essencialmente digital, onde as pessoas podem transacionar sem precisar de um intermediário ou estar sujeito a autoridades centralizadas (Sistema Financeiro Governamental).
Ou seja, não há nenhuma existe de "Casa da Moedas" que façam o controle de dinheiro circulante e factíveis a movimentos artificiais de manejo de crises econômicas que pioram o processo de estabilização financeira. Para que o Bitcoin não seja alvo de fraudes e golpes o controle é feito por um sistema colaborativo de todos os usuários que validam suas transferências em um sistema de audição que chamamos de blockchain.
Como o Bitcoin funciona?
A moeda Bitcoin é um item eletrônico colecionável criando de forma de ser induplicável e não copiável. Este tipo de "arquivo" eletrônico tem propriedades de dinheiro, quando há o envio deste arquivo é retirado do seu local de armazenamento e transferido para outro sem gerar cópia. Todas as transferências deste tipo de "arquivo" são registradas em um livro contábel que tem o nome de blockchain.
Por isso que o Bitcoin é de fato uma moeda e não algo que possa ser um método de estelionato. Pois há uma auditoria voluntária de todos os usuários na Blockchain garantindo que não haja fraude e injeção de Bitcoin de forma artificial no sistema.