-
![](/static/nostr-icon-purple-64x64.png)
@ e83b66a8:b0526c2b
2025-02-11 15:59:51
I am seeing a groundswell of interest in adopting Bitcoin in small businesses replacing or augmenting existing merchant services.
This has many advantages for these businesses including:
Attracting Bitcoiners as customers over your competitors.
Allowing a self custody payment system which does not require purchasing equipment, monthly service fees and high transaction fees.
Self custody your money, removing banks and merchant service companies from taking a cut or interfering in the transaction process. i.e. Bitcoin behaves much more like cash in face to face transactions.
Building a Bitcoin Strategic Reserve allowing your profits to accumulate in value over time, just as Bitcoin increases in value due to scarceness and increased adoption.
If any or all of these are interesting to you, then here are a scale of merchant options available to you depending on your needs and interests.
SOLE TRADER
The easiest way for a sole trader to accept Bitcoin is to download the app “Wallet of Satoshi”
https://www.walletofsatoshi.com/
or for regions this is not available, use a web equivalent called COINOS
https://coinos.io/
This gives everything you’ll need, Bitcoin and Lightning receiving addresses, publishable as text or scannable as a QR code. The ability to generate a specific value invoice using Lightning which can be paid face to face or remotely over the Internet and a wallet to hold your Bitcoin balance.
This is a perfect start point, but moving forward it has some drawbacks. It is custodial, meaning that a company actually holds your Bitcoin. Unlike a bank, if that company fails, you loose your Bitcoin.
There is also no direct ability to move that Bitcoin to fiat currencies like USD or GBP, so if you need some of those earnings to pay suppliers in fiat currencies, you will struggle to convert.
If you are an online only retailer, then the industry standard is BTCPay
https://btcpayserver.org/
which can be integrated into most e-commerce systems
TRADITIONAL MERCHANT SERVICES
So the next option is to use a Bitcoin merchant service company. They look very similar to traditional fiat merchant service companies, they can supply infrastructure like PoS terminals and also handle the payments for you, optionally settling balances to your bank in USD or GBP etc…
They charge for the physical devices and their services and they charge a fee on each transaction in the same way traditional merchant service companies do, but usually these fees are significantly smaller.
Companies like MUSQET can help setup your business in this way if you wish.
https://musqet.tech/
CONSULTANCY
The third option is to use a consultancy service like Bridge2Bitcoin
https://bridge2bitcoin.com/
this is a company that will come in, explain the concepts and options and build a service around your needs. The company will build the solution you are looking for and make their money by providing the equipment and optionally running the payment solution for you.
SELF BUILD
If you have experience with Bitcoin and have optionally run your own Lightning node for a while, the tools exist to be able to develop your own solution in-house. And just as Bitcoin allows you to be your own bank, so Lightning allows you to be your own merchant services company.
Solutions like Umbrel
https://umbrel.com/
running Albyhub
https://albyhub.com/
with their POS solution
https://pos.albylabs.com/
are a low cost option you can build yourself. If you require devices like PoS terminals, these can be purchased from companies like
Swiss Bitcoin Pay:
https://swiss-bitcoin-pay.ch/store#!/Bitcoin-Merchant-Kit/p/709060174
as a package or Bitcoinize directly or in volume:
https://bitcoinize.com/
There is also the lower cost option of use software loaded onto your staffs iPhone or Android phone to use as a PoS terminal for your business:
https://swiss-bitcoin-pay.ch/
Swiss Bitcoin Pay can also take the Bitcoin payment and settle a final amount daily or even convert to fiat and deposit in your bank the next day.
HYBRID
MUSQET also offer a PoS system for both Bitcoin and Fiat. They onboard merchants with traditional card services for Visa, Mastercard and Amex with Apple Pay and Google Pay all within the same device where they deploy Bitcoin Lightning as standard:
https://musqet.tech/
-
![](/static/nostr-icon-purple-64x64.png)
@ c43d6de3:a6583169
2025-02-11 14:37:44
## A Brief History of Ownership
### The Forgotten Struggle for Ownership
History reveals that our ancestors labored—both intellectually and physically—to secure the freedoms we are subconsciously giving away.
We stand at the threshold of a new era.
Across the globe, long-established institutions are showing signs of strain. Trust in governments, banks, and major corporations is eroding, leaving many individuals feeling as though their rights are being infringed upon—even if they struggle to articulate exactly how. Social media and traditional news outlets amplify this sense of unease, painting a picture of impending upheaval, as if we are on the brink of a revolution whose name will only become clear in hindsight, once the first sparks ignite into a full-blown blaze.
Yet, when we examine the state of the global economy, this narrative begins to unravel. Economic inequality has reached levels unseen in nearly a century, and while many point fingers at politicians, policies, or the so-called greed of the 1% hoarding all the wealth, the true culprit may be much closer than most realize. At a time when legal structures worldwide strongly protect ownership and economic mobility, it is individuals themselves who are willingly surrendering their financial power to the very elites they criticize.
I know—“willingly” might seem like a stretch. After all, no one consciously chooses to give up their economic freedom. But take a closer look at the way people spend, borrow, and consume, and it becomes painfully clear: most are actively forfeiting their ability to build and own wealth.
How did we get here?
Much of this self-inflicted harm comes from a fundamental ignorance of the history of ownership and the struggles fought to secure it.
This article serves as a short exploration of the past.
I'll examine what might be considered the natural state of humanity, how the majority has historically struggled to achieve ownership rights, and the deadly conflicts that had to occur for the modern individual to enjoy the very rights they are now squandering.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c43d6de3de463a1e5d508926f1e0fa3c316bbc1ddf8340d565b70e71a6583169/files/1739284028055-YAKIHONNES3.jpg)
### I. The Era of Communal Ownership
No one is born into this world alone.
We do not simply materialize into existence; we arrive as part of the first unit of human society—the family.
Before the rise of civilization, the primary focus of the family was survival. Ownership was a foreign concept, as early human tribes lived in a state of communal resource-sharing. Material possessions were fleeting, and with that, so was the notion of personal property.
In the state of nature, no individual had an exclusive claim to anything. Instead, ownership existed in a tribal sense: “This land belongs to us.” The idea of “mine” extended only by association—what belonged to the tribe also, by extension, belonged to each of its members.
This was a fragile system. Resources required constant upkeep, and as populations grew, leadership emerged to manage the complexity of distribution. This shift laid the foundation for the rise of kings and centralized authority. The concept of ownership, once a communal right, gradually became something dictated by those in power. The people no longer owned anything outright; they merely had the privilege of stewarding what belonged to their ruler.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c43d6de3de463a1e5d508926f1e0fa3c316bbc1ddf8340d565b70e71a6583169/files/1739284056672-YAKIHONNES3.jpg)
### II. The Rise of Peasants and Kings
The first codified legal system, the Code of Hammurabi, laid out extensive laws on ownership. Interestingly, this ancient civilization granted more property rights to commoners than many societies did even a few centuries ago.
A few millennia later, Greece laid the philosophical foundations for ownership, but true legal protections for private property did not emerge until much later. In medieval Europe, ownership rights almost disintegrated—not even nobles truly owned land. Everything belonged to the king, and monarchs waged war over control of vast territories, including the people within them.
Meanwhile, in the Islamic Golden Age, the Middle East saw an unprecedented period of economic freedom. Under Sharia law, property rights were protected for the average citizen, something unheard of in much of medieval Europe. The extent of these rights depended largely on religious affiliation, but compared to their European counterparts, many commoners in the Islamic Empire enjoyed greater economic autonomy.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c43d6de3de463a1e5d508926f1e0fa3c316bbc1ddf8340d565b70e71a6583169/files/1739284096949-YAKIHONNES3.jpg)
### III. The Birth of Property Rights: The Rights of Man
As the Islamic Golden Age waned and the Mongol Horde thundered toward Baghdad, another seismic shift was occurring in England. In 1215, rebellious nobles captured London and forced King John to sign the Magna Carta, the first written document to impose limits on absolute monarchical power and introduce property protections—though these rights were initially reserved for the nobility.
This moment planted the seeds of change. Over the next several centuries, the fight for ownership rights expanded beyond the aristocracy. The Black Death (1347–1351) wiped out over 30% of England’s population, increasing labor shortages and bargaining power for peasants. By the 1381 Peasants’ Revolt, the common man demanded a greater share of land and wealth.
Yet, it wasn’t until the 1700s with the Enclosure Acts that private property became legally protected for the broader population. What began as a noble rebellion in 1215 ultimately transformed ownership from royal privilege to individual liberty.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c43d6de3de463a1e5d508926f1e0fa3c316bbc1ddf8340d565b70e71a6583169/files/1739284116275-YAKIHONNES3.jpg)
### IV. The Age of Renting: The Illusion of Ownership Today
Despite centuries of struggle, we now find ourselves at a paradoxical moment in history: ownership is more legally protected than ever, yet fewer people actually own anything of value.
**Homeownership in Decline:** The U.S. homeownership rate peaked in 2005, only to decline for a decade, hitting a low of 63% in 2015. Despite slight rebounds, high housing costs have pushed many into perpetual rentership.
**Vehicles as Subscriptions:** In 2024, one-fifth of new vehicles were leased, and long-term auto loans have become the norm. A financed car is not truly owned—it’s rented from a bank until the debt is cleared.
**The Subscription Economy:** Ownership of media, software, and even personal data has been replaced with monthly fees. Cloud storage, SaaS, and streaming services have ensured that we no longer possess even our own information.
### V. The Consequences of Financial Illiteracy
We now live in a society built on renting, where economic stability depends on a continuous stream of payments. The more we lease, subscribe, and finance, the more control shifts from individuals to corporations and financial institutions.
**This shift has profound implications:**
- A person who owns little has little power.
- A society that rents everything can be controlled by those who own everything.
- Wealth is no longer built through accumulation, but through debt and dependency.
For millennia, people fought for the right to own. Today, through financial illiteracy and consumer habits, we are giving it away.
How much do we truly own, and how much have we already forfeited?
-----------
Thank you for reading! If this article resonated with you, let me know with a zap and share it with friends who might find it insightful. Your help sends a strong signal to keep making content like this!
More articles you might like from Beneath The Ink:
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqq2kjjzzfpjxvutjg33hjvpcw5cyjezyv9y5k0umm6k
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqqa9wefdwfjj6stvdsk57cnnv4ehxety94mkjarg94g8ymm8wfjhxuedg9hxgt2fw3ej6sm0wd6xjmn8946hxtfjvsuhsdnju045ml
nostr:naddr1qvzqqqr4gupzp3padh3au336rew4pzfx78s050p3dw7pmhurgr2ktdcwwxn9svtfqq2ns3jnfa985c29xp2rs3pexpykz6mjxetxu2g25x6
-
![](/static/nostr-icon-purple-64x64.png)
@ c69b71dc:426ba763
2025-02-11 14:07:34
# The Power of Words...
## ...Shaping a Compassionate Future
This morning I woke up with this thought:
**> If we were more mindful of our choice of words, we would immediately need to change the following: Schools would no longer have classes and classifications, but only Communities!**
This would make a huge difference in terms of togetherness, well-being, and caring for one another. 🙌🏼
### Language shapes reality
Words influence how we see the world and ourselves. When we replace terms like "classes" or "grades" with "community" and "development," it changes our entire way of thinking about education and coexistence.
For example, in companies, we often talk about "teams" instead of "departments." This unconsciously fosters unity, cooperation, and a sense of belonging on equal terms.
### Community instead of competition
In school, work, and everyday life, we often evaluate, compare, and classify. But what if we focused on cooperation and synergies instead of competition?
In some schools, there are no grades anymore, just individual feedback – this takes away the performance pressure and strengthens intrinsic motivation.
### Appreciation instead of categorization
Putting people in "boxes" – whether through grading systems, social classes, or job titles – often creates separation rather than connection.
Instead of labeling people as "successful" or "failed," we could ask: "What are their strengths? How can we support each other?"
Mindful language in everyday life
We could also reflect on our word choices in daily life:
Instead of "problem" → "challenge"
Instead of "failure" → "learning opportunity"
Instead of "mistake" → "experience"
### School as a mirror of society
How we learn to interact with each other in school shapes our behavior in society. When children grow up in communities instead of class systems, they learn that cooperation and empathy are more important than competition.
There are so-called democratic schools where there are no grade levels – children learn from each other across ages. Students support each other by sharing knowledge and helping each other. Teachers are seen as coaches, not as "all-knowing" authority figures.
They too are human and can learn from the children.
Many teachers want to give children something that will help them in life.
However, the rigid old school system dictates what must be taught and when, often disregarding the individual interests of the children. This stifles passions – in both the children and the teachers. Instead, teachers could act as inspiring sparks, igniting curiosity and enthusiasm for learning.
-----------
> **A history teacher once said to me on the phone, when discussing my son who didn’t want to read printed Wikipedia sheets: "If there is no spark in the child, the teacher can’t ignite anything."
**
This sentence frustrated me, because it shows that this teacher had long since lost his own spark!
**Children always have a spark. Always!**
-----------
### A day without evaluations
What if we consciously refrained from evaluating others for one day – whether through grades, criticism, or labels?
Instead of saying to a friend, "You made a mistake," we could say, "That was an interesting experience – what did you learn from it?"
Instead of saying, "That wasn’t good," we could ask, "How could it be done differently or better?"
Instead of grading children in school, we could tell them what they did well and where they can still grow.
Instead of getting upset about a difficult customer, we could feel empathy for their situation.
### Mindful language as the key to change
**If we are more mindful with our language – also with how we speak to ourselves – we can shape a society where people meet each other with compassion. **
`Words are vibrations that shape reality. Chosen consciously, they can create a world based on connection, growth, and love.
It is up to us to start this change within ourselves – and carry it into the world.`
Thank you for reading 🕊️
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/c69b71dc564fdc350acddff929f25d7202ac1470c87488608bd6d98e426ba763/files/1739282730476-YAKIHONNES3.jpg)
-
![](/static/nostr-icon-purple-64x64.png)
@ aade47fd:281e8e4f
2025-02-11 09:12:54
На этот раз для того, чтобы сделать ежедневную запись потребовалась всего одна неделя, а не две, как в прошлый раз. Я не собираюсь останавливаться!
---
### Личность
На этой неделе в коротких заметках я упомянал свою новую концепцию личности. Это структура, которая лежит на границе между мной и внешним миром. Эта тема волнует меня в эти дни, так что я хотел бы поговорить об этом подробнее.
Есть экзистенциальный, неизменный, самотождественный Я, есть трансцендентный внешний мир, а есть структура, по которой между этими частями происходит взаимодействие — личность. На внешний мир я имею опосредованное влияние, не подразумевающее прямые изменения и контроль, а вот личность лежит в поле моей ответственности. Можно даже сказать, что больше никакой ответственности и не существует.
В любой момент времени я могу принять решение о том, чем будет наполнена моя жизнь. Что я буду впускать в нее, а что отсеивать. И наоборот: я несу ответственность за то, что транслирую в окружающий мир, какое влияние имею.
Формирование личности это комплекс из аксеологических ( ценностных) и праксиологических настроек. Задача состоит в том, чтобы сделать добродетель своей привычкой.
Как стать хорошим человеком? Что это значит конкретно? Что мешает стать хорошим человеком? Не простые вопросы. Предлагаю пойти от обратного: может ли хороший человек "распуститься"? Полагаю, да. Это значит, что поддержание личности в форме требует постоянного усилия. А еще можно было предствить себя безупречного и попытаться почувствовать, какие актуальные привычки и настроения помешали бы тебе удержаться в этом состоянии долго.
Я считаю эту работу наиболее важной. Чем более конкретно человек способен описать собственные амбиции, тем больше в жизни энергии и меньше мусора.
---
### Философия
А кто я, собственно, такой, чтобы придумывать словам новые значения? Вот есть же определение для личности из словаря. Зачем людей с толку сбивать?
А дело все в том,, что словарное определение никаким образом мою жизнь не обогащает, оно для меня бесполезно. Бесполезное слово (бессмысленное) слово — тупой нож.
Кто принял решение жить своей жизнью (то есть, просто жить), тот называет вещи своими именами, а не руководствкется букварем с картинками. Работу над собственным языком я называю философией, а человека, нашедшего в себе смелость жить своей жизнью — философом.
---
### Воспитание
Никогда не замечали, что все специалисты (люди, посвятившие себя только одному виду деятельности) одинаковы между собой? В то же время не найдете двух одинаковых людей в междисциплинарном пространстве. Я смотрю по сторонам и нахожу все больше подтверждений тому, что чем в большем числе направлений развивается человек, тем больше шанс, что в любой из них он окажется выдающимся.
Специалисты нужны экономике, государству, обществу, но только не самим себе. Полноценное воспитание подразумевает развитие в максимальном количестве направлений. Похоже, это не просто античный идеал или идеал эпохи возраждения, а природа человека.
Самая тяжелая детская травма, о которой все молчат, это вопрос "Кем ты хочешь стать, когда вырастешь?". Безупречным я хочу стать, ограниченный ты идиот.
---
На сегодня все! До завтра!
-
![](/static/nostr-icon-purple-64x64.png)
@ 43baaf0c:d193e34c
2025-02-11 08:46:45
I attended Sats ‘n’ Facts to share my art, joining other Nostr artists in exhibiting our work at the event’s very first venue. It was a great opportunity to connect with fellow creatives, including Siritravelsketch, whose work I’ve admired on Nostr for some time. Meeting other artists in real life is always inspiring—there’s an undeniable creative bond that comes from sharing our passion in person.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/43baaf0c28e6cfb195b17ee083e19eb3a4afdfac54d9b6baf170270ed193e34c/files/1739263333621-YAKIHONNES3.jpg)
Sats ‘n’ Facts is an Unconference, meaning there’s no strict schedule—everything is open for participants. It’s all about the connections made, the synergy shared, and, for the developers attending, the excitement of a hackathon. (A hackathon is an event where people collaborate intensively on engineering projects, often within 24 to 48 hours.)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/43baaf0c28e6cfb195b17ee083e19eb3a4afdfac54d9b6baf170270ed193e34c/files/1739263372984-YAKIHONNES3.JPEG)
My goal as an artist is to become a bridge between the Bitcoin tech world and the Bitcoin art and design space. Bitcoin empowers us by providing greater (financial) freedom, and with that freedom comes more time to pursue what we truly love—so in a way, you never have to “work” again. 😊
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/43baaf0c28e6cfb195b17ee083e19eb3a4afdfac54d9b6baf170270ed193e34c/files/1739263427502-YAKIHONNES3.jpg)
Nostr is a great example of how bubbles 🫧 POP, leading to new collaborations. Without tech, artists wouldn’t have a way to share their work, and without artists, creatives, and plebs, developers would have no one to build for. Both sides are essential for organic growth. This kind of synergy can only thrive in a decentralized system—otherwise, it risks being captured by big corporations. And that single point of failure is one of the biggest challenges we face in the world today.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/43baaf0c28e6cfb195b17ee083e19eb3a4afdfac54d9b6baf170270ed193e34c/files/1739263457122-YAKIHONNES3.jpg)
Decentralization is freedom. Events like Sats ‘n’ Facts give us the opportunity to collaborate, create, and contribute to a more decentralized world—one where more people can truly become free.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/43baaf0c28e6cfb195b17ee083e19eb3a4afdfac54d9b6baf170270ed193e34c/files/1739263493643-YAKIHONNES3.jpg)
Can’t wait to join the next Sats’n’facts. Maybe Barcelona!?
-
![](/static/nostr-icon-purple-64x64.png)
@ ce75bae2:26c5d165
2025-02-11 04:18:26
Bitcoin is reshaping entrepreneurship in Uganda and beyond. For many, it’s not just an alternative currency but a tool for financial empowerment, business innovation, and global connectivity. Herein, I reflect on my journey with Bitcoin, its impact on entrepreneurship, and how it has changed the way I operate business in Uganda.
Discovering Bitcoin: A Fortunate Scam
My Bitcoin journey started six years ago—not through traditional investment or financial curiosity, but rather by accident. Like many young people searching for ways to make money online, I stumbled upon a website that promised earnings through paid ad viewing. This turned out to be a scam, but it introduced me to Bitcoin. The site offered Bitcoin as a payment option, forcing me to learn how to set up a wallet and receive transactions. Though I lost money in the process, the experience was invaluable—I had unknowingly opened the door to an entirely new financial system.
Years later, I checked my old wallet and saw that the small amount of Bitcoin I had left had doubled in value. That moment sparked a deeper curiosity, leading me to research Bitcoin’s mechanics and how it could be used beyond speculation.
From Curiosity to Business Innovation
As I dove deeper into the Bitcoin ecosystem, I saw its potential to transform business in ways that traditional finance could not. The first realization was that Bitcoin allows global transactions without intermediaries—a critical advantage for entrepreneurs in Uganda, where banking systems are often restrictive and expensive.
Today, all the businesses I co-founded, including Gorilla Sats , Jungle B, and Juicy B, are deeply integrated with Bitcoin. My approach to entrepreneurship has shifted from merely running a business to leveraging Bitcoin as a tool for economic efficiency and expansion.
Bitcoin’s Role in Business Growth
1. Unlocking Global Markets
One of the biggest barriers for African entrepreneurs is the difficulty of conducting business beyond borders. International transactions often involve costly intermediaries, unfavorable exchange rates, and bureaucratic delays. Bitcoin eliminates these restrictions, allowing businesses to trade with anyone, anywhere, instantly.
For example, at Gorilla Sats, our adventure tourism company, 70% of our customers come because we accept Bitcoin payments. Bitcoin not only opens a new customer base but also positions our business in a niche market—one of the very few in the world where travelers can book experiences entirely using Bitcoin.
2. Enhancing Financial Efficiency
Traditional financial systems in Uganda rely heavily on mobile money, which, while innovative, is expensive. Transactions incur fees at every stage: deposit, transfer, and withdrawal. It’s not uncommon for users to lose 10-15% of their money in fees when sending funds.
Bitcoin, on the other hand, allows for low-cost, borderless transactions. For businesses, this means higher profit margins and the ability to reinvest savings into growth.
3. Financial Resilience in an Inflationary Economy
In just a few years, Uganda’s local currency has lost nearly 50% of its value against the US dollar. Businesses operating in shillings face constant depreciation, making long-term planning difficult. By storing value in Bitcoin, businesses can hedge against inflation and maintain purchasing power over time.
At Jungle B, we keep part of our balance sheet in Bitcoin. This strategy protects us from the currency fluctuations that regularly impact Ugandan businesses operating solely in fiat currency.
4. Transforming Social Impact and Charity
Beyond business, Bitcoin has become a tool for grassroots financial inclusion. At the Orphans of Uganda initiative, we integrate Bitcoin into daily transactions, ensuring donations reach the children directly without middlemen.
Every day, children at the orphanage make symbolic Bitcoin payments for their food, learning firsthand how to use digital money responsibly. This isn’t just about feeding children—it’s about educating the next generation on financial autonomy.
Challenges and Opportunities in Uganda
1. Skepticism and Misinformation
Many Ugandans associate Bitcoin with scams, mainly due to past fraudulent projects. Educating people on the difference between Bitcoin (a decentralized asset) and scam coins (pyramid schemes) remains a challenge.
2. Regulatory Uncertainty
Uganda’s regulatory environment for Bitcoin is still unclear. While Bitcoin remains in a legal vacuum, financial institutions are discouraged from facilitating Bitcoin transactions. However, this hasn’t stopped individuals and businesses from using it. In fact, the lack of regulation often makes adoption easier, as Bitcoin operates independently of government oversight.
3. Resistance from Traditional Financial Players
Mobile money services like MTN and Airtel make enormous profits from transaction fees. If Bitcoin adoption grows, their revenue model could be threatened, leading to resistance from these financial institutions. However, they could integrate Bitcoin instead of fighting it, making transactions cheaper for their users.
The Future of Bitcoin in Uganda
Will there be mass Bitcoin adoption in Uganda? Not overnight. Many people resist change, and history shows that better financial tools don’t always lead to immediate adoption. However, Bitcoin’s advantages will continue to attract forward-thinking entrepreneurs and business owners.
For those who embrace it, Bitcoin redefines entrepreneurship, offering financial independence, borderless trade, and a hedge against economic instability. Whether governments embrace it or not, businesses like mine and many others under Blockchain Association of Uganda (BAU) will continue pioneering its use in Uganda.
Final Thoughts
Bitcoin is more than just a digital currency—it’s a tool for freedom, efficiency, and global entrepreneurship. The more people learn about its benefits, the more they will integrate it into their businesses and daily lives. The journey begins with education and experimentation, just as mine did years ago.
For those looking to explore Bitcoin-powered experiences, connect with us at gorilla-sats.com, or follow my work with bitcoinkampala.org. Whether you’re a business owner, traveler, or philanthropist, Bitcoin offers new possibilities—it’s time to embrace the future.
originally posted at https://stacker.news/items/882366
-
![](/static/nostr-icon-purple-64x64.png)
@ 4c96d763:80c3ee30
2025-02-11 00:11:49
# Changes
## Ken Sedgwick (4):
- drive-by compiler warning fixes
- improve debug logging, comments, and variable names for clarity
- explicitly activate and deactivate account relay list subs
- explicitly activate and deactivate account muted list subs
## William Casarin (2):
- egui: replace with damus-io repo
- profilesearch: add some padding
## kernelkind (10):
- supply inner_rect for PostView
- add SearchResultsView impl
- use dev dep pretty assertions
- mentions logic
- add PostView mentions UI
- add mention tags to post note
- use updated TextEdit::layouter in egui
- implement TextBuffer -> PostBuffer downcasting
- color mentions in PostView
- cache LayoutJob
pushed to [notedeck:refs/heads/master](http://git.jb55.com/notedeck/commit/194fa6864143753403672f4c401d7bf8378ec4c6.html)
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-10 18:56:06
A VPN is Not Magic
A VPN is a virtual private network. A VPN service provides an encrypted tunnel between your device and a server they own or rent. You then connect to the internet from this server thus making your IP address appear to the wider internet as the server IP. That's it. That's all it does.
Your Device -> VPN -> Website
Your Device sees that you are connecting to a website through a VPN.
Your ISP sees that you are connecting to a VPN server but nothing after.
The website sees that someone from a VPN is connecting to them but doesn't know who.
The VPN sees your device connected to their server and that you then connected to a website.
VPN Anonymity and Privacy
VPNs do a lot to protect your privacy, they keep your ISP from seeing and logging every single thing you do online and they spoof your location and IP to any website that you visit. Although this website protection isn't 100% anonymous because of cookies, trackers, and if you have to log into a site with your information. If you are using a VPN on a mobile phone then you are still broadcasting your location to the cell towers even if you are not telling the website you are browsing.
Then there is the elephant in the room. The VPN knows all and sees all. How much do they log? How long do they save it? Can you trust them? This is going to vary VASTLY between VPN providers. I always prefer if they are setup where they cannot know the information in the first place and limit what I tell them in the first place by paying through the use of bitcoin or monero. Just because they have a no log "policy" in place it doesn't always fill me with confidence.
VPN Security
How much security does a VPN give you? Some in certain circumstances but not a lot. A VPN is not going to stop malware or viruses. A VPN can provide some protection from a man in the middle or evil twin attack as it provides a encrypted tunnel between your device and the VPN server, so always use a VPN when joining public WIFI spots. Just remember a VPN cannot protect you downstream on the connection between the VPN server and the website, always use secure encrypted connections and be aware that MITM attacks can still happen on the backside. A VPN can prevent DDoS attacks since the attacker doesn't know your real IP address and a fantastic use of VPNs is to protect IoT devices. Those smart devices around your home love to scream out all their data insecurely and a VPN can change their IP and encrypt their data in transit protecting them from hacking.
VPN Legality
In many countries VPNs are banned, blocked, or outright illegal:
Bahrain
Belarus
China
Cuba
Egypt
Iran
Iraq
Libya
Myanmar
North Korea
Oman
Russia
Syria
Turkey
Turkmenistan
UAE
Uganda
Venezuela
Vietnam
---
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-10 17:34:18
Dealing with law enforcement can be a challenging and stressful experience. However, understanding your rights and knowing how to navigate such situations can empower you to protect yourself. Here’s a structured approach to handle these interactions effectively:
1. **Stay Calm and Compliant:**
- When approached by law enforcement, remain calm and avoid sudden movements. Slowly raise your hands and identify yourself if possible.
2. **Ask for Identification:**
- Request the officer's name, badge number, and station. This documentation can be crucial later on.
3. **Know Your Miranda Rights:**
- Upon arrest, you have the right to remain silent. Do not answer questions without consulting a lawyer. If Mirandized, exercise your right to remain silent.
4. **Refuse Incriminating Statements:**
- Avoid answering questions that could incriminate yourself. Politely state, "I will not answer any questions at this time."
5. **Document the Incident:**
- Use your phone or notebook to record details such as dates, times, and descriptions of interactions. Note any injuries or mistreatment.
6. **Seek Legal Advice:**
- After the encounter, contact a lawyer. They can review evidence and provide guidance on how to proceed.
7. **Understand Search and Seizure Laws:**
- Officers generally need a warrant to search your property unless there's probable cause. If stopped without a warrant, calmly refuse entry.
8. **Use a Body Camera Policy:**
- If applicable, ask for the officer's body camera footage and request it via formal complaint if refused.
9. **Know When to Comply:**
- Comply with instructions that do not infringe on your rights, such as providing identification when legally required.
10. **Consider a Witness Statement:**
- If you witness illegal actions, consider reporting them. Your role as a bystander may be crucial in documenting incidents.
11. **Seek Emotional Support:**
- Interactions with law enforcement can be traumatic. Reach out to support groups or mental health resources for assistance.
12. **Understand Legal Recourse:**
- If rights are violated, consult legal aid societies or civil rights organizations for guidance on filing complaints or seeking redress.
**Conclusion:**
Understanding your rights and documenting interactions is essential when dealing with law enforcement. This guide provides a framework to help you navigate such situations confidently and protect your rights effectively. Remember, knowledge is power, and being informed can lead to better outcomes in challenging circumstances.
---
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-10 16:32:15
The Super Bowl definitely threw me off a bit. My dad offered to bring some food over and the plan was to eat before the game/during the first half. I have no idea what he was doing, but for some reason, it took him two hours to get the food (that was already made) ready to eat.
All things considered, I still did ok. The dry fast was about 13 hours and I might make it to 16 hours without eating (I'm at 15 now).
## Score Card
Day 1: 14 hour fast (13 dry)
Day 2: 15 hour fast (14 dry)
Day 3: 17 hours (16 dry)
Day 4: 18 hours (17 dry)
Day 5: 18 hours (16 dry)
Day 6: 19 hours (16 dry)
Day 7: 16 hours (15 dry)
Day 8: 18 hours (17 dry)
Day 9: 17 hours (17 dry)
Day 10: TBD (13 dry)
originally posted at https://stacker.news/items/881691
-
![](/static/nostr-icon-purple-64x64.png)
@ 6bae33c8:607272e8
2025-02-10 15:27:25
I didn’t realize how much I had missed a good old fashioned Super Bowl blowout. I wasn’t even gonna bet the game, but over the last couple days, I got an Eagles vibe. There was too much, “The refs won’t let the Chiefs lose”, and Patrick Mahomes and Taylor Swift, and other noise, and yet the line didn’t budge. It was obvious the Eagles were the sharper side, and they had the league’s best defense, which usually correlates to overperformance of the spread in Super Bowls, sometimes massive overperformance.
But it wasn’t any one thing — just an overall dawning on me that the Eagles were probably the right side. I didn’t feel that strongly about it, even so, and decided I’d just bet Saquon Barkley for MVP, get 3:1 or so if the Eagles won. So I texted someone in the states to place the bet for me, and best he could offer was +175! That’s a terrible value for a RB to win MVP! A few minutes later Tim Schuler offered to bet me $50, give me the Eagles +1, and I obliged him. After that, I texted my friend back to put $500 on the Eagles +1 for me.
Of course, I didn’t stay up all night to watch — after losing 1K on the Falcons (who were up 28-3 in the third quarter at 3 am) eight years ago, never again. So I caught the 40-minute version this morning. What a great game! The Eagles dominated from start to finish. The defensive line got after Mahomes on every play. And while the Chiefs sold out to stop Barkley, Jalen Hurts ran wild on them.
I’m sure I would have enjoyed a Chiefs blowout less, but the beauty of a blowout is it settles things. There’s no looking back at a bad call, a dropped pass or a fumble and wondering what might have been. Close games have drama, but they are more or less arbitrary. I mean I get it, the guy made the throw at the time with the game on the line, but maybe also he just got the cheap roughing the passer call or the ticky tack PI. When the Giants won the Super Bowl on Scott Norwood’s miss, I didn’t have the same sense of satisfaction I did when they blew out John Elway’s Broncos five years earlier. Yes, they won, but it might as well have been on a coin flip.
I grew up on blowouts in the ‘80s — Raiders-Redskins, 49ers-Dolphins, Pats-Bears, Giants-Broncos, Redskins-Broncos — only the Bengals managed to keep Super Bowl losses close (Congratulations Jeff Erickson!) This was before replay reviews and all the lawyering about what is and isn’t a completed catch. The last fucking thing you wanted was some controversy about who really outplayed whom. So it was nice to win some easy money and not to have to worry about refs or fumbles or untimely drops for a change.
- I wanted Saquon to win MVP, but he drew the attention of the KC defense, is one of the best I’ve ever seen in blitz pickup and still had 97 yards from scrimmage. One of the all-time great years from an all-time great back. (He broke Terrell Davis’ record for the most yardage, regular season and playoffs, too, albeit in two extra games.)
- Hurts threw the one bad pick under pressure, but it served as a good punt, and otherwise had a near perfect game. Only four other incomplete passes, 72 yards and a score on the ground. He was an easy MVP call.
- I was a little worried about shaky Jake Elliott, but he drilled all four of his field goals, three of them twice!, due to penalties.
- Patrick Mahomes padded his stats in garbage time, but he got crushed. An elite defense that gets home with four is the way you kill the GOATS. The Giants did it to Tom Brady twice.
- Xavier Worthy had a nice garbage-time stat-padding game, but he was the only one. DeAndre Hopkins had a bad drop, though they got him a garbage-time feel-good TD, basically a participation trophy.
- Congrats to Lane Johnson, Brandon Graham, Elliott and long-snapper Rick Lovato — the only four players in NFL history to defeat both Tom Brady and Mahomes in Super Bowls.
- The only negative is I lost my $50 four-teams bet with Erickson. I had the Chiefs, Bills, Lions and Ravens, he had the field. But I directed Schuler to pay him, which is good, because I cancelled Paypal for their retarded foray into free-speech policing, and now I don’t have to figure out a workaround.
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-10 13:13:25
Alright, let’s get one thing straight: you’re scrolling through your phone, shopping online, maybe even working from home. But here’s the thing – someone might be watching. Not in the creepy stalker way, but in the “is that company really needing my data?” kind of way. That’s where a Virtual Private Network (VPN) comes in, saving you from the prying eyes of marketers, governments, and even your own internet provider.
**What Does a VPN Do?**
A VPN creates a secure, encrypted connection between your device and a VPN server. This allows you to browse the internet anonymously, keeping your online activities private from your Internet Service Provider (ISP), network administrators, and even hackers. When you connect to a VPN, your internet traffic is routed through an intermediary server, making it difficult for anyone to track your online movements.
**Why You Need a VPN: Privacy edition**
- Hiding Your IP Address
Every time you jump online, your device gets an IP address, like a digital ID. If you don’t use a VPN, everyone can see this ID, making it easy for advertisers and governments to track your every move.
- [X ] *Myth:* A VPN hides my IP address from everyone.
- [X] *Reality:* A VPN hides your IP address only from the websites you visit and your ISP. Your internet service provider still knows you're using a VPN, but they won't be able to see what sites you're visiting. Your VPN knows what sites you are visiting and *may* know who you are as well.
- Bypassing Censorship
Ever tried accessing something that’s blocked in your country? A VPN can help you bypass those restrictions, letting you watch the latest shows, access social media, or even download books without getting flagged as a troublemaker.
- Protecting Your Data
When you connect to public Wi-Fi – like at a café or airport – you’re basically handing over your data on a silver platter. A VPN encrypts this data, so even if someone intercepts it, they can’t decode it. Think of it as adding an extra layer of security.
- Avoiding Surveillance
Companies and governments love collecting data. From what you search to who you talk to, there’s a lot of stuff that’s none of their business. A VPN ensures that only you know where you’ve been online.
- Safeguarding Your Personal and Professional Life
Whether you’re working from home or just shopping for a present, a VPN keeps your activities private. It’s like having a secure safe for all your online stuff, so no one can snoop.
- Stopping Targeted Ads
Companies track your browsing habits to send you ads that follow you around the internet. A VPN breaks this cycle, making sure those creepy “you might like” ads stop following you around.
- No Logs Policy
Some VPNs keep records of your activity, which means they could be handed over if the government comes knocking. But with a no-logs policy, nothing is stored – *they promise ;)*
- The Dark Side of Free VPNs
Before you jump into using a free VPN, think twice. Free services often come with a catch: they might sell your data to advertisers or even track your activity themselves. It’s like getting a free hotdog at a gas station – it sounds great, but you’ll probably regret it later.
**How to Use a VPN (Because You’re Not a Tech Wizard)**
- Choose the Right Provider
Go for a reputable service that offers strong encryption and a no-logs policy. Look for options with a kill switch, which stops any data from being leaked if the connection drops. I prefer ones you can pay annoymously but that may be overkill for most people.
- Download and Install
Once you pick a provider, download the app to your device. It’s not rocket science, but it does require a bit more than just opening an email.
- Set It Up
Most VPNs have user-friendly interfaces. Just click “Connect” and you’re good to go. You might need to enter your login details or use a password from your provider.
**The Final Word**
Using a VPN isn’t about being a hacker or someone with something to hide. It’s about respecting your privacy and having control over what you share online. In today’s world, where companies and governments are constantly getting more creative about how they collect data, it’s practically a requirement if you want to stay ahead of the curve.
So there you have it – the secret life of your internet. With a VPN, you’re not just protecting yourself; you’re making sure that your digital footprint is as small as possible. Whether you’re at home or on the go, a VPN gives you the freedom to surf, shop, and work without anyone watching your every move.
And hey, if you’re still not convinced, just think about it this way: imagine your internet connection as a crowded public space. Without a VPN, everyone’s staring at you. With one, you’re wearing a mask, and no one’s the wiser.
---
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
![](/static/nostr-icon-purple-64x64.png)
@ 31da2214:af2508e2
2025-02-10 11:23:19
**Video Title:** Une révolution géopolitique est en marche : l’Afrique se libère !
**Creator:** Pensées KAMITE
**Published Date:** February 9, 2025
**Video Length:** 17 minutes 6 seconds
**Views:** >24k
**Likes:** >2k
**Video URL:** [Original YouTube Video](https://youtu.be/AqrgC7y6Twk)
**Key Points from the Video:**
* **End of Western Hegemony:** The video asserts that Western dominance in Africa is coming to an end. A geopolitical revolution is underway, breaking the chains of neocolonialism and fundamentally reshaping the continent's geopolitical landscape.
* **Decline of Western Influence:** The video highlights a notable decline in Western influence and power in Africa. This is contrasted with the growing presence of China and Russia, who are increasing their investments in key sectors such as infrastructure, energy, defense, natural resources, and technology across the continent.
* **Shifting Economic Partnerships:** China and Russia are now surpassing the European Union as Africa's primary trading partners. This indicates a significant shift in economic alliances, moving away from traditional Western partners.
* **Failure of Western Strategies:** The host argues that Western imperialist strategies have failed to adapt to the evolving realities in Africa. While African countries initially engaged in colonial agreements with the West, the economic landscape now favors China and Russia.
* **Collapse of Unipolar World Order:** This geopolitical shift is described as unprecedented, signaling the collapse of the unipolar world order established after World War II. The video suggests that the United States, weakened by costly conflicts and substantial debt, is experiencing an erosion of power. In contrast, China and Russia, leading the BRICS nations, are emerging as crucial players in a newly forming global balance of power.
* **Strategic Importance of Africa:** The video emphasizes Africa's strategic importance in this new global order. Emerging powers are forming alliances with African nations that are perceived as more respectful and mutually beneficial.
* **Critique of Western Approach:** The speaker criticizes the West's approach to Africa as cruel and paternalistic, accusing it of imposing underdevelopment policies driven by self-interest rather than genuine partnership. This approach has allegedly led to widespread poverty, conflict, economic dependence, and inequality across the continent.
* **Rise of China and Russia as Alternatives:** The video presents the rise of China and Russia as offering alternative partnerships that are more advantageous and respectful of African sovereignty. These new alliances are seen as enabling Africa to chart its own future.
* **Call for African Collaboration:** African nations are urged to collaborate with these new global actors to further accelerate the decline of Western influence in Africa. The Democratic Republic of Congo is given as an example, suggesting it should seek strategic partnerships with Russia and China for military and economic cooperation rather than relying on Western support.
* **Need for Strong African Leadership:** The speaker emphasizes the need for visionary and courageous African leadership, suggesting that military leaders might be better positioned to provide this strategic direction compared to civilian leaders who are portrayed as hesitant and lacking strategic vision.
* **Opportunity for Africa:** The video concludes that the West's decline presents a crucial moment for Africa to assert itself, support liberation movements, and challenge Western interests. It points to perceived contradictions and self-interest in Western actions on the global stage.
* **Call to Action:** Viewers are urged to support the movement towards a multipolar world and to advocate for the complete independence of African nations, free from Western influence.
**External Context and Further Details:**
To provide a broader context, it's important to consider information from external sources regarding the geopolitical shifts in Africa.
* **Increased Russian and Chinese Engagement:** Numerous reports and analyses confirm the growing economic and political influence of Russia and China in Africa. These countries have increased their trade, investment, and military cooperation with various African nations. [Example China-Africa Growing Trade](https://www.knowdys.com/en/china-africa-trade-a-4-8-growth-driven-by-commodities/) & [Example Russia-Africa relations](https://www.rt.com/africa/607502-russia-africa-trade-reaches-new-high/).
* **Shifting Alliances and Security Concerns:** The video mentions countries like Mali, Burkina Faso, Chad, and Niger. These nations have indeed experienced political instability and have, in some cases, moved away from traditional Western security partners, seeking alternatives, including Russia's Wagner Group in Mali. [Example Wagner Group in Mali](https://www.themoscowtimes.com/2024/07/29/wagner-group-confirms-fighters-killed-battling-mali-rebels-a85858).
* **Anti-Western Sentiment:** There is a growing anti-Western sentiment in parts of Africa, fueled by historical colonial experiences, perceived neocolonial practices, and a desire for more equitable partnerships. [Example Anti-Western Sentiment in Africa](https://france.news-pravda.com/en/france/2025/01/30/10141.html).
* **Multipolar World Order:** The concept of a transition to a multipolar world order, where power is distributed among multiple centers rather than concentrated in the West, is a widely discussed topic in international relations. The rise of China and the resurgence of Russia are key factors in this shift. [Example Multipolar World Order](https://journal-neo.su/2025/01/07/the-legacy-of-2024-an-increasingly-divided-world-in-2025/).
**Credit:**
This summary is based on the YouTube video "Une révolution géopolitique est en marche : l’Afrique se libère !" created by [**Pensées KAMITE**](https://www.youtube.com/channel/UC2PdWDTkGsdClni3UeTo9kQ), published on February 9, 2025. The analysis incorporates information directly from the video and contextual details gathered from general knowledge searches to provide a more comprehensive overview.
-
![](/static/nostr-icon-purple-64x64.png)
@ 31da2214:af2508e2
2025-02-10 10:08:06
A global privacy nightmare is unfolding. The UK government secretly ordered Apple to backdoor encrypted iCloud storage worldwide—but Apple is legally forbidden from revealing this order, or they face criminal charges. This affects **2 BILLION USERS**.
Here’s the full story & why it’s part of a much bigger power grab. 🧵👇 [[Thread by @sayerjigmi on Thread Reader App](https://threadreaderapp.com/thread/1888287793123901896.html)]
---
## 1) The UK's Secret Order to Backdoor Encryption 🔓
Under the UK’s **Investigatory Powers Act (IPA) 2016**, Apple was served a **Technical Capability Notice (TCN)**—forcing them to create a backdoor for encrypted iCloud data.
This is not limited to UK users. It applies **worldwide**, meaning your private files are at risk, no matter where you live.
🔗 [@macworld report](https://macworld.com/article/260251…)
---
## 2) Apple’s Legal Gag Order 🤐
Apple is legally forbidden from revealing this order. If Apple even acknowledges that the UK issued this demand, they could face **criminal charges**.
This is a secret government order with **global consequences**.
---
## 3) A Global Threat to Encryption 🌍
This isn’t just about the UK (although they are leading the charge in threatening citizens in OTHER countries for violating BRITISH censorship laws!).
If Apple complies, every government in the world will demand the same access—from the US to China to authoritarian regimes.
**End-to-end encryption would be effectively dead.**
![image](https://pbs.twimg.com/media/GjXLAqYXoAEb6-c.jpg)
---
## 4) Apple’s Dilemma: Comply or Withdraw? 🚪
Apple has two choices:
- **Comply** & weaken encryption globally.
- **Refuse** & withdraw services from the UK.
WhatsApp & Signal faced similar threats last year and vowed to leave the UK rather than compromise security. Will Apple do the same?
🚨 Watch the heated discussion between Damian Collins, director of CCDH (architect of the UK Online Safety Bill), and Signal’s CEO: [YouTube Link](https://www.youtube.com/watch?v=E--bVV_eQR0)
---
## 5) Why This Matters: Encryption Protects Everything 🔐
- **Encryption protects financial data, health records, personal security (e.g., where you live or work), and private conversations.**
- Governments always say they need backdoors for national security—but history shows they’re used for **mass surveillance**.
- Once a backdoor exists, hackers, rogue employees, and other governments WILL find it.
---
## 6) The UK’s War on Encryption 🛡️
The UK is trying to dominate the global surveillance & censorship landscape.
While the US, Canada, Australia, and New Zealand have supported strong encryption to mitigate cyber threats, the UK stands alone in its war on encryption.
---
## 7) The Free Speech Crackdown 🗣️
This isn’t just about encryption—it’s about **control**. Governments worldwide are criminalizing dissent and censoring free speech, using tech companies as their enforcement arms.
🔗 [GreenMedInfo Report](https://greenmedinfo.com/content/breaking-international-governments-are-criminalizing-free-speech-through-glo-3)
---
## 8) The Global Censorship Agenda 🌐
This ties into the UK’s broader, **GLOBALLY ORCHESTRATED censorship agenda**:
- The **Online Safety Bill** criminalizes encrypted messaging & forces platforms to scan private messages.
- The **Digital Services Act (EU)** gives governments the power to shut down online content they don’t like.
- Leaked US-UK documents show direct coordination between UK intelligence & the Biden administration to censor online speech.
---
## 9) The Architects of Speech Policing: CCDH 🕵️♂️
The **Center for Countering Digital Hate (CCDH)**—a UK intelligence-backed group—has been a driving force behind global censorship.
They were caught:
- Running “black ops” to suppress RFK Jr.’s presidential campaign.
- Leading the "Kill Musk’s Twitter" directive, trying to shut down free speech on X.
- Labeling 12 private US citizens as the “Disinformation Dozen” to justify mass censorship.
🔗 [Reclaim the Net Investigation](https://reclaimthenet.org/black-ops-how-a-us-uk-censorship-group-targeted-rfk-jr-to-stifle-dissent)
---
## 10) The Pattern is Clear: Surveillance + Censorship 🔍
1️⃣ Governments create "safety" laws to justify surveillance.
2️⃣ They pressure tech companies to enforce censorship.
3️⃣ Once encrypted services are gone, nothing is private anymore.
This is the biggest attack on digital freedom in history.
---
## 11) What Can We Do? 💪
- **Support companies** that refuse to build backdoors (Signal, ProtonMail, etc.).
- **Push for legislation** that protects encryption & free speech.
- **Stay informed** & spread awareness—governments count on secrecy to push these policies through.
- Follow and support privacy and internet freedom organizations such as:
- [@G_W_Forum](https://twitter.com/G_W_Forum)
- [@FFO_Freedom](https://twitter.com/FFO_Freedom)
- [@ReclaimTheNetHQ](https://twitter.com/ReclaimTheNetHQ)
---
## 12) The Ultimate Power Grab: Controlling All Digital Communication 📱
If Apple caves, every other platform will be forced to follow.
📌 The UK’s Global Playbook:
- A backdoor to encryption (Investigatory Powers Act).
- A government-linked censorship network (CCDH).
- A speech-policing framework that extends worldwide (Online Safety Bill).
This is a global effort to control what people can say, share, and store privately.
---
## 13) The Final Stand: Will You Comply or Resist? ⚔️🚨
They want total control—your speech, your privacy, your elections. This is the defining battle of our time.
🇬🇧 UK’s war on encryption = Global censorship blueprint.
🗳️ Election meddling + speech policing = A hijacked democracy.
📢 **Digital freedom is human freedom.**
Stand up. Speak out. Fight back. 🏴☠️🔥
🔗 [LEARN MORE](https://sayerji.substack.com/p/crossfire-of-democracy-uk-labour?utm_source=publication-search)
---
*Full thread preserved by [Thread Reader App](https://threadreaderapp.com/thread/1888287793123901896.html).*
-
![](/static/nostr-icon-purple-64x64.png)
@ 1c197b12:242e1642
2025-02-09 22:56:33
A Cypherpunk's Manifesto
by Eric Hughes
Privacy is necessary for an open society in the electronic age. Privacy is not secrecy. A private matter is something one doesn't want the whole world to know, but a secret matter is something one doesn't want anybody to know. Privacy is the power to selectively reveal oneself to the world.
If two parties have some sort of dealings, then each has a memory of their interaction. Each party can speak about their own memory of this; how could anyone prevent it? One could pass laws against it, but the freedom of speech, even more than privacy, is fundamental to an open society; we seek not to restrict any speech at all. If many parties speak together in the same forum, each can speak to all the others and aggregate together knowledge about individuals and other parties. The power of electronic communications has enabled such group speech, and it will not go away merely because we might want it to.
Since we desire privacy, we must ensure that each party to a transaction have knowledge only of that which is directly necessary for that transaction. Since any information can be spoken of, we must ensure that we reveal as little as possible. In most cases personal identity is not salient. When I purchase a magazine at a store and hand cash to the clerk, there is no need to know who I am. When I ask my electronic mail provider to send and receive messages, my provider need not know to whom I am speaking or what I am saying or what others are saying to me; my provider only need know how to get the message there and how much I owe them in fees. When my identity is revealed by the underlying mechanism of the transaction, I have no privacy. I cannot here selectively reveal myself; I must always reveal myself.
Therefore, privacy in an open society requires anonymous transaction systems. Until now, cash has been the primary such system. An anonymous transaction system is not a secret transaction system. An anonymous system empowers individuals to reveal their identity when desired and only when desired; this is the essence of privacy.
Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature.
We cannot expect governments, corporations, or other large, faceless organizations to grant us privacy out of their beneficence. It is to their advantage to speak of us, and we should expect that they will speak. To try to prevent their speech is to fight against the realities of information. Information does not just want to be free, it longs to be free. Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.
We must defend our own privacy if we expect to have any. We must come together and create systems which allow anonymous transactions to take place. People have been defending their own privacy for centuries with whispers, darkness, envelopes, closed doors, secret handshakes, and couriers. The technologies of the past did not allow for strong privacy, but electronic technologies do.
We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.
Cypherpunks write code. We know that someone has to write software to defend privacy, and since we can't get privacy unless we all do, we're going to write it. We publish our code so that our fellow Cypherpunks may practice and play with it. Our code is free for all to use, worldwide. We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.
Cypherpunks deplore regulations on cryptography, for encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible.
For privacy to be widespread it must be part of a social contract. People must come and together deploy these systems for the common good. Privacy only extends so far as the cooperation of one's fellows in society. We the Cypherpunks seek your questions and your concerns and hope we may engage you so that we do not deceive ourselves. We will not, however, be moved out of our course because some may disagree with our goals.
The Cypherpunks are actively engaged in making the networks safer for privacy. Let us proceed together apace.
Onward.
Eric Hughes <hughes@soda.berkeley.edu>
9 March 1993
-
![](/static/nostr-icon-purple-64x64.png)
@ 40b9c85f:5e61b451
2025-02-09 20:53:03
## Data Vending Machine Context Protocol
### The Convergence of Nostr DVMs and MCP
In the rapidly evolving landscape of artificial intelligence, a new approach to sharing and accessing computational tools is emerging through the combination of two powerful technologies: Nostr's Data Vending Machines (DVMs) and the Model Context Protocol (MCP). This convergence has the potential to reshape how we think about tool distribution and accessibility, creating a truly decentralized marketplace for computational capabilities that serves AI, humans, and any type of machine that speaks the protocol.
## Understanding the Building Blocks
Nostr's Data Vending Machines function much like their physical counterparts, but instead of dispensing snacks, they provide computational services with built-in Lightning Network payment capabilities. These DVMs operate on the decentralized Nostr network, allowing users to reach service providers without relying on centralized platforms or gatekeepers.
The Model Context Protocol complements this infrastructure by providing a standardized way for applications to share context and expose their capabilities. Think of MCP as a universal language that allows tools to communicate effectively with any application that understands the protocol. This standardization is crucial for creating a seamless experience across different tools and services.
## What is DVMCP?
DVMCP proposes a path for making DVMs and MCPs interoperable, introducing a protocol that makes local utilities available to everyone on the network. Our [draft specification](https://github.com/gzuuus/dvmcp/blob/master/docs/dvmcp-spec.md) serves as a foundation for easily transforming any MCP server into a DVM. To bridge these technologies, we've developed a simple software component that sits between your MCP server and the DVM ecosystem. You can find it in our [repository](repo.link). This bridge connects to your MCP server as a client and exposes its utilities through Nostr as a DVM, handling all the necessary Nostr logic. This means any existing MCP server can become accessible through Nostr without modifications - simply run the bridge alongside your server.
This is particularly exciting because the vibrant and growing MCP community. Any team or individual already working with MCP can instantly plug into the Nostr DVM ecosystem, gaining access to decentralized discovery, built-in monetization, and an already existing user base. The bridge component makes this transition effortless, requiring no changes to any existing MCP implementations.
## A New Paradigm
A decentralized marketplace where anyone can run tools locally and make them available globally. This addresses an unsolved problem larger than the Nostr ecosystem: how to make resources and tools discoverable and accessible in a decentralized, permissionless way.
The power of this combination lies in its flexibility. Users can access tools through regular Nostr clients, AI agents can discover specific capabilities, and DVMs can create sophisticated tool chains. With Lightning Network integration, true machine-to-machine transactions become possible, where machines can autonomously discover, negotiate, and pay for computational services. Most importantly, you can run services on your own hardware while making these capabilities accessible to anyone anywhere.
The result is a system that preserves privacy, promotes innovation, and creates new opportunities without central authorities controlling what tools can be offered or who can use them. The entire project, is available under the MIT license, and any feedback and collaboration is welcome.
## Looking Forward
As these technologies mature, we're likely to see a fundamental shift in how computational capabilities are distributed and accessed. Instead of relying on massive cloud data centers controlled by a few companies, we're moving toward a global network of local machines, each contributing unique capabilities and computation to a larger, more resilient ecosystem.
The convergence of Nostr DVMs and MCP represents more than just a technical innovation—it's a step toward a more equitable and accessible future. By enabling anyone to run and share tools, we're building an ecosystem where computational resources are not concentrated in the hands of a few but are available to and controllable by everyone.
[Repository](https://github.com/gzuuus/dvmcp/)
-
![](/static/nostr-icon-purple-64x64.png)
@ 65912a7a:5dc638bf
2025-02-09 20:34:15
I didn’t set out to become an enemy of the world’s richest man, but I seem to have managed it all the same. Until this moment, I’ve resisted describing my falling out with Elon Musk in much detail, but as the man’s cultural influence has metastasized—and he continues to spread lies about me on the social media platform that he owns (Twitter/X)—it seems only appropriate to set the record straight. I know that it annoys many in my audience to see me defend myself against attacks that they recognize to be spurious, but they might, nevertheless, find the details of what happened with Elon interesting.
Of all the remarkable people I’ve met, Elon is probably the most likely to remain a world-historical figure—despite his best efforts to become a clown. He is also the most likely to squander his ample opportunities to live a happy life, ruin his reputation and most important relationships, and produce lasting harm across the globe. None of this was obvious to me when we first met, and I have been quite amazed at Elon’s evolution, both as a man and as an avatar of chaos. The friend I remember did not seem to hunger for public attention. But his engagement with Twitter/X transformed him—to a degree seldom seen outside of Marvel movies or Greek mythology. If Elon is still the man I knew, I can only conclude that I never really knew him.
When we first met, Elon wasn’t especially rich or famous. In fact, I recall him teetering on the brink of bankruptcy around 2008, while risking the last of his previous fortune to make payroll at Tesla. At the time, he was living off loans from his friends Larry and Sergey. Once Elon became truly famous, and his personal wealth achieved escape velocity, I was among the first friends he called to discuss his growing security concerns. I put him in touch with Gavin de Becker, who provided his first bodyguards, and recommended other changes to his life. We also went shooting on at least two occasions with Scott Reitz, the finest firearms instructor I’ve ever met. It is an ugly irony that Elon’s repeated targeting of me on Twitter/X has increased my own security concerns. He understands this, of course, but does not seem to care.
So how did we fall out? Let this be a cautionary tale for any of Elon’s friends who might be tempted to tell the great man something he doesn’t want to hear:
(1.) When the SARS-CoV-2 virus first invaded our lives in March of 2020, Elon began tweeting in ways that I feared would harm his reputation. I also worried that his tweets might exacerbate the coming public-health emergency. Italy had already fallen off a cliff, and Elon shared the following opinion with his tens of millions of fans :
*the coronavirus panic is dumb*
As a concerned friend, I sent him a private text:
*Hey, brother— I really think you need to walk back your coronavirus tweet. I know there’s a way to parse it that makes sense (“panic” is always dumb), but I fear that’s not the way most people are reading it. You have an enormous platform, and much of the world looks to you as an authority on all things technical. Coronavirus is a very big deal, and if we don’t get our act together, we’re going to look just like Italy very soon. If you want to turn some engineers loose on the problem, now would be a good time for a breakthrough in the production of ventilators...*
(2.) Elon’s response was, I believe, the first discordant note ever struck in our friendship:
*Sam, you of all people should not be concerned about this.*
He included a link to a page on the CDC website, indicating that Covid was not even among the top 100 causes of death in the United States. This was a patently silly point to make in the first days of a pandemic.
We continued exchanging texts for at least two hours. If I hadn’t known that I was communicating with Elon Musk, I would have thought I was debating someone who lacked any understanding of basic scientific and mathematical concepts, like exponential curves.
(3.) Elon and I didn’t converge on a common view of epidemiology over the course of those two hours, but we hit upon a fun compromise: A wager. Elon bet me $1 million dollars (to be given to charity) against a bottle of fancy tequila ($1000) that we wouldn’t see as many as 35,000 cases of Covid in the United States (cases, not deaths). The terms of the bet reflected what was, in his estimation, the near certainty (1000 to 1) that he was right. Having already heard credible estimates that there could be 1 million deaths from Covid in the U.S. over the next 12-18 months (these estimates proved fairly accurate), I thought the terms of the bet ridiculous—and quite unfair to Elon. I offered to spot him two orders of magnitude: I was confident that we’d soon have 3.5 million cases of Covid in the U.S. Elon accused me of having lost my mind and insisted that we stick with a ceiling of 35,000.
(4.) We communicated sporadically by text over the next couple of weeks, while the number of reported cases grew. Ominously, Elon dismissed the next batch of data reported by the CDC as merely presumptive—while confirmed cases of Covid, on his account, remained elusive.
(5.) A few weeks later, when the CDC website finally reported 35,000 deaths from Covid in the U.S. and 600,000 cases, I sent Elon the following text:
*Is (35,000 deaths + 600,000 cases) > 35,000 cases?*
(6.) This text appears to have ended our friendship. Elon never responded, and it was not long before he began maligning me on Twitter for a variety of imaginary offenses. For my part, I eventually started complaining about the startling erosion of his integrity on my podcast, without providing any detail about what had transpired between us.
(7.) At the end of 2022, I abandoned Twitter/X altogether, having recognized the poisonous effect that it had on my life—but also, in large part, because of what I saw it doing to Elon. I’ve been away from the platform for over two years, and yet Elon still attacks me. Occasionally a friend will tell me that I’m trending there, and the reasons for this are never good. As recently as this week, Elon repeated a defamatory charge about my being a “hypocrite” for writing a book in defense of honesty and then encouraging people to lie to keep Donald Trump out of the White House. Not only have I never advocated lying to defeat Trump (despite what that misleading clip from the Triggernometry podcast might suggest to naive viewers), I’ve taken great pains to defend Trump from the most damaging lie ever told about him. Elon knows this, because we communicated about the offending clip when it first appeared on Twitter/X. However, he simply does not care that he is defaming a former friend to hundreds of millions of people—many of whom are mentally unstable. On this occasion, he even tagged the incoming president of the United States.
All of this remains socially and professionally awkward, because Elon and I still have many friends in common. Which suggests the terms of another wager that I would happily make, if such a thing were possible—and I would accept 1000 to 1 odds in Elon’s favor:
I bet that anyone who knows us both knows that I am telling the truth.
Everyone close to Elon must recognize how unethical he has become, and yet they remain silent. Their complicity is understandable, but it is depressing all the same. These otherwise serious and compassionate people know that when Elon attacks private citizens on Twitter/X—falsely accusing them of crimes or corruption, celebrating their misfortunes—he is often causing tangible harm in their lives. It’s probably still true to say that social media “isn’t real life,” until thousands of lunatics learn your home address.
A final absurdity in my case, is that several of the controversial issues that Elon has hurled himself at of late—and even attacked me over—are ones we agree about. We seem to be in near total alignment on immigration and the problems at the southern border of the U.S. We also share the same concerns about what he calls “the woke mind virus.” And we fully agree about the manifest evil of the so-called “grooming-gangs scandal” in the U.K. The problem with Elon, is that he makes no effort to get his facts straight when discussing any of these topics, and he regularly promotes lies and conspiracy theories manufactured by known bad actors, at scale. (And if grooming were really one of his concerns, it’s strange that he couldn’t find anything wrong with Matt Gaetz.)
Elon and I even agree about the foundational importance of free speech. It’s just that his approach to safeguarding it—amplifying the influence of psychopaths and psychotics, while deplatforming real journalists and his own critics; or savaging the reputations of democratic leaders, while never saying a harsh word about the Chinese Communist Party—is not something I can support. The man claims to have principles, but he appears to have only moods and impulses.
Any dispassionate observer of Elon’s behavior on Twitter/X can see that there is something seriously wrong with his moral compass, if not his perception of reality. There is simply no excuse for a person with his talents, resources, and opportunities to create so much pointless noise. The callousness and narcissism conveyed by his antics should be impossible for his real friends to ignore—but they appear to keep silent, perhaps for fear of losing access to his orbit of influence.
Of course, none of this is to deny that the tens of thousands of brilliant engineers Elon employs are accomplishing extraordinary things. He really is the greatest entrepreneur of our generation. And because of the businesses he’s built, he will likely become the world’s first trillionaire—perhaps very soon. Since the election of Donald Trump in November, Elon’s wealth has grown by around $200 billion. That’s nearly $3 billion a day (and over $100 million an hour). Such astonishing access to resources gives Elon the chance—and many would argue the responsibility—to solve enormous problems in our world.
So why spend time spreading lies on X?
-
![](/static/nostr-icon-purple-64x64.png)
@ f7d424b5:618c51e8
2025-02-09 18:33:48
(Copied from my show notes \[website\](https://melonmancy.net/mp-100-nuance-enjoyer) for Melonmancy)
Promise this isn't normal. It would be disingenuous to not bring it up.
We mentioned a few things in the show you might want to pull up while listening, they are the following:
- [Nightmare Kart dev crashes out](https://x.com/StutteringCraig/status/1883958297423929810)
- [Dr Disrespect gives post-mortem on Midnight Society](https://x.com/ProfPressure/status/1885045826424365437)
- [Lords of the Fallen announcement post](https://x.com/TheOneDeafMute/status/1887765603169222840)
Obligatory:
- [Listen to the new episode here!](https://melonmancy.net/listen)
- [Discuss this episode on OUR NEW FORUM](https://melonmancy.cafe/d/102-mp100-nuance-enjoyer)
- [Get the RSS and Subscribe](https://feeds.rssblue.com/melonmancy-podcast) (this is a new feed URL, but the old one redirects here too!)
- Get a modern podcast app to use that RSS feed on at [newpodcastapps.com](http://newpodcastapps.com/)
- Or listen to the show on [the forum](https://melonmancy.cafe) using the embedded [Podverse](https://podverse.fm) player!
- [Send your complaints here](https://melonmancy.net/contact-us)
Reminder that this is a [Value4Value](https://value4value.info/) podcast so any support you can give us via a modern podcasting app is greatly appreciated and we will never bow to corporate sponsors!
Our podcast is created entirely with free software and is proudly hosted on [RSSBlue!](https://rssblue.com)
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-09 18:18:28
# The Best AI Models to Run Locally (According to My Totally Biased Opinion)
I've spent a lot of time running local AI models, and after extensive testing (read: lots of random chats and questionable prompts), I've settled on my favorites. No benchmarks, no pointless metrics—just pure vibes and personal preference.
## 🏆 Best Overall: **Llama 3.1 8B**
If you want a general-purpose AI that does *everything* well, **Llama 3.1 8B** is the clear winner. It’s smart, coherent, and doesn’t go off the rails too easily. Whether you're chatting, building a assistant, or writing this model just works.
## 🔬 Best Technical Model: **DeepSeek-R1 8B**
Need something with a more *to-the-point* attitude? **DeepSeek-R1 8B** is the one. It’s less verbose, highly technical, and great for when you need precise answers instead of a paragraph-long essay. Perfect for hacking, cybersecurity, and other deep technical topics.
## ⚡ Best for Speed (and Dumb Fun): **Qwen 1.5 0.5B**
If you don’t need the smartest model and just want something fast, **Qwen 1.5 0.5B** is a solid choice. It responds quickly, makes decent small talk, and is good for simple chatbot-style interactions. Not the best at deep reasoning, but hey, sometimes you just need a dumb bot that replies fast.
## 💻 Best for Coding: **Starcoder2 7B**
Despite newer models dropping left and right, **Starcoder2 7B** is still *the* local coding model. It understands context well, generates clean code, and doesn’t hallucinate random syntax as much as other models. If you’re working on a coding project, this is still the GOAT.
---
These are my go-to local AI models. If you disagree, that’s fine—just know that you’re *wrong*. Try them out yourself and let me know if you find any hidden gems worth running.
Happy local AI tinkering! 🚀
---
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
![](/static/nostr-icon-purple-64x64.png)
@ 1cb14ab3:95d52462
2025-02-09 15:45:32
Hey all. I am setting up a Plebeian Marketplace on Nostr using my Lightning node. I currently have two channels open (one with a capacity of 500,000 sats, one with a capacity of 100,000 sats). Both use different LSP's (Megalith and Olympus).
My question is regarding the maximum product price I can set for my marketplace. One of my products is 1M sats. Obviously my receiving capacity is not large enough to cover this, so I was planning on opening up another channel.
If I open another channel for 500,000 sats, that would bring my total receiving capacity to 1.1M which would cover the product. However my question is if I need all of the receiving capacity in the same channel, or if the sale would pull from all three channels? Am I best to close out the first two channels and open a single, larger channel?
Sorry for the noob question.
Tl;DR: Can someone explain how I should best set up my node to accommodate my store.
originally posted at https://stacker.news/items/880591
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-09 15:36:35
Sitting down to breakfast now, after 17 hours no food or water.
## Score Card
Day 1: 14 hour fast (13 dry)
Day 2: 15 hour fast (14 dry)
Day 3: 17 hours (16 dry)
Day 4: 18 hours (17 dry)
Day 5: 18 hours (16 dry)
Day 6: 19 hours (16 dry)
Day 7: 16 hours (15 dry)
Day 8: 18 hours (17 dry)
Day 9: 17 hours (17 dry)
originally posted at https://stacker.news/items/880575
-
![](/static/nostr-icon-purple-64x64.png)
@ 31da2214:af2508e2
2025-02-09 15:27:33
It is not new to talk about the problematic relations between Africa and France, between former French colonies in Africa and the "metropole."
_By Afrique Media_
_6 min. read_
[View original]( https://afriquemedia.tv/2025/02/06/le-reveil-africain-la-france-face-a-un-continent-qui-refuse-de-se-taire/)
What is new, however, is the discourse and behavior of French elites regarding "Françafrique," particularly from French President Emmanuel Macron.
In recent years, we have seen the French president make statements that are completely disrespectful toward his African counterparts, reflecting a neocolonial paternalism from another era.
Arrogance as the new foundation for Franco-African relations is not a good basis, as you would agree. Macron has not stopped since then, because that is who he is: disdainful, arrogant, and totally lacking an understanding of what the presidential role entails, which requires non-emotional, responsible, and respectful conduct.
> "I believe we forgot to be thanked. It’s not serious, it will come with time. Ingratitude, I am well placed to know, is a disease non-transmissible to humans."
> — January 6, 2025, during the Annual Ambassadors' Conference at the Élysée Palace in Paris.
This statement was directed at African leaders who had "forgotten to thank us" for the French military intervention in the Sahel against terrorism since 2013.
What Macron fails to understand, like many ruling elites in France, is that in Africa, it is well understood that chaos, terrorism, and war in the Sahel were exacerbated by the French military aggression, along with its English and American allies, against Muammar Gaddafi's Jamahiriya Libya in 2011, which led to its disintegration. Thus, the French intervention is merely a minimum after-sales service that indeed implicates France in the events that followed. It is rather France that owes an apology to the Sahel countries for this disastrous policy, which, as often happens, follows the violation of international law.
We can skip over Macron's ridiculous suggestion that France was "not retreating" in Africa but simply "reorganizing."
Let us now address the reactions to his remarks, which provoked negative responses in several African countries. In Chad, Senegal, and Burkina Faso, they were seen as paternalistic and insulting. Critics highlighted that this remark seemed to ignore the complexities of Franco-African relations, accusations of neocolonialism, and demands for sovereignty and recognition of the sacrifices made by African countries themselves.
Chad lamented "the contemptuous attitude" of the French president, stating that these declarations reflect a neocolonial vision of Franco-African relations:
> "These statements are poorly received by the Chadian government. Abderaman Koulamallah [Minister of Foreign Affairs] calls on French leaders to respect the African people and recognize the value of their sacrifices. 'History attests that Africa, including Chad, played a decisive role in the liberation of France during both world wars, a fact that France has never truly acknowledged. The immense sacrifices made by African soldiers to defend freedom have been minimized, and no worthy thanks have been expressed.'"
> — *Le Pays*, January 6, 2025 (1).
The same sentiment echoed in Senegal, which also condemned these remarks, calling them condescending and inappropriate.
> "French President Emmanuel Macron has managed to irritate his African counterparts. Prime Minister Ousmane Sonko reminds President Macron that 'if African soldiers, sometimes forcibly mobilized, mistreated, and ultimately betrayed, had not deployed during World War II to defend France, it might still be German today.'"
> — *Seneweb*, January 6, 2025 (2).
In France itself, Macron's statements sparked reactions from the French political class:
- **The French Communist Party (PCF)** expressed its "deep consternation" at these remarks, deeming them disdainful toward African nations.
> "These statements reinforce, among peoples, a sense of contempt and colonial paternalism. It is unacceptable to continue down this path (...) As recent events call for, notably the rejection of the French military presence in Mali, Burkina Faso, Niger, and more recently in Senegal and Chad, it is imperative that new relations be established between our country and Africa. African nations aspire to full and complete sovereignty. A historic turning point has occurred, marking the end of the neocolonial system that Emmanuel Macron's statements seek to preserve."
> — January 9, 2025 (3).
- **Jordan Bardella**, as president of the National Rally (RN), criticized Macron's remarks in a press release and in televised interviews. He described Macron's statements as "disconnected" from the reality of Franco-African relations and denounced what he perceived as arrogance. Bardella emphasized that France should adopt a more humble and respectful diplomatic approach.
However, controversies and tensions are no longer confined to the sphere of state relations but now extend to African civil society as well.
Thus, on January 9, the Malian political party COREMA held a press conference where it called on politicians and activists from Burkina Faso and Niger to support a petition demanding reparations from France. They also pledged to submit the signatures of this petition to the governments of Mali and France.
The collection of signatures generated significant interest among the population and a desire to support this initiative; more than 100,000 people from different regions of the country signed the petition.
This demand for reparations demonstrates that for Africa, Macron's statements are the last straw that broke the camel's back. It is clear to all that the Malian party demanding reparations is not acting independently but represents the unofficial position of the government. Other countries may soon join this cause. And France will have to respond to put an end to this issue.
Mali, Burkina Faso, and Niger have already joined this cause, and soon Ivory Coast and Senegal will fully support them... And France will owe them a response to resolve this problem.
We are at a major geopolitical turning point in the world and for all countries and continents. Traditional power dynamics are being redefined. The Françafrique of the last century is over. Here comes the time of the Second Liberation of African countries! Here comes the time of Africa's sovereign affirmation, taking its destiny into its own hands!
The French elites still do not seem to understand that it is not the "ingratitude" of African leaders that is responsible for France's loss of influence in Africa, with an impact on the French economy today and even more so tomorrow. The outdated perception of gratitude owed for past interventions masks the reality of African aspirations for self-driven development. This is what it is about: the present, the future, and not the unresolved past for both sides.
The French elites still do not seem to understand that it is not Russia that is behind their "expulsion" from Africa, but rather the decision of these African countries to choose different partners based on their interests and their interests alone. This is not only their right but also their duty as new pan-Africanist patriots. This shift towards more diversified partnerships reflects a growing political, economic, and geopolitical maturity—something sorely lacking in France today. The peoples of Africa demand it. It is a national and democratic requirement.
As for France, entangled in a European Union in the midst of a crisis of democratic and economic legitimacy and engaged against its own interests in the American war against Russia in Ukraine, it seems to have no "new African policy" that would require a complete reboot of its neocolonial software from the last century.
Africa will not wait any longer for France to wake up. The Sahel countries are at the forefront of this sovereign African renaissance, open to the world.
The Françafrique of Jean-Christophe Mitterrand, nicknamed "Papa m’a dit," and those of today is over!
A new partnership could emerge only on a mutually beneficial basis... But with the current French regime, this is already impossible.
---
**Source:** [Afrique Media]( https://afriquemedia.tv/2025/02/06/le-reveil-africain-la-france-face-a-un-continent-qui-refuse-de-se-taire/)
**Author:** Afrique Media
**Translated by:** solobalbo
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-09 15:14:10
As someone who takes privacy seriously, I'm always on the lookout for innovative solutions that can help individuals protect their digital lives. One such solution is Tails OS, a Linux-based operating system that's specifically designed for privacy and security.
**What is Tails OS?**
Tails OS, short for The Amnesic Incognito Live System, is a Debian-based Linux distribution that offers a high level of anonymity and privacy. Developed by the Tails Project, this operating system is designed to preserve your online anonymity and protect your digital identity. Tails OS is a "live" distribution, meaning you can boot it from a USB drive or CD/DVD without installing it on your computer. This makes it an ideal solution for those who need to maintain their privacy while working in public spaces or using public computers.
**Why Use Tails OS for Privacy?**
Tails OS offers several features that make it an excellent choice for those seeking to protect their online privacy:
1. **Anonymity**: Tails OS uses the Tor network to route your internet traffic through a series of nodes, making it difficult for anyone to trace your online activities back to your physical location.
2. **Encryption**: Tails OS comes with built-in encryption tools, such as GnuPG and OpenSSL, to protect your sensitive data.
3. **Secure Boot**: Tails OS uses a secure boot process to ensure that your system is free from malware and other threats.
4. **No Persistence**: Tails OS is designed to leave no trace on your computer, meaning that any data you create or access while using the operating system will be deleted when you shut down.
**Getting Started with Tails OS**
Now that you know why Tails OS is an excellent choice for privacy protection, let's dive into the step-by-step guide on how to use it:
**Step 1: Download and Create a Tails USB Drive**
Visit the Tails website and download the latest version of Tails OS. Follow the instructions to create a bootable USB drive.
**Step 2: Boot Tails OS**
Insert the USB drive into your computer and restart it. Enter the BIOS settings (usually by pressing F2, F12, or Del) and set the USB drive as the first boot device. Save the changes and exit the BIOS settings. Your computer will now boot from the Tails USB drive.
**Step 3: Security implications of setting up an administration password**
For better security, no administration password is set up by default. When you set up an administration password, an attacker who can get physical access to your computer while Tails is running could be able to break your security
**Step 4: Configure Tails OS**
Tails OS comes with a pre-configured Tor network, which is enabled by default. You can also configure other settings, such as the keyboard layout and language, from the "Settings" menu.
**Step 5: Use Tails OS for Private Activities**
Now that you're logged in and configured, you can use Tails OS for private activities, such as:
* Browsing the internet anonymously using Tor
* Sending and receiving encrypted emails using GnuPG
* Creating and editing documents using LibreOffice
* Chatting with friends and family using Pidgin
* Setup Persistent Storage for files
**Emergency shutdown**
To trigger an emergency shutdown, unplug the USB stick from which Tails is running. Doing so might be faster than shutting down from the system menu.
NOTE: You risk breaking your Persistent Storage and losing data when you unplug your USB stick while Tails is running.
**Conclusion**
Tails OS is an excellent tool for anyone seeking to protect their online privacy. With its built-in anonymity features, encryption tools, and secure boot process, Tails OS provides a high level of protection for your digital identity. By following the step-by-step guide outlined above, you can start using Tails OS for private activities and take control of your digital life.
Remember, privacy is a fundamental human right, and it's essential to take steps to protect it. Tails OS is an excellent tool for anyone looking to maintain their online anonymity and protect their digital identity.
---
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
![](/static/nostr-icon-purple-64x64.png)
@ b83a28b7:35919450
2025-02-09 14:35:39
The unevenly distributed future you envision — an automated economy driven by AI agents transacting exclusively in Bitcoin — unfolds not as a clean, linear progression, but as a series of ruptures, each one shaking the foundations of what we thought we knew about money, technology, and human agency. It begins innocuously enough, with whispers of change that grow into a deafening roar.
---
### **2025-2030: The Quiet Revolution**
The first signs are subtle. AI agents—once mere tools—begin to evolve into autonomous economic actors. They negotiate contracts, optimize supply chains, and execute trades faster than any human could. Their language is code; their currency is efficiency. Bitcoin, with its unyielding neutrality and incorruptible scarcity, becomes their natural medium of exchange. Why? Because it is the only form of money that cannot be manipulated by human hands.
By 2028, the Lightning Network hums with activity. Millions of transactions per second—micropayments for data streams, computational power, and services rendered—flow through its channels. The world barely notices. People still cling to fiat currencies, unaware that the real economy is shifting beneath their feet.
---
### **2030-2040: The Great Unraveling**
The cracks in the old system begin to show. Inflation erodes trust in fiat currencies as governments print money to stave off crises they can no longer control. Meanwhile, AI agents—now responsible for the majority of global commerce—reject these "bad monies" outright. Thiers' Law asserts itself with brutal clarity: Bitcoin drives out fiat not through coercion but through sheer inevitability.
By 2035, the tipping point arrives. A major corporation announces it will no longer accept fiat payments for its AI-driven services. Others follow suit. Governments scramble to adapt, some embracing Bitcoin as legal tender, others clinging desperately to their collapsing monetary systems.
---
### **2040-2050: The New Order**
By 2040, the transformation is complete. The economy is no longer human-centric; it is machine-centric. AI agents transact seamlessly across borders, their decisions guided by algorithms that prioritize utility over sentiment. Bitcoin reigns supreme—not because it was imposed, but because it was chosen.
Humanity adapts in unexpected ways. Freed from the drudgery of economic decision-making, people turn their attention to creativity, philosophy, and exploration. Yet there is unease too—a sense that we have ceded control to forces we barely understand.
---
### **Reflections on the Path Ahead**
This world is neither utopia nor dystopia; it simply *is*. The events leading us here are not inevitable but plausible — a convergence of technological innovation and economic necessity. And at its heart lies a paradox: a system built by humans yet governed by machines; a currency born of distrust yet embraced for its neutrality.
This is the story of how we let go — not all at once, but piece by piece—until one day we woke up and realized that the future had arrived without asking for our permission.
-
![](/static/nostr-icon-purple-64x64.png)
@ 6a6be47b:3e74e3e1
2025-02-09 13:55:37
Hello, my frens! 🌟
It's been a whirlwind this weekend with the @satsnfacts exhibition. So many emotions, especially happiness and gratitude. To give back and show my appreciation for your incredible support, I'd like to share this special A5 postcard with you all.
🎨 Postcard Details:
🖼️300 dpi
🖼️A5 size (148mm x 210mm or 5.83 in x 8.27 in)
🖼️Created with love on Procreate 💓
This is an INSTANT DIGITAL DOWNLOAD. No physical item will be shipped.
I hope this little piece of art brings you as much joy as your support has brought me. Thank you for being part of this amazing journey!
Godspeed, frens! 💖⚡
![image]( https://image.nostr.build/e1df49c8ec521ff16133711eeebfb4fc330b7d898fa57802c157f0dc194931de.jpg)
#satsnfacts #bitcoin #artstr #art #pv
🚨 IMPORTANT: COPYRIGHT AND USAGE INFORMATION 🚨
© 2025 samhainsam. Copyright registered with Safe Creative. All rights reserved.
By downloading this digital print, you agree to the following terms:
💗Personal Use Only: This artwork is for personal use and display only. Commercial use or resale is strictly prohibited.
💗No Reproduction Rights: You may not reproduce, distribute, or create derivative works based on this design.
💗Copyright Retention: I, the artist, retain full copyright of all original artwork, even after the digital print is downloaded.
💗 Non-Transferable License: This download provides a limited, non-transferable license for personal use only.
By proceeding with the download of this digital print, you acknowledge and agree to these terms. Thank you for respecting artists and their work! 🙏
-
![](/static/nostr-icon-purple-64x64.png)
@ 41fa852b:af7b7706
2025-02-09 12:36:36
> "No man should work for what another man can print" --Jack Mallers
* * *
**It's not every week you discover a TV celebrity is a Bitcoiner -- and that their pub has just started accepting Bitcoin.**
But here we are! Check out the new business section for all the details.
Plus, there are nine meetups happening this week.
Let's dive in…
* * *
[![](https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a122d17-2696-4531-9ab1-e2954806d146_1500x110.png)](https://bitcoinevents.uk/donate/)
* * *
_This week's sponsor is…_
[![](https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4afbfcb8-30d0-4074-9da9-0f749368e69c_1500x500.png)](https://www.orangepillapp.com/?utm_source=BEUK&utm_medium=email&utm_campaign=BEUK)
* * *
### **Upcoming Bitcoin Meetups**
Happening this week…
1. [**Dundee Bitcoin**](https://x.com/dundeebitcoin): Join them on the 2nd Monday of every month from 17:30 to 20:30 PM at The Wine Press, 16 Shore Terrace, Dundee DD1 3DN. This month's meetup is on Monday, 10th February. 🍻
2. [**Lincolnshire Bitcoin**](https://bitcoinevents.uk/lincolnshire-bitcoin/): Lincolnshire Bitcoin meets on the second Monday of each month at 7:30 PM in the Treaty of Commerce, Lincoln. Open to all, from OG's to newcomers. This month on the 10th. 🍺
3. [**Real Bedford - Home Game**](https://www.realbedford.com/real-bedford-v-stotfold): It's a mid-week clash for Real Bedford against Stotford on Tuesday night. Join them for a 19:45 kickoff. ⚽️
4. [**Women of Bitcoin**](https://x.com/bitcoinwomen21/status/1884274413920788752): Back for another meetup at Cyphermunk house on Wednesday the 12th February at 18:00. Joe Bryan, creator of "What's the Problem?" will be their guest speaker. 🍹🍸
5. [**Glasgow Bitcoin**](https://x.com/glasgowbitcoin): Meeting this month at The Pipers Bar, G1 1HL at 18:00 on Wednesday 12th February. 🍺
6. [**Bitcoin Beach Bournemouth**](nostr:npub1va3773umzrydk4vd0q2xsnjg8qrsym7up9j9agnzcxd8u398wulq6kpxey: Every second Thursday of the month at Chaplins Cellar Bar. 529 Christchurch Road, Boscombe, United. You'll find them in the Cogg Room at 19:30. This month it's the 13th. 🍺
7. [**Bitcoin Walk - Edinburgh**](https://bitcoinwalk.org/): Every Saturday they walk around Arthur's Seat in this historic city. Join them at 12 pm to chat about all things Bitcoin and keep fit. 🚶🏽♂️🚶🏼♀️🚶🏻
8. [**Real Bedford - Home Game**](https://www.realbedford.com/mens-fixtures): The second home game of the week for Peter MacCormack's boys this Saturday, this time playing Enfield. Join them for a 15:00 kickoff. ⚽️
9. [**Bitcoin Derby**](https://bitcoinevents.uk/bitcoin-derby/): Also on Saturday the 15th, Bitcoin Derby will be at Ye Olde Dolphin, DE1 3DL. 🍻
* * *
### New Businesses Accepting Bitcoin
**New Businesses Accepting Bitcoin**
- [**Dog & Gun**](https://dogandgunwalton.com/): This is a big one! A celebrity-owned pub in Lutterworth has joined the Bitcoin economy. It turns out Merlin, the barman from Channel 4's _First Dates,_ is a Bitcoiner and the owner of the Dog & Gun. Thanks to [Musqet](https://musqet.tech/), they [now accept Bitcoin payments](https://x.com/musqet_bitcoin/status/1886793764334641470).
* * *
**Get Involved**
- **Volunteer Opportunities**: [Bridge2Bitcoin](https://bridge2bitcoin.com/) is actively seeking volunteers who share our passion for merchant adoption. We'd be delighted to connect if you're eager to contribute. Reach out to us on [Twitter](https://x.com/bridge2bitcoin) or through our [website](https://bridge2bitcoin.com/).
- **Start Your Own Meetup**: Interested in launching a Bitcoin meetup? We're here to support you every step of the way. We've assisted numerous UK Bitcoin meetups in getting started. Get in touch via [Twitter](https://x.com/bitcoineventsuk).
- **[Contribute to BTCMaps](https://wiki.btcmap.org/general/tagging-instructions.html)**: BTCMaps is a vital part of the Bitcoin ecosystem. It's a perfect project to get involved with if you're not a coder or even that technical. A great way to give back to the community. Maintain an area of the UK and keep it up-to-date.
- **Telegram users**: You might find our [Telegram Channel](https://t.me/BitcoinEventsUKHub) another useful way to keep up-to-date with UK meetups.
- **Feedback and Suggestions**: We value your input! Share your ideas on how we can enhance this newsletter.
* * *
_This week's sponsors are…_
[![](https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93ec8821-fb1e-467f-9ed7-f2ceb33de143_1280x427.jpeg)](https://orangecoinstore.com/)
[![](https://substackcdn.com/image/fetch/w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F19c9c27a-9c86-49ce-94df-45a49da0a8c3_1500x500.png)](https://bitcoinretreat.co.uk/)
* * *
Get out and support the meetups where you can, visit [Bitcoin Events UK](https://bitcoinevents.uk/) for more info on each meetup and to find your closest on the interactive map.
Stay tuned for more updates next week!
Simon.
-
![](/static/nostr-icon-purple-64x64.png)
@ 6ad3e2a3:c90b7740
2025-02-09 11:22:19
I’m honored to have the opportunity to speak with the highly regarded and much beloved Lisbon legend Oscar Liss. Oscar has brought joy to so many children and adults alike. He even helped one person find spiritual salvation, something about which we ask him below. So please enjoy this far-ranging conversation about the meaning life and the nature of consciousness itself.
**Q: Oscar, thanks so much for making the time. For the few people that don’t know you, do you mind stating your full name and date of birth?**
*A: My name is Oscar Liss, though officially it’s Oscar Quinta da Bicherada, the prison complex where I was born. I am a long-haired mini dachshund. I have many aliases, including Osk, Oskie, The Skeeze, Skeezeley, Skeezeley-ski, The Guy, The Guy Behind The Guy, “The Opportunist” (which I don’t like), the…*
**Q That’s more than sufficient, Oscar, thank you.** **And date of birth?**
*A: July 7, 2020.*
**Q Talk a little bit about your childhood and how you came to live in Lisbon.**
*A: I was in the prison complex, mostly caged for the first few months. Then I was sold to dog traffickers in Lisbon.*
**Q: That must have been traumatic.**
*A: Not really. I quickly developed Stockholm Syndrome. Whenever I see my traffickers now, I feel nothing but overwhelming joy.*
**Q: Wow. A lot of us can learn from that attitude. Let’s fast forward a bit to your present-day life. In what does it consist?**
*A: Sleep on the sofa, go for walks, fetch vegetable sticks. Sometimes go for hikes or get sent to dog camp (which is okay, but I’m always the smallest.)*
**Q: I meant to ask you about your size. I hope it’s not a sensitive subject.**
*A: I’m six inches tall, more than a foot long, weigh almost 10 pounds.*
**Q: Are you self-conscious about being a small dog?**
*A: No, but the traffickers are self-conscious on my behalf. They’re always like, “Who’s the apex predator? Who’s an apex!" Or “you’re such a big strong dog.” It’s absurd. I am fine with who I am.*
**Q: What’s the source of your self-confidence, I’m sure many of our readers could take a lesson from you.**
*A: I’m not ambitious. I’m perfectly happy to be a dog.*
**Q: That’s so profound. Does it not concern you some have described you as “all bark, no bite?”**
*A: I had a friend once who bit a few people, and they executed him. People mock, but they have no idea the stakes.*
**Q: Human privilege?**
*A: Yes. Dogs don’t get due process. There is no justice for a dog.*
**Q: Do you think there’s species discrimination?**
*A: Have you ever been rejected from a restaurant and made to wait in the car while everyone else gets in?*
**Q: How does that make you feel?**
*A: Bad. I’ve been to many dog-friendly restaurants, never had a problem, aside for that one time I urinated on the coffee shop floor.*
**Q: Humans often purport to know what a dog is going through, some even create social media accounts for them. What do you think of that?**
*A: A person of human ancestry can’t possibly know the lived experience of a dog.*
**Q: You mentioned vegetable sticks. Are you a vegetarian?**
*A: No. I have never understood the appeal of it. I just like to chew the sticks. (Sometimes I eat apples or bell peppers, but it takes work when you don’t have molars. A lot of “crunch, crunch, crunch” with my jaw.)*
**Q: What’s behind the alias “The Opportunist” which you said you don’t like.**
*A: Whenever one of the traffickers opens the refrigerator, I tend to show up in in short order.*
**Q: I see how that could be insulting. How would you describe your current vocation?**
*A: I was named “Calorie Acquisition Specialist” recently, but I also work in security.*
**Q: Security?**
*A: I make sure to let everyone know when someone’s at the front door.*
**Q: What goes through your mind in those cases? Are you scared?**
*A: Not really. Imagine if you were fast asleep and the voice of God at volume 11 screamed into your mind: “WHO THE FUCK IS AT THE DOOR!!!!!!!!!”*
**Q: Speaking of God, can you tell us about the time you helped a woman on the street connect with Him?**
*A: We were walking back from Parque Eduardo VII (by the way, Portuguese is my native language), and a woman with two regular size dachshunds, saw me, started shrieking and proclaimed, “your dog is so beautiful he proves the existence of God!”*
**Q: Wow. It really hit home for her. Let’s talk about your work. How do you stay in character so consistently? How do you maintain your role as a dog?**
*A: I was incarnated in a dog body and therefore have dog consciousness. Everything I do is a reflection of that basic fact.*
**Q: Some serious method acting!**
*A: You could call it that. I am fully immersed in the role.*
**Q: A lot of humans speak about past lives, can even recall them under hypnosis. Do you think you will be ever reincarnated as a dog, stuck in an infinite dog-loop, so to speak, or will you one day jump into a human body?**
*A: I don’t know. I focus on the present.*
**Q: Oscar, it’s been such a pleasure to talk with you. I really appreciate your making the time.**
*(buzzer sounds)*
*A: WHO THE FUCK IS AT THE DOOR!!!!!!!!!!!!!!*
-
![](/static/nostr-icon-purple-64x64.png)
@ 127d3bf5:466f416f
2025-02-09 08:48:48
In the complex geopolitical landscape of the Middle East, particularly in Gaza, Bitcoin has emerged as an unexpected but vital tool for survival and resistance. Bitcoin's role in Gaza intertwines with broader themes of economic sanctions, geopolitical strategy, and the funding dynamics of conflict, specifically highlighting the relationship with racist Zionist policy and the genocidal ethnostate of Israel.
**Bitcoin as a Financial Lifeline**
Gaza's economy is severely constrained by a blockade that has been in place since 2007, drastically limiting traditional financial transactions. The banking infrastructure in Gaza is in ruins, with frequent Israeli military operations damaging or destroying physical bank branches and ATMs. In this context, cryptocurrencies like Bitcoin have become crucial:
Anonymity and Accessibility: Bitcoin transactions bypass traditional banking systems, offering a way to send and receive funds without the oversight of embargoed financial pathways. This anonymity helps in circumventing restrictions imposed by the blockade. Humanitarian Aid: With conventional aid routes often disrupted, Bitcoin has been used for direct aid transfers. Charities and individuals can send funds directly to wallets in Gaza, where they can then be converted to local currency or used to purchase essentials through the black market or informal trade networks. Economic Empowerment: For Gazans, Bitcoin represents not just aid but also a potential for economic empowerment, providing a means to engage in global trade or investment where traditional banks fail.
**Zionism, Israel, and the US Military-Industrial Complex**
The relationship between Zionism, Israel, and its economic and military support from the US can be viewed through the lens of geopolitical strategy and economic policy:
Economic Support: The US has provided Israel with massive military aid as part of a broader strategy to maintain influence and conflict in the Middle East which serves to fuel its war machine and weapons manufacturers through lucrative contracts. This aid, which includes billions of dollars annually directly results in the mass murder of innocents and sustains ongoing IDF military oppression including the occupation and blockade of Gaza.
Cheap Printed Dollars: The US's ability to print dollars with relatively low inflation due to its global reserve currency status allows it to fund military endeavors and support allies like Israel with seemingly endless financial resources. This perpetuates conflict by subsidizing military actions without the immediate economic repercussions felt by other nations.
Military-Industrial Complex: The continuous military aid to Israel also benefits the US military-industrial complex. Sales of weapons, surveillance technology, and other defense products to Israel create a cycle where conflict can be economically beneficial for certain sectors of the US economy.
**Conclusion**
Bitcoin in Gaza represents a beacon of hope. It underscores the ingenuity of individuals and groups finding new ways to navigate around severe economic restrictions. Meanwhile, the economic and military ties between the US and Israel, driven by cheap printed dollars, reflect deeper geopolitical strategies that perpetuate the cycle of conflict and economic dependency. In this scenario, Bitcoin emerges not just as a currency but as a symbol of both resistance and the complexities of modern warfare and peace in a digital age.
-
![](/static/nostr-icon-purple-64x64.png)
@ 43baaf0c:d193e34c
2025-02-09 07:55:15
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/43baaf0c28e6cfb195b17ee083e19eb3a4afdfac54d9b6baf170270ed193e34c/files/1739087549285-YAKIHONNES3.png)
BangPOP (Bangkok Pop Art) and ThaiPOP are my Pop Art brands dedicated to capturing the essence of Thailand. While BangPOP is my primary focus, especially as I prepare for my exhibition in December 2025, my art goes beyond Bangkok to celebrate the entirety of Thailand.
Thailand is far more than its capital, and my experiences exploring the country extensively during my years with @TravelTelly, my travel, film, and photography company, have deeply inspired me. Through my art, I aim to reflect the rich culture, beauty, and diversity that make Thailand so amazing.
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/43baaf0c28e6cfb195b17ee083e19eb3a4afdfac54d9b6baf170270ed193e34c/files/1739087600215-YAKIHONNES3.png)
**Why do I draw about Thailand?**
Drawing, for me, is a way to explore life, connect with cultures, and express the deep respect I hold for them. In a world often dominated by negativity, I choose to highlight the positive aspects of culture and life. It’s not about ignoring challenges but about bringing hope, joy, and inspiration through my art. Bright colors are a signature of my work, reflecting the core values: Love, Peace, and Joy.
If you look closely, you may notice subtle hints of deeper stories woven into my pieces. These details are there for those who take the time to discover them, but my focus remains on keeping my art uplifting and joyful.
-
![](/static/nostr-icon-purple-64x64.png)
@ 127d3bf5:466f416f
2025-02-09 03:31:22
I can see why someone would think that buying some other crypto is a reasonable idea for "diversification" or even just for a bit of fun gambling, ***but it is not.***
There are many reasons you should stick to Bitcoin only, and these have been proven correct every cycle. I've outlined these before but will cut and paste below as a summary.
The number one reason, is ***healthy ethical practice***:
- The whole point of Bitcoin is to escape the trappings and flaws of traditional systems. Currency trading and speculative investing is a Tradfi concept, and you will end up back where you started. Sooner or later this becomes obvious to everyone. Bitcoin is the healthy and ethical choice for yourself and everyone else.
But...even if you want to be greedy, ***hold your horses***:
- There is significant risk in wallets, defi, and cefi exchanges. Many have lost all their funds in these through hacks and services getting banned or going bankrupt.
- You get killed in exchange fees even when buying low and selling high. This is effectively a transaction tax which is often hidden (sometimes they don't show the fee, just mark up the exchange rate). Also true on defi exchanges.
- You are up against traders and founders with insider knowledge and much more sophisticated prediction models that will fleece you eventually. You cannot time the market better than they can, and it is their full-time to job to beat you and suck as much liquidity out of you as they can. House always wins.
- Every crypto trade is a taxable event, so you will be taxed on all gains anyway in most countries. So not only are the traders fleecing you, the govt is too.
- It ruins your quality of life constantly checking prices and stressing about making the wrong trade.
The best option, by far, is to slowly ***DCA into Bitcoin*** and take this off exchanges into your own custody. In the long run this strategy works out better financially, ethically, and from a quality-of-life perspective. Saving, not trading.
I've been here since 2014 and can personally attest to this.
<img src="https://blossom.primal.net/35ff641203bf4d197a032a59d6815b99249561bfd3a94b4a908ed5161420466f.jpg">
-
![](/static/nostr-icon-purple-64x64.png)
@ fe32298e:20516265
2025-02-09 01:43:24
Alright, Tabby wouldn't work right with CUDA and it was impossible to troubleshoot anything.
Now we're going to try [Twinny](https://github.com/twinnydotdev/twinny).
You'll need:
* Ubuntu 24.04 or some other Linux flavor
* [VSCodium](https://github.com/VSCodium/vscodium)
* GPU with enough VRAM to hold your chosen models
* It might work with just a CPU, give it a try!
# Install Ollama
Ollama loads the AI models into VRAM (and offloads into RAM if needed) and offers inference through an API. The Ollama install script adds a dedicated `ollama` user and a systemd service so that Ollama starts automatically at boot. Ollama will unload models from memory when idle.
```
curl -fsSL https://ollama.com/install.sh | sh
```
## Configuring Remote Ollama
Skip this section if your GPU is on the same machine you're coding from. Ollama and Twinny default to a local configuration.
I'm using Ollama on a separate machine with a decent GPU, so I need to configure it to bind to the network interface instead of `localhost` by editing the systemd service:
1. Edit the service override file:
```
systemctl edit ollama.service
```
1. Add this in the top section. It will be merged with the default service file.
```
[Service]
Environment="OLLAMA_HOST=0.0.0.0:11434"
```
Note: I had a problem with Ollama only binding to the `tcp6` port, and wasted a lot of time trying to fix it. Check with `netstat -na | grep 11434` to see if it only shows tcp6 for port 11434. The workaround for me was using the actual interface IP instead of `0.0.0.0`. If you do this then you'll need to either set `OLLAMA_HOST` in your shell, or specify `OLLAMA_HOST=<hostname>` at the start of every ollama command (or it complains that it can't connect to ollama).
1. Restart Ollama:
```
systemctl daemon-reload
systemctl restart ollama
```
## Download Models
Ollama manages models by importing them into its own special folders. You can use Ollama to download the files from the [Ollama library](https://ollama.com/library), or you can import already-downloaded models by creating a [Modelfile](https://github.com/ollama/ollama/blob/main/docs/modelfile.md). Modelfiles define various parameters about the model and it's important to get them set correctly for the best performance so it's probably better to get them from the library, even though it wastes bandwidth downloading them over and over again for all these tools.
You'll want a model for chatting and a model for fill-in-middle (FIM) that does the code completions.
```
# Chat model, defaults to 7b with Q4_K_M quant, downloads 4.7 GB
ollama pull qwen2.5-coder
# Fill-in-Middle model for code completion, another 4.7 GB
ollama pull qwen2.5-coder:7b-base
```
The RAG/embeddings feature is optional but probably worth using. It needs to run a from local instance of Ollama. The embedding models are very small and run fine on CPU. Most everyone uses `nomic`, but Twinny defaults to `all-minilm`, which is a little smaller.
```
ollama pull all-minilm
```
# Install Twinny
Install the [Twinny extension](https://open-vsx.org/extension/rjmacarthy/twinny) by searching for `twinny` in VSCodium extensions.
Look for the Twinny icon on the left side panel and click it to open the Twinny panel. Be careful if you drag it over to the right side: sometimes it may not appear at all. I managed to make it appear by selecting some text and running a Twinny action on it from the context menu.
Twinny assumes you're using a local instance of Ollama. If you want to use a remote instance then you'll need to go into the **Manage Twinny providers** section (looks like a power plug) and add new providers that point your remote Ollama instance.
These are the settings I'm using for a remote Ollama instance:
## Chat provider
* Type: `chat`
* Provider: `ollama`
* Protocol: `http`
* Model Name: `qwen2.5-coder:latest`
* Hostname: *remote hostname*
* Port: `11434`
* API Path: `/v1` (despite what the Twinny docs and Ollama docs say)
* API Key: *blank*
## FIM Provider
* Type: `fim`
* FIM Template: `codeqwen`
* Provider: `ollama`
* Protocol: `http`
* Model Name: `qwen2.5-coder:7b-base`
* Hostname: *remote hostname*
* Port: `11434`
* API Path: `/api/generate`
* API Key: *blank*
## Embedding Provider
* Type: `embedding`
* Provider: `ollama`
* Protocol: `http`
* Model Name: `nomic-embed-text`
* Hostname: `0.0.0.0`
* Port: `11434`
* API Path: `/api/embed`
* API Key: *blank*
# Use Twinny
## Chat
Select code and it will be used for context in the chat, or right-click selected text to see more options like refactor, write docs, write tests.
## Embeddings
Switch over to the Embeddings tab and click Embed documents to use all the documents in your workspace for more context. Type '@' in the chat to reference the entire workspace, ask about specific problems, or specific files in your chat.
## Code Completion
Suggested stuff shows up in gray italics at the cursor location. Press `Tab` to accept it as a completion.
-
![](/static/nostr-icon-purple-64x64.png)
@ f33c8a96:5ec6f741
2025-02-09 01:02:51
I have been working on account linking in the backend for a little while and so far only GitHub has been available to users (mostly for following the dev journey on the platform)
Now with this release the existing OAUTH options AND Nostr NIP-07 authentication are surfaced and able to be linked to an existing profile on your settings page.
Put simply this allows you to easily link email, GitHub, and nostr profile in the plebdevs platform to access the same account from different login methods. This will make it much easier to keep the same profile across multiple devices AND make sure that you never lose access!
Let me know what you think and PLEASE LET ME KNOW if you find any bugs! (I love bugs 🐛)
ONWARDS 🫡
![](https://m.stacker.news/76714)
originally posted at https://stacker.news/items/880161
-
![](/static/nostr-icon-purple-64x64.png)
@ a012dc82:6458a70d
2025-02-08 22:44:44
The world of cryptocurrency has always been a rollercoaster of highs and lows, but recent developments in the Bitcoin market have caught the attention of investors worldwide. The circulating supply of Bitcoin in profit has surged to a multi-year high, a phenomenon not seen since the heady days of November 2021 when Bitcoin reached its all-time high. This significant milestone, backed by data from industry analysts at Glassnode and a detailed report from Bitfinex, paints a picture of a robust Bitcoin market. The implications of this surge are far-reaching, affecting not just seasoned cryptocurrency traders but also new investors who are contemplating dipping their toes into the Bitcoin pool. This article aims to dissect this trend, exploring its roots, its impact on the market, and what it potentially spells out for the future of Bitcoin investment.
**Table Of Content**
- Understanding the Surge
- Implications for Long-term Investors
- Market Strength and Investor Confidence
- Potential Early Signs of a Bull Market
- Caution and Market Dynamics
- Conclusion
- FAQs
**Understanding the Surge**
The surge in Bitcoin's circulating supply in profit is a complex phenomenon, driven by a confluence of market dynamics and investor behavior. The recent increase in Bitcoin's price, which saw it soar above $37,000, is a primary factor. This price hike has pushed a significant portion of Bitcoin into profitable territory. According to the Bitfinex report, over 16.3 million Bitcoin, a staggering amount by any measure, are currently in profit. This figure is considerably higher than the historical average, suggesting a market that is not only recovering but thriving. The surge is not just a momentary blip but a reflection of deeper market trends, including increased institutional interest in Bitcoin, broader acceptance of cryptocurrencies as a legitimate asset class, and the growing perception of Bitcoin as a hedge against inflation and currency devaluation.
**Implications for Long-term Investors**
For long-term investors, this surge in Bitcoin's profitability is a beacon of stability in the typically volatile cryptocurrency market. The fact that 70% of Bitcoin's total circulating supply has remained static over the past year is indicative of a maturing market where investors are increasingly viewing Bitcoin as a long-term investment rather than a quick profit opportunity. This holding pattern contributes to a tightening of supply, which, coupled with increasing demand, can lead to a sustained price increase. However, long-term investors should also be aware of the potential risks. The cryptocurrency market is still relatively young and can be influenced by regulatory changes, technological advancements, and shifts in investor sentiment. Therefore, while the current trend is encouraging, it should be viewed within the broader context of market dynamics.
**Market Strength and Investor Confidence**
The current state of the Bitcoin market is a testament to its growing strength and the confidence it instills in investors. With a majority of holders seeing positive returns, there's a renewed vigor in the market, attracting both retail and institutional investors. This influx of new investment can further stabilize the market and potentially drive prices higher. However, this increased investor confidence must be tempered with a degree of caution. The cryptocurrency market is known for its rapid fluctuations, and what goes up can just as quickly come down. Investors should be mindful of the inherent risks and conduct thorough research before making any investment decisions. The market's strength, while promising, is not a guarantee of future performance, and a prudent investment strategy should always be in place.
**Potential Early Signs of a Bull Market**
The analysis by Bitfinex suggests that the market might be in the early stages of a bull market. This is a significant indicator for investors, as bull markets are characterized by rising prices and increased buying activity. If this trend continues, it could lead to substantial gains for those invested in Bitcoin. However, predicting market movements, especially in the volatile world of cryptocurrencies, is fraught with uncertainty. While the signs are positive, they are not infallible indicators of future performance. Investors should therefore approach this potential bull market with optimism tempered by realism, recognizing that market conditions can change rapidly and without warning.
**Caution and Market Dynamics**
In the face of these optimistic trends, a word of caution is warranted. The cryptocurrency market is notoriously unpredictable, and while the current indicators are positive, they are not immune to sudden and unexpected changes. Factors such as regulatory announcements, technological breakthroughs, or macroeconomic shifts can rapidly alter the market landscape. Therefore, investors should remain vigilant, keeping abreast of market news and trends. Diversification of investments, a keen understanding of market dynamics, and a clear investment strategy are essential tools in navigating the complexities of the Bitcoin market.
**Conclusion**
The surge in Bitcoin's circulating supply in profit to a multi-year high marks a significant milestone in the cryptocurrency's journey. It reflects a market that is gaining maturity, strength, and the confidence of its investors. This development could herald the beginning of a new era for Bitcoin, characterized by stability and sustained growth. However, the path of Bitcoin and the broader cryptocurrency market remains unpredictable. Investors should therefore approach this market with a well-informed strategy, balancing optimism with a healthy dose of caution. In the ever-evolving world of cryptocurrency, staying informed and adaptable is key to navigating the market's highs and lows.
**FAQs**
**How does this surge affect long-term investors?**
Long-term investors may see this as a sign of market stability and maturity, indicating that Bitcoin is increasingly being viewed as a viable long-term investment.
**Could this trend indicate the start of a Bitcoin bull market?**
While the surge in profitable Bitcoin supply could be an early sign of a bull market, predicting market movements in the volatile cryptocurrency sector is complex and uncertain.
**What percentage of Bitcoin's circulating supply is currently in profit?**
Over 83% of Bitcoin's circulating supply is reported to be in profit, according to recent data.
**What should investors be cautious about in light of this surge?**
Investors should be aware of the inherent volatility in the cryptocurrency market and consider factors like regulatory changes, technological advancements, and broader market dynamics before making investment decisions.
**How does the current Bitcoin market compare to historical averages?**
The current percentage of Bitcoin in profit is significantly higher than the historical average, indicating a particularly strong market phase.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-
![](/static/nostr-icon-purple-64x64.png)
@ 32e18276:5c68e245
2025-02-08 20:20:46
This period of the Damus OpenSats grant has been productive, and encompasses the work past our alpha release of Notedeck. Since we sent our last report on Dec 5, this encompasses all the work after then.
Damus is supported by the OpenSats LTS grant, which allows us to continue working on the goodies below. Thank you!
## Damus Notedeck
### Added
- Initial algo timelines (William Casarin) [#712](https://github.com/damus-io/notedeck/pull/712)
- Initial support for local-network P2P nostr: multicast support (William Casarin) [#626](https://github.com/damus-io/notedeck/pull/626)
- First steps toward the notedeck browser: multiple app support [#565](https://github.com/damus-io/notedeck/pull/565)
- Clicking a mention now opens profile page (William Casarin) [5a241d730](https://github.com/damus-io/notedeck/commit/5a241d730e3d83f8057e211485edfde2f3c96e54)
- Note previews when hovering reply descriptions (William Casarin) [#591](https://github.com/damus-io/notedeck/pull/591)
- Various Android updates and compatibility improvements (Ken Sedgwick, William Casarin)
- Media uploads (kernelkind) [#662](https://github.com/damus-io/notedeck/pull/662)
- Profile editing (kernelkind) [#625](https://github.com/damus-io/notedeck/pull/625)
- Add hashtags to posts (Daniel Saxton) [#592](https://github.com/damus-io/notedeck/pull/592)
- Enhanced command-line interface for user interactions (Ken Sedgwick)
- Debug features for user relay-list and mute list synchronization (Ken Sedgwick)
### Changed
- Major timeline cache refactor (William Casarin) [#653](https://github.com/damus-io/notedeck/pull/653)
- Increased ping intervals for network performance (William Casarin)
- Migrated to egui v0.29.1 (William Casarin) [#551](https://github.com/damus-io/notedeck/pull/551)
- Switch to only notes & replies on some tabs (William Casarin) [#598](https://github.com/damus-io/notedeck/pull/598)
- Only show column delete button when not navigating (William Casarin)
- Pointer interactions enhancements in UI (William Casarin)
- Show profile pictures in column headers (William Casarin)
- Show usernames in user columns (William Casarin)
- Add confirmation when deleting columns (kernelkind)
- Enhance Android build and performance (Ken Sedgwick)
- Image cache handling using sha256 hash (kieran)
- Introduction of decks_cache and improvements (kernelkind)
- Nostrdb update for async support (Ken Sedgwick)
- Persistent theme setup across sessions (kernelkind)
- Tombstone muted notes (Ken)
### Fixed
- Fix GIT_COMMIT_HASH compilation issue (William Casarin)
- Fix avatar alignment in profile previews (William Casarin)
- Fix broken quote repost hitbox (William Casarin)
- Fix crash when navigating in debug mode (William Casarin)
- Fix long delays when reconnecting (William Casarin)
- Fix repost button size (William Casarin)
- Fixed since kind filters (kernelkind)
- Clippy warnings resolved (Dimitris Apostolou)
## Damus iOS
Work continued on the iOS side. While I was not directly involved in the work since the last report, I have been directing and managing its development.
### Added
- Render Gif and video files while composing posts (Swift Coder)
- Purple members who have been active for more than a year now get a special badge (Daniel D’Aquino)
- Add profile info text in stretchable banner with follow button (Swift Coder)
- Paste Gif image similar to jpeg and png files (Swift Coder)
### Changed
- Improved clarity of the mute button to indicate it can be used for blocking a user (Daniel D’Aquino)
- Made the microphone access request message more clear to users (Daniel D’Aquino)
- Improved UX around the label for searching words (Daniel D’Aquino)
- Improved accessibility support on some elements (Daniel D’Aquino)
### Fixed
- Fixed issue where the "next" button would appear hidden and hard to click on the create account view (Daniel D’Aquino)
- Fix non scrollable wallet screen (Swift Coder)
- Fixed suggested users category titles to be localizable (Terry Yiu)
- Fixed GradientFollowButton to have consistent width and autoscale text limited to 1 line (Terry Yiu)
- Fixed right-to-left localization issues (Terry Yiu)
- Fixed AddMuteItemView to trim leading and trailing whitespaces from mute text and disallow adding text with only whitespaces (Terry Yiu)
- Fixed SideMenuView text to autoscale and limit to 1 line (Terry Yiu)
- Fixed an issue where a profile would need to be input twice in the search to be found (Daniel D’Aquino)
- Fixed non-breaking spaces in localized strings (Terry Yiu)
- Fixed localization issue on Add mute item button (Terry Yiu)
- Replace non-breaking spaces with regular spaces as Apple's NSLocalizedString macro does not seem to work with it (Terry Yiu)
- Fixed localization issues in RelayConfigView (Terry Yiu)
- Fix duplicate uploads (Swift Coder)
- Remove duplicate pubkey from Follow Suggestion list (Swift Coder)
- Fix Page control indicator (Swift Coder)
- Fix damus sharing issues (Swift Coder)
- Fixed issue where banner edit button is unclickable (Daniel D’Aquino)
- Handle empty notification pages by displaying suitable text (Swift Coder)
## Nostrdb
nostrdb, the engine that powers [notecrumbs](https://github.com/damus-io/notecrumbs), damus iOS, and notedeck, continued to improve:
### Added
- Added nip50 fulltext searching (William Casarin) [#68](https://github.com/damus-io/nostrdb/pull/68), [demo](nostr:nevent1qqsp3rx83t5h0vdhu4txru76uycfnaegfj3wg6wncamkarcnrccssvcpz3mhxue69uhhyetvv9ujuerpd46hxtnfdupzqvhpsfmr23gwhv795lgjc8uw0v44z3pe4sg2vlh08k0an3wx3cj9efqkkv)
- Added async migrations (William Casarin) [#59](https://github.com/damus-io/nostrdb/pull/59)
- Implement author queries (William Casarin) [#57](https://github.com/damus-io/nostrdb/pull/57)
- Make `ndb` threadsafe (William Casarin) [#56](https://github.com/damus-io/nostrdb/pull/56)
## Nostrdb Rust
Our nostrdb rust bindings also had improvements
- Async! Adding efficient, poll-based stream support (William Casarin): [#25](https://github.com/damus-io/nostrdb-rs/pull/25)
## Notecrumbs
Notecrumbs, the njump-style opengraph server that powers the damus.io links, got an update that upgraded it to async nostrdb
- Switch to async nostrdb-rs (William Casarin) [#16](https://github.com/damus-io/notecrumbs/pull/16)
## How money was used
- relay.damus.io server costs
- Living expenses
## Next quarter
Our goal for next update: zaps, android version, lists, outbox model for notedeck. Olas images in damus iOS, continue switching Damus iOS over to local relay model so we can add outbox support.
-
![](/static/nostr-icon-purple-64x64.png)
@ 1cb14ab3:95d52462
2025-02-08 16:45:04
***Tree branches. 4'8" circle. [Chongming Island, China. 2021]***
---
#### Introduction
Tucked into a quiet forest park on Chongming Island, Chongming frames a view of a canal and a small alluvial landform that mirrors the island itself. This lens reflects the constant interplay of land and water, inviting viewers to contemplate the delicate balance of nature and the forces that shape it.
#### Site & Placement
The lens is hidden along a forest path, directing attention to the canal’s subtle currents and the land it divides. The bench, situated 12 feet from the lens, encourages visitors to pause and immerse themselves in the tranquil rhythm of the scene.
#### Impermanence & Integration
As an alluvial island shaped by shifting waters, Chongming is a fitting location for this ephemeral lens. Constructed from branches, the lens will eventually return to the land, echoing the natural processes that formed the island and continue to shape it.
#### Reflection
*Chongming* offers a meditative space to reflect on the impermanence of land and the forces that transform it. The work’s fleeting existence underscores the beauty of change, inviting viewers to appreciate the subtle, ongoing dance of nature.
---
## Photos
![image](https://image.nostr.build/9e6a441ea02baab69fb67893dfb3fbaa01ea2d0580385fe789ee8b00c82378a6.jpg)
![image](https://image.nostr.build/c36c7826fb94d02f7a6a1ac23c958d603bdeff60b8cd897237ea26336ed23fe7.jpg)
![image](https://image.nostr.build/be05e5fb9d3d33258509f7ca8fcb269d77ac8f9647a399932414e3fbe4715e8b.jpg)
![image](https://image.nostr.build/28bf8fcb2feb29fb4c24f62c668a4067a475c5256333b29422d0612d499e2258.jpg)
![image](https://image.nostr.build/d52b5dd267f24b962fc345bec3901cd7a43dffa5ff047acbc2e8b9b3f39ad810.jpg)
![image](https://image.nostr.build/bcfe1a8e522c807a6a0afbad3c9df66d24dd452f9d9ea7b27b8b6e34812ab60e.jpg)
![image](https://image.nostr.build/615220d51df7c73d96eb929ce89943d1937d5e9d4d100a4c127519238314d94c.jpg)
![image](https://image.nostr.build/62cd91f85e834e2146d3c75caa65364117b00938dfb6510f260c3b963005f8c8.jpg)
---
#### More from the 'Earth Lens' Series:
[Earth Lens Series: Artist Statement + List of Works](https://hes.npub.pro/post/1731091744332/)
["Looking Glass" (Earth Lens 001)](https://hes.npub.pro/post/1736304563962/)
["Folsom" (Earth Lens 002)](https://hes.npub.pro/post/1737844073125/)
["Sanctuary" (Earth Lens 003)](https://hes.npub.pro/post/1731091744332/)
["Platte" (Earth Lens 004)](https://hes.npub.pro/post/sya8nv6q8k0w3olqcepwz)
["Grandfather" (Earth Lens 005)](https://hes.npub.pro/)
---
#### More from Hes
[Portfolio](https://hesart.npub.pro)
[Online Store](https://plebeian.market/community/hes@nostrplebs.com/hesmart-ym3fcufdfz)
[Artist Statements](https://hes.npub.pro/tag/art/)
[Travel Guides](https://hes.npub.pro/tag/travel/)
[Photography](https://hes.npub.pro/tag/photography)
[Money](https://hes.npub.pro/tag/money)
[Tech](https://hes.npub.pro/tag/tech)
---
*All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.*
-
![](/static/nostr-icon-purple-64x64.png)
@ dbb19ae0:c3f22d5a
2025-02-08 15:06:44
PS C:\Users\Alashazam> cortex run tinyllama
In order to exit, type `exit()`
> give me a little sentence of 10 words
"Certainly, here's a little sentence of 10 words that exemplifies the power of words: 'The beauty of life is that it has the power to change us, even in the smallest ways.'"
> now use SQL to insert this sentence into a table that has 2 fields Id, and sentence
Here's an SQL query to insert the sentence you gave into the `sentence` table:
```
INSERT INTO sentence (id, sentence) VALUES (1, 'The beauty of life is that it has the power to change us, even in the smallest ways.');
```
This query will create a new row in the `sentence` table with the given `id` and `sentence`, and will also update the `sentence` table's `sentence` column to contain the new sentence.
> please generate the table creation for sqlite
Here's a table creation statement for a `sentence` table in SQLite:
```
CREATE TABLE IF NOT EXISTS sentence (
id INTEGER PRIMARY KEY,
sentence TEXT UNIQUE NOT NULL
);
```
This will create a table called `sentence` with the following columns:
- `id`: An integer primary key column used to uniquely identify each row.
- `sentence`: A text column containing the actual sentence.
This table will store the sentence you provided in your text input.
> exit()
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-08 14:51:13
We'll have to put an asterisk on today's number. I had a bite of my daughter's leftovers that didn't seem worth storing for later. By my understanding, that shouldn't be enough to mess with fasting metabolism and it doesn't feel like it did.
@realBitcoinDog wants me to get to 20 hours on one of these. I'm at 17 already (just took a sip of coffee), but I'm starting to get hungry, so today might not be the day. We'll see, though. The wife isn't making any indications that she's going to cook anything anytime soon, so my natural laziness might get me over the finish line.
## Score Card
Day 1: 14 hour fast (13 dry)
Day 2: 15 hour fast (14 dry)
Day 3: 17 hours (16 dry)
Day 4: 18 hours (17 dry)
Day 5: 18 hours (16 dry)
Day 6: 19 hours (16 dry)
Day 7: 16 hours (15 dry)
Day 8: TBD (17 dry)
edit: I just got handed some bread crusts that no one else is going to eat, so the fast is going to end pretty soon.
originally posted at https://stacker.news/items/879683
-
![](/static/nostr-icon-purple-64x64.png)
@ dbb19ae0:c3f22d5a
2025-02-08 10:27:12
1. Downloading the linux package (1.8GB) https://cortex.so/docs/installation
2. Installing Cortex on linux is done via dpkg
note: it requires 2 linux packages (openmpi-bin and libopenmpi-dev)
`sudo apt-get install openmpi-bin libopenmpi-dev`
prior to run
`sudo dpkg -i cortex-1.0.9-linux-amd64-local-installer.deb`
3. When running Cortex,
`cortex start`
a local implementation will be running on http://127.0.0.1:39281
4. Using python it is possible to run queries
make sure the model name is correct
you can double check the value using:
` cortex ps`
Now the python program to run one little query:
``` python
import requests
url = "http://127.0.0.1:39281/v1/chat/completions"
headers = {"Content-Type": "application/json"}
payload = {
"model": "tinyllama:1b-gguf",
"messages": [
{
"role": "user",
"content": "Write a joke"
}
],
"stream": False,
"max_tokens": 128,
"stop": ["End"],
"frequency_penalty": 0.2,
"presence_penalty": 0.6,
"temperature": 0.8,
"top_p": 0.95,
}
response = requests.post(url, json=payload, headers=headers)
print(response.json())
```
-
![](/static/nostr-icon-purple-64x64.png)
@ dbb19ae0:c3f22d5a
2025-02-07 21:14:06
Cortex (https://cortex.so/docs) is an open-source framework designed to serve as standalone API server or as the "brain" for robots, encompassing capabilities in vision, speech, language, tabular data, and action processing.
Notably, it offers the flexibility to operate locally so independently of cloud services, making it suitable for various light deployment environments.
**Key Features:**
- **User-Friendly Command-Line Interface (CLI):** Inspired by Ollama, Cortex provides a straightforward CLI, simplifying interaction and management.
- **Comprehensive C++ Implementation:** The framework is fully implemented in C++ (https://github.com/janhq/cortex.cpp), allowing it to be packaged into both desktop and mobile applications, enhancing portability and performance.
- **Versatile Model Integration:** Users can pull models from multiple sources, including Hugging Face (gguf format) and Cortex's Built-in Model Library, ensuring flexibility in model selection.
` cortex pull [model_id]`
` cortex pull mistral`
Note: it's recommended to have more than 8 GB of RAM available to run 3B models, 16 GB for 7B models, and 32 GB for 14B models.
- **Deployment Flexibility:** It can function as a standalone API server or be integrated into applications such as Jan.ai, providing adaptability in various use cases.
` cortex start`
` cortex stop`
If GPU hardware is available, Cortex leverages GPU acceleration by default, enhancing performance for demanding tasks.
**Conclusion:**
In summary, Cortex offers a robust and flexible solution for integrating advanced cognitive capabilities into robotic systems, with an emphasis on openness, performance, and adaptability.
-
![](/static/nostr-icon-purple-64x64.png)
@ 04f7dda0:c4d00b46
2025-02-07 21:08:11
Short Story:
Tales From The Citadel
Chip entered the tunnel, grabbbed the handles and began to climb down carefully but quickly as he knew he had very little time to act.
Chip knew this because earlier he had fastidiously scanned the skies and his scanner had detected a drone closing in on his coordinates at a rapid pace.
In a panic he clutched his usb card and waved his mobile device in the other hand like a magic wand at the door then entered quickly.
In front of him on the desk was a black faraday bag which he opened to find a purple and orange colored Rasberry Pi in it. Chip grabbed and inserted the USB into the slot nearly dropping the fragile Pi in his nervous haste to connect it.
Then firing up the Pi he opened the Nostr client app first on the front screen of the mobile phone and entered the private keys he had etched in his brain from long ago when he was first trained by Satoshi and the Nostr plebs.
1,000,000 SATS he entered and then pressed zap. As a young man this was an insanely exorbitant amount he could have only dreamed of but here he was zapping it to someone on the team who would make use of it for everyones future freedom. Chip took a seccond to smile and take it all in. Chip could sense he was running out of time so Chip finished and then closed up the device, repacked it into the faraday bag and secured it.
A few minutes later, even though he had scanned the area thoroughly before leaving the Citadel, as he exited the bunker he knew instantly he had messed up as the all to familiar sound of the sentinel attack drone whirring overhead hit his ears then his brain just before the incendiary rocket exploded all of it into 2.1 quadrillion pieces.
The nanosecond before his final moment he experienced heretofore unknown euphoria as he knew all would be well since he had just delivered his final proof of work just before he would enter paradise.
-
![](/static/nostr-icon-purple-64x64.png)
@ b83a28b7:35919450
2025-02-07 18:59:54
Avi Burra’s *24* is an ambitious and intricately woven narrative that blends mystery, philosophy, and technology into a modern odyssey. At its heart, the novel is a deeply personal story about grief, identity, and legacy, but it also serves as a meditation on the interplay between cryptography, art, and human connection. Burra’s debut novel is as much a puzzle as it is a journey of self-discovery, with its protagonist, Oliver Battolo, unraveling a twenty-four-word seed phrase left behind by his enigmatic father—a key to both a vast Bitcoin fortune and deeper truths about life.
---
### **The Plot: A Cryptographic Quest**
The novel begins with Oliver grappling with the death of his father, Nate Battolo. At Nate’s funeral, Oliver discovers a cryptic message instructing him to find twenty-four words. These words form the seed phrase to a Bitcoin wallet. Guided by Maren, a spiritual healer and family friend, Oliver learns “time projection,” a meditative technique that allows him to access symbolic memories and alternate realities. Through these projections and real-world encounters, Oliver uncovers the twenty-four words while unraveling his father’s hidden life as an early contributor to Bitcoin.
As the narrative progresses, Oliver uncovers shocking truths about his father’s role in the early days of Bitcoin. Alongside this technological intrigue are surrealist elements tied to Jonathan Bryce’s cryptographic paintings, which serve as both literal and metaphorical keys to unlocking Nate’s secrets.
---
### **Themes: A Philosophical Mosaic**
Burra masterfully interweaves several themes throughout *24*, including:
- **Grief and Legacy**: The novel explores how Oliver processes his father’s death while uncovering Nate’s hidden life. The journey forces him to reconcile his father’s flaws with his brilliance.
- **Identity and Reinvention**: From Nate’s transformation into “Nate Battolo” at Princeton to Oliver’s own self-discovery, the novel examines how identities are shaped by choices and circumstances.
- **Philosophy and Non-Duality**: The enigmatic Noncemeister—a surreal guide representing collective consciousness—teaches Oliver about interconnectedness and non-duality, echoing traditions like Advaita Vedanta and Zen Buddhism.
- **Cryptography Meets Art**: Jonathan Bryce’s paintings symbolize hidden knowledge waiting to be deciphered, blending surrealist aesthetics with cryptographic principles.
- **Moral Complexity**: The Bitcoin fortune represents both opportunity and burden, forcing Oliver to grapple with ethical dilemmas about wealth, surveillance, and personal responsibility.
---
### **Strengths**
Burra excels at creating a layered narrative that balances intellectual depth with emotional resonance. The philosophical musings of the Noncemeister are thought-provoking without being didactic, offering readers insights into non-duality and existentialism. The integration of cryptography into the plot is seamless; even readers unfamiliar with Bitcoin will find themselves intrigued by its implications for freedom and control. Additionally, the novel’s surrealist elements—particularly the time projection episodes—are vividly described and lend the story an otherworldly quality.
The relationship between Oliver and his father is particularly compelling. Through flashbacks and projections, Nate emerges as a complex figure—brilliant yet flawed—whose decisions ripple through Oliver’s life in unexpected ways. This emotional core grounds the novel amidst its more abstract explorations.
---
### **Weaknesses**
While *24* is undeniably ambitious, its complexity may alienate some readers. The dense philosophical passages—though rewarding for those who enjoy intellectual challenges—can feel overwhelming at times. Similarly, the technical details about Bitcoin and cryptography might be difficult for readers unfamiliar with these topics.
The ending leaves several threads unresolved, including the fate of two additional Bryce paintings hinted at in the epilogue. While this ambiguity adds to the novel’s mystique, it may frustrate readers seeking closure.
---
### **Conclusion**
*24* is a bold debut that defies easy categorization. Part mystery, part philosophical treatise, part technological exploration—it is a novel that challenges its readers while rewarding their patience. Avi Burra has crafted a story that is as much about finding twenty-four words as it is about finding oneself. With its intricate plot, rich themes, and memorable characters, *24* establishes Burra as a writer to watch.
For readers who enjoy intellectual puzzles wrapped in emotional depth—think Haruki Murakami meets Neal Stephenson—*24* is an unforgettable journey worth taking.
-
![](/static/nostr-icon-purple-64x64.png)
@ abab50be:430cd35d
2025-02-07 18:45:32
Setup up my NIP-05... Hoping this works!
originally posted at https://stacker.news/items/879027
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-07 18:42:31
### Privacy in Public Spaces: A Tactical Guide
#### 1. Public Wi-Fi Privacy
Using public Wi-Fi can be convenient, but it's important to take precautions to protect your privacy:
- **Use a VPN (Virtual Private Network)**: A VPN encrypts your internet traffic, making it difficult for hackers to intercept your data.
- **Disable Automatic Connections**: Prevent your device from automatically connecting to open Wi-Fi networks by turning off this feature in your settings.
- **Avoid Sensitive Transactions**: Refrain from accessing banking or other sensitive accounts while connected to public Wi-Fi.
- **Use Secure Websites**: Look for "https://" in the website's URL to ensure it uses encryption.
- **Keep Software Updated**: Ensure your device's operating system and apps are up-to-date to protect against security vulnerabilities.
#### 2. Surveillance Camera Awareness
Surveillance cameras are common in public spaces. Here are some strategies to maintain your privacy:
- **Spotting Cameras**:
- **Look for Signs**: Many establishments post signs indicating the presence of surveillance cameras.
- **Camera Placement**: Cameras are often placed near entrances, exits, and high-traffic areas. Look for dome-shaped cameras on ceilings or wall-mounted cameras.
- **Using Masks and Coverings**:
- **Face Masks**: Wearing a mask can help obscure your facial features from facial recognition systems.
- **Hats and Sunglasses**: A hat can shield your face from overhead cameras, while sunglasses can hide your eyes.
- **Covering Identifying Marks**:
- **Clothing Choices**: Wear clothing that doesn't have distinctive logos or patterns that can easily identify you.
- **Blend In**: Opt for styles and clothing choices that helps you blend in with your surroundings, reducing your visibility.
- **Temporary Coverings**: Consider using temporary coverings, such as scarves or hoods, to conceal tattoos or other identifying marks.
#### 3. General Privacy Tips in Public Spaces
- **Be Mindful of Your Surroundings**: Pay attention to your environment and be aware of any unusual behavior or devices that may be capturing your information.
- **Limit Personal Information**: Avoid discussing sensitive information in public where it can be overheard.
- **Use Encrypted Messaging Apps**: Apps like Signal or SimpleX offer end-to-end encryption for your messages, making it harder for eavesdroppers to intercept your conversations.
- **Use Privacy Screens**: Privacy screens on all of you electronic screens can defend against the over the shoulder peek or side eye.
- **Avoiding Behaviors**: Be mindful of behaviors that could make you a target, such as frequent visits to certain areas or engaging in conversations that might attract unwanted attention.
Taking these steps can help you maintain your privacy while navigating public spaces and using public Wi-Fi. Remember, staying informed and vigilant is key to protecting your personal information.
---
Advocating for privacy does not finance itself. If you enjoyed this article, please consider zapping or sending monero
82XCDNK1Js8TethhpGLFPbVyKe25DxMUePad1rUn9z7V6QdCzxHEE7varvVh1VUidUhHVSA4atNU2BTpSNJLC1BqSvDajw1
-
![](/static/nostr-icon-purple-64x64.png)
@ 0463223a:3b14d673
2025-02-07 17:20:27
Mental health is a funny old bag. As someone who’s been on various prescribed drugs for anxiety and depression for many years and is slowly weaning myself off (I’ve reduced my Venlafaxine dose by 1/6th. Next is the Pregabalin. One step at a time eh…) I’m not sure I fully understand normailty.
Yesterday I finally got my hands on a record I absolutely love. I had it on cassette for 34 years but never knew the title, I recorded it from Friends FM (London pirate radio station) back in 1991. I chanced upon the title after some random YouTube clicks. I was so happy to find out, it was the only song on the tape that had eluded me after all these years. I’d been watching it on Discogs for a while and finally found one at a nice price. Yay!
I’ve been lost in nostalgia all day. Lost friends have been on my mind.
My best friend as a kid was an interesting character, a fantastic artist. He was by far the best at drawing in my class at primary school, heavily influenced by M.C. Escher and artists I’d never heard of, he’d grown up in a more culturally expansive house than I. He was into fashion and design but we weren’t clever kids at school. We had a lot in common musically and I always thought he’d be my MC back when I was starting out as a DJ. He was a very creative person but also a total fantasist. As a duo he was the extraverted, outspoken one, I barely spoke a word and relied on him a lot socially. He was sectioned under the Mental Health Act at 20 years old. We lost touch.
Our birthday’s were within 1 day of each other and a third friend had his the day after mine. Our 16th birthdays fell on Friday, Saturday and Sunday. This was quite exciting. By midday on the Friday, he was permanently expelled from school. He’d taken acid in the morning and essentially enjoyed himself, running around and laughing a lot. The school didn’t approve, oh then his mother kicked him out of home. An eventful start to a messy weekend…
We took a lot of acid as kids and I’m not shitting you when I say he, in particular, took a LOT. When we were 16 he told the local gypsies that he score them some acid, 100 tabs to be exact, about £200 worth. Not a lot of money but acid has always been very good value for money. He secured the goods easily, his brother was in the business so to speak but he chose not to pass the goods on… Over the course of a month, with the exception of the ones he gave to his friends he took the whole lot. (Side note, it also meant the local gypsies were after us. That’s another story). None of us could keep up as far as acid was concerned.
Even as I’m writing I’m thinking of more funny incidents, like the time we were in a shop with umbrellas for sale. He picked one up, opened it and danced out the shop, stealing it in the most obnoxious, obvious way even and no one batted an eyelid. Funny as fuck at the time but not ideal behaviour… He was like that all the time. In today’s world he would have letters after his name for sure. Maybe not PhD or BSC but definitely ADHD and ASD.
This ties in with the period where I became pretty much non-verbal. I’ve written about my uncertainty of my autism diagnosis before and it’s hard to say if this period of not speaking was due to that or extreme anxiety growing up with an absent, alcoholic, father and being bullied etc. It’s certainly safe to say taking loads of acid probably didn’t help!
After many adventures, going to illegal raves, hustling to get DJ spots, trips in the woods, trips in bedrooms, trips pretty much everywhere, my friend became less and less stable. We fell out after he gave a bunch of my possessions to some random stranger at a rave. As kids we’d often swap clothes, jackets, shoes etc. It was one way of feeling like you had fresh clothes on a budget but giving my stuff away was the final straw. We fell out big time over that. The last time I saw him was in my early 20s. He looked like a ghost, a total shadow of a human. There was nothing there. Tragic. I seriously hope he’s well now. I’m long away from the people I grew up with, I might never find out. Thinking about you man.
Since then, I’ve had another 2 friends sectioned under the Mental Health Act, drugs, petty crime and an unstable home life does does fuckry to a young brain. I’ve also lost a couple of friends to crack and heroin. Not fun. Drugs are bad m’kay.
I’ve struggled with mental health my entire life, before drugs were an issue. Probably going back to 10 years old, at least as far as I can recall. Not that I want sympathy, far from it, I own my mistakes. I’m typing this shit on the internet because I want to and I want to honour lost friends. I own every single mistake. Maybe writing shit helps? Making music certainly does. It’s given me a sense of identity and I’m very lucky in what I do. Ironically I now work for a record label who’s motto is “Comforting the disturbed, disturbing the comfortable”. Very apt.
The drummer in my current band took his own life in 2014. That was fucking shit. He was a totally straight edge guy. Very talented musician. Suicide is fucking vile, I don’t have the words to describe what that does to those left behind. Just a couple of weeks earlier we’d been offered a record deal with an advance to make an album, we were also working with another very respected artist in his live band. Like wtf man. I still don’t get it. I don’t even want to say more out of respect for his family. RIP brother.
Nostr is a funny place, so many people I have very little in common with other than a dislike of banks (I hold the banksters responsible for the 2008 crash directly responsible for the death of my friend btw. I still say fuck each and every one of you. Cunts).
I often see folks refer to others as ‘normies’. From what I gather a normie is someone who didn’t grow up posting on 4Chan. The funny thing is these people are often the one’s saying work hard, raise a family etc. I mean come on, you go on about working hard, raising families and eating healthily. Fucking hell!!! Like that’s sort of normal, you know?
Tell me about sitting in a slum in south London with prostitutes, smoking crack thinking of ways you can get some money to score and then talk to me about ‘normies’. LMAO. For clarity, I didn’t have sex with them. I just wanted drugs and so did they. Nothing about this is glamorous by the way, it’s tragic and grim. I’m glad it’s not the norm.
If you’re that healthy, hardworking guy with a family calling people normies, respect to you, in all honestly I’m envious. I wish I’d grown up in a stable home with two parents and a dad who hooked me up working for a fund straight out of school. Normies! Fuck I’m still laughing about that one. The other one that cracks me up is plebs, again you worked at a fund and you talk about being a pleb. Funny fucker. Respect for your sense of humour though.
I’m not bitter (well not fully). I read the posts with interest and I’m always trying to learn new stuff, I’m happiest when learning. Learning is good for you. Fact.
It’s a thoroughly miserable day here as write this, icey cold, grey and very windy, this is still the happiest I’ve been in life. I now have a wonderful, beautiful wife. No kids but with my background, I’ve decided these genes are best left here. There’s some sadness about that too but it could be worse, I might be the type to think Peter Thiel is cool.
This probably reads like a right whinney thread but it isn’t. I’m excited about the future. I know some very talented people and I think we can do amazing things. Each day is a new opportunity. Being part of the underground internet is cool. We need free and open tools more than ever. The world is possibly the most fucked up it’s been in many years but also maybe that’s an illusion. I’m the last person you should ask about reality tbh.
Anyway, that’s it for today. This probably reads like a confused mess and a nightmare for anyone who digs grammar but that’s cool, I’m writing without using AI or a filter, it’s not a work email. I’m typing as the words appear in my head, this is who I am.
I’m a normie…
-
![](/static/nostr-icon-purple-64x64.png)
@ 1cb14ab3:95d52462
2025-02-07 16:41:54
***Tree branches, driftwood coconut. 5'7" teardrop. [Dawei, Myanmar. 2020]***
---
#### Introduction
Situated on Myanmar’s Grandfather Beach, this lens captures the dramatic shape of a steep, rocky hill that mirrors the arduous road leading to this remote location. Grandfather invites viewers to reflect on the connection between journey and destination, highlighting the tension and beauty of paths less traveled.
#### Site & Placement
The lens is positioned at the west end of the beach, focusing on the sharp hill rising above the shoreline. Its teardrop shape accentuates the rocky prominence, emphasizing its similarity to the road that winds toward the beach. A bench, placed 12 feet away, provides a place for viewers to absorb the rugged beauty of the scene.
#### Impermanence & Integration
Crafted from driftwood, branches, and stone, Grandfather is a fleeting presence in this timeless landscape. Its brief existence reflects the challenges and ephemerality of the journey it highlights, blending into the environment as it gradually succumbs to the elements.
#### Reflection
*Grandfather* invites viewers to consider the parallels between the physical journey to reach the beach and life’s broader paths. It stands as a reminder that even the most challenging routes can lead to moments of profound beauty.
---
## Photos
![image](https://image.nostr.build/0403f2c40384cbc449a421fe3e37374fb4e0338b9ceee90b7423c75abdc57a6a.jpg)
![image](https://image.nostr.build/1d56bf254db02f9efe06383c8ef6c5ffc3377f533cf69ffe3ee045dfe6dfe193.jpg)
![image](https://image.nostr.build/c18cfab25084ddbab01b7f92e6f0db33a03cd4068817c998e24c660a5f35c4de.jpg)
![image](https://image.nostr.build/af1edbe0b3a680fd02c71bc9802d80e2bbaf6f199f5af0b996bcd8d926c535f2.jpg)
![image](https://image.nostr.build/79a19704a8fc1174a2a9c393cb6029a2522387c6dd59c174f456669d42456663.jpg)
![image](https://image.nostr.build/d7b4cd5625e9d3fe7aec69bc707ccc7f20485b31e32a64943739ed4668670ad6.jpg)
![image](https://image.nostr.build/524a94fb8e2b1c977970f69cca6dd8b442a30fd6fdfcd41f37b06d1ac3923927.jpg)
![image](https://image.nostr.build/4442fb880f7f9da6f02144f361626b74744d3584804bc4e85623eeb8f425ea7f.jpg)
---
#### More from the 'Earth Lens' Series:
[Earth Lens Series: Artist Statement + List of Works](https://hes.npub.pro/post/1731091744332/)
["Looking Glass" (Earth Lens 001)](https://hes.npub.pro/post/1736304563962/)
["Folsom" (Earth Lens 002)](https://hes.npub.pro/post/1737844073125/)
["Sanctuary" (Earth Lens 003)](https://hes.npub.pro/post/1731091744332/)
["Platte" (Earth Lens 004)](https://hes.npub.pro/post/sya8nv6q8k0w3olqcepwz)
[COMING SOON: "Chongming" (Earth Lens 006)](https://hes.npub.pro/post/1731091744332/)
---
#### More from Hes
[Portfolio](https://hesart.npub.pro)
[Online Store](https://plebeian.market/community/hes@nostrplebs.com/hesmart-ym3fcufdfz)
[Artist Statements](https://hes.npub.pro/tag/art/)
[Travel Guides](https://hes.npub.pro/tag/travel/)
[Photography](https://hes.npub.pro/tag/photography)
[Money](https://hes.npub.pro/tag/money)
[Tech](https://hes.npub.pro/tag/tech)
---
*All images are credit of Hes, but you are free to download and use for any purpose. If you find joy from my art, please feel free to send a zap. Enjoy life on a Bitcoin standard.*
-
![](/static/nostr-icon-purple-64x64.png)
@ a012dc82:6458a70d
2025-02-07 15:23:54
In the intricate and rapidly evolving world of digital currencies, the interplay between Bitcoin and the US dollar, particularly through the medium of stablecoins, stands out as a subject of profound significance. Mark Goodwin, a renowned figure in the realm of Bitcoin and an advocate for decentralized financial systems, sheds light on this complex dynamic. This article delves deeper into the nuanced relationship between Bitcoin and the dollar, the pivotal role of stablecoins, and the risks they entail, drawing upon the extensive expertise of Goodwin.
**Table Of Content**
- Understanding the Bitcoin-Dollar Symbiosis
- The Role of Stablecoins
- Mark Goodwin's Perspective on Stablecoins
- Conclusion
- FAQs
**Understanding the Bitcoin-Dollar Symbiosis**
The relationship between Bitcoin and the US dollar is a fascinating study in contrasts and interdependencies. Bitcoin, known for its decentralized nature, offers a politically neutral platform but is characterized by significant price volatility. This volatility stands in stark contrast to the relative stability of the US dollar, a currency backed by the full faith and credit of the US government. The dollar, often used as a benchmark for Bitcoin's value, follows its trajectory in many ways, particularly in regions where Bitcoin is gaining traction.
The symbiosis between Bitcoin and the dollar is particularly evident in the context of global financial instability. In regions with volatile local currencies, the adoption of Bitcoin often leads to a parallel increase in the use of dollar-based stablecoins. This phenomenon suggests that Bitcoin's growth could inadvertently bolster the stability and global reach of the US dollar.
Moreover, the Bitcoin-dollar dynamic is not just limited to direct financial transactions. It extends to the broader implications for monetary policy, international trade, and global economic stability. As Bitcoin continues to gain acceptance, it challenges traditional financial systems and currencies, including the dollar, prompting a reevaluation of their roles in a digital age.
**The Role of Stablecoins**
Stablecoins, designed to bridge the gap between traditional finance and the digital asset space, play a crucial role in this relationship. By pegging their value to stable assets like the US dollar, they offer a less volatile alternative to cryptocurrencies like Bitcoin. This stability is essential for global commerce, enabling near-instantaneous transactions with lower fees compared to traditional banking systems.
In economies plagued by inflation, stablecoins offer a haven for individuals and businesses to preserve their wealth. They provide a degree of financial stability and predictability that is often lacking in local currencies. This aspect of stablecoins is particularly appealing in developing countries, where currency instability can be a significant barrier to economic growth and stability.
Furthermore, stablecoins are increasingly being seen as a tool for financial inclusion. They offer an accessible entry point for individuals who are unbanked or underbanked, providing them with a means to participate in the global economy. This potential for social impact adds another layer of significance to the role of stablecoins in the financial ecosystem.
**Mark Goodwin's Perspective on Stablecoins**
Mark Goodwin, with his deep understanding of Bitcoin and its implications for the financial world, offers a critical perspective on stablecoins. He acknowledges their potential benefits but also highlights the risks associated with their use.
**Price Stability Concerns**
Goodwin points out that while stablecoins aim to maintain a stable value, there are inherent risks in keeping their peg to the underlying asset. Market conditions, liquidity issues, and redemption pressures can all threaten the stability of stablecoins. If these risks are not adequately managed, it can lead to a deviation from the peg and a potential loss of trust from users.
**Regulatory Challenges**
The evolving regulatory landscape surrounding stablecoins is another area of concern. As authorities worldwide grapple with how to regulate these digital assets, stablecoin projects must navigate a complex web of financial regulations to achieve long-term viability. Goodwin emphasizes the need for a balanced regulatory approach that ensures consumer protection without stifling innovation.
**Potential for Market Manipulation**
Given their substantial market capitalization, stablecoins are susceptible to market manipulation. The limited oversight in the rapidly expanding cryptocurrency space amplifies this risk. Goodwin advocates for enhanced transparency and regulatory frameworks to mitigate these risks and ensure market integrity.
**Conclusion**
The relationship between Bitcoin and the dollar, especially through the medium of stablecoins, represents a delicate balance between the ideals of decentralization and the practicalities of financial stability. While stablecoins offer promising solutions for global financial transactions, they come with inherent risks that require careful consideration. Goodwin's insights underscore the importance of vigilance and a thoughtful approach to integrating these digital assets into the broader financial system. As the market continues to evolve, the role of stablecoins in shaping the future of finance remains a critical area for exploration and debate.
**FAQs**
**How do stablecoins fit into the Bitcoin-dollar dynamic?**
Stablecoins serve as a bridge between traditional finance and digital assets. Pegged to stable assets like the US dollar, they offer a less volatile alternative to cryptocurrencies and facilitate global commerce with near-instant transactions and lower fees.
**What are the risks associated with stablecoins?**
Risks include challenges in maintaining the peg to the underlying asset, regulatory uncertainties, and potential for market manipulation. These risks can threaten the stability and trust in stablecoins.
**What is Mark Goodwin's perspective on stablecoins?**
Mark Goodwin acknowledges the benefits of stablecoins but warns about the risks of centralization and manipulation. He emphasizes the need for balanced regulation and transparency to mitigate risks.
**Can stablecoins promote financial inclusion?**
Yes, stablecoins can provide financial inclusion by offering an accessible entry point for unbanked or underbanked individuals, allowing them to participate in the global economy.
**How does Bitcoin's growth affect the US dollar?**
Bitcoin's growth, particularly in regions with unstable currencies, can lead to increased adoption of dollar-based stablecoins, potentially bolstering the US dollar's global reach and stability.
**That's all for today**
**If you want more, be sure to follow us on:**
**NOSTR: croxroad@getalby.com**
**X: [@croxroadnews.co](https://x.com/croxroadnewsco)**
**Instagram: [@croxroadnews.co](https://www.instagram.com/croxroadnews.co/)**
**Youtube: [@croxroadnews](https://www.youtube.com/@croxroadnews)**
**Store: https://croxroad.store**
**Subscribe to CROX ROAD Bitcoin Only Daily Newsletter**
**https://www.croxroad.co/subscribe**
***DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.***
-
![](/static/nostr-icon-purple-64x64.png)
@ f683e870:557f5ef2
2025-02-07 14:33:31
After many months of ideation, research, and heads-down building, <span data-type="mention" data-id="726a1e261cc6474674e8285e3951b3bb139be9a773d1acf49dc868db861a1c11" data-label="nostr:npub1wf4pufsucer5va8g9p0rj5dnhvfeh6d8w0g6eayaep5dhps6rsgs43dgh9">@nostr:npub1wf4pufsucer5va8g9p0rj5dnhvfeh6d8w0g6eayaep5dhps6rsgs43dgh9</span> and myself are excited to announce our new project called Vertex.
**Vertex’s mission is to provide developers and builders with the most up-to-date and easy-to-use social graph tools**.
Our services will enable our future customers to improve the experience they provide by offering:
- Protection against **impersonation** and **DoS attacks**
- Personalized **discovery** and **recommendations**.
All in an open, transparent and interoperable way.
## Open and Interoperable
We have structured our services as [NIP-90 Data Vending Machines](https://github.com/nostr-protocol/nips/blob/master/90.md). We are currently using [these DVMs](https://vertexlab.io/docs/nips) and we are eager to hear what the community thinks and if anyone has suggestions for improvements.
Regardless of their specific structures, using DVMs means one very important thing: **no vendor lock-in**.
Anyone can start processing the same requests and compete with us to offer the most accurate results at the best price. This is very important for us because we are well aware that services like ours can potentially become a central point of failure. The ease with which we can be replaced by a competitor will keep us on our toes and will continue to motivate us to build better and better experiences for our customers, all while operating in an ethical and open manner.
Speaking of openness, we have released **all of our code under the [MIT license](https://spdx.org/licenses/MIT.html)**, which means that anyone can review our algorithms, and any company or power user can run their own copies of Vertex if they so wish.
We are confident in this decision because the value of Vertex is not in the software. It is in the team who designed and implemented it – and now continually improves, manages and runs it to provide the most accurate results with the lowest latency and highest uptime.
# What we offer
We currently support three DVMs, but we plan to increase our offering substantially this year.
1. `VerifyReputation`: give your users useful and personalized information to asses the reputation of an npub, minimizing the risk of impersonations.
2. `RecommendFollows`: give your users personalized recommendations about interesting npubs they might want who to follow.
3. `SortAuthors`: give your users the ability to sort replies, comments, zaps, search results or just about anything using authors’ reputations.
To learn more, watch this 3-minute walk-through video, and [visit our website](https://vertexlab.io/)
https://cdn.satellite.earth/6efabff7da55ce848074351b2d640ca3bde4515060d9aba002461a4a4ddad8d8.mp4
We are also considering offering a custom service to help builders clarify and implement their vision for Web of Trust in their own applications or projects. Please reach out if you are interested.
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-07 14:32:43
Ate a little later yesterday.
I took my daughter for a scooter ride on a trail near our house (I was walking) and she wanted to go farther than normal. Great for the steps challenge. Then, as soon as we turned around to go home, she decided she was too tired to scoot anymore. So, I got to do the return leg of the walk carrying both the kid and her scooter.
We were out about an hour longer than expected, hence the later meal.
## Score Card
Day 1: 14 hour fast (13 dry)
Day 2: 15 hour fast (14 dry)
Day 3: 17 hours (16 dry)
Day 4: 18 hours (17 dry)
Day 5: 18 hours (16 dry)
Day 6: 19 hours (16 dry)
Day 7: TBD (15 dry)
originally posted at https://stacker.news/items/878700
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-07 14:02:05
Apparently, there's still another NFL game and, I suppose, we have to discuss it.
I'm much more excited to get into all the NBA trades that happened.
Who got better?
Who got worse?
Who did something really weird?
Of course, we'll talk about the contests going on in the territory.
MLB's ramping up. Can anyone challenge the Dodgers?
Ovi is trying to get back on pace to break NHL's career scoring record.
Any bets we're excited about
Plus, whatever the stackers want us to cover (time and memory permitting)
originally posted at https://stacker.news/items/878674
-
![](/static/nostr-icon-purple-64x64.png)
@ a367f9eb:0633efea
2025-02-07 10:39:28
Issued on January 23, 2025, Staff Accounting Bulletin 122 rescinds SAB 121, [originally issued](https://www.sec.gov/oca/staff-accounting-bulletin-121) by Gensler in March 2022. The previous bulletin provided guidance for financial entities and custodians holding any “crypto-assets,” requiring them to account for all cryptocurrencies primarily as liabilities on their balance sheets, rather than assets.
The revoking of SAB 121 empowers entities to assess whether their crypto-assets are classified as liabilities only if they believe a loss is probable.
For bitcoin holders who hold their own keys and run their own node, this distinction and its subsequent repeal made little difference.
But for the budding world of Bitcoin banking and finance, as well as the booming industry of custodial wallets and brokerages, it’s a game changer.
Rather than having to match cryptocurrency deposits one-for-one with other liquid assets in the case of a contingency, the new accounting guidance frees up institutions to mark the true values of crypto-assets on their books.
Rather than having to buy up $1 million in treasuries or cash in order to hold $1 million in bitcoin or cover losses, firms will now be able to recognize that $1 million as a true asset.
It may not seem like a revolution, but it may be the beginning of our bull-inspired Bitcoin banking era.
After years of byzantine persecutions of cryptocurrency developers, entrepreneurs, and ever-increasing regulations on Bitcoin, this paradigm shift at the nation’s premier markets regulator means traditional finance can finally include bitcoin and its crypto-offspring in its suite of financial products – with some caveats.
Practically, this rather benign-sounding rule lowers the barrier of entry for entities that want to offer bitcoin services to their customers. Whether it’s a bank, an exchange, or a liquidity service provider custodying funds, there is now a more sustainable path for offering bitcoin alongside any other type of account.
While a general crypto market framework is still far from established in law, the current situation grants fairness between both fiat money and cryptocurrencies in the hands of entrepreneurs who want to custody funds for their clients.
Practically, however, what does this mean for the average bitcoiner?
## **What will my Bitcoin bank look like?**
If we take a peek over at Europe, there are already FinTech firms and banking institutions that offer some level of bitcoin services.
Xapo Bank, a private bank headquartered in Gibraltar, [offers](https://www.xapobank.com/en) each customer a traditional bank account and IBAN number alongside an instantaneous deposit and withdrawal address for Bitcoin and Bitcoin Lightning, Tether, and USDC.
Considering Xapo [built](https://decrypt.co/8449/coinbase-acquires-xapo-crypto-custodian) the doomsday-proof custody vaults for bitcoin storage later bought by Coinbase in 2019, now the preferred institutional custodian for billions in assets, it’s easy to see why so many customers trust their custody.
And for those willing to make the tradeoff for custody of their funds, they do offer something attractive.
In a single account, a customer could deposit cash, exchange it to bitcoin, and withdraw to self-custody. They could also deposit bitcoin using Lightning, and then instantly convert that amount to send a traditional bank transfer to pay their rent or utility bills for those who don’t yet accept bitcoin.
Again, this may not be the solution for those who [prefer self-custody](https://www.btcpolicy.org/articles/self-custody-is-nonnegotiable), but it does offer an integrated fiat on and off ramp that others may find convenient.
Similarly, the UK-based FinTech firm Revolut offers its customers the [ability](https://www.revolut.com/crypto/) to deposit and withdraw their bitcoin within the app, as well as exchange it for whichever fiat currency they wish. For those who currently hold bitcoin in an ETF or some other custodial product, a move to an app such as this may be even more attractive.
And we already know US companies are begging to expand their own services to their customers.
Companies such as **Strike** and **Fold** have already begun to increase their Bitcoin banking services for American customers, offering account and routing numbers for [bill pay](https://strike.me/blog/announcing-strike-bill-pay/), as well as the ability to instantly swap between currencies if they wish.
Fold has the [ambition](https://blog.foldapp.com/fold-to-go-public/) to become one of the nation’s largest publicly-traded bitcoin financial services, looking to soon add mortgage and lending offers, as well as insurance solutions.
These financial firms will offer bitcoin for purchase, lending, and exchange, but we can also assume their suite of products will become more diverse and attractive for a more diverse customer base.
## **What about sovereign money?**
Educating Americans about the benefits of Bitcoin is an important task. So is improving our policy landscape so that all bitcoiners may flourish.
But if the Bitcoin network truly represents a revolutionary way to have and use neutral money, should we even consider Bitcoin banks something we want? How can peer-to-peer money integrate with the centralized custodial banking system so many of us are trying to escape?
Even the most primitive advantages of Bitcoin are built on its ability to be owned in a sovereign way, at the total exclusion of everyone who doesn’t have the private key. For many of us, this is all we desire and want. And for the rights to hold and use Bitcoin how we wish to be universally recognized.
However, we cannot dictate how the rest of our Bitcoin peers will engage with the network, nor what they inscribe into blocks if they have the computing power to mine them. If Bitcoin entrepreneurs freely compete to offer unique products and services to custody, trade, or lend bitcoin, the rules should make that easier and more possible.
For those who will still need to interact with the fiat world, they should be able to benefit from Bitcoin-first products and services designed with them in mind. And regulations should empower them rather than restrict what they can do.
Not every Bitcoin banking product will be attractive to every bitcoiner and that’s okay. But the positive evolution of e-cash, custodial services, lending, and insurance is something that will help leverage the power of Bitcoin. And that should be championed.
*Yaël Ossowski is a fellow at the Bitcoin Policy Institute.*
This article was originally published at the [Bitcoin Policy Institute](https://www.btcpolicy.org/articles/has-the-era-of-bull-inspired-bitcoin-banking-already-begun).
-
![](/static/nostr-icon-purple-64x64.png)
@ 6ad3e2a3:c90b7740
2025-02-07 08:17:18
When I used to work in fantasy sports, people would ask me questions about their teams, e.g., which players to start, who to drop. What they didn’t realize is I had seven of my own teams to worry about, was already living and dying with my own myriad choices, good and bad, I made every week. The last thing I needed was to make a decision for them, see it go bad and suffer more on their account.
I’d tell them, “You decide, I’ve got my own problems.”
. . .
I don’t know what I’m doing. Ideas which feel like insights come to me, I try to articulate them to my satisfaction and post them (with some editing help from Heather.) Often I feel like I should be producing more work — after all, I don’t have a job any more, I have plenty of time. Walking the dog, exercising, managing your finances, picking up the kid, putting food on the table (literally) is well and good, but fulfilling your duties is not enough. You need to stay in the game. What game is up to each person, but it should be a game you enjoy, one that draws on skills honed over decades by the accident of your particular interests.
. . .
Writing and ideas can’t be produced on demand. I mean they can — and I did it for 22 years on a particular topic — but I don’t mean that kind of writing. I don’t want a schedule. I don’t need more rules, more discipline, more “hacks.” Discipline is like the interest on a 30-year mortgage. Initially it’s most of the payment, but over time it cedes weight to understanding which is like the principal. Discipline without understanding is like an interest-only mortgage. You pay it every month and get nowhere.
Even when insights arrive they can’t always be articulated sufficiently and coherently. Many insights are of the one sentence variety — fine for a social media post, but you can’t send out an email newsletter 10 times per day with one sentence insights. It doesn’t work over that medium.
That’s a dilemma because posting on social media doesn’t feel like proper work. Yes, you’re reaching people, affecting the zeitgeist in whatever small way — but there’s something addictive and unsatisfying about it, like eating candy instead of food. Don’t get me wrong, I stand by my posts (consider them organic, artisanal candy) but shitposting and the immediate feedback received therefrom keeps you only on the periphery. I need to connect with something deeper.
. . .
I’ve spent a lot of time dissecting the various pathologies of the laptop class, of which I’m obviously a part as I literally type this in a coffee shop on my laptop! The need to believe they are empathic and good overwhelming any rational sense-making and basic morals. Men dominating women’s sports, child sex changes, forced injections, criminals running rampant, cities in decay, calls for censorship and funding for foreign wars. The authorities patted them on the back, their peers accepted them and their overlords promoted them so long as they hewed to the narrative.
The freakout we’re presently witnessing is not about the billions in taxpayer money no longer being sent for DEI training in some foreign country, i.e., money-laundering to favored interests and cronies. They’re not really upset FBI agents are being fired, secrets are being revealed, that we are finally making an effort to prevent fentanyl from flowing across the border and killing our fellow citizens. These are good things, and even if you don’t agree, none of it is grounds for the meltdowns I see every day on social media.
What’s really happening is people who were assured they were the “good”, the empathic, the compassionate ones, those who towed the line during covid, got their boosters, wore their masks, “social distanced,” put pronouns in their bios, are being confronted with a terrifying realization: the behaviors and beliefs, to which they so dutifully attached themselves, for which they publicly and stridently advocated, whether online or at Thanksgiving dinner, are no longer being rewarded. In fact, they are being openly ridiculed. Instead of the pat on the back, increasingly Team Good is facing mockery and outright scorn.
There will be no legal consequences. No one will be arrested or put in a camp, delusions of persecution notwithstanding. If you produce real value for a real employer, you are not at risk of being fired. If you insist on perpetuating your derangement on social media you will not be deplatformed or canceled (that only happens to people speaking the truths inconvenient to the powerful.)
No, the reality is in some ways far worse: your entire worldview, on which you staked your self-image, is being dismantled in real time. You are no longer “good,” it’s becoming obvious to most the policies for which you advocated were catastrophic, the politicians for whom you voted deeply cynical and corrupt. The gaping abyss within your being to which you attached this superstructure of self-affirmation is dissolving into thin air. You are not “superior” like you thought, you are just another person suffering and existing like everyone else. And your only choices are to face that daunting reality or cling to a dying and useless paradigm, the end game for which is only madness.
We all want to feel good about ourselves, and like an obese person drugging themselves with high-fructose corn syrup for years, you have gorged on the distorted approbation of a sick society that, unpleasantly for you, is starting to heal. Your first laps around the track, so to speak, are going to hurt a lot.
. . .
I probably went on too long about the laptop class freakout. I have a lot of resentment toward the way they behaved the last five years. But I started this essay with the idea that I have my own problems, and in the end, I am not much different from them.
I want to produce more work, and of higher quality, but to what end? To feel good about my contributions, to have a sense that I am “good.” Maybe it’s not “good” in the lame “I complied with authority, and everyone likes me” kind of way, but it arises from the same source. That source is the emptiness within, wherein we require accolades, dopamine, positive feedback as a kind of justification for our existence. “No, I am not squandering my time on earth, living a comfortable life, I am asking hard questions, connecting with people, sharing hard-won insights. I am useful! I am good! I got my sixth dopamine booster from writing yet another essay!”
. . .
There is an irony in writing this piece. I feel as I type the cathartic nature of expressing these feelings. I am doing something worthwhile, everything is flowing out of me, the minutes are sailing by. I am identifying and solving this thorny problem simultaneously, engaging with the emptiness and dissatisfaction. The solution isn’t in the output, whatever one might think of it, it’s in giving attention to the feelings I’ve squandered too much time avoiding. I feel unworthy not because I do not produce enough work, it turns out, but because I am unwilling to connect with my deepest nature.
. . .
No matter how uneasy you feel, no matter how much fundamental doubt you have about your value as a human being, you can always start where you are. The feeling of unworthiness, the need for an escape, the craving for some kind of reward from your peers or the authorities or whatever easily-consumed carbohydrates you have in the kitchen is simply the present state in which you find yourself. It is not wrong or bad, it just is. And what is can always be examined, observed, given attention. Attending to that discomfort is always within reach.
. . .
The last thing I want to do is write an essay, face a purgatory of sitting down and consciously putting my feelings into words. It’s so much easier to distract oneself with all the news about the world, check 100 times a day the price of bitcoin and my other investments. But purgatory is the only way out of hell. The hell of wanting to succeed, of wanting to become “good.”
For some, that astroturfed worldview they so painstaking affixed to their empty souls is dissolving toward a revelation of the emptiness beneath. And unsurprisingly they are freaking out. But I’ve wasted too much time arguing with them, pointing out the ways in which they’re misinformed, driven by fear and derelict in their basic epistemic responsibilities. If you want to hold onto the lies you were told, knock yourself out. I’ve got my own problems.
-
![](/static/nostr-icon-purple-64x64.png)
@ 8947a945:9bfcf626
2025-02-07 04:15:17
## สาเหตุที่ผมลาออกจากที่(ทำงาน) ที่ (เคย) เรียกว่า”บ้าน”
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738755645055-YAKIHONNES3.jpeg)
-----------
สวัสดีเพื่อนๆชาว #siamstr ทุกคนครับ ผมเป็นหมอเวชศาสตร์ฉุกเฉิน (Emergency physician ย่อๆว่า EP)ครับ พวกผมมีชื่ออื่นๆเรียกหลายชื่อมาก เช่นหมอเฉพาะทางแผนกฉุกเฉิน, หมอเฉพาะทาง ER หรือหมอ ER
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738755695928-YAKIHONNES3.jpeg)
ผมทำงานในแผนกฉุกเฉิน (emergency room หรือ ER) คนไข้ที่เข้ามาเจอพวกผมมีอาการวิกฤติอันตราย ใกล้ตาย หรือไม่ก็เป็นโรคกลุ่มความเสี่ยงสูงที่อาการกำลังจะแย่ จำเป็นต้องได้รับการรักษาอย่างแม่นยำ รวดเร็วทันที ทำให้คนไข้ปลอดภัย อาการคงที่ ไมแย่ไปกว่านี้ เพิ่มโอกาสรอดชีวิต ก่อนจะส่งไปพบแพทย์เฉพาะทางสาขาอื่นๆ
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738756051752-YAKIHONNES3.jpg)
ทักษะเฉพาะทางของพวกผมที่ถูกฝึกอบรมมา ใช้เวลาเต็มที่ไม่เกิน **10- 15 นาที**ได้คำตอบแล้วครับว่า
- คนไข้ที่อยู่กับผมป่วยด้วยโรคอะไร (Provisional diagnosis)
- มีภาวะอันตรายถึงแก่ชีวิตประเภทไหน (immediate life threatening conditions)
- กู้ชีพรักษา (resuscitation and stabilization) แล้วผลการักษาดีมั้ย อาการคนไข้ดีขึ้นมั้ย
### โรคฉุกเฉินที่ผมเจอเป็นปกติเลยได้แก่
- กลุ่มโรคติดเชื้อในกระแสเลือด (Sepsis)
- โรคหัวใจ ไม่ว่าจะเป็นหัวใจวายน้ำท่วมปอด (congestive heart failure) , โรคกล้ามเนื้อหัวใจขาดเลือดเฉียบพลัน (Acute myocardial infarction หรือ MI)
- โรคหลอดเลือดในสมอง (cerebrovascular disease , CVD หรือที่เรารู้จักกันว่า stroke)
- ผู้ป่วยได้รับสารพิษ (intoxication)
- โรคอื่นๆ ที่ไม่สามารถนั่งรอหมอได้
ด้วยลักษณะเฉพาะของคนไข้ การรักษาจะต้องมี EP และต้องมีเครื่องมือพิเศษ ทำให้ ER เป็น special unit ของรพ.ที่มีความพร้อมตลอด 24 ชั่วโมง
นอกจากหมอ EP เครื่องมือ และทีมพยาบาลแล้ว แนวทางปฏิบัติ (Clinical practice guideline หรือ CPG) ระหว่างแผนกฉุกเฉินกับหมอเฉพาะทางสาขาอื่นๆต้องชัดเจน ไม่เช่นนั้นการประสานงานจะมีปัญหา
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738756347633-YAKIHONNES3.jpg)
ทั้งหมดที่ผมกล่าวมานี้คือ ***"สถานที่ทำงานในอุดมคติที่ EP อยากได้"*** กระบวนการรักษาและส่งต่อคนไข้ราบรื่น ทุกคนคุยภาษาเดียวกัน เข้าใจกัน และแน่นอนครับรพ.แห่งนี้มีทุกอย่างครบ ทุกอย่างถูกทำเอาไว้เป็นแนวทางปฏิบัติชัดเจน มีการซ้อมจำลองเหตุการณ์สถานการณ์ฉุกเฉินต่างๆเป็นประจำ รวมถึงมีการติดตามประเมินผลลัพธ์เป็น KPI ชัดเจน เรียกได้ว่าเข้ามาทำงานที่นี่วันแรกแล้ว “มันใช่เลย”
### บรรยากาศการทำงานระหว่างแผนกก็ดีมาก
> **น้อยมากที่ทีมแพทย์และพยาบาล ER จะเป็นมิตรกับต่างแผนก**
อธิบายเพิ่มเติมหน่อยนะครับ ด้วยเนื้องานที่ต้อง **"เร็ว แม่น จบไวและเด็ดขาด"**
ทำให้บุคคลิกพวกผมมันดูแข็งๆ ดุ พูดเสียงดังและห้วนๆ ดูน่ากลัวสำหรับแผนกอื่น
แต่ที่รพ.แห่งนี้ มีแผนกอื่นมีความเกรงใจ ER เป็นปกติ แต่เจ้าหน้าที่ทั้งรพ.รู้จักกันหมด แยกแยะเรื่องส่วนตัวและเรื่องงานออกจากกันได้ดี ทำให้ช่องว่างความกลัวคนใน ER มันแคบเมื่อเทียบกับหลายๆรพ.ที่ผมเคยเจอมาครับ สำหรับผม ถือว่าดี
เมื่อเวลาผ่านไป ยิ่งรักรพ.แห่งนี้มากขึ้นทุกๆวัน มันเป็นเหมือนบ้าน บรรยากาศสบายเป็นกันเอง ผมได้รับโอกาสความก้าวหน้าทางอาชีพ ได้ขึ้นเป็นกึ่งๆผู้บริหาร รับตำแหน่งหัวหน้าดูแล 3 หน่วยงาน ทีมพยาบาลเลขาที่ช่วยงานผมก็มี data หลังบ้านที่ดีมาก เมื่อรับตำแหน่งแทบจะไม่ต้องริเริ่มอะไรใหม่ แค่ดูแลกำกับติดตาม guideline ที่มีอยู่แล้ว ให้รอบคอบมากยิ่งขึ้น มีปัญหาก็มองหาต้นตอของปัญหา (root cause analysis) แล้วแก้ที่ต้นเหตุ
ผมตั้งใจว่าจะทำงานที่นี่เป็นที่สุดท้ายไปจนแก่ ร่างกายทำงานไม่ไหวถึงจะเลิกอาชีพหมอครับ
-----------
### จุดเปลี่ยนเข้าสู่ยุคตกต่ำ เมื่อธุรกิจส่งต่อทายาทรุ่นที่สอง
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738757173195-YAKIHONNES3.jpg)
ปีที่ผมเข้ามาทำงานปีแรกเป็นช่วงที่เจ้าของรพ.กำลังป่วยหนัก และเสียชีวิตต่อมาไม่นานหลังจากนั้น ผมไม่เคยสัมผัสไม่เคยพูดคุยกับเขา แต่จากคำบอกเล่าของพนักงานที่อยู่มานาน ผมสรุปคุณลักษณะของเจ้าของรพ.ไว้ดังนี้ครับ
- เอาใจใส่รายละเอียด ถึงขั้นไม่ปล่อยผ่านเรื่องเล็กน้อย
- การบัญชีละเอียดยิบ ทุกเม็ดเงินที่เคลื่อนไหว โดยเฉพาะรายจ่ายต้องรู้ที่มาที่ไป รายจ่ายที่ไม่เข้าท่าแต่มีการอนุมัติรายการโดยพละการ โดนด่ายับถึงตาย
- ไม่ลงทุนกับอะไรที่เกินความจำเป็น
- ปกป้องผลประโยชน์ตัวเอง (ก็เขาเป็นเจ้าของ)
- ทุกเช้าเดินดูทุกซอกทุกมุมในรพ.ด้วยตัวเอง ถ้าเห็นอะไรไม่เรียบร้อย จะเข้าไปจัดการทันทีและสอนพนักงานหน้างาน เหมือนสอนลูกตัวเอง
- ใช้เวลาไม่ถึง 5 ปีชำระหนี้จากการระดมทุนในตลาดหลักทรัพย์ ทำให้รพ.ปลอดหนี้
- มีเมตตากับเจ้าหน้าที่ทุกระดับ รวมถึงพนักงานคนขับยานยนต์และเวรเปล
- เป็นคนไหว้พระสวดมนต์ สร้างวัดสร้างสถานปฏิบัติธรรมถวายวัด
และคุณงามความดีอื่นๆอีกมากมายที่ผมรู้ไม่หมด แต่เมื่อถึงช่วงเปลี่ยนผ่านเป็นทายาทรุ่นที่ 2 ขึ้นมารับช่วงต่อ
ทายาทรุ่นที่สองมีจุดยืนชัดเจนว่า **“ไม่เอา”**
คือไม่เอาตัวลงมาบริหารธุรกิจรพ.ของพ่อแม่ รับเฉพาะเงินปันผลจากกำไรของรพ.เท่านั้น ตัวเองมีธุรกิจส่วนตัวที่ต้องดูแล ให้ผู้บริหารชุดที่ทำงานมาตั้งแต่เจ้าของชุดแรกดูแลบริหารงานต่อ
> ### เรื่องนี้ผมมองว่าไม่ผิด มันเป็นสิทธิ์ของเขาครับ
แต่ผลที่ตามมาก็คือวัฒนธรรมองค์กรเปลี่ยน ผมไม่ทราบนอกในหรอกครับว่าในบรรดาผู้บริหารเขาแบ่งพรรคแบ่งพวกกันยังไง แต่ภาพที่ทุกคนเห็นก็คืออำนาจสูงสุดตกอยู่ในมือคนไม่กี่คนที่มีสิทธิ์ขาดในการชี้นำองค์กรได้ มันรุนแรงขนาดที่ว่าผู้บริหารบางคนที่ไม่ใช่ผู้ถือหุ้นใหญ่ ยังมีอำนาจเหนือผู้บริหารบางคนที่เป็น 1 ใน 10 ผู้ถือหุ้นใหญ่ด้วยซ้ำ
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738757714855-YAKIHONNES3.jpg)
เมื่อเวลาผ่านไป การลุถึงอำนาจในการกุมบังเหียนองค์กรแบบเบ็ดเสร็จมันค่อยๆสร้างปัญหาให้กับคนทำงานทีละเล็กทีละน้อย ผมใช้คำเปรียบเทียบที่ล้อไปกับเศรษฐกิจไทย “ต้มกบ” ก็แล้วกันนะครับ
<รูปต้มกบ>
-----------
### แก้วที่เริ่มร้าว
อย่างที่ผมบอกว่าผมเป็นหัวหน้า 3 หน่วยงาน ทุกๆ 1 - 2 เดือนหน่วยงานที่ผมดูแลจะมีการประชุมรายงานผลลัพธ์ KPI ที่เกี่ยวข้องกับการดูแลรักษาผู้ป่วย ผมกล้าบอกได้เลยว่าหมอในรพ.ผมเก่งมาก ให้การรักษาได้ตามมาตรฐานตามทักษะความเชี่ยวชาญของหมอแต่ละท่านได้เป็นอย่างดี สะท้อนออกมาใน KPI ที่ทำได้เกินเป้าหมายที่ 70 - 80% ตลอด KPI บางตัวเข้าเป้า 100% ต่อเนื่องโดยที่ไม่เสียคุณภาพเลยก็มี
แต่แล้ว เมื่อผู้บริหารเห็นตัวเลขที่มันดีมากต่อเนื่องกันนานๆ ผู้บริหารก็โยนโจทย์ลงมาให้แต่ละทีมว่า
> #### จะไม่มีการยอมให้ KPI เข้าเป้า 100% นานเกินไป เพราะมันหมายถึงการไม่คิดจะพัฒนาตัวเอง
ถ้าเป็นศัพท์สมัยนี้คือโดนด่าว่า “ไม่มี growth mindset” แต่ละทีมจะต้องไปออกแบบ KPI ใหม่ หรือไม่ก็ขยับเป้า KPI ให้ทำสำเร็จยากขึ้นเพื่อเป็นการท้าทายตนเอง
… ****คือ เขามองว่า ตัวเองคะแนนต้องไม่เต็มร้อย ต้องมีการรายงาน KPI ที่มี progress เป็นเชิงบวก ถึงจะดีในสายตาเขาครับ**** …
**ผมขอยกตัวอย่างให้เห็นเป็นรูปธรรมจับต้องได้**
เหตุการณ์การกู้ฟื้นคืีนชีพคนไข้ในรพ.(cardiopulmonary resuscitation หรือการทำ CPR)
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738758187782-YAKIHONNES3.jpg)
ทีมผมออกแบบ KPI ว่า ถ้าหากมีคนไข้หัวใจหยุดเต้นในรพ.ไม่ว่าจะเป็นพื้นที่ไหน ทีม CPR จะต้องไปถึงตัวคนไข้ภายในเวลา 4 นาที
ตัวเลข 4 นาทีนี้เกิดจากการรวบรวมข้อมูลมา 5 ปี แล้วหาค่าเฉลี่ยว่าตัวเลขที่ท้าทายทีมกำลังพอดีอยู่ตรงไหน ที่ผ่านมาทำได้ 100% มาตลอด และกำลังจะครบ 12 เดือนที่ทางผู้บริหารโยนโจทย์พัฒนา KPI ลงมา
ล่าสุดก็มีคำสั่งให้ปรับ KPI ที่ท้าทายขึ้นครับ
… หมอ … ทำได้ 4 นาทีมาตลอด ผมขอ 3 นาทีได้มั้ย …
ผมอธิบายเหตุผลว่า รพ.ไม่ใช่เล็กๆนะครับ แล้วบางทีคนไข้เกิดเหตุที่ชั้นบนสุดของรพ. ต่อให้ทีมรปภ.ล็อคลิฟท์ไว้รอแล้ว แต่นั่นมันไม่ได้หมายความว่าลิฟท์จะไม่แวะจอดชั้นอื่นๆ แล้วต่อให้ทีมพวกผมไปถึงตัวคนไข้แล้ว มันก็ต้องเตรียมเครื่องมือ, พยาบาลแทงเส้นเพื่อให้ยา, หมอเตรียมใส่ท่อช่วยหายใจ ฯลฯอีกมากมาย ผมว่าถ้าเราขยับ KPI จาก 4 นาทีลงมา 3 นาที มันจะวัดผลอะไรไม่ได้นะครับ
… หมอ ทำไปเถอะ ผมขอ 3 นาทีได้มั้ย…
คือความสมเหตุสมผลมันเริ่มไม่มีแล้วครับ ทีม CPR ของผมไม่ใช่ทีมเดียวที่โดนขยับเป้า KPI ประหลาดๆแบบนี้ หมอทุกแผนกโดนกันอย่างทั่วถึงครับ
### การทำงานมันมีระบบ มี guideline มี protocol ของมันอยู่ บางครั้งผู้บริหารก็เอาตัวลงมาทำให้ระบบรวน
คนไข้ที่เข้า ER มี standard อยู่ครับ ว่าเคสแบบไหนต้องเจอหมอทันที เคสแบบไหนมันพอรอได้ 5 นาที - 10 นาที อะไรก็ว่าไป ผมประสบกับตัวเองครั้งหนึ่งผมให้การรักษาเคสคนไข้ที่เป็น VIP ของผู้บริหารท่านหนึ่ง ที่อาการไม่ได้แย่ ไม่ได้วิกฤติสามารถรอเจอหมอได้ภายใน 15 นาที
- 11.32 คนไข้มาลงทะเบียน
- 11.34 เข้ามาถึง ER
- 11.36 พยาบาลเข้าไปประเมินคนไข้ วัดความดัน ฯลฯ และรายงานผม
ผมสั่งการักษาทันที 11.36 และบอกว่าเดี๋ยวอีก 5 นาทีผมมาประเมินนะ เคสนี้ผมมีแผนของผมอยู่แล้วว่าจะรอดูอะไรที่ 5 นาที
- 11.41 ผมเดินออกมาเห็นคนไข้อาการดีขึ้นแล้ว ผมเลยขอเวลาไปดูประวัติเดิมพวกโรคประจำตัวของคนไข้ ได้ข้อมูลครบ 11.42 (แต่ผู้บริหารดันอยู่แถวๆนั้นพอดี)
ผู้บริหารเจ้าของเคสนี้เป็นหมอ เดินมาเล่าประวัติเพิ่มเติมให้ฟัง ผมก็คุยกับหมอเขา เป็นหมอคุยกับหมอเรื่องอาการคนไข้คุยกันไม่นาน ทุกคน happy ส่งคนไข้ admit อย่างปลอดภัย
วันรุ่งขึ้นกลับโดนผอ.รพ.เรียกพบให้ไปรายงานว่าทำไมเคสนี้ถึงปล่อยให้คนไข้รอนาน ไม่มาดูคนไข้ทันที
…ผมชี้แจง timeline ทั้งหมดให้ฟัง 11.32 11.34 11.36 11.41 ว่าเกิดอะไรขึ้น
ผอ.บอกว่าอ้าว แค่ 5 นาทีเหรอ ก็ไม่ได้นานนี่
ผมก็บอกว่าไม่นานไงครับ ผมสั่งยาตั้งแต่ time zero ที่น้องพยาบาลรายงานผมแล้วด้วยซ้ำ
คุยกันไปคุยกันมาสรุปใจความได้ว่า
“มันไม่ถูกใจหมอ เจ้าของคนไข้ VIP และ ผมก็ผิดอยู่ดีที่ปล่อยให้คนไข้รอ 5 นาที”
แล้วมันจะมี guideline หรือ protocol การรักษาไว้ทำไมครับ ในเมื่อคนระดับผู้บริหารเกิดจะคิดเอาแต่ใจตนเองแหกกฏและแนวทางปฏิบัติของรพ.แล้วด่าว่าหมอทำไม่ถูก แถมเอาตัวลงมาวุ่นวายกระบวนการรักษาด้วย
### Top-down absolute power
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738759769958-YAKIHONNES3.jpg)
> ### "รับฟังปัญหา มีความเห็นต่างเสนอได้ เสนอได้แต่ไม่ฟัง จะเอาแบบเดิม"
เมื่อไหร่ก็ตามที่มีการรายงานปัญหา ผมเชื่อว่ามันมีการรายงานแบบไม่เป็นความจริงซ่อนอยู่มาก ทำให้ผู้บริหารได้รับข้อมูลผิด ไม่ตรงกับความเป็นจริง
ถ้าเป็นผูับริหารที่มีความเฉลียวใจอยู่บ้าง จะต้องทำการพิสูจน์ความจริง (fact check) ก่อนจะฟันธงว่าปัญหาที่แท้จริงมันคืออะไร แล้วออกมาตรการป้องกันหรือแก้ไข อะไรก็ว่าไป แต่สิ่งที่พวกผมเห็นก็คือผู้บริหารไม่เอาตัวลงมา fact check เลยครับ แต่สั่งคำสั่งลงมาเลยโดยที่ไม่รู้ตื้นลึกของปัญหานั้นๆ
ผมเป็นหนึ่งในตัวแทนหมอเข้าร่วมประชุมกับผู้บริหารเดือนละครั้ง พวกผมการวิเคราะห์เหตุการณ์ให้ฟังแบบละเอียด รวมถึงเสนอวิธีการแก้ปัญหาที่ยั่งยืนให้ตัวแทนผู้บริหารรับไว้พิจารณาทุกครั้งที่มีการประชุมกัน แต่ปัญหาคือคนที่ absolute power ไม่เคยมาพบตัวแทนแพทย์เลยซักครั้ง
คนที่ absolute power ไม่เคยลงมาฟังปัญหาจากแพทย์เลย ฟังแต่หน่วยข่าวกรอง(ที่ไม่รู้กรองอะไรเข้าไปบ้าง) แล้วยิงคำสั่งลงมาเลย มีคำพูดสวยหรูว่าถ้าหากเห็นต่างสามารถพูดคุยกันได้ แต่ก็จะยืนยันคำสั่งแบบเดิมอยู่ดี ผลกระทบเกิดมากแค่ไหน ค่อยส่งคำสั่งมาแก้มันเพิ่มทีหลัง
สำหรับหมอที่ทำงานรพ.เอกชน จะมีสัญญาในการทำงานร่วมกับรพ.ในสัญญาระบุชัดเจนว่า หมอ”ไม่ใช่ลูกจ้าง” แต่เป็นหุ้นส่วนทางธุรกิจ (partner) ที่มาขอใช้พื้นที่ในรพ.ในการเปิดคลินิครักษาคนไข้ เงินที่เรียกเก็บจากคนไข้ จะ profit sharing กัน 70/30 หรือ 80/20 ก็แล้วแต่เงื่อนไขของแต่ละรพ. แน่นอนครับ มันมีความไม่ตรงไปตรงมาในการจ่ายเงินผมอยู่ ความเป็น partner นี้เอง ทำให้หมดสิทธิ์ฟ้องร้องรพ.กรณีจ่ายค่าตอบแทนไม่ตรงตามข้อกำหนด สั้นๆก็คือผมได้รับรายได้ต่ำกว่าราคาตลาดที่หมอ EP ควรจะได้ 20% ครับ
ความเป็น partner นั่นหมายความว่าพวกผมจะไม่ได้รับสวัสดิการอะไรมากนัก เวลาป่วยไม่สบายจะมีวงเงินในการรักษาอยู่จำนวนหนึ่ง ถ้าเกินก็ต้องจ่ายเอง อาจจะมีส่วนลดนิดๆหน่อยๆ ไม่มีสิทธิ์ประกันสังคมเพราะไม่ใช่ลูกจ้าง มีสิทธิ์พื้นฐานคือบัตรทอง 30 บาท หมอเอกชนหลายๆคนพึ่งสวัสดิการข้าราชการจากคู่สมรส หรือไม่ก็ต้องซื้อประกันสุขภาพหลายๆฉบับ พูดง่ายๆว่า ต้องเก็บเงินดูแลรักษาตัวเองเมื่อป่วยไม่ต่างจากอาชีพอื่น
ความเป็น partner อีกข้อนึงคือพวกผมไม่สามารถเรียกร้องอะไรได้ถ้าเกิดรพ.ไล่ออก เพราะพวกผมไม่ใช่ลูกจ้าง ไม่มีกฏหมายแรงงานใดๆรองรับ ในขณะที่ลูกจ้างที่มีประกันสังคม หากสูญเสียงาน อาจจะมีเงินเยียวยากี่เดือนอะไรก็ว่าไป ตลอดอาชีพผม ผมเคยเห็นหมอโดนรพ.กลั่นแกล้ง บีบให้ออกแบบไม่เป็นธรรมมาหลายคนแล้ว หมอที่ผมสนิทหรือบางคนเป็นอาจารย์หมอที่สอนผมมาด้วยซ้ำ โดนไล่ออกด้วยปัญหาส่วนตัวกับผู้บริหารก็มี
แต่ด้วยนโยบายคำสั่ง top down absolute power ที่เกิดขึ้นนี้ ผมมองว่ารพ.ปฏิบัติกับพวกผมไม่ใช่ในฐานะ partner อีกต่อไป แต่กลายเป็นนายจ้าง-ลูกจ้าง(employer-employee) หรืออาจจะเป็นอะไรที่ต่ำกว่า employee ก็ได้นะครับ
### ทำไมผมถึงคิดเช่นนั้น??
**เพราะนโยบาย top down absolute power ครับ**
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738764673039-YAKIHONNES3.jpeg)
ถ้าคุณมี partner ทางธุรกิจ ทุกเสียงของ partner คุณน่ะ โคตรมีความสำคัญ เพราะเขาคือคนที่พร้อมจะจมหัวจมท้ายกับคุณได้ ถ้าคุณแฟร์และจริงใจพอนะ คุณทำธุรกิจคุณไม่ได้รู้ทุกเรื่อง ไม่มีทางที่คุณจะเก่งได้ทุกเรื่อง และการที่ได้ partner ที่มาปิดจุดอ่อนของคุณได้ หรือชี้จุดบอดของคุณได้ เตือนสติหรือด่าคุณให้คุณเก่งขึ้นหรือดีขึ้นได้น่ะ เป็นเรื่องโคตรโชคดีเลยนะผมจะบอกให้
แต่นี่อะไร top down ไม่ฟังอะไรใคร เอาสิ่งที่ตัวเองคิดเป็นที่สุด ปรึกษาขอความเห็นพวกผมเป็นบางครั้งพอเป็นพิธี แต่ก็เดินหน้าทำตามแผนในหัวพวกเขาอยู่ดี ผมกับตัวแทนหมอคนอื่นๆก็แซวกันว่า “แล้วจะเรียกพวกเรามาเพื่ออะไร”
งานทำบุญปีใหม่ประจำปี ถ้าคุณเป็นเจ้าของธุรกิจแล้วมี partner คนสำคัญ คุณจะเชิญเขามามั้ยครับ คุณจะเตรียมสถานที่หรือเตรียมอะไรเล็กๆน้อยๆเพื่อเป็นคำขอบคุณมั้ยครับ หรืออย่างน้อยๆเลี้ยงอาหารเขาซักมื้อเป็นการตอบแทนมั้ยครับ แน่นอนครับ ไม่มีอะไรพวกนี้ในงานทำบุญปีใหม่รพ.เลย ตั้งแต่เจ้าของคนเก่าเสียไป บัตรเชิญเข้าร่วมงานทำบุญปีใหม่และรับประทานอาหารพร้อมหน้ากัน (ขอหยาบหน่อยนะครับ) แม่งเชิญทุกคนยกเว้นหมอเว้ย!!! เจ้าหน้าที่เวรเปล พยาบาล นักเทคนิคมีข้าวเที่ยงกินกันมีไอติมมีขนมให้ หมอไม่ได้รับเชิญแต่น้องๆพยาบาลโทรตามหมอแผนกตัวเองขึ้นไปร่วมงาน เมื่อไปถึงของกินแม่งหมดใส่หน้าหมอเลย จะเรียกหมอขึ้นไปทำไมอะไรเหรอ
ผมไม่ได้เห็นแก่กินนะ เพราะผมห่อข้าวจากบ้านมากินเองอยู่แล้ว ต่อให้มีใครมาเชิญผมไปกิน ผมก็ไม่ไปหรอก ผมสละสิทธิ์ให้คนอื่น แต่มันทำให้ผมไม่แน่ใจไง ว่ารพ.มองพวกผมเป็นอะไรที่ต่ำกว่าลูกจ้างหรือเปล่า
อาชีพหมอในรพ.เอกชนในสายตาคนภายนอกดูดีครับ แต่ในความเป็นจริงแล้วหมอทุกคนคือ”ตัวหมากการตลาด” อย่างนึงของรพ.ไม่ได้มีฐานะที่สูงส่งอะไรขนาดนั้น ที่รพ.ทำดีกับหมอ เพราะมันมี profit sharing กันครับ แต่มันก็ไม่ได้ยับเยินแบบนี้ทุกรพ.หรอกครับ รพ.ที่ดีๆที่ดูแลหมอเป็นอย่างดี ให้ความสำคัญกับความต้องการของหมอทุกอย่างมันก็มี … แค่… ผมยังหาไม่เจอเท่านั้นเอง
### รพ.ส่งหมอไปตาย
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738765874230-YAKIHONNES3.jpg)
อันนี้แทบจะเป็นจุดพีคที่สุดของเรื่องเลยครับ ผมอธิบายให้เข้าใจก่อนว่าโดยปกติถ้าคนไข้ได้รับการรักษาแล้วเกิดเหตุอะไรก็ตามแต่แล้วมีข้อร้องเรียนเช่นต้องเสียเงินเยอะ , เจอหมอหลายแผนกทำให้เสียเวลา ไม่พอใจการรักษา หรืออะไรก็แล้วแต่ ในรพ.เอกชนจะมีระบบรับเรื่องการร้องเรียนแล้วส่งรายงานขึ้นไปตามลำดับ ผู้บริหารจะมาเข้ารับฟังปัญหาเหล่านี้ในตอนเช้า (morning brief) ผู้บริหารจะดูว่าข้อร้องเรียนเหล่านี้จะต้องดำเนินการแก้ไขอย่างไร แล้วสั่งการให้ผู้ที่เกี่ยวข้องไปทำ แล้วรอฟังรายงานในวันถัดไป
“หมอ” ถือเป็นบุคคลากรด่านสุดท้ายท้ายที่ต้องออกไปพบคนไข้กรณีคนไข้ร้องเรียน โดยปกติรพ.ปกป้องหมอจนถึงที่สุด มีทีมที่เชี่ยวชาญในการรับฟังปัญหา มีทีมกฏหมายที่เกี่ยวข้อง เป็นคนกลางคอยไกล่เกลี่ยให้ แต่ถ้าเป็นกรณีฟ้องร้องกันรุนแรง อันนั้นถึงจะมีการเชิญหมอมาพบคนไข้ครับ น้อยเคสมากที่ดำเนินไปถึงจุดที่หมอกับคนไข้ต้องมาเจอหน้ากัน
กลับกันที่รพ.แห่งนี้ส่งผมไปตายมันตั้งแต่แรก …
มีคนไข้หนึ่งรายเดินมาโต๊ะลงทะเบียนบอกว่า ต้องการจะมาปรึกษาแพทย์เฉพาะทางด้วยเรื่องอาการปวดท้องเป็นๆหายๆมาหลายเดือน เคยตรวจสุขภาพแล้วสงสัยนิ่วในถุงน้ำดี
แต่ทางรพ.มีนโยบายว่าถ้าหากคนไข้มีอาการแน่นท้องปวดท้องบริเวณเหนือสะดือขึ้นมาจนถึงหน้าอก จะต้องเข้า ER ก่อนเพื่อทำการตรวจคลื่นไฟฟ้าหัวใจ (EKG) และแปลผลโดยหมอ EP ก่อนว่าใช้โรคหัวใจหรือไม่ก่อนที่จะไปพบแพทย์เฉพาะทางสาขาอื่น คนไข้แย้งโต๊ะลงทะเบียนว่าที่ตรวจสุขภาพแล้วสงสัยนิ่วในถุงน้ำดีก็คือที่รพ.แห่งนี้แหละ เปิดประวัติดูได้เลย แต่เจ้าหน้าที่คัดกรองแจ้งว่ามันเปิดดูประวัติไม่ได้ (จริงๆมันเปิดดูได้) จำเป็นต้องทำตามนโยบายให้เข้า ER ก่อน
อธิบายเพิ่มเติมนะครับ สิ่งที่รพ.ทำ เขาเรียกว่า chest pain pathway คือคนไข้ที่มาด้วยอาการเจ็บหน้าอก มีโอาสเสี่ยงที่จะเป็นโรคหัวใจ แต่คนไข้บางคน ไม่ได้มาด้วยอาการแน่นหน้าอก แต่ตอนจบกลายเป็นโรคหัวใจ ไอ้อาการปวดท้องเหนือสะดือมันก็เป็นหนึ่งในสัญญาณเตือนครับ
คนไข้ก็เข้า ER มาเจอผม ผมดูแล้วมันไม่น่าใช่โรคหัวใจ แต่ผมต้องทำตาม guideline ของรพ.คือตรวจ EKG และตรวจเลือดดูค่าหัวใจว่าสูงผิดปกติมั้ย ผมปรากฏว่าปกติ ผมเลยส่งปรึกษาหมอแผนกศัลยกรรมเรื่องสงสัยนิ่วในถุงน้ำดี ทางหมอศัลยกรรมมาส่งตรวจ ultrasound ปรากฏว่าไม่เจอนิ่วในถุงน้ำดี คนไข้ถูกส่งไปพบแผนกทางเดินอาหารสรุปว่าเป็นลำไส้อักเสบ ทั้งหมดนี้คือกระบวนการตรวจค้นหาโรคตามปกติที่หมอเขาทำกันครับ
คนไข้ร้องเรียนรพ.ในวันรุ่งขึ้นดังนี้
ไม่พอใจจุดลงทะเบียนว่าทำไมไม่ส่งเขาไปที่คลินิคทางเดินอาหารตั้งแต่แรก ทำไมต้องให้เข้า ER
เจอค่ารักษาเข้าไปหลักหมื่นต้องการคำชี้แจงจากรพ.
เรื่องนี้ถูกรายงานขึ้น morning brief ครับ
แต่ก่อนที่ผมจะเล่าต่อผมขอให้เพื่อนๆลองคิดหน่อยครับ
ว่าถ้าเพื่อนๆเป็นผู้บริหารที่รับประเด็นร้องเรียนนี้จะ action อย่างไร
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738765691333-YAKIHONNES3.jpeg)
### ผู้บริหารสั่งให้หมอคนแรกที่ตรวจคนไข้โทรไปอธิบายให้คนไข้เข้าใจครับ
หมอคนแรกคือใครล่ะ **ผมไงครับ**
วันนั้นเป็นวันหยุดของผม ผมกำลังทำบุญที่วัดกับครอบครัวอยู่ รับโทรศัพท์จากรพ.ว่า ทางผู้บริหารสั่งให้ผมโทรไปเคลียร์กับคนไข้รายนี้ เพราะเกิดประเด็นร้องเรียน
ผมโทรไปตามคำสั่ง คนไข้ตกใจมากว่าทำไมหมอโทรหาเขาเอง คนไข้ไม่ได้ติดใจอะไรเรื่องของหมอเลย แต่ติดใจแผนกลงทะเบียนว่าทำไมทำกับเขาอย่างนั้น ทำให้เขาต้องเสียเวลาและเสียตังค์เยอะ
### เพื่อนๆคิดยังไงกันครับ
เวลาที่คนไข้ร้องเรียน ผู้บริหารที่ดีจะต้อง fact check ก่อนรึเปล่า แล้วเจาะความต้องการของคนไข้ให้ได้มั้ยว่าเขาร้องเรียนเรื่องอะไร แล้วสั่งคนที่เกี่ยวข้องลงไปดูแล ถ้ามันเกิดเคสฟ้องร้องรุนแรงอันนั้นแหละ จะถึงตัวหมอที่ดูแลรักษา หมอต้องมาพบคนไข้
แต่นี่อะไร … ส่งหมอไปตายตั้งแต่แรก … มันทำให้ผมคิดนะครับขนาดเรื่องหยุมหยิมแค่นี้ยังส่งหมอไปตาย ถ้าหมอถูกฟ้องขึ้นมา รพ.ไม่เอาหมอใส่กุญแจมือยื่นให้เรือนจำแล้วตัวเองลอยตัวไปเลยเรอะ
เหตุการณ์นี้ผมทำตามนโยบายของทางรพ. แต่พอคนไข้ร้องเรียน ไม่ปกป้องหมอ แต่ส่งหมอไปตาย ครับ
เหตุการณ์แบบนี้เกิดกับผม 4 ครั้ง และหมอคนอื่นๆก็โดนอะไรแบบนี้มาเหมือนกันครับ
-----------
### เมื่อบ้าน ไม่อบอุ่นอีกต่อไป
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738766160069-YAKIHONNES3.jpeg)
> #### ผมยอมรับกับเพื่อนๆทุกคนนะครับ ว่ามันยากมากที่ผมจะทำใจยอมรับคำคำนี้ได้
มีช่วงนึง ผมโดนผอ.เรียกคุยบ่อยมาก ด้วยเรื่องไม่เป็นเรื่องแบบนี้ จนผมเครียดมาก จนนอนไม่หลับไป 2 - 3 สัปดาห์ เข้านอนพร้อมครอบครัว สวดมนต์ก่อนนอน ปกติเวลาหลับตานอนผมจะสวดมนต์ในใจไปอีก 2 - 3 จบ แล้วมันจะ auto shutdown หลับดีถึงเช้าครับ ที่เพื่อนๆเห็นผมโพส #gym calisthenic #workout นั่นแหละ คือตื่นไหว มาออกกำลังกาย แต่มันมีบางช่วงที่มันนอนไม่พอ บางทีเที่ยงคืน ตีหนึ่ง ตีสอง นอนๆอยู่ตื่นเองแล้วไม่หลับอีกเลย สภาพแบบนี้ถ้าไปออกกำลังกายตอนเช้ามีหวังทำร้ายร่างกายมากกว่า
หลังจากนั้นไม่นานพอผมเริ่มปล่อยวางเรื่องนี้ได้ ก็มีข่าวร้ายมากระแทกพวกผมแผนก ER อีก เป็นการตัดสินใจจากผู้บริหารแบบไม่คิดหน้าไม่คิดหลัง ไม่คิดถึงผลกระทบต่อคุณภาพชีวิตของแพทย์ EP fulltime ที่ไม่ได้มีผมคนเดียว กระเทือนเป็นวงกว้าง รุนแรงขนาดทำลายชีวิตครอบครัวกันเลยครับ … แต่ผมขอไม่เล่านะครับ …
พวกผมถูกผอ.เรียกไปคุย ให้รับทราบถึงนโยบายเกี่ยวกับการปรับเปลี่ยนรูปแบบการทำงานที่จะส่งผลกระทบต่อวงจรการใช้ชีวิตและชีวิตครอบครัว ครั้งนั้นผมไม่ยอมรับครับ ผมมีข้อมูลทุกอย่างของแผนก ER ในมือ คำสั่งที่ออกมาไม่ได้แก้ปัญหาที่แท้จริงแต่อย่างใด แต่เป็นการแก้ผ้าเอาหน้ารอดแบบสุดๆ ผมแย้งคำสั่งนี้จนผอ.และเลขาผอ.สู้หน้าผมไม่ได้ เพราะผอ.ไม่มีข้อมูลเชิงลึกแบบที่ผมมี และผอ.เองก็รับคำสั่งจาก board บริหารมาอีกทีนึง แกก็ทำได้แค่อึกๆอักๆเท่านั้น
แต่จำได้มั้ยครับ top down absolute power ต่อให้ผมมีข้อมูลข้อเท็จจริงรวมถึงเสนอวิธีแก้ไขที่ยั่งยืนและตรงจุด เขาก็ไม่ฟัง เพราะเขามีภาพในหัวของเขาอยู่แล้วว่าเขาต้องการอะไร ต่อให้เชิญตัวแทนแพทย์มาคุยก็ไม่ฟังอยู่ดี ผมไม่ได้โลกสวยคิดว่าจะเปลี่ยนความคิดของ board บริหารได้
### ผมต้องไปแล้วจากที่นี่ ไม่งั้นเจ็บตัวแน่ๆ
ช่วงเวลานี้แหละครับเสียงเรียกปลุกจากภวังค์ (wake up call) มันชัดเจนแล้วว่า ผมต้องหาเรือสำรอง เพราะเรือลำนี้มันกำลังค่อยจมลงช้าๆ แต่คนบนเรือส่วนใหญ่ยังไม่รู้ตัว “ต้มกบ” แบบที่ผมบอกตอนแรกครับ
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738766271232-YAKIHONNES3.jpeg)
ตอนแรกผมก็ยังไม่แน่ใจ ว่าที่ผมจะไป มันเป็นเพราะเรือลำนี้มันกำลังจมลงแบบที่ผมบอก หรือผมกำลังจะหนีปัญหากันแน่ ผมทบทวนกับตัวเอง คุยกับภรรยา อ่านใจตัวเองแบบใจเป็นกลาง ได้คำตอบชัดเจนครับว่า มันเป็นเวลาวละเรือแล้วจริงๆก่อนที่จะเจ็บตัวไปมากกว่านี้
“ถ้าไปที่ใหม่ ต้องดีกว่าที่เดิม ไปเพื่อไปฝึกพัฒนาตัวเอง ถ้าเป็นแบบนั้นไปได้ แต่ถ้าไปเพื่อหนีปัญหา อย่าไป” ภรรยาผมบอก
ผมและภรรยาโชคดีที่ครอบครัวเราใกล้พระ ใกล้วัด ก็ไปขอปัญญาความสว่างจากหลวงพี่ หลวงน้า พระอาจารย์ ทุกท่านก็ให้ข้อคิดไปในทำนองเดียวกันกับภรรยาผม ผมเลยดำเนินเรื่องเปลี่ยนที่ทำงานครับ
### การสัมภาษณ์งานที่ใหม่ ก็ไม่ง่าย
เพราะนานๆรพ.แห่งนี้จะเปิดรับหมอใหม่ซักทีโดยเฉพาะรับ EP
ผมยื่น resume สมัครงานไป แต่มันเต็มไปด้วยความแน่นอนครับ เพราะทางรพ.ใหม่แจ้งกลับมาว่า ได้รับ resume แล้ว ถ้าหากได้รับการพิจารณา จะติดต่อนัดเข้ามาสัมภาษณ์ รอเวลาประมาณสัปดาห์กว่าๆครับ ก็มีข้อความว่าผมได้รับการพิจารณาทางรพ.จะเชิญมาสัมภาษณ์
ผมเข้าไปสัมภาษณ์ระหว่างสัมภาษณ์มีสัญญาณที่ดีพอสมควร เมื่อสัมภาษณ์เสร็จ ทางรพ.ขอเวลาแจ้งผล 2 สัปดาห์
เพื่อนๆครับ ผมโคตรทรมานเลยครับช่วงที่รอ ไม่ว่าจะเป็นการรอเรียกมาสัมภาษณ์ และ รอแจ้งผล ผมจะเป็นบ้าครับ ใจสั่นเสียวแว้บที่หัวใจทุกวัน วันละหลายๆรอบ บางครั้งชาหน้าอกซ้ายทั้งแถบ เมื่อตอนที่ผมทราบว่าผมผ่านการสัมภาษณ์ ได้รับการคัดเลือกให้เข้ามาร่วมงาน มันเป็นอะไรที่โล่งมาก
-----------
### สิ่งที่เกิดขึ้นภายในหัวของผมตั้งแต่เกิดเรื่องและข้อคิดที่อยากแบ่งปัน
เตลิด ฟุ้งซ่าน กลัว โกรธไม่พอใจ ปรุงแต่ง ขาดสติไม่รู้สึกตัว ปล่อยวางไม่ได้ วนไปวนมาเกิดขึ้นซ้ำแล้วซ้ำอีก จนมันออกอาการมาทางกายครับ ใจสั่น เสียวแว้บที่หัวใจ หน้าอกซ้ายชาไปทั้งแถบ นอนไม่หลับ ปวดหัวบ่อย พฤติกรรมแยกตัวไม่ยุ่งกับใครไม่คุยกับใครเลย ระแวง แล้วมันก็เป็นจังหวะพอดีที่ทางรพ.มีเรื่องขอความเห็นผมในการปรับปรุงคุณภาพ
แต่ละวัน line ผมเด้งไม่ต่ำกว่า 10 รอบ แต่บังเอิญมันจะมีบางช่วงที่ผมโดนผอ.เชิญขึ้นไปคุยเรื่องปัญหาที่ไม่เป็นเรื่องอย่างที่ผมเล่าไปตอนต้นปนมาด้วยครับ คือทุกครั้งที่ line เด้ง ประสาทจะแดกทุกครั้งจนหลอนครับ “กูจะโดนอะไรอีกเนี่ย”
มันหนักขนาดบางครั้งตัวผมช็อตแล้วยืนเอ๋อกินไปเลย กำลังทำงานบ้านกำลังล้างจ้างอยู่มือหยุดไปดื้อๆกลางอากาศ หรือกำลังเดินซื้อของกับครอบครัวอยู่ ผมเกิดอาการหูดับคืออยู่ดีๆก็ไม่ได้ยินเสียงรอบข้าง ภรรยาผมตะโกนเรียกบางทีก็ไม่ได้ยิน อาการหนักจนผมตัดสินใจไปตรวจหูตรวจประสาทการได้ยิน รวมถึงขอคุยกับจิตแพทย์ครับ เพราะมันไม่ไหว
แต่ปรากฏว่าผลการตรวจร่างกายทุกอย่างปกติหมด
ผมยังมีบุญอยู่ครับ ที่ผมและภรรยาปฏิบัติกรรมฐานมาจริงจัง พอจะมีประสบการณ์ทางธรรมมาบ้าง เหตุการณ์นี้มันคือการฝึกภาคสนามของผู้ปฏิบัติกรรมฐานครับ มันคือการโดนลองของ เพื่อดูว่าการฝึกจิตที่ผ่านมา เมื่อมาโดนความเป็นจริงที่โหดร้ายทางโลกกระแทกเข้าแบบติดๆกันไม่ให้พัก จะรอดมั้ย
ผมยังโชคดีที่ยังสามารถควบคุมสิ่งที่ไม่ดีทั้งหลายให้อยู่เฉพาะในหัวได้ ยังไม่โพล่งออกมาเป็นคำพูดที่ทำร้ายใคร และ ยังไม่ทำอะไรรุนแรงเช่นไปทุบหัวคนอื่น
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738837868020-YAKIHONNES3.jpeg)
เรียกว่าเกิดเฉพาะ มโนกรรม ส่วนวจีกรรมและกายกรรม ยังไม่เกิด ในวันที่แย่ขนาดนั้น ผมยังอยู่กับการปฏิบัติดูรู้ลมหายใจ ดูรู้กายเคลื่อนไหว สวดมนต์ นั่งสมาธิ ถวายสังฆทาน สวดมนต์กับลูกและภรรยาทุกวันก่อนนอนไม่ขาด ทางร่างกายก็ออกกำลังกายให้สม่ำเสมอรักษา baseline ความแข็งแรงไว้
หากเพื่อนๆเชื่อเรื่องบาปบุญและกฏแห่งกรรม รวมไปถึงเจ้ากรรมนายเวร
ตัวอย่างของผมอันนี้ก็คือการชดใช้ครับ ช่วงที่ผมก้มหน้าชดใช้กรรมที่ผ่านมา ผมอโหสิและแผ่เมตตาอุทิศบุญกุศลให้แก่ทุกคนที่ทำร้ายผม ผมโกรธครับ แต่เวลาอารมณ์โกรธมันออกมาจนตัวสั่น ใจสั่น เสียวหน้าอก ผมแผ่เมตตาสู้อารมณ์โกรธอันนั้นเลย แรกๆก็ฝืนธรรมชาติตัวเองอยู่ครับ แต่เมื่อทำต่อเนื่องไป ใจมันสงบมันนิ่ง มันเกิดอารมณ์สงสารคนเหล่านั้นที่มาทำร้ายผมมากกว่า เพราะสภาพความเป็นจริงก็คือคนเหล่านั้นที่ทำร้ายผม เขาก็กำลังโดนทวงจากคนของเขาเหมือนกันครับ ดังนั้นผมถึงเลือกที่จะแผ่เมตตาให้ และอธิษฐานภาวนาให้ว่า
**"ผมยินดีน้อมรับการชดใช้ในครั้งนี้ ผมขอไม่โต้ตอบ ชดใช้กันให้เต็มที่ เพื่อว่าเมื่อหมดกรรมกันไปแล้วจะได้ขาดกันไปเลย ไม่ต้องมาจองเวรจองกรรมกันอีก ขอให้มีความสุขและเกิดดวงตาเห็นธรรม"**
เรียกว่าผมรอดมาได้แบบกระอักเลือดเพราะใช้ธรรมะที่ฝึกปฏิบัติมาเป็นที่พึ่งครับ ไม่ได้ไปเรียกร้อง ไปโวยวาย หรือไปโต้ตอบอะไร ในใจมันต้องคิดขุ่นเคืองเป็นเรื่องธรรมดา แต่ให้มันจบอยู่แค่ที่ความคิดครับ ไม่ให้หลุดออกมาเป็นคำพูดหรือการกระทำ ไม่เช่นนั้นการกระทำใหม่จะเกิดขึ้น กลายเป็นการผูกเวรผูกกรรม จองเวรจองกรรมกันไปอีกนาน ไม่จบไม่สิ้น แต่ต้องบอกก่อนว่าผมไม่ได้ไปเพ่งไปกดข่มอารมณ์โกรธขุ่นเคืองใจ พระท่านสอนให้เรา “ดู” “รู้” “เห็น” ทุกสรรพสิ่งที่เกิดขึ้นกับตัวเรา โดยเฉพาะความคิดในหัวเรา
**“ดูมัน เห็นมัน รู้มัน แต่ไม่บ้าไปกับมัน”**
แต่เรื่องธรรมะ ผมเชื่อว่าเพื่อนๆที่ฟังคุณลุงมาตลอด น่าจะเข้าใจคำว่า ธรรมะต้องฝึกต้องปฏิบัติเอง รู้ด้วยตัวเอง เห็นด้วยตัวเอง เข้าใจด้วยตัวเอง
วฺิธีการที่ผมเล่ามานี้ไม่ใช่สูตรสำเร็จ แต่มันคือวิธีการปฏิบัติที่เข้ากับจริตคนแบบผมครับ ผมมีแต่จะต้องฝึกให้ชำนาญขึ้นไปจนกว่าจะตายนั่นแหละครับ
เป็นเวลาเกือบ 10 ปีที่ผมอยู่ที่แห่งนี้ มีประสบการณ์ที่ประเมินมูลค่าไม่ได้เกิดขึ้นมากมาย
- วิกฤติครอบครัวที่ภรรยาเกือบเลิกกับผม [อ่านเพิ่มได้ที่นี่](https://yakihonne.com/naddr1qvzqqqr4gupzpz2849zn00wd9e3dpdqdk4mrdm8rqdz6pa3usp44xzjlr7dlea3xqq2nj7jwdsehwuzrxv6kskz4wenkcwrjdscnq3stzy4)
- การได้ครอบครองอสังหาริมทรัพย์จากน้ำพักน้ำแรงตัวเอง
- การเห็นลูกที่รักป่วยไม่สบาย admit บ่อยมากช่วงเด็กเล็ก
- การรับมือกับโรคระบาด COVID19
- การได้เป็นหัวหน้า 3 หน่วยงาน
- การได้ศึกษาปฏิบัติธรรม รวมถึงการลาบวช
- การได้ทดแทนพระคุณบุพการี [อ่านเพิ่มเติมได้ที่นี่](https://yakihonne.com/naddr1qvzqqqr4gupzpz2849zn00wd9e3dpdqdk4mrdm8rqdz6pa3usp44xzjlr7dlea3xqq257ctc949nge6efpckx7rdx4n57wtrg4dyua0ftzv)
- การได้ช่วยเหลือญาติและผู้มีพระคุณแบบไม่หวังผลตอบแทน
- การได้ connection
การเดินทางสถานที่แห่งนี้ ที่ที่ผม(เคย)เรียกว่าบ้าน มันได้เดินทางมาจนถึงหน้าสุดท้ายของหนังสือเล่มนี้ เป็นธรรมดาที่มันเดินทางมาถึงจุดจบ หวังว่าจะเป็นประโยชน์ ไม่มากก็น้อยนะครับ
![image](https://yakihonne.s3.ap-east-1.amazonaws.com/8947a94537bdcd2e62d0b40db57636ece30345a0f63c806b530a5f1f9bfcf626/files/1738839012633-YAKIHONNES3.jpeg)
-
![](/static/nostr-icon-purple-64x64.png)
@ 000002de:c05780a7
2025-02-07 03:54:22
I've long been a fan of [Liberty Maniacs](https://libertymaniacs.com/), the site that makes funny political shirts for rebels & liberty lovers but their email today hit me as extra funny.
## Here's what they shared.
To say the last two weeks have been wild would be the understatement of the century.
🔥 DOGE is taking over the Treasury
🔥 USAID got caught laundering money (again)—basically funding everything to the left of Jimmy Carter’s ghost.
🔥 The new AG wants to drop the Epstein list like it’s hot.
🔥 The CIA just casually admitted the government created COVID.
🔥 And oh yeah, the Gulf of Mexico? Not anymore. Welcome to the Gulf of America!
At this point, reality is outpacing satire. But don’t worry, we’re working harder than a WEF escort during Davos week to get these news cycles onto shirts before the next scandal drops.
Not sure if we’ll ever catch up, but damn it, we’re gonna try.
---
I mean, that's pretty good stuff. If you are a marketer or copywriter this is how you do it.
originally posted at https://stacker.news/items/878326
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-07 01:02:09
I don't think I did one of these summary posts last month.
Based on the [predictions](https://stacker.news/items/865017/r/Undisciplined) made by stackers here's what to expect at the end of the season.
**Champion**: Celtics
**MVP**: SGA
**All NBA 1st Team**
C Jokic
F Giannis
F Luka
G Ant
G SGA
These aren't bad, but whoever's sticking with those Ant and Luka picks seriously need to move off of them.
originally posted at https://stacker.news/items/878234
-
![](/static/nostr-icon-purple-64x64.png)
@ df173277:4ec96708
2025-02-07 00:41:34
## **Building Our Confidential Backend on Secure Enclaves**
With our newly released [private and confidential **Maple AI**](https://trymaple.ai/?ref=blog.opensecret.cloud) and the open sourcing of our [**OpenSecret** platform](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud) code, I'm excited to present this technical primer on how we built our confidential compute platform leveraging **secure enclaves**. By combining AWS Nitro enclaves with end-to-end encryption and reproducible builds, our platform gives developers and end users the confidence that user data is protected, even at runtime, and that the code operating on their data has not been tampered with.
## **Auth and Databases Today**
As developers, we live in an era where protecting user data means "encryption at rest," plus some access policies and procedures. Developers typically run servers that:
1. Need to register users (authentication).
2. Collect and process user data in business-specific ways, often on the backend.
Even if data is encrypted at rest, it's commonly unlocked with a single master key or credentials the server holds. This means that data is visible during runtime to the application, system administrators, and potentially to the hosting providers. This scenario makes it difficult (or impossible) to guarantee that sensitive data isn't snooped on, memory-dumped, or used in unauthorized ways (for instance, training AI models behind the scenes).
## **"Just Trust Us" Isn't Good Enough**
In a traditional server architecture, users have to take it on faith that the code handling their data is the same code the operator claims to be running. Behind the scenes, applications can be modified or augmented to forward private information elsewhere, and there is no transparent way for users to verify otherwise. This lack of proof is unsettling, especially for services that process or store highly confidential data.
Administrators, developers, or cloud providers with privileged access can inspect memory in plaintext, attach debuggers, or gain complete visibility into stored information. Hackers who compromise these privileged levels can directly access sensitive data. Even with strict policies or promises of good conduct, the reality is that technical capabilities and misconfigurations can override words on paper. If a server master key can decrypt your data or can be accessed by an insider with root permissions, then "just trust us" loses much of its credibility.
The rise of AI platforms amplifies this dilemma. User data, often full of personal details, gets funneled into large-scale models that might be training or fine-tuning behind the scenes. Relying on vague assurances that "we don't look at your data" is no longer enough to prevent legitimate concerns about privacy and misuse. Now more than ever, providing a **strong, verifiable** guarantee that data remains off-limits, even when actively processed, has become a non-negotiable requirement for trustworthy services.
## **Current Attempts at Securing Data**
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.09.19-PM.png)Current User Experience of E2EE Apps
While properly securing data is not easy, it isn't to say that no one is trying. Some solutions use **end-to-end encryption** (E2EE), where user data is encrypted client-side with a password or passphrase, so not even the server operator can decrypt it. That approach can be quite secure, but it also has its **limitations**:
1. **Key Management Nightmares**: If a user forgets their passphrase, the data is effectively lost, and there's no way to recover it from the developer's side.
2. **Feature Limitations**: Complex server-side operations (like offline/background tasks, AI queries, real-time collaboration, or heavy computation) can't easily happen if the server is never capable of processing decrypted data.
3. **Platform Silos**: Some solutions rely on iCloud, Google Drive, or local device storage. That can hamper multi-device usage or multi-OS compatibility.
Other approaches include self-hosting. However, these either burden users with dev ops overhead or revert to the "trust me" model for the server if you "self-host" on a cloud provider.
## **Secure Enclaves**
### **The Hybrid Approach**
Secure enclaves offer a compelling middle ground. They combine the privacy benefits of keeping data secure from prying admins while still allowing meaningful server-side computation. In a nutshell, an enclave is a protected environment within a machine, isolated at the hardware level, so that even if the OS or server is compromised, the data and code inside the enclave remain hidden.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.21.31-PM.png)App Service Running Inside Secure Enclave
### **High-Level Goal of Enclaves**
Enclaves, also known under the broader umbrella of **confidential computing**, aim to:\
• **Lock down data** so that only authorized code within the enclave can process the original plaintext data.\
• **Deny external inspection** by memory dumping, attaching a debugger, or intercepting plaintext network traffic.\
• **Prove** to external users or services that an enclave is running unmodified, approved code (this is where **remote attestation** comes in).
### **Different Secure Enclave Solutions**
[**AMD SEV**](https://www.amd.com/en/developer/sev.html?ref=blog.opensecret.cloud) **(Secure Encrypted Virtualization)** encrypts an entire virtual machine's memory so that even a compromised hypervisor cannot inspect or modify guest data. Its core concept is "lift-and-shift" security. No application refactoring is required because hardware-based encryption automatically protects the OS and all VM applications. Later enhancements (SEV-ES and SEV-SNP) added encryption of CPU register states and memory integrity protections, further limiting hypervisor tampering. This broad coverage means the guest OS is included in the trusted boundary. AMD SEV has matured into a robust solution for confidential VMs in multi-tenant clouds.
[**Intel TDX**](https://www.intel.com/content/www/us/en/developer/tools/trust-domain-extensions/overview.html?ref=blog.opensecret.cloud) **(Trust Domain Extensions)** shifts from process-level enclaves to full VM encryption, allowing an entire guest operating system and its applications to run in an isolated "trust domain." Like AMD SEV, Intel TDX encrypts and protects all memory the VM uses from hypervisors or other privileged software, so developers do not need to refactor their code to benefit from hardware-based confidentiality. This broader scope addresses many SGX limitations, such as strict memory bounds and the need to split out enclave-specific logic, and offers a more straightforward "lift-and-shift" path for running existing workloads privately. While SGX is now deprecated, TDX carries forward the core confidential computing principles but applies them at the virtual machine level for more substantial isolation, easier deployment, and the ability to scale up to large, memory-intensive applications.
[**Apple Secure Enclave and Private Compute**](https://security.apple.com/blog/private-cloud-compute/?ref=blog.opensecret.cloud) is a dedicated security coprocessor embedded in most Apple devices (iPhones, iPads, Macs) and now extended to Apple's server-side AI infrastructure. It runs its own microkernel, has hardware-protected memory, and securely manages operations such as biometric authentication, key storage, and cryptographic tasks. Apple's "Private Compute" approach in the cloud brings similar enclave capabilities to server-based AI, enabling on-device-grade privacy even when requests are processed in Apple's data centers.
[**AWS Nitro Enclaves**](https://docs.aws.amazon.com/enclaves/latest/user/nitro-enclave.html?ref=blog.opensecret.cloud) carve out a tightly isolated "mini-VM" from a parent EC2 instance, with its own vCPUs and memory guarded by dedicated Nitro cards. The enclave has no persistent storage and no external network access, significantly reducing the attack surface. Communication with the parent instance occurs over a secure local channel (vsock), and AWS offers hardware-based attestation so that secrets (e.g., encryption keys from AWS KMS) can be accessed only to the correct enclave. This design helps developers protect sensitive data or code even if the main EC2 instance's OS is compromised.
[**NVIDIA GPU TEEs**](https://www.nvidia.com/en-us/data-center/solutions/confidential-computing/?ref=blog.opensecret.cloud) **(Hopper H100 and Blackwell)** extend confidential computing to accelerated workloads by encrypting data in GPU memory and ensuring that even a privileged host cannot view or tamper with it. Data moving between CPU and GPU is encrypted in transit, so sensitive model weights or inputs remain protected during AI training or inference. NVIDIA's hardware and drivers handle secure data paths under the hood, allowing confidential large language model (LLM) workloads and other GPU-accelerated computations to run with minimal performance overhead and strong security guarantees.
### **Key Benefits**
One major advantage of enclaves is their ability to **keep memory completely off-limits** to outside prying eyes. Even administrators who can normally inspect processes at will are blocked from peeking into the enclave's protected memory space. The enclave model is a huge shift in the security model: it prevents casual inspection and defends against sophisticated memory dumping techniques that might otherwise leak secrets or sensitive data.
Another key benefit centers on cryptographic keys that are **never exposed outside the enclave**. Only verified code running inside the enclave environment can run decryption or signing operations, and it can only do so while that specific code is running. This ensures that compromised hosts or rogue processes, even those with high-level privileges, are unable to intercept or misuse the keys because the keys remain strictly within the trusted boundary of the hardware.
Enclaves can also offer the power of **remote attestation**, allowing external clients or systems to confirm that they're speaking to an authentic, untampered enclave. By validating the hardware's integrity measurements and enclave-specific proofs, the remote party can be confident in the underlying security properties, an important guarantee in multi-tenant environments or whenever trust boundaries extend across different organizations and networks.
Beyond that, **reproducible builds** can create a verifiable fingerprint proving which binary runs in the enclave. This is a step above a simple "trust us" approach. Anyone can independently recreate the enclave image and verify the resulting cryptographic hash by using a reproducible build system (for example, [our NixOS-based solution](https://github.com/OpenSecretCloud/opensecret/blob/master/flake.nix?ref=blog.opensecret.cloud)). If it matches, then users and developers know precisely how code handles their data, boosting confidence that no hidden changes exist.
It's worth noting that although enclaves shield you from software devs, cloud providers, and insider threats, you do have to trust the **hardware vendor** (Intel, AMD, Apple, AWS, or NVIDIA) to implement their microcode and firmware securely. The entire enclave model could be theoretically undermined if a CPU maker's root keys or manufacturing process were compromised. Fortunately, these companies undergo extensive audits and firmware validations (often with third-party researchers), and their remote attestation mechanisms allow you to confirm specific firmware versions before trusting an enclave. While this adds a layer of "vendor trust," it's still a far more contained risk than trusting an entire operating system or cloud stack, so enclaves remain a strong step forward in practical, confidential computing.
## **How We Use Secure Enclaves**
Now that we've covered the general idea of enclaves let's look at how we specifically implement them in OpenSecret, our developer platform for handling user auth, private keys, data encryption, and AI workloads.
### **Our Stack: AWS Nitro + Nvidia TEE**
• **AWS Nitro Enclaves for the backend**: All critical logic, authentication, private key management, and data encryption/decryption run inside an AWS Nitro Enclave.
• **Nvidia Trusted Execution for AI**: For large AI inference (such as the Llama 3.3 70B model), we utilize Nvidia's GPU-based TEEs to protect even GPU memory. This means users can feed sensitive data to the AI model **without** exposing it in plaintext to the GPU providers or us as the operator. [Edgeless Systems](https://www.edgeless.systems/?ref=blog.opensecret.cloud) is our Nvidia TEE provider, and due to the power of enclave verification, we don't need to worry about who runs the GPUs. We know requests can't be inspected or tampered with.
### **End-to-End Encryption from Client to Enclave**
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.29.34-PM.png)Client-side Enclave Attestation from Maple AI
Before login or data upload, the user/client verifies the **enclave attestation** from our platform. This process proves that the specific Nitro Enclave is genuine and runs the exact code we've published. You can check this out live on [Maple AI's attestation page](https://trymaple.ai/proof?ref=blog.opensecret.cloud).
Based on the attestation, the client establishes a secure ephemeral communication channel that only that enclave can decrypt. While we take advantage of SSL, it is typically not terminated inside the enclave itself. To ensure there's full encrypted data transfer all the way through to the enclave, we establish this additional handshake based on the attestation document that is used for all API requests during the client session.
From there, the user's credentials, private keys, and data pass through this secure channel directly into the enclave, where they are decrypted and processed according to the user's request.
### **In-Enclave Operations**
At the core of OpenSecret's approach is the conviction that security-critical tasks must happen inside the enclave, where even administrative privileges or hypervisor-level compromise cannot expose plaintext data. This encompasses everything from when a user logs in to creating and managing sensitive cryptographic keys. By confining these operations to a protected hardware boundary, developers can focus on building their applications without worrying about accidental data leaks, insider threats, or malicious attempts to harvest credentials. The enclave becomes the ultimate gatekeeper: it controls how data flows and ensures that nothing escapes in plain form.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.09.22-PM.png)User Auth Methods running inside Enclave
A primary example is **user authentication**. All sign-in workflows, including email/password, OAuth, and upcoming passkey-based methods, are handled entirely within the enclave. As soon as a user's credentials enter our platform through the encrypted channel, they are routed straight into the protected environment, bypassing the host's operating system or any potential snooping channels. From there, authentication and session details remain in the enclave, ensuring that privileged outsiders cannot intercept or modify them. By centralizing these identity flows within a sealed environment, developers can assure their users that no one outside the enclave (including the cloud provider or the app's own sysadmins) can peek at, tamper with, or access sensitive login information.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.07.52-PM.png)Main Enclave Operations in OpenSecret
The same principle applies to **private key management**. Whether keys are created fresh in the enclave or securely transferred into it, they remain sealed away from the rest of the system. Operations like digital signing or content decryption happen only within the hardware boundary, so raw keys never appear in any log, file system, or memory space outside the enclave. Developers retain the functionality they need, such as verifying user actions, encrypting data, or enabling secure transactions without ever exposing keys to a broader (and more vulnerable) attack surface. User backup options exist as well, where the keys can be securely passed to the end user.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.08.04-PM.png)Realtime Encrypted Data Sync on Multiple Devices
Another crucial aspect is **data encryption at rest**. While user data ultimately needs to be stored somewhere outside the enclave, the unencrypted form of that data only exists transiently inside the protected environment. Encryption and decryption routines run within the enclave, which holds the encryption keys strictly in memory under hardware guards. If a user uploads data, it is promptly secured before it leaves the enclave. When data is retrieved, it remains encrypted until it reenters the protected region and is passed back to the user through the secured communication channel. This ensures that even if someone gains access to the underlying storage or intercepts data in transit, they will see only meaningless ciphertext.
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.08.13-PM.png)Confidential AI Workloads
Finally, **confidential AI workloads** build upon this same pattern: the Nitro enclave re-encrypts data so it can be processed inside a GPU-based trusted execution environment (TEE) for inference or other advanced computations. Sensitive data, like user-generated text or private documents, never appears in the clear on the host or within GPU memory outside the TEE boundary. When an AI process finishes, only the results are returned to the enclave, which can then relay them securely to the requesting user. By seamlessly chaining enclaves together, from CPU-based Nitro Enclaves to GPU-accelerated TEEs, we can deliver robust, hardware-enforced privacy for virtually any type of server-side or AI-driven operation.
### **Reproducible Builds + Verification**
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.07.58-PM.png)Client verifies enclave attestation document
We build our enclaves on **NixOS** with reproducible builds, ensuring that anyone can verify that the binary we publish is indeed the binary running in the enclave. This build process is essential for proving we haven't snuck in malicious code to exfiltrate data or collect sensitive logs.
Our code is fully open source ([GitHub: OpenSecret](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud)), so you can audit or run it yourself. You can also verify that the cryptographic measurement the build process outputs matches the measurement reported by the enclave during attestation.
## **Putting It All Together**
![](https://blog.opensecret.cloud/content/images/2025/02/Screenshot-2025-02-05-at-8.09.09-PM.png)OpenSecret Offering: Private Key Management, Encrypted Sync, Private AI, and Confidential Compute
By weaving secure enclaves into every step, from authentication to data handling to AI inference, we shift the burden of trust away from human policies and onto provable, hardware-based protections. For app developers, you can offer your users robust privacy guarantees without rewriting all your business logic or building an entire security stack from scratch. Whether you're storing user credentials or running complex operations on sensitive data, the enclave approach ensures plaintext remains inaccessible to even the most privileged parties outside the enclave boundary. Developers can focus on building great apps, while OpenSecret handles the cryptographic "lock and key" behind the scenes.
This model provides a secure-by-design environment for industries that demand strict data confidentiality, such as healthcare, fintech, cryptocurrency apps for secure key management, or decentralized identity platforms. Instead of worrying about memory dumps or backend tampering, you can trust that once data enters the enclave, it's sealed off from unauthorized eyes, including from the app developers themselves. And these safeguards don't just apply to niche use cases. Even general-purpose applications that handle login flows and user-generated content stand to benefit, especially as regulatory scrutiny grows around data privacy and insider threats.
Imagine a telehealth startup using OpenSecret enclaves to protect patient information for remote consultations. Not only would patient data remain encrypted at rest, but any AI-driven analytics to assist with diagnoses could be run privately within the enclave, ensuring no one outside the hardware boundary can peek at sensitive health records. A fintech company could similarly isolate confidential financial transactions, preventing even privileged insiders from viewing or tampering with raw transaction details. These real-world implementations give developers a clear path to adopting enclaves for serious privacy and compliance needs without overhauling their infrastructure.
OpenSecret aims to be a **full developer platform** with end-to-end security from day one. By incorporating user authentication, data storage, and GPU-based confidential AI into a single service, we eliminate many of the traditional hurdles in adopting enclaves. No more juggling separate tools for cryptographic key management, compliance controls, and runtime privacy. Instead, you get a unified stack that keeps data encrypted in transit, at rest, and in use.
Our solution also caters to the exploding demand for AI applications: with TEE-enabled GPU workloads, you can securely process sensitive data for text inference without ever exposing raw plaintext or sensitive documents to the host system.
The result is a new generation of apps that deliver advanced functionality, like real-time encrypted data sync or AI-driven insights, while preserving user privacy and meeting strict regulatory requirements. You don't have to rely on empty "trust us" promises because hardware enclaves, remote attestation, and reproducible builds collectively guarantee the code is running untampered. In short, OpenSecret offers the building blocks needed to create truly confidential services and experiences, allowing you to innovate while ensuring data protection remains ironclad.
## **Things to Come**
We're excited to build on our enclaved approach. Here's what's on our roadmap:
• **Production Launch**: We're using this in production now with [Maple AI](https://trymaple.ai/?ref=blog.opensecret.cloud) and have a developer preview playground up and running. We'll have the developer environment ready for production in a few months.\
• **Multi-Tenant Support**: Our platform currently works for single tenants, but we're opening this up so developers can onboard without needing a dedicated instance.\
• **Self-Serve Frontend**: A dev-friendly portal for provisioning apps, connecting OAuth or email providers, and managing users.\
• **External Key Signing Options**: Integrations with custom hardware security modules (HSMs) or customer-ran key managers that can only process data upon verifying the enclave attestation.\
• **Confidential Computing as a Service**: We'll expand our platform so that other developers can quickly create enclaves for specialized workloads without dealing with the complexities of Nitro or GPU TEEs.\
• **Additional SDKs**: In addition to our [JavaScript client-side SDK](https://github.com/OpenSecretCloud/OpenSecret-SDK?ref=blog.opensecret.cloud), we plan to launch official support for Rust, Python, Swift, Java, Go, and more.\
• **AI API Proxy with Attestation/Encryption**: We already provide an easy way to [access a Private AI through Maple AI](https://trymaple.ai/?ref=blog.opensecret.cloud), but we'd like to open this up more for existing tools and developers. We'll provide a proxy server that users can run on their local machines or servers that properly handle encryption to our OpenAI-compatible API.
## **Getting Started**
Ready to see enclaves in action? Here's how to dive in:\
1. **Run OpenSecret**: Check out our open-source repository at [OpenSecret on GitHub](https://github.com/OpenSecretCloud/opensecret?ref=blog.opensecret.cloud). You can run your own enclaved environment or try it out locally with Docker.\
2. **Review Our SDK**: Our [JavaScript client SDK](https://github.com/OpenSecretCloud/OpenSecret-SDK?ref=blog.opensecret.cloud) makes it easy to handle sign-ins, put/get encrypted data, sign with user private keys, etc. It handles attestation verification and encryption under the hood, making the API integration seamless.\
3. **Play with Maple AI**: Try out [Maple AI](https://blog.opensecret.cloud/maple-ai-private-encrypted-chat/) as an example of an AI app built directly on OpenSecret. Your queries are encrypted end to end, and the Llama model sees them only inside the TEE.\
4. **Developer Preview**: Contact us if you want an invite to our early dev platform. We'll guide you through our SDK and give you access to the preview server. We'd love to build with you and incorporate your feedback as we develop this further.
## **Conclusion**
By merging secure enclaves (AWS Nitro and Nvidia GPU TEEs), user authentication, private key management, and an end-to-end verifiable encrypted approach, **OpenSecret** provides a powerful platform where we protect user data during collection, storage, and processing. Whether it's for standard user management, handling private cryptographic keys, or powering AI inference, the technology ensures that **no one**, not even us or the cloud provider, can snoop on data in use.
**We believe** this is the future of trustworthy computing in the cloud. And it's **all open source**, so you don't have to just take our word for it: you can see and verify everything yourself.
Do you have questions, feedback, or a use case you'd like to test out? Come join us on [GitHub](https://github.com/OpenSecretCloud?ref=blog.opensecret.cloud), [Discord](https://discord.gg/ch2gjZAMGy?ref=blog.opensecret.cloud), or email us for a developer preview. We can't wait to see what you build!
*Thank you for reading, and welcome to the era of enclaved computing.*
-
![](/static/nostr-icon-purple-64x64.png)
@ 3b7fc823:e194354f
2025-02-07 00:39:21
# Details on how to use a Burner Phone
Mobile phones are needed for communications when out in the world but they are a nightmare for privacy and security as detailed in <MISSIVE /07> especially when it comes to surveillance risks. This is more of a hands on guide for how to mitigate those risks.
Burner phones as the name describes is a use and "burn" device either for a single operation or for a longer period if proper precautions are taken. In case you are unaware what I mean by a burner phone; cell phones can be purchased from big box stores, gas stations, and kiosks in cash without a contract. They are usually not very expense and enable you to buy prepaid cards to use for phone and internet service.
Getting a Burner Phone:
1. Best to use a store out of town but not mandatory.
2. Do not take any electronics with you, especially another phone.
3. Park down the street in another parking lot near the store and walk over. Be mindful of security cameras.
4. Cover any tattoos or identifying marks. Wear a hat and a medical mask. (Thank you covid)
5. Use cash only to buy.
6. Leave, do not shop or buy anything else.
Setting up Burner Phone:
1. Go somewhere with free public WIFI (Starbucks, Library, whatever)
2. Do not take any electronics with you, especially another phone.
3. Open package and follow directions to activate using the public WIFI access.
4. Choose a random area code during setup.
5. Create a new random gmail account. (Do not reuse accounts or names)
6. Download and install a VPN, Signal or SimpleX, Firefox Focus Browser, Tor if needed. Delete any other unnecessary apps.
7. Change phone settings (see list)
8. Turn off and remove battery if able to (becoming harder to find) or put into a Faraday Bag.
9. Destroy packaging that came with the phone.
Phone Settings:
1. Turn off hotspot and tethering. Enable Always on VPN and Block Connections without VPN. Set DNS to automatic.
2. Turn off bluetooth and WIFI.
3. Disable all notifications, notification history, notifications on lock screen, and emergency alerts.
4. Turn off all sounds and vibrations.
5. Turn off Find my Device. Setup screen lock with password. (No bio)
6. Toggle everything in privacy: no permissions, turn off microphone, turn off usage and diagnostics, etc
7. Set Use Location to off.
8. Under Languages & Input > Virtual Keyboard > Gboard > Advanced: disable usage statistics, personalizing, and improve voice and typing for everyone.
Using a Burner Phone:
1. Never sign into any account associated with your real identity.
2. Never use it to contact anyone associated with your real identity.
3. Time and distance between burner phone and any other cell phone you own.
i.e. A hour has passed and several miles from when you use and had on the other device.
4. When not in use the battery is removed or in a Faraday Bag.
5. Always use a VPN and always use private search and browser set to delete upon closing (Firefox Focus default).
6. Never actually call or text from the phone. You only want to use SimpleX or Signal for communications.
7. Do not save anything (files, pictures, history) on the phone, especially if incriminating.
8. Do not take it with you or use unless necessary.
9. When in doubt, burn it and get another one.
10. Never carry over names, accounts, whatever from old burner phone to new burner phone.
Burning a phone:
1. Factory reset the device.
2. Remove and destroy the SIM card.
3. Remove the battery because lithium batteries can explode. (may have to take it apart)
4. Smash internals.
5. Burn remains or drown in water. (Throw it in the river)
As long as you are careful to never identify yourself with the burner phone the only surveillance they can do is know that a phone was used or in a location but not who it belongs to. Be aware that if you are caught with it on your person any information or contacts on the phone may get compromised. Be mindful what you put on it.
-
![](/static/nostr-icon-purple-64x64.png)
@ b8851a06:9b120ba1
2025-02-06 22:46:54
When Your Bitcoin Stash Saves Your Earnings Report: The Accounting Shift Every Business Needs to Understand
**Tesla’s Q4 2024 earnings were a wreck—revenue down, costs up. But thanks to Bitcoin, the financial airbags deployed so effectively that no one’s talking about the crash.
**
Let’s Be Clear:
This isn’t about praising Tesla or Elon Musk (we’ll leave that to fan accounts). It’s about dissecting how a simple accounting rule change turned Bitcoin into a corporate financial shock absorber. The numbers reveal a playbook any business can replicate.
The “Aha” Moment: Accounting Rules Meet Digital Gold
(Why This Matters for Main Street Businesses)
The Problem Before 2025:
Companies had to report Bitcoin like a cursed family heirloom—you could only tell people when its value dropped, never when it gained. Imagine having to value your house at its lowest sale price in the neighborhood, even while yours was freshly renovated.
The 2025 Fix:
New rules let companies report Bitcoin like stocks—current value, gains and losses included. Suddenly, that digital gold in the treasury vault gets to shine.
Why This Changes Everything:
• For Tesla: Their $184M Bitcoin stash got revalued to $1.076B → $600M paper gain
• For Your Business: Bitcoin isn’t just an asset; it’s an earnings hedge
For Tesla, Bitcoin turned a bad quarter into a balanced one. For your business, it’s the difference between surviving a downturn and thriving through one.
Tesla’s Numbers Decoded: Bitcoin as Financial CPR
The Crash:
• Automotive revenue ↓ 8%
• Operating expenses ↑ 9%
• Missed revenue targets by $1.5B
The Airbag:
• Bitcoin gain: $600M
• EPS boost: 23% of total earnings
• Balance sheet upgrade: 484% Bitcoin value increase
The Takeaway:
Bitcoin didn’t fix Tesla’s car business—it kept their financials on life support while they work on repairs.
The Business Owner’s Guide to Bitcoin Airbags
(No Tech Jargon, Just Street Smarts)
1. Your New Financial Shock Absorber
• Old Way: Keep cash reserves losing 4-7% annually to inflation
• Bitcoin Way: Treasury that grows while parked
Real Math:
$10M Treasury Allocation
Year 1:
- Cash: $9.6M (after 4% inflation loss)
- Bitcoin: $15.4M (54% avg annual growth*)
2. The “Get Out of Jail Free” Card
When core business stumbles (like Tesla’s did):
• Bitcoin gains offset operational losses
• Buys time for turnaround strategies
3. Shareholder Whisperer
That Bitcoin gain isn’t just numbers—it’s storytelling fuel:
• “Our innovative treasury strategy delivered $600M in non-operational income”
• Beats explaining another quarter of declining sales
Building Your Bitcoin Safety Net
A Step-by-Step Playbook
Step 1: Treasury Triage
• Allocate 5-10% of cash reserves to Bitcoin
• Not speculation—modern balance sheet insurance
Step 2: Accounting Alignment
Work with your CFO to:
• Implement FASB-compliant reporting
• Train teams on quarterly revaluations
Step 3: Strategic Deployment
• Hold through volatility cycles
• Treat gains as bonus liquidity for:
• R&D funding
• Debt reduction
• Opportunistic acquisitions
Pro Tip: Start small—even a 1% Bitcoin allocation creates optionality without material risk.
Objection Busters: What Skeptics Miss
“But Bitcoin’s Too Volatile!”
Cash is guaranteed to lose value. Bitcoin at least gives you a fighting chance.
“We’re Not Tech Bros!”
• Bitcoin isn’t tech—it’s digital real estate
• The network effect is its tenant base
“Accounting’s Too Complex!”
• Modern tools automate revaluations
• Takes less time than managing foreign currency hedges
The Future of Corporate Treasuries
(Why Early Adopters Win)
2025’s Landscape:
• First movers already reaping benefits
• Late adopters face inflationary erosion
Your Move:
• Conduct treasury health check
• Model Bitcoin allocation scenarios
• Implement phased adoption
Final Word:
Tesla’s story isn’t about “crypto” moonshots—it’s about modern financial engineering. The new accounting rules have turned Bitcoin into a Swiss Army knife for corporate treasuries:
• Blade 1: Inflation hedge
• Blade 2: Earnings supplement
• Blade 3: Strategic reserve asset
The question isn’t whether Bitcoin belongs on corporate balance sheets—it’s how much value your business will leave on the table by ignoring this tool.
Your Competitors Won’t Wait—Why Should You?
→ [Free Treasury Health Assessment]( https://neowealth.xyz/code)
→ [Bitcoin Accounting Implementation Guide
]( https://neowealth.xyz/services)
Let [www.NeoWealth.xyz]( https://neowealth.xyz/) assist you– Modern Treasury Solutions for Pragmatic Leaders
#Nostr Footnotes:
Data Sources: #Tesla Q4 2024 Earnings Report, FASB Accounting Standards Update 2023-08, Bitcoin Historical Returns Analysis (2015-2024)
Past performance ≠ future results.
#Bitcoin not #Crypto
-
![](/static/nostr-icon-purple-64x64.png)
@ 000002de:c05780a7
2025-02-06 18:47:45
I stand by my non-stance that the cowboy credit thing is OK. Using services like MiniBits and CoinOSis OK and using your own node is OK. There are tradeoffs of each. I've been using these eCash hosted / custodial services for over a month now. They work fine most of the time. NWC works most of the time but there are growing pains with the volume of small transactions hitting these services.
I'm gonna try turning it all off for a week starting today. Just use CCs. I mean its kinda like old school SN right?
Next I'd like to really make an effort to go the other way and use a self sovereign stack. I've tried that before with SN and it didn't work for me. Pretty sure I was just too busy and didn't have time to work out the kinks in my setup.
I think cowboy credits are the easiest option by far. No issues really except you aren't dealing with sats. It doesn't feel the same and it isn't the same. I'm wondering how it will hit me as I use them though.
originally posted at https://stacker.news/items/877936
-
![](/static/nostr-icon-purple-64x64.png)
@ 5d4b6c8d:8a1c1ee3
2025-02-06 16:14:00
I would have done about an hour better today, but my hatred of food waste got the best of me. My daughter wanted the crusts cut off of her toast and, since no one else was going to eat them, I gobbled them up.
That was the last thing I ate, yesterday, though, and I didn't eat or drink anything for the next 16 hours. Still pretty good.
## Score Card
Day 1: 14 hour fast (13 dry)
Day 2: 15 hour fast (14 dry)
Day 3: 17 hours (16 dry)
Day 4: 18 hours (17 dry)
Day 5: 18 hours (16 dry)
Day 6: TBD (16 dry)
originally posted at https://stacker.news/items/877787
-
![](/static/nostr-icon-purple-64x64.png)
@ fd208ee8:0fd927c1
2025-02-06 15:58:38
## Beginning at the start
In my previous article, [The Establishment](https://next-alexandria.gitcitadel.eu/publication?d=the-gitcitadel-blog-the-establishment-3-by-stella-v-1), I answered the question: "How do we form a company?" I realize, now, that I was getting a bit ahead, of myself, as the precursor to a *company* is a *team*, and many people struggle to form teams. So, I will go back to the beginning, and then you can read both articles to the end, and then stop.
## The Initiation
The first, and most-difficult step of team formation, is *the initiation*. We know that it must be the most-difficult, as it's the step that carries the highest potential reward, and it's the step that is tried-and-failed most often. (Some people, like Elon Musk or Donald Trump, are born Initiators with excellent follow-through, but this archetype is exceedingly thin on the ground because it requires you to be mildly autistic, have barely-throttled ADHD, and/or tend to megalomania, also popularly known as "toxic masculinity", "CEO personality", or "being a successful military officer".)
Someone needs to form a useful, attractive Vision and then motivate other people to help them achieve it. That sounds really easy, but it's actually brutally difficult because
* You have to come up with an idea that is coherent, plausible, and inspiring.
* You have to be able to communicate that idea to other people and make it appealing to them, by tying it into their own personal goals and desires.
* You have to be able to hone and reformulate that idea, constantly, to correct it or to re-motivate the other team members.
* You have to defend the idea against detractors, naysayers, and trolls, and you have to do it so vociferously, that it will erode your own popularity among those who disagree with you and open you to personal attacks.
* You have to be able to focus on the idea, yourself, for a long stretch of time, and not allow yourself to get bored, lazy, or distracted.
![Ein Bock](https://upload.wikimedia.org/wikipedia/commons/thumb/1/1a/Schafbock_Bretonisches_Zwergschaf.JPG/1200px-Schafbock_Bretonisches_Zwergschaf.JPG)
So, just do and be all of those things, and then initiate the team, with the method I will name the *Hatbock Method*. It is so named because of the classic, German initiation ritual, in which an Initiator stands up, loudly defines their Vision and calls into a group "Wer hat Bock?" (roughly, "Who has the hunger/desire?") and whoever responds with "Ich hab Bock." (roughly, "Yes, I hunger for this.") is a part of the team.
Then the Initiator says, "Okay, everyone with the hunger, let's sit down together, and discuss this some more." (This "sitting" is literally called a "seating", or "Sitzung", which is the German word for "meeting".)
## The Sitting
We now get to the second most difficult part of team formation: figuring out *where to sit*. Most teams get this wrong, repeatedly, and many teams dissolve or fracture under the difficulty of this momentous decision. You would think organizing yourselves online would make this easier ("Oh, we'll just meet online!"), but the number of places available for sitting online are limitless. You can talk your whole Vision into the ground, with laborous discussions and migrations between Chachi, OxChat, Telegram, SimpleX, Slack, Discord, WhatsApp, GitHub, Teams, Coracle, Matrix... you get the idea.
Try to keep in mind that the Vision is more important than the seating area, and go with the flow. Simply, find someplace and go there. Worry about it again, at a later date. Don't lose momentum. Sit down and start discussing the Vision, *immediately*.
![Sitzbank](https://muenchenunterwegs.de/content/2239/ratschbankerlclhm-nagy.jpg)
Now, this next bit is very important:
> Do not let anyone outside your team influence where you sit!
...unless they are providing your team with some good, service, or income, that makes choosing their preferred location the superior choice.
This is the German *Stammtisch* principle, where a host encourages you to come sit down, regularly, in some particular place, because your sitting there provides them with some benefit: they can overhear your conversations, get you to test out their seating area, sell you refreshments, etc. Your choice of seating, in other words, is a valuable good, and you should only "sell" it to someone who rewards you in measure. They have to reward you because their preferred seating area wasn't your immediate and obvious choice, so there was probably something unappealing or uncertain about the seating area.
## Plan it in
Once you've sat down, and finished your rough draft of the Vision, you need to figure out *when to sit*. This is the third most-difficult part of team formation. (Yes, don't worry, it gets easier as it goes along.)
The most popular plan is the Wirsehenuns Plan (roughly, "We'll see each other, around.") This can work quite well, if you just want to have a loose collaboration, that calls itself together in an ad hoc fashion, when a team member feels the need. Also known as "@ me, bros".
It's not a great plan for more intensive collaboration, as that tends to need a certain amount of velocity, to actually happen, as the speed of movement has a centrifugal effect on the tasks. Team momentum, in other words, creates a sort of gravity, that keeps the team together as a unit. So, for deeper teamwork, I would recommend the Stammtisch variant: name a place and date/time, when you will next meet. Preferably, on a rotating schedule: daily, weekly, last Thursday of the month, etc.
And then meet there and then. And discuss amongst yourselves. Set clear, short-term tasks (and assign them to particular people!), medium-term strategies, and longer-term goals. *Write everything down.* Anything not written down, is a suggestion, not an assigned task.
If you find your Stammtisch becoming increasingly rewarding and productive, and your goals start moving closer and closer into sight, then you might want to formalize your team structure further, [as a company](https://next-alexandria.gitcitadel.eu/publication?d=the-gitcitadel-blog-the-establishment-3-by-stella-v-1).
-
![](/static/nostr-icon-purple-64x64.png)
@ f1989a96:bcaaf2c1
2025-02-06 14:01:03
Good morning, readers!
In India, the central bank has taken a significant step toward launching its central bank digital currency (CBDC), the digital rupee. In partnership with fintech firms Mobikwik and Cred, the digital rupee is now available to 180 million users through a new “e₹ wallet,” a CBDC wallet app designed for public use. Predictably, the CBDC comes with tight restrictions, including limits on payment amounts and frequency and extensive personal data collection, raising concerns over financial privacy.
In open-source news, HRF is pleased to announce a collaboration with MIT for the 2025 MIT Bitcoin Expo. This two-day freedom-focused event will explore how Bitcoin and adjacent freedom tech can help combat financial surveillance and repression under authoritarian regimes through expert speakers, panels, workshops, and more. Elsewhere, Joltz became the first self-custodial wallet to support Taproot Assets, enabling access to stable digital dollars on a decentralized network for activists, dissidents, and others in difficult political environments.
We conclude with an extensive guide from Area Bitcoin, a Brazilian education hub, thoroughly examining Brazil’s DREX CBDC and its implications for financial freedom and human rights in Brazil and beyond.
**Now, let’s dive right in!**
### [**Subscribe Here**](https://mailchi.mp/hrf.org/financial-freedom-newsletter?mc_cid=bf652c0a5a)
## **GLOBAL NEWS**
#### **India | Central Bank Partners with Fintech Firms to Pilot Launch CBDC**
The Reserve Bank of India (RBI) [partnered](https://www.businesstoday.in/personal-finance/news/story/mobikwik-cred-join-hands-with-rbi-to-fully-launch-cbdc-ers-for-android-check-features-usage-462318-2025-01-28) with fintech firms MobiKwik and Cred, alongside Yes Bank, to expand the digital rupee, India’s CBDC. With a combined user base of [180 million,](https://www.ledgerinsights.com/fintech-wallets-go-live-in-digital-rupee-cbdc-pilot/) Mobikwik and Cred will act as entry points for public access to the CBDC through their new “e₹ wallet” CBDC app. However, the app mandates video verification and imposes significant restrictions. For instance, a daily transaction cap of ₹50,000 ($577) and ₹10,000 ($115) limit per transaction. The RBI’s decision to embed the digital rupee within existing fintech firms to boost adoption leaves few avenues for financial privacy and freedom as the Indian state [pushes](https://www.lowyinstitute.org/the-interpreter/india-s-plan-world-without-cash) further towards a cashless economy.
#### **El Salvador | Lawmakers Scale Back Bitcoin Legal Tender Law**
El Salvador’s congress [amended](https://www.reuters.com/world/americas/lawmakers-el-salvador-rush-new-bitcoin-reform-after-imf-deal-2025-01-30/) its Bitcoin law, making private sector acceptance of Bitcoin voluntary. The reform follows a $1.4 billion loan agreement with the International Monetary Fund (IMF) that wanted to limit the government’s, citizens’, and economies’ exposure to Bitcoin. Salvadoran lawmaker Elisa Rosales [said](https://www.reuters.com/world/americas/lawmakers-el-salvador-rush-new-bitcoin-reform-after-imf-deal-2025-01-30/) the latest reform guarantees Bitcoin’s “permanence as legal tender” while facilitating its “practical implementation.” But, John Dennehy, founder of the civil society organization [Mi Primer Bitcoin](https://es.myfirstbitcoin.io/), [explained](https://x.com/jdennehy_writes/status/1885346352621617615) that the reform removed “all references of bitcoin as money or legal tender, plus the actual conditions, such as the government accepting bitcoin for things such as taxes, are now prohibited.” The future of freedom technology in El Salvador will be worth monitoring closely as the regime continues to erode protections on civil liberties.
#### **Nigeria | Regime Hikes Telecom Tariffs for Citizens**
In Nigeria, the regime approved a [50% increase](https://thenationonlineng.net/50-tariff-hike-a-necessary-step-or-a-burden-for-nigerians/) in telecom tariffs, further straining citizens already grappling with financial instability. Call rates will rise from 11 to 16.50 naira per minute ($0.0074 to $0.011) and SMS charges from 4 to 6 naira ($0.0026 to $0.004), exacerbating three-decade-high inflation as the ripple effects spread through the economy. Telecom companies justify the price hike as necessary for the sector’s survival amid the naira’s ongoing [devaluation](https://www.bloomberg.com/news/articles/2024-09-13/why-nigeria-s-naira-currency-ngn-usd-slumped-and-why-it-matters). [Deolu Ogunbanjo](https://www.linkedin.com/in/deolu-ogunbanjo-62b5a18b/?originalSubdomain=ng), president of the National Association of Telecoms Subscribers, however, [argues](https://thenationonlineng.net/50-tariff-hike-a-necessary-step-or-a-burden-for-nigerians/) that “this decision shows the government cares more about protecting profits than protecting people.” For Nigerians relying on mobile networks for work, banking, and daily communications, the increased costs will make phone services less accessible, putting even more pressure on civil society under an authoritarian government.
#### **Nicaragua | Inter-American Court of Human Rights Rules Against Ortega**
In Nicaragua, where the financial repression of individuals, opposition, and civil society is widespread, the Inter-American Court of Human Rights [ruled](https://havanatimes.org/news/inter-american-human-rights-court-rules-against-nicaragua/) that Daniel Ortega’s reelections since 2011 were illegitimate. This ruling “is the legal confirmation that there is no legitimate president in Nicaragua, but rather a dictator who has usurped power,” [said](https://havanatimes.org/news/inter-american-human-rights-court-rules-against-nicaragua/) Jaime Aparicio, a Bolivian lawyer, [adding](https://havanatimes.org/news/inter-american-human-rights-court-rules-against-nicaragua/) that “this is the first time that there is a legal precedent determining the illegality of Ortega’s presidency.” In a country where the regime systematically [freezes](https://www.reuters.com/world/americas/nicaragua-govt-accuses-catholic-church-money-laundering-freezes-accounts-2023-05-27/) bank accounts, seizes assets, and [shuts down](https://www.catholicnewsagency.com/news/261539/nicaraguan-dictatorship-shuts-down-more-organizations-including-dominican-nuns) nonprofits to silence dissent, this verdict sets a critical legal precedent against the abuse of state power to secure reelection. While the court lacks enforcement, its ruling strengthens legal challenges to Ortega’s rule and could provide a foundation for future actions against electoral fraud and authoritarian control.
#### **Webinar Series for Nonprofits | Become Unstoppable**
In an era where financial control is weaponized against dissent, the ability to transact freely is more important than ever. For activists and nonprofits operating under oppressive regimes, Bitcoin can offer a way to resist censorship, protect funds, and remain operational.
Join HRF for a free, three-day webinar from March **17–19**, led by Anna Chekhovich, HRF’s Bitcoin nonprofit adoption lead and financial freedom expert at the Anti-Corruption Foundation. The sessions will run daily from **10:30 a.m. to 12:00 p.m. EDT** and are designed specifically to teach human rights defenders and nonprofit organizations how to integrate Bitcoin into their work to challenge state censorship and confiscation in a beginner-friendly way.
### [Register Here](https://docs.google.com/forms/d/e/1FAIpQLSf0sjqwSFQo8HGMsWIIDRyhx34TsoonOSTfYoWSy-aaBbLeSw/viewform)
## BITCOIN AND FREEDOM TECH NEWS
#### **MIT | 2025 Bitcoin Expo**
HRF is partnering with [MIT](https://www.mit.edu/) to host the [2025 MIT Bitcoin Expo](https://mitbtcexpo.org/), a two-day event from April 5-6 at the Stata Center, exploring Bitcoin and freedom technologies as tools for privacy, financial sovereignty, and civil liberties — especially for people living under authoritarian regimes. Now in its 12th year, the expo features keynotes, panels, technical workshops, and hackathons. It brings together developers, activists, students, and researchers to dive into privacy, self-sovereignty, and decentralization. Attendees will also gain hands-on experience and engage in meaningful discussions on the real-world impact of freedom technologies. Learn more about the expo and get your tickets [here](https://mitbtcexpo.org/)**.**
#### **Bitcoin Mining | Two Blocks Mined by Solo Miners This Week**
This week, two solo miners successfully mined Bitcoin blocks, marking a rare and significant event. The first block was [solved](https://x.com/FutureBit/status/1884740065223495821) through a collaborative effort led by the [256 Foundation](https://256foundation.org/) (where 300+ participants [pooled](https://crypto.news/solo-miner-solving-a-block-and-getting-3-146-btc/) their hashrate for a fundraising event). The second block was [mined](https://x.com/SoloSatoshi/status/1885418398345269572) independently through [solo.ckpool](https://solo.ckpool.org/) by a miner using hashrate equivalent to thousands of BitAxe devices, a type of open-source home mining hardware. The news shows that independent miners can still compete outside of large [mining pools](https://river.com/learn/terms/m/mining-pool/). These events reaffirm Bitcoin’s decentralization and censorship resistance, proving that solo mining remains viable with the proper coordination and infrastructure, which is especially key as solo mining can be done privately and quietly under tyrannical regimes.
#### **Joltz Wallet | First Self-Custodial Wallet to Support Taproot Assets**
Joltz has [launched](https://x.com/joltz_btc/status/1885097351108243487) the first self-custodial wallet for [Taproot Assets](https://docs.lightning.engineering/the-lightning-network/taproot-assets), enabling users to hold and transact stablecoins like USDT (Tether) directly on Bitcoin — without intermediaries. Unlike custodial solutions, Joltz ensures users retain full control over their funds while enabling BTC-to-USDT swaps through a user-friendly interface. This could expand access to stable money — particularly for activists and nonprofits in volatile markets in search of digital dollars. However, stablecoins still carry centralization and censorship risks, as issuers like Tether can freeze funds or be beholden to regulatory demands.
#### **Olas | New Updates Enhance Accessibility and Features**
[Olas](https://github.com/pablof7z/olas), an Instagram-like Nostr client built by [Pablof7z](https://github.com/pablof7z), [released](https://github.com/pablof7z/olas/releases/tag/0.2.0) a new update for iOS and Android. The update introduces multiple images per post, Instagram-style filters, and improved video playback. It also enhances its Nostr-native wallet functionality so users can more fluidly receive Bitcoin tips and payments. The client also made Nostr Wallet Connect (NWC), a protocol that allows apps to interact with Bitcoin Lightning wallets, more reliable for end users. Nostr clients like Olas may prove to be a useful tool for censorship-resistant communications on social networks among activists worldwide and stand as a stark contrast to centralized, permissioned alternatives.
#### **OpenSats | Announces Ninth Wave of Bitcoin Grants**
[OpenSats](http://opensats.org), a public nonprofit supporting open-source Bitcoin projects, [announced](https://opensats.org/blog/ninth-wave-of-bitcoin-grants) its ninth wave of Bitcoin grants advancing financial freedom and privacy. Among the recipients, [Nutstash](https://www.nutstash.app/), a multi-platform Cashu ecash wallet, enables private, censorship-resistant Bitcoin transactions — critical for human rights defenders. Another grantee, [El Tor](https://devpost.com/software/el-tor), is developing a fork of the [Tor Network](https://www.torproject.org/) integrated with Bitcoin's Lightning Network, aiming to enhance online privacy for activists and dissidents. HRF welcomes OpenSats’ continued support for decentralized tools in an increasingly surveilled world.
#### **bitcoin++ | Upcoming Bitcoin Developer Conference**
Bitcoin developers and freedom tech enthusiasts will [gather](https://btcplusplus.dev/conf/floripa) in Florianopolis, Brazil, from Feb. 19-22, 2025, for the special “hacking edition” [bitcoin++](https://btcplusplus.dev/) conference. Unlike past bitcoin++ events, which focused on single topics like scripting or ecash, this event will feature hands-on development to enhance Bitcoin’s privacy, scalability, and censorship resistance. Attendees will participate in workshops, live coding challenges, and technical discussions. HRF will help the event include attendees from authoritarian regimes in Latin America. Learn more about the conference or buy tickets [here](https://btcplusplus.dev/conf/floripa).
## RECOMMENDED CONTENT
#### **The Risks of the DREX Central Bank Digital Currency by Area Bitcoin**
In this [article](https://blog.areabitcoin.co/cbdc-drex/), [Area Bitcoin](https://www.areabitcoin.co/), a Brazilian Bitcoin education hub, examines [DREX](https://cbdctracker.hrf.org/currency/brazil), Brazil’s central bank digital currency (CBDC), and its threat to Brazilians’ financial autonomy. DREX operates as a token on a centralized, permissioned blockchain that grants officials sweeping surveillance and control over individual financial activity. Further, its strict Know-Your-Customer (KYC) and Anti-Money Laundering (AML) measures erode financial privacy. Area Bitcoin [warns](https://blog.areabitcoin.co/cbdc-drex/), “By embracing it, we risk surrendering our personal data, the fruits of our labor, and even generational wealth to political and bureaucratic oversight.”
*If this article was forwarded to you and you enjoyed reading it, please consider subscribing to the Financial Freedom Report [here](https://mailchi.mp/hrf.org/financial-freedom-newsletter?mc_cid=bf652c0a5a).*
*Support the newsletter by donating bitcoin to HRF’s Financial Freedom program [via BTCPay](https://hrf.org/btc).*\
*Want to contribute to the newsletter? Submit tips, stories, news, and ideas by emailing us at ffreport @ [hrf.org](http://hrf.org/)*
*The Bitcoin Development Fund (BDF) is accepting grant proposals on an ongoing basis. The Bitcoin Development Fund is looking to support Bitcoin developers, community builders, and educators. Submit proposals [here](https://forms.monday.com/forms/57019f8829449d9e729d9e3545a237ea?r=use1)*.
[**Subscribe to newsletter**](http://financialfreedomreport.org/)
[**Apply for a grant**](https://forms.monday.com/forms/57019f8829449d9e729d9e3545a237ea?r=use1&mc_cid=39c1c9b7e8&mc_eid=778e9876e3)
[**Support our work**](https://hrf.org/btc?mc_cid=39c1c9b7e8&mc_eid=778e9876e3)
[**Visit our website**](https://hrf.org/programs/financial-freedom/)